Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18900142 | METHOD FOR TRANSMITTING MESSAGE APPLIED TO PRESET SERVER AND TERMINAL, AND ELECTRONIC DEVICE | September 2024 | July 2025 | Allow | 9 | 1 | 1 | Yes | No |
| 18541973 | CREDENTIAL DEPENDENCY ENCODING AND VERIFICATION BASED ON OTHER CREDENTIAL RESOURCES | December 2023 | March 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18530505 | SYSTEMS AND METHODS FOR DYNAMIC GRANULAR ACCESS PERMISSIONS | December 2023 | November 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18503601 | COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE | November 2023 | June 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18477945 | SYSTEM AND METHOD FOR DISCOVERY AND BINDING OF REMOTE ACCESS CONTROLLER FIRMWARE TO A PROXY SERVICE | September 2023 | May 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18227659 | INFORMATION OUTPUT DEVICE, CAMERA, INFORMATION OUTPUT SYSTEM, INFORMATION OUTPUT METHOD, AND PROGRAM | July 2023 | March 2025 | Allow | 19 | 3 | 0 | No | No |
| 18208826 | IDENTIFICATION (ID) PROOFING TO DETER THREAT ACTORS | June 2023 | May 2024 | Allow | 11 | 0 | 0 | Yes | No |
| 18314319 | DID SYSTEM USING BROWSER-BASED SECURITY PIN AUTHENTICATION, AND CONTROL METHOD THEREOF | May 2023 | June 2025 | Allow | 25 | 1 | 0 | No | No |
| 18127372 | REAL-TIME OWNERSHIP STATUS CHECK FOR NETWORK DEVICES IN A NETWORK | March 2023 | May 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18177620 | SECURITY ACTION VERIFICATION IN A COMPUTING NETWORK | March 2023 | April 2024 | Allow | 14 | 2 | 0 | Yes | No |
| 18148900 | USER AUTHENTICATION WITH BIOMETRIC DATA IN CONJUNCTION WITH AUTOFILL ASSISTANCE | December 2022 | December 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 18091272 | Website Verification Service | December 2022 | February 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18076651 | Decentralized Identity Management for Web3 | December 2022 | May 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17928009 | SAMPLE DATA GENERATION APPARATUS, SAMPLE DATA GENERATION METHOD, AND COMPUTER READABLE RECORDING MEDIUM | November 2022 | March 2025 | Abandon | 28 | 1 | 0 | Yes | No |
| 17959431 | Sufficiently Secure Controller Area Network | October 2022 | April 2025 | Allow | 31 | 1 | 0 | Yes | No |
| 17954280 | SYSTEM AND METHOD OF DETERMIING PERSISTENT PRESENCE OF AN AUTHORIZED USER WHILE PERFORMING AN ALLOWED OPERATION ON AN ALLOWED RESOURCE OF THE SYSTEM UNDER A CERTAIN CONTEXT-SENSITIVE RESTRICTION | September 2022 | April 2024 | Abandon | 19 | 1 | 0 | No | No |
| 17941065 | METHOD AND SYSTEM FOR INITIATING A TRANSFER OF RESOURCES | September 2022 | January 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 17883599 | SECURING NETWORK DEVICES AGAINST NETWORK VULNERABILITIES | August 2022 | June 2024 | Allow | 22 | 2 | 0 | Yes | No |
| 17883601 | SECURING NETWORK DEVICES AGAINST NETWORK VULNERABILITIES | August 2022 | June 2024 | Allow | 22 | 2 | 0 | Yes | No |
| 17882589 | SECURING NETWORK DEVICES AGAINST NETWORK VULNERABILITIES | August 2022 | June 2023 | Allow | 10 | 2 | 0 | Yes | No |
| 17852317 | MUTUALLY AUTHENTICATED COMMUNICATION WITH REMOTE SIP DEVICE | June 2022 | May 2025 | Abandon | 34 | 2 | 0 | Yes | No |
| 17807007 | UNIQUE IDENTIFICATION OF CUSTOMER USING AN IMAGE | June 2022 | June 2024 | Allow | 24 | 3 | 0 | Yes | No |
| 17824433 | Distributed cloud-based security systems and methods | May 2022 | September 2024 | Allow | 28 | 4 | 0 | Yes | No |
| 17739884 | SYSTEM AND METHOD FOR USING A PLURALITY OF EGOCENTRIC AND ALLOCENTRIC FACTORS TO IDENTIFY A THREAT ACTOR | May 2022 | March 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17721800 | COMPUTING DEVICE COMPONENT MONITORING SYSTEM | April 2022 | April 2025 | Allow | 36 | 2 | 0 | Yes | No |
| 17673087 | WORKFLOW SERVICE BACK END INTEGRATION | February 2022 | February 2024 | Allow | 24 | 2 | 0 | Yes | No |
| 17573248 | SYSTEM AND METHOD FOR COLLECTING CLINICAL TRIAL DATA BASED ON BLOCK-CHAIN | January 2022 | August 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17542688 | INFORMATION OUTPUT DEVICE, CAMERA, INFORMATION OUTPUT SYSTEM, INFORMATION OUTPUT METHOD, AND PROGRAM | December 2021 | July 2024 | Allow | 31 | 4 | 0 | Yes | No |
| 17605439 | Method and Apparatus for Distributed Ledger | October 2021 | March 2025 | Abandon | 41 | 0 | 1 | No | No |
| 17451761 | DETECTING MALICIOUS ACTIVITY IN A COMPUTER SYSTEM USING COMPUTER SYSTEM OBJECTS | October 2021 | April 2024 | Allow | 30 | 2 | 0 | Yes | No |
| 17482517 | Managing An Unmanned Aerial Vehicle Identity | September 2021 | March 2025 | Allow | 41 | 3 | 0 | Yes | No |
| 17478499 | IDENTITY TOKEN FOR ACCESSING COMPUTING RESOURCES | September 2021 | September 2024 | Allow | 35 | 3 | 0 | Yes | No |
| 17476579 | MODIFICATION OF A DOCKERFILE TO REPAIR VULNERABILITIES EXISTING IN THE DOCKERFILE | September 2021 | June 2024 | Allow | 33 | 0 | 0 | Yes | No |
| 17469085 | MULTIFACTOR AUTHENTICATION FROM MESSAGING SYSTEMS | September 2021 | March 2025 | Allow | 42 | 2 | 0 | Yes | No |
| 17460435 | Identification (ID) Proofing and Risk Engine Integration System and Method | August 2021 | April 2022 | Allow | 7 | 1 | 0 | Yes | No |
| 17411266 | INFORMATION PROCESSING APPARATUS, METHOD, AND COMPUTER READABLE MEDIUM | August 2021 | March 2025 | Allow | 42 | 4 | 0 | Yes | No |
| 17406439 | DEVICE STEP-UP AUTHENTICATION SYSTEM | August 2021 | March 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17397634 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INGRESS EMAIL SECURITY | August 2021 | September 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17393531 | INTEGRATED MULTIFACTOR AUTHENTICATION FOR NETWORK ACCESS CONTROL | August 2021 | January 2024 | Allow | 30 | 2 | 0 | Yes | No |
| 17392939 | Reduced Hierarchy Key Management System and Method | August 2021 | January 2025 | Abandon | 42 | 4 | 0 | No | Yes |
| 17363340 | Detecting Unauthorized Access to a Wireless Network | June 2021 | February 2023 | Allow | 19 | 1 | 0 | No | No |
| 17360910 | DETECTION OF MALWARE AND MALICIOUS APPLICATIONS | June 2021 | February 2023 | Allow | 20 | 1 | 0 | Yes | No |
| 17304209 | CONFIGURATION OF DEVICES FOR BUSINESS MANAGEMENT SYSTEMS | June 2021 | December 2024 | Allow | 42 | 1 | 1 | Yes | No |
| 17345615 | AUTHENTICATION DEVICE, VEHICLE HAVING THE SAME, AND METHOD OF CONTROLLING THE VEHICLE | June 2021 | December 2024 | Abandon | 42 | 2 | 0 | No | No |
| 17327770 | METHOD, COMPUTER PROGRAM AND SYSTEM FOR AUTHENTICATING A USER AND RESPECTIVE METHODS AND SYSTEMS FOR SETTING UP AN AUTHENTICATION | May 2021 | April 2024 | Allow | 35 | 3 | 0 | Yes | No |
| 17315555 | AUTHENTICATION SYSTEM, DEVICE, AND AUTHENTICATION METHOD | May 2021 | May 2024 | Abandon | 36 | 2 | 0 | No | No |
| 17289635 | METHOD AND SYSTEM FOR PROVIDING ACCESS TO DATA STORED IN A SECURITY DATA ZONE OF A CLOUD PLATFORM | April 2021 | December 2022 | Allow | 19 | 3 | 0 | Yes | No |
| 17301909 | MAINTAINING INTERNET PROTOCOL SECURITY TUNNELS | April 2021 | March 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17232628 | PROCESSING TOKENS IN IDENTITY ASSERTIONS FOR ACCESS CONTROL TO RESOURCES | April 2021 | September 2023 | Allow | 29 | 2 | 0 | Yes | No |
| 17278169 | MEDIA CONTENT CONTROL | March 2021 | March 2025 | Allow | 48 | 2 | 1 | Yes | Yes |
| 17192866 | SYSTEM AND METHOD OF DETERMIING PERSISTENT PRESENCE OF AN AUTHORIZED USER WHILE PERFORMING AN ALLOWED OPERATION ON AN ALLOWED RESOURCE OF THE SYSTEM UNDER A CERTAIN CONTEXT-SENSITIVE RESTRICTION | March 2021 | May 2022 | Allow | 14 | 2 | 0 | Yes | No |
| 17192861 | DETECTING SYNTHETIC ONLINE ENTITIES | March 2021 | January 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17189595 | USER TERMINAL, CONTROL METHOD, AND STORAGE MEDIUM | March 2021 | August 2023 | Abandon | 30 | 2 | 0 | Yes | No |
| 17270205 | AUTHORIZATION SYSTEM AND AUTHORIZATION METHOD | February 2021 | December 2023 | Allow | 33 | 0 | 0 | Yes | No |
| 17268994 | DEVICE FOR PROVIDING IDENTIFICATION INFORMATION, AND SYSTEM FOR SAME | February 2021 | September 2024 | Allow | 43 | 2 | 0 | Yes | No |
| 17163743 | ENHANCED AUTHENTICATION FRAMEWORK USING EPROM GRID PATTERN RECOGNITION | February 2021 | February 2024 | Allow | 36 | 3 | 0 | Yes | No |
| 17264185 | METHODS, APPARATUSES, COMPUTER READABLE MEDIA AND COMPUTER PROGRAMS FOR PERFORMING ADMISSION CONTROL FOR LIMITED ACCESS SERVICE | January 2021 | July 2024 | Allow | 42 | 2 | 0 | Yes | No |
| 17253614 | LINKING A TERMINAL INTO AN INTERCONNECTABLE COMPUTER INFRASTRUCTURE | December 2020 | November 2021 | Allow | 11 | 0 | 0 | Yes | No |
| 17069376 | SYSTEMS AND METHODS FOR DYNAMIC GRANULAR ACCESS PERMISSIONS | October 2020 | September 2023 | Allow | 35 | 3 | 0 | Yes | No |
| 17036767 | COMPUTER-READABLE RECORDING MEDIUM, CONTROL APPARATUS, AND METHOD FOR IDENTITY VERIFICATION | September 2020 | March 2024 | Abandon | 42 | 2 | 0 | Yes | No |
| 17016689 | SYSTEM AND METHOD FOR SECURING A CONTENT CREATION DEVICE CONNECTED TO A CLOUD SERVICE | September 2020 | December 2022 | Allow | 27 | 2 | 0 | Yes | No |
| 17001896 | SYSTEMS AND METHODS FOR ESTABLISHING SECURE COMMUNICATION IN AN ELECTRIC POWER DISTRIBUTION SYSTEM | August 2020 | April 2024 | Allow | 43 | 2 | 0 | No | Yes |
| 16994099 | METHODS AND APPARATUS FOR AUTOMATIC CONFIGURATION OF A CONTAINERIZED COMPUTING NAMESPACE | August 2020 | September 2024 | Allow | 50 | 4 | 0 | Yes | No |
| 16944044 | FACTOR AUTHENTICATION FOR ROBOTIC PROCESSES | July 2020 | March 2023 | Allow | 32 | 4 | 0 | Yes | No |
| 16930421 | METHOD AND SYSTEM FOR INITIATING A TRANSFER OF RESOURCES | July 2020 | July 2022 | Allow | 24 | 2 | 0 | Yes | No |
| 16957693 | CREDENTIAL DEPENDENCY ENCODING AND VERIFICATION BASED ON OTHER CREDENTIAL RESOURCES | June 2020 | April 2024 | Allow | 46 | 3 | 0 | Yes | No |
| 16771962 | INFORMATION PROCESSING SYSTEM, NODE, AUTHENTICATION METHOD, AND RECORDING MEDIUM WHEREON PROGRAM FOR SAME HAS BEEN RECORDED | June 2020 | March 2023 | Abandon | 33 | 2 | 0 | Yes | No |
| 16891159 | STORAGE MEDIUM, COMMUNICATION METHOD, AND COMMUNICATION DEVICE | June 2020 | January 2023 | Allow | 32 | 2 | 0 | No | No |
| 16861934 | Methods, Systems, and Electronic Devices for Selective Locational Preclusion of Access to Content | April 2020 | December 2024 | Abandon | 56 | 6 | 0 | No | No |
| 16831494 | SYSTEMS AND METHODS FOR FACILITATING POLICY-COMPLIANT END-TO-END ENCRYPTION FOR INDIVIDUALS BETWEEN ORGANIZATIONS | March 2020 | August 2023 | Allow | 41 | 1 | 0 | No | No |
| 16822557 | METHOD AND DEVICE FOR PROVIDING AUTHENTICATION IN NETWORK-BASED MEDIA PROCESSING (NBMP) SYSTEM | March 2020 | September 2023 | Abandon | 42 | 4 | 0 | Yes | No |
| 16820294 | ACCESS TOKEN FOR A VERIFIABLE CLAIM | March 2020 | June 2023 | Abandon | 39 | 4 | 0 | Yes | No |
| 16811877 | DEVICES, SYSTEMS, AND METHODS FOR CONTROLLING USER RIGHTS IN ELECTRICAL APPLIANCES | March 2020 | January 2024 | Allow | 46 | 3 | 1 | Yes | No |
| 16801694 | ENTERPRISE ACCESS MANAGEMENT SYSTEM FOR EXTERNAL SERVICE PROVIDERS | February 2020 | April 2023 | Allow | 38 | 2 | 0 | Yes | No |
| 16799511 | AUTHENTICATING DEVICES TO A NETWORK | February 2020 | March 2021 | Allow | 12 | 1 | 0 | Yes | No |
| 16792414 | Distributed cloud-based security systems and methods | February 2020 | May 2022 | Allow | 27 | 4 | 0 | Yes | No |
| 16791761 | SECURE GROUP FILE SHARING | February 2020 | August 2022 | Allow | 30 | 2 | 0 | Yes | No |
| 16790378 | Translation of Client Certificate Authentication into Authorization Graph Descriptors | February 2020 | July 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16783585 | UNIQUE IDENTIFICATION OF CUSTOMER USING AN IMAGE | February 2020 | March 2022 | Allow | 26 | 2 | 0 | Yes | No |
| 16776227 | SYSTEMS AND METHODS FOR ACCESS CONTROL TO RESOURCES VIA TOKENIZATION | January 2020 | September 2022 | Abandon | 31 | 2 | 0 | Yes | No |
| 16774305 | CYBER PHYSICAL ATTACK DETECTION | January 2020 | October 2020 | Allow | 9 | 0 | 0 | Yes | No |
| 16775157 | DATA PROCESSING METHOD AND APPARATUS | January 2020 | December 2022 | Allow | 34 | 2 | 0 | Yes | Yes |
| 16752034 | APPLICATION OF COMPUTER VISUAL CLASSIFICATION TO SECURITY EVENTS | January 2020 | September 2021 | Allow | 19 | 3 | 0 | Yes | Yes |
| 16749182 | METHOD TO BIND A USER AND ITS DEVICES: CONTEXT FUSION | January 2020 | January 2025 | Abandon | 60 | 4 | 0 | Yes | Yes |
| 16738647 | DEPLOYMENT OF A DEVICE | January 2020 | May 2022 | Allow | 28 | 2 | 0 | Yes | No |
| 16712747 | MAINTAINING DUAL-PARTY AUTHENTICATION REQUIREMENTS FOR DATA RETENTION COMPLIANCE WITHIN A DISTRIBUTED SERVER ENVIRONMENT | December 2019 | November 2022 | Allow | 35 | 0 | 0 | Yes | No |
| 16710303 | Website Verification Service | December 2019 | September 2022 | Allow | 33 | 1 | 0 | Yes | No |
| 16707639 | NETWORK INFRASTRUCTURE DETECTION | December 2019 | May 2023 | Allow | 41 | 2 | 0 | Yes | No |
| 16691880 | SECURE AUDIO TRANSCRIPTION | November 2019 | January 2024 | Allow | 49 | 4 | 0 | Yes | No |
| 16692235 | Bulk Multifactor Authentication Enrollment | November 2019 | November 2022 | Allow | 36 | 2 | 0 | Yes | No |
| 16692906 | SIGNATURE GENERATION AND VERIFICATION SYSTEM | November 2019 | March 2022 | Allow | 28 | 0 | 0 | Yes | No |
| 16599569 | IMPLEMENTING ACCESS CONTROL BY SYSTEM-ON-CHIP | October 2019 | June 2023 | Abandon | 45 | 2 | 0 | No | Yes |
| 16500080 | SYSTEM AND METHOD FOR NETWORK DEVICE SECURITY AND TRUST SCORE DETERMINATIONS | October 2019 | June 2022 | Allow | 32 | 2 | 0 | Yes | No |
| 16588980 | USING A CERTIFICATE-BASED PROTOCOL TO ENFORCE COMPLIANCE OF DEVICES WITH SPECIFICATIONS | September 2019 | October 2024 | Allow | 60 | 8 | 0 | Yes | No |
| 16579790 | ASSURING TRANSACTION INTEGRITY ON A NETWORK | September 2019 | February 2020 | Allow | 4 | 0 | 0 | Yes | No |
| 16575438 | METHOD FOR AUTHENTICATION WITH IDENTITY PROVIDERS | September 2019 | May 2025 | Allow | 60 | 6 | 0 | Yes | Yes |
| 16570863 | EVENT BASED TRANSFER OF DID DELEGATED AUTHORITY | September 2019 | August 2022 | Allow | 35 | 3 | 0 | Yes | No |
| 16558168 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | September 2019 | December 2022 | Allow | 39 | 3 | 0 | Yes | No |
| 16602219 | Confidence broker system | August 2019 | March 2022 | Allow | 31 | 1 | 0 | Yes | No |
| 16539082 | SYSTEMS AND METHODS FOR DYNAMIC GRANULAR ACCESS PERMISSIONS | August 2019 | July 2020 | Allow | 11 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LE, CANH.
With a 45.9% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 38.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LE, CANH works in Art Unit 2439 and has examined 488 patent applications in our dataset. With an allowance rate of 68.4%, this examiner allows applications at a lower rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 41 months.
Examiner LE, CANH's allowance rate of 68.4% places them in the 22% percentile among all USPTO examiners. This examiner is less likely to allow applications than most examiners at the USPTO.
On average, applications examined by LE, CANH receive 3.01 office actions before reaching final disposition. This places the examiner in the 95% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by LE, CANH is 41 months. This places the examiner in the 6% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.
Conducting an examiner interview provides a +72.4% benefit to allowance rate for applications examined by LE, CANH. This interview benefit is in the 99% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 19.9% of applications are subsequently allowed. This success rate is in the 13% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.
This examiner enters after-final amendments leading to allowance in 28.2% of cases where such amendments are filed. This entry rate is in the 32% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 34.6% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 32% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 59.3% of appeals filed. This is in the 29% percentile among all examiners. Of these withdrawals, 33.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 44.3% are granted (fully or in part). This grant rate is in the 48% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 2.0% of allowed cases (in the 77% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 16% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.