Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18634920 | STATELESS SYSTEM TO ENABLE DATA BREACH LOOKUP | April 2024 | October 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18406488 | SYSTEMS AND METHODS FOR IMAGE ENCRYPTION | January 2024 | March 2025 | Allow | 14 | 3 | 0 | Yes | No |
| 18367943 | APPARATUS AND METHODS RELYING ON NON-FLASHABLE CIRCUITRY FOR IMPROVING SECURITY FOR A SYSTEM CONNECTED TO A PUBLIC OR PRIVATE NETWORK | September 2023 | October 2024 | Allow | 13 | 2 | 0 | Yes | No |
| 18328718 | Application Gateway Architecture with Multi-Level Security Policy and Rule Promulgations | June 2023 | March 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18189744 | SYSTEM AND METHOD FOR A MACHINE-LEARNING ADAPTIVE PERMISSION REDUCTION ENGINE | March 2023 | June 2024 | Abandon | 14 | 2 | 0 | Yes | No |
| 17983033 | SYSTEM FOR VERIFYING DIGITAL REPRESENTATION OF OBJECTS AND EVENTS | November 2022 | March 2024 | Abandon | 16 | 2 | 0 | Yes | No |
| 17875562 | SYSTEMS AND METHODS FOR MONITORING ANOMALOUS MESSAGES BASED ON RELEVANCE TO A PROCESS | July 2022 | June 2025 | Abandon | 34 | 1 | 0 | No | No |
| 17875045 | SECURE EMBEDDED WEB BROWSER | July 2022 | February 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17863529 | SAFETY ISOLATION METHOD AND APPARATUS, AND COMPUTER SYSTEM | July 2022 | July 2025 | Allow | 36 | 2 | 0 | Yes | No |
| 17861215 | SYSTEMS AND METHODS FOR CREATING RULES BASED ON SECURITY POLICIES | July 2022 | February 2025 | Abandon | 31 | 1 | 0 | No | No |
| 17789246 | SECURE COMMUNICATION METHOD | June 2022 | September 2024 | Abandon | 27 | 1 | 0 | No | No |
| 17806411 | DEVICE-BASED IDENTIFICATION FOR AUTOMATED USER DETECTION | June 2022 | September 2024 | Allow | 27 | 3 | 0 | Yes | No |
| 17828072 | SYSTEMS AND METHODS FOR ASSIGNING SECURITY POLICIES TO FILES AND/OR RECORDS | May 2022 | February 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17741547 | SYSTEMS AND METHODS FOR DELEGATING ACCESS TO A PROTECTED RESOURCE | May 2022 | June 2025 | Abandon | 37 | 2 | 0 | No | Yes |
| 17707918 | System and Method for Authenticating Users Using Weak Authentication Techniques, With Differences For Different Features | March 2022 | June 2024 | Allow | 27 | 2 | 0 | Yes | No |
| 17687757 | SYSTEMS AND METHODS FOR SECURING FILES AND/OR RECORDS RELATED TO A BUSINESS PROCESS | March 2022 | February 2024 | Allow | 23 | 5 | 0 | Yes | No |
| 17576229 | USER AUTHENTICATION SYSTEMS AND METHODS | January 2022 | October 2023 | Allow | 21 | 1 | 0 | Yes | No |
| 17646632 | SECURE FORWARDING OF TENANT WORKLOADS IN VIRTUAL NETWORKS | December 2021 | May 2024 | Abandon | 29 | 2 | 0 | Yes | No |
| 17565853 | DIGITAL PROCESSING SYSTEMS AND METHODS FOR GRANULAR PERMISSION SYSTEM FOR ELECTRONIC DOCUMENTS IN COLLABORATIVE WORK SYSTEMS | December 2021 | March 2023 | Allow | 14 | 2 | 0 | No | No |
| 17551846 | Transmission of Sensitive Data in a Communication Network | December 2021 | February 2025 | Allow | 38 | 2 | 0 | No | No |
| 17618522 | METHOD FOR THE EXECUTION OF AN INSTANCE OF A SMART CONTRACT BY MEANS OF A BLOCKCHAIN | December 2021 | February 2024 | Allow | 26 | 4 | 0 | Yes | No |
| 16980352 | DIGITAL METHOD FOR CONTROLLING ACCESS TO AN OBJECT, A RESOURCE OR SERVICE BY A USER | October 2021 | May 2024 | Abandon | 44 | 1 | 0 | No | No |
| 17494907 | SYSTEM AND METHODS FOR INTELLIGENT ENTITY-WIDE DATA PROTECTION | October 2021 | December 2024 | Allow | 38 | 2 | 0 | No | No |
| 17600613 | DATA MANAGEMENT SYSTEM, DATA MANAGEMENT METHOD, AND PROGRAM | October 2021 | December 2022 | Abandon | 14 | 2 | 0 | Yes | No |
| 17491371 | SECURE COMMUNICATION LINK ESTABLISHMENT FOR A UE-TO-UE RELAY | September 2021 | May 2025 | Allow | 44 | 4 | 0 | Yes | No |
| 17488175 | DELEGATED SIGNING USING SENSITIVITY CLASSIFICATION | September 2021 | December 2024 | Allow | 39 | 2 | 0 | Yes | No |
| 17464539 | EXTENDED REALITY CONTROL OF SMART DEVICES | September 2021 | April 2025 | Allow | 44 | 3 | 0 | Yes | No |
| 17393603 | WIRELESS BASED METHODS AND SYSTEMS FOR FEDERATED KEY MANAGEMENT, ASSET MANAGEMENT, AND FINANCIAL TRANSACTIONS | August 2021 | June 2025 | Abandon | 46 | 3 | 1 | No | No |
| 17392131 | SYSTEM AND METHOD FOR GEOFENCING | August 2021 | April 2024 | Allow | 32 | 4 | 0 | Yes | No |
| 17392114 | APPLICATION GATEWAY ARCHITECTURE WITH MULTI-LEVEL SECURITY POLICY AND RULE PROMULGATIONS | August 2021 | February 2023 | Allow | 19 | 1 | 0 | Yes | No |
| 17392118 | SYSTEM AND METHOD FOR REMOTE WIPE | August 2021 | March 2024 | Allow | 32 | 4 | 0 | Yes | No |
| 17364658 | DATA PROCESSING METHODS, APPARATUSES, AND DEVICES | June 2021 | July 2022 | Allow | 12 | 2 | 0 | Yes | No |
| 17339723 | SYNCHRONIZED DATABASE AUTHORIZATION AUTOMATION | June 2021 | August 2022 | Abandon | 14 | 2 | 0 | Yes | No |
| 17178256 | METHOD AND SYSTEM FOR AGGREGATING USERS' CONSENT | February 2021 | February 2023 | Allow | 24 | 3 | 0 | Yes | No |
| 17158556 | SIGNAL OF RISK ACCESS CONTROL | January 2021 | May 2025 | Abandon | 52 | 6 | 0 | No | No |
| 17154016 | TIMING FOR USER DATA ERASURE REQUESTS | January 2021 | January 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17147941 | CONTROL METHOD, CONTENTS MANAGEMENT SYSTEM, RECORDING MEDIUM, AND DATA STRUCTURE | January 2021 | January 2025 | Allow | 49 | 3 | 0 | Yes | No |
| 17123779 | ACCESS CONTROL FOR A DATA OBJECT INCLUDING DATA WITH DIFFERENT ACCESS REQUIREMENTS | December 2020 | January 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17059139 | PROTECTING DEVICE AND PROTECTING METHOD | November 2020 | October 2024 | Allow | 47 | 3 | 0 | Yes | No |
| 17088389 | MANAGING BLOCKCHAIN ACCESS | November 2020 | October 2022 | Allow | 23 | 0 | 0 | Yes | No |
| 17052413 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM | November 2020 | June 2024 | Abandon | 43 | 2 | 0 | No | No |
| 17070348 | CONDITIONAL PROVISION OF ACCESS BY INTERACTIVE ASSISTANT MODULES | October 2020 | January 2025 | Abandon | 51 | 5 | 0 | Yes | No |
| 17046721 | DEEP LINK AUTHENTICATION | October 2020 | March 2025 | Allow | 53 | 2 | 0 | Yes | No |
| 17066447 | UNIFIED VIEWING OF ROLES AND PERMISSIONS IN A COMPUTER DATA PROCESSING SYSTEM | October 2020 | October 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16978774 | External Terminal Protection Device and Protection System for Data Flow Control | September 2020 | September 2021 | Allow | 13 | 2 | 0 | Yes | No |
| 16941382 | SELECTIVELY GRANTING COMPUTER SYSTEM ACCESS CREDENTIALS TO EXTERNAL USERS AND NON-USERS | July 2020 | November 2024 | Allow | 51 | 5 | 0 | Yes | No |
| 16965259 | Apparatus and method for data obfuscation of IoT device using pseudorandom number | July 2020 | November 2023 | Abandon | 39 | 1 | 0 | No | No |
| 16904937 | METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATION AMONG CONSTRAINED DEVICES | June 2020 | April 2021 | Allow | 10 | 1 | 0 | Yes | No |
| 16901622 | USER AUTHENTICATION | June 2020 | May 2024 | Allow | 47 | 3 | 0 | Yes | Yes |
| 16868578 | METHOD FOR IMPROVING CONFIDENTIALITY PROTECTION OF NEURAL NETWORK MODEL | May 2020 | March 2024 | Abandon | 46 | 3 | 0 | No | No |
| 16838188 | SYSTEMS AND METHODS FOR IMPLEMENTING AN INTERACTIVE CONTRACTOR DASHBOARD | April 2020 | March 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16835928 | CONTEXT BASED DATA LEAK PREVENTION OF SENSITIVE INFORMATION | March 2020 | June 2023 | Abandon | 39 | 2 | 1 | Yes | No |
| 16650890 | Operation of an Electronic Device during Maintenance | March 2020 | February 2024 | Abandon | 47 | 4 | 0 | No | No |
| 16831409 | Securing PIN Information Using Obfuscation by Applying Extra Security Layer | March 2020 | August 2023 | Allow | 41 | 3 | 0 | Yes | No |
| 16829183 | DATA SCRAMBLER FOR MEMORY SYSTEMS AND METHOD THEREOF | March 2020 | March 2024 | Abandon | 48 | 5 | 0 | Yes | No |
| 16822154 | METHOD FOR ERASING INFORMATION FROM ELECTRONIC SCRAP BASED ON DUAL-SECURITY MECHANISM | March 2020 | August 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16796850 | METHOD AND APPARATUS FOR MANAGING DATA IN A CONTENT MANAGEMENT SYSTEM | February 2020 | March 2024 | Abandon | 48 | 4 | 0 | No | No |
| 16778934 | DATA MANAGEMENT SYSTEMS AND METHODS | January 2020 | December 2022 | Allow | 35 | 2 | 0 | Yes | No |
| 16779328 | CREATING A BLOCKCHAIN ACCOUNT AND VERIFYING BLOCKCHAIN TRANSACTIONS | January 2020 | June 2021 | Allow | 16 | 3 | 0 | Yes | No |
| 16632118 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM | January 2020 | March 2023 | Abandon | 37 | 2 | 0 | No | No |
| 16745380 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM | January 2020 | August 2023 | Abandon | 43 | 4 | 0 | Yes | No |
| 16629298 | METHOD FOR SETTING APPROVAL PROCEDURE BASED ON BASE FIELDS | January 2020 | June 2025 | Abandon | 60 | 5 | 0 | No | No |
| 16625183 | Method for Securing Data Utilizing Microshard Fragmentation | December 2019 | May 2023 | Allow | 41 | 3 | 0 | Yes | No |
| 16708157 | EFFICIENT DETECTION OF IN-MEMORY DATA ACCESSES AND CONTEXT INFORMATION | December 2019 | May 2024 | Allow | 53 | 5 | 0 | Yes | No |
| 16684660 | DEFEATING SOLUTION TO PHISHING ATTACKS THROUGH COUNTER CHALLENGE AUTHENTICATION | November 2019 | November 2020 | Allow | 12 | 3 | 0 | Yes | No |
| 16662803 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF | October 2019 | November 2023 | Abandon | 48 | 6 | 0 | No | No |
| 16662325 | EMAIL SECURITY IN A MULTI-TENANT EMAIL SERVICE | October 2019 | January 2022 | Allow | 27 | 0 | 0 | Yes | No |
| 16661933 | Anomaly Based Malware Detection | October 2019 | August 2021 | Allow | 22 | 3 | 0 | Yes | No |
| 16655680 | VOICE ENCRYPTION DEVICE AND SYSTEM FOR SECURING VOICE COMMUNICATION | October 2019 | August 2022 | Abandon | 34 | 1 | 0 | No | No |
| 16654418 | ACCESS TO A SERVICE | October 2019 | March 2023 | Abandon | 41 | 5 | 0 | Yes | No |
| 16655071 | INTEGRATED BEHAVIOR-BASED INFRASTRUCTURE COMMAND VALIDATION | October 2019 | March 2023 | Allow | 41 | 2 | 0 | Yes | No |
| 16654867 | SYSTEMS AND METHODS FOR PREVENTING REPLAY ATTACKS | October 2019 | December 2021 | Allow | 26 | 2 | 0 | Yes | No |
| 16653350 | POINT AND CLICK AUTHENTICATION | October 2019 | June 2021 | Allow | 20 | 2 | 0 | Yes | No |
| 16592206 | SYSTEM AND METHOD OF SECURING ACCESS TO A SECURE REMOTE SERVER AND DATABASE ON A MOBILE DEVICE | October 2019 | December 2022 | Allow | 38 | 3 | 0 | Yes | No |
| 16587522 | DIFFERENTIATED FILE PERMISSIONS FOR CONTAINER USERS | September 2019 | September 2023 | Allow | 48 | 4 | 0 | Yes | No |
| 16519361 | SYSTEM AND METHOD FOR VALIDATING AUTHORSHIP OF AN ELECTRONIC SIGNATURE SESSION | July 2019 | March 2023 | Allow | 44 | 4 | 0 | Yes | No |
| 16516117 | DETECTING ATTEMPTS TO DEFEAT FACIAL RECOGNITION | July 2019 | May 2022 | Allow | 34 | 1 | 0 | Yes | Yes |
| 16513164 | CLOUD-BASED DATA ACCESS CONTROL | July 2019 | November 2022 | Abandon | 40 | 2 | 0 | No | No |
| 16429107 | METHOD AND SYSTEM FOR AGGREGATING USERS' CONSENT | June 2019 | May 2023 | Abandon | 48 | 3 | 0 | No | No |
| 16401588 | SECURE EXECUTION OF ENTERPRISE APPLICATIONS ON MOBILE DEVICES | May 2019 | May 2021 | Allow | 24 | 4 | 0 | Yes | No |
| 16377376 | DATABASE WITH SECURITY ROW TABLES | April 2019 | February 2023 | Abandon | 47 | 4 | 0 | Yes | No |
| 16371812 | SYSTEM AND METHOD FOR UPDATING DOWNLOADED APPLICATIONS USING MANAGED CONTAINER | April 2019 | August 2020 | Abandon | 17 | 2 | 0 | No | No |
| 16360165 | MANAGING ACCESS TO PROTECTED DATA FILE CONTENT | March 2019 | December 2022 | Allow | 45 | 3 | 0 | Yes | No |
| 16299404 | Configurable Feature Level Controls for Data | March 2019 | June 2022 | Allow | 39 | 2 | 0 | Yes | No |
| 16286979 | METHODS AND SYSTEMS FOR EXTENDING ROW-LEVEL SECURITY POLICIES | February 2019 | June 2024 | Allow | 60 | 6 | 0 | Yes | No |
| 16286240 | HYBRID ACCESS CONTROL MODEL IN COMPUTER SYSTEMS | February 2019 | February 2023 | Allow | 48 | 4 | 0 | Yes | No |
| 16221853 | VIDEO CODING USING CONSTRUCTED REFERENCE FRAMES | December 2018 | February 2022 | Allow | 38 | 2 | 0 | No | No |
| 16204350 | SECURE MULTIFACTOR AUTHENTICATION WITH PUSH AUTHENTICATION | November 2018 | July 2022 | Allow | 44 | 3 | 0 | Yes | No |
| 16200103 | SELECTIVE GENERATION OF SECURE SIGNATURES IN A DISTRIBUTED STORAGE NETWORK | November 2018 | December 2021 | Allow | 37 | 2 | 0 | Yes | No |
| 16195392 | SYSTEM AND METHOD FOR REMOTE WIPE | November 2018 | May 2021 | Allow | 30 | 3 | 0 | Yes | No |
| 16149348 | SYSTEM AND METHOD FOR GEOFENCING | October 2018 | June 2021 | Allow | 33 | 3 | 0 | Yes | No |
| 16146713 | SECURE FORWARDING OF TENANT WORKLOADS IN VIRTUAL NETWORKS | September 2018 | September 2021 | Allow | 36 | 2 | 0 | Yes | No |
| 16146892 | DIRECTORY ACCESS SHARING ACROSS WEB SERVICES ACCOUNTS | September 2018 | April 2021 | Allow | 31 | 1 | 0 | Yes | No |
| 16147014 | PRIVACY PRESERVING SECURE TASK AUTOMATION | September 2018 | July 2021 | Allow | 34 | 1 | 0 | Yes | No |
| 16143781 | SYSTEMS AND METHODS FOR DELEGATING ACCESS TO A PROTECTED RESOURCE | September 2018 | February 2022 | Allow | 41 | 3 | 0 | Yes | No |
| 16143669 | DEVICE AND METHOD FOR RECEIVING A TEMPORARY CREDIT TOKEN | September 2018 | April 2022 | Allow | 43 | 4 | 0 | Yes | No |
| 16144317 | ENCRYPTION OF KEYBOARD DATA TO AVOID BEING READ BY ENDPOINT-HOSTED KEYLOGGER APPLICATIONS | September 2018 | May 2022 | Allow | 43 | 4 | 0 | Yes | No |
| 16143798 | VISUAL TOKEN PASSWORDS | September 2018 | February 2023 | Allow | 52 | 2 | 0 | Yes | Yes |
| 16136499 | LOGIN PROCESS FOR MOBILE PHONES, TABLETS AND OTHER TYPES OF TOUCH SCREEN DEVICES OR COMPUTERS | September 2018 | October 2020 | Allow | 25 | 1 | 0 | No | No |
| 16121504 | USER AUTHENTICATION SYSTEMS AND METHODS | September 2018 | December 2021 | Allow | 39 | 2 | 0 | No | Yes |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner MALINOWSKI, WALTER J.
With a 33.3% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 25.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner MALINOWSKI, WALTER J works in Art Unit 2439 and has examined 219 patent applications in our dataset. With an allowance rate of 68.5%, this examiner allows applications at a lower rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 37 months.
Examiner MALINOWSKI, WALTER J's allowance rate of 68.5% places them in the 23% percentile among all USPTO examiners. This examiner is less likely to allow applications than most examiners at the USPTO.
On average, applications examined by MALINOWSKI, WALTER J receive 3.27 office actions before reaching final disposition. This places the examiner in the 98% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by MALINOWSKI, WALTER J is 37 months. This places the examiner in the 14% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.
Conducting an examiner interview provides a +57.4% benefit to allowance rate for applications examined by MALINOWSKI, WALTER J. This interview benefit is in the 96% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 23.3% of applications are subsequently allowed. This success rate is in the 23% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.
This examiner enters after-final amendments leading to allowance in 17.4% of cases where such amendments are filed. This entry rate is in the 13% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 47.1% of appeals filed. This is in the 9% percentile among all examiners. Of these withdrawals, 6.2% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 42.9% are granted (fully or in part). This grant rate is in the 45% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 16% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.