Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19259636 | ADAPTIVE SELECTION OF SECURITY SCANNING IN SOFTWARE DEPLOYMENTS | July 2025 | January 2026 | Allow | 6 | 1 | 0 | Yes | No |
| 19184730 | SYSTEMATIC SECURITY PROTECTION METHOD FOR MULTIMODAL AI MODEL, APPARATUS AND DEVICE | April 2025 | October 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19094557 | ANALYZING INDIVIDUAL INFORMATION FROM MULTI-DATABASE SYSTEM | March 2025 | February 2026 | Allow | 10 | 2 | 0 | Yes | No |
| 19067938 | Multimodal Digital Document Interfaces for Dynamic and Collaborative Reviews | March 2025 | October 2025 | Allow | 7 | 2 | 0 | Yes | No |
| 18634920 | STATELESS SYSTEM TO ENABLE DATA BREACH LOOKUP | April 2024 | October 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18406488 | SYSTEMS AND METHODS FOR IMAGE ENCRYPTION | January 2024 | March 2025 | Allow | 14 | 3 | 0 | Yes | No |
| 18573476 | CHECKING A LICENSE FOR THE USAGE OF AT LEAST ONE PERFORMANCE PROPERTY IN AN INTERNET-OF-THINGS (IOT) DEVICE | December 2023 | July 2025 | Allow | 19 | 3 | 0 | Yes | No |
| 18393407 | METHODS FOR IMPROVING WEB SCANNER ACCURACY AND DEVICES THEREOF | December 2023 | September 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18531369 | SYSTEMS AND METHODS FOR STORING AND RETRIEVING PUBLIC DATA | December 2023 | March 2026 | Allow | 27 | 1 | 0 | Yes | No |
| 18385293 | SYSTEM AND METHOD FOR VALIDATING AUTHORSHIP OF AN ELECTRONIC SIGNATURE SESSION | October 2023 | September 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18367943 | APPARATUS AND METHODS RELYING ON NON-FLASHABLE CIRCUITRY FOR IMPROVING SECURITY FOR A SYSTEM CONNECTED TO A PUBLIC OR PRIVATE NETWORK | September 2023 | October 2024 | Allow | 13 | 2 | 0 | Yes | No |
| 18362244 | SECURE CONTACT TRACING BETWEEN COMPUTING DEVICES | July 2023 | February 2026 | Allow | 31 | 1 | 0 | Yes | No |
| 18354342 | METHOD FOR SECURING DATA UTILIZING MICROSHARD FRAGMENTATION | July 2023 | October 2025 | Abandon | 27 | 1 | 0 | No | No |
| 18328718 | Application Gateway Architecture with Multi-Level Security Policy and Rule Promulgations | June 2023 | March 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18189744 | SYSTEM AND METHOD FOR A MACHINE-LEARNING ADAPTIVE PERMISSION REDUCTION ENGINE | March 2023 | June 2024 | Abandon | 14 | 2 | 0 | Yes | No |
| 18125707 | DATA MANAGEMENT SYSTEMS AND METHODS | March 2023 | August 2025 | Allow | 29 | 2 | 0 | No | No |
| 18160801 | SYSTEMS AND METHODS FOR MANAGING DATABASE-LEVEL ROLES FOR DATA SHARING | January 2023 | November 2025 | Allow | 34 | 6 | 0 | Yes | No |
| 18154404 | LINE ENCRYPTION OVER ETHERNET CABLE | January 2023 | March 2026 | Allow | 38 | 3 | 0 | Yes | No |
| 18090704 | INFORMATION PROCESSING METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM | December 2022 | November 2025 | Abandon | 34 | 6 | 0 | Yes | No |
| 18067238 | DATA PROTECTION USING PORTABLE DATA STRUCTURES | December 2022 | November 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 18076678 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING INFORMATION RELATED TO USER EQUIPMENT IN WIRELESS COMMUNICATION SYSTEM | December 2022 | February 2026 | Abandon | 39 | 3 | 0 | No | No |
| 17993994 | INFORMATION PROCESSING DEVICE, CONFIDENTIALITY LEVEL DETERMINATION PROGRAM, AND METHOD | November 2022 | February 2026 | Abandon | 39 | 2 | 0 | No | No |
| 17983033 | SYSTEM FOR VERIFYING DIGITAL REPRESENTATION OF OBJECTS AND EVENTS | November 2022 | March 2024 | Abandon | 16 | 2 | 0 | Yes | No |
| 17935168 | SYSTEMS AND METHODS FOR SECURE FIRMWARE UPDATES | September 2022 | February 2026 | Allow | 41 | 3 | 0 | Yes | No |
| 17931668 | DETECTING ATTEMPTS TO DEFEAT FACIAL RECOGNITION | September 2022 | September 2025 | Allow | 36 | 3 | 0 | Yes | No |
| 17887656 | ONLINE DOCUMENT DISPLAY METHOD AND APPARATUS, DEVICE AND MEDIUM | August 2022 | October 2025 | Abandon | 38 | 6 | 0 | No | No |
| 17877692 | PERMISSION CONTROL METHOD AND DEVICE AND ELECTRONIC EQUIPMENT | July 2022 | January 2026 | Allow | 42 | 7 | 0 | Yes | No |
| 17875562 | SYSTEMS AND METHODS FOR MONITORING ANOMALOUS MESSAGES BASED ON RELEVANCE TO A PROCESS | July 2022 | June 2025 | Abandon | 34 | 1 | 0 | No | No |
| 17875045 | SECURE EMBEDDED WEB BROWSER | July 2022 | February 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17863529 | SAFETY ISOLATION METHOD AND APPARATUS, AND COMPUTER SYSTEM | July 2022 | July 2025 | Allow | 36 | 2 | 0 | Yes | No |
| 17861215 | SYSTEMS AND METHODS FOR CREATING RULES BASED ON SECURITY POLICIES | July 2022 | February 2025 | Abandon | 31 | 1 | 0 | No | No |
| 17789246 | SECURE COMMUNICATION METHOD | June 2022 | September 2024 | Abandon | 27 | 1 | 0 | No | No |
| 17806411 | DEVICE-BASED IDENTIFICATION FOR AUTOMATED USER DETECTION | June 2022 | September 2024 | Allow | 27 | 3 | 0 | Yes | No |
| 17828072 | SYSTEMS AND METHODS FOR ASSIGNING SECURITY POLICIES TO FILES AND/OR RECORDS | May 2022 | February 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17741547 | SYSTEMS AND METHODS FOR DELEGATING ACCESS TO A PROTECTED RESOURCE | May 2022 | June 2025 | Abandon | 37 | 2 | 0 | No | Yes |
| 17707918 | System and Method for Authenticating Users Using Weak Authentication Techniques, With Differences For Different Features | March 2022 | June 2024 | Allow | 27 | 2 | 0 | Yes | No |
| 17687757 | SYSTEMS AND METHODS FOR SECURING FILES AND/OR RECORDS RELATED TO A BUSINESS PROCESS | March 2022 | February 2024 | Allow | 23 | 5 | 0 | Yes | No |
| 17576229 | USER AUTHENTICATION SYSTEMS AND METHODS | January 2022 | October 2023 | Allow | 21 | 1 | 0 | Yes | No |
| 17575436 | ACCESS CONTROLS FOR EXTERNAL DATA RECORDS | January 2022 | August 2025 | Allow | 43 | 3 | 0 | Yes | No |
| 17646632 | SECURE FORWARDING OF TENANT WORKLOADS IN VIRTUAL NETWORKS | December 2021 | May 2024 | Abandon | 29 | 2 | 0 | Yes | No |
| 17565853 | DIGITAL PROCESSING SYSTEMS AND METHODS FOR GRANULAR PERMISSION SYSTEM FOR ELECTRONIC DOCUMENTS IN COLLABORATIVE WORK SYSTEMS | December 2021 | March 2023 | Allow | 14 | 2 | 0 | No | No |
| 17551846 | Transmission of Sensitive Data in a Communication Network | December 2021 | February 2025 | Allow | 38 | 2 | 0 | No | No |
| 17618522 | METHOD FOR THE EXECUTION OF AN INSTANCE OF A SMART CONTRACT BY MEANS OF A BLOCKCHAIN | December 2021 | February 2024 | Allow | 26 | 4 | 0 | Yes | No |
| 16980352 | DIGITAL METHOD FOR CONTROLLING ACCESS TO AN OBJECT, A RESOURCE OR SERVICE BY A USER | October 2021 | May 2024 | Abandon | 44 | 1 | 0 | No | No |
| 17494907 | SYSTEM AND METHODS FOR INTELLIGENT ENTITY-WIDE DATA PROTECTION | October 2021 | December 2024 | Allow | 38 | 2 | 0 | No | No |
| 17600613 | DATA MANAGEMENT SYSTEM, DATA MANAGEMENT METHOD, AND PROGRAM | October 2021 | December 2022 | Abandon | 14 | 2 | 0 | Yes | No |
| 17491371 | SECURE COMMUNICATION LINK ESTABLISHMENT FOR A UE-TO-UE RELAY | September 2021 | May 2025 | Allow | 44 | 4 | 0 | Yes | No |
| 17488175 | DELEGATED SIGNING USING SENSITIVITY CLASSIFICATION | September 2021 | December 2024 | Allow | 39 | 2 | 0 | Yes | No |
| 17464539 | EXTENDED REALITY CONTROL OF SMART DEVICES | September 2021 | April 2025 | Allow | 44 | 3 | 0 | Yes | No |
| 17393603 | WIRELESS BASED METHODS AND SYSTEMS FOR FEDERATED KEY MANAGEMENT, ASSET MANAGEMENT, AND FINANCIAL TRANSACTIONS | August 2021 | June 2025 | Abandon | 46 | 3 | 1 | No | No |
| 17392131 | SYSTEM AND METHOD FOR GEOFENCING | August 2021 | April 2024 | Allow | 32 | 4 | 0 | Yes | No |
| 17392114 | APPLICATION GATEWAY ARCHITECTURE WITH MULTI-LEVEL SECURITY POLICY AND RULE PROMULGATIONS | August 2021 | February 2023 | Allow | 19 | 1 | 0 | Yes | No |
| 17392118 | SYSTEM AND METHOD FOR REMOTE WIPE | August 2021 | March 2024 | Allow | 32 | 4 | 0 | Yes | No |
| 17364658 | DATA PROCESSING METHODS, APPARATUSES, AND DEVICES | June 2021 | July 2022 | Allow | 12 | 2 | 0 | Yes | No |
| 17339723 | SYNCHRONIZED DATABASE AUTHORIZATION AUTOMATION | June 2021 | August 2022 | Abandon | 14 | 2 | 0 | Yes | No |
| 17178256 | METHOD AND SYSTEM FOR AGGREGATING USERS' CONSENT | February 2021 | February 2023 | Allow | 24 | 3 | 0 | Yes | No |
| 17158556 | SIGNAL OF RISK ACCESS CONTROL | January 2021 | May 2025 | Abandon | 52 | 6 | 0 | No | No |
| 17154016 | TIMING FOR USER DATA ERASURE REQUESTS | January 2021 | January 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17147941 | CONTROL METHOD, CONTENTS MANAGEMENT SYSTEM, RECORDING MEDIUM, AND DATA STRUCTURE | January 2021 | January 2025 | Allow | 49 | 3 | 0 | Yes | No |
| 17123779 | ACCESS CONTROL FOR A DATA OBJECT INCLUDING DATA WITH DIFFERENT ACCESS REQUIREMENTS | December 2020 | January 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17059139 | PROTECTING DEVICE AND PROTECTING METHOD | November 2020 | October 2024 | Allow | 47 | 3 | 0 | Yes | No |
| 16952987 | Repeatable NGAC Policy Class Structure | November 2020 | September 2025 | Allow | 58 | 4 | 0 | Yes | No |
| 17088389 | MANAGING BLOCKCHAIN ACCESS | November 2020 | October 2022 | Allow | 23 | 0 | 0 | Yes | No |
| 17052413 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM | November 2020 | June 2024 | Abandon | 43 | 2 | 0 | No | No |
| 17070348 | CONDITIONAL PROVISION OF ACCESS BY INTERACTIVE ASSISTANT MODULES | October 2020 | January 2025 | Abandon | 51 | 5 | 0 | Yes | No |
| 17046721 | DEEP LINK AUTHENTICATION | October 2020 | March 2025 | Allow | 53 | 2 | 0 | Yes | No |
| 17066447 | UNIFIED VIEWING OF ROLES AND PERMISSIONS IN A COMPUTER DATA PROCESSING SYSTEM | October 2020 | October 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16978774 | External Terminal Protection Device and Protection System for Data Flow Control | September 2020 | September 2021 | Allow | 13 | 2 | 0 | Yes | No |
| 16941382 | SELECTIVELY GRANTING COMPUTER SYSTEM ACCESS CREDENTIALS TO EXTERNAL USERS AND NON-USERS | July 2020 | November 2024 | Allow | 51 | 5 | 0 | Yes | No |
| 16965259 | Apparatus and method for data obfuscation of IoT device using pseudorandom number | July 2020 | November 2023 | Abandon | 39 | 1 | 0 | No | No |
| 16904937 | METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATION AMONG CONSTRAINED DEVICES | June 2020 | April 2021 | Allow | 10 | 1 | 0 | Yes | No |
| 16901622 | USER AUTHENTICATION | June 2020 | May 2024 | Allow | 47 | 3 | 0 | Yes | Yes |
| 16868578 | METHOD FOR IMPROVING CONFIDENTIALITY PROTECTION OF NEURAL NETWORK MODEL | May 2020 | March 2024 | Abandon | 46 | 3 | 0 | No | No |
| 16838188 | SYSTEMS AND METHODS FOR IMPLEMENTING AN INTERACTIVE CONTRACTOR DASHBOARD | April 2020 | March 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16835928 | CONTEXT BASED DATA LEAK PREVENTION OF SENSITIVE INFORMATION | March 2020 | June 2023 | Abandon | 39 | 2 | 1 | Yes | No |
| 16831409 | Securing PIN Information Using Obfuscation by Applying Extra Security Layer | March 2020 | August 2023 | Allow | 41 | 3 | 0 | Yes | No |
| 16650890 | Operation of an Electronic Device during Maintenance | March 2020 | February 2024 | Abandon | 47 | 4 | 0 | No | No |
| 16829183 | DATA SCRAMBLER FOR MEMORY SYSTEMS AND METHOD THEREOF | March 2020 | March 2024 | Abandon | 48 | 5 | 0 | Yes | No |
| 16822154 | METHOD FOR ERASING INFORMATION FROM ELECTRONIC SCRAP BASED ON DUAL-SECURITY MECHANISM | March 2020 | August 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16796850 | METHOD AND APPARATUS FOR MANAGING DATA IN A CONTENT MANAGEMENT SYSTEM | February 2020 | March 2024 | Abandon | 48 | 4 | 0 | No | No |
| 16779328 | CREATING A BLOCKCHAIN ACCOUNT AND VERIFYING BLOCKCHAIN TRANSACTIONS | January 2020 | June 2021 | Allow | 16 | 3 | 0 | Yes | No |
| 16778934 | DATA MANAGEMENT SYSTEMS AND METHODS | January 2020 | December 2022 | Allow | 35 | 2 | 0 | Yes | No |
| 16745380 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM | January 2020 | August 2023 | Abandon | 43 | 4 | 0 | Yes | No |
| 16632118 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM | January 2020 | March 2023 | Abandon | 37 | 2 | 0 | No | No |
| 16629298 | METHOD FOR SETTING APPROVAL PROCEDURE BASED ON BASE FIELDS | January 2020 | June 2025 | Abandon | 60 | 5 | 0 | No | No |
| 16625183 | Method for Securing Data Utilizing Microshard Fragmentation | December 2019 | May 2023 | Allow | 41 | 3 | 0 | Yes | No |
| 16708157 | EFFICIENT DETECTION OF IN-MEMORY DATA ACCESSES AND CONTEXT INFORMATION | December 2019 | May 2024 | Allow | 53 | 5 | 0 | Yes | No |
| 16684660 | DEFEATING SOLUTION TO PHISHING ATTACKS THROUGH COUNTER CHALLENGE AUTHENTICATION | November 2019 | November 2020 | Allow | 12 | 3 | 0 | Yes | No |
| 16662803 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF | October 2019 | November 2023 | Abandon | 48 | 6 | 0 | No | No |
| 16662325 | EMAIL SECURITY IN A MULTI-TENANT EMAIL SERVICE | October 2019 | January 2022 | Allow | 27 | 0 | 0 | Yes | No |
| 16661933 | Anomaly Based Malware Detection | October 2019 | August 2021 | Allow | 22 | 3 | 0 | Yes | No |
| 16655680 | VOICE ENCRYPTION DEVICE AND SYSTEM FOR SECURING VOICE COMMUNICATION | October 2019 | August 2022 | Abandon | 34 | 1 | 0 | No | No |
| 16655071 | INTEGRATED BEHAVIOR-BASED INFRASTRUCTURE COMMAND VALIDATION | October 2019 | March 2023 | Allow | 41 | 2 | 0 | Yes | No |
| 16654867 | SYSTEMS AND METHODS FOR PREVENTING REPLAY ATTACKS | October 2019 | December 2021 | Allow | 26 | 2 | 0 | Yes | No |
| 16654418 | ACCESS TO A SERVICE | October 2019 | March 2023 | Abandon | 41 | 5 | 0 | Yes | No |
| 16653350 | POINT AND CLICK AUTHENTICATION | October 2019 | June 2021 | Allow | 20 | 2 | 0 | Yes | No |
| 16592206 | SYSTEM AND METHOD OF SECURING ACCESS TO A SECURE REMOTE SERVER AND DATABASE ON A MOBILE DEVICE | October 2019 | December 2022 | Allow | 38 | 3 | 0 | Yes | No |
| 16587522 | DIFFERENTIATED FILE PERMISSIONS FOR CONTAINER USERS | September 2019 | September 2023 | Allow | 48 | 4 | 0 | Yes | No |
| 16519361 | SYSTEM AND METHOD FOR VALIDATING AUTHORSHIP OF AN ELECTRONIC SIGNATURE SESSION | July 2019 | March 2023 | Allow | 44 | 4 | 0 | Yes | No |
| 16516117 | DETECTING ATTEMPTS TO DEFEAT FACIAL RECOGNITION | July 2019 | May 2022 | Allow | 34 | 1 | 0 | Yes | Yes |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner MALINOWSKI, WALTER J.
With a 38.9% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 29.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner MALINOWSKI, WALTER J works in Art Unit 2439 and has examined 206 patent applications in our dataset. With an allowance rate of 69.9%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 38 months.
Examiner MALINOWSKI, WALTER J's allowance rate of 69.9% places them in the 32% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by MALINOWSKI, WALTER J receive 3.39 office actions before reaching final disposition. This places the examiner in the 93% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by MALINOWSKI, WALTER J is 38 months. This places the examiner in the 29% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +54.9% benefit to allowance rate for applications examined by MALINOWSKI, WALTER J. This interview benefit is in the 95% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 22.6% of applications are subsequently allowed. This success rate is in the 29% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 18.4% of cases where such amendments are filed. This entry rate is in the 22% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 8% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 48.6% of appeals filed. This is in the 14% percentile among all examiners. Of these withdrawals, 5.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 52.2% are granted (fully or in part). This grant rate is in the 52% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.