Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 17138030 | UNIFORM RESOURCE LOCATOR VALIDATION | December 2020 | February 2024 | Allow | 38 | 2 | 0 | Yes | No |
| 17136495 | TECHNIQUE FOR MODIFYING COMBINATION OF PLURALITY OF AUTHENTICATION APPARATUSES FORMING MUTAL AUTHENTICATION PAIRS | December 2020 | June 2022 | Allow | 18 | 0 | 0 | No | No |
| 17253059 | BLOCKCHAIN AND DNSSEC-BASED USER AUTHENTICATION METHOD, SYSTEM, DEVICE AND MEDIUM | December 2020 | February 2023 | Abandon | 26 | 2 | 0 | No | No |
| 17046780 | DIGITAL CERTIFICATE PROCESSING METHOD AND DEVICE, BLOCKCHAIN NODE AND STORAGE MEDIUM | October 2020 | November 2023 | Allow | 37 | 3 | 0 | Yes | No |
| 17034487 | APPLICATION SECURITY THROUGH DECEPTIVE AUTHENTICATION | September 2020 | January 2024 | Allow | 39 | 2 | 0 | Yes | No |
| 17031282 | DECENTRALIZED POLICY PUBLISH AND QUERY SYSTEM FOR MULTI-CLOUD COMPUTING ENVIRONMENT | September 2020 | February 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 16981121 | METHOD AND DEVICE FOR PERFORMING ONBOARDING | September 2020 | May 2024 | Allow | 44 | 2 | 0 | Yes | No |
| 17014085 | NETWORK DEVICE PROXIMITY-BASED AUTHENTICATION | September 2020 | April 2022 | Allow | 19 | 0 | 0 | Yes | No |
| 17001421 | SYSTEMS AND METHODS FOR PHONE NUMBER CERTIFICATION AND VERIFICATION | August 2020 | November 2023 | Abandon | 38 | 2 | 1 | No | No |
| 16998852 | SYSTEM AND METHOD FOR SELECTING AUTHENTICATION METHODS FOR SECURE TRANSPORT LAYER COMMUNICATION | August 2020 | March 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 16990374 | METHOD AND SYSTEM FOR DOUBLE ANONYMIZATION OF DATA | August 2020 | March 2022 | Allow | 20 | 0 | 0 | Yes | No |
| 16934935 | DETECTING BEHAVIORAL ANOMALY IN MACHINE LEARNED RULE SETS | July 2020 | March 2022 | Allow | 20 | 0 | 0 | Yes | No |
| 16927387 | End User Device That Secures an Association of Application to Service Policy With an Application Certificate Check | July 2020 | May 2025 | Allow | 58 | 7 | 0 | Yes | No |
| 16926567 | SYSTEMS AND METHODS FOR SECURING LOGIN ACCESS | July 2020 | June 2023 | Allow | 36 | 1 | 0 | Yes | No |
| 16926108 | CHAINING OF AUTHORIZATIONS | July 2020 | July 2023 | Allow | 36 | 2 | 0 | Yes | Yes |
| 16918022 | Injection of Tokens or Client Certificates for Managed Application Communication | July 2020 | June 2022 | Allow | 24 | 1 | 0 | Yes | No |
| 16915821 | METHOD FOR CLOUD ASSISTED AUTHORIZATION OF IOT IDENTITY BOOTSTRAPPING | June 2020 | June 2022 | Allow | 24 | 0 | 0 | Yes | No |
| 16911552 | SECURE GATEWAY ONBOARDING VIA MOBILE DEVICES FOR INTERNET OF THINGS DEVICE MANAGEMENT | June 2020 | September 2023 | Allow | 39 | 3 | 0 | Yes | No |
| 16904650 | AGENTLESS IDENTITY-BASED NETWORK SWITCHING | June 2020 | January 2022 | Allow | 19 | 0 | 0 | Yes | No |
| 16879117 | CROSS-CHAIN INTERACTIONS USING A DOMAIN NAME SCHEME IN BLOCKCHAIN SYSTEMS | May 2020 | January 2021 | Allow | 8 | 2 | 0 | Yes | No |
| 15931909 | METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED RECORDKEEPING | May 2020 | November 2020 | Allow | 6 | 0 | 0 | Yes | No |
| 16853017 | OFFLINE DATA STORAGE DEVICE | April 2020 | March 2023 | Allow | 35 | 2 | 1 | Yes | No |
| 16848961 | SECURING IDENTITY TOKEN FORWARDING | April 2020 | June 2022 | Allow | 26 | 1 | 0 | Yes | No |
| 16849275 | STATELESS MUTUAL AUTHENTICATION BETWEEN SERVICES | April 2020 | September 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16836733 | MAXIMUM DEVICE ACCESS RESTRICTION AT AUTHENTICATOR LEVEL | March 2020 | July 2023 | Allow | 40 | 4 | 0 | Yes | No |
| 16836179 | AUTHENTICATION SERVER AND METHOD THAT ALLOW USER TO LOG INTO APPLICATION OR SERVICE PROVIDED VIA CLIENT DEVICES | March 2020 | October 2022 | Allow | 30 | 2 | 0 | Yes | No |
| 16805559 | AUTOMATIC NETWORK PROVISIONING OF A MEDICAL DEVICE | February 2020 | September 2022 | Allow | 30 | 1 | 0 | Yes | No |
| 16795359 | PREVENTING ACCOUNT LOCKOUT THROUGH REQUEST THROTTLING | February 2020 | June 2022 | Allow | 28 | 1 | 0 | No | No |
| 16781028 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING ACCESS TO ONLINE ACTIONS | February 2020 | December 2021 | Allow | 22 | 0 | 0 | Yes | No |
| 16777455 | NETWORK SECURITY SYSTEM WITH COGNITIVE ENGINE FOR DYNAMIC AUTOMATION | January 2020 | January 2021 | Allow | 12 | 1 | 0 | Yes | No |
| 16747792 | AUTOMATED RENEWAL OF CERTIFICATES ACROSS A DISTRIBUTED COMPUTING SECURITY SYSTEM | January 2020 | March 2023 | Allow | 38 | 3 | 0 | Yes | No |
| 16744079 | DATA STORAGE METHOD, DATA QUERY METHOD AND APPARATUSES | January 2020 | August 2020 | Allow | 7 | 0 | 0 | Yes | No |
| 16730352 | LEVERAGING LOCATION INFORMATION OF A SECONDARY DEVICE | December 2019 | June 2023 | Abandon | 41 | 2 | 0 | Yes | No |
| 16614931 | IMPROVEMENTS IN AND RELATING TO NETWORK COMMUNICATIONS | November 2019 | August 2022 | Abandon | 33 | 2 | 0 | No | No |
| 16666926 | AUTHENTICATION SYSTEM, AUTHENTICATION SERVER AND AUTHENTICATION METHOD | October 2019 | November 2021 | Allow | 24 | 0 | 0 | Yes | No |
| 16664874 | METHOD AND APPARATUS FOR CONTROLLING ACCESS TO CUSTOM BROWSER FUNCTIONALITY | October 2019 | February 2021 | Allow | 15 | 1 | 0 | No | No |
| 16659074 | DIGITAL CERTIFICATES WITH DISTRIBUTED USAGE INFORMATION | October 2019 | August 2021 | Allow | 22 | 2 | 0 | Yes | No |
| 16659076 | NETWORK SYSTEM AND METHOD FOR ACCESS MANAGEMENT AUTHENTICATION AND AUTHORIZATION | October 2019 | July 2021 | Allow | 20 | 1 | 0 | Yes | No |
| 16606157 | METHOD FOR CARRYING OUT DATA TRANSFER PROCESSES IN INDUSTRIAL INSTALLATIONS | October 2019 | July 2024 | Abandon | 57 | 6 | 0 | Yes | No |
| 16600273 | ENCRYPTED DATA KEY MANAGEMENT | October 2019 | March 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16591280 | SYSTEM SECURITY INFRASTRUCTURE FACILITATING PROTECTING AGAINST FRAUDULENT USE OF INDIVIDUAL IDENTITY CREDENTIALS | October 2019 | October 2021 | Allow | 25 | 0 | 0 | Yes | No |
| 16588016 | FILEKEY ACCESS TO DATA | September 2019 | September 2023 | Allow | 48 | 3 | 1 | Yes | No |
| 16586742 | MANAGING PERMISSIONS TO CLOUD-BASED RESOURCES WITH SESSION-SPECIFIC ATTRIBUTES | September 2019 | September 2022 | Allow | 35 | 2 | 0 | Yes | No |
| 16493719 | METHOD FOR OPERATING A TRANSMITTING DEVICE OF A MOTOR VEHICLE, TRANSMITTING DEVICE FOR A MOTOR VEHICLE, AND MOTOR VEHICLE | September 2019 | January 2022 | Allow | 28 | 0 | 0 | Yes | No |
| 16555975 | NETWORK SECURITY THREAT INTELLIGENCE SHARING | August 2019 | September 2022 | Allow | 37 | 2 | 0 | Yes | No |
| 16484485 | IDENTIFICATION INFORMATION MANAGEMENT METHOD AND ELECTRONIC DEVICE SUPPORTING SAME | August 2019 | July 2022 | Allow | 35 | 2 | 0 | Yes | No |
| 16465474 | MIXED-MODE CLOUD ON-PREMISE SECURE COMMUNICATION | May 2019 | December 2021 | Allow | 31 | 1 | 0 | No | No |
| 16422591 | SECURE AUTHENTICATION IN ADVERSE ENVIRONMENTS | May 2019 | December 2023 | Allow | 55 | 4 | 0 | Yes | No |
| 16405308 | POLICY ENFORCEMENT AND INTROSPECTION ON AN AUTHENTICATION SYSTEM | May 2019 | January 2022 | Allow | 32 | 1 | 0 | Yes | No |
| 16399865 | SYSTEM AND METHOD FOR RESOURCE ACCESS AUTHENTICATION | April 2019 | December 2023 | Allow | 56 | 6 | 0 | Yes | No |
| 16390390 | CROSS-CHAIN INTERACTIONS USING A DOMAIN NAME SCHEME IN BLOCKCHAIN SYSTEMS | April 2019 | January 2020 | Allow | 9 | 1 | 0 | Yes | No |
| 16363673 | AUTHENTICATION IN A COMPUTER NETWORK SYSTEM | March 2019 | September 2021 | Allow | 30 | 1 | 0 | Yes | No |
| 16358161 | CYBER SECURITY PLATFORM AND METHOD | March 2019 | February 2023 | Allow | 46 | 4 | 0 | Yes | No |
| 16297186 | ONLINE ACCOUNT ACCESS CONTROL BY MOBILE DEVICE | March 2019 | November 2019 | Allow | 9 | 1 | 0 | Yes | No |
| 16288453 | SYMMETRIC ACCOUNT AUTHENTICATION | February 2019 | April 2023 | Allow | 49 | 2 | 0 | Yes | Yes |
| 16286366 | ADAPTIVE AUTHORIZATION USING ACCESS TOKEN | February 2019 | November 2021 | Allow | 33 | 2 | 0 | Yes | No |
| 16203563 | INTELLIGENT POP-UP BLOCKER | November 2018 | July 2021 | Allow | 31 | 1 | 0 | Yes | No |
| 16203449 | DATA LEAK PREVENTION USING CONTENT BASED SEGMENTATION SCANNING | November 2018 | September 2021 | Allow | 34 | 1 | 0 | Yes | No |
| 16146629 | SYSTEM AND METHOD FOR PC AS A SERVICE AUTHENTICATION AND SUBSCRIPTION VIA LOW POWER WIDE AREA NETWORK COMMUNICATIONS | September 2018 | March 2022 | Allow | 41 | 2 | 0 | Yes | No |
| 16146587 | DETECTING FRAME INJECTION THROUGH WEB PAGE ANALYSIS | September 2018 | April 2021 | Allow | 31 | 1 | 0 | Yes | No |
| 16126023 | SYSTEM AND METHOD FOR SECURE SYNCHRONIZATION OF DATA ACROSS MULTIPLE COMPUTING DEVICES | September 2018 | August 2019 | Allow | 11 | 1 | 0 | No | No |
| 16113471 | SECURE INTERFACE FOR INVOKING PRIVILEGED OPERATIONS | August 2018 | September 2021 | Allow | 37 | 2 | 0 | Yes | No |
| 16110365 | MOBILE AUTHENTICATION IN MOBILE VIRTUAL NETWORK | August 2018 | March 2021 | Allow | 31 | 1 | 0 | Yes | No |
| 16100233 | GLOBAL SIGN-OUT ON SHARED DEVICES | August 2018 | December 2021 | Abandon | 40 | 2 | 0 | Yes | No |
| 16028515 | SINGLE-SIGN-ON FOR THIRD PARTY MOBILE APPLICATIONS | July 2018 | October 2021 | Allow | 39 | 3 | 0 | Yes | No |
| 16028709 | AUTHENTICATING A USER VIA A CUSTOMIZED IMAGE-BASED CHALLENGE | July 2018 | March 2023 | Allow | 56 | 5 | 0 | Yes | No |
| 16027681 | SECURE COMMUNICATION BETWEEN IN-VEHICLE ELECTRONIC CONTROL UNITS | July 2018 | July 2021 | Allow | 36 | 2 | 0 | Yes | No |
| 16002990 | METHODS AND SYSTEMS FOR DEVICE AUTHENTICATION | June 2018 | December 2020 | Allow | 31 | 3 | 0 | Yes | No |
| 15965544 | MIGRATION FOR WEARABLE TO NEW COMPANION DEVICE | April 2018 | January 2023 | Allow | 57 | 4 | 0 | Yes | No |
| 15965352 | PASSTHOUGHT FOR MULTIFACTOR AUTHENTICATION IN AUGMENTED REALITY | April 2018 | October 2021 | Allow | 41 | 4 | 0 | Yes | No |
| 15919638 | MULTIFACTOR AUTHENTICATION FOR INTERNET-OF-THINGS DEVICES | March 2018 | May 2021 | Allow | 38 | 2 | 0 | Yes | No |
| 15919819 | PREVENTING UNAUTHORIZED ACCOUNT ACCESS BASED ON LOCATION AND TIME | March 2018 | September 2020 | Allow | 30 | 1 | 0 | Yes | No |
| 15881953 | EMAIL NOTIFICATION SYSTEM | January 2018 | April 2023 | Allow | 60 | 2 | 0 | Yes | Yes |
| 15878076 | AUTOMATIC SQL QUERY MODIFICATION FOR DATA RESTRICTION | January 2018 | December 2018 | Allow | 10 | 0 | 0 | Yes | No |
| 15867571 | STORAGE INTERFACE FOR SYNCHRONIZING CONTENT | January 2018 | December 2020 | Allow | 35 | 2 | 0 | Yes | No |
| 15867586 | EMAIL NOTIFICATION SYSTEM | January 2018 | March 2021 | Allow | 38 | 3 | 0 | Yes | No |
| 15838020 | DEVICE AUTHORIZATION USING SYMMETRIC KEY SYSTEMS AND METHODS | December 2017 | July 2020 | Abandon | 31 | 0 | 1 | No | No |
| 15805799 | ACCESS CONTROL TO COMPUTER RESOURCE | November 2017 | November 2019 | Allow | 24 | 2 | 0 | No | No |
| 15797065 | Evaluation of Anomaly Detection Algorithms Using Impersonation Data Derived from User Data | October 2017 | December 2020 | Allow | 37 | 4 | 0 | Yes | No |
| 15795800 | APPARATUS AND METHOD TO PERFORM SECURE DATA SHARING IN A DISTRIBUTED NETWORK BY USING A BLOCKCHAIN | October 2017 | March 2021 | Allow | 41 | 4 | 0 | Yes | No |
| 15793659 | NETWORK SECURITY SYSTEM WITH COGNITIVE ENGINE FOR DYNAMIC AUTOMATION | October 2017 | December 2019 | Allow | 26 | 1 | 0 | Yes | No |
| 15569196 | WEARABLE DISCOVERY FOR AUTHENTICATION | October 2017 | July 2020 | Allow | 33 | 3 | 0 | Yes | No |
| 15790140 | SYSTEM AND METHOD FOR VERIFICATION OF DATA TRANSFERRED AMONG SEVERAL DATA STORAGES | October 2017 | November 2020 | Allow | 36 | 3 | 0 | Yes | No |
| 15788755 | EFFICIENT SECURITY THREAT REMEDIATION | October 2017 | July 2020 | Abandon | 33 | 2 | 0 | No | No |
| 15565778 | SYSTEMS, METHODS, AND DEVICES FOR DEVICE CREDENTIAL PROTECTION | October 2017 | March 2021 | Abandon | 41 | 3 | 0 | No | No |
| 15724942 | ENABLING INTEGRITY AND AUTHENTICITY OF DESIGN DATA | October 2017 | February 2021 | Allow | 41 | 4 | 0 | Yes | No |
| 15710910 | ACCESS CONTROL TO COMPUTER RESOURCE | September 2017 | June 2019 | Allow | 21 | 1 | 0 | Yes | No |
| 15710732 | DETECTING BEHAVIORAL ANOMALY IN MACHINE LEARNED RULE SETS | September 2017 | March 2020 | Allow | 30 | 2 | 0 | Yes | No |
| 15709474 | BIOMETRIC AUTHENTICATION BASED ON GAIT PATTERN OR WRITING MOTION WITH AN INERTIAL MEASUREMENT UNIT | September 2017 | September 2019 | Allow | 24 | 1 | 0 | Yes | No |
| 15708349 | METHOD AND SYSTEM FOR DOUBLE ANONYMIZATION OF DATA | September 2017 | April 2020 | Allow | 31 | 2 | 0 | Yes | No |
| 15708972 | ELECTRONIC DEVICES AND METHODS SUPPORTING UNSECURED SYSTEM-ON-CHIP SECURE BOOT FUNCTIONALITIES | September 2017 | January 2020 | Allow | 28 | 1 | 0 | Yes | No |
| 15556105 | DEVICE, AUTHENTICATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT | September 2017 | November 2019 | Allow | 27 | 1 | 0 | Yes | No |
| 15688508 | DATA SOURCE DRIVEN EXPECTED NETWORK POLICY CONTROL | August 2017 | October 2022 | Allow | 60 | 4 | 0 | Yes | Yes |
| 15685061 | PASSCODE BASED ACCESS-CONTROL WITH RANDOMIZED LIMITS | August 2017 | September 2020 | Allow | 37 | 3 | 0 | Yes | No |
| 15685651 | INFORMATION PROCESSING DEVICE AND CONTROL METHOD FOR INFORMATION PROCESSING DEVICE | August 2017 | June 2020 | Abandon | 34 | 2 | 0 | No | No |
| 15552915 | OUTPUT APPARATUS, PROGRAM, OUTPUT SYSTEM, AND OUTPUT METHOD | August 2017 | January 2021 | Abandon | 40 | 4 | 0 | No | No |
| 15551313 | Multi-Stage Defense-Aware Security Modules Placement in the Cloud | August 2017 | May 2019 | Allow | 21 | 1 | 0 | Yes | No |
| 15551109 | Mining Sandboxes | August 2017 | May 2020 | Abandon | 33 | 2 | 0 | No | No |
| 15549505 | A METHOD OF ESTABLISHING TRUST BETWEEN A DEVICE AND AN APPARATUS | August 2017 | September 2020 | Allow | 38 | 3 | 0 | Yes | No |
| 15669845 | DIGITAL CERTIFICATES WITH DISTRIBUTED USAGE INFORMATION | August 2017 | June 2019 | Allow | 22 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner MOHAMMADI, FAHIMEH M.
With a 75.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner MOHAMMADI, FAHIMEH M works in Art Unit 2439 and has examined 278 patent applications in our dataset. With an allowance rate of 78.4%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 35 months.
Examiner MOHAMMADI, FAHIMEH M's allowance rate of 78.4% places them in the 48% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by MOHAMMADI, FAHIMEH M receive 2.26 office actions before reaching final disposition. This places the examiner in the 59% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by MOHAMMADI, FAHIMEH M is 35 months. This places the examiner in the 39% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +56.5% benefit to allowance rate for applications examined by MOHAMMADI, FAHIMEH M. This interview benefit is in the 95% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 29.2% of applications are subsequently allowed. This success rate is in the 57% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 20.0% of cases where such amendments are filed. This entry rate is in the 26% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 20.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 28% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 66.7% of appeals filed. This is in the 49% percentile among all examiners. Of these withdrawals, 31.2% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 25.0% are granted (fully or in part). This grant rate is in the 12% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 19% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.