Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19300512 | Methods for Internet Communication Security | August 2025 | January 2026 | Allow | 5 | 0 | 0 | Yes | No |
| 19294714 | CONTEXTUAL TRUST ASSESSMENT OF ELECTRONIC MESSAGES USING LARGE LANGUAGE MODELS IN COMPUTERIZED ORGANIZATIONAL NETWORKS | August 2025 | January 2026 | Allow | 6 | 1 | 0 | No | No |
| 19268121 | ELECTRONIC APPARATUS FOR PERFORMING LOG LIGHTWEIGHTING USING EXTENDED BLOOM FILTER, AND OPERATION METHOD THEREOF | July 2025 | December 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19255270 | METHOD AND SYSTEM FOR CONSTRUCTING VECTOR DATABASES USED FOR CONVERTING FREE TEXT QUERIES TO CYBER LANGUAGE QUERIES | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19183089 | AI MULTI-DOMAIN INTEGRATED SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF CYBER CRISIS SCENARIO | April 2025 | September 2025 | Allow | 5 | 1 | 0 | No | No |
| 19173436 | DETECTION OF ASSETS ACCESSIBLE VIA INBOUND NETWORK TRAFFIC | April 2025 | October 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19094182 | ANOMALY DETECTION IN MANAGED NETWORKS | March 2025 | August 2025 | Allow | 5 | 1 | 0 | No | No |
| 19088864 | PROCESSING REQUESTS FOR PRIVATE DATA FROM UNAUTHENTICATED USERS | March 2025 | September 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19060868 | MULTI-DIMENSIONAL ANOMALY SOURCE DETECTION | February 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19048394 | WEIGHTED TIMES SERIES FREQUENCY - INVERSE DOCUMENT FREQUENCY SCORING FOR CYBERSECURITY ALERTS | February 2025 | August 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19037886 | METHOD AND SYSTEM FOR IDENTIFYING ATTACK INFRASTRUCTURE | January 2025 | July 2025 | Allow | 6 | 1 | 0 | No | No |
| 19031245 | METHODS AND SYSTEMS FOR DETERMINING ANOMALOUS USER ACCESS TO DATA OBJECTS | January 2025 | June 2025 | Allow | 5 | 1 | 0 | No | No |
| 19025713 | INFORMATION OUTPUT DEVICE, INFORMATION OUTPUT METHOD, AND RECORDING MEDIUM | January 2025 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18982812 | REAL-TIME ANOMALY DETECTION AND MITIGATION FOR STREAMING FUNCTIONAL DATA | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18975491 | ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE | December 2024 | February 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18951202 | SECURE COMMUNICATIONS IN INTERACTIVE COMPUTING ENVIRONMENT | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18823485 | Management System for Networked Endpoints | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18820411 | WEIGHTED TIMES SERIES FREQUENCY - INVERSE DOCUMENT FREQUENCY SCORING FOR CYBERSECURITY ALERTS | August 2024 | December 2024 | Allow | 4 | 1 | 0 | No | No |
| 18841556 | METHOD FOR DETERMINING FALSE FLAGS OF CYBER ATTACKS AND APPARATUS FOR EXECUTING THE METHOD | August 2024 | July 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18796334 | ABNORMAL BEHAVIOR DETECTION METHOD, ELECTRONIC DEVICE AND NON-TRANSIENT COMPUTER-READABLE STORAGE MEDIUM | August 2024 | April 2025 | Allow | 8 | 2 | 0 | Yes | No |
| 18781746 | ELECTRONIC SECURITY SYSTEM OF NETWORK RESOURCE COMPONENT TRACKING AND ANALYSIS ACROSS A DISTRIBUTED NETWORK AND CONSTRUCTION OF A VALIDATED NETWORK RESOURCE COMPONENT LIBRARY | July 2024 | February 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18780656 | MULTI-FACTOR AUTONOMOUS SIM LOCK | July 2024 | March 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18774171 | ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE | July 2024 | February 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18772175 | APPLICATION PROXY-BASED SECURITY FOR RDP-TYPE COMMUNICATIONS SESSIONS | July 2024 | March 2026 | Abandon | 20 | 1 | 0 | No | No |
| 18763469 | MULTI-DIMENSIONAL ANOMALY SOURCE DETECTION | July 2024 | January 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18733767 | METHOD FOR DETECTING ANOMALIES IN GROUPS OF USER VERIFICATION REQUESTS | June 2024 | November 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18674018 | System and Method for Generative Design Based Real-Time Restricted Sub Application Setup with Non-Production Data Architectural Flow Determination with Enterprise Scoped Large Language Injection Model | May 2024 | February 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18665845 | VULNERABILITY DETECTION PLATFORM | May 2024 | January 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18652151 | DETECTING OUTLIERS IN MULTIMODAL DISTRIBUTIONS USING EMPIRICAL CUMULATIVE DISTRIBUTION FUNCTIONS | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18648754 | ENCRYPTED INTERSTITIAL TECHNIQUES FOR WEB SECURITY | April 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18649492 | TECHNIQUES FOR MAPPING SECURITY CONTROLS TO CYBER THREATS | April 2024 | October 2024 | Allow | 5 | 1 | 0 | No | No |
| 18647831 | IOT DEVICE INSPECTION METHOD, AND DEVICE THEREFOR | April 2024 | October 2024 | Allow | 6 | 1 | 0 | No | No |
| 18631736 | COMPUTER METHOD FOR RANKED ENSEMBLE FILTERING OF COMPUTER NETWORK TRANSMISSIONS | April 2024 | October 2025 | Allow | 18 | 0 | 0 | No | No |
| 18628581 | SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTS | April 2024 | October 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18624317 | System and Method for Determining Network Pathway Security Vulnerabilities | April 2024 | January 2026 | Allow | 22 | 1 | 0 | No | No |
| 18621304 | TECHNIQUES FOR CYBERSECURITY INVESTIGATION OF CLOUD ENTITY MISUSE LEVERAGING RUNTIME CONTEXT | March 2024 | October 2024 | Allow | 7 | 1 | 0 | No | No |
| 18617404 | DEDUPLICATION OF ENDPOINT CONNECTIONS | March 2024 | November 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18603590 | ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE | March 2024 | August 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18601572 | CYBERSECURITY OPERATIONS MITIGATION MANAGEMENT | March 2024 | February 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18599550 | TRUST PLATFORM | March 2024 | March 2026 | Allow | 24 | 1 | 0 | Yes | No |
| 18586982 | SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS | February 2024 | February 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18584994 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | November 2025 | Allow | 20 | 4 | 0 | Yes | No |
| 18581424 | ENDOGENOUS DYNAMIC DEFENSE ARCHITECTURE-BASED MULTI-OBJECTIVE SERVICE FUNCTION CHAIN DEPLOYMENT METHOD | February 2024 | April 2024 | Allow | 2 | 0 | 0 | No | No |
| 18432037 | AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS | February 2024 | August 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18427616 | CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES | January 2024 | February 2026 | Allow | 25 | 1 | 0 | No | No |
| 18425847 | APPLICATION ENDPOINT CYBERSECURITY TECHNIQUES | January 2024 | August 2024 | Allow | 6 | 1 | 0 | No | No |
| 18420458 | TTP BASED AUTOMATED PLAYBOOK GENERATION METHOD AND SYSTEM PERFORMING THE SAME | January 2024 | August 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18416730 | API SECURITY BASED ON INSPECTION OF OBFUSCATED REQUEST AND RESPONSE BODIES | January 2024 | August 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18414362 | OPTIMIZED DEEP PACKET INSPECTION (DPI) ANYWHERE | January 2024 | January 2026 | Allow | 24 | 1 | 0 | Yes | No |
| 18412268 | SYSTEMS AND METHODS FOR FILTERING ELECTRONIC ACTIVITIES BY PARSING CURRENT AND HISTORICAL ELECTRONIC ACTIVITIES | January 2024 | January 2026 | Abandon | 24 | 1 | 0 | No | No |
| 18410746 | AUTOMATED IDENTIFICATION OF FALSE POSITIVES IN DNS TUNNELING DETECTORS | January 2024 | September 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18404173 | Evaluating Cryptographic API Calls at Runtime | January 2024 | October 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18400591 | Secure Authentication | December 2023 | December 2024 | Allow | 11 | 2 | 0 | Yes | No |
| 18398574 | SERVER AND METHOD FOR PROVIDING ONLINE THREAT DATA BASED ON USER-CUSTOMIZED KEYWORDS FOR PRIVATE CHANNEL | December 2023 | January 2026 | Allow | 24 | 1 | 0 | No | No |
| 18392906 | CYBERSECURITY VULNERABILITY VALIDATION TECHNIQUES UTILIZING RUNTIME DATA, STATIC ANALYSIS AND DYNAMIC INSPECTION | December 2023 | May 2024 | Allow | 5 | 1 | 0 | No | No |
| 18526253 | INFERENCE-BASED SELECTIVE FLOW INSPECTION | December 2023 | December 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18559569 | BLOCKCHAIN-BASED INTERCONNECTED VEHICLE AUTHENTICATION SYSTEM AND METHOD | November 2023 | July 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18502556 | DATA PROVENANCE TRACKING SERVICE | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18387322 | CYBER SECURITY APPLIANCE FOR AN OPERATIONAL TECHNOLOGY NETWORK | November 2023 | March 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18500845 | ARTIFICIAL INTELLIGENCE (AI) DRIVEN CLASSIFIER USING DEFINED TAXONOMY FRAMEWORK | November 2023 | April 2024 | Allow | 5 | 1 | 0 | No | No |
| 18493945 | SYSTEM AND METHOD FOR RISK EVALUATION AND REPUTATIONAL SCORING OF SOCIAL MEDIA ACCOUNTS | October 2023 | February 2025 | Allow | 16 | 0 | 0 | No | No |
| 18383376 | Data Management System for Networked Endpoints | October 2023 | May 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18489097 | ONLINE ANOMALY DETECTION OF VECTOR EMBEDDINGS | October 2023 | December 2024 | Allow | 14 | 0 | 0 | Yes | No |
| 18488336 | Data discovery dashboard for real-time data manipulation and visualization | October 2023 | October 2025 | Allow | 24 | 1 | 0 | No | No |
| 18487700 | Protecting Against Malicious Websites Using Repetitive Data Signatures | October 2023 | October 2025 | Allow | 24 | 1 | 0 | No | No |
| 18380339 | MALWARE DETECTION AT ENDPOINT DEVICES | October 2023 | November 2024 | Allow | 13 | 0 | 0 | No | No |
| 18485297 | SYSTEM AND METHOD FOR ANOMALY DETECTION INTERPRETATION | October 2023 | February 2025 | Allow | 16 | 1 | 0 | No | No |
| 18376130 | SYSTEMS AND METHODS FOR DATA SECURITY MODEL MODIFICATION AND ANOMALY DETECTION | October 2023 | November 2025 | Allow | 25 | 1 | 0 | No | No |
| 18372193 | SYSTEMS AND METHODS FOR ENHANCED NETWORK DETECTION | September 2023 | July 2025 | Allow | 22 | 3 | 0 | Yes | No |
| 18468149 | TECHNIQUES FOR MULTI-TENANT VULNERABILITY SCANNING | September 2023 | January 2024 | Allow | 4 | 1 | 0 | No | No |
| 18467194 | SYSTEMS, APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ANOMOLY DETECTION COMPUTING PROGRAMS | September 2023 | December 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18465605 | DIGITAL SAFETY AND ACCOUNT DISCOVERY | September 2023 | September 2024 | Allow | 12 | 0 | 0 | No | No |
| 18236725 | SECURE USER ASSIGNED DEVICE FROM MANUFACTURER | August 2023 | January 2025 | Allow | 17 | 1 | 0 | Yes | No |
| 18365208 | MANAGING UNMANAGEABLE DEVICES ON AN ENTERPRISE NETWORK | August 2023 | August 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18361564 | ISOLATING SUSPICIOUS LINKS IN EMAIL MESSAGES | July 2023 | January 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18261875 | ANOMALOUS NETWORK BEHAVIOUR IDENTIFICATION | July 2023 | November 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 18220532 | PRIORITY DETERMINATION SYSTEM, PRIORITY DETERMINATION METHOD, AND RECORDING MEDIUM | July 2023 | September 2024 | Allow | 14 | 1 | 0 | No | No |
| 18213337 | ATTACK PATH MONITORING AND RISK MITIGATION IN IDENTITY SYSTEMS | June 2023 | January 2026 | Allow | 30 | 2 | 0 | Yes | No |
| 18340213 | REFERENCING A DOCUMENT IN A VIRTUAL SPACE | June 2023 | August 2024 | Allow | 14 | 0 | 0 | Yes | No |
| 18339738 | MALWARE DETECTION FOR PROXY SERVER NETWORKS | June 2023 | November 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18327663 | System and Method for Trustworthy Internet Whitelists | June 2023 | June 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18325230 | THREAT MITIGATION SYSTEM AND METHOD | May 2023 | June 2024 | Allow | 13 | 0 | 0 | Yes | No |
| 18324945 | SYSTEMS AND METHODS FOR TRIGGERING TOKEN ALERTS | May 2023 | November 2025 | Allow | 30 | 2 | 0 | Yes | No |
| 18313878 | Systems and Methods for Attack Simulation on a Production Network | May 2023 | May 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18142522 | DETECTING MALICIOUS ACTIVITY ON AN ENDPOINT BASED ON REAL-TIME SYSTEM EVENTS | May 2023 | April 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18302122 | Anomaly detection from network traffic | April 2023 | June 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18301862 | TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTION | April 2023 | August 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18132126 | DATA PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND MEDIUM | April 2023 | September 2025 | Allow | 29 | 2 | 0 | Yes | No |
| 18296888 | METHOD AND BLOCKCHAIN-BASED SYSTEM FOR MANAGING CREDENTIALS IN BATCH WITH SELECTIVE ATTRIBUTES DISCLOSURE/HIDING AND AUDITABLE MERKLE TREE | April 2023 | October 2023 | Allow | 6 | 1 | 0 | Yes | No |
| 18116518 | Systems And Methods For Intelligently Accessing Media Content Based On Rights | March 2023 | March 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18166654 | METHODS AND SYSTEMS FOR IDENTIFYING ANOMALOUS COMPUTER EVENTS TO DETECT SECURITY INCIDENTS | February 2023 | April 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18105557 | Mutually secure optical data network and method | February 2023 | February 2024 | Allow | 13 | 0 | 0 | Yes | No |
| 18104431 | MULTIDIMENSIONAL SECURITY SITUATION REAL-TIME REPRESENTATION METHOD AND SYSTEM AND APPLICABLE TO NETWORK SECURITY | February 2023 | August 2023 | Allow | 6 | 0 | 0 | No | No |
| 18162802 | Digital Safety and Account Discovery | February 2023 | February 2024 | Allow | 13 | 0 | 0 | No | No |
| 18101961 | DAMPENING TOKEN ALLOCATIONS BASED ON NON-ORGANIC SUBSCRIBER BEHAVIORS | January 2023 | June 2024 | Allow | 17 | 1 | 0 | No | No |
| 18102026 | IDENTIFYING SIMILAR GEOGRAPHICALLY PROXIMATE INFRASTRUCTURES FROM A KNOWN NETWORK ADDRESS | January 2023 | January 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18101773 | ATTACK PATH GENERATION METHOD AND ATTACK PATH GENERATION DEVICE | January 2023 | May 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18094248 | BUILDING A TIME DIMENSION BASED ON A TIME DATA MODEL AND CREATING AN ASSOCIATION RELATIONSHIP BETWEEN THE TIME DIMENSION AND A SECOND DATA MODEL FOR ANALYZING DATA IN THE TIME DIMENSION | January 2023 | June 2025 | Allow | 29 | 2 | 0 | Yes | No |
| 18068428 | METHOD AND SYSTEM FOR STOPPING MULTI-VECTOR PHISHING ATTACKS USING CLOUD POWERED ENDPOINT AGENTS | December 2022 | October 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 18065302 | MULTI-FACTOR AUTONOMOUS SIM LOCK | December 2022 | April 2024 | Allow | 16 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TOLENTINO, RODERICK.
With a 27.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 28.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner TOLENTINO, RODERICK works in Art Unit 2439 and has examined 676 patent applications in our dataset. With an allowance rate of 77.1%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 35 months.
Examiner TOLENTINO, RODERICK's allowance rate of 77.1% places them in the 44% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by TOLENTINO, RODERICK receive 2.63 office actions before reaching final disposition. This places the examiner in the 77% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by TOLENTINO, RODERICK is 35 months. This places the examiner in the 39% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +38.5% benefit to allowance rate for applications examined by TOLENTINO, RODERICK. This interview benefit is in the 86% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 24.8% of applications are subsequently allowed. This success rate is in the 37% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 22.0% of cases where such amendments are filed. This entry rate is in the 28% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 91.5% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 68% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 68.1% of appeals filed. This is in the 54% percentile among all examiners. Of these withdrawals, 44.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 39.2% are granted (fully or in part). This grant rate is in the 28% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 2.7% of allowed cases (in the 78% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.