Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18732000 | TECHNIQUES FOR SECURING NETWORK ENVIRONMENTS BY IDENTIFYING DEVICE ATTRIBUTES BASED ON STRING FIELD CONVENTIONS | June 2024 | May 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18622553 | APPARATUS, METHOD AND ARTICLE TO FACILITATE AUTOMATIC DETECTION AND REMOVAL OF FRAUDULENT USER INFORMATION IN A NETWORK ENVIRONMENT | March 2024 | March 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18398791 | PRESERVING DLL HOOKS | December 2023 | January 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18512603 | DISCRETE PROCESSOR FEATURE BEHAVIOR COLLECTION | November 2023 | September 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18483060 | SECURITY-ADAPTIVE CODE EXECUTION | October 2023 | June 2025 | Allow | 20 | 2 | 0 | Yes | No |
| 18454681 | PROTECTING AGAINST A TRACKING PARAMETER IN A WEB LINK | August 2023 | August 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18069866 | APPARATUS, METHOD AND ARTICLE TO FACILITATE AUTOMATIC DETECTION AND REMOVAL OF FRAUDULENT USER INFORMATION IN A NETWORK ENVIRONMENT | December 2022 | November 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 18084238 | KEYLOGGER DETECTION SYSTEMS AND METHODS | December 2022 | September 2023 | Allow | 9 | 1 | 0 | Yes | No |
| 17977495 | SMART DATA PROTECTION | October 2022 | May 2025 | Abandon | 30 | 4 | 0 | Yes | No |
| 17933897 | HELPER DATA INTEGRITY CHECK AND TAMPER DETECTION USING SRAM-BASED PHYSICALLY UNCLONABLE FUNCTION | September 2022 | March 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17906939 | METHOD, DEVICE AND SYSTEM FOR PROTECTING PRIVACY | September 2022 | March 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17948104 | HYPERVISOR-ASSISTED DATA BACKUP AND RECOVERY FOR NEXT GENERATION ANTI-VIRUS (NGAV) SYSTEMS | September 2022 | April 2025 | Abandon | 30 | 1 | 0 | No | No |
| 17930754 | SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATION | September 2022 | April 2023 | Allow | 7 | 1 | 0 | Yes | No |
| 17854677 | SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSING | June 2022 | December 2023 | Abandon | 17 | 2 | 0 | Yes | No |
| 17739107 | Enhanced Data Privacy Through Structure-Preserving Autoencoder with Latent Space Augmentation | May 2022 | October 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17764988 | ANALYSIS FUNCTION IMPARTING DEVICE, ANALYSIS FUNCTION IMPARTING METHOD, AND ANALYSIS FUNCTION IMPARTING PROGRAM | March 2022 | June 2025 | Abandon | 38 | 2 | 0 | No | No |
| 17689287 | DETECTING TAMPERING OF AN ELECTRONIC DEVICE | March 2022 | March 2025 | Allow | 36 | 2 | 0 | Yes | No |
| 17653303 | SYSTEM AND METHOD FOR DETECTING AND REPORTING SYSTEM CLOCK ATTACKS WITHIN AN INDICATORS OF ATTACK PLATFORM | March 2022 | January 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 17587406 | MODIFICATION OF DATA SHARING BETWEEN SYSTEMS | January 2022 | December 2023 | Allow | 23 | 3 | 0 | Yes | No |
| 17537186 | Access Control Based on Combined Multi-System Authentication Factors | November 2021 | November 2023 | Abandon | 23 | 2 | 0 | No | No |
| 17484195 | MASKED WATERMARKS AND RELATED SYSTEMS AND TECHNIQUES | September 2021 | April 2023 | Abandon | 19 | 1 | 0 | No | No |
| 17478066 | CYBERSECURITY HAZARD ANALYSIS TOOL | September 2021 | August 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17474862 | SYSTEMS AND METHODS FOR DETECTION OF SYNTHETIC IDENTITY MALFEASANCE | September 2021 | July 2024 | Allow | 34 | 3 | 0 | Yes | No |
| 17459999 | METHODS AND APPARATUS TO ORCHESTRATE PERSONAL PROTECTION ACROSS DIGITAL ASSETS | August 2021 | September 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17459979 | METHODS AND APPARATUS FOR COMPREHENSIVE USER-CENTRIC PROTECTION OF DIGITAL ASSETS | August 2021 | June 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17401847 | Method to Implement Traceability and Provability in Software Development | August 2021 | November 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17396134 | SYSTEMS AND METHODS FOR CLOUD-BASED COLLECTION AND PROCESSING OF DIGITAL FORENSIC EVIDENCE | August 2021 | July 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17393879 | MITIGATION OF RETURN STACK BUFFER SIDE CHANNEL ATTACKS IN A PROCESSOR | August 2021 | February 2025 | Allow | 43 | 3 | 0 | Yes | No |
| 17392449 | SYSTEM AND METHOD TO BUILD A FILE REPUTATION CACHE FOR AN ANTIVIRUS (AV) ENDPOINT | August 2021 | June 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17384877 | SYSTEM AND METHOD FOR GENERATING A MINIMAL FORENSIC IMAGE OF A DATASET OF INTEREST | July 2021 | July 2024 | Allow | 36 | 2 | 0 | Yes | No |
| 17374087 | Preserving DLL Hooks | July 2021 | September 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17371163 | LOG MANAGEMENT DEVICE AND CENTER DEVICE | July 2021 | March 2025 | Allow | 45 | 4 | 0 | Yes | No |
| 17356987 | PROTECTING AGAINST A TRACKING PARAMETER IN A WEB LINK | June 2021 | August 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17344294 | TECHNIQUES FOR SECURING NETWORK ENVIRONMENTS BY IDENTIFYING DEVICE ATTRIBUTES BASED ON STRING FIELD CONVENTIONS | June 2021 | March 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17340164 | DEVICES AND METHODS TO SECURE A SYSTEM ON A CHIP | June 2021 | November 2024 | Allow | 41 | 4 | 0 | Yes | No |
| 17319299 | Known-Deployed File Metadata Repository and Analysis Engine | May 2021 | December 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17319638 | Known-Deployed File Metadata Repository and Analysis Engine | May 2021 | December 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17206989 | TAMPER DETECTION FOR EXECUTABLE APPLICATIONS | March 2021 | June 2024 | Allow | 39 | 3 | 0 | Yes | No |
| 17275415 | MICROSERVICE ADAPTIVE SECURITY HARDENING | March 2021 | June 2024 | Allow | 39 | 2 | 0 | Yes | No |
| 16345785 | SECURITY POLICY AND AUDIT LOG TWO WAY INQUIRY, COLLATION, AND TRACKING SYSTEM AND METHOD | March 2021 | January 2025 | Allow | 60 | 4 | 0 | Yes | No |
| 17195038 | SYSTEM AND METHOD FOR DEFENDING APPLICATIONS INVOKING ANONYMOUS FUNCTIONS | March 2021 | July 2024 | Abandon | 40 | 2 | 0 | No | No |
| 17193251 | TECHNIQUES FOR PREDICTING LEAKAGE OF A SERIAL NUMBER | March 2021 | March 2024 | Allow | 36 | 3 | 0 | Yes | No |
| 17188547 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MAIN MEMORY TAG COMPRESSION | March 2021 | February 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17187180 | Discrete Processor Feature Behavior Collection | February 2021 | August 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 17168079 | METHOD AND DEVICE FOR SYMBOLIC ANALYSIS OF A SOFTWARE PROGRAM | February 2021 | January 2025 | Allow | 47 | 5 | 0 | Yes | No |
| 17159748 | DYNAMIC ACCOUNT RISK ASSESSMENT FROM HETEROGENEOUS EVENTS | January 2021 | August 2024 | Allow | 43 | 4 | 0 | Yes | No |
| 17154358 | COMPUTER-IMPLEMENTED TOOL THAT FACILITATES MALWARE DETECTION | January 2021 | September 2024 | Allow | 44 | 4 | 0 | Yes | Yes |
| 17145155 | MANAGEMENT SYSTEMS FOR PERSONAL IDENTIFYING DATA, AND METHODS RELATING THERETO | January 2021 | July 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17132001 | Hardware Device Integrity Validation Using Platform Configuration Values | December 2020 | August 2023 | Allow | 32 | 3 | 0 | Yes | No |
| 17127686 | SECURITY AUTOMATION USING ROBOTIC PROCESS AUTOMATION | December 2020 | August 2024 | Allow | 44 | 3 | 0 | Yes | Yes |
| 17122211 | SYSTEM AND METHOD FOR EXTERNALLY-DELEGATED ACCESS CONTROL AND AUTHORIZATION | December 2020 | June 2023 | Abandon | 30 | 2 | 0 | Yes | No |
| 17109942 | KEYLOGGER DETECTION SYSTEMS AND METHODS | December 2020 | July 2022 | Allow | 20 | 2 | 0 | Yes | No |
| 17108435 | SYSTEM AND METHOD OF DETECTING HACKING ACTIVITIES DURING THE INTERACTION OF USERS WITH BANKING SERVICES | December 2020 | January 2024 | Allow | 37 | 4 | 0 | Yes | No |
| 17104013 | DEFENSE OF TARGETED DATABASE ATTACKS THROUGH DYNAMIC HONEYPOT DATABASE RESPONSE GENERATION | November 2020 | September 2023 | Allow | 34 | 4 | 0 | Yes | No |
| 17082679 | LIMITED INTROSPECTION FOR TRUSTED EXECUTION ENVIRONMENTS | October 2020 | December 2023 | Abandon | 37 | 3 | 0 | Yes | No |
| 17082768 | Role-Based Access Control for a Storage System | October 2020 | November 2023 | Allow | 37 | 3 | 0 | Yes | No |
| 17050493 | SYSTEM AND METHOD FOR SECURING ELECTRONIC CORRESPONDENCE | October 2020 | December 2022 | Abandon | 26 | 2 | 0 | No | No |
| 17042622 | EXTRACTION DEVICE, EXTRACTION METHOD, RECORDING MEDIUM, AND DETECTION DEVICE | September 2020 | August 2022 | Allow | 23 | 1 | 0 | Yes | No |
| 17024787 | SYSTEM AND METHOD FOR PERFORMING AUTOMATED SECURITY REVIEWS | September 2020 | September 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16991288 | PROVENANCE-BASED THREAT DETECTION TOOLS AND STEALTHY MALWARE DETECTION | August 2020 | May 2022 | Allow | 21 | 1 | 0 | Yes | No |
| 16912512 | DATA PROTECTION FOR NETWORKING DEVICES | June 2020 | March 2023 | Allow | 33 | 1 | 1 | Yes | No |
| 16896244 | Memory Device Providing Data Security | June 2020 | June 2024 | Abandon | 49 | 4 | 0 | No | No |
| 16833427 | APPARATUS, METHOD AND ARTICLE TO FACILITATE AUTOMATIC DETECTION AND REMOVAL OF FRAUDULENT USER INFORMATION IN A NETWORK ENVIRONMENT | March 2020 | November 2022 | Allow | 31 | 1 | 0 | Yes | No |
| 16752825 | Automated Detection of User Device Security Risks Related to Process Threads and Corresponding Activity | January 2020 | June 2022 | Allow | 29 | 2 | 0 | Yes | No |
| 16689122 | SMART DATA PROTECTION | November 2019 | August 2022 | Allow | 33 | 3 | 0 | Yes | No |
| 16687036 | IoT DEVICE MANAGED BASED ON BLOCK CHAIN, SYSTEM AND METHOD THEREOF | November 2019 | April 2022 | Abandon | 29 | 1 | 0 | No | No |
| 16663453 | SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSING | October 2019 | March 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16663971 | MASKED WATERMARKS AND RELATED SYSTEMS AND TECHNIQUES | October 2019 | June 2021 | Allow | 20 | 2 | 0 | Yes | No |
| 16607747 | PERSONAL VOICE ASSISTANT AUTHENTICATION | October 2019 | August 2021 | Allow | 22 | 2 | 0 | Yes | No |
| 16660504 | PRIVATE PASSWORD CONSTRAINT VALIDATION | October 2019 | September 2022 | Allow | 35 | 3 | 0 | Yes | No |
| 16659016 | TWO-WAY AUTHENTICATION FOR VOICE-ACTIVATED DEVICES | October 2019 | December 2024 | Allow | 60 | 6 | 0 | Yes | Yes |
| 16656188 | SYSTEM AND METHOD FOR AUTHENTICATING HUMANS BASED ON BEHAVIORAL PATTERN | October 2019 | November 2021 | Allow | 25 | 1 | 0 | Yes | No |
| 16601117 | APPARATUS, SYSTEMS, AND METHODS FOR ASSIGNING ACCESS PERMISSION TO SOCIAL MEDIA | October 2019 | September 2022 | Allow | 35 | 4 | 0 | Yes | No |
| 16601451 | ADDING ADVERSARIAL ROBUSTNESS TO TRAINED MACHINE LEARNING MODELS | October 2019 | March 2022 | Allow | 29 | 3 | 0 | Yes | No |
| 16587806 | Runtime Detection of Browser Exploits Via Injected Scripts | September 2019 | February 2022 | Allow | 29 | 2 | 0 | Yes | No |
| 16495283 | Storing Data On Target Data Processing Devices | September 2019 | April 2023 | Allow | 43 | 4 | 0 | Yes | No |
| 16566009 | SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATION | September 2019 | June 2022 | Allow | 33 | 2 | 0 | Yes | No |
| 16545108 | System and Method for the Secure and Efficient Provision of at Least Partly Automated Driving Modes | August 2019 | May 2022 | Allow | 33 | 4 | 0 | Yes | No |
| 16474642 | PREVENTING DATA LEAKAGE | June 2019 | November 2021 | Allow | 28 | 1 | 0 | Yes | No |
| 16455717 | DDOS ATTACK DETECTION METHOD AND DEVICE | June 2019 | May 2021 | Allow | 22 | 1 | 0 | Yes | No |
| 16434964 | Remote Access to a Storage Device | June 2019 | December 2022 | Allow | 42 | 5 | 0 | Yes | No |
| 16431786 | MODIFICATION OF DATA SHARING BETWEEN SYSTEMS | June 2019 | November 2021 | Allow | 29 | 2 | 0 | Yes | No |
| 16296273 | VALIDATING THE INTEGRITY OF APPLICATION DATA USING SECURE HARDWARE ENCLAVES | March 2019 | July 2021 | Allow | 28 | 1 | 0 | Yes | No |
| 16291058 | SECURITY-ADAPTIVE CODE EXECUTION | March 2019 | July 2023 | Allow | 53 | 5 | 0 | Yes | No |
| 16263338 | REAL-TIME DETECTION OF MISUSE OF SYSTEM CREDENTIALS | January 2019 | September 2022 | Allow | 43 | 1 | 0 | Yes | No |
| 16259960 | CONTINUOUS VULNERABILITY MANAGEMENT FOR MODERN APPLICATIONS | January 2019 | June 2022 | Allow | 40 | 1 | 0 | Yes | No |
| 16228049 | SECURITY MODULE FOR MOBILE DEVICES | December 2018 | March 2021 | Allow | 28 | 2 | 0 | Yes | No |
| 16217733 | GRAPHIC COLOR-BASED AUTHENTICATION | December 2018 | October 2021 | Allow | 34 | 3 | 0 | Yes | No |
| 16215214 | Systems And Methods For Behavioral Threat Detection | December 2018 | March 2022 | Allow | 39 | 2 | 0 | Yes | No |
| 16215251 | Systems And Methods For Behavioral Threat Detection | December 2018 | September 2021 | Allow | 33 | 1 | 0 | Yes | No |
| 16211405 | SYSTEM AND METHOD FOR DEVICE AND TRANSACTION AUTHENTICATION | December 2018 | January 2021 | Allow | 25 | 1 | 0 | Yes | No |
| 16098091 | TRIGGERING ROLE-BASED WORKFLOWS WITH USER AUTHENTICATION | October 2018 | August 2022 | Abandon | 45 | 4 | 0 | Yes | No |
| 16146824 | AUTHENTICATION SERVER, AUTHENTICATION SYSTEM AND METHOD FOR AUTHENTICATION | September 2018 | February 2021 | Abandon | 29 | 1 | 0 | No | No |
| 16146794 | COMMUNICATION SYSTEM | September 2018 | December 2020 | Abandon | 27 | 1 | 0 | No | No |
| 16146817 | Content Authorization and Delivery | September 2018 | September 2024 | Allow | 60 | 6 | 0 | Yes | Yes |
| 16117671 | SYSTEM-LEVEL DATA SECURITY BASED ON ENVIRONMENTAL PROPERTIES | August 2018 | April 2021 | Allow | 31 | 2 | 0 | Yes | No |
| 16117787 | MULTI-LAYER CYBERSECURITY SYSTEM FOR RESTRICTING DATA ACCESS | August 2018 | May 2022 | Abandon | 45 | 3 | 0 | Yes | Yes |
| 16058746 | Access Control Based on Combined Multi-System Authentication Factors | August 2018 | July 2021 | Allow | 35 | 2 | 0 | No | No |
| 16044645 | AUTHENTICATION SYSTEM, METHOD AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM | July 2018 | June 2022 | Abandon | 46 | 4 | 0 | No | No |
| 16045115 | Secure Storage Device | July 2018 | May 2021 | Abandon | 33 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner WANG, CHAO.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner WANG, CHAO works in Art Unit 2439 and has examined 123 patent applications in our dataset. With an allowance rate of 81.3%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 33 months.
Examiner WANG, CHAO's allowance rate of 81.3% places them in the 46% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by WANG, CHAO receive 2.25 office actions before reaching final disposition. This places the examiner in the 77% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by WANG, CHAO is 33 months. This places the examiner in the 27% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +88.7% benefit to allowance rate for applications examined by WANG, CHAO. This interview benefit is in the 100% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 35.7% of applications are subsequently allowed. This success rate is in the 76% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 23.1% of cases where such amendments are filed. This entry rate is in the 22% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 83.3% of appeals filed. This is in the 73% percentile among all examiners. Of these withdrawals, 20.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 66.7% are granted (fully or in part). This grant rate is in the 83% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 16% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.