Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18968906 | EDGE NETWORKS FOR SURROGATE BROWSING AND DIRECT TRAFFIC VIA PROXY | December 2024 | February 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18902910 | Recovering from a Ransomware Attack Using Computational Intelligence | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18844143 | NETWORK MONITORING WITH MULTIPLE ATTACK GRAPHS | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18778814 | ATTACK BEHAVIOR DETECTION | July 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18721767 | Methods for identifying at least one server for mitigating and protecting a client domain against a computer attack, corresponding devices and signal | June 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18712078 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMMUNICATION PROGRAM | May 2024 | January 2026 | Allow | 20 | 1 | 0 | No | No |
| 18669024 | TRAFFIC IDENTIFIERS FOR USER DEVICE PROFILES | May 2024 | December 2025 | Allow | 19 | 1 | 0 | No | No |
| 18668765 | DYNAMIC MEMORY BANDWIDTH SHAPING | May 2024 | September 2025 | Allow | 16 | 1 | 0 | No | No |
| 18651949 | Systems and methods for generating lookalike Uniform Resource Locators (URLs) based on penalty-based genetic algorithms | May 2024 | March 2026 | Allow | 23 | 2 | 0 | No | No |
| 18649254 | Automated Device And Account Security Setting Update Initiation | April 2024 | August 2025 | Allow | 16 | 0 | 0 | No | No |
| 18641082 | SYSTEMS FOR MALICIOUS WEBSITE DETECTION USING MACHINE LEARNING | April 2024 | February 2026 | Allow | 22 | 0 | 0 | No | No |
| 18638576 | DUAL SOFTWARE INTERFACES FOR MULTIPLANE DEVICES TO SEPARATE NETWORK MANAGEMENT AND COMMUNICATION TRAFFIC | April 2024 | July 2025 | Allow | 14 | 1 | 0 | No | No |
| 18625334 | PROTECTING DATA DURING NON-BUSINESS HOURS | April 2024 | November 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18620086 | METHOD AND APPARATUS FOR DETERMINING COMPROMISED HOST | March 2024 | August 2025 | Allow | 16 | 0 | 0 | No | No |
| 18583684 | METADATA BASED DATA DISTRIBUTION | February 2024 | September 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18436853 | CYBER THREAT REMEDIATION VIA POLICY VIOLATION CLUSTERING | February 2024 | July 2025 | Allow | 17 | 0 | 0 | No | No |
| 18436540 | BGP ROUTE IDENTIFICATION METHOD, APPARATUS, AND DEVICE | February 2024 | January 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18429304 | METHODS AND SYSTEMS FOR EFFICIENTLY DETECTING AND RECORDING SECURITY ANOMALIES | January 2024 | March 2026 | Allow | 25 | 1 | 0 | Yes | No |
| 18426259 | Automatic Image Generator Using Meeting Content | January 2024 | March 2025 | Allow | 14 | 0 | 0 | Yes | No |
| 18422622 | NETWORK NODES AND METHODS THEREIN FOR INDIRECT COMMUNICATION | January 2024 | February 2025 | Allow | 13 | 1 | 0 | No | No |
| 18417892 | METHOD AND APPARATUS FOR NETWORK TRAFFIC MANAGEMENT | January 2024 | July 2025 | Allow | 18 | 0 | 0 | No | No |
| 18402600 | TECHNOLOGIES FOR PACKET FILTERING FOR PROTOCOL DATA UNIT SESSIONS | January 2024 | March 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18541762 | SHARED STORAGE MODEL FOR HIGH AVAILABILITY WITHIN CLOUD ENVIRONMENTS | December 2023 | November 2024 | Allow | 11 | 0 | 0 | Yes | No |
| 18538945 | REAL-TIME ATTRIBUTION OF TOOLS AND CAMPAIGNS FOR DNS TUNNELING TRAFFIC | December 2023 | March 2026 | Allow | 27 | 2 | 0 | Yes | No |
| 18530936 | SECURE DATABASE ENVIRONMENT WITH THIRD-PARTY VERIFICATION | December 2023 | August 2025 | Allow | 21 | 1 | 0 | No | No |
| 18522057 | USER DATAGRAM PROTOCOL FIREWALL | November 2023 | March 2026 | Allow | 27 | 2 | 0 | Yes | No |
| 18386251 | SYSTEM FOR CLASSIFYING ENCRYPTED TRAFFIC BASED ON DATA PACKET | November 2023 | June 2025 | Allow | 19 | 0 | 0 | No | No |
| 18498294 | LOCATION-BASED POLICY ENFORCEMENT FOR DATA PROCESSING SYSTEMS USING OUT-OF-BAND METHODS | October 2023 | March 2026 | Allow | 28 | 2 | 0 | No | No |
| 18498379 | SYSTEM FOR SOFTWARE CODE CYBER SECURITY BASED ON MACHINE LEARNING VULNERABILITY DETECTION AND GENERATION AND IMPLEMENTATION OF VULNERABILITY TEST | October 2023 | May 2025 | Allow | 19 | 0 | 0 | No | No |
| 18497828 | METHODS AND SYSTEMS FOR PROVIDING MULTIPLE NETWORKS FROM A GATEWAY | October 2023 | June 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18381860 | Crowdsourcing and Verifying a Trusted Entity's Identification | October 2023 | September 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18486988 | PROTECTING CONTROLLER AREA NETWORK (CAN) MESSAGES IN AUTONOMOUS SYSTEMS AND APPLICATIONS | October 2023 | September 2025 | Allow | 23 | 1 | 0 | No | No |
| 18484749 | BLOCKCHAIN-BASED DATA PROCESSING METHOD AND APPARATUS, DEVICE, AND READABLE STORAGE MEDIUM | October 2023 | September 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18554769 | APPLICATION ATTACK DETERMINATION DEVICE, APPLICATION ATTACK DETERMINATION METHOD, AND APPLICATIOIN ATTACK DETERMINATION PROGRAM | October 2023 | January 2026 | Allow | 27 | 2 | 0 | No | No |
| 18483439 | Systems and Methods for Multimedia Swarms | October 2023 | August 2025 | Allow | 22 | 3 | 0 | Yes | No |
| 18477791 | PROTECTING AGAINST HARM CAUSED BY MALICIOUS WEBSITES | September 2023 | November 2025 | Allow | 25 | 1 | 0 | No | No |
| 18551720 | COMMUNICATION SYSTEM, ANOMALY DETECTION APPARATUS, ANOMALY DETECTION METHOD, AND PROGRAM | September 2023 | November 2025 | Allow | 26 | 2 | 0 | No | No |
| 18471171 | MEDIA ATTRIBUTION VERIFICATION | September 2023 | November 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18462475 | ATTACK ANALYSIS DEVICE, ATTACK ANALYSIS METHOD, AND STORAGE MEDIUM | September 2023 | September 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18462051 | SYSTEMS AND METHODS FOR REPLICATING TRAFFIC STATISTICS ON REDUNDANT PACKET FORWARDING ENGINE SYSTEM | September 2023 | June 2025 | Allow | 22 | 3 | 0 | Yes | No |
| 18233109 | PROCESSING ADVERTISEMENT MESSAGES IN A MESH NETWORK | August 2023 | March 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18446519 | MAC-BASED REDISTRIBUTION IN MULTI-AREA NETWORKS | August 2023 | May 2024 | Allow | 9 | 0 | 0 | No | No |
| 18225359 | Systems and Methods for Cyber Threat Detection Based on New and/or Updated Cyber Threat Intelligence | July 2023 | November 2025 | Allow | 28 | 1 | 0 | No | No |
| 18355294 | SYSTEM AND METHODS FOR TRANSMITTING INFORMATION USING AN ELECTRONIC MEDIA | July 2023 | September 2025 | Allow | 26 | 4 | 0 | No | No |
| 18214008 | SYSTEM FOR ADVANCED NETWORK TRAFFIC ANALYSIS IN A COMPUTING ENVIRONMENT | July 2023 | April 2025 | Allow | 21 | 0 | 0 | No | No |
| 18351259 | SYSTEMS AND METHODS FOR INTERNET-OF-THINGS NETWORK PREDICTIVE TOPOLOGY SWITCHING | July 2023 | July 2024 | Allow | 13 | 1 | 0 | No | No |
| 18351491 | Top KPI Early Warning System | July 2023 | February 2025 | Abandon | 19 | 1 | 0 | No | No |
| 18349392 | MANAGING NON-SDL DEVICES AT AN INFORMATION HANDLING SYSTEM | July 2023 | August 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18349548 | METHODS, SYSTEMS, AND DEVICES TO IMPROVE WITHRDRAWING BORDER GATEWAY PROTOCOL (BGP) ROUTES WHEN A BGP GATEWAY BECOMES UNREACHABLE | July 2023 | January 2025 | Allow | 18 | 4 | 0 | Yes | No |
| 18213180 | SYSTEM AND METHOD FOR TAG BASED RESOURCE LIMITS OR QUOTAS IN A CLOUD INFRASTRUCTURE ENVIRONMENT | June 2023 | March 2026 | Allow | 33 | 2 | 0 | Yes | No |
| 18338047 | SYSTEMS AND METHODS FOR ENABLING PRECISION TIME PROTOCOL OVER A LINK AGGREGATION GROUP USING LINK AGGREGATION CONTROL PROTOCOL PARAMETERS | June 2023 | December 2024 | Allow | 17 | 3 | 0 | Yes | No |
| 18211467 | MULTICAST DATAPATH TRACING IN LAYER-2 NETWORKS | June 2023 | September 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 18202505 | INLINE EXPLOIT DETECTION VIA LOOSE CONDITION FORWARDING AND CLOUD ANALYSIS | May 2023 | February 2026 | Allow | 32 | 3 | 0 | Yes | No |
| 18324776 | PACKET PROCESSING FOR NETWORK SECURITY GROUPS | May 2023 | January 2025 | Allow | 20 | 0 | 0 | No | No |
| 18200618 | OUTPUT DEVICE SELECTION | May 2023 | May 2025 | Allow | 24 | 0 | 0 | No | No |
| 18200203 | METHOD AND APPARATUS FOR PROVIDING SECURE MESSAGING SERVICE | May 2023 | May 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18200443 | DUAL SOFTWARE INTERFACES FOR MULTIPLANE DEVICES TO SEPARATE NETWORK MANAGEMENT AND COMMUNICATION TRAFFIC | May 2023 | February 2024 | Allow | 9 | 0 | 0 | No | No |
| 18317908 | Optimizing Data Transmission between a First Endpoint and a Second Endpoint in a Computer Network | May 2023 | June 2024 | Allow | 13 | 2 | 0 | No | No |
| 18315574 | SYSTEMS AND METHODS FOR DETECTING AND RESOLVING USER ACCOUNT COMPROMISE USING A PASSWORD RESET | May 2023 | July 2025 | Allow | 26 | 1 | 0 | No | No |
| 18112246 | ANOMALY MONITORING APPARATUS AND ANOMALY MONITORING METHOD | February 2023 | January 2026 | Allow | 35 | 2 | 0 | Yes | No |
| 18019833 | NETWORK NODES AND METHODS THEREIN FOR INDIRECT COMMUNICATION | February 2023 | October 2023 | Allow | 8 | 0 | 0 | No | No |
| 18158716 | SYSTEMS AND METHODS FOR SYNCHRONOUS GROUP DEVICE TRANSMISSION OF STREAMING MEDIA AND RELATED USER INTERFACES | January 2023 | March 2024 | Allow | 14 | 0 | 0 | No | No |
| 18092124 | METHODS AND APPARATUSES FOR CONFIGURATION OF USER DEVICE(S) FOR RECEPTION OF POINT-TO-MULTIPOINT TRANSMISSION | December 2022 | July 2024 | Allow | 18 | 1 | 0 | No | No |
| 18148036 | TECHNIQUES FOR LATERAL MOVEMENT DETECTION IN A CLOUD COMPUTING ENVIRONMENT | December 2022 | July 2025 | Allow | 30 | 1 | 0 | No | No |
| 18081833 | METHOD FOR SCALABLE INTEGRITY ENCAPSULATION | December 2022 | July 2025 | Allow | 31 | 1 | 1 | No | No |
| 18081046 | CONFIGURING CLUSTER NODES FOR SHARING NETWORK RESOURCES | December 2022 | January 2024 | Allow | 13 | 0 | 0 | No | No |
| 18049167 | TECHNIQUES FOR DETECTING COMMAND INJECTION ATTACKS | October 2022 | April 2025 | Allow | 30 | 1 | 0 | No | No |
| 18047372 | Packet Sending Method, Packet Processing Method, and Device | October 2022 | March 2024 | Allow | 17 | 2 | 0 | No | No |
| 17967430 | Mixing Segments With Different Sizes For Segment Routing | October 2022 | February 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 17919519 | NETWORK NODE AND METHOD FOR HANDLING OPERATIONS IN A COMMUNICATIONS NETWORK | October 2022 | April 2024 | Allow | 18 | 2 | 0 | No | No |
| 17935381 | MULTIFACTOR AUTHENTICATION OF SECURE TRANSMISSION OF DATA | September 2022 | January 2025 | Allow | 27 | 1 | 0 | No | No |
| 17947316 | Method and Apparatus for Establishing Forwarding Path, and Computer-Readable Storage Medium | September 2022 | February 2024 | Allow | 16 | 1 | 0 | No | No |
| 17912030 | COMPUTER SYSTEM AND EVALUATION METHOD FOR CYBER SECURITY INFORMATION | September 2022 | October 2025 | Abandon | 37 | 2 | 0 | No | No |
| 17908088 | Method for managing a request to access an Internet site from an access device | August 2022 | January 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 17822176 | HAPTIC FEEDBACK-BASED VIDEO AUTHENTICATION METHOD AND SYSTEM | August 2022 | June 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17800604 | SECURE COMPUTATION METHOD, SECURE COMPUTATION SYSTEM AND PROGRAM | August 2022 | December 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17888236 | NETWORK IDENTITY PROTECTION METHOD AND DEVICE, AND ELECTRONIC EQUIPMENT AND STORAGE MEDIUM | August 2022 | December 2024 | Allow | 28 | 1 | 0 | No | No |
| 17886469 | Systems and Methods for Authentication of Security Devices Having Chaosmetrics Features | August 2022 | February 2025 | Abandon | 30 | 1 | 0 | No | No |
| 17886014 | Persistent IP address allocation for virtual private network (VPN) clients | August 2022 | April 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 17884669 | AUTOMATIC IMAGE GENERATOR USING MEETING CONTENT | August 2022 | October 2023 | Allow | 14 | 1 | 0 | Yes | No |
| 17814313 | DETECTION AND PROTECTION OF PERSONAL DATA IN AUDIO/VIDEO CALLS | July 2022 | February 2026 | Abandon | 43 | 5 | 0 | Yes | No |
| 17866351 | LCS RESOURCE POLICY ENFORCEMENT SYSTEM | July 2022 | October 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17856999 | Validation of Authenticity of Association of a Physical Entity with a Non-Fungible Token and Creation of the Non-Fungible Token having a Verifiable Association with the Physical Entity | July 2022 | December 2024 | Abandon | 30 | 0 | 1 | No | No |
| 17844817 | Hardware Countermeasures Against DFA Attacks on AES Operations | June 2022 | April 2024 | Allow | 22 | 0 | 0 | No | No |
| 17844580 | TYING ADDRESSES TO AUTHENTICATION PROCESSES | June 2022 | January 2026 | Abandon | 43 | 2 | 0 | Yes | Yes |
| 17840806 | Secure Communications Method and Apparatus | June 2022 | May 2025 | Allow | 35 | 3 | 0 | No | No |
| 17831174 | METHOD AND APPARATUS FOR MULTICAST CONTROL OF A LIVE VIDEO STREAM | June 2022 | August 2024 | Allow | 26 | 4 | 0 | Yes | No |
| 17738918 | METADATA DRIVEN STATIC DETERMINATION OF CONTROLLER AVAILABILITY | May 2022 | January 2024 | Allow | 21 | 1 | 0 | No | No |
| 17735157 | SYSTEMS AND METHODS FOR PREDICTING COMMUNICATION ACCOUNT IDENTITIES ACROSS DECENTRALIZED APPLICATIONS | May 2022 | May 2024 | Allow | 24 | 0 | 0 | No | No |
| 17716983 | METHOD AND APPARATUS FOR DISTRIBUTING NETWORK TRAFFIC OVER MULTIPLE COMMUNICATION NETWORKS | April 2022 | October 2024 | Allow | 30 | 3 | 0 | No | No |
| 17716028 | APPARATUS, METHOD, AND COMPUTER PROGRAM OF PROTECTING COMMUNICATIONS BETWEEN NETWORKS USING PREDEFINED SECURITY PROFILES | April 2022 | August 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17761979 | ESTABLISHING A NEW QOS FLOW FOR A DATA CONNECTION | March 2022 | November 2023 | Allow | 20 | 1 | 0 | No | No |
| 17694740 | Validation of Security Device Authentication in a Decentralized Network | March 2022 | December 2024 | Abandon | 33 | 0 | 1 | No | No |
| 17588688 | TUNNEL PROCESSING DISTRIBUTION BASED ON TRAFFIC TYPE AND LEARNED TRAFFIC PROCESSING METRICS | January 2022 | May 2024 | Allow | 27 | 2 | 0 | Yes | No |
| 17549961 | MULTI-PARTITIONED GLOBAL DATA SYSTEM | December 2021 | May 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17494722 | LAYER-2 NETWORKING INFORMATION IN A VIRTUALIZED CLOUD ENVIRONMENT | October 2021 | February 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17471571 | BGP Route Identification Method, Apparatus, and Device | September 2021 | November 2023 | Allow | 26 | 2 | 0 | No | No |
| 17351926 | Optimizing Data Transmission between a First Endpoint and a Second Endpoint in a Computer Network | June 2021 | January 2023 | Allow | 19 | 1 | 0 | Yes | No |
| 17338089 | Method For Automatic Management Of Capacity And Placement For Global Services | June 2021 | April 2024 | Allow | 34 | 4 | 0 | Yes | No |
| 17214053 | ORCHESTRATION ENGINE BLUEPRINT ASPECTS FOR HYBRID CLOUD COMPOSITION | March 2021 | April 2024 | Allow | 37 | 4 | 0 | Yes | Yes |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HOANG, HIEU T.
With a 66.7% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 60.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner HOANG, HIEU T works in Art Unit 2449 and has examined 103 patent applications in our dataset. With an allowance rate of 96.1%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 37 months.
Examiner HOANG, HIEU T's allowance rate of 96.1% places them in the 86% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by HOANG, HIEU T receive 2.57 office actions before reaching final disposition. This places the examiner in the 75% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by HOANG, HIEU T is 37 months. This places the examiner in the 33% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +0.8% benefit to allowance rate for applications examined by HOANG, HIEU T. This interview benefit is in the 18% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.
When applicants file an RCE with this examiner, 28.3% of applications are subsequently allowed. This success rate is in the 51% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 24.6% of cases where such amendments are filed. This entry rate is in the 33% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 8% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 75.0% of appeals filed. This is in the 64% percentile among all examiners. Of these withdrawals, 22.2% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 63.2% are granted (fully or in part). This grant rate is in the 68% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.
Examiner's Amendments: This examiner makes examiner's amendments in 8.7% of allowed cases (in the 92% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 19% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.