Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19265257 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19205793 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON DEVICE CRITICALITY SCORE AND METHODS OF USE THEREOF | May 2025 | March 2026 | Allow | 10 | 2 | 0 | Yes | No |
| 19122410 | CHAINING MESSAGE AUTHENTICATION CODES | April 2025 | January 2026 | Allow | 9 | 0 | 0 | Yes | No |
| 18902634 | SYSTEMS AND METHODS TO PERFORM PHISHING DETECTION AND DEVICE ATTESTATION VIA BROWSER EXTENSION | September 2024 | March 2025 | Allow | 5 | 0 | 1 | Yes | No |
| 18885207 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | September 2024 | April 2025 | Allow | 7 | 0 | 1 | Yes | No |
| 18843974 | METHOD AND APPARATUS FOR DETECTING URL RELATED TO PHISHING SITE USING ARTIFICIAL INTELLIGENCE AND GENERATIVE AI ALGORITHM | September 2024 | March 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18820347 | INTEGRATED SECURITY FOR CLOUD APPLICATIONS | August 2024 | December 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18800553 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON AUTOMATED KEY TERRAIN IDENTIFICATION AND METHODS OF USE THEREOF | August 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18765860 | Advanced SIP-Based Caller Identification and Voicemail Analysis System for Fraud Prevention in Telecommunications | July 2024 | January 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18763525 | Intelligent Technical Protocol Based Approach Leveraging AI-ML to Block Vishing Scammers | July 2024 | January 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18736505 | INTELLIGENT ANTI-PHISHING MANAGEMENT | June 2024 | August 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18736499 | INTELLIGENT ANTI-PHISHING MANAGEMENT | June 2024 | August 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18647427 | SYSTEM AND METHOD FOR CLASSIFYING A USER FOR DETECTING PHISHING ATTACKS | April 2024 | July 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18640446 | END-POINT MEDIA WATERMARKING | April 2024 | December 2024 | Allow | 8 | 0 | 0 | No | No |
| 18621079 | TRAINING TRUSTED USERS OF AN ENTERPRISE NETWORK FOR PHISHING ATTACKS ON A PER-USER BASIS | March 2024 | November 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18607463 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | March 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18421790 | SYSTEM AND METHOD FOR DETECTING PHISHING ATTACKS IN SMS COMMUNICATIONS | January 2024 | April 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18406597 | CONTINUOUS IMPROVEMENT OF SECURITY DETECTION RULES | January 2024 | December 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18537874 | HARMFUL-WEBSITE CLASSIFICATION METHOD | December 2023 | January 2026 | Abandon | 25 | 0 | 0 | Yes | No |
| 18537884 | MACHINE LEARNING-BASED HARMFUL-WEBSITE CLASSIFICATION METHOD | December 2023 | January 2026 | Abandon | 25 | 1 | 0 | Yes | No |
| 18529562 | COMPUTER-BASED SYSTEMS FOR DETERMINING A LOOK-ALIKE DOMAIN NAMES IN WEBPAGES AND METHODS OF USE THEREOF | December 2023 | October 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18509754 | SYSTEMS AND METHODS FOR IDENTIFYING BRANDS UTILIZED IN WEBSITE PHISHING CAMPAIGNS | November 2023 | May 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18506475 | INTELLIGENT ANTI-PHISHING MANAGEMENT | November 2023 | May 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18506495 | INTELLIGENT ANTI-PHISHING MANAGEMENT | November 2023 | May 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18503771 | INFORMATION SECURITY SYSTEM AND METHOD FOR PHISHING WEBSITE IDENTIFICATION BASED ON IMAGE HASHING | November 2023 | March 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18383796 | METHOD OF RANKING AND ADDRESS NETWORK THREATS | October 2023 | March 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18489978 | Cyber Security Phishing Campaign | October 2023 | October 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18377573 | OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENT | October 2023 | September 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18477658 | SECURITY SYSTEM FOR DETECTING MALICIOUS ACTOR'S OBSERVATION | September 2023 | March 2026 | Allow | 29 | 1 | 0 | Yes | No |
| 18463750 | TECHNIQUES FOR DIGITAL WALLET INTEGRATION AND FOR SCANNING TRANSACTIONS USING INTEGRATED MODULES | September 2023 | November 2023 | Allow | 2 | 0 | 0 | Yes | No |
| 18450871 | SYSTEM AND METHOD FOR MITIGATING CYBER THREATS USING RISK ANALYSIS | August 2023 | March 2026 | Allow | 31 | 1 | 0 | Yes | No |
| 18230331 | SYSTEM AND METHOD FOR DETECTING PHISHING EVENTS | August 2023 | April 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18362572 | TESTING COMPLEX DECISION SYSTEMS USING OUTCOME LEARNING-BASED MACHINE LEARNING MODELS | July 2023 | January 2024 | Allow | 6 | 0 | 1 | Yes | No |
| 18354270 | MALICIOUS MESSAGE CLASSIFICATON USING MACHINE LEARNING MODELS | July 2023 | March 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18346417 | ELECTRONIC SMOKING DEVICE AND CAPSULE SYSTEM | July 2023 | September 2024 | Abandon | 14 | 1 | 0 | No | No |
| 18217273 | COMBINATION RULE MINING FOR MALWARE SIGNATURE GENERATION | June 2023 | November 2024 | Allow | 17 | 2 | 0 | Yes | No |
| 18318198 | TECHNIQUES FOR RISK MANAGEMENT BASED ON SOFTWARE BILL OF MATERIALS | May 2023 | September 2025 | Allow | 29 | 0 | 0 | Yes | No |
| 18036929 | System and Method for Improving the Efficiency in Vehicular Data Access While Maintaining Data Security | May 2023 | March 2026 | Abandon | 34 | 2 | 0 | No | No |
| 18135778 | Detection of site phishing using neural network-enabled site image analysis leveraging few-shot learning | April 2023 | May 2025 | Allow | 25 | 0 | 0 | Yes | No |
| 18031624 | EXTRACTION DEVICE, EXTRACTION METHOD, AND EXTRACTION PROGRAM | April 2023 | October 2025 | Allow | 30 | 2 | 0 | Yes | No |
| 18030907 | ATTACK SCENARIO GENERATION APPARATUS, RISK ANALYSIS APPARATUS, METHOD, AND COMPUTER READABLE MEDIA | April 2023 | January 2026 | Allow | 33 | 1 | 0 | Yes | No |
| 18030585 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM | April 2023 | August 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18125916 | MACHINE LEARNING FOR VISUAL SIMILARITY-BASED PHISHING DETECTION | March 2023 | November 2025 | Abandon | 32 | 2 | 0 | No | No |
| 18121952 | TECHNIQUES FOR BOT DETECTION | March 2023 | September 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18113179 | DETERMINING TEMPLATE DIFFICULTY BASED ON SECURITY MATURITY | February 2023 | September 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18111580 | BOTNET DETECTION AND MITIGATION | February 2023 | October 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18110495 | Restricting Screenshare of Web Pages to Select List of Allowed Website URLs | February 2023 | September 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18168433 | SYSTEMS AND METHODS FOR AUTOMATICALLY ASSIGNING USER PERMISSIONS | February 2023 | March 2026 | Allow | 37 | 1 | 1 | Yes | No |
| 18163772 | CYBER CLONE OF A COMPUTING ENTITY | February 2023 | February 2025 | Allow | 25 | 0 | 0 | Yes | No |
| 18160211 | MALICIOUS MESSAGE CLASSIFICATON USING MACHINE LEARNING MODELS | January 2023 | April 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18100084 | AUTOMATED EFFECTIVE TEMPLATE GENERATION | January 2023 | January 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18097091 | MULTI-VECTOR MALWARE DETECTION DATA SHARING SYSTEM FOR IMPROVED DETECTION | January 2023 | August 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18094628 | SYSTEMS AND METHODS FOR EFFECTIVE DELIVERY OF SIMULATED PHISHING CAMPAIGNS | January 2023 | January 2024 | Abandon | 13 | 1 | 0 | No | No |
| 18094632 | SYSTEMS AND METHODS FOR EFFECTIVE DELIVERY OF SIMULATED PHISHING CAMPAIGNS | January 2023 | March 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18090430 | Linear Network Coding for Blockchains | December 2022 | August 2025 | Allow | 32 | 2 | 0 | No | No |
| 18069817 | END-POINT MEDIA WATERMARKING | December 2022 | September 2024 | Abandon | 21 | 2 | 0 | No | No |
| 17991766 | Systems and Methods for Context-Based Permissioning of Personally Identifiable Information | November 2022 | April 2025 | Allow | 29 | 3 | 0 | Yes | No |
| 17986853 | MOBILE DEVICE SECURITY APPLICATION FOR MALICIOUS WEBSITE DETECTION BASED ON REPRESENTATIVE IMAGE | November 2022 | October 2023 | Allow | 11 | 1 | 0 | No | No |
| 17981743 | SYSTEMS, METHODS, AND APPARATUSES FOR DETECTION OF DATA MISAPPROPRIATION ATTEMPTS ACROSS ELECTRONIC COMMUNICATION PLATFORMS | November 2022 | January 2026 | Allow | 38 | 3 | 0 | Yes | No |
| 17973794 | ACCESSING AN ENCRYPTED PLATFORM | October 2022 | November 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17970069 | SYSTEMS AND METHODS FOR INTELLIGENT PHISHING THREAT DETECTION AND PHISHING THREAT REMEDIATION IN A CYBER SECURITY THREAT DETECTION AND MITIGATION PLATFORM | October 2022 | June 2024 | Allow | 20 | 0 | 0 | Yes | No |
| 17931595 | SECURING NETWORK RESOURCES FROM KNOWN THREATS | September 2022 | October 2023 | Allow | 13 | 1 | 0 | Yes | No |
| 17940523 | PROCESSING AND STORING EVENT DATA IN A KNOWLEDGE GRAPH FORMAT FOR ANOMALY DETECTION | September 2022 | February 2023 | Allow | 5 | 0 | 0 | Yes | No |
| 17899316 | AUTOMATED EFFECTIVE TEMPLATE GENERATION | August 2022 | December 2022 | Allow | 3 | 0 | 0 | Yes | No |
| 17896974 | SYSTEM FOR CYBER-ATTACK SIMULATION USING ARTIFICIAL INTELLIGENCE MODELING | August 2022 | March 2024 | Allow | 18 | 1 | 0 | Yes | No |
| 17809614 | NETWORK EXPOSURE FUNCTION (NEF) FOR SUCI-BASED UE-INITIATED SERVICE AUTHORIZATION | June 2022 | March 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17805329 | Ephemeral Data Storage | June 2022 | January 2025 | Allow | 32 | 2 | 0 | Yes | Yes |
| 17745701 | DETECTING PHISHING WEBSITES VIA A MACHINE LEARNING-BASED SYSTEM USING URL FEATURE HASHES, HTML ENCODINGS AND EMBEDDED IMAGES OF CONTENT PAGES | May 2022 | September 2024 | Allow | 28 | 0 | 0 | Yes | No |
| 17744704 | OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENT | May 2022 | November 2022 | Allow | 6 | 1 | 0 | Yes | No |
| 17744712 | OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENT | May 2022 | July 2023 | Allow | 14 | 1 | 0 | Yes | No |
| 17744714 | OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENT | May 2022 | July 2023 | Allow | 14 | 1 | 0 | Yes | No |
| 17734956 | DETECTING PHISHING PDFS WITH AN IMAGE-BASED DEEP LEARNING APPROACH | May 2022 | February 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 17772206 | FILE STORAGE METHOD, TERMINAL, AND STORAGE MEDIUM | April 2022 | October 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17717474 | METHODS AND TECHNIQUES FOR REAL-TIME DETECTION OF INFECTED IOT DEVICES | April 2022 | September 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17696151 | SYSTEMS AND METHODS FOR INTELLIGENT PHISHING THREAT DETECTION AND PHISHING THREAT REMEDIATION IN A CYBER SECURITY THREAT DETECTION AND MITIGATION PLATFORM | March 2022 | July 2022 | Allow | 4 | 0 | 1 | Yes | No |
| 17675480 | Chip Device and Method for a Randomized Logic Encryption | February 2022 | August 2024 | Allow | 30 | 2 | 0 | Yes | No |
| 17673464 | CLIENT MAC SOURCE ADDRESS RANDOMIZATION BY MESH NODES IN WIRELESS MESH NETWORKS | February 2022 | April 2025 | Allow | 37 | 1 | 1 | Yes | No |
| 17632839 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE MEDIUM | February 2022 | January 2025 | Allow | 36 | 1 | 0 | Yes | No |
| 17587340 | VALIDATING NETWORK SECURITY ALERTING PIPELINE USING SYNTHETIC NETWORK SECURITY EVENTS | January 2022 | August 2024 | Allow | 30 | 0 | 0 | Yes | No |
| 17587303 | CONTINUOUS IMPROVEMENT OF SECURITY DETECTION RULES | January 2022 | December 2023 | Allow | 22 | 0 | 0 | Yes | No |
| 17561612 | SYSTEM AND METHOD FOR MONITORING SECURITY ATTACK CHAINS | December 2021 | March 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17645251 | MULTI-TENANT CRYPTOGRAPHY IMPLEMENTATION COMPLIANCE | December 2021 | October 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17546676 | SYSTEMS AND METHODS FOR IMPROVING ASSESSMENT OF SECURITY RISK BASED ON PERSONAL INTERNET ACCOUNT DATA | December 2021 | October 2022 | Allow | 10 | 2 | 0 | Yes | No |
| 17536380 | Computerized System For Analysis Of Vertices And Edges Of An Electronic Messaging System | November 2021 | April 2024 | Allow | 29 | 4 | 1 | Yes | No |
| 17533041 | END-POINT MEDIA WATERMARKING | November 2021 | January 2025 | Allow | 38 | 4 | 0 | Yes | Yes |
| 17512609 | PLATFORM FOR PRIVACY PRESERVING DECENTRALIZED LEARNING AND NETWORK EVENT MONITORING | October 2021 | May 2024 | Allow | 30 | 0 | 0 | Yes | No |
| 17501708 | SYSTEMS AND METHODS FOR INTELLIGENT PHISHING THREAT DETECTION AND PHISHING THREAT REMEDIATION IN A CYBER SECURITY THREAT DETECTION AND MITIGATION PLATFORM | October 2021 | February 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17602794 | Method For Identifying And Authenticating A User Profile | October 2021 | June 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17602168 | METHODS AND DEVICES FOR PROPAGATING BLOCKS IN A BLOCKCHAIN NETWORK | October 2021 | November 2024 | Allow | 37 | 1 | 0 | Yes | No |
| 17490188 | METHOD AND SYSTEM FOR GENERATING SECURITY FINDINGS ACQUISITION RECORDS FOR SYSTEMS AND SYSTEM COMPONENTS | September 2021 | February 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17491438 | COMMAND CLASSIFICATION USING ACTIVE LEARNING | September 2021 | March 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17487319 | IMPROVING NETWORK SECURITY THROUGH REAL-TIME ANALYSIS OF CHARACTER SIMILARITIES | September 2021 | February 2023 | Allow | 17 | 3 | 0 | Yes | No |
| 17486731 | DETECTING MALICIOUS BEHAVIOR USING AN ACCOMPLICE MODEL | September 2021 | March 2025 | Allow | 41 | 2 | 0 | Yes | No |
| 17484103 | METHOD AND APPARATUS TO REDUCE RISK OF DENIAL OF SERVICE RESOURCE ACQUISITION ATTACKS IN A DATA CENTER | September 2021 | February 2026 | Abandon | 53 | 6 | 0 | Yes | No |
| 17482266 | SYSTEM AND METHOD FOR SECURING STORED AND MERGED IMAGES USING BLOCKCHAIN | September 2021 | March 2025 | Abandon | 41 | 1 | 1 | No | No |
| 17478342 | SYSTEM AND METHOD FOR BUILDING A TRUSTED NETWORK OF DEVICES | September 2021 | August 2025 | Allow | 47 | 3 | 0 | Yes | No |
| 17475233 | DETECTING PHISHING WEBSITES VIA A MACHINE LEARNING-BASED SYSTEM USING URL FEATURE HASHES, HTML ENCODINGS AND EMBEDDED IMAGES OF CONTENT PAGES | September 2021 | January 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17466207 | RISK ANALYZER AND RISK ANALYSIS METHOD | September 2021 | November 2021 | Allow | 3 | 0 | 0 | Yes | No |
| 17411873 | AUTOMATIC DETECTION OF PROXY-BASED PHISHING SITES | August 2021 | March 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17445294 | METHOD AND SYSTEM FOR LAYERED DETECTION OF PHISHING WEBSITES | August 2021 | July 2023 | Allow | 23 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner DO, KHANG D.
With a 50.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 85.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner DO, KHANG D works in Art Unit 2492 and has examined 288 patent applications in our dataset. With an allowance rate of 89.9%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.
Examiner DO, KHANG D's allowance rate of 89.9% places them in the 73% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by DO, KHANG D receive 1.56 office actions before reaching final disposition. This places the examiner in the 29% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by DO, KHANG D is 28 months. This places the examiner in the 68% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +32.0% benefit to allowance rate for applications examined by DO, KHANG D. This interview benefit is in the 80% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 33.9% of applications are subsequently allowed. This success rate is in the 74% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 17.3% of cases where such amendments are filed. This entry rate is in the 20% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 120.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 82% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 77.8% of appeals filed. This is in the 69% percentile among all examiners. Of these withdrawals, 42.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 32.6% are granted (fully or in part). This grant rate is in the 20% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 2.3% of allowed cases (in the 70% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.