Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19226046 | SYSTEM AND METHOD FOR SOFTWARE INTEGRATION INTO ENTERPRISE STANDARD CONTROL SYSTEMS USING STANDARDIZED APIs | June 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19089705 | DECENTRALIZED INTEGRATION SOLUTIONS FOR SECURELY CONDUCTING LEGAL TRANSACTIONS AND PROTECTING SENSITIVE DATA | March 2025 | August 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18942118 | MULTIMEDIA CONTAINER FOR PHYSICAL OBJECT AUTHENTICATION AND VERIFICATION OF ATTENDANCE | November 2024 | January 2026 | Abandon | 15 | 3 | 0 | Yes | No |
| 18814720 | CIPHERTEXT CONVERSION SYSTEM, CIPHERTEXT CONVERSION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | August 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18811402 | SCALABLE SEARCH AND RANKING OF BIOMETRIC SIGNATURES | August 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18806047 | CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAME | August 2024 | March 2025 | Allow | 7 | 2 | 0 | No | No |
| 18787250 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | July 2024 | April 2025 | Allow | 8 | 2 | 0 | No | No |
| 18670367 | PHYSICALLY UNCLONABLE FUNCTION (PUF) GENERATION | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18668612 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS USING RISK FACTORS | May 2024 | November 2024 | Allow | 6 | 1 | 0 | No | No |
| 18647943 | Systems and Methods for a Cryptographic File System Layer | April 2024 | November 2025 | Allow | 19 | 1 | 0 | No | No |
| 18629283 | NESTED BLOCKCHAIN SYSTEM | April 2024 | January 2026 | Allow | 22 | 1 | 0 | No | No |
| 18697423 | METHOD AND SYSTEM FOR PROCESSING FULL-STACK NETWORK CARD TASK BASED ON FPGA | March 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18600727 | COMPLEX IT PROCESS ANNOTATION, TRACING, ANALYSIS, AND SIMULATION | March 2024 | October 2025 | Allow | 19 | 0 | 0 | No | No |
| 18598654 | METHOD,APPARATUS,STORAGE MEDIUM AND ELECTRONIC DEVICE FOR NETWORK AUTHENTICATION | March 2024 | November 2025 | Allow | 20 | 1 | 0 | No | No |
| 18595462 | CREATING SIMULATION MODELS FOR COMPLEX ADAPTIVE SYSTEMS USING A MULTI-MODEL, GENERATIVE APPROACH | March 2024 | October 2025 | Allow | 20 | 1 | 0 | No | No |
| 18595449 | MODELING MULTI-PERIL CATASTROPHE USING A DISTRIBUTED SIMULATION ENGINE | March 2024 | October 2025 | Allow | 19 | 0 | 0 | No | No |
| 18592170 | METHODS AND SYSTEMS FOR PROVIDING NETWORK CONNECTIVITY TO A SECURE ACCESS SERVICE EDGE (SASE) DOMAIN VIA AN ISP | February 2024 | January 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18585880 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | February 2024 | March 2026 | Allow | 25 | 1 | 0 | No | No |
| 18585274 | MULTI-VENDOR WEB SECURITY CONTROL INTEGRATION AND MANAGEMENT PLATFORM | February 2024 | January 2026 | Allow | 23 | 1 | 0 | No | No |
| 18585545 | Tying Access/Redaction to Authentication Levels | February 2024 | January 2026 | Allow | 23 | 2 | 0 | Yes | No |
| 18582051 | Blocking of Exfiltration Events via Browser Extensions | February 2024 | October 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18443976 | SYNTHETIC REQUEST INJECTION FOR REAL-TIME CLOUD SECURITY POSTURE MANAGEMENT | February 2024 | June 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18443055 | ABUSE MAILBOX FOR FACILITATING DISCOVERY, INVESTIGATION, AND ANALYSIS OF EMAIL-BASED THREATS | February 2024 | July 2025 | Allow | 17 | 1 | 0 | Yes | No |
| 18423173 | CRYPTOGRAPHIC METHODS AND SYSTEMS USING ACTIVATION CODES FOR DIGITAL CERTIFICATE REVOCATION | January 2024 | September 2025 | Allow | 19 | 2 | 0 | No | No |
| 18419534 | Method and System for Forensic Data Tracking | January 2024 | April 2025 | Allow | 15 | 1 | 0 | No | No |
| 18416222 | Secure Messaging Service with Digital Rights Management Using Blockchain Technology | January 2024 | December 2025 | Allow | 23 | 2 | 0 | Yes | No |
| 18401754 | METHODS AND SYSTEMS FOR COUNSELING A USER WITH RESPECT TO SUPERVISED CONTENT | January 2024 | July 2025 | Abandon | 19 | 1 | 0 | No | No |
| 18391617 | Performing Security Protocol Transitions While Executing An Execution Environment Of A Virtual Cloud Network | December 2023 | December 2025 | Allow | 24 | 2 | 0 | Yes | No |
| 18543102 | TELEMETRY-INITIATED MITIGATIONS IN A ZERO-TRUST COMPUTING ENVIRONMENT | December 2023 | September 2025 | Allow | 20 | 0 | 0 | No | No |
| 18539640 | MANAGING EDGE NETWORK PROTECTION SERVICE | December 2023 | December 2025 | Allow | 24 | 1 | 0 | No | No |
| 18533768 | MULTI-VENDOR WEB SECURITY CONTROL INTEGRATION AND MANAGEMENT PLATFORM | December 2023 | December 2025 | Allow | 24 | 1 | 0 | No | No |
| 18528346 | REAL TIME APPLICATION PROTECTION SYSTEM CONFIGURATION DRIFT CATEGORIZATION AND RESPONSE | December 2023 | March 2026 | Allow | 27 | 2 | 0 | Yes | No |
| 18517924 | Method for Providing Restricted Service, and Communications Device | November 2023 | August 2025 | Allow | 21 | 1 | 0 | No | No |
| 18508150 | Systems and methods for abnormal Classless Inter-Domain Routing (CIDR) access detection | November 2023 | January 2026 | Allow | 26 | 2 | 0 | No | No |
| 18386341 | SYSTEMS AND METHODS OF KEY SELECTION FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | November 2023 | April 2025 | Allow | 17 | 1 | 0 | No | No |
| 18558417 | AUTHENTICATED ENCRYPTION APPARATUS, AUTHENTICATED DECRYPTION APPARATUS, AUTHENTICATED ENCRYPTION SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM | November 2023 | December 2025 | Abandon | 25 | 1 | 0 | No | No |
| 18385387 | METHOD FOR SUPPORTING DECISION-MAKING IN SECURITY CONTROL ENVIRONMENT BASED ON ARTIFICIAL INTELLIGENCE | October 2023 | July 2025 | Allow | 20 | 1 | 0 | No | No |
| 18495429 | NETWORK CONNECTIVITY POLICY MANAGEMENT SYSTEM | October 2023 | July 2025 | Allow | 20 | 1 | 0 | No | No |
| 18489145 | DATACENTER SECURE CONTROL MODULE (DC-SCM) AS-A-SERVICE SYSTEM | October 2023 | August 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18487726 | SECURE WEB RTC REAL TIME COMMUNICATIONS SERVICE FOR AUDIO AND VIDEO STREAMING COMMUNICATIONS | October 2023 | September 2025 | Allow | 23 | 1 | 0 | No | No |
| 18483018 | REAL-TIME ORCHESTRATION ENGINE | October 2023 | June 2025 | Allow | 21 | 2 | 0 | Yes | No |
| 18482947 | DYNAMIC USER INTERFACE (UI) FRAMEWORK | October 2023 | April 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18482642 | FORWARD OR DROP PACKETS IN CASE OF URPF VIOLATION AND NOTIFY CONTROLLER VIA GRPC/SFLOW/IPFIX | October 2023 | March 2026 | Allow | 29 | 2 | 0 | No | No |
| 18481512 | ACTIVE DATA LOSS PREVENTION (DLP) ENGINE | October 2023 | April 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18480865 | SINGLE SIGN-ON (SSO) MULTI-IDENTITY PROVIDER (IDP) ENGINE | October 2023 | April 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18480667 | STATE MANAGEMENT FOR COMPLEX REAL-TIME WORKFLOWS | October 2023 | April 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18481091 | TECHNIQUES FOR ENCRYPTED DISK CYBERSECURITY INSPECTION UTILIZING DISK CLONING | October 2023 | August 2024 | Allow | 11 | 3 | 0 | Yes | No |
| 18477807 | SECURE USER EQUIPMENT POLICY DATA IN A COMMUNICATION NETWORK ENVIRONMENT | September 2023 | August 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18476896 | SYSTEMS AND METHODS FOR ENDPOINT MANAGEMENT | September 2023 | June 2025 | Allow | 21 | 2 | 0 | Yes | No |
| 18371891 | METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORK | September 2023 | February 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18371873 | METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORK | September 2023 | September 2025 | Allow | 24 | 1 | 0 | No | No |
| 18371320 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | September 2023 | April 2025 | Allow | 18 | 1 | 0 | No | No |
| 18471084 | UNIFIED LENDING PLATFORM | September 2023 | February 2025 | Allow | 17 | 1 | 0 | Yes | No |
| 18468584 | SYSTEMS AND METHODS FOR PERFORMING AN EXTERNAL VULNERABILITY SCAN USING EXTERNAL INTERNET PROTOCOL ADDRESSES | September 2023 | May 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18466540 | SYSTEMS AND METHODS FOR CYBERSECURITY ANALYSIS AND CONTROL OF CLOUD-BASED SYSTEMS | September 2023 | March 2025 | Allow | 18 | 1 | 0 | No | No |
| 18244093 | SYSTEM AND METHOD FOR ANONYMOUS DATA SHARING AMONG NODES OF A PRIVATE DATA NETWORK | September 2023 | October 2024 | Allow | 13 | 2 | 0 | Yes | No |
| 18240784 | CYBERSECURITY CONFIGURATION IN A CLOUD ENVIRONMENT | August 2023 | September 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18456479 | EMERGENCY INFORMATION ACCESS ON PORTABLE ELECTRONIC DEVICES | August 2023 | April 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18234282 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | August 2023 | November 2025 | Allow | 27 | 2 | 0 | Yes | No |
| 18364938 | ENTERPRISE NETWORK THREAT DETECTION | August 2023 | March 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18362081 | CHAT ATTACHMENT SCREENING | July 2023 | January 2025 | Allow | 18 | 2 | 0 | Yes | No |
| 18361831 | SYSTEM AND METHOD FOR MIDSERVER FACILITATION OF MASS SCANNING NETWORK TRAFFIC DETECTION AND ANALYSIS | July 2023 | May 2025 | Allow | 21 | 0 | 0 | No | No |
| 18273429 | DISPLAY APPARATUS, DISPLAY SYSTEM, DISPLAY METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM | July 2023 | August 2025 | Allow | 25 | 1 | 0 | No | No |
| 18224022 | USING PKI FOR SECURITY AND AUTHENTICATION OF CONTROL DEVICES AND THEIR DATA | July 2023 | February 2024 | Allow | 7 | 1 | 0 | No | No |
| 18222857 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | July 2023 | February 2025 | Allow | 19 | 1 | 0 | No | No |
| 18352165 | ROUTING TECHNIQUES FOR ENHANCED NETWORK SECURITY | July 2023 | April 2025 | Allow | 21 | 0 | 0 | No | No |
| 18351390 | CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAME | July 2023 | October 2025 | Allow | 27 | 4 | 0 | Yes | No |
| 18349223 | COMPUTER-IMPLEMENTED PRIVACY ENGINEERING SYSTEM AND METHOD | July 2023 | January 2026 | Allow | 30 | 4 | 0 | No | No |
| 18348631 | UNIFIED LENDING PLATFORM | July 2023 | September 2023 | Allow | 2 | 0 | 0 | No | No |
| 18217666 | DISTRIBUTED IDENTITY-BASED FIREWALLS | July 2023 | February 2025 | Allow | 20 | 2 | 0 | Yes | No |
| 18346137 | DEFINING A SECURITY PERIMETER USING KNOWLEDGE OF USER BEHAVIOR WITHIN A CONTENT MANAGEMENT SYSTEM | June 2023 | September 2025 | Allow | 27 | 2 | 0 | Yes | No |
| 18216848 | ASSESSING COORDINATED MALICIOUS BEHAVIOR TOWARDS A SERVICE PROVIDER NETWORK | June 2023 | March 2025 | Allow | 20 | 0 | 0 | No | No |
| 18344800 | SYSTEMS AND METHODS FOR PROVIDING SECURITY VALIDATIONS FOR CLOUD-BASED SECURITY ARCHITECTURES | June 2023 | May 2024 | Abandon | 10 | 2 | 0 | Yes | No |
| 18343138 | SYSTEMS AND METHODS FOR AN AT-RISK SYSTEM IDENTIFICATION VIA ANALYSIS OF ONLINE HACKER COMMUNITY DISCUSSIONS | June 2023 | April 2025 | Allow | 21 | 1 | 0 | No | No |
| 18213465 | CONTEXTUAL CONTROL OF DIGITAL FILES BUILT ON THE BLOCKCHAIN & PROJECTED IN AUGMENTED REALITY | June 2023 | February 2025 | Allow | 20 | 1 | 0 | No | No |
| 18340319 | MULTI-PARTY CONTROLLED TRANSIENT USER CREDENTIALING FOR INTERACTION WITH SECURE DATA | June 2023 | December 2024 | Allow | 18 | 1 | 0 | No | No |
| 18340068 | REMEDIATION RESPONSIVE TO A PATTERN OF ALERTS | June 2023 | May 2025 | Allow | 23 | 1 | 0 | No | No |
| 18340426 | Systems and Methods for Providing System Wide Cyber Security Policies | June 2023 | February 2026 | Allow | 32 | 3 | 0 | Yes | No |
| 18213197 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | June 2023 | April 2025 | Allow | 22 | 1 | 0 | No | No |
| 18201979 | Virtual Browser Application Systems and Methods | May 2023 | January 2025 | Allow | 20 | 1 | 0 | No | No |
| 18314092 | SYSTEMS AND METHODS FOR SECURE REMOTE IDENTITY VERIFICATION | May 2023 | November 2024 | Allow | 18 | 1 | 0 | No | No |
| 18313100 | SHARING ENTITY CHANGES FROM A CLOUD ACCESS SECURITY BROKER (CASB) PROXY TO A CASB APPLICATION PROGRAMMING INTERFACE (API) ENDPOINT | May 2023 | August 2023 | Allow | 3 | 0 | 0 | No | No |
| 18305563 | Method and System for Forensic Data Tracking | April 2023 | September 2023 | Allow | 5 | 1 | 0 | No | No |
| 18136681 | SYSTEM AND METHOD FOR ELECTRONIC RESOURCE TRANSFERS IN A DISTRIBUTED NETWORK VIA NETWORK-PAIRED RESOURCE TRANSFER DEVICES | April 2023 | May 2025 | Allow | 25 | 1 | 0 | No | No |
| 18133992 | METHOD FOR CHARACTERIZING SECURITY TECHNOLOGY DEPLOYMENT TELEMETRY ACROSS A COMPUTER NETWORK | April 2023 | September 2024 | Allow | 17 | 1 | 0 | No | No |
| 18299432 | CYBERSECURITY GUARD FOR CORE NETWORK ELEMENTS | April 2023 | October 2024 | Allow | 18 | 1 | 0 | No | No |
| 18133257 | SYSTEMS AND METHODS FOR SIGNALING AN ATTACK ON CONTACTLESS CARDS | April 2023 | April 2024 | Allow | 12 | 1 | 0 | No | No |
| 18297863 | METHODS FOR USING ORGANIZATIONAL BEHAVIOR FOR RISK RATINGS | April 2023 | November 2025 | Allow | 31 | 3 | 0 | No | No |
| 18129575 | METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORK | March 2023 | May 2024 | Allow | 13 | 1 | 0 | No | No |
| 18119610 | APPARATUS AND METHODS FOR VERIFYING LEDGER DATA | March 2023 | November 2024 | Abandon | 20 | 2 | 0 | Yes | No |
| 18179601 | SECURE INCIDENT INVESTIGATION WORKSPACE GENERATION AND INVESTIGATION CONTROL | March 2023 | April 2024 | Allow | 13 | 1 | 0 | No | No |
| 18114213 | CREDENTIAL GENERATION AND DISTRIBUTION METHOD AND SYSTEM FOR A BLOCKCHAIN NETWORK | February 2023 | August 2024 | Allow | 18 | 3 | 0 | Yes | No |
| 18114186 | PORTABLE POLICY EXECUTION USING EMBEDDED MACHINES | February 2023 | June 2025 | Allow | 27 | 4 | 0 | No | No |
| 18020328 | Method for Managing Keys of a Security Group | February 2023 | February 2024 | Allow | 12 | 2 | 0 | No | Yes |
| 18165995 | CONTROLLING ACCESS TO APPLICATION DATA | February 2023 | December 2024 | Allow | 22 | 3 | 0 | Yes | No |
| 18106393 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | February 2023 | April 2024 | Allow | 15 | 1 | 0 | No | No |
| 18163761 | SYNTHETIC REQUEST INJECTION TO RETRIEVE METADATA FOR CLOUD POLICY ENFORCEMENT | February 2023 | November 2023 | Allow | 9 | 1 | 0 | No | No |
| 18157440 | System and Method for Software-Defined Network Attached Storage (SDNAS) Ransomware Attack Detection and Prevention | January 2023 | May 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18099212 | Systems and Methods for a Cryptographic File System Layer | January 2023 | April 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 18094658 | SYSTEMS AND METHODS FOR PERFORMING A SIMULATED PHISHING ATTACK | January 2023 | May 2024 | Allow | 16 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner KORSAK, OLEG.
With a 45.5% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 42.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner KORSAK, OLEG works in Art Unit 2492 and has examined 878 patent applications in our dataset. With an allowance rate of 85.1%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 26 months.
Examiner KORSAK, OLEG's allowance rate of 85.1% places them in the 61% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by KORSAK, OLEG receive 2.10 office actions before reaching final disposition. This places the examiner in the 56% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by KORSAK, OLEG is 26 months. This places the examiner in the 76% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.
Conducting an examiner interview provides a +7.8% benefit to allowance rate for applications examined by KORSAK, OLEG. This interview benefit is in the 37% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 28.0% of applications are subsequently allowed. This success rate is in the 50% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 42.2% of cases where such amendments are filed. This entry rate is in the 64% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 54.8% of appeals filed. This is in the 26% percentile among all examiners. Of these withdrawals, 22.5% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 28.7% are granted (fully or in part). This grant rate is in the 16% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.8% of allowed cases (in the 59% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.