Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18770236 | PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERS | July 2024 | March 2025 | Allow | 8 | 1 | 0 | No | No |
| 18657317 | Electronic Messaging System for Mobile Devices with Reduced Traceability of Electronic Messages | May 2024 | June 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18654782 | TOKEN PROCESSING SYSTEM AND METHOD | May 2024 | May 2025 | Allow | 12 | 1 | 1 | Yes | No |
| 18652281 | Decentralized Techniques for Verification of Data in Transport Layer Security and other Contexts | May 2024 | May 2025 | Abandon | 12 | 1 | 0 | No | No |
| 18625154 | PROVISION OF A LEASE FOR STREAMING CONTENT | April 2024 | March 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18434537 | QUANTUM PHENOMENON-BASED OBFUSCATION OF MEMORY | February 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18412353 | CONFIGURABLE NETWORK SECURITY FOR NETWORKED ENERGY RESOURCES, AND ASSOCIATED SYSTEMS AND METHODS | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18390744 | MECHANISM TO PROVIDE CUSTOMER VCN NETWORK ENCRYPTION USING CUSTOMER-MANAGED KEYS IN NETWORK VIRTUALIZATION DEVICE | December 2023 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18511465 | PREVENTING DATA MANIPULATION AND PROTECTING USER PRIVACY IN TELECOMMUNICATION NETWORK MEASUREMENTS | November 2023 | February 2025 | Allow | 15 | 2 | 0 | No | No |
| 18506960 | MANAGEMENT OF NETWORK INTERCEPT PORTALS FOR NETWORK DEVICES WITH DURABLE AND NON-DURABLE IDENTIFIERS | November 2023 | September 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18386953 | ELECTRONIC SYSTEM FOR IDENTIFYING FAULTY CODE AND VULNERABILITIES IN SOFTWARE PROGRAMS USING LINKED EVALUATION TOOLS | November 2023 | June 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18490239 | EXTENDING CLOUD-BASED VIRTUAL PRIVATE NETWORKS TO RADIO-BASED NETWORKS | October 2023 | August 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18378613 | PACKET WATERMARK WITH STATIC SALT AND TOKEN VALIDATION | October 2023 | June 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18241959 | PUBLIC-KEY DISTRIBUTION FRAMEWORK | September 2023 | June 2025 | Allow | 21 | 0 | 1 | Yes | No |
| 18232663 | Systems and Methods for Dynamically Encrypting Redirect Requests | August 2023 | July 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18322728 | SECURITY AUTHENTICATION METHOD AND APPARATUS APPLIED TO WI-FI | May 2023 | April 2025 | Allow | 23 | 1 | 0 | No | No |
| 18322558 | PERFORMING CYBERSECURITY OPERATIONS BASED ON IMPACT SCORES OF COMPUTING EVENTS OVER A ROLLING TIME INTERVAL | May 2023 | June 2024 | Abandon | 13 | 1 | 0 | Yes | No |
| 18309927 | Electronic Messaging System for Mobile Devices with Reduced Traceability of Electronic Messages | May 2023 | December 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18135505 | SECURE CONFIGURATION OF A SECONDARY PLATFORM BUNDLE WITHIN A PRIMARY PLATFORM | April 2023 | November 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18301053 | Function Execution Device and Communication Terminal | April 2023 | December 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18298109 | SENDER-CORRELATED REPLY ID GENERATION IN ELECTRONIC MESSAGING SYSTEM | April 2023 | April 2024 | Allow | 12 | 1 | 0 | No | No |
| 18295488 | QUANTUM PHENOMENON-BASED OBFUSCATION OF MEMORY | April 2023 | November 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18044467 | METHOD AND SYSTEM USING CONDITIONAL BLOCKING AND NON-BLOCKING QUERY CALL SYSTEM AND METHOD | March 2023 | June 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18176409 | SYSTEMS AND METHODS FOR PREVENTING COMMUNICATIONS WITH MALICIOUS CRYPTOGRAPHY-BASED STORAGE APPLICATION ADDRESSES USING CONSENSUS | February 2023 | July 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18106402 | CONFIGURABLE NETWORK SECURITY FOR NETWORKED ENERGY RESOURCES, AND ASSOCIATED SYSTEMS AND METHODS | February 2023 | September 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18094700 | Enhanced Security and Extended Functionality for Workstation Integration with Mainframe Operating Systems | January 2023 | April 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18092375 | Automatically encrypting sensitive data in a distributed microservice framework | January 2023 | December 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 18091092 | PRIVACY PRESERVING SECURE ACCESS | December 2022 | January 2025 | Allow | 25 | 0 | 0 | No | No |
| 18084593 | Real-time detection of site phishing using Message Passing Neural Networks (MPNN) on directed graphs | December 2022 | April 2025 | Allow | 28 | 1 | 0 | No | No |
| 18061207 | Adaptive Guest Mode for Portable Speakers | December 2022 | February 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18056302 | DIFFERENTIAL ACCESS IN THE METAVERSE | November 2022 | February 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 17974067 | SERVICE COMMUNICATION METHOD, SYSTEM, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | October 2022 | June 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 17916541 | Bluetooth Networking Method for Electronic Device and Related Device | September 2022 | May 2025 | Allow | 31 | 1 | 0 | Yes | No |
| 17936656 | System and method for switching between public and private operations for conducting interactions in a metaverse | September 2022 | January 2025 | Allow | 28 | 1 | 0 | No | No |
| 17954246 | Secret Regeneration From Distributed Shares | September 2022 | July 2023 | Allow | 10 | 1 | 0 | Yes | No |
| 17944613 | STORAGE DEVICE AND OPERATION METHOD THEREOF | September 2022 | December 2024 | Allow | 27 | 1 | 0 | No | No |
| 17909474 | SECURE AND DOCUMENTED KEY ACCESS BY AN APPLICATION | September 2022 | May 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17799217 | COMMUNICATION APPARATUS, EXTERNAL APPARATUS, COMMUNICATION SYSTEM, COMMUNICATION METHOD AND PROGRAM | August 2022 | February 2025 | Allow | 31 | 1 | 0 | Yes | No |
| 17872156 | SYSTEMS AND METHODS FOR RAPID PASSWORD COMPROMISE EVALUTION | July 2022 | July 2024 | Allow | 23 | 1 | 0 | Yes | No |
| 17851525 | System and Method for Mitigating Risk of Frauds Related to Streaming Content Consumption | June 2022 | February 2025 | Allow | 32 | 1 | 0 | No | No |
| 17851583 | DETECTING MALICIOUS DNS REQUESTS USING MACHINE LEARNING | June 2022 | February 2025 | Allow | 32 | 2 | 0 | No | No |
| 17840038 | Preventing Data Loss Using Enhanced Analysis of the URLs and URIs in Webpage Requests | June 2022 | October 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17840176 | GRAPH-BASED DETECTION OF ABUSIVE COMPUTATIONAL NODES | June 2022 | November 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17840224 | SELECTION METHOD, SELECTION SYSTEM, AND RECORDING MEDIUM | June 2022 | December 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17834943 | INFORMATION LEAKAGE DETECTION METHOD AND DEVICE USING THE SAME | June 2022 | February 2025 | Allow | 32 | 2 | 0 | No | No |
| 17805089 | SYSTEM AND METHOD FOR DERIVING A PROFILE FOR A TARGET ENDPOINT DEVICE | June 2022 | July 2023 | Allow | 13 | 2 | 0 | Yes | No |
| 17772188 | PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERS | April 2022 | May 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17655090 | ACCESS TO CLOUD-DISTRIBUTED APPLICATIONS VIA ACCESS CREDENTIAL LOCKER SERVICE | March 2022 | August 2024 | Allow | 29 | 1 | 0 | No | No |
| 17692709 | CARDINAL METHOD FOR HIERARCHICAL PHASED SECURE ACCESS TO SYSTEM ENTITIES IN ISOLATED MULTI-TENANT DATABASE FOR AUTONOMOUS CLOUD ENVIRONMENTS | March 2022 | April 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17688941 | PERSONAL AWARENESS SYSTEM AND METHOD FOR PERSONAL SAFETY AND DIGITAL CONTENT SAFETY OF A USER | March 2022 | April 2024 | Allow | 26 | 1 | 0 | No | No |
| 17681154 | CRITICAL EVENT TRIGGERS FOR CONTINUOUS ACCESS EVALUATIONS DURING COMMUNICATION SESSIONS | February 2022 | November 2024 | Abandon | 33 | 1 | 1 | No | No |
| 17681180 | ATA SYSTEMS AND METHODS FOR ADVANCED DYNAMIC TRUST STORE MANAGEMENT SYSTEMS | February 2022 | July 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17636402 | DECENTRALIZED TECHNIQUES FOR VERIFICATION OF DATA IN TRANSPORT LAYER SECURITY AND OTHER CONTEXTS | February 2022 | January 2024 | Allow | 23 | 1 | 0 | No | No |
| 17650557 | COMPUTATIONALLY EFFICIENT THEFT DETECTION | February 2022 | July 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17650281 | Systems and Methods for Managing Permissions and Authorizing Access to and Use of Services | February 2022 | May 2024 | Allow | 27 | 0 | 1 | No | No |
| 17590272 | Function Execution Device and Communication Terminal | February 2022 | February 2023 | Allow | 12 | 1 | 0 | Yes | No |
| 17587558 | IMPLEMENTATION OF BIOMETRIC AUTHENTICATION | January 2022 | March 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17586297 | TERMINATION OF CONNECTIONS OVER A FORWARDING INTERFACE BETWEEN NETWORKS | January 2022 | July 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17579426 | KEY EXCHANGE SCHEMES WITH ADDRESSABLE ELEMENTS | January 2022 | November 2022 | Allow | 10 | 0 | 0 | Yes | No |
| 17541770 | TOKEN PROCESSING SYSTEM AND METHOD | December 2021 | February 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17449237 | Protecting Documents with Centralized and Discretionary Policies | September 2021 | May 2023 | Allow | 19 | 1 | 0 | Yes | No |
| 17474886 | STAND-ALONE NON-PUBLIC NETWORK AS SERVICE PROVIDER | September 2021 | March 2024 | Allow | 30 | 0 | 0 | Yes | No |
| 17472788 | SYSTEMS AND METHODS FOR DETECTING MALICIOUS ENTITIES USING WEAK PASSWORDS FOR UNAUTHORIZED ACCESS | September 2021 | October 2024 | Allow | 37 | 2 | 0 | No | No |
| 17469570 | FUNCTION EXECUTION DEVICE AND COMMUNICATION TERMINAL | September 2021 | December 2022 | Allow | 15 | 1 | 0 | Yes | No |
| 17411455 | DECENTRALIZED DIGITAL CONTENT DISTRIBUTION SYSTEM AND PROCESS USING BLOCK CHAINS AND ENCRYPTED PEER-TO-PEER NETWORK | August 2021 | March 2024 | Abandon | 31 | 1 | 0 | No | No |
| 17433246 | METHOD FOR CONTROLLING THE CONFIDENTIALITY OF COMMUNICATIONS WITH USERS | August 2021 | July 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17432790 | CONTENT ENCRYPTION | August 2021 | July 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17429939 | SYSTEM AND METHOD OF PROTECTING TRANSMITTED DATA IN THE NMEA PROTOCOLS IN VEHICLE CONTROL SYSTEMS | August 2021 | June 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17427967 | Encrypted Communication Between An Appliance and a Device on a Motor Vehicle | August 2021 | January 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17391424 | COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM, METHOD OF PROCESSING INFORMATION, AND INFORMATION PROCESSING DEVICE | August 2021 | May 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17390726 | CONFIGURABLE NETWORK SECURITY FOR NETWORKED ENERGY RESOURCES, AND ASSOCIATED SYSTEMS AND METHODS | July 2021 | September 2022 | Allow | 14 | 0 | 0 | Yes | No |
| 17423579 | PREVENTING DATA MANIPULATION AND PROTECTING USER PRIVACY IN TELECOMMUNICATION NETWORK MEASUREMENTS | July 2021 | August 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17373306 | SECURE MONITORING USING BLOCK CHAIN | July 2021 | June 2023 | Allow | 24 | 2 | 0 | Yes | No |
| 17310008 | CONTROLLING USE OF DATA DETERMINED BY A RESOLVE-PENDING SPECULATIVE OPERATION | July 2021 | August 2024 | Allow | 37 | 2 | 0 | No | No |
| 17357067 | UNIFIED MULTI-DIE PHYSICAL UNCLONABLE FUNCTION | June 2021 | February 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17309528 | DETECTING ANOMALIES IN COMPUTER NETWORKS | June 2021 | September 2023 | Allow | 27 | 0 | 0 | No | No |
| 17337751 | METHOD AND APPARATUS FOR PREVENTING NETWORK ATTACK | June 2021 | August 2024 | Abandon | 38 | 2 | 0 | Yes | No |
| 17336179 | SECURED PROTECTION OF ADVERTISEMENT PARAMETERS IN A ZERO TRUST LOW POWER AND LOSSY NETWORK | June 2021 | September 2022 | Allow | 15 | 0 | 0 | No | No |
| 17296510 | TECHNIQUES FOR PREVENTING COLLUSION USING SIMULTANEOUS KEY RELEASE | May 2021 | October 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17321720 | METHOD, ELECTRONIC DEVICE, AND PROGRAM PRODUCT IMPLEMENTED AT AN EDGE SWITCH FOR DATA ENCRYPTION | May 2021 | January 2024 | Allow | 32 | 5 | 0 | Yes | Yes |
| 17239599 | PACKET WATERMARK WITH STATIC SALT AND TOKEN VALIDATION | April 2021 | July 2023 | Allow | 26 | 0 | 0 | Yes | No |
| 17233701 | CRYPTO PROCESSOR, METHOD OF OPERATING CRYPTO PROCESSOR, AND ELECTRONIC DEVICE INCLUDING CRYPTO PROCESSOR | April 2021 | September 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17229762 | AUTHORIZED REMOTE CONTROL DEVICE GESTURE CONTROL METHODS AND APPARATUS | April 2021 | October 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 17228603 | PROVISION OF A LEASE FOR STREAMING CONTENT | April 2021 | December 2023 | Allow | 32 | 3 | 0 | Yes | No |
| 17223886 | SYSTEMS AND METHODS FOR DYNAMICALLY ENCRYPTING REDIRECT REQUESTS | April 2021 | May 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17216349 | EXTENDING CLOUD-BASED VIRTUAL PRIVATE NETWORKS TO RADIO-BASED NETWORKS | March 2021 | July 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17278626 | SECURE MULTI-PARTY REACH AND FREQUENCY ESTIMATION | March 2021 | March 2023 | Allow | 24 | 0 | 0 | Yes | No |
| 17206423 | DETERMINISTIC SPARSE-TREE BASED CRYPTOGRAPHIC PROOF OF LIABILITIES | March 2021 | April 2023 | Allow | 25 | 3 | 0 | Yes | No |
| 17204267 | DEVICE MANAGEMENT IN POWER SYSTEMS USING MEDIA ACCESS CONTROL SECURITY (MACSEC) | March 2021 | June 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17187940 | ESTABLISHING TRUST BETWEEN TWO DEVICES FOR SECURE PEER-TO-PEER COMMUNICATION | March 2021 | June 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17249114 | MANAGEMENT OF NETWORK INTERCEPT PORTALS FOR NETWORK DEVICES WITH DURABLE AND NON-DURABLE IDENTIFIERS | February 2021 | August 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 17178229 | CODE TRACKING AND IDENTIFICATION | February 2021 | October 2023 | Abandon | 32 | 2 | 0 | No | No |
| 17177257 | ATTRIBUTE-BASED FIREWALL RULE ENFORCEMENT | February 2021 | December 2024 | Abandon | 46 | 5 | 0 | Yes | No |
| 17173547 | ELECTRONIC SYSTEM FOR IDENTIFYING FAULTY CODE AND VULNERABILITIES IN SOFTWARE PROGRAMS USING LINKED EVALUATION TOOLS | February 2021 | October 2023 | Allow | 32 | 0 | 0 | Yes | No |
| 17153080 | EXTENDED TRUST FOR ONBOARDING | January 2021 | August 2022 | Allow | 18 | 0 | 0 | No | No |
| 17152043 | SYSTEM FUNCTIONALITY ACTIVATION USING DISTRIBUTED LEDGER | January 2021 | June 2023 | Allow | 29 | 2 | 0 | Yes | No |
| 17151142 | PERFORMING CYBERSECURITY OPERATIONS BASED ON IMPACT SCORES OF COMPUTING EVENTS OVER A ROLLING TIME INTERVAL | January 2021 | February 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17258572 | Multi-X Key Chaining for Generic Bootstrapping Architecture (GBA) | January 2021 | June 2023 | Allow | 30 | 1 | 0 | No | No |
| 17138650 | Secure Data Analytics Sampling within a 5G Virtual Slice | December 2020 | January 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17133526 | MECHANISM TO PROVIDE CUSTOMER VCN NETWORK ENCRYPTION USING CUSTOMER-MANAGED KEYS IN NETWORK VIRTUALIZATION DEVICE | December 2020 | July 2023 | Allow | 31 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner SHEPPERD, ERIC W.
With a 17.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 21.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner SHEPPERD, ERIC W works in Art Unit 2492 and has examined 536 patent applications in our dataset. With an allowance rate of 82.6%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.
Examiner SHEPPERD, ERIC W's allowance rate of 82.6% places them in the 49% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by SHEPPERD, ERIC W receive 1.65 office actions before reaching final disposition. This places the examiner in the 45% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by SHEPPERD, ERIC W is 30 months. This places the examiner in the 41% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +31.3% benefit to allowance rate for applications examined by SHEPPERD, ERIC W. This interview benefit is in the 82% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 32.3% of applications are subsequently allowed. This success rate is in the 60% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 14.2% of cases where such amendments are filed. This entry rate is in the 9% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 35.3% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 32% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 54.1% of appeals filed. This is in the 20% percentile among all examiners. Of these withdrawals, 45.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 70.0% are granted (fully or in part). This grant rate is in the 87% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.9% of allowed cases (in the 67% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 1.4% of allowed cases (in the 60% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.