Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19287737 | CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING DOUBLE ENCRYPTION | July 2025 | October 2025 | Allow | 2 | 0 | 0 | No | No |
| 19270295 | Distributed Adversarial Attack Detection | July 2025 | November 2025 | Allow | 4 | 1 | 0 | No | No |
| 18920106 | METHOD AND APPARATUS TO DYNAMICALLY CONTROL FACIAL ILLUMINATION | October 2024 | January 2026 | Allow | 15 | 0 | 0 | Yes | No |
| 18901840 | SYSTEM AND METHOD OF INTEGRATED UNIQUE IDENTITY MANAGEMENT | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18820323 | ARTIFICIAL INTELLIGENCE (AI)-BASED SYSTEM FOR DETECTING MALWARE IN ENDPOINT DEVICES USING A MULTI-SOURCE DATA FUSION AND METHOD THEREOF | August 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18765759 | HARDWARE-BASED CONTROL OF PERIPHERAL DEVICES | July 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18766355 | OPERATIONS AND MAINTENANCE TECHNIQUES SUBSYSTEM FOR SECURE CLASSIFIED REMOTE ACCESS AS A SERVICE | July 2024 | March 2025 | Allow | 8 | 0 | 0 | Yes | No |
| 18762260 | DYNAMIC ACCESS CONTROL TO ELECTRONIC PATIENT RECORDS | July 2024 | January 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18756258 | SECURITY-ENHANCED STORAGE DEVICE | June 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18664372 | METHODS FOR CONTROLLING ACCESS TO DECENTRALIZED NETWORK RESOURCES AND DEVICES THEREOF | May 2024 | October 2025 | Allow | 17 | 0 | 0 | No | No |
| 18658745 | METHOD AND APPARATUS FOR CREATION AND USE OF DIGITAL IDENTIFICATION | May 2024 | August 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18657686 | IDENTITY AUTHENTICATION USING MOBILE CARRIER ACCOUNT INFORMATION AND CREDIT BUREAU INFORMATION | May 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18636243 | RESOURCE TRANSFER SETUP AND VERIFICATION | April 2024 | April 2025 | Allow | 12 | 1 | 0 | No | No |
| 18629204 | UPDATING A MACHINE LEARNING FRAUD MODEL BASED ON THIRD PARTY TRANSACTION INFORMATION | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18629085 | METHODS AND SYSTEMS FOR ENHANCING THE DETECTION OF SYNTHETIC SPEECH | April 2024 | November 2024 | Allow | 8 | 1 | 0 | No | No |
| 18627421 | METHOD AND APPARATUS FOR CREATING ENCODED DATA AND USE OF SAME FOR IDENTITY VERIFICATION | April 2024 | January 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18625985 | Systems and Methods Enabling the Quantumization of Data Articles into Quantum Data Parcels via a Data Parcel Exchange Platform and the Modification of Quantum Data Parcel Initial Internal Exchange Values upon being Received by Disparate Receivers from an Initial Controller | April 2024 | September 2025 | Allow | 18 | 0 | 0 | No | No |
| 18691219 | ADAPTIVE RECOVERY FOR DIGITAL IDENTITY PLATFORM | March 2024 | January 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18596498 | SYSTEM AND METHOD FOR VERIFYING UNIQUE USER IDENTIFICATION | March 2024 | August 2025 | Allow | 17 | 2 | 0 | No | No |
| 18594136 | ELECTRONIC DEVICE THAT PERFORMS USER AUTHENTICATION USING HOMOMORPHIC ENCRYPTION AND CONTROL METHOD THEREOF | March 2024 | July 2025 | Allow | 17 | 0 | 0 | No | No |
| 18584996 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | September 2025 | Allow | 19 | 3 | 0 | No | No |
| 18437676 | Neural Network Parameter Deployment Method, AI Integrated Chip, and Related Apparatus Thereof | February 2024 | December 2025 | Allow | 22 | 1 | 0 | No | No |
| 18291298 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM | January 2024 | December 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18419037 | DETECTION AND SURVIVAL METHOD AGAINST ADVERSARIAL ATTACKS ON AUTOMATED SYSTEMS | January 2024 | February 2026 | Allow | 25 | 0 | 1 | No | No |
| 18412365 | FACIAL RECOGNITION AUTHENTICATION SYSTEM AND METHOD | January 2024 | July 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18412206 | AUDITABLE MASTER SECRETS AND KEY VAULT | January 2024 | October 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18401953 | Method, System, and Computer Program Product for Preventing Transmission of Malicious Data | January 2024 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18575457 | ENCODED ANIMATED IMAGES AND METHODS OF GENERATING, DISPLAYING, AND READING ENCODED ANIMATED IMAGES, IN PARTICULAR FOR AUTHORIZING OPERATIONS ON ONLINE SERVICES | December 2023 | January 2026 | Allow | 25 | 1 | 0 | No | No |
| 18540308 | DYNAMIC COMMAND EXTENSION FOR A MEMORY SUB-SYSTEM | December 2023 | February 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18528308 | METHOD OF OPERATING A MEMORY CONTROLLER, A MEMORY CONTROLLER AND A MEMORY SYSTEM | December 2023 | October 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18515970 | VULNERABILITY PROFILING BASED ON TIME SERIES ANALYSIS OF DATA STREAMS | November 2023 | August 2025 | Allow | 21 | 1 | 0 | No | No |
| 18387600 | METHOD AND SYSTEM FOR DIGITAL HEALTH DATA ENCRYPTION | November 2023 | October 2024 | Allow | 11 | 0 | 0 | Yes | No |
| 18497683 | INTEGRATION OF A BLOCK CHAIN, MANAGING GROUP AUTHORITY AND ACCESS IN AN ENTERPRISE ENVIRONMENT | October 2023 | September 2024 | Allow | 11 | 0 | 0 | Yes | No |
| 18487961 | ASSIGNING IDENTIFIERS TO USER SESSIONS TO MANAGE SECURITY RISK WHEN MONITORING ACCESS OF A CLIENT DEVICE TO SERVICES | October 2023 | January 2026 | Abandon | 27 | 1 | 0 | No | No |
| 18471814 | ELECTRONIC DEVICE FOR CONTROLLING ACCESS TO DEVICE RESOURCE AND OPERATION METHOD THEREOF | September 2023 | November 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18466447 | Aggregating Certificate Authority Certificates For Authenticating Network Entities Located In Different Trust Zones | September 2023 | May 2025 | Allow | 20 | 0 | 0 | No | No |
| 18454801 | SINGLE SIGN-ON (SSO) AUTHENTICATION SYSTEM FOR ENABLING DIGITAL COMMUNICATION BETWEEN MULTIPLE ENTITIES | August 2023 | October 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18453108 | Mitigating Row Hammer Attacks Through Memory Address Encryption | August 2023 | January 2026 | Allow | 29 | 1 | 0 | Yes | No |
| 18233241 | METHOD AND APPARATUS FOR USER VERIFICATION | August 2023 | August 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18352951 | SYSTEMS AND METHODS FOR SELECTIVELY SCRAMBLING DATA | July 2023 | September 2024 | Allow | 14 | 0 | 0 | Yes | No |
| 18349830 | Key Version Management in Storage Devices | July 2023 | April 2025 | Allow | 21 | 0 | 0 | No | No |
| 18343776 | PRIVACY-PRESERVING MOTION ANALYSIS | June 2023 | March 2025 | Allow | 20 | 1 | 0 | No | No |
| 18342969 | SECURE ELEMENT AND ELECTRONIC DEVICE INCLUDING THE SAME | June 2023 | December 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18211983 | CRYPTOGRAPHIC KEY HIERARCHY | June 2023 | September 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18210867 | VEHICLE KEY PROGRAMMING SYSTEM AND METHOD | June 2023 | November 2024 | Allow | 17 | 1 | 0 | No | No |
| 18335409 | 3D Printer and Inventory Control and Distribution System for 3D Designs | June 2023 | August 2024 | Allow | 14 | 0 | 0 | Yes | No |
| 18331114 | MULTI-CHIP SECURE AND PROGRAMMABLE SYSTEMS AND METHODS | June 2023 | June 2025 | Allow | 25 | 0 | 0 | No | No |
| 18205968 | AUTHENTICATION SYSTEM | June 2023 | May 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18325242 | SOFTWARE UPDATE PROTECTION SYSTEM | May 2023 | April 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18200896 | OPERATIONS AND MAINTENANCE TECHNIQUES SUBSYSTEM FOR SECURE CLASSIFIED REMOTE ACCESS AS A SERVICE | May 2023 | April 2024 | Allow | 11 | 0 | 0 | Yes | No |
| 18201136 | OUT-OF-BAND MANAGEMENT CONTINUOUS MONITORING FOR SECURE CLASSIFIED REMOTE ACCESS AS A SERVICE | May 2023 | October 2024 | Allow | 17 | 1 | 0 | No | No |
| 18143861 | WIRELESS SYSTEM UTILIZING GENERIC WIRELESS DEVICES IN A CONTROLLED ENVIRONMENT | May 2023 | June 2024 | Allow | 14 | 0 | 0 | Yes | No |
| 18142529 | METHOD AND APPARATUS TO DYNAMICALLY CONTROL FACIAL ILLUMINATION | May 2023 | June 2024 | Allow | 14 | 0 | 0 | Yes | No |
| 18139264 | UNIFIED KEY MANAGEMENT | April 2023 | June 2025 | Allow | 26 | 0 | 0 | No | No |
| 18301940 | SYSTEMS AND METHODS FOR DYNAMIC QUEUE CONTROL USING MACHINE LEARNING TECHNIQUES | April 2023 | March 2024 | Allow | 11 | 0 | 0 | Yes | No |
| 18299894 | SYSTEMS AND METHODS FOR SELECTIVELY SENDING ENCRYPTION KEYS | April 2023 | August 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18133775 | UEFI VARIABLE STORAGE SYSTEM | April 2023 | April 2025 | Allow | 24 | 0 | 0 | No | No |
| 18129305 | STORAGE INLINE ENCRYPTION CIRCUIT | March 2023 | October 2025 | Allow | 31 | 1 | 0 | No | No |
| 18191492 | METHOD FOR BLOCKING EXTERNAL BOOT DEVICE, NON-TRANSIENT COMPUTER READABLE STORAGE MEDIUM, AND COMPUTER | March 2023 | March 2025 | Allow | 23 | 0 | 0 | No | No |
| 18127081 | METHOD AND APPARATUS FOR PROVIDING A HIGH SECURITY MODE IN A NETWORK | March 2023 | April 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18178349 | SECURELY ROTATING A SERVER CERTIFICATE | March 2023 | July 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18113392 | DISTRIBUTED NETWORK NODES DEFINING A DATABASE ACCESS GATEWAY | February 2023 | July 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18111774 | RESOURCE TRANSFER SETUP AND VERIFICATION | February 2023 | December 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 18147510 | FAST KEY ID SWITCHING VIA EXTENDED PAGING FOR CRYPTOGRAPHIC INTRA-PROCESS ISOLATION | December 2022 | March 2025 | Allow | 27 | 0 | 0 | Yes | No |
| 18089083 | ATTACK PREVENTION IN INTERNET OF THINGS NETWORKS | December 2022 | December 2023 | Allow | 12 | 0 | 0 | Yes | No |
| 18066955 | ENCRYPTION SYSTEM AND METHOD | December 2022 | April 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18063914 | UPDATING A MACHINE LEARNING FRAUD MODEL BASED ON THIRD PARTY TRANSACTION INFORMATION | December 2022 | December 2023 | Allow | 12 | 0 | 0 | Yes | No |
| 18075794 | PROTOCOLS FOR DECENTRALIZED NETWORKS | December 2022 | January 2025 | Allow | 25 | 1 | 0 | No | No |
| 17986103 | IDENTIFYING FRAUDULENT REQUESTS FOR CONTENT | November 2022 | November 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17972560 | METHODS AND SYSTEMS FOR PROVIDING VIRTUAL DESKTOP INFRASTRUCTURE VIA SECURE CLASSIFIED REMOTE ACCESS AS A SERVICE | October 2022 | February 2025 | Allow | 28 | 2 | 0 | No | No |
| 17971461 | METHODS AND APPARATUS TO ENCRYPT MEDIA FOR IDENTIFICATION | October 2022 | October 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17961693 | INTEGRATED CIRCUIT | October 2022 | July 2025 | Allow | 33 | 1 | 0 | No | No |
| 17961312 | DYNAMIC COMMAND EXTENSION FOR A MEMORY SUB-SYSTEM | October 2022 | September 2023 | Allow | 11 | 0 | 0 | Yes | No |
| 17949359 | Method, System, and Computer Program Product for Preventing Transmission of Malicious Data | September 2022 | September 2023 | Allow | 12 | 0 | 0 | Yes | No |
| 17823299 | INFORMATION PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT | August 2022 | August 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17884068 | Virtual private network (VPN)-as-a-service with delivery optimizations while maintaining end-to-end data security | August 2022 | December 2024 | Abandon | 29 | 2 | 0 | Yes | No |
| 17816249 | METHOD OF OPERATING STORAGE DEVICE AND METHOD OF OPERATING STORAGE SYSTEM USING THE SAME | July 2022 | March 2024 | Allow | 20 | 0 | 0 | Yes | No |
| 17874962 | SYSTEM AND METHOD FOR EFFICIENTLY OBTAINING INFORMATION STORED IN AN ADDRESS SPACE | July 2022 | January 2024 | Allow | 18 | 1 | 0 | No | No |
| 17872327 | ADAPTIVE ATTACK RESISTANT DISTRIBUTED SYMMETRIC ENCRYPTION | July 2022 | September 2023 | Allow | 14 | 0 | 0 | Yes | No |
| 17868828 | SANDBOX BASED TESTING AND UPDATING OF MONEY LAUNDERING DETECTION PLATFORM | July 2022 | September 2023 | Allow | 14 | 1 | 0 | No | No |
| 17859271 | ELECTRONIC MESSAGING EXCHANGE | July 2022 | July 2023 | Allow | 13 | 0 | 0 | Yes | No |
| 17855940 | METHOD FOR AUTOMATIC SIGNATURES GENERATION FROM A PLURALITY OF SOURCES | July 2022 | May 2025 | Allow | 34 | 1 | 0 | No | No |
| 17854911 | LOW LATENCY POST-QUANTUM SIGNATURE VERIFICATION FOR FAST SECURE-BOOT | June 2022 | June 2024 | Allow | 24 | 2 | 0 | Yes | No |
| 17809425 | OPEN SOURCE VULNERABILITY PREDICTION WITH MACHINE LEARNING ENSEMBLE | June 2022 | October 2023 | Allow | 15 | 1 | 0 | Yes | No |
| 17808830 | COMMUNICATION METHOD AND RELATED COMMUNICATION APPARATUS AND STORAGE MEDIUM | June 2022 | March 2025 | Allow | 32 | 0 | 0 | No | No |
| 17833056 | METHOD AND SYSTEM FOR DIGITAL HEALTH DATA ENCRYPTION | June 2022 | August 2023 | Allow | 14 | 0 | 0 | Yes | No |
| 17804083 | SYSTEM AND METHOD FOR INCREMENTAL ENCRYPTION | May 2022 | June 2024 | Allow | 24 | 1 | 0 | Yes | No |
| 17751394 | APPARATUS AND METHODS FOR CONTENT DELIVERY AND MESSAGE EXCHANGE ACROSS MULTIPLE CONTENT DELIVERY NETWORKS | May 2022 | April 2024 | Allow | 23 | 1 | 1 | Yes | No |
| 17746345 | MANAGEMENT OF ROOT KEY FOR SEMICONDUCTOR PRODUCT | May 2022 | September 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17745790 | ENCRYPTION OF MANAGEMENT FRAMES FOR SECURING LONG TRAINING FIELD SEQUENCE GENERATION AND SCHEME FOR TRANSMITTING SOUNDING SIGNAL INDICATIONS | May 2022 | June 2023 | Allow | 13 | 0 | 0 | No | No |
| 17737060 | COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, AND SYSTEM | May 2022 | September 2024 | Allow | 28 | 1 | 0 | No | No |
| 17729468 | BIOMETRIC REGISTRATION AND VERIFICATION DEVICE FOR AIRCRAFT SERVICE AND MAINTENANCE | April 2022 | December 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17715284 | IDENTIFYING AND USING DNS CONTEXTUAL FLOWS | April 2022 | November 2022 | Allow | 7 | 1 | 0 | Yes | No |
| 17710632 | EXPLOIT PREDICTIVE INTRUSION PROTECTION SYSTEM (EP-IPS) FOR DATA PACKET TRAFFIC ON DATA COMMUNICATION NETWORKS | March 2022 | April 2025 | Allow | 36 | 2 | 0 | No | No |
| 17701793 | SYSTEM AND METHOD FOR GENERATING AND MONITORING DYNAMIC IDENTIFIERS FOR DATA PROCESSING SECURITY | March 2022 | April 2024 | Allow | 24 | 0 | 0 | No | No |
| 17655864 | SYSTEM, A SERVER AND A METHOD FOR SECURELY STORING AND PROCESSING RAW DATA FROM A PLURALITY OF DIFFERENT DATA SOURCES | March 2022 | January 2024 | Allow | 22 | 0 | 0 | No | No |
| 17696081 | IDENTIFYING AND USING DNS CONTEXTUAL FLOWS | March 2022 | June 2023 | Allow | 15 | 0 | 0 | Yes | No |
| 17692440 | INTEGRATION OF A BLOCK CHAIN, MANAGING GROUP AUTHORITY AND ACCESS IN AN ENTERPRISE ENVIRONMENT | March 2022 | June 2023 | Allow | 15 | 0 | 0 | No | No |
| 17692930 | PAGING SUPPORT FOR ENCRYPTED GPU BUFFERS | March 2022 | November 2025 | Allow | 44 | 1 | 0 | Yes | No |
| 17654017 | Authentication System, and Program | March 2022 | March 2025 | Allow | 37 | 3 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ABEDIN, SHANTO.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner ABEDIN, SHANTO works in Art Unit 2494 and has examined 336 patent applications in our dataset. With an allowance rate of 94.3%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 28 months.
Examiner ABEDIN, SHANTO's allowance rate of 94.3% places them in the 83% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by ABEDIN, SHANTO receive 1.55 office actions before reaching final disposition. This places the examiner in the 29% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by ABEDIN, SHANTO is 28 months. This places the examiner in the 68% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +14.5% benefit to allowance rate for applications examined by ABEDIN, SHANTO. This interview benefit is in the 53% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 37.1% of applications are subsequently allowed. This success rate is in the 84% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 33.0% of cases where such amendments are filed. This entry rate is in the 48% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 111.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 79% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 87.5% of appeals filed. This is in the 81% percentile among all examiners. Of these withdrawals, 71.4% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 15.7% are granted (fully or in part). This grant rate is in the 9% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 3.0% of allowed cases (in the 79% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.6% of allowed cases (in the 57% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.