Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19254764 | SYSTEM AND METHODS FOR UNFORGEABLE TELEMETRY IN THE PRESENCE OF CYBERATTACKS ON A COMPUTER PLATFORM | June 2025 | September 2025 | Allow | 2 | 0 | 0 | No | No |
| 19214041 | CYBERTHREAT HUNTING AND PROTECTION BASED ON CODIFIED INDICATORS OF BEHAVIOR | May 2025 | October 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19182219 | TECHNIQUES FOR ASSESSING EXPLOITATIONS IN A RUNTIME ENVIRONMENT | April 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19025047 | GRAPH MODELS OF RELATIONSHIPS BETWEEN DATA STORED IN BLOCKS ON DISTRIBUTED LEDGERS THAT ARE LEARNED THROUGH MACHINE LEARNING AND PLATFORMS FOR CREATING, CATALOGING, AND STORING THE SAME | January 2025 | February 2026 | Allow | 13 | 2 | 0 | No | No |
| 19020851 | INFORMATION NOTIFICATION METHOD AND INFORMATION NOTIFICATION DEVICE | January 2025 | June 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19013980 | MULTIMODAL DATA FUSION FOR CYBERSECURITY APPLICATIONS | January 2025 | July 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18888955 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888973 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888947 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18887807 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2024 | November 2024 | Allow | 2 | 1 | 0 | No | No |
| 18887697 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | September 2024 | December 2024 | Allow | 2 | 1 | 0 | No | No |
| 18887706 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | September 2024 | March 2025 | Allow | 6 | 2 | 0 | No | No |
| 18785419 | CLOUD DATA ATTACK SURFACE TRACKING USING GRAPH-BASED EXCESSIVE PRIVILEGE DETECTION | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18781121 | RISK EVENT DETECTION USING ACTIVITY AND GRAPH-BASED CONTEXT FOR CLOUD DATA SECURITY POSTURE MANAGEMENT | July 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18770937 | METHODS AND APPARATUS FOR WTRU-TO-WTRU RELAY DISCOVERY SECURITY AND PRIVACY | July 2024 | December 2024 | Allow | 5 | 1 | 0 | No | No |
| 18743120 | COMMUTATIVE ENCRYPTION AND WATERMARKING METHOD BASED ON CHAOTIC SYSTEM AND ZERO WATERMARK FOR VECTOR GEOSPATIAL DATA | June 2024 | September 2024 | Allow | 3 | 0 | 0 | No | No |
| 18737679 | IDENTITY-BY-DESCENT RELATEDNESS BASED ON FOCAL AND REFERENCE SEGMENTS | June 2024 | November 2024 | Allow | 5 | 1 | 0 | No | No |
| 18732546 | CLOUD SECURITY VISUAL DASHBOARD | June 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18670003 | SECURITY AND PRIVACY INSPECTION OF BIDIRECTIONAL GENERATIVE ARTIFICIAL INTELLIGENCE TRAFFIC USING A REVERSE PROXY | May 2024 | December 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18670032 | EFFICIENT TRAINING DATA GENERATION FOR TRAINING MACHINE LEARNING MODELS FOR SECURITY AND PRIVACY INSPECTION OF BIDIRECTIONAL GENERATIVE ARTIFICIAL INTELLIGENCE TRAFFIC | May 2024 | December 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18631478 | SMALL-FOOTPRINT ENDPOINT DATA LOSS PREVENTION | April 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18630359 | ENCODER, A DECODER AND CORRESPONDING METHODS USING FOR IBC MERGE LIST | April 2024 | February 2026 | Allow | 22 | 2 | 0 | No | No |
| 18622522 | METHOD TO INTELLIGENTLY MANAGE THE END TO END CONTAINER COMPLIANCE IN CLOUD ENVIRONMENTS | March 2024 | May 2025 | Allow | 14 | 1 | 0 | No | No |
| 18616585 | PERMISSIONS ENFORCEMENT BETWEEN FIRST AND THIRD PARTY PLATFORMS | March 2024 | March 2026 | Allow | 23 | 1 | 0 | No | No |
| 18617210 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | March 2024 | October 2024 | Allow | 6 | 2 | 0 | No | No |
| 18611419 | SYSTEM AND METHOD FOR PROCESSING RESTRICTION-BASED INTERACTIONS BY PERFORMING MULTIPLE ENTITY VALIDATIONS | March 2024 | July 2025 | Allow | 16 | 0 | 0 | No | No |
| 18693583 | MONITORING A COMPUTING SYSTEM WITH RESPECT TO A RECOVERY SCENARIO | March 2024 | February 2026 | Allow | 23 | 1 | 0 | No | No |
| 18607223 | TEXT-BASED TAGGING OF SECURITY DEFICIENCIES USING GENERATIVE MACHINE LEARNING MODELS | March 2024 | October 2025 | Allow | 19 | 0 | 0 | No | No |
| 18600321 | CONTAINER COMPUTE PLATFORM | March 2024 | January 2026 | Allow | 23 | 1 | 0 | No | No |
| 18594148 | Communication Policy Compliance Evaluator | March 2024 | November 2025 | Allow | 20 | 1 | 0 | No | No |
| 18588981 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | February 2024 | June 2024 | Allow | 4 | 1 | 0 | No | No |
| 18585106 | MULTI-LAYERED SECURE AUTHENTICATION PROTOCOL FOR SECURING DIGITAL TRANSACTIONS | February 2024 | November 2025 | Allow | 21 | 1 | 0 | No | No |
| 18585329 | SYMMETRICAL ISSUANCE AND DESTRUCTION SYSTEM FOR RIGHT AND OBLIGATION TOKENS AND METHOD THEREOF | February 2024 | July 2025 | Allow | 17 | 0 | 0 | No | No |
| 18583284 | METHOD AND APPARATUS FOR DYNAMIC DATA ENCRYPTION IN A COMMUNICATION SYSTEM WITH FORWARD SECRECY | February 2024 | October 2025 | Allow | 20 | 1 | 0 | No | No |
| 18581363 | SYSTEMS AND METHODS FOR GOVERNING USE RIGHTS OF DIGITAL ASSETS ACROSS HETEROGENEOUS VIRTUAL PLATFORMS | February 2024 | March 2026 | Allow | 24 | 1 | 0 | No | No |
| 18441626 | SYSTEMS AND METHODS OF INFORMATION SECURITY MONITORING WITH THIRD-PARTY INDICATORS OF COMPROMISE | February 2024 | January 2026 | Allow | 23 | 2 | 0 | No | No |
| 18432575 | SYSTEM AND METHODS FOR AUTOMATED COMPUTER SECURITY POLICY GENERATION AND ANOMALY DETECTION | February 2024 | August 2025 | Allow | 18 | 1 | 0 | No | No |
| 18423109 | AUTHORIZATION AND REFUSAL OF MODIFICATION, AND PARTIAL MODIFICATION ABILITY, OF A NETWORK IDENTIFIER | January 2024 | August 2025 | Allow | 19 | 2 | 0 | No | No |
| 18410707 | PROGRAMMABLE INTEGRATED CIRCUIT CONFIGURED AS A REMOTE TRUST ANCHOR TO SUPPORT MULTITENANCY | January 2024 | February 2026 | Allow | 25 | 2 | 0 | Yes | No |
| 18405460 | SYSTEM AND METHOD FOR MACHINE LEARNING BASED SECURITY INCIDENTS DETECTION AND CLASSIFICATION IN A BLOCKCHAIN ECOSYSTEM | January 2024 | January 2026 | Allow | 24 | 1 | 0 | No | No |
| 18394109 | SYSTEMS AND METHODS FOR IDENTIFYING MALICIOUS CRYPTOGRAPHIC ADDRESSES | December 2023 | August 2024 | Allow | 8 | 1 | 0 | No | No |
| 18394608 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | December 2023 | July 2024 | Allow | 6 | 2 | 0 | No | No |
| 18393487 | METHOD FOR USING GENERATIVE LARGE LANGUAGE MODELS (LLM) FOR CYBERSECURITY DECEPTION AND HONEYPOTS | December 2023 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18568330 | RISK ANALYSIS APPARATUS, METHOD, AND COMPUTER-READABLE MEDIUM | December 2023 | October 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18530502 | SUSPICIOUS GROUP DETECTION | December 2023 | August 2024 | Allow | 8 | 1 | 0 | No | No |
| 18498384 | MANAGEMENT CONTROLLER REGISTRATION USING A TRUSTED PLATFORM MODULE | October 2023 | August 2025 | Allow | 21 | 1 | 0 | No | No |
| 18557027 | DETECTION DEVICE, DETECTION METHOD, AND DETECTION PROGRAM | October 2023 | January 2026 | Allow | 27 | 1 | 0 | Yes | No |
| 18490288 | SYSTEMS AND METHODS FOR ENABLING PARALLELIZED VERIFICATION OF FORENSIC COPIES USING NON-PARALLELIZABLE ALGORITHMS | October 2023 | August 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18489174 | SYSTEMS AND METHODS FOR VULNERABILITY SCANNING OF DEPENDENCIES IN CONTAINERS | October 2023 | November 2025 | Allow | 25 | 1 | 0 | No | No |
| 18485175 | FINE-GRAINED AUTHORIZATION AS A SERVICE VIA RELATIONSHIP- BASED ACCESS CONTROL WITHIN A MULTI-TENANT SYSTEM | October 2023 | August 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18376213 | SECURELY PROCESSING A CONTINGENT ACTION TOKEN | October 2023 | June 2025 | Allow | 20 | 0 | 0 | No | No |
| 18374788 | Electronic Mail Verification | September 2023 | August 2024 | Allow | 10 | 1 | 0 | No | No |
| 18474974 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2023 | February 2024 | Allow | 5 | 2 | 0 | No | No |
| 18464515 | UNAUTHORIZED ACCESS DETECTION DEVICE AND UNAUTHORIZED ACCESS DETECTION METHOD | September 2023 | January 2026 | Allow | 29 | 1 | 0 | No | No |
| 18281235 | ANALYSIS CONDITION GENERATING APPARATUS, ANALYSIS SYSTEM, ANALYSIS CONDITION GENERATING PROGRAM, ANALYSIS PROGRAM, ANALYSIS CONDITION GENERATING METHOD, AND ANALYSIS METHOD | September 2023 | October 2025 | Allow | 25 | 1 | 0 | No | No |
| 18243536 | Smart wearable devices and system therefor | September 2023 | February 2026 | Allow | 29 | 2 | 0 | Yes | No |
| 18460415 | ARTIFICIAL INTELLIGENCE TECHNIQUES FOR IDENTIFYING IDENTITY MANIPULATION | September 2023 | October 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18456132 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT | August 2023 | September 2025 | Allow | 25 | 1 | 0 | No | No |
| 18452939 | SYSTEM AND METHOD TO QUANTIFY DOMAIN-CENTRIC RISK | August 2023 | January 2026 | Abandon | 29 | 1 | 0 | No | No |
| 18448636 | TRIGGERING AND DOWNSELECTION OF VOLATILE MEMORY SCANNING | August 2023 | March 2026 | Allow | 31 | 2 | 0 | Yes | No |
| 18230366 | Stateful Clustering Methods | August 2023 | February 2026 | Allow | 31 | 2 | 0 | Yes | No |
| 18356619 | METHOD FOR PROCESSING TRAFFIC IN PROTECTION DEVICE, AND PROTECTION DEVICE | July 2023 | August 2025 | Allow | 25 | 1 | 0 | No | No |
| 18223631 | SECURE METHODS AND SYSTEMS | July 2023 | June 2024 | Allow | 11 | 1 | 0 | No | No |
| 18347790 | METHODS AND SYSTEMS FOR IDENTIFYING PATTERNS IN DATA USING DELIMITED FEATURE-REGIONS | July 2023 | December 2024 | Allow | 17 | 2 | 0 | No | No |
| 18336881 | Method And Apparatus For Measuring Information System Device Integrity And Evaluating Endpoint Posture | June 2023 | June 2025 | Abandon | 24 | 2 | 0 | No | No |
| 18265441 | DETECTION DEVICE, DETECTION METHOD, AND DETECTION PROGRAM | June 2023 | July 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18329294 | TRACKING AND ANALYSES OF CONTENT PRESENTATION | June 2023 | June 2024 | Allow | 12 | 1 | 0 | No | No |
| 18034872 | END TO END ENCRYPTED BROWSE BASED AD HOC COMMUNICATION | May 2023 | July 2025 | Allow | 27 | 1 | 0 | No | No |
| 18308043 | METHOD AND APPARATUS FOR MALICIOUS FILE EXTENSION DETECTION | April 2023 | August 2025 | Allow | 28 | 1 | 0 | No | No |
| 18307046 | Machine-to-Machine Network Assisted Bootstrapping | April 2023 | August 2024 | Allow | 16 | 2 | 0 | No | No |
| 18186156 | AUTOMATED ZERO TRUST SECURITY VALIDATION | March 2023 | December 2025 | Abandon | 32 | 1 | 0 | No | No |
| 18181799 | SYSTEMS AND METHODS FOR AR/VR DEVICE IMPROVEMENTS | March 2023 | June 2025 | Abandon | 27 | 0 | 2 | Yes | No |
| 18148101 | DECENTRALIZED ACCESS CONTROL FOR AUTHORIZED MODIFICATIONS OF DATA USING A CRYPTOGRAPHIC HASH | December 2022 | August 2025 | Allow | 32 | 1 | 0 | No | No |
| 18087959 | BINDING CONFIGURATION STATE TO A BLOCKCHAIN | December 2022 | September 2025 | Abandon | 33 | 1 | 0 | No | No |
| 18084045 | LEARNED CONTROL FLOW MONITORING AND ENFORCEMENT OF UNOBSERVED TRANSITIONS | December 2022 | November 2025 | Allow | 35 | 1 | 0 | Yes | No |
| 18056996 | ENDPOINT ASSESSMENT DEDUPLICATION | November 2022 | July 2025 | Allow | 32 | 1 | 0 | No | No |
| 18053608 | QUANTUM SERVICE AUTHORIZATION MANAGEMENT FOR SECURITIZING 5G NETWORK SLICING | November 2022 | April 2025 | Allow | 29 | 1 | 0 | No | No |
| 17997517 | DEVICE PROTECTION METHOD, AND DEVICES | October 2022 | April 2025 | Allow | 29 | 1 | 0 | No | No |
| 17975978 | AUTHENTICATING A USER INTERACTING WITH A WIRELESS TELECOMMUNICATION NETWORK VIA A NON-INTERNET CONNECTED PHONE | October 2022 | February 2025 | Allow | 28 | 1 | 0 | No | No |
| 17976212 | AUTOMATIC PERIODIC PRE-SHARED KEY UPDATE | October 2022 | May 2025 | Allow | 31 | 2 | 0 | No | No |
| 18049909 | SYSTEM AND METHOD FOR COMBINING CYBER-SECURITY THREAT DETECTIONS AND ADMINISTRATOR FEEDBACK | October 2022 | November 2025 | Allow | 36 | 1 | 0 | No | No |
| 18048805 | SYSTEMS AND METHODS FOR PROVIDING PRIORITIZATION FOR DATA TRANSPORT SERVICES | October 2022 | February 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18048320 | CONTROLLING ACCESS TO SECURED DATA VIA TIMED FILTERING OF DATA | October 2022 | February 2025 | Allow | 28 | 1 | 0 | No | No |
| 17967220 | Authenticating Usage Data For Processing By Machine Learning Models | October 2022 | February 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17936135 | TOKENIZED INDUSTRIAL AUTOMATION SOFTWARE | September 2022 | January 2026 | Allow | 39 | 3 | 2 | Yes | No |
| 17955421 | METHOD AND SYSTEM FOR DISTRIBUTING KEYS | September 2022 | May 2025 | Allow | 31 | 2 | 0 | No | No |
| 17934979 | INDUSTRIAL BLOCKCHAIN ENABLED AUTOMATION CONTROL | September 2022 | February 2025 | Allow | 29 | 1 | 1 | No | No |
| 17899501 | METHODS AND SYSTEMS FOR ANONYMIZING GENOME SEGMENTS AND SEQUENCES AND ASSOCIATED INFORMATION | August 2022 | August 2024 | Abandon | 24 | 2 | 0 | No | No |
| 17897264 | COMMUNICATION APPARATUS | August 2022 | February 2025 | Allow | 30 | 1 | 0 | No | No |
| 17893728 | METHOD(S) AND SYSTEM(S) FOR UTILIZING AN INDEPENDENT SERVER TO FACILITATE SECURE EXCHANGE OF DATA | August 2022 | October 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17800840 | UTILIZATION MANAGEMENT DEVICE, UTILIZATION MANAGEMENT METHOD, AND PROGRAM | August 2022 | May 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 17888037 | SYSTEMS AND METHODS FOR ENCRYPTING DIALOGUE BASED DATA IN A DATA STORAGE SYSTEM | August 2022 | November 2024 | Allow | 27 | 1 | 0 | No | No |
| 17878103 | Methods and Systems for Classification of Sensitive Electronic Resources | August 2022 | March 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17877205 | UNIFIED PARKED DOMAIN DETECTION SYSTEM | July 2022 | November 2024 | Allow | 27 | 1 | 0 | No | No |
| 17876190 | IDENTITY-BASED POLICY ENFORCEMENT IN WIDE AREA NETWORKS | July 2022 | October 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17868576 | PROVIDING SINGLE-SIGN-ON FOR MULTIFACTOR AUTHENTICATION | July 2022 | November 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17868543 | PRE-OPERATING SYSTEM EMBEDDED CONTROLLER HARDENING BASED ON OPERATING SYSTEM SECURITY AWARENESS | July 2022 | March 2025 | Allow | 32 | 3 | 0 | Yes | No |
| 17868295 | USER AUTHENTICATION IN A PREMISES SECURITY SYSTEM | July 2022 | January 2025 | Allow | 30 | 2 | 0 | No | No |
| 17787905 | METHOD AND SYSTEM FOR AUTHENTICATION AND AUTHORIZATION | June 2022 | September 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17841199 | GUIDED NAVIGATION OF ELECTRONIC DOCUMENTS | June 2022 | May 2025 | Allow | 35 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ABRISHAMKAR, KAVEH.
With a 26.7% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 27.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner ABRISHAMKAR, KAVEH works in Art Unit 2494 and has examined 471 patent applications in our dataset. With an allowance rate of 83.9%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.
Examiner ABRISHAMKAR, KAVEH's allowance rate of 83.9% places them in the 58% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by ABRISHAMKAR, KAVEH receive 2.13 office actions before reaching final disposition. This places the examiner in the 57% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by ABRISHAMKAR, KAVEH is 28 months. This places the examiner in the 68% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +12.0% benefit to allowance rate for applications examined by ABRISHAMKAR, KAVEH. This interview benefit is in the 48% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 31.6% of applications are subsequently allowed. This success rate is in the 65% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 35.0% of cases where such amendments are filed. This entry rate is in the 52% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 72.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 59% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 52.4% of appeals filed. This is in the 23% percentile among all examiners. Of these withdrawals, 36.4% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 45.9% are granted (fully or in part). This grant rate is in the 40% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 1.3% of allowed cases (in the 70% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.5% of allowed cases (in the 55% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.