Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 17257258 | METHOD AND APPARATUS FOR MANAGING CLOUD SERVICES USING SMART CONTRACTS AND BLOCKCHAINS IN A FEDERATION OF CLOUD PROVIDERS | December 2020 | November 2023 | Allow | 35 | 2 | 0 | Yes | No |
| 17137150 | SYSTEMS AND METHODS FOR AUTOMATED FIREWALL PROVISIONING FOR VIRTUAL MACHINES | December 2020 | October 2023 | Allow | 34 | 2 | 0 | No | No |
| 17127995 | Multi-Chamber Hosted Computing Environment For Collaborative Development Between Untrusted Partners | December 2020 | June 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 17119068 | Secure End-to-End Deployment of Workloads in a Virtualized Environment Using Hardware-Based Attestation | December 2020 | July 2023 | Allow | 31 | 1 | 0 | Yes | No |
| 17110391 | SECURE VIRTUAL MACHINE SOFTWARE MANAGEMENT | December 2020 | September 2023 | Allow | 34 | 2 | 0 | Yes | No |
| 17056432 | LEARNING METHOD, LEARNING DEVICE, AND LEARNING PROGRAM | November 2020 | March 2024 | Allow | 40 | 2 | 0 | No | No |
| 17091323 | METHOD FOR SECURING A DATA EXCHANGE IN A DISTRIBUTED INFRASTRUCTURE | November 2020 | March 2024 | Allow | 41 | 1 | 1 | Yes | No |
| 17083653 | Computer Security and Methods of Use Thereof | October 2020 | July 2024 | Allow | 44 | 4 | 0 | Yes | No |
| 17043864 | SYSTEM FOR STRUCTURING OBJECTS FOR OPERATION IN SOFTWARE ENVIRONMENTS AND METHODS FOR ITS IMPLEMENTATION | September 2020 | May 2024 | Abandon | 44 | 2 | 0 | No | No |
| 17021428 | Container Escape Detection Method, Apparatus, and System, and Storage Medium | September 2020 | January 2024 | Allow | 40 | 3 | 0 | No | No |
| 16943264 | Firewall Configuration Method and Apparatus and Packet Sending Method and Apparatus | July 2020 | May 2024 | Allow | 46 | 2 | 1 | Yes | No |
| 16939330 | HYPERCALL AUTHENTICATION IN A GUEST-ASSISTED VIRTUAL MACHINE INTROSPECTION (VMI) IMPLEMENTATION | July 2020 | August 2023 | Allow | 36 | 2 | 0 | No | No |
| 16938989 | SYSTEM AND METHOD FOR USING PRIVATE NATIVE SECURITY GROUPS AND PRIVATE NATIVE FIREWALL POLICY RULES IN A PUBLIC CLOUD | July 2020 | August 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16936570 | SECURING A PROVABLE RESOURCE POSSESSION | July 2020 | November 2023 | Allow | 40 | 2 | 0 | No | No |
| 16932259 | SYSTEMS AND METHODS FOR A WEARABLES-BASED INTERNET-OF-THINGS SERVICE IN AN EDGE-COMPUTED BLOCKCHAIN NETWORK | July 2020 | July 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16929240 | SYSTEMS AND METHODS FOR MICROSERVICE EXECUTION LOAD BALANCING IN VIRTUAL DISTRIBUTED LEDGER NETWORKS | July 2020 | March 2023 | Allow | 32 | 1 | 0 | No | No |
| 16929643 | SYSTEMS AND METHODS FOR DISTRIBUTED COMPLAINT ADDRESSING LEDGER IN VIRTUAL DISTRIBUTED LEDGER NETWORKS | July 2020 | April 2023 | Allow | 33 | 1 | 0 | No | No |
| 16946985 | SECURELY PROCESSING SHAREABLE DATA UTILIZING A VAULT PROXY | July 2020 | January 2023 | Allow | 30 | 1 | 0 | No | No |
| 16927557 | SYSTEMS AND METHODS FOR HYBRID SYNCHRONIZATION IN VIRTUAL DISTRIBUTED LEDGER NETWORKS | July 2020 | April 2023 | Allow | 33 | 2 | 0 | No | No |
| 16927495 | SYSTEMS AND METHODS FOR ASYNCHRONOUS DELAYED UPDATES IN VIRTUAL DISTRIBUTED LEDGER NETWORKS | July 2020 | April 2023 | Allow | 33 | 2 | 0 | No | No |
| 16960216 | METHOD, SERVER AND SYSTEM FOR SECURING AN ACCESS TO DATA MANAGED BY AT LEAST ONE VIRTUAL PAYLOAD | July 2020 | August 2023 | Allow | 38 | 1 | 0 | No | No |
| 16913346 | LINK-LAYER AUTHENTICATION FOR LEGACY NETWORK NODES USING A REMOTE NETWORK ACCESS SERVER | June 2020 | January 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 16911400 | SAFE ENTROPY SOURCE FOR ENCRYPTED VIRTUAL MACHINES | June 2020 | December 2022 | Allow | 29 | 1 | 0 | No | No |
| 15930758 | SYSTEMS AND METHODS FOR SECURELY SHARING CONTEXT BETWEEN MEC CLUSTERS | May 2020 | November 2022 | Allow | 30 | 2 | 0 | Yes | No |
| 16762284 | DYNAMIC SECURITY POLICY | May 2020 | March 2023 | Allow | 34 | 2 | 0 | Yes | No |
| 16855658 | Computer Security and Methods of Use Thereof | April 2020 | June 2020 | Allow | 2 | 0 | 0 | No | No |
| 16753574 | COMPUTER SERVER DEVICE AND METHODS FOR INITIATING AND RUNNING A COMPUTER PROCESS | April 2020 | April 2024 | Allow | 49 | 3 | 0 | Yes | No |
| 16821529 | SYSTEMS AND METHODS FOR VIRTUAL DISTRIBUTED LEDGER NETWORKS | March 2020 | October 2022 | Allow | 31 | 1 | 0 | No | No |
| 16812556 | MANAGEMENT OF SOFTWARE LICENSES FOR DEPLOYED IMAGES | March 2020 | February 2023 | Allow | 35 | 2 | 0 | No | No |
| 16642701 | Automation and/or Communications Appliance and Method for Checking Datagrams Transmitted in An Industrial Automation System | February 2020 | August 2024 | Abandon | 53 | 2 | 0 | No | Yes |
| 16791644 | METHOD AND SYSTEM FOR SINGLE SIGN-ON AUTHENTICATION | February 2020 | August 2022 | Allow | 30 | 1 | 0 | No | No |
| 16787353 | AUTOMATED AND AUDITABLE FRAMEWORK TO CONTROL SOFTWARE COMPONENT CHANGES IN AN APPLICATION BUILD PROCESS | February 2020 | September 2022 | Allow | 31 | 1 | 0 | Yes | No |
| 16784225 | PROJECT-BASED PERMISSION SYSTEM | February 2020 | October 2022 | Allow | 32 | 1 | 0 | Yes | No |
| 16742972 | ENCRYPTING DATA USING AN ENCRYPTION PATH AND A BYPASS PATH | January 2020 | January 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16737974 | CREATION AND EXECUTION OF SECURE CONTAINERS | January 2020 | August 2022 | Allow | 31 | 1 | 0 | Yes | No |
| 16714838 | RECEIVE-SIDE PROCESSING FOR ENCAPSULATED ENCRYPTED PACKETS | December 2019 | September 2022 | Allow | 33 | 2 | 0 | Yes | No |
| 16591348 | DECRYPTED PACKET PADDING REMOVAL | October 2019 | May 2022 | Allow | 31 | 1 | 0 | No | No |
| 16576630 | METHOD AND APPARATUS FOR ENABLING PUBLIC KEY INFRASTRUCTURE IN THE GENERIC CLOUD ENVIRONMENT AND THE NETWORK FUNCTION | September 2019 | September 2022 | Allow | 36 | 1 | 0 | Yes | No |
| 16568846 | METHOD FOR SECURE STORAGE, IN A NETWORK, OF A CONTAINER IMAGE IN A CONTAINER REGISTRY | September 2019 | June 2022 | Allow | 33 | 2 | 0 | Yes | No |
| 16566469 | BLOCKCHAIN-BASED CONTAINER IMAGE REGISTRY | September 2019 | May 2022 | Allow | 32 | 1 | 0 | Yes | No |
| 16553491 | DETERMINING BIOMETRIC AUTHENTICATION BIT STRING RELIABILITY | August 2019 | June 2022 | Allow | 33 | 2 | 0 | Yes | No |
| 16549861 | DATA MIGRATION METHOD AND APPARATUS | August 2019 | February 2022 | Allow | 30 | 1 | 0 | No | No |
| 16532930 | Systems and Methods for Integrating Third Party Services with a Digital Assistant | August 2019 | October 2021 | Allow | 26 | 2 | 0 | Yes | Yes |
| 16520290 | Access Control for Processor Registers based on Execution Domains | July 2019 | October 2023 | Allow | 51 | 5 | 0 | Yes | No |
| 16446703 | END-TO-END COMMUNICATION SECURITY | June 2019 | February 2022 | Abandon | 32 | 1 | 0 | Yes | No |
| 16410244 | SYSTEMS AND METHODS FOR MANAGEMENT OF SOFTWARE MASTER DATA | May 2019 | March 2022 | Abandon | 34 | 1 | 0 | No | No |
| 16392118 | DATABASE-AGNOSTIC SECURE STRUCTURED DATABASE CONNECTOR | April 2019 | February 2022 | Allow | 34 | 2 | 0 | Yes | No |
| 16366461 | CRYPTOGRAPHIC HARDWARE WATCHDOG | March 2019 | December 2021 | Allow | 33 | 1 | 0 | Yes | No |
| 16296334 | INCREMENTAL DECRYPTION AND INTEGRITY VERIFICATION OF A SECURE OPERATING SYSTEM IMAGE | March 2019 | April 2022 | Allow | 38 | 1 | 0 | Yes | No |
| 16307069 | METHOD FOR PREVENTING IMPERMISSIBLE ACCESS TO SOFTWARE APPLICATIONS IN FIELD DEVICES | December 2018 | August 2022 | Allow | 44 | 3 | 0 | Yes | No |
| 16207240 | Multi-dimensional progressive security for personal profiles | December 2018 | September 2021 | Allow | 33 | 1 | 0 | Yes | No |
| 16199100 | ENABLING ACCESS ACROSS PRIVATE NETWORKS FOR A MANAGED BLOCKCHAIN SERVICE | November 2018 | March 2022 | Allow | 40 | 2 | 0 | Yes | No |
| 16193848 | PROVIDING ASSERTIONS REGARDING ENTITIES | November 2018 | January 2022 | Allow | 38 | 2 | 0 | Yes | No |
| 16192124 | USING MULTIPLE SIGNATURES ON A SIGNED LOG | November 2018 | July 2021 | Allow | 32 | 1 | 0 | Yes | No |
| 16183742 | USER INTERFACE FOR PRIVATE INTERACTIONS BY USERS | November 2018 | October 2021 | Allow | 36 | 2 | 0 | Yes | No |
| 16176096 | Security Profiling of System Firmware and Applications from an OOB Appliance at a Differentiated Trust Boundary | October 2018 | April 2022 | Allow | 42 | 3 | 0 | No | No |
| 16175061 | FEDERATED SMART USER IDENTIFICATION WITH EMBEDDED COMPUTING SYSTEM ENTITLEMENTS | October 2018 | November 2021 | Allow | 36 | 2 | 0 | No | No |
| 16163484 | SYSTEM AND METHOD OF DECENTRALIZED MANAGEMENT OF DEVICE ASSETS OUTSIDE A COMPUTER NETWORK | October 2018 | December 2021 | Allow | 38 | 2 | 0 | Yes | Yes |
| 16157348 | TRACKING AND SECURING ELECTRONIC MESSAGES USING AN EMBEDDED IDENTIFIER | October 2018 | January 2023 | Allow | 52 | 2 | 0 | Yes | No |
| 16155385 | BLOCKCHAIN NOTIFICATION BOARD STORING BLOCKCHAIN RESOURCES | October 2018 | February 2022 | Allow | 40 | 3 | 1 | Yes | No |
| 16151822 | CAR SHARING SYSTEM | October 2018 | November 2021 | Allow | 38 | 3 | 0 | Yes | No |
| 16127532 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD | September 2018 | March 2021 | Abandon | 30 | 1 | 0 | No | No |
| 16118678 | TROLL ACCOUNT DETECTION | August 2018 | March 2022 | Allow | 42 | 4 | 0 | Yes | No |
| 16111690 | PERSONAL PRIVACY PROTOCOLS FOR SHARING MEDIA ON SOCIAL MEDIA PLATFORMS | August 2018 | October 2021 | Allow | 38 | 3 | 0 | Yes | No |
| 15998930 | Malicious social media account identification | August 2018 | March 2022 | Allow | 43 | 4 | 0 | Yes | No |
| 16038558 | METHOD FOR SETTING UP A COMMUNICATION CHANNEL BETWEEN A SERVER DEVICE AND A CLIENT DEVICE | July 2018 | March 2022 | Allow | 44 | 4 | 0 | Yes | No |
| 16036750 | SECURE COMMUNICATION FOR MEDICAL DEVICES | July 2018 | December 2021 | Allow | 41 | 4 | 0 | Yes | No |
| 16004412 | ADAPTIVE LOCKING IN ELASTIC THREADING SYSTEMS | June 2018 | July 2020 | Allow | 25 | 1 | 0 | No | No |
| 15961706 | SYSTEM AND METHOD FOR DETECTING ADVERSARIAL ACTIVITIES USING A COMPACT GRAPH REPRESENTATION | April 2018 | December 2022 | Allow | 56 | 3 | 0 | Yes | No |
| 15950821 | DEPLOYMENT OF SERVICES ACROSS CLUSTERS OF NODES | April 2018 | August 2020 | Abandon | 28 | 1 | 0 | No | No |
| 15945533 | Determination of Workload Distribution across Processors in a Memory System | April 2018 | November 2021 | Allow | 43 | 4 | 0 | No | No |
| 15944578 | CASCADE STREAMING BETWEEN DATA PROCESSING ENGINES IN AN ARRAY | April 2018 | January 2021 | Allow | 33 | 2 | 0 | Yes | No |
| 15928368 | INFORMATION PROCESSING SYSTEM AND COMPUTER-IMPLEMENTED METHOD | March 2018 | August 2020 | Abandon | 29 | 1 | 0 | Yes | No |
| 15928656 | SYSTEMS AND METHODS FOR VARIABLE RATE LIMITING OF SHARED RESOURCE ACCESS | March 2018 | September 2020 | Allow | 30 | 3 | 0 | Yes | No |
| 15890324 | REAL-TIME DISTRIBUTED JOB SCHEDULER WITH JOB SELF-SCHEDULING | February 2018 | December 2020 | Allow | 35 | 2 | 0 | No | No |
| 15886687 | COMPUTING ENVIRONMENT POOLING | February 2018 | January 2023 | Allow | 59 | 6 | 0 | Yes | Yes |
| 15883146 | ACCESSING HOST SERVICES FOR VIRTUAL GUEST OPERATING SYSTEMS | January 2018 | March 2020 | Allow | 25 | 2 | 0 | No | No |
| 15847389 | MULTI-CONSTRAINT DYNAMIC RESOURCE MANAGER | December 2017 | January 2021 | Allow | 37 | 3 | 0 | Yes | No |
| 15833255 | CLONING VIRTUALIZED FILE SERVERS | December 2017 | April 2021 | Allow | 40 | 3 | 0 | Yes | No |
| 15832370 | MULTISTEP AUTOMATED SCALING FOR CLUSTER CONTAINERS | December 2017 | August 2020 | Allow | 33 | 2 | 0 | Yes | No |
| 15826890 | ACCESSING HOST SERVICES FOR VIRTUAL GUEST OPERATING SYSTEMS | November 2017 | June 2020 | Allow | 30 | 2 | 0 | Yes | No |
| 15814304 | SERVICE FOR MANAGING QUANTUM COMPUTING RESOURCES | November 2017 | October 2021 | Allow | 47 | 5 | 0 | Yes | No |
| 15797702 | HETEROGENEOUS PARALLEL PRIMITIVES PROGRAMMING MODEL | October 2017 | September 2021 | Allow | 46 | 2 | 0 | No | Yes |
| 15724897 | MIGRATING VIRTUAL MACHINES BASED ON RELATIVE PRIORITY OF VIRTUAL MACHINE IN THE CONTEXT OF A TARGET HYPERVISOR ENVIRONMENT | October 2017 | December 2021 | Allow | 50 | 4 | 0 | Yes | Yes |
| 15672086 | MIGRATING THREADS BETWEEN ASYMMETRIC CORES IN A MULTIPLE CORE PROCESSOR | August 2017 | April 2020 | Allow | 33 | 2 | 0 | Yes | No |
| 15471408 | MANAGING SYSTEM RESOURCES IN CONTAINERS AND VIRTUAL MACHINES IN A COEXISTING ENVIRONMENT | March 2017 | August 2020 | Allow | 41 | 4 | 0 | Yes | No |
| 15456878 | METHOD AND SYSTEM FOR MANAGING USER DENSITY AT HOST SERVER IN VIRTUAL DESKTOP INFRASTRUCTURE | March 2017 | August 2020 | Allow | 41 | 3 | 0 | No | No |
| 15443458 | Virtual Machine Start Method and Apparatus | February 2017 | February 2020 | Allow | 35 | 2 | 0 | Yes | No |
| 15439576 | TASK EXECUTION FRAMEWORK USING IDEMPOTENT SUBTASKS | February 2017 | June 2020 | Abandon | 40 | 2 | 0 | Yes | No |
| 15366322 | AUTOMATED IMAGE LAYER BLACKLISTING IN THE CLOUD | December 2016 | February 2021 | Abandon | 51 | 4 | 0 | Yes | No |
| 15345075 | Surfacing Visual Representations of Universal Applications | November 2016 | January 2020 | Allow | 39 | 2 | 0 | Yes | No |
| 15308373 | PROCESSING REQUESTS RECEIVED ONLINE AND DIVIDING PROCESSING REQUESTS FOR BATCH PROCESSING | November 2016 | July 2020 | Allow | 44 | 3 | 0 | Yes | No |
| 15340841 | CLASS-SPECIFIC SPINLOCK PARAMETERS FOR INCREASED PERFORMANCE | November 2016 | July 2020 | Allow | 44 | 4 | 0 | Yes | No |
| 15340871 | HYPERVISOR CONVERSION | November 2016 | August 2020 | Allow | 45 | 4 | 0 | Yes | No |
| 15294799 | APPLICATION CONTINUOUS HIGH AVAILABILITY SOLUTION | October 2016 | February 2021 | Allow | 52 | 5 | 0 | Yes | No |
| 15304302 | ACCESS CONTROL AND CODE SCHEDULING | October 2016 | August 2020 | Allow | 46 | 4 | 0 | Yes | No |
| 15284647 | DYNAMIC TUNING OF A SIMULTANEOUS MULTITHREADING METERING ARCHITECTURE | October 2016 | October 2020 | Abandon | 48 | 6 | 0 | Yes | No |
| 15267643 | PROVISIONING BASED ON WORKLOAD DISPLACEMENT | September 2016 | March 2020 | Allow | 42 | 5 | 0 | Yes | No |
| 15139024 | COMPUTING DEVICE WITH RESOURCE MANAGER AND CIVILWARE TIER | April 2016 | April 2021 | Allow | 59 | 4 | 0 | No | No |
| 15133466 | SYSTEM AND METHOD FOR HARDWARE ACCELERATION FOR OPERATOR PARALLELIZATION WITH STREAMS | April 2016 | November 2020 | Allow | 55 | 6 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ASHLEY, BRUCE S.
With a 66.7% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner ASHLEY, BRUCE S works in Art Unit 2494 and has examined 118 patent applications in our dataset. With an allowance rate of 88.1%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 38 months.
Examiner ASHLEY, BRUCE S's allowance rate of 88.1% places them in the 69% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by ASHLEY, BRUCE S receive 2.77 office actions before reaching final disposition. This places the examiner in the 77% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by ASHLEY, BRUCE S is 38 months. This places the examiner in the 29% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +4.0% benefit to allowance rate for applications examined by ASHLEY, BRUCE S. This interview benefit is in the 28% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 26.5% of applications are subsequently allowed. This success rate is in the 47% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 18.8% of cases where such amendments are filed. This entry rate is in the 24% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 80.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 64% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 60.0% of appeals filed. This is in the 36% percentile among all examiners. Of these withdrawals, 33.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 33.3% are granted (fully or in part). This grant rate is in the 20% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.