Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 15734982 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, AND INFORMATION PROCESSING SYSTEM | March 2021 | March 2024 | Allow | 40 | 1 | 0 | No | No |
| 17134540 | DIGITAL SIGNATURE INJECTION FOR USER AUTHENTICATION ACROSS MULTIPLE INDEPENDENT SYSTEMS | December 2020 | August 2022 | Allow | 20 | 1 | 0 | Yes | No |
| 17254849 | ECDHE Key Exchange for Mutual Authentication Using a Key Server | December 2020 | December 2021 | Allow | 12 | 0 | 0 | Yes | No |
| 17126331 | SYSTEMS AND METHODS FOR ESTABLISHING A SECURE COMMUNICATION LINK IN AN ELECTRIC POWER DISTRIBUTION SYSTEM | December 2020 | January 2022 | Allow | 13 | 0 | 0 | Yes | No |
| 17124830 | Transparently Using Macaroons With Caveats to Delegate Authorization For Access | December 2020 | July 2022 | Allow | 19 | 1 | 0 | Yes | No |
| 17252773 | GEOGRAPHICALLY SECURE ACCESS TO CONTAINER CONTROLLER | December 2020 | November 2022 | Allow | 23 | 2 | 0 | Yes | Yes |
| 17122310 | PERFORMING CRYPTOGRAPHIC DATA PROCESSING OPERATIONS IN A MANNER RESISTANT TO EXTERNAL MONITORING ATTACKS | December 2020 | April 2023 | Allow | 28 | 2 | 0 | Yes | Yes |
| 17122273 | ACTIVATING DISPLAY AND PERFORMING ADDITIONAL FUNCTION IN MOBILE TERMINAL WITH ONE-TIME USER INPUT | December 2020 | September 2022 | Allow | 21 | 1 | 0 | No | No |
| 17111972 | DEVICE IDENTITY USING KEY AGREEMENT | December 2020 | November 2021 | Allow | 12 | 0 | 0 | No | No |
| 17110476 | CERTIFICATE MANAGEMENT SYSTEM AND CERTIFICATE MANAGEMENT METHOD | December 2020 | December 2022 | Allow | 24 | 2 | 0 | Yes | No |
| 17111401 | MANAGEMENT SYSTEM AND METHOD FOR SECURE SIGNING OF CERTIFICATES | December 2020 | April 2022 | Allow | 16 | 1 | 0 | No | No |
| 17107842 | HANDLING REQUESTS TO SERVICE RESOURCES WITHIN A SECURITY BOUNDARY USING A SECURITY GATEWAY INSTANCE | November 2020 | August 2022 | Allow | 21 | 1 | 0 | Yes | No |
| 17104695 | ANONYMOUS CREDENTIAL AUTHENTICATION SYSTEM AND METHOD THEREOF | November 2020 | April 2022 | Allow | 16 | 1 | 0 | Yes | No |
| 17105344 | Secure Controlled Access To Protected Resources | November 2020 | October 2022 | Allow | 23 | 1 | 0 | No | No |
| 17101145 | COMPLIANCE BOUNDARIES FOR MULTI-TENANT CLOUD ENVIRONMENT | November 2020 | December 2022 | Abandon | 24 | 2 | 0 | No | No |
| 16952014 | Filtering for Network Traffic to Block Denial of Service Attacks | November 2020 | July 2021 | Allow | 8 | 1 | 0 | Yes | No |
| 17090001 | AUTHENTICATION METHOD, AND RELATED DEVICE AND SYSTEM | November 2020 | September 2021 | Allow | 11 | 0 | 0 | Yes | No |
| 17078982 | SYMMETRIC BI-DIRECTIONAL POLICY BASED REDIRECT OF TRAFFIC FLOWS | October 2020 | February 2024 | Abandon | 40 | 1 | 0 | No | No |
| 17070684 | SECURE ENDPOINT AUTHENTICATION CREDENTIAL CONTROL | October 2020 | March 2022 | Allow | 17 | 1 | 0 | Yes | No |
| 17070034 | SYSTEMS AND METHODS FOR ONE-CLICK TWO-FACTOR AUTHENTICATION | October 2020 | June 2023 | Allow | 32 | 4 | 0 | Yes | No |
| 17025830 | METHODS AND APPARATUS TO FACILITATE END-USER DEFINED POLICY MANAGEMENT | September 2020 | July 2022 | Allow | 22 | 1 | 0 | Yes | No |
| 17012473 | METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED COMPUTER PROCESSING | September 2020 | April 2022 | Allow | 19 | 1 | 0 | Yes | No |
| 16977645 | SECURE REMOTE TOKEN RELEASE WITH ONLINE AUTHENTICATION | September 2020 | January 2022 | Allow | 17 | 1 | 0 | Yes | No |
| 17009426 | DISPLAY APPARATUS AND DISPLAY METHOD | September 2020 | November 2022 | Allow | 27 | 2 | 0 | No | No |
| 17008886 | MEDIA ACCESS CONTROL SECURITY (MACSEC) APPLICATION CRYPTOGRAPHIC FINGERPRINTING | September 2020 | September 2021 | Allow | 12 | 0 | 0 | Yes | No |
| 16991977 | DATA STORAGE METHOD, APPARATUS AND DEVICE, DATA VERIFICATION METHOD, APPARATUS AND DEVICE, AND MEDIUM | August 2020 | January 2024 | Allow | 41 | 1 | 0 | No | No |
| 16991259 | SYSTEMS FOR ENABLING TOKENIZED WEARABLE DEVICES | August 2020 | November 2023 | Allow | 39 | 5 | 0 | Yes | Yes |
| 16967589 | SECURE AUTHENTICATION DEVICE USING LIGHT AND RADIO SIGNALS | August 2020 | November 2023 | Allow | 39 | 1 | 0 | Yes | No |
| 16939389 | SELECTIVE ENCRYPTION OF DATA IN MOTION | July 2020 | September 2022 | Allow | 25 | 1 | 0 | Yes | No |
| 16965091 | CONTROL SYSTEM, CONTROL DETERMINATION DEVICE, AND CONTROL METHOD | July 2020 | September 2022 | Allow | 26 | 1 | 0 | No | No |
| 16964425 | METHOD AND SYSTEM FOR DISCLOSING AT LEAST ONE CRYPTOGRAPHIC KEY | July 2020 | July 2021 | Allow | 12 | 1 | 0 | Yes | No |
| 16962359 | EXTENSIBLE SYSTEM FOR AUTHENTICATED AND PROTECTED KEY AGREEMENT IN LARGE MESH LAYER 2 ETHERNET NETWORKS | July 2020 | June 2021 | Allow | 11 | 0 | 0 | Yes | No |
| 16926583 | PERSONAL DEVICE SECURITY USING CRYPTOCURRENCY WALLETS | July 2020 | February 2022 | Allow | 19 | 0 | 0 | Yes | No |
| 16960368 | ELECTRONIC DEVICE SHARING KEY WITH EXTERNAL ELECTRONIC DEVICE AND OPERATING METHOD FOR ELECTRONIC DEVICE | July 2020 | March 2022 | Allow | 20 | 2 | 0 | Yes | No |
| 16919676 | GRAPHICAL EVENT-BASED PASSWORD SYSTEM | July 2020 | August 2021 | Allow | 14 | 0 | 0 | Yes | No |
| 16916972 | ENCRYPTION OF PROTECTED DATA FOR TRANSMISSION OVER A WEB INTERFACE | June 2020 | November 2023 | Abandon | 40 | 4 | 0 | No | No |
| 16916456 | ESTABLISHING SECURE CONNECTIONS TO INSTANCES IN PRIVATE SUBNETS OF A CLOUD PROVIDER NETWORK | June 2020 | December 2021 | Allow | 18 | 0 | 0 | Yes | No |
| 16892435 | PERSONAL IDENTITY SYSTEM | June 2020 | September 2021 | Allow | 15 | 1 | 0 | Yes | No |
| 16882726 | SYSTEM AND METHOD FOR PROTECTING AGAINST E-MAIL-BASED CYBERATTACKS | May 2020 | March 2022 | Abandon | 22 | 1 | 0 | No | No |
| 16875340 | PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS | May 2020 | March 2022 | Allow | 22 | 0 | 0 | No | No |
| 16874577 | MACHINE SCANNING SYSTEM WITH DISTRIBUTED CREDENTIAL STORAGE | May 2020 | August 2021 | Allow | 16 | 0 | 0 | Yes | No |
| 16867953 | SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE DRIVEN AGENT TO AUTOMATE ASSESSMENT OF ORGANIZATIONAL VULNERABILITIES | May 2020 | August 2022 | Allow | 27 | 3 | 0 | Yes | No |
| 16866427 | SECURE SHARING AND COLLABORATIVE EDITING OF DOCUMENTS IN CLOUD BASED APPLICATIONS | May 2020 | January 2022 | Allow | 21 | 2 | 0 | Yes | No |
| 16853360 | REASSEMBLY FREE DEEP PACKET INSPECTION FOR PEER TO PEER NETWORKS | April 2020 | January 2021 | Allow | 9 | 0 | 0 | Yes | No |
| 16850151 | SYSTEMS AND METHODS FOR SECURE COMMUNICATION | April 2020 | May 2022 | Allow | 25 | 1 | 0 | No | No |
| 16649192 | TECHNOLOGIES FOR INTERNET OF THINGS KEY MANAGEMENT | March 2020 | April 2021 | Allow | 13 | 0 | 0 | Yes | No |
| 16819814 | SYSTEMS AND METHODS TO IDENTIFY A CERTIFICATE AUTHORITY WITHIN AN OFFLINE MANUFACTURING FACILITY | March 2020 | June 2021 | Allow | 15 | 0 | 0 | Yes | No |
| 16820618 | Rolling Security Platform | March 2020 | November 2020 | Allow | 8 | 0 | 0 | Yes | No |
| 16818474 | Performing Authenticated Actions Without Internet Connectivity | March 2020 | July 2022 | Allow | 28 | 2 | 0 | Yes | Yes |
| 16644951 | DIGITAL SIGNATURE METHOD, DEVICE, AND SYSTEM | March 2020 | November 2021 | Allow | 20 | 2 | 0 | No | No |
| 16808472 | THIRD PARTY CERTIFICATE MANAGEMENT FOR NATIVE MOBILE APPS AND INTERNET OF THINGS APPS | March 2020 | June 2021 | Allow | 15 | 0 | 0 | No | No |
| 16642736 | COMMUNICATION CONTROL SYSTEM AND COMMUNICATION CONTROL DEVICE | February 2020 | May 2022 | Allow | 26 | 1 | 0 | No | No |
| 16788247 | TRANSACTION SCHEDULING METHOD AND APPARATUS | February 2020 | April 2020 | Allow | 2 | 0 | 0 | No | No |
| 16787941 | NETWORKING APPLICATION FOR CONTROLLED-ACCESS-ESTABLISHMENT | February 2020 | April 2022 | Allow | 26 | 2 | 0 | Yes | No |
| 16775475 | SYSTEMS AND METHODS FOR USING MICRO ACCELERATIONS AS A BIOMETRIC IDENTIFICATION FACTOR | January 2020 | July 2021 | Allow | 18 | 0 | 0 | Yes | No |
| 16752680 | DECENTRALIZED SECURE DATA SHARING | January 2020 | April 2021 | Allow | 14 | 0 | 0 | No | No |
| 16748244 | SECURE MEMORY ARRANGEMENTS | January 2020 | November 2022 | Allow | 34 | 3 | 0 | No | No |
| 16739342 | COMPUTING SYSTEM AND METHODS PROVIDING SESSION ACCESS BASED UPON AUTHENTICATION TOKEN WITH DIFFERENT AUTHENTICATION CREDENTIALS | January 2020 | June 2022 | Allow | 29 | 3 | 0 | Yes | No |
| 16738722 | PERFECT FORWARD SECRECY (PFS) PROTECTED MEDIA ACCESS CONTROL SECURITY (MACSEC) KEY DISTRIBUTION | January 2020 | September 2021 | Allow | 20 | 1 | 0 | Yes | No |
| 16729748 | Video Coding With Embedded Motion | December 2019 | November 2020 | Allow | 10 | 0 | 0 | Yes | No |
| 16724299 | CYBER SECURITY ANONYMIZER | December 2019 | August 2022 | Allow | 32 | 1 | 0 | No | No |
| 16716211 | METHOD, COMPUTER PROGRAM PRODUCT AND APPARATUS FOR ENCRYPTING AND DECRYPTING DATA USING MULTIPLE AUTHORITY KEYS | December 2019 | October 2022 | Allow | 34 | 2 | 0 | Yes | No |
| 16716055 | DYNAMIC SECURITY ANALYSIS METHOD FOR CONTROL PLANE AND SYSTEM THEREFORE | December 2019 | May 2022 | Allow | 29 | 0 | 0 | No | No |
| 16713419 | SUPERVISORY CONTROL AND DATA ACQUISITION | December 2019 | June 2023 | Allow | 42 | 2 | 0 | No | No |
| 16699406 | DATA REENCRYPTION TECHNIQUES | November 2019 | November 2022 | Allow | 36 | 2 | 0 | Yes | No |
| 16698093 | STORAGE DEVICE PROVIDING HIGH SECURITY AND ELECTRONIC DEVICE INCLUDING THE STORAGE DEVICE | November 2019 | December 2021 | Allow | 25 | 2 | 0 | No | No |
| 16697068 | ACTIVATING DISPLAY AND PERFORMING ADDITIONAL FUNCTION IN MOBILE TERMINAL WITH ONE-TIME USER INPUT | November 2019 | September 2020 | Allow | 10 | 0 | 0 | Yes | No |
| 16689003 | APPARATUS AND METHOD FOR DEPLOYING FIREWALL ON SDN AND NETWORK USING THE SAME | November 2019 | March 2022 | Allow | 28 | 1 | 0 | Yes | No |
| 16686426 | UTILIZING NATURAL LANGUAGE PROCESSING TO AUTOMATICALLY PERFORM MULTI-FACTOR AUTHENTICATION | November 2019 | January 2021 | Allow | 14 | 1 | 0 | Yes | No |
| 16610705 | Access Control System | November 2019 | August 2022 | Allow | 33 | 1 | 0 | Yes | No |
| 16666335 | MALWARE DETECTION VERIFICATION AND ENHANCEMENT BY COORDINATING ENDPOINT AND MALWARE DETECTION SYSTEMS | October 2019 | September 2021 | Allow | 23 | 3 | 0 | Yes | No |
| 16661236 | AUTHENTICATION METHOD, AUTHENTICATION DEVICE, AUTHENTICATION TARGET DEVICE AND IMAGE FORMING APPARATUS | October 2019 | December 2020 | Allow | 14 | 0 | 0 | No | No |
| 16580857 | DEFAULT ACCOUNT AUTHENTICATION | September 2019 | April 2021 | Allow | 19 | 0 | 0 | Yes | No |
| 16565796 | METHOD AND ARRANGEMENT IN A TELECOMMUNICATION SYSTEM | September 2019 | March 2021 | Allow | 18 | 1 | 0 | Yes | No |
| 16546128 | Electronic Device Operation Using Remote User Biometrics | August 2019 | September 2021 | Allow | 25 | 1 | 0 | Yes | No |
| 16519330 | PERFORMING CRYPTOGRAPHIC DATA PROCESSING OPERATIONS IN A MANNER RESISTANT TO EXTERNAL MONITORING ATTACKS | July 2019 | October 2020 | Allow | 15 | 0 | 0 | No | No |
| 16452416 | TWO FACTOR AUTHENTICATION WITH AUTHENTICATION OBJECTS | June 2019 | April 2022 | Allow | 34 | 6 | 0 | Yes | No |
| 16450865 | TIME-BOUND SECURE ACCESS | June 2019 | April 2022 | Allow | 34 | 4 | 0 | Yes | Yes |
| 16438569 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CREDENTIAL PROVISIONING IN A MOBILE DEVICE PLATFORM | June 2019 | May 2022 | Allow | 35 | 2 | 0 | Yes | No |
| 16433264 | UTILIZING NATURAL LANGUAGE PROCESSING TO AUTOMATICALLY PERFORM MULTI-FACTOR AUTHENTICATION | June 2019 | July 2019 | Allow | 2 | 0 | 0 | No | No |
| 16418534 | GRAPHICAL EVENT-BASED PASSWORD SYSTEM | May 2019 | March 2020 | Allow | 10 | 2 | 0 | No | No |
| 16393864 | SYSTEMS AND METHODS FOR DETECTING AND ADDRESSING REMOTE ACCESS MALWARE | April 2019 | June 2020 | Allow | 14 | 2 | 0 | No | No |
| 16390448 | SYSTEMS AND METHODS FOR USING MICRO ACCELERATIONS AS A BIOMETRIC IDENTIFICATION FACTOR | April 2019 | November 2019 | Allow | 7 | 1 | 0 | No | No |
| 16386707 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE | April 2019 | December 2020 | Allow | 20 | 0 | 0 | Yes | No |
| 16363986 | DYNAMIC GUEST IMAGE CREATION AND ROLLBACK | March 2019 | September 2020 | Allow | 18 | 0 | 0 | Yes | No |
| 16361206 | ANTI-SPOOFING FACE ID SENSING BASED ON RETRO-REFLECTION | March 2019 | February 2022 | Allow | 35 | 0 | 0 | No | No |
| 16358167 | SYSTEM AND METHODS FOR ADAPTIVE MODEL GENERATION FOR DETECTING INTRUSION IN COMPUTER SYSTEMS | March 2019 | May 2021 | Abandon | 26 | 2 | 0 | No | Yes |
| 16353795 | PERSISTENT CROSS-SITE SCRIPTING VULNERABILITY DETECTION | March 2019 | January 2021 | Allow | 22 | 3 | 0 | Yes | No |
| 16352515 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ZERO ROUND TRIP SECURE COMMUNICATIONS BASED ON A NOISY SECRET WITH A REDUCED MESSAGE SIZE | March 2019 | October 2020 | Allow | 19 | 0 | 0 | Yes | No |
| 16287743 | DERIVED UNIQUE RANDOM KEY PER TRANSACTION | February 2019 | August 2021 | Allow | 30 | 1 | 0 | Yes | No |
| 16275895 | SYSTEM FOR MANAGING MULTIPLE LEVELS OF PRIVACY IN DOCUMENTS | February 2019 | December 2019 | Allow | 10 | 1 | 0 | No | No |
| 16272430 | INTELLIGENT TASK ASSIGNMENT AND AUTHORIZATION SYSTEMS & METHODS | February 2019 | March 2021 | Allow | 25 | 1 | 0 | Yes | No |
| 16268885 | METHOD FOR MANAGING INFORMATION USING TREE STRUCTURE BASED ON BLOCKCHAIN, SERVER AND TERMINAL USING THE SAME | February 2019 | September 2019 | Allow | 7 | 1 | 0 | Yes | No |
| 16266736 | SECURITY USING SELF-SIGNED CERTIFICATE THAT INCLUDES AN OUT-OF-BAND SHARED SECRET | February 2019 | September 2021 | Allow | 32 | 2 | 0 | Yes | No |
| 16262615 | SYSTEM AND METHOD FOR A PHYSICAL DEVICE AUTHORIZING DIGITAL COPIES | January 2019 | January 2020 | Allow | 11 | 0 | 0 | No | No |
| 16259867 | Video Coding With Embedded Motion | January 2019 | August 2019 | Allow | 7 | 0 | 0 | No | No |
| 16256807 | Application Execution Control Utilizing Ensemble Machine Learning For Discernment | January 2019 | August 2020 | Allow | 19 | 4 | 0 | No | No |
| 16248644 | PROOF-OF-APPROVAL DISTRIBUTED LEDGER | January 2019 | October 2022 | Allow | 45 | 1 | 1 | No | No |
| 16241857 | TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A TRUSTED DOMAIN | January 2019 | April 2021 | Allow | 27 | 1 | 0 | Yes | No |
| 16315879 | DISTRIBUTED TRANSACTION PROCESSING AND AUTHENTICATION SYSTEM | January 2019 | February 2023 | Abandon | 49 | 2 | 0 | Yes | Yes |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner GERGISO, TECHANE.
With a 23.1% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner GERGISO, TECHANE works in Art Unit 2494 and has examined 544 patent applications in our dataset. With an allowance rate of 88.2%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 25 months.
Examiner GERGISO, TECHANE's allowance rate of 88.2% places them in the 69% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by GERGISO, TECHANE receive 1.87 office actions before reaching final disposition. This places the examiner in the 41% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by GERGISO, TECHANE is 25 months. This places the examiner in the 78% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.
Conducting an examiner interview provides a +16.1% benefit to allowance rate for applications examined by GERGISO, TECHANE. This interview benefit is in the 55% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 32.8% of applications are subsequently allowed. This success rate is in the 71% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 27.5% of cases where such amendments are filed. This entry rate is in the 40% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 106.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 79% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 80.0% of appeals filed. This is in the 72% percentile among all examiners. Of these withdrawals, 48.1% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 32.4% are granted (fully or in part). This grant rate is in the 19% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.2% of allowed cases (in the 50% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.