Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19116114 | COMMUNICATION APPARATUS, METHOD, SYSTEM, DEVICE, MEDIUM, ENCRYPTION SYSTEM, AND SERVER | March 2025 | November 2025 | Allow | 8 | 1 | 0 | No | No |
| 19083748 | METHODS AND SYSTEMS FOR ENHANCING A CONTEXT FOR USE IN PROCESSING A USER REQUEST | March 2025 | January 2026 | Allow | 10 | 2 | 0 | No | No |
| 18927514 | SYSTEMS AND METHODS FOR CRYPTOGRAPHICALLY VERIFYING QUERIES | October 2024 | April 2025 | Allow | 6 | 1 | 0 | No | No |
| 18882373 | METHODS AND SYSTEMS FOR VERIFYING A USER AGENT | September 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18798689 | SYSTEM AND METHOD FOR CYBERSECURITY RISK MANAGEMENT | August 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18778536 | SYSTEM AND METHOD FOR PROVIDING CONTRACT SUPPORT SERVICE | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18768653 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | July 2024 | December 2025 | Abandon | 17 | 2 | 0 | No | No |
| 18634032 | DISTRIBUTED COMPUTER ARCHITECTURE FOR PROCESSING DATA | April 2024 | November 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18632273 | BATCH PRIVACY INFORMATION RETRIEVAL METHOD AND APPARATUS | April 2024 | August 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18429134 | Generative Artificial Intelligence Model Protection Using Prompt Blocklist | January 2024 | January 2026 | Allow | 23 | 3 | 0 | Yes | No |
| 18512212 | INTEGRATED CIRCUIT FOR PHYSICALLY UNCLONABLE FUNCTION AND METHOD OF OPERATING THE SAME | November 2023 | August 2025 | Allow | 21 | 0 | 0 | No | No |
| 18510681 | METHOD FOR PERFORMING SYSTEM TASK IN UNPRIVILEGED MODE AND ASSOCIATED ELECTRONIC DEVICE | November 2023 | March 2026 | Allow | 28 | 2 | 0 | No | No |
| 18448466 | MULTI-LEVEL MALWARE CLASSIFICATION MACHINE-LEARNING METHOD AND SYSTEM | August 2023 | February 2026 | Allow | 30 | 1 | 0 | No | No |
| 18366875 | MULTI-LEVEL MALWARE CLASSIFICATION MACHINE-LEARNING METHOD AND SYSTEM | August 2023 | May 2025 | Allow | 22 | 1 | 0 | No | No |
| 18352935 | DYNAMICALLY ENCRYPTING AND DECRYPTING APPLICATION DATA USING DYNAMICALLY LINKED INTERPOSER MODULES | July 2023 | February 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18195586 | ATTACK ANALYSIS DEVICE, ATTACK ANALYSIS METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM | May 2023 | August 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18296425 | SYSTEMS AND METHODS FOR SECURE AUTHENTICATION BETWEEN APPLICATION IN QUANTUM COMPUTING | April 2023 | February 2025 | Allow | 23 | 4 | 0 | Yes | No |
| 18194259 | DECENTRALIZED GOVERNANCE OF SHARED INFRASTRUCTURE | March 2023 | September 2025 | Abandon | 30 | 1 | 0 | No | No |
| 18126475 | Video and Image Recording For an Air Gapped System | March 2023 | January 2025 | Abandon | 21 | 1 | 0 | No | No |
| 18112941 | DECENTRALIZED DATABASE OPTIMIZATIONS | February 2023 | January 2026 | Allow | 35 | 1 | 0 | No | No |
| 18145666 | DETERMINATION OF DEVICES THAT ARE AVAILABLE FOR UNLOCK | December 2022 | April 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18069017 | SECURE COMPUTATION OF SHARED DATA INTERSECTIONS | December 2022 | July 2025 | Allow | 31 | 1 | 0 | No | No |
| 18079665 | DIRECTED FUZZING FOR VULNERABILITY DETECTION | December 2022 | June 2025 | Allow | 30 | 2 | 0 | Yes | No |
| 18060772 | MOBILE DEVICE HAVING MULTIPLE CORRESPONDING SENSORS | December 2022 | October 2025 | Abandon | 35 | 2 | 0 | No | No |
| 17920319 | ANONYMOUS DIGITAL IDENTITY DERIVED FROM INDIVIDUAL GENOME INFORMATION | October 2022 | December 2025 | Abandon | 38 | 2 | 0 | No | No |
| 17960382 | CERTIFICATE ENROLLMENT PROTOCOL FOR AN UNTRUSTWORTHY ELECTRONIC DEVICE | October 2022 | June 2025 | Abandon | 32 | 2 | 0 | No | No |
| 17954685 | SYSTEM AND METHOD FOR TIME-BASED CRYPTOGRAPHY | September 2022 | October 2023 | Abandon | 13 | 1 | 0 | No | No |
| 17885706 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD OF THE SAME | August 2022 | March 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 17885236 | ESTABLISHING TRUST BETWEEN APPLICATIONS IN A COMPUTING ENVIRONMENT | August 2022 | May 2025 | Allow | 34 | 1 | 0 | No | No |
| 17812116 | Tracking Subsea Telecommunications Asset Capacity and Spectrum | July 2022 | October 2024 | Allow | 27 | 1 | 0 | No | No |
| 17854492 | Software Upgrade Method and Apparatus | June 2022 | May 2025 | Allow | 34 | 2 | 0 | No | No |
| 17853215 | Security Token Provisioning for a Product | June 2022 | August 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17663123 | MEMORY SYSTEM SECURITY AND AUTHENTICATION USING ASYMMETRIC KEYS | May 2022 | June 2025 | Allow | 37 | 3 | 0 | Yes | No |
| 17661370 | CONTENT-BASED DEEP LEARNING FOR INLINE PHISHING DETECTION | April 2022 | November 2025 | Allow | 42 | 2 | 0 | Yes | No |
| 17731080 | SYSTEMS AND METHODS FOR CONTEXT-SWITCHING AUTHENTICATION OVER SHORT RANGE WIRELESS COMMUNICATION | April 2022 | March 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17711305 | SYSTEM AND METHOD FOR OBJECT RECOGNITION AND PRIVACY PRESERVATION | April 2022 | September 2025 | Allow | 42 | 2 | 0 | No | No |
| 17709674 | Medical Data Authentication System, Medical Data Authentication Method, and Computer Program Product Thereof | March 2022 | August 2024 | Abandon | 28 | 1 | 0 | No | No |
| 17700535 | SYSTEM FOR PROVIDING CHATBOT SERVICES IN INTEGRATED WAY | March 2022 | June 2024 | Allow | 27 | 1 | 0 | No | No |
| 17692458 | STORAGE DEVICE, HOST DEVICE AND DATA TRANSFER METHOD THEREOF | March 2022 | April 2025 | Allow | 37 | 1 | 0 | Yes | No |
| 17689798 | MULTIPLE AUTHORIZATION REQUESTS FROM A DATA STORAGE DEVICE | March 2022 | October 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17668163 | SYSTEMS AND METHODS FOR ISOLATED AND PROTECTED FILE SYSTEM AND DATA RESTORATION | February 2022 | September 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17580216 | ELECTRONIC DEVICE AND METHOD OF CONTROLLING REMOTE LOCKING OF EXTERNAL ELECTRONIC DEVICE BASED ON BLUETOOTH | January 2022 | June 2025 | Allow | 41 | 3 | 0 | Yes | No |
| 17555421 | FILE ENCRYPTION AND DECRYPTION METHOD AND ELECTRONIC DEVICE USING THE SAME | December 2021 | May 2025 | Abandon | 40 | 2 | 0 | No | No |
| 17644195 | COMMUNICATION NODE WITH SECURE CRYPTOGRAPHIC KEYS AND METHODS FOR SECURING THEREIN | December 2021 | September 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17615257 | AUTHENTICATION SYSTEM FOR ELECTRONIC DEVICE | November 2021 | June 2025 | Allow | 43 | 3 | 0 | No | No |
| 17615034 | METHODS, SYSTEMS, AND DEVICES FOR TRUSTED EXECUTION ENVIRONMENTS AND SECURE DATA PROCESSING AND STORAGE ENVIRONMENTS | November 2021 | December 2025 | Allow | 49 | 4 | 0 | Yes | No |
| 17614441 | GAS METER READING SYSTEM BASED ON NATIONAL CRYPTOGRAPHIC ALGORITHM AND GAS DATA TRANSMISSION METHOD THEREOF | November 2021 | November 2024 | Abandon | 36 | 2 | 0 | No | No |
| 17479182 | AUTHORIZATION SCOPE MANAGEMENT FOR LOW-CODE PROGRAMMING ENVIRONMENTS | September 2021 | December 2024 | Allow | 39 | 3 | 0 | Yes | No |
| 17479080 | Distributed Secure Content Inspection In Enterprise Networks | September 2021 | February 2025 | Allow | 40 | 3 | 0 | Yes | No |
| 17437220 | DYNAMIC WHITE BOX-BASED DATA PROCESSING METHOD, APPARATUS, AND DEVICE | September 2021 | June 2024 | Allow | 33 | 0 | 0 | No | No |
| 17467142 | PROTECTING CONFIDENTIALITY OF AIR-GAPPED LOGS | September 2021 | April 2024 | Abandon | 32 | 2 | 0 | No | No |
| 17410102 | ENCRYPTED FILE NAME METADATA IN A DISTRIBUTED FILE SYSTEM DIRECTORY ENTRY | August 2021 | November 2024 | Allow | 39 | 4 | 0 | Yes | No |
| 17428778 | DETERMINISTIC TRUSTED EXECUTION CONTAINER THROUGH MANAGED RUNTIME LANGUAGE METADATA | August 2021 | June 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17424960 | Implementation of Trusted Computing System Based on Master Controller of Solid-State Drive | July 2021 | November 2024 | Allow | 40 | 1 | 0 | Yes | No |
| 17372587 | INDICATING A TYPE OF SECURE BOOT TO ENDPOINT DEVICES BY A SECURITY PROCESSOR | July 2021 | February 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17358526 | CONCURRENT VOLUME AND FILE BASED INLINE ENCRYPTION ON COMMODITY OPERATING SYSTEMS | June 2021 | August 2024 | Abandon | 38 | 3 | 0 | No | No |
| 17356784 | ENCRYPTED DATA PROCESSING DESIGN INCLUDING CLEARTEXT REGISTER FILES | June 2021 | March 2024 | Allow | 33 | 4 | 0 | Yes | No |
| 17354494 | CRYPTOGRAPHIC PROCESSING METHOD, RELATED ELECTRONIC DEVICE AND COMPUTER PROGRAM | June 2021 | January 2024 | Allow | 30 | 0 | 0 | Yes | No |
| 17346323 | DATA QUERY AGAINST AN ENCRYPTED DATABASE | June 2021 | December 2023 | Allow | 30 | 2 | 0 | Yes | No |
| 17344358 | BOOT-SPECIFIC KEY ACCESS IN A VIRTUAL DEVICE PLATFORM | June 2021 | August 2023 | Allow | 26 | 2 | 0 | Yes | No |
| 17333578 | PROCESSING DATA PAGES UNDER GROUP-LEVEL ENCRYPTION | May 2021 | October 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17296453 | STORAGE OF NETWORK CREDENTIALS | May 2021 | June 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17288223 | METHODS, USER EQUIPMENT AND NETWORK NODE, FOR DETECTION OF COMMUNICATION WITH A NON-LEGITIMATE DEVICE | April 2021 | January 2025 | Abandon | 45 | 3 | 0 | No | No |
| 17224732 | Enhanced D3-Cold And Faster Recovery | April 2021 | June 2023 | Allow | 26 | 2 | 0 | Yes | No |
| 17214223 | SYSTEM AND METHOD FOR ENCRYPTING STORAGE MEDIUMS WITH AN ENCRYPTION CHIP | March 2021 | June 2023 | Allow | 27 | 3 | 0 | No | No |
| 17212522 | AUTHENTICATION IN AN UPDATE MODE OF A MOBILE DEVICE | March 2021 | May 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17211948 | UNSTRUCTURED DATA ACCESS CONTROL | March 2021 | July 2024 | Allow | 40 | 4 | 0 | Yes | No |
| 17207725 | SECURE DATA STORAGE DEVICE AND METHOD OF ENCRYPTION | March 2021 | March 2023 | Allow | 24 | 2 | 0 | Yes | No |
| 17199944 | INTEGRATED CIRCUIT FOR PHYSICALLY UNCLONABLE FUNCTION AND METHOD OF OPERATING THE SAME | March 2021 | August 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17250802 | SYSTEM AND METHOD FOR HANDLING ANONYMOUS BIOMETRIC AND/OR BEHAVIOURAL DATA | March 2021 | May 2024 | Allow | 39 | 1 | 0 | No | No |
| 17248886 | HIGH THROUGHPUT STORAGE ENCRYPTION | February 2021 | April 2023 | Allow | 26 | 2 | 0 | Yes | No |
| 17150478 | PROCESSING UNIT, ELECTRONIC DEVICE, AND SECURITY CONTROL METHOD | January 2021 | January 2024 | Allow | 36 | 3 | 0 | No | No |
| 17138552 | SECURE MEMORY SHARING | December 2020 | October 2025 | Allow | 58 | 4 | 0 | Yes | Yes |
| 17130467 | CYBERATTACK INFORMATION ANALYSIS PROGRAM, CYBERATTACK INFORMATION ANALYSIS METHOD, AND INFORMATION PROCESSING APPARATUS | December 2020 | June 2024 | Abandon | 42 | 2 | 0 | No | No |
| 17130989 | STORAGE DEVICE AND SOLID STATE DRIVE DEVICE WITH STRUCTURE FOR IMPROVING SECURITY PERFORMANCE AND REMOVING DATA, METHOD OF OPERATING THE SAME, AND DATA CENTER INCLUDING THE SAME | December 2020 | December 2024 | Allow | 48 | 3 | 0 | Yes | No |
| 17125300 | HYBRID PUBLIC-KEY AND PRIVATE-KEY ENCRYPTION SYSTEM | December 2020 | March 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17252412 | BLOCKCHAIN SYSTEM, BLOCKCHAIN MANAGEMENT APPARATUS, NETWORK CONTROL APPARATUS, METHOD AND PROGRAM | December 2020 | February 2024 | Abandon | 38 | 4 | 0 | No | No |
| 17111253 | SYSTEMS AND METHODS FOR EVALUATING SECURITY RISKS USING A MANUFACTURER-SIGNED SOFTWARE IDENTIFICATION MANIFEST | December 2020 | December 2022 | Allow | 24 | 2 | 0 | No | No |
| 17110043 | SYSTEMS AND METHODS FOR BARE-METAL OR PRE-BOOT USER-MACHINE AUTHENTICATION, BINDING, AND ENTITLEMENT PROVISIONING | December 2020 | April 2023 | Allow | 29 | 1 | 0 | No | No |
| 17109670 | METHOD FOR PERFORMING SEGMENTING LOCKING AND MERGING CONTROL OF ENCRYPTED DIGITAL ASSETS BASED ON TIME DIMENSION | December 2020 | January 2024 | Allow | 37 | 1 | 0 | No | No |
| 17054285 | Blockchain Based Access Control Using Time-Dependent Obfuscation of Access Tokens | November 2020 | January 2023 | Allow | 26 | 2 | 0 | No | No |
| 17051760 | CRYPTOGRAPHIC KEY DISTRIBUTION | October 2020 | October 2022 | Allow | 23 | 2 | 0 | Yes | No |
| 17083002 | PROTECTION OF A SECURED APPLICATION IN A CLUSTER | October 2020 | May 2023 | Allow | 31 | 3 | 0 | Yes | No |
| 17060756 | WATERFALL REQUEST FOR DECRYPTION | October 2020 | May 2022 | Allow | 19 | 2 | 0 | Yes | No |
| 17035389 | METHOD AND APPARATUS FOR STORING AND PROCESSING APPLICATION PROGRAM INFORMATION | September 2020 | November 2023 | Allow | 37 | 4 | 0 | Yes | No |
| 16976067 | SECURE VAULT SYSTEM FOR PRIVATE KEY STORAGE | August 2020 | March 2024 | Abandon | 42 | 1 | 0 | No | No |
| 16984239 | VERIFIABLE LABELS FOR MANDATORY ACCESS CONTROL | August 2020 | April 2023 | Allow | 32 | 2 | 0 | Yes | Yes |
| 16932698 | METHODS AND SYSTEMS FOR ENCRYPTING SHARED INFORMATION THROUGH ITS LIFECYCLE | July 2020 | February 2022 | Allow | 19 | 0 | 0 | Yes | No |
| 16962363 | HIGH AVAILABILITY SECURE NETWORK INCLUDING DUAL MODE AUTHENTICATION | July 2020 | November 2023 | Allow | 40 | 4 | 0 | Yes | No |
| 16894661 | Automatic Provisioning | June 2020 | January 2023 | Allow | 31 | 3 | 0 | Yes | No |
| 16890563 | SYSTEM AND METHOD FOR MANAGING TRUST AND WEARABLE DEVICE FOR USE THEREWITH | June 2020 | July 2022 | Allow | 26 | 1 | 0 | Yes | No |
| 16890878 | CRYPTOGRAPHIC SYSTEMS WITH VARIABLE LAYOUT CRYPTOGRAPHY | June 2020 | September 2022 | Allow | 28 | 1 | 0 | Yes | No |
| 16861767 | METHODS AND SYSTEMS FOR UTILIZING HARDWARE-SECURED RECEPTACLE DEVICES | April 2020 | October 2022 | Allow | 29 | 3 | 0 | Yes | No |
| 16819239 | INFORMATION MANAGEMENT SYSTEM AND METHOD FOR THE SAME | March 2020 | September 2023 | Allow | 42 | 3 | 0 | No | No |
| 16774513 | SYSTEMS AND METHODS FOR MONITORING ATTACKS TO DEVICES | January 2020 | April 2023 | Allow | 39 | 3 | 0 | Yes | No |
| 16740537 | VEHICLE CONTROL DEVICE, VEHICLE CONTROL DEVICE START-UP METHOD, AND RECORDING MEDIUM | January 2020 | January 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 16674909 | SECURE MODE SWITCHING IN NEURAL PROCESSOR CIRCUIT | November 2019 | August 2022 | Allow | 34 | 2 | 0 | Yes | No |
| 16674880 | METHOD OF VERIFYING INTEGRITY OF A PAIR OF CRYPTOGRAPHIC KEYS AND CRYPTOGRAPHIC DEVICE | November 2019 | November 2022 | Allow | 36 | 2 | 0 | No | No |
| 16673868 | RESILIENCY FOR MACHINE LEARNING WORKLOADS | November 2019 | October 2023 | Allow | 47 | 4 | 0 | Yes | No |
| 16673692 | UNIFIED DATA FABRIC FOR MANAGING DATA LIFECYCLES AND DATA FLOWS | November 2019 | August 2023 | Allow | 45 | 4 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner KONG, ALAN LINGQIAN.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner KONG, ALAN LINGQIAN works in Art Unit 2494 and has examined 68 patent applications in our dataset. With an allowance rate of 83.8%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 36 months.
Examiner KONG, ALAN LINGQIAN's allowance rate of 83.8% places them in the 58% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by KONG, ALAN LINGQIAN receive 2.32 office actions before reaching final disposition. This places the examiner in the 66% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by KONG, ALAN LINGQIAN is 36 months. This places the examiner in the 36% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +42.3% benefit to allowance rate for applications examined by KONG, ALAN LINGQIAN. This interview benefit is in the 89% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 39.6% of applications are subsequently allowed. This success rate is in the 90% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 32.3% of cases where such amendments are filed. This entry rate is in the 47% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 200.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 94% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 90% percentile among all examiners. Of these withdrawals, 50.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 150.0% are granted (fully or in part). This grant rate is in the 97% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 22% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.