Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18957307 | ARTIFICIAL INTELLIGENCE CHATBOT FOR DATA PLATFORM SECURITY ANALYSIS | November 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18945631 | METHOD AND SYSTEM FOR PRESERVING PRIVACY OF TELEMATIC DATA | November 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18938151 | ASSOCIATING DECENTRALIZED IDENTIFIERS WITH ONE OR MORE DEVICES | November 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18918795 | METHODS AND APPARATUS FOR VISUALIZATION OF MACHINE LEARNING MALWARE DETECTION MODELS | October 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18890942 | SYSTEMS AND METHODS FOR ORCHESTRATING APPLICATION USE WHILE PREVENTING UNAUTHORIZED DATA SHARING | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18886034 | CLASSIFYING A SOURCE OF A LOGIN ATTEMPT TO A USER ACCOUNT USING MACHINE LEARNING | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18827391 | METHODS AND SYSTEMS FOR ASSET RISK DETERMINATION AND UTILIZATION FOR THREAT MITIGATION | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18824228 | KEY MANAGEMENT METHOD AND RELATED DEVICE | September 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18842723 | REQUESTING A CERTIFICATE IN A DOCUMENTED MANNER USING A REGISTRATION POINT | August 2024 | March 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18794036 | Cyber Protection Automation with Secure Physical Vault | August 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18788296 | SECURED ONBOARDING OF TEMPORARILY TRANSFERRED ENDPOINT DEVICES | July 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18763615 | INTELLIGENT AND SECURE PACKET CAPTURES FOR CLOUD SOLUTIONS | July 2024 | November 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18753260 | SYSTEM AND METHOD FOR UPDATING ACCESS TOKENS IN AN INFORMATION PROCESSING APPARATUS | June 2024 | December 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18741748 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR USING SERVICE COMMUNICATION PROXY (SCP) TO OFFLOAD VERIFICATION OF CONSUMER NETWORK FUNCTION (NF) SECURITY CERTIFICATES | June 2024 | November 2025 | Allow | 17 | 0 | 0 | No | No |
| 18735142 | SYSTEM AND METHOD FOR EXECUTING MACHINE LEARNING MODEL INFERENCE | June 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18678718 | COMPUTER VIRUS INTERCEPTION METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT | May 2024 | September 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18662689 | DETECTING MATCHING CLIENT DEVICES BASED ON LOCATION DATA | May 2024 | August 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18647363 | SEAMLESS NETWORK CONFIDENTIALITY FOR A CONTAINERIZED APPLICATION ON EDGE INFRASTRUCTURE | April 2024 | September 2025 | Allow | 17 | 0 | 0 | No | No |
| 18634338 | SYSTEMS AND METHODS FOR PROVIDING SECURE SERVICES | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18617234 | APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION | March 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18693691 | THRESHOLD SECRET SHARE GENERATION FOR DISTRIBUTED SYMMETRIC CRYPTOGRAPHY | March 2024 | August 2025 | Allow | 17 | 0 | 0 | No | No |
| 18692242 | Methods and Apparatuses for Cyber Security Enhancement | March 2024 | October 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18588694 | SYSTEMS AND METHODS FOR MANAGING PRIVACY POLICY VIOLATIONS | February 2024 | February 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18439548 | METHODS AND SYSTEMS FOR IDENTITY VERIFICATION USING VOICE AUTHENTICATION | February 2024 | October 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18429892 | SYSTEMS AND METHODS FOR PAYMENT AUTHENTICATION | February 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18413449 | Secure DNS Using Delegated Credentials and Keyless SSL | January 2024 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18411993 | COMPUTER-IMPLEMENTED METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR FREQUENCY BASED OPERATIONS | January 2024 | November 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18410316 | CHAT DETECTION AND RESPONSE FOR ENTERPRISE DATA SECURITY | January 2024 | October 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18571877 | CONTAINER-BASED TASK EXECUTION METHOD AND APPARATUS | December 2023 | October 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18538056 | Secure Communications to Multiple Devices and Multiple Parties Using Physical and Virtual Key Storage | December 2023 | November 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18533973 | MEMBERSHIP PROOF DEVICE AND METHOD FOR ENSURING PRIVACY | December 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18527001 | IMAGE DISPLAY APPARATUS, MOBILE TERMINAL, AND IMAGE SYSTEM INCLUDING THE SAME | December 2023 | August 2025 | Allow | 21 | 0 | 0 | No | No |
| 18526832 | SAMPLE CLASSIFICATION USING NATURAL LANGUAGE PROCESSING MODELS | December 2023 | May 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18565091 | SECURE COMPUTATION APPARATUS, SECURE COMPUTATION SYSTEM, SECURE COMPUTATION METHOD, AND PROGRAM | November 2023 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18513479 | SIP SERVER DEFENCE AGAINST DENIAL OF SERVICE | November 2023 | September 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18506647 | DYNAMIC ENCRYPTION MODEL | November 2023 | August 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18385783 | SYSTEM AND METHOD FOR ZERO-KNOWLEDGE FACIAL RECOGNITION | October 2023 | August 2025 | Allow | 22 | 1 | 0 | No | No |
| 18288555 | NESTED THRESHOLD SIGNATURES | October 2023 | May 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18489545 | FUNCTION POINTER PROTECTION | October 2023 | November 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18376717 | AUTOMATIC DATA OBFUSCATION | October 2023 | April 2025 | Allow | 19 | 0 | 0 | No | No |
| 18373811 | SYSTEM FOR REAL-TIME ASSESSMENT OF AUTHENTICITY OF A RESOURCE USING NON-FUNGIBLE TOKENS | September 2023 | May 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18473873 | MONITORING LICENSE CONSTRAINTS IN A CONTAINER ORCHESTRATION SYSTEM | September 2023 | July 2024 | Allow | 10 | 1 | 0 | No | No |
| 18472339 | MULTI-MODE VALIDATION OF MODIFICATIONS TO AN IHS | September 2023 | August 2025 | Allow | 23 | 1 | 0 | No | No |
| 18243802 | CREATING AGGREGATE NETWORK FLOW TIME SERIES IN NETWORK ANOMALY DETECTION SYSTEMS | September 2023 | June 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18462044 | DATA CLEAN ROOMS USING DEFINED ACCESS | September 2023 | November 2024 | Allow | 14 | 0 | 0 | Yes | No |
| 18238561 | INFORMATION MANAGEMENT METHOD, DISPLAY APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM THAT DISCLOSES BOTH A FIRST PARAMATER AND A SECOND PARAMATER OBTAINED BY IRREVERSIBY CONVERTING THE FIRST PARAMATER | August 2023 | November 2025 | Allow | 27 | 2 | 0 | No | No |
| 18452300 | COMPUTER-BASED SYSTEMS CONFIGURED TO DYNAMICALLY GENERATE AUTHENTICATION STEPS TO PERFORM AT LEAST ONE ACTION AND METHODS OF USE THEREOF | August 2023 | April 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18364235 | MAPPING A VULNERABILITY TO A STAGE OF AN ATTACK CHAIN TAXONOMY | August 2023 | September 2024 | Abandon | 13 | 1 | 0 | No | No |
| 18263736 | Personal Data Anonymization System (PDAS) with Customized Token | August 2023 | February 2026 | Allow | 31 | 3 | 0 | Yes | No |
| 18225630 | DETECTION OF DATA STORAGE DEVICE REMOVAL | July 2023 | May 2025 | Allow | 21 | 1 | 0 | Yes | No |
| 18261461 | APPARATUS FOR REINFORCING SECURITY OF MOBILE TRUSTED EXECUTION ENVIRONMENT | July 2023 | December 2025 | Allow | 29 | 0 | 0 | Yes | No |
| 18343640 | Location Aware Trusted Cloud Resource Provisioning | June 2023 | May 2025 | Allow | 22 | 0 | 0 | No | No |
| 18259043 | IDENTITY AND LOCATION CERTIFICATION BY MULTIFACTOR VERIFICATION BASED ON A CLOSED LOOP OF EXCHANGES | June 2023 | June 2025 | Allow | 24 | 1 | 0 | No | No |
| 18338719 | DATA INTEGRITY WITH TRUSTED CODE ATTESTATION TOKENS | June 2023 | February 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18212340 | GATEWAY SERVICE FOR APPLICATION PROGRAMMING INTERFACE IN EDGE DEVICE | June 2023 | October 2025 | Allow | 28 | 0 | 0 | No | No |
| 18211537 | METHOD AND APPARATUS TO REDUCE THE WINDOW FOR POLICY VIOLATIONS WITH MINIMAL CONSISTENCY ASSUMPTIONS | June 2023 | May 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18332079 | DEVICE AUTHORIZATION USING A DIRECTORY SYSTEM | June 2023 | April 2025 | Allow | 22 | 0 | 0 | No | No |
| 18331104 | DYNAMIC ENCRYPTION MODEL | June 2023 | August 2023 | Allow | 2 | 0 | 0 | No | No |
| 18038568 | INFORMATION PROCESSING METHOD AND APPARATUS FOR OBTAINING A DISPLAY RESULT BY A TERMINAL DEVICE | May 2023 | July 2025 | Allow | 26 | 0 | 0 | Yes | No |
| 18321375 | SYSTEMS AND METHODS OF IDENTITY AUTHENTICATION USING A CUSTOM VISUAL CODE | May 2023 | June 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18320402 | SYSTEMS AND METHODS FOR GATEWAY COMMUNICATIONS FOR DISTRIBUTED LEDGER SYSTEMS | May 2023 | December 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18318746 | SYSTEM AND METHOD FOR REMOTELY VERIFYING PHYSICAL SECURITY KEYS | May 2023 | September 2025 | Allow | 28 | 2 | 0 | No | No |
| 18317323 | SECURE eSIM SUBSCRIPTION TRANSFER | May 2023 | December 2024 | Allow | 20 | 0 | 0 | No | No |
| 18313104 | QUERYLESS DEVICE CONFIGURATION DETERMINATION-BASED TECHNIQUES FOR MOBILE DEVICE MANAGEMENT | May 2023 | February 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18141886 | GRANTING PERMISSIONS AND ACCESSES TO DEVICES AND THIRD PARTIES | May 2023 | April 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18309839 | Integrated-Circuit Memory Dump using Hardware Security Mechanism | May 2023 | September 2025 | Allow | 29 | 0 | 0 | Yes | No |
| 18306107 | METHOD OF SECURELY COMMUNICATING DATA | April 2023 | January 2025 | Allow | 21 | 0 | 0 | No | No |
| 18300121 | OBFUSCATING DATA IN CONTROLLER AREA NETWORK MESSAGES FOR TRANSPORT REFRIGERATION UNITS | April 2023 | December 2025 | Allow | 32 | 2 | 0 | No | No |
| 18028599 | METHOD AND SYSTEM FOR DETECTING A CYBER-ATTACK ON A MACHINE CONTROLLER | March 2023 | March 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18187074 | ACQUIRING CIPHER KEYS FOR POSITIONING SYSTEM INFORMATION BLOCKS | March 2023 | February 2026 | Allow | 35 | 1 | 0 | Yes | No |
| 18122675 | TECHNIQUES FOR VALIDATING CLOUD REGIONS BUILT AT A PREFAB FACTORY | March 2023 | June 2025 | Allow | 27 | 0 | 0 | Yes | No |
| 18118077 | System and method for automated system for triage of cybersecurity threats | March 2023 | January 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18022493 | A SYSTEM FOR AND METHOD OF DETECTING AN ANOMALY | February 2023 | August 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18107710 | Domain Specific Tokens for Reduced Token Generation | February 2023 | January 2025 | Allow | 23 | 0 | 0 | No | No |
| 18165269 | ENCRYPTING DISCOVERY MESSAGES | February 2023 | May 2025 | Allow | 27 | 2 | 0 | No | No |
| 18162131 | MECHANISMS TO PREDICT SYSTEM RESOURCE CONSUMPTION OF TRANSACTIONS | January 2023 | October 2024 | Allow | 21 | 0 | 0 | No | No |
| 18160502 | Secure Communications to Multiple Devices and Multiple Parties Using Physical and Virtual Key Storage | January 2023 | September 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 18157116 | SYSTEMS AND METHODS FOR DETECTING CROSS-SITE LEAKS AND RESTRICTING EXECUTION TIMING | January 2023 | April 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18015876 | IDENTIFICATION DEVICE, IDENTIFICATION SYSTEM, IDENTIFICATION METHOD, AND PROGRAM RECORDING MEDIUM USING A WALKING WAVEFORM OF A USER | January 2023 | January 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18088127 | CREATING AGGREGATE NETWORK FLOW TIME SERIES IN NETWORK ANOMALY DETECTION SYSTEMS | December 2022 | August 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18086548 | URL REWRITING | December 2022 | September 2023 | Allow | 9 | 1 | 0 | Yes | No |
| 18060504 | DATA CLEAN ROOMS USING DEFINED ACCESS IN TRUSTED EXECUTION ENVIRONMENT | November 2022 | December 2024 | Allow | 24 | 0 | 0 | No | No |
| 18058714 | SYSTEMS AND METHODS FOR PROVIDING SECURE ACCESS TO DIGITAL ASSETS | November 2022 | August 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17990289 | TECHNIQUES FOR CORRECTING ANOMALOUS ACTIVITY CAUSED BY SMART CONTRACTS | November 2022 | November 2024 | Allow | 24 | 1 | 0 | No | No |
| 18055561 | SYSTEMS AND METHODS FOR PAYMENT AUTHENTICATION | November 2022 | November 2023 | Allow | 12 | 0 | 0 | Yes | No |
| 17924897 | PRIVACY-PRESERVING CROSS-DOMAIN EXPERIMENTAL GROUP PARTITIONING AND MONITORING | November 2022 | August 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 17923574 | DEVICE FOR TRANSFORMING A DATASET WITH A SECRET KEY | November 2022 | December 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 18051457 | DATA CLEAN ROOMS USING DEFINED ACCESS | October 2022 | June 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 17975316 | USING ONE OR MORE NETWORKS TO ASSESS ONE OR MORE METRICS ABOUT AN ENTITY | October 2022 | January 2024 | Allow | 15 | 2 | 0 | Yes | No |
| 17918164 | AUTHENTICATION SYSTEM, TERMINAL, CONTROL METHOD FOR TERMINAL, AND STORAGE MEDIUM | October 2022 | September 2024 | Allow | 23 | 0 | 0 | No | No |
| 17938862 | Encoding / Decoding System and Method | October 2022 | March 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17912212 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM | September 2022 | July 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17942267 | STORAGE DEVICE, COMPUTING SYSTEM, AND METHOD FOR ACCESSING TO SECURE STORAGE AREA BASED ON ACCESS MODE | September 2022 | March 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17908564 | BOOTSTRAPPING ROOT OF TRUST FOR FEDERATED BLOCKCHAINS | September 2022 | March 2025 | Allow | 30 | 2 | 0 | No | No |
| 17893920 | AUTHENTICATION INTERFACE RENDERING AND MIRRORING IN A DISTRIBUTED ARCHITECTURE | August 2022 | May 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 17819689 | SYSTEMS AND METHODS FOR ORCHESTRATING APPLICATION USE WHILE PREVENTING UNAUTHORIZED DATA SHARING | August 2022 | June 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17888273 | INFORMATION HANDLING SYSTEM WITH OVERLAY OWNERSHIP CERTIFICATES FOR OWNERSHIP CHAINING | August 2022 | June 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17872084 | DATA PROCESSING SYSTEMS AND METHODS FOR PREVENTING EXECUTION OF AN ACTION DOCUMENTING A CONSENT REJECTION | July 2022 | May 2023 | Allow | 9 | 1 | 0 | Yes | No |
| 17814786 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM FOR DETECTING FALSIFICATION OF A MODULE | July 2022 | January 2024 | Allow | 18 | 2 | 0 | Yes | No |
| 17793911 | ASSOCIATING DECENTRALIZED IDENTIFIERS WITH ONE OR MORE DEVICES | July 2022 | August 2024 | Allow | 25 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LE, THANH T.
With a 66.7% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 55.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LE, THANH T works in Art Unit 2495 and has examined 210 patent applications in our dataset. With an allowance rate of 82.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.
Examiner LE, THANH T's allowance rate of 82.4% places them in the 55% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by LE, THANH T receive 1.88 office actions before reaching final disposition. This places the examiner in the 45% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by LE, THANH T is 32 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +31.8% benefit to allowance rate for applications examined by LE, THANH T. This interview benefit is in the 80% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 31.9% of applications are subsequently allowed. This success rate is in the 66% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 20.2% of cases where such amendments are filed. This entry rate is in the 25% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 50.0% of appeals filed. This is in the 17% percentile among all examiners. Of these withdrawals, 33.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 29.6% are granted (fully or in part). This grant rate is in the 17% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.