Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19287102 | SYSTEM AND METHOD FOR UTILIZING AN AI BROWSER AGENT IN IDENTITY DISCOVERY AND MANAGEMENT | July 2025 | November 2025 | Allow | 4 | 0 | 0 | No | No |
| 18823115 | INTEGRATED PRIVATE CLOUD AI PLATFORM | September 2024 | January 2026 | Allow | 17 | 0 | 0 | No | No |
| 18809959 | COMMUNICATION SYSTEM, SERVER, AND FUNCTION EXECUTING DEVICE | August 2024 | October 2025 | Allow | 14 | 0 | 0 | No | No |
| 18806918 | TECHNIQUES FOR JUST-IN-TIME CONTEXT BASED PERMISSION ACCESS OF COMPUTING RESOURCES | August 2024 | January 2026 | Allow | 17 | 2 | 0 | No | No |
| 18805624 | On-Demand Private Network Creation and Management | August 2024 | October 2025 | Allow | 14 | 0 | 0 | No | No |
| 18749324 | RISK ASSESSMENT FOR NETWORK ACCESS CONTROL THROUGH DATA ANALYTICS | June 2024 | February 2026 | Allow | 19 | 1 | 0 | No | No |
| 18670823 | AUTHENTICATED ENCRYPTION APPARATUS, AUTHENTICATED DECRYPTION APPARATUS, AUTHENTICATED ENCRYPTION SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | May 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18660250 | DETECTING APPARATUS OF AVOID TYPE MALICIOUS CODE FOR VIRTUALIZATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE USING INTEGRATED FEATURES | May 2024 | October 2025 | Allow | 17 | 0 | 0 | No | No |
| 18628595 | ENCRYPTED FLOW OF SIM DATA BETWEEN REGIONS AND EDGE NETWORKS | April 2024 | April 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18613814 | REMOTE AUTHENTICATION CREDENTIAL EXCHANGE | March 2024 | February 2026 | Allow | 22 | 0 | 1 | No | No |
| 18600387 | Sensitive Data Management Based on Environments | March 2024 | September 2025 | Allow | 18 | 0 | 0 | No | No |
| 18597999 | SYSTEMS AND METHODS FOR FORENSIC RESOLUTION OF RANSOMWARE ATTACKS | March 2024 | October 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18436711 | Data Processing Method and Related Apparatus | February 2024 | February 2026 | Allow | 24 | 0 | 0 | No | No |
| 18435789 | MULTI-LAYERED AUTHENTICATION NOTIFICATION SYSTEM FOR MOBILE DEVICES | February 2024 | July 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18428461 | PASSWORD AUTHENTICATION USING CRYPTOGRAPHIC KEY HANDLE-BASED AUTHENTICATION RECORDS | January 2024 | October 2025 | Allow | 21 | 0 | 1 | No | No |
| 18519542 | SOFTWARE INTEGRITY CHECKING SYSTEMS AND METHODS | November 2023 | November 2024 | Allow | 12 | 1 | 0 | No | No |
| 18385795 | Secure personal data transfer using a personal data sharing platform | October 2023 | January 2025 | Allow | 14 | 1 | 0 | No | No |
| 18496880 | SYSTEMS AND METHODS FOR PREDICTING WHICH SOFTWARE VULNERABILITIES WILL BE EXPLOITED BY MALICIOUS HACKERS TO PRIORITIZE FOR PATCHING | October 2023 | June 2025 | Allow | 20 | 1 | 0 | No | No |
| 18493343 | METHODS AND SYSTEMS FOR HARDWARE AND FIRMWARE SECURITY MONITORING | October 2023 | January 2026 | Abandon | 27 | 2 | 0 | No | No |
| 18237834 | APPLICATION SLICING FOR ACTIVE DEFENSE | August 2023 | May 2025 | Allow | 21 | 0 | 0 | No | No |
| 18452393 | Redundant Quantum Random Number Generator in a Quantum Communication System | August 2023 | January 2026 | Allow | 29 | 1 | 0 | Yes | No |
| 18452231 | ACCELERATING RANSOMWARE RECOVERY USING A COMBINATION OF LOCAL AND REMOTE BACKUPS | August 2023 | January 2026 | Abandon | 29 | 1 | 0 | No | No |
| 18446804 | DE-IDENTIFIED SEARCH OF PART DESIGNS | August 2023 | June 2025 | Allow | 23 | 0 | 0 | No | No |
| 18446866 | DE-IDENTIFIED SEARCH OF PART DESIGNS | August 2023 | June 2025 | Allow | 23 | 0 | 0 | No | No |
| 18231962 | SYSTEMS AND METHODS FOR IDENTIFYING ELECTRONIC ACCOUNTS BASED ON NEAR REAL TIME MACHINE LEARNING IN AN ELECTRONIC NETWORK | August 2023 | April 2025 | Allow | 20 | 0 | 0 | No | No |
| 18229994 | CRYPTOGRAPHIC HASH DIGESTS FROM QUANTUM INFORMATION | August 2023 | October 2025 | Allow | 26 | 1 | 0 | No | No |
| 18360191 | GRANTING SELECTIVE ACCESS TO AN ENCRYPTED CONVERSATION HISTORY | July 2023 | April 2025 | Allow | 20 | 0 | 0 | No | No |
| 18225210 | AI IMPLEMENTED AI TERMINATION | July 2023 | June 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18218283 | Use Of Quantum Resistant Iterative Keypads For Large Files | July 2023 | March 2025 | Allow | 21 | 0 | 0 | No | No |
| 18342996 | ATTRIBUTE RELEVANCE TAGGING IN MALWARE RECOGNITION | June 2023 | May 2025 | Allow | 22 | 1 | 1 | Yes | No |
| 18214648 | CHALLENGE INTERFACE FOR WEB SERVICES | June 2023 | February 2026 | Allow | 32 | 2 | 0 | No | No |
| 18322797 | WIRELESS NETWORK PROTOCOL ALLOWING THE SAME SCRAMBLING SEED TO BE UTILIZED BY MULTIPLE STAS | May 2023 | August 2025 | Allow | 27 | 1 | 0 | No | No |
| 18322796 | Decentralized Trust Establishment Using Sentiment | May 2023 | October 2025 | Allow | 29 | 0 | 1 | Yes | No |
| 18319739 | Method and Apparatus for Transmitting Data Associated with a Data Source | May 2023 | January 2026 | Allow | 32 | 2 | 0 | No | No |
| 18314933 | Untrusted Multi-Party Compute System | May 2023 | February 2025 | Allow | 21 | 0 | 0 | No | No |
| 18195615 | FLEXIBLE CRYPTOGRAPHIC ARCHITECTURE IN A NETWORK DEVICE | May 2023 | June 2025 | Allow | 25 | 0 | 0 | No | No |
| 18033307 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM FOR ASSISTING A USER AT A TIME OF EXIT | April 2023 | January 2026 | Allow | 33 | 1 | 0 | No | No |
| 18134814 | CRYPTOGRAPHIC SIGNATURE DELEGATION | April 2023 | January 2024 | Allow | 9 | 1 | 0 | No | No |
| 18135074 | METHODS AND SYSTEMS FOR AUTHENTICATED, AUTHORIZED, ENCRYPTED AND ENCODED COMMUNICATIONS | April 2023 | April 2024 | Allow | 12 | 1 | 0 | No | No |
| 18132511 | SYSTEM AND METHOD FOR SECURELY CHANGING NETOWRK CONFIGURATION SETTINGS TO MULTIPLEXERS IN AN INDUSTRIAL CONTROL SYSTEM | April 2023 | May 2024 | Allow | 13 | 1 | 0 | No | No |
| 18128457 | ARTIFICIAL AGING OF DIGITAL TWIN TO SIMULATE CYBERSECURITY ISSUE ASSOCIATED WITH INFRASTRUCTURE | March 2023 | September 2025 | Allow | 30 | 1 | 0 | No | No |
| 18117656 | USER AUTHENTICATION | March 2023 | May 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18177156 | SYSTEMS AND METHODS FOR KEY DISTRIBUTION OF LOW END SPDM DEVICES | March 2023 | January 2025 | Allow | 22 | 0 | 0 | No | No |
| 18173022 | BUNDLED AUDIT FOR STALE SESSION BINDINGS | February 2023 | October 2024 | Allow | 20 | 0 | 0 | No | No |
| 18169362 | Cross Chained Aggregated Hash Token Validation System | February 2023 | March 2025 | Allow | 25 | 0 | 0 | No | No |
| 18108566 | PEER-TO-PEER OFFLINE ACCESS MODE | February 2023 | September 2024 | Allow | 19 | 0 | 0 | No | No |
| 18040892 | DEVICE INFORMATION MANAGEMENT SYSTEM | February 2023 | October 2024 | Allow | 21 | 0 | 0 | No | No |
| 18105928 | SECURITY FINDING CATEGORIES-BASED PRIORITIZATION | February 2023 | January 2025 | Allow | 23 | 0 | 0 | No | No |
| 18161414 | ENCRYPTING AND DECRYPTING INFORMATION | January 2023 | June 2024 | Allow | 16 | 1 | 0 | No | No |
| 18159800 | METHOD FOR PROTECTING AGAINST SIDE-CHANNEL ATTACKS | January 2023 | February 2025 | Allow | 25 | 1 | 0 | No | No |
| 18152231 | SYSTEM AND METHOD FOR DISTRIBUTED MANAGEMENT OF HARDWARE WITH INTERMITTENT CONNECTIVITY | January 2023 | April 2025 | Allow | 27 | 0 | 0 | No | No |
| 18094202 | SYSTEMS AND METHODS FOR CREATING SEED AND MASTER KEYS FOR BLOCKCHAIN WALLETS FROM USER BIOMETRICS | January 2023 | May 2025 | Allow | 28 | 0 | 0 | No | No |
| 18150582 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM | January 2023 | February 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18148262 | ICON BASED PHISHING DETECTION | December 2022 | July 2024 | Allow | 18 | 0 | 0 | No | No |
| 18148302 | ACCESS CONTROL LIST MANAGEMENT METHOD, DATA STORAGE DEVICE AND COMPUTER-READABLE MEDIUM | December 2022 | April 2025 | Allow | 27 | 1 | 0 | No | No |
| 17914071 | METHOD AND DEVICE FOR PROVIDING WEB PAGE USING CAPTIVE PORTAL | December 2022 | October 2024 | Allow | 24 | 0 | 0 | No | No |
| 18080635 | ALLOCATION OF ACCESS TO A CHIPLET ACROSS AN INTERCONNECT SWITCH | December 2022 | March 2026 | Allow | 39 | 0 | 0 | No | No |
| 18063960 | SOFTWARE INTEGRITY CHECKING SYSTEMS AND METHODS | December 2022 | July 2023 | Allow | 7 | 1 | 0 | No | No |
| 18077205 | SECURITY REPORTING VIA MESSAGE TAGGING | December 2022 | March 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 17970960 | PRIVACY AWARENESS FOR PERSONAL ASSISTANT COMMUNICATIONS | October 2022 | January 2025 | Allow | 27 | 3 | 0 | Yes | No |
| 17954332 | SYSTEM AND METHOD FOR END-TO-END DATA TRUST MANAGEMENT WITH REAL-TIME ATTESTATION | September 2022 | June 2023 | Allow | 9 | 1 | 0 | No | No |
| 17934468 | SECURE TIMING FOR SIDELINK SYSTEMS | September 2022 | July 2025 | Allow | 34 | 0 | 1 | No | No |
| 17944746 | SYSTEMS, METHODS, AND APPARATUSES FOR IDENTIFYING UNAUTHORIZED USE OF A USER'S AUTHENTICATION CREDENTIALS TO AN ELECTRONIC NETWORK BASED ON NON-PUBLIC DATA ACCESS | September 2022 | November 2024 | Allow | 26 | 1 | 0 | No | No |
| 17942417 | SYSTEMS AND METHODS FOR OBSCURING DATA FROM A DATA SOURCE | September 2022 | April 2023 | Allow | 7 | 1 | 0 | No | No |
| 17883695 | TERMINAL AND COMMUNICATION METHOD | August 2022 | September 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17880585 | SECURE MOBILE INITIATED AUTHENTICATION | August 2022 | December 2023 | Allow | 16 | 1 | 0 | No | No |
| 17878084 | SIGNATURE VERIFICATION METHOD, MEMORY STORAGE DEVICE AND MEMORY CONTROL CIRCUIT UNIT | August 2022 | November 2024 | Allow | 28 | 0 | 0 | No | No |
| 17843583 | TRUST BROKER SYSTEM FOR MANAGING AND SHARING TRUST LEVELS | June 2022 | February 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 17830198 | METHODS FOR SECURE SIDELINK POSITIONING | June 2022 | July 2024 | Allow | 25 | 0 | 0 | No | No |
| 17780495 | METHOD AND DEVICE FOR ANONYMOUS ACCESS CONTROL TO A COLLABORATIVE ANONYMIZATION PLATFORM | May 2022 | August 2023 | Allow | 15 | 1 | 0 | No | No |
| 17663815 | SYSTEMS AND METHODS FOR SERVER-SIDE QUANTUM SESSION AUTHENTICATION | May 2022 | March 2024 | Allow | 22 | 1 | 0 | No | No |
| 17663358 | METHODS AND SYSTEMS FOR SECURE COMMAND, CONTROL, AND COMMUNICATIONS | May 2022 | January 2023 | Allow | 8 | 0 | 0 | No | No |
| 17740138 | COMMUNICATION APPARATUS, CONTROL METHOD FOR COMMUNICATION APPARATUS, AND STORAGE MEDIUM STORING PROGRAM | May 2022 | April 2024 | Allow | 23 | 0 | 0 | No | No |
| 17733831 | ENCRYPTED FLOW OF SIM DATA BETWEEN REGIONS AND EDGE NETWORKS | April 2022 | January 2024 | Allow | 20 | 0 | 0 | No | No |
| 17731142 | SYSTEM, METHOD, AND COMPUTER PROGRAM FOR ORCHESTRATING PATCHING OF MICROSERVICES | April 2022 | December 2024 | Allow | 32 | 1 | 0 | No | No |
| 17731177 | IMAGE FORMING APPARATUS THAT MANAGES APPLICATION ACCESSIBLE BY USER, INFORMATION PROCESSING SYSTEM INCLUDING IMAGE FORMING APPARATUS, AUTHENTICATION APPLICATION PROGRAM, AND NORMAL APPLICATION PROGRAM | April 2022 | January 2025 | Allow | 33 | 1 | 0 | No | No |
| 17729206 | Client Browser to Endpoint Peer to Peer Redirection from Cloud Control Pane | April 2022 | April 2024 | Allow | 23 | 1 | 0 | No | No |
| 17660615 | SYSTEMS AND METHODS FOR SUPPORTING A PLURALITY OF PASSWORDS IN A COMMUNICATION NETWORK | April 2022 | February 2025 | Allow | 34 | 1 | 0 | Yes | No |
| 17722196 | SYSTEMS AND METHODS FOR FRAUDULENT ACTIVITY DETECTION | April 2022 | February 2025 | Allow | 34 | 1 | 0 | No | No |
| 17715858 | COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON SECURE ENCRYPTED VIRTUALIZATION (SEV)-SECURE NESTED PAGING (SEV-SNP) PROCESSORS | April 2022 | June 2024 | Allow | 26 | 0 | 0 | No | No |
| 17714647 | MITIGATING AGAINST A PERSISTENT CONSISTENT THREAT IN A NETWORK DEVICE BASED ON REDUCING TEMPORAL SURFACE AREA | April 2022 | November 2023 | Allow | 19 | 1 | 0 | No | No |
| 17657561 | CONTENT-BASED DOMAIN NAME ENCONDING, ENCRYPTION, AND ROUTING SYSTEM | March 2022 | January 2024 | Allow | 21 | 0 | 0 | No | No |
| 17695145 | AIR INTERFACE INFORMATION SECURITY PROTECTION METHOD AND APPARATUS | March 2022 | May 2024 | Allow | 26 | 1 | 1 | No | No |
| 17592667 | Method and System for Secure Container Application Framework | February 2022 | June 2024 | Allow | 29 | 0 | 0 | No | No |
| 17574559 | SYSTEM AND METHOD FOR END-TO-END DATA TRUST MANAGEMENT WITH REAL-TIME ATTESTATION | January 2022 | May 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17456969 | LZO DECOMPRESSION IN EXTERNAL STORAGE | November 2021 | June 2025 | Allow | 43 | 2 | 0 | No | No |
| 17456911 | HARDWARE FIREWALLS WITH ADAPTIVE DENY-BY-DEFAULT (DBD) ACCESS CONTROL | November 2021 | July 2024 | Allow | 31 | 1 | 0 | No | No |
| 17456032 | METHOD AND DEVICE FOR SECURING A COMMUNICATION PATH | November 2021 | November 2023 | Allow | 23 | 0 | 0 | No | No |
| 17522257 | SYSTEMS AND METHODS FOR PROVIDING A SECURED PASSWORD AND AUTHENTICATION MECHANISM FOR PROGRAMMING AND UPDATING SOFTWARE OR FIRMWARE | November 2021 | January 2026 | Allow | 51 | 5 | 0 | Yes | No |
| 17517301 | APPARATUS FOR ELECTRONIC CONTROL OF VEHICLE, APPARATUS FOR GATEWAY AND VEHICLE INCLUDING THE SAME | November 2021 | April 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17508671 | Device Identifier Access Method and Apparatus | October 2021 | October 2023 | Allow | 23 | 2 | 0 | Yes | No |
| 17450573 | METHOD FOR DETECTING AN UNAUTHORIZED PHYSICAL ACCESS TO A BUS SYSTEM | October 2021 | October 2023 | Allow | 24 | 0 | 0 | No | No |
| 17601794 | DEVICE MANAGEMENT SYSTEM, NETWORK ADAPTER, SERVER, DEVICE, DEVICE MANAGEMENT METHOD, AND PROGRAM | October 2021 | December 2023 | Allow | 27 | 0 | 0 | No | No |
| 17601829 | CRYPTOGRAPHICALLY PROTECTED PROVISION OF A DIGITAL CERTIFICATE | October 2021 | May 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17601782 | ON-BOARD COMPUTER, COMPUTER EXECUTION METHOD, AND COMPUTER PROGRAM | October 2021 | February 2024 | Allow | 29 | 1 | 0 | No | No |
| 17601846 | UNAUTHORIZED COMMUNICATION PREVENTION SYSTEM AND UNAUTHORIZED COMMUNICATION PREVENTION METHOD | October 2021 | June 2024 | Allow | 33 | 1 | 0 | No | No |
| 17449823 | SECURITY ECOSYSTEM | October 2021 | October 2023 | Allow | 24 | 0 | 0 | No | No |
| 17601136 | MAC TAG LIST GENERATION APPARATUS, MAC TAG LIST VERIFICATION APPARATUS, METHOD, AND PROGRAM | October 2021 | July 2023 | Allow | 21 | 1 | 0 | Yes | No |
| 17484617 | NETWORK SUPPORTED LOW LATENCY SECURITY-BASED ORCHESTRATION | September 2021 | April 2025 | Allow | 43 | 1 | 0 | No | No |
| 17442778 | VEHICLE-TO-EVERYTHING (V2X) SECURITY POLICY NEGOTIATION BETWEEN PEER USER EQUIPMENT (UES) | September 2021 | March 2024 | Allow | 30 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner PICH, PONNOREAY.
With a 100.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 100.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner PICH, PONNOREAY works in Art Unit 2495 and has examined 247 patent applications in our dataset. With an allowance rate of 94.7%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 26 months.
Examiner PICH, PONNOREAY's allowance rate of 94.7% places them in the 83% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by PICH, PONNOREAY receive 1.05 office actions before reaching final disposition. This places the examiner in the 11% percentile for office actions issued. This examiner issues significantly fewer office actions than most examiners.
The median time to disposition (half-life) for applications examined by PICH, PONNOREAY is 26 months. This places the examiner in the 76% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.
Conducting an examiner interview provides a +4.8% benefit to allowance rate for applications examined by PICH, PONNOREAY. This interview benefit is in the 29% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 39.3% of applications are subsequently allowed. This success rate is in the 90% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 44.7% of cases where such amendments are filed. This entry rate is in the 68% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 50.0% of appeals filed. This is in the 17% percentile among all examiners. Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 26.7% are granted (fully or in part). This grant rate is in the 14% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.