Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18934095 | SYSTEM AND METHOD FOR A TRUST EVALUATION AND SHARING SYSTEM | October 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18909465 | NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHOD | October 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18888599 | FACE IDENTIFICATION SYSTEM AND METHOD FOR IDENTIFYING FACE IMAGE | September 2024 | April 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18773300 | ENFORCING GRANULAR ACCESS CONTROL POLICY | July 2024 | January 2026 | Allow | 18 | 1 | 0 | Yes | No |
| 18740069 | SYSTEMS AND METHOD OF CONTEXTUAL DATA MASKING FOR PRIVATE AND SECURE DATA LINKAGE | June 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18738179 | METHOD AND SYSTEM FOR AUTHENTICATING A SECURE CREDENTIAL TRANSFER TO A DEVICE | June 2024 | May 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18715748 | METHOD FOR GENERATING AN INDEPENDENT BIT SEQUENCE | June 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18664515 | INTERWORKING BETWEEN IOT SERVICE LAYER SYSTEMS AND DISTRIBUTED LEDGER SYSTEMS | May 2024 | May 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18626417 | DATE AND TIME TOKENIZATION WITH FORMAT PRESERVATION | April 2024 | January 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18610074 | Randomized SPI for Distributed IPsec | March 2024 | March 2025 | Allow | 12 | 0 | 1 | Yes | No |
| 18594892 | COMPUTER-BASED SYSTEMS CONFIGURED FOR PROCURING REAL CONTENT ITEMS BASED ON USER AFFINITY GAUGED VIA SYNTHETIC CONTENT ITEMS AND METHODS OF USE THEREOF | March 2024 | April 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18292075 | KEY EXCHANGE SYSTEM, SERVER, METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM FOR DEPLOYING AN INTERMEDIATE SERVER BETWEEN THE KEY GENERATION DEVICE AND THE NETWORK DEVICE | January 2024 | November 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18417201 | DATA SECURITY FOR MACHINE LEARNING SYSTEMS | January 2024 | November 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18415600 | RENEWAL OF A SIGNED ATTESTATION ARTIFACT WITH LIMITED USAGE OF A TRUSTED PLATFORM MODULE | January 2024 | June 2025 | Allow | 17 | 0 | 0 | No | No |
| 18400427 | MULTI-PARTY DATA QUERY METHODS AND APPARATUSES FOR DATA PRIVACY PROTECTION | December 2023 | September 2025 | Allow | 21 | 1 | 0 | No | No |
| 18394678 | Distributed Data Storage System Providing Enhanced Security | December 2023 | September 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18391369 | SECURE REMOTE ACCESS TO HISTORICAL DATA | December 2023 | August 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18391016 | SECURE REMOTE ACCESS TO HISTORICAL DATA | December 2023 | August 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18391399 | SECURE REMOTE ACCESS TO HISTORICAL DATA | December 2023 | July 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18391505 | METHOD AND SYSTEM FOR DATA COMMUNICATION WITH DIFFERENTIALLY PRIVATE SET INTERSECTION | December 2023 | October 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18540906 | METHOD OF ENCRYPTION BASED ON IDENTIFICATION USING PEDERSEN COMMITMENT AND METHOD OF DECRYPTION CORRESPONDING THE SAME | December 2023 | October 2025 | Allow | 22 | 1 | 1 | Yes | No |
| 18542247 | END-TO-END NETWORK ENCRYPTION FROM CUSTOMER ON-PREMISE NETWORK TO CUSTOMER VIRTUAL CLOUD NETWORK USING CUSTOMER-MANAGED KEYS | December 2023 | November 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18539116 | DATA PROTECTION USING PSEUDONYMIZATION AND ANONYMIZATION | December 2023 | November 2025 | Allow | 23 | 1 | 0 | No | No |
| 18534471 | METHODS, MEDIUMS, AND SYSTEMS FOR VERIFYING DEVICES IN AN ENCRYPTED MESSAGING SYSTEM | December 2023 | August 2025 | Allow | 20 | 3 | 0 | Yes | No |
| 18523476 | PROTECTING CUSTOMER PERSONAL INFORMATION IN APPLICATION PIPELINE | November 2023 | July 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18522924 | METHOD FOR DATA ENCRYPTION, TERMINAL DEVICE AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM | November 2023 | October 2025 | Allow | 22 | 1 | 0 | No | No |
| 18508695 | DATA ACCESS CONTROL FOR DOMAIN SPECIFIC LARGE LANGUAGE MODEL SERVICES | November 2023 | October 2025 | Allow | 23 | 2 | 0 | Yes | No |
| 18507979 | DIGITAL ACCOUNT CONTROLS PORTAL AND PROTOCOLS FOR FEDERATED AND NON-FEDERATED SYSTEMS AND DEVICES | November 2023 | June 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18499571 | ENCRYPTION METHOD USING FIXED-BASE COMB METHOD | November 2023 | September 2025 | Allow | 22 | 0 | 1 | Yes | No |
| 18492084 | DATA QUERY METHODS, APPARATUSES, AND SYSTEMS FOR MULTI-PARTY SECURE DATABASE | October 2023 | February 2026 | Allow | 28 | 2 | 0 | Yes | No |
| 18484490 | DOCUMENT ARCHITECTURE WITH FRAGMENT-DRIVEN ROLE BASED ACCESS CONTROLS | October 2023 | May 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18378032 | DATA PROCESSING APPARATUS AND METHODS FOR THE CONTROLLED SHARING OF DATA | October 2023 | June 2025 | Allow | 20 | 2 | 1 | Yes | No |
| 18478376 | AUTHENTICATION OF SMART GRID COMMUNICATIONS USING QUANTUM KEY DISTRIBUTION | September 2023 | July 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18553154 | CLASSIFICATION MODEL EVALUATION | September 2023 | August 2025 | Allow | 23 | 1 | 0 | No | No |
| 18373865 | SYSTEMS AND METHODS OF MANAGING EXTERNAL USER ACCOUNTS FOR A CONTENT COLLABORATION PLATFORM | September 2023 | August 2025 | Allow | 23 | 0 | 1 | Yes | No |
| 18474787 | SYSTEMS AND METHODS FOR MANAGING PERSONALIZED LIFE INFORMATION | September 2023 | April 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18369800 | System and Method for Decentralized, Controlled, and Managed Consumer Personal Data | September 2023 | November 2025 | Abandon | 26 | 0 | 1 | No | No |
| 18461178 | COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM, CALCULATION METHOD, AND INFORMATION PROCESSING DEVICE | September 2023 | October 2025 | Abandon | 26 | 1 | 0 | No | No |
| 18240298 | CRYPTO TUNNELLING BETWEEN TWO-WAY TRUSTED NETWORK DEVICES IN A SECURE PEER-TO-PEER DATA NETWORK | August 2023 | March 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18456683 | METHOD, APPARATUS, AND SYSTEM FOR STORING MEMORY ENCRYPTION REALM KEY IDS | August 2023 | July 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18238871 | ENFORCING GRANULAR ACCESS CONTROL POLICY | August 2023 | April 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18228596 | METHOD AND APPARATUS FOR PERFORMING DYNAMIC HASHING TO STORE KEY VALUES IN ORDER | July 2023 | January 2026 | Allow | 30 | 1 | 0 | No | No |
| 18225502 | SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR HIDING MESSAGES SENT TO THIRD PARTIES | July 2023 | April 2024 | Allow | 9 | 1 | 0 | No | No |
| 18357283 | SYSTEMS AND METHODS FOR POLICY-BASED ACCESS TO DISTRIBUTED LEDGER VIA SECURE ACCESS NODE | July 2023 | August 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18221247 | SECURELY PROVISIONING A SECURE DATA ASSET TO A TARGET DEVICE USING AN AUTHORIZATION TOKEN | July 2023 | August 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18348388 | SYSTEMS AND METHODS FOR POLICY LINKING AND/OR LOADING FOR SECURE INITIALIZATION | July 2023 | October 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18260321 | CENTRAL DATA GOVERNANCE AND ACCESS CONTROL FOR ENTERPRISE DATA | July 2023 | November 2025 | Allow | 28 | 2 | 0 | No | No |
| 18343153 | SYSTEMS AND METHOD OF CONTEXTUAL DATA MASKING FOR PRIVATE AND SECURE DATA LINKAGE | June 2023 | February 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18341954 | SECURE MESSAGE EXCHANGE BETWEEN DEPLOYMENTS | June 2023 | May 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18204423 | SYSTEM FOR IMPLEMENTING REAL-TIME REDACTION IN A WORKFLOW CONFIGURABLE ENVIRONMENT | June 2023 | December 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18204425 | SYSTEM FOR IMPLEMENTING REAL-TIME REDACTION IN A WORKFLOW CONFIGURABLE ENVIRONMENT | June 2023 | January 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18324837 | Subscriber Identification Module (SIM) Authentication Protections | May 2023 | January 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18315905 | NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHOD | May 2023 | December 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18316023 | NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHOD | May 2023 | June 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18308241 | SYSTEM AND METHOD FOR RESECURING DISTRIBUTED SYSTEM RESPONSIVE TO COMPROMISE EVENT | April 2023 | June 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18305064 | SYSTEMS AND METHODS FOR ADAPTIVE DIGITAL REINFORCEMENT LEARNING | April 2023 | November 2025 | Allow | 31 | 1 | 1 | Yes | No |
| 18189187 | PRIVATELY QUERYING A DATABASE WITH PRIVATE SET MEMBERSHIP USING SUCCINCT FILTERS | March 2023 | October 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18182558 | SECURE REMOTE ACCESS TO HISTORICAL DATA | March 2023 | November 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 18168444 | DOCUMENT ARCHITECTURE WITH FRAGMENT-DRIVEN ROLE-BASED ACCESS CONTROLS | February 2023 | July 2023 | Allow | 5 | 0 | 0 | Yes | No |
| 18164416 | COMMUNICATION METHOD, DEVICE, AND SYSTEM FOR OBTAINING AUTHORIZATION INFORMATION OF USER-RELATED DATA | February 2023 | November 2025 | Allow | 33 | 1 | 0 | No | No |
| 18159746 | SYSTEMS AND METHODS FOR DETECTING BROWSER MODE | January 2023 | May 2025 | Allow | 27 | 0 | 0 | Yes | No |
| 18101190 | TECHNIQUES FOR PREVENTING MALWARE ATTACKS IN AN OPERATING SYSTEM ENVIRONMENT | January 2023 | October 2025 | Abandon | 33 | 1 | 0 | No | No |
| 18156998 | DETERMINISTIC CHAOS-BASED QUANTUM COMPUTER RESISTANT DATA ENCRYPTION FOR LARGE SCALE WIDE AREA NETWORK SOLUTIONS | January 2023 | May 2024 | Abandon | 15 | 1 | 0 | No | No |
| 18092390 | DIGITAL ACCOUNT CONTROLS PORTAL AND PROTOCOLS FOR FEDERATED AND NON-FEDERATED SYSTEMS AND DEVICES | January 2023 | June 2023 | Allow | 6 | 0 | 0 | Yes | No |
| 18067343 | SYSTEMS AND METHODS FOR AUTOMATED WEBSITE SECURITY TESTING | December 2022 | September 2025 | Allow | 33 | 1 | 1 | Yes | No |
| 18080084 | METHOD AND SYSTEM FOR AUTHENTICATING A SECURE CREDENTIAL TRANSFER TO A DEVICE | December 2022 | March 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 18078259 | AUTOMATIC MANAGEMENT OF USER PERMISSIONS | December 2022 | July 2025 | Allow | 32 | 1 | 0 | No | No |
| 17992737 | ENFORCING GRANULAR ACCESS CONTROL POLICY | November 2022 | May 2023 | Allow | 6 | 0 | 0 | Yes | No |
| 17991743 | METHOD OF DYNAMICALLY LOADING ENCRYPTION ENGINE | November 2022 | August 2025 | Allow | 43 | 1 | 0 | No | No |
| 17976391 | SYSTEMS AND METHODS FOR IMPROVED DETECTION OF NETWORK ATTACKS | October 2022 | March 2025 | Allow | 29 | 0 | 0 | Yes | No |
| 17971298 | HOST ASSISTED OPERATIONS IN MANAGED MEMORY DEVICES | October 2022 | April 2024 | Allow | 18 | 3 | 0 | Yes | No |
| 18046141 | SYSTEMS, METHODS, AND STORAGE MEDIA FOR VALIDATING CRYPTOGRAPHICALLY SIGNED INFORMATION | October 2022 | October 2025 | Abandon | 36 | 1 | 0 | No | No |
| 17950433 | ENFORCEABLE PSEUDONYMOUS REPUTATION THROUGH CHAINED ENDORSERS | September 2022 | February 2023 | Allow | 5 | 0 | 0 | Yes | No |
| 17950025 | ITERATIVE GENERATION OF HYPERTEXT TRANSFER PROTOCOL TRAFFIC | September 2022 | August 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17946880 | IDENTITY THREAT DETECTION AND RESPONSE | September 2022 | January 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17942475 | AUTHENTICATION USING A DECENTRALIZED AND/OR HYBRID DECENTRALIZED SECURE CRYPTOGRAPHIC KEY STORAGE METHOD | September 2022 | March 2025 | Allow | 30 | 1 | 1 | Yes | No |
| 17941296 | TECHNIQUES FOR DETECTING AN INTRUSION INTO A BUS SYSTEM | September 2022 | January 2026 | Allow | 40 | 2 | 0 | Yes | No |
| 17905608 | Application Information Display Method and Related Device | September 2022 | December 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17823126 | VEHICLE NETWORK SECURITY | August 2022 | December 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17898833 | RESOURCE EXCHANGE EVENT VERIFICATION BASED ON SUBSCRIBER IDENTITY MODULE (SIM) CARD FEATURE COMPARISON | August 2022 | October 2024 | Allow | 25 | 1 | 0 | Yes | No |
| 17904447 | SYSTEM AND METHOD FOR IMPLEMENTING A PERSONAL VIRTUAL DATA NETWORK (PVDN) | August 2022 | January 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17888521 | METHOD FOR ENCRYPTING DATABASE SUPPORTING COMPOSABLE SQL QUERY | August 2022 | May 2023 | Allow | 9 | 0 | 0 | No | No |
| 17798945 | METHOD FOR TESTING IF A DATA ELEMENT BELONGS TO A LIST OF REFERENCE DATA ELEMENTS | August 2022 | December 2024 | Allow | 28 | 1 | 1 | Yes | No |
| 17884704 | HARDWARE-BASED IMPLEMENTATION OF SECURE HASH ALGORITHMS | August 2022 | July 2025 | Allow | 36 | 2 | 0 | Yes | No |
| 17760186 | METHOD AND APPARATUS FOR REGISTRATION DATA RETRIEVAL | August 2022 | January 2026 | Allow | 42 | 3 | 1 | Yes | No |
| 17881361 | NORMALIZING AND SECURELY TRANSMITTING TELEMATICS DATA | August 2022 | July 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17816073 | UNLOCKING ELECTRONIC NOTEPADS FOR WRITING | July 2022 | October 2023 | Allow | 15 | 1 | 0 | Yes | No |
| 17872805 | LOW OVERHEAD INTEGRITY PROTECTION WITH HIGH AVAILABILITY FOR TRUST DOMAINS | July 2022 | July 2023 | Allow | 12 | 1 | 0 | Yes | No |
| 17809348 | GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES | June 2022 | January 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17809297 | CONCEPT FOR A TELEMETRY HUB FOR MICROSERVICES | June 2022 | January 2026 | Abandon | 43 | 2 | 1 | No | No |
| 17809407 | ADJUSTING A SECURITY POLICY BASED ON SYSTEM RESOURCE UTILIZATION | June 2022 | January 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17809140 | TECHNIQUES FOR PATH INFORMATION-BASED PHYSICAL LAYER SECURITY | June 2022 | May 2025 | Allow | 34 | 2 | 1 | Yes | No |
| 17845848 | SYSTEMS AND METHOD OF CONTEXTUAL DATA MASKING FOR PRIVATE AND SECURE DATA LINKAGE | June 2022 | February 2023 | Allow | 8 | 1 | 0 | No | No |
| 17837649 | PROCESSOR WITH AN ELLIPTIC CURVE CRYPTOGRAPHIC ALGORITHM AND A DATA PROCESSING METHOD THEREOF | June 2022 | August 2024 | Allow | 27 | 0 | 1 | Yes | No |
| 17751034 | WIRELESS COMMUNICATION METHOD AND SYSTEM FOR COMMUNICATION BETWEEN A DRIVER AND ANY ONE OF A PLURALITY OF TRANSPORT REFRIGERATION UNITS | May 2022 | March 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 17747969 | USING FIREWALL POLICIES TO MAP DATA MESSAGES TO SECURE TUNNELS | May 2022 | December 2023 | Allow | 19 | 1 | 0 | No | No |
| 17775201 | A SYSTEM AND METHOD FOR SATELLITE QUANTUM KEY DISTRIBUTION | May 2022 | February 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17734689 | Methods for automatically modifying firewall rules based on Internet Protocol (IP) addresses | May 2022 | February 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17725487 | Subscriber Identification Module (SIM) Authentication Protections | April 2022 | February 2023 | Allow | 10 | 1 | 1 | Yes | No |
| 17659168 | CONNECTIVITY SERVICE USING A BOUNCE BACK APPROACH | April 2022 | February 2023 | Allow | 10 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner SARKER, SANCHIT K.
With a 37.5% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 41.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner SARKER, SANCHIT K works in Art Unit 2495 and has examined 368 patent applications in our dataset. With an allowance rate of 79.6%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.
Examiner SARKER, SANCHIT K's allowance rate of 79.6% places them in the 49% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by SARKER, SANCHIT K receive 1.93 office actions before reaching final disposition. This places the examiner in the 47% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by SARKER, SANCHIT K is 32 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +53.0% benefit to allowance rate for applications examined by SARKER, SANCHIT K. This interview benefit is in the 94% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 31.7% of applications are subsequently allowed. This success rate is in the 65% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 11.4% of cases where such amendments are filed. This entry rate is in the 11% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 30.8% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 32% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 69.2% of appeals filed. This is in the 55% percentile among all examiners. Of these withdrawals, 44.4% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 83.3% are granted (fully or in part). This grant rate is in the 86% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.