Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18816546 | DYNAMIC BYPASS | August 2024 | February 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18638967 | PROTECTING AGAINST UNWANTED MESSAGING IN INSTANT MESSAGING SYSTEMS | April 2024 | December 2025 | Allow | 20 | 0 | 0 | No | No |
| 18615674 | BI-DIRECTIONAL ENCRYPTION/DECRYPTION DEVICE FOR UNDERLAY AND OVERLAY OPERATIONS | March 2024 | April 2025 | Allow | 12 | 0 | 0 | No | No |
| 18593794 | ACCESS CONTROL OF MANAGED CLUSTERS PERFORMING DATA PROCESSING ON CLOUD PLATFORMS | March 2024 | February 2026 | Allow | 24 | 1 | 0 | Yes | No |
| 18438586 | SYSTEM AND METHOD TO SECURELY DISTRIBUTE AUTHENTICATED AND TRUSTED DATA STREAMS TO AI SYSTEMS | February 2024 | June 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18438257 | MITIGATING WASTAGE ASSOCIATED WITH LAPSED SUBSCRIBER ACCOUNTS ON COMMUNITY-WIDE MANAGED WI-FI NETWORKS | February 2024 | October 2025 | Allow | 20 | 0 | 0 | No | No |
| 18529351 | MALWARE DETECTION BASED ON USER INTERACTIONS | December 2023 | August 2025 | Abandon | 20 | 1 | 0 | No | No |
| 18521346 | Entity-Wide Database Asset Index Generation | November 2023 | January 2026 | Allow | 26 | 2 | 0 | Yes | No |
| 18506731 | Automated File Information Population Exhibiting Reduced Storage and Bandwidth and Increased Security | November 2023 | January 2026 | Allow | 26 | 1 | 0 | Yes | No |
| 18489611 | STATEFUL MULTI-PRIVILEGED SD-WAN CONTROL CONNECTIONS | October 2023 | March 2026 | Allow | 29 | 2 | 0 | Yes | No |
| 18243956 | DNS PACKAGE IN A NETWORK | September 2023 | July 2025 | Allow | 22 | 1 | 0 | No | No |
| 18354387 | ENCRYPTION RETRANSMISSION INDUSTRIAL INTERNET OF THINGS (IIOT) DEVICE FOR PROVIDING RESILIENCY AGAINST ATTACKS | July 2023 | November 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18353772 | MALICIOUS BLACK HOLE NODE DETECTION AND CIRCUMVENTION | July 2023 | November 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18351289 | GENERATING AND MANAGING ENTERPRISE-POLICY COMPLIANT GUEST CREDENTIALS FOR MULTI-ACCESS CONNECTIVITY | July 2023 | December 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18345553 | SYSTEMS AND METHODS FOR NETWORK-INITIATED MODIFICATION OF ACCESS FOR LOST OR STOLEN DEVICES | June 2023 | December 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18345080 | METHODS, SYSTEMS, APPARATUSES, AND DEVICES FOR FACILITATING ATTACK-RESILIENT COMMUNICATIONS BETWEEN DEVICES | June 2023 | June 2025 | Allow | 24 | 0 | 0 | No | No |
| 18344803 | MALWARE BEACON DETECTION SYSTEM | June 2023 | September 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18319841 | Data Protection Method and Apparatus, Storage Medium, and Computer Device | May 2023 | July 2025 | Allow | 26 | 1 | 0 | No | No |
| 18309624 | EXECUTING MODULAR ALERTS AND ASSOCIATED SECURITY ACTIONS | April 2023 | November 2024 | Allow | 19 | 3 | 0 | Yes | No |
| 18309289 | METHODS, SYSTEMS, APPARATUSES, AND DEVICES FOR FACILITATING SECURE UPDATING OF A MACHINE LEARNING MODEL | April 2023 | May 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18133596 | Password Generation and Verification Method and System | April 2023 | September 2025 | Abandon | 29 | 1 | 0 | No | No |
| 18133255 | USER AUTHENTICATION IN COMMUNICATION SYSTEMS | April 2023 | August 2025 | Allow | 28 | 2 | 0 | No | No |
| 18126091 | SYSTEMS AND METHODS FOR APPLYING UNFAIR THROTTLING TO SECURITY SERVICE REQUESTS | March 2023 | May 2025 | Allow | 26 | 1 | 0 | No | No |
| 18186555 | SYSTEMS AND METHODS FOR DETERMINING A LIKELIHOOD OF AN EXISTENCE OF MALWARE ON AN EXECUTABLE | March 2023 | July 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18103285 | DEVICE DEACTIVATION BASED ON BEHAVIOR PATTERNS | January 2023 | February 2024 | Allow | 13 | 1 | 0 | No | No |
| 18148743 | RISK BASED PRIORITY PROCESSING OF DATA | December 2022 | May 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18007963 | Method for capturing a packet from an encrypted session | December 2022 | January 2025 | Allow | 25 | 0 | 0 | Yes | No |
| 17993401 | SYSTEMS AND METHODS FOR IMPLEMENTING LINEAR VIEW-CHANGE IN A BYZANTINE FAULT TOLERANT (BFT) PROTOCOL | November 2022 | March 2025 | Allow | 39 | 1 | 0 | Yes | No |
| 17776664 | ANOMALOUS USER INTERFACE INPUT DETECTION | November 2022 | February 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17977985 | GENERATING PLAYBOOK RUN STATISTICS FOR PLAYBOOKS EXECUTED BY AN INFORMATION TECHNOLOGY AND SECURITY OPERATIONS APPLICATION | October 2022 | March 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18047355 | Inter-PLMN communication | October 2022 | August 2024 | Allow | 22 | 0 | 0 | No | No |
| 18046595 | SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING | October 2022 | October 2024 | Allow | 24 | 1 | 0 | No | No |
| 17933750 | DEVICE MANAGEMENT AND SECURITY THROUGH A DISTRIBUTED LEDGER SYSTEM | September 2022 | August 2024 | Allow | 23 | 1 | 0 | Yes | No |
| 17943351 | METHOD AND SYSTEM FOR AUTOMATED SECURE DEVICE REGISTRATION AND PROVISIONING OVER CELLULAR OR WIRELESS NETWORK | September 2022 | July 2024 | Allow | 22 | 2 | 0 | No | No |
| 17801029 | METHOD FOR SESSION CREATION AND RELATED EQUIPMENT | August 2022 | May 2025 | Allow | 33 | 2 | 0 | No | No |
| 17814635 | INPUT/OUTPUT (I/O) ATTACK PREVENTION SYSTEM AND METHOD OF USING THE SAME | July 2022 | February 2026 | Abandon | 43 | 4 | 0 | Yes | No |
| 17857930 | SECURE CONFIGURATION SHARING OVER REFERENCE SIGNALS | July 2022 | January 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17807285 | STORING VITAL DOCUMENTS | June 2022 | May 2024 | Allow | 23 | 2 | 0 | No | No |
| 17840244 | METHODS AND APPARATUSES FOR FACILITATING CONNECTION TO A WIFI NETWORK | June 2022 | September 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17834246 | Systems and Methods for Biometric Based Authentication of Video Conference Participants | June 2022 | October 2024 | Abandon | 28 | 1 | 0 | No | No |
| 17830217 | DEVICE INDEPENDENT SECURE MESSAGING | June 2022 | September 2024 | Allow | 28 | 2 | 0 | No | No |
| 17749115 | SYSTEMS, METHODS, AND MEDIA FOR PROTECTING APPLICATIONS FROM UNTRUSTED OPERATING SYSTEMS | May 2022 | August 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17777999 | LABELING DEVICE AND LABELING PROGRAM | May 2022 | July 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17660262 | MULTI-USER BIOMETRIC AUTHENTICATION | April 2022 | September 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17672502 | VERIFYING THE TRUST-WORTHINESS OF ARP SENDERS AND RECEIVERS USING ATTESTATION-BASED METHODS | February 2022 | October 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17568582 | BI-DIRECTIONAL ENCRYPTION/DECRYPTION DEVICE FOR UNDERLAY AND OVERLAY OPERATIONS | January 2022 | March 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17561431 | TECHNOLOGIES FOR ATTESTING A DEPLOYED WORKLOAD USING BLOCKCHAIN | December 2021 | March 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17645434 | ORCHESTRATION AND GENERATION OF MINIMAL SURFACE OPTIMIZED UNIKERNELS | December 2021 | October 2025 | Allow | 46 | 5 | 0 | Yes | No |
| 17535460 | Certifying Public Keys for Multiple Cryptographic Hash Trees | November 2021 | April 2024 | Abandon | 29 | 1 | 0 | No | No |
| 17530260 | SECURE STORAGE ACCESS THROUGH RATE LIMITATION | November 2021 | September 2023 | Allow | 22 | 0 | 0 | No | No |
| 17520844 | SYSTEMS AND METHODS FOR PROTECTING CORE FILES IN A CONTENT MANAGEMENT SYSTEMS | November 2021 | August 2023 | Allow | 22 | 0 | 0 | No | No |
| 17484627 | Glitch Attack Mitigation for In-Vehicle Networks | September 2021 | December 2023 | Allow | 26 | 1 | 0 | No | No |
| 17448368 | MALWARE DETECTION BASED ON USER INTERACTIONS | September 2021 | September 2023 | Allow | 23 | 1 | 0 | Yes | No |
| 17438662 | ULTRA LOW POWER CORE FOR LIGHTWEIGHT ENCRYPTION | September 2021 | July 2023 | Allow | 22 | 0 | 0 | No | No |
| 17404910 | WIRELESS ACCESS POINT WITH MULTIPLE SECURITY MODES | August 2021 | November 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17394217 | Automated Suspect Device Filtering On Equipment Identity Registers | August 2021 | November 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17391015 | METHOD AND SYSTEM THAT ENHANCES COMPUTER-SYSTEM SECURITY BY IDENTIFYING AND BLOCKING HARMFUL COMMUNICATIONS THROUGH COMPONENT INTERFACES | August 2021 | February 2024 | Abandon | 30 | 1 | 0 | No | No |
| 17388656 | Cryptographically Enforced Partial Blinding For Distributed System | July 2021 | October 2023 | Allow | 26 | 0 | 0 | No | No |
| 17304958 | DETECTING AND BLOCKING A MALICIOUS FILE EARLY IN TRANSIT ON A NETWORK | June 2021 | September 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17356464 | METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS FOR PRODUCING GENERIC IP REPUTATION THROUGH CROSS PROTOCOL ANALYSIS | June 2021 | April 2023 | Allow | 22 | 0 | 0 | No | No |
| 17355887 | METHODS, SYSTEMS, AND APPARATUSES FOR QUERY ANALYSIS AND CLASSIFICATION | June 2021 | July 2025 | Allow | 49 | 4 | 1 | Yes | No |
| 17329609 | INTEGRATED PHYSICAL UNCLONABLE FUNCTION DEVICE | May 2021 | March 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17323590 | REAL-TIME ANOMALY DETECTION FOR NETWORK SECURITY | May 2021 | August 2023 | Allow | 27 | 1 | 0 | No | No |
| 17289127 | PHASE DECODING METHOD AND APPARATUS FOR QUANTUM KEY DISTRIBUTION, AND CORRESPONDING SYSTEM | April 2021 | May 2024 | Abandon | 36 | 2 | 0 | No | No |
| 17157243 | DIGITAL RIGHTS MANAGEMENT SYSTEM RESOURCE MANAGER | January 2021 | July 2024 | Allow | 42 | 3 | 0 | No | No |
| 17156412 | SYSTEM AND METHOD FOR VERIFYING VERIFIABLE CLAIMS | January 2021 | November 2021 | Allow | 10 | 2 | 0 | Yes | No |
| 15734597 | Application of Integrity Protection in a Wireless Communication Network | December 2020 | November 2022 | Allow | 23 | 2 | 0 | Yes | No |
| 17108501 | METHOD FOR SECURING ACCESSES TO A NETWORK, SYSTEM AND ASSOCIATED DEVICE | December 2020 | July 2024 | Allow | 44 | 3 | 0 | Yes | No |
| 16953865 | SYSTEM, METHODS, AND MEDIA FOR PROTECTING NETWORK DEVICES FROM MALICIOUS RICH TEXT FORMAT (RTF) FILES | November 2020 | January 2023 | Allow | 26 | 1 | 0 | No | No |
| 17052410 | Method and Intrusion Manager for Handling Intrusion of Electronic Equipment | November 2020 | June 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 17075492 | DYNAMIC BYPASS | October 2020 | April 2024 | Allow | 42 | 3 | 0 | Yes | No |
| 17069320 | NETWORK VISUALIZATION, INTRUSION DETECTION, AND NETWORK HEALING | October 2020 | November 2023 | Allow | 37 | 2 | 1 | Yes | No |
| 17062950 | USER AUTHENTICATION IN COMMUNICATION SYSTEMS | October 2020 | February 2023 | Allow | 28 | 1 | 0 | No | No |
| 17062101 | System, Machine, Method for Configuring a System and Method for Operating a Machine | October 2020 | January 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17020075 | DYNAMIC SECURITY POLICY CONSOLIDATION | September 2020 | August 2022 | Allow | 23 | 0 | 0 | Yes | No |
| 17011792 | MALICIOUS BLACK HOLE NODE DETECTION AND CIRCUMVENTION | September 2020 | February 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 17010391 | SECURE DEVICE OPERATING WITH A SECURE TAMPER-RESISTANT PLATFORM, CORRESPONDING SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT | September 2020 | August 2022 | Allow | 23 | 0 | 0 | No | No |
| 16944433 | EXECUTING MODULAR ALERTS AND ASSOCIATED SECURITY ACTIONS | July 2020 | January 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 16941093 | RELIABILITY OF INFORMATION SECURITY CONTROLS FOR ATTACK READINESS | July 2020 | October 2022 | Allow | 27 | 1 | 0 | No | No |
| 16896803 | METHOD AND DEVICE FOR HANDLING AN ANOMALY AT A CONTROL UNIT | June 2020 | June 2023 | Allow | 36 | 3 | 0 | No | No |
| 16890671 | SYSTEM AND METHOD FOR CONNECTED VEHICLE SECURITY INCIDENT INTEGRATION BASED ON AGGREGATE EVENTS | June 2020 | May 2024 | Allow | 47 | 5 | 0 | No | No |
| 16889579 | RISK BASED PRIORITY PROCESSING OF DATA | June 2020 | November 2022 | Allow | 30 | 1 | 0 | Yes | No |
| 16871198 | DEVICE DEACTIVATION BASED ON BEHAVIOR PATTERNS | May 2020 | September 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16833302 | EFFICIENT DETERMINATION OF EXPECTED MAXIMUM FOR ANOMALY DETECTION | March 2020 | April 2022 | Allow | 25 | 0 | 0 | Yes | No |
| 16649293 | PROVISIONING OF VENDOR CREDENTIALS | March 2020 | May 2023 | Allow | 38 | 3 | 0 | Yes | No |
| 16798973 | MALWARE COLLUSION DETECTION | February 2020 | January 2023 | Allow | 35 | 2 | 0 | No | No |
| 16752221 | DNS PACKAGE IN A NETWORK | January 2020 | June 2023 | Allow | 40 | 3 | 0 | Yes | No |
| 16719026 | SYSTEM AND METHOD FOR VERIFYING VERIFIABLE CLAIMS | December 2019 | September 2020 | Allow | 9 | 1 | 0 | Yes | No |
| 16712942 | VERIFICATION AND IDENTIFICATION OF A NEURAL NETWORK | December 2019 | March 2023 | Allow | 39 | 2 | 0 | Yes | No |
| 16706807 | METHOD OF RESPONSE SIGNAL PROCESSING IN TRACTION POWER NETWORKS | December 2019 | February 2022 | Allow | 27 | 0 | 0 | Yes | No |
| 16594477 | DISTRACTIONAL VARIABLE IDENTIFICATION FOR AUTHENTICATION OF RESOURCE DISTRIBUTION | October 2019 | January 2022 | Allow | 28 | 0 | 0 | Yes | No |
| 16500736 | METHOD FOR REDUCING FALSE-POSITIVES FOR IDENTIFICATION OF DIGITAL CONTENT | October 2019 | May 2023 | Allow | 43 | 3 | 0 | Yes | No |
| 16590568 | Method, Computer-Readable Medium, System and Vehicle Comprising the System for Providing a Data Record of a Vehicle to a Third Party | October 2019 | November 2021 | Allow | 26 | 0 | 0 | No | No |
| 16569451 | COMMUNICATION SYSTEM AND METHOD FOR APPLYING QUANTUM KEY DISTRIBUTION SECURITY FOR A TIME SENSITIVE NETWORK | September 2019 | February 2024 | Allow | 53 | 5 | 0 | Yes | No |
| 16554994 | QUANTUM COMMUNICATION CONTROL APPARATUS, QUANTUM COMMUNICATION SYSTEM HAVING QUANTUM COMMUNICATION CONTROL APPARATUS, AND METHOD FOR DESIGNING QUANTUM COMMUNICATION CONTROL APPARATUS | August 2019 | September 2022 | Abandon | 37 | 2 | 0 | No | No |
| 16548002 | CYBER BREACH DIAGNOSTICS SYSTEM FOR USE IN DIAGNOSING WHETHER TARGET NETWORK SYSTEM IS BREACHED BY CYBER ATTACK | August 2019 | July 2022 | Abandon | 35 | 1 | 0 | No | No |
| 16528397 | CORRELATING FORENSIC AND NON-FORENSIC DATA IN AN INFORMATION TECHNOLOGY ENVIRONMENT | July 2019 | March 2023 | Allow | 43 | 3 | 0 | Yes | No |
| 16505969 | METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS FOR PRODUCING GENERIC IP REPUTATION THROUGH CROSS-PROTOCOL ANALYSIS | July 2019 | March 2021 | Allow | 20 | 4 | 0 | No | No |
| 16505945 | DEVICE MANAGEMENT AND SECURITY THROUGH A DISTRIBUTED LEDGER SYSTEM | July 2019 | June 2022 | Allow | 35 | 2 | 0 | Yes | No |
| 16505665 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY CONFIGURING A VIRTUAL ENVIRONMENT FOR IDENTIFYING UNWANTED DATA | July 2019 | September 2022 | Allow | 38 | 3 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ZHU, ZHIMEI.
With a 12.5% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 25.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner ZHU, ZHIMEI works in Art Unit 2495 and has examined 284 patent applications in our dataset. With an allowance rate of 78.2%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.
Examiner ZHU, ZHIMEI's allowance rate of 78.2% places them in the 46% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by ZHU, ZHIMEI receive 1.82 office actions before reaching final disposition. This places the examiner in the 42% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by ZHU, ZHIMEI is 28 months. This places the examiner in the 68% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +37.3% benefit to allowance rate for applications examined by ZHU, ZHIMEI. This interview benefit is in the 85% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 29.1% of applications are subsequently allowed. This success rate is in the 54% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 30.4% of cases where such amendments are filed. This entry rate is in the 44% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 50.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 44% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 50.0% of appeals filed. This is in the 17% percentile among all examiners. Of these withdrawals, 37.5% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 51.9% are granted (fully or in part). This grant rate is in the 51% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.9% of allowed cases (in the 60% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.