Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18983922 | METHOD AND APPARATUS FOR SUPPORTING NETWORK ASSISTANCE SECURITY ESTABLISHMENT IN UE-TO-UE RELAY IN A WIRELESS COMMUNICATION SYSTEM | December 2024 | March 2025 | Allow | 3 | 0 | 0 | No | No |
| 18764792 | METHODS, SYSTEMS, AND DEVICES FOR VERIFYING A LOCATION OF A COMMUNICATION DEVICE | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18752532 | PROTECTING NON-HTTP AND TCP/UDP APPLICATIONS IN A ZTNA/WEBVPN ENVIRONMENT | June 2024 | February 2025 | Allow | 8 | 0 | 0 | Yes | No |
| 18661534 | ENHANCED SECURITY FEATURES FOR CONTROLLING ACCESS TO SHARED CONTENT AND PRIVATE CONTENT OF A SHARED DOCUMENT | May 2024 | March 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18412344 | METHOD AND APPARATUS FOR NOISE INJECTION FOR PUF GENERATOR CHARACTERIZATION | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18404058 | CHECKPOINT IDENTITY VERIFICATION USING MOBILE IDENTIFICATION CREDENTIAL | January 2024 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18400919 | METHOD AND APPARATUS FOR GENERATING PROVISIONING DATA FOR AN INSTALLED ELECTRONIC DEVICE | December 2023 | July 2025 | Allow | 18 | 0 | 0 | No | No |
| 18527167 | WIRELESS CHANNEL POWER PROFILE FALSE BASE STATION DETECTION | December 2023 | August 2024 | Allow | 9 | 0 | 0 | No | No |
| 18518003 | SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES | November 2023 | August 2024 | Allow | 9 | 0 | 0 | No | No |
| 18517130 | A SYSTEM THAT MANAGES ACCESS POINT MULTI-LINK DEVICE WITH MULTIPLE STATIONS | November 2023 | May 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18510331 | DETERMINING ANOMALOUS TOOL INVOCATIONS BY APPLICATIONS USING LARGE GENERATIVE MODELS | November 2023 | June 2025 | Allow | 19 | 0 | 0 | No | No |
| 18507282 | SYSTEMS AND METHODS FOR VIRTUAL PERSONAL WI-FI NETWORK | November 2023 | August 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18479475 | WIRELESS DATA SERVICE USING CONTENT-ADDRESSING | October 2023 | May 2025 | Allow | 19 | 0 | 0 | No | No |
| 18470518 | AUTHENTICATING DEVICES VIA TOKENS AND VERIFICATION COMPUTING DEVICES | September 2023 | July 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18368997 | OPPORTUNISTIC RELAY AMONG MOBILE COMMUNICATION DEVICES | September 2023 | April 2025 | Allow | 19 | 0 | 0 | No | No |
| 18467326 | AGGREGATION PLATFORM PORTAL | September 2023 | October 2024 | Abandon | 13 | 1 | 0 | No | No |
| 18229997 | METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT | August 2023 | February 2025 | Abandon | 19 | 2 | 0 | Yes | No |
| 18352189 | OPERATING CHANNEL VALIDATION UNDER PROTECTED BEACON | July 2023 | March 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18307409 | DYNAMIC SECURITY SERVICE EXTENSION BASED ON SOFTWARE BILL OF MATERIALS | April 2023 | March 2025 | Allow | 23 | 0 | 0 | No | No |
| 18300884 | AUTO ACCOUNT PROVISIONING IN A CLOUD-BASED WIRELESS NETWORK | April 2023 | March 2025 | Allow | 23 | 0 | 0 | No | No |
| 18175775 | ID-BASED CONTROL UNIT-KEY FOB PAIRING | February 2023 | September 2023 | Allow | 7 | 0 | 0 | No | No |
| 18167040 | COMBINED REAL-TIME AND BATCH THREAT DETECTION | February 2023 | August 2023 | Allow | 7 | 0 | 0 | No | No |
| 18106730 | ESTABLISHING A PERSONAL-PUBLIC SERVICE SET IDENTIFIER CONNECTION BETWEEN A PERSONAL DEVICE AND THE INTERNET | February 2023 | June 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18094787 | CONTINUOUS AUTHENTICATION THROUGH ORCHESTRATION AND RISK CALCULATION POST-AUTHENTICATION SYSTEM AND METHOD | January 2023 | December 2023 | Allow | 11 | 0 | 0 | No | No |
| 18150297 | PARAMETER EXCHANGE DURING EMERGENCY ACCESS USING EXTENSIBLE AUTHENTICATION PROTOCOL MESSAGING | January 2023 | July 2024 | Allow | 18 | 2 | 0 | Yes | Yes |
| 18089212 | USING AN END-TO-END POLICY CONTROLLER TO SPLIT POLICIES BETWEEN ENFORCEMENT POINTS IN A NETWORK | December 2022 | September 2024 | Allow | 21 | 0 | 0 | No | No |
| 18088720 | SYSTEMS AND METHODS FOR VIRTUAL PERSONAL WI-FI NETWORK | December 2022 | July 2023 | Allow | 6 | 0 | 0 | No | No |
| 18146074 | SYSTEM AND METHOD FOR ENCRYPTED DISK INSPECTION | December 2022 | October 2024 | Allow | 21 | 2 | 0 | No | No |
| 18088107 | CREATING MALWARE PREVENTION RULES USING MALWARE DETECTION AND PREVENTION SYSTEM | December 2022 | March 2025 | Abandon | 27 | 3 | 0 | No | No |
| 18087759 | ZERO TRUST DATA CASTLE SYSTEM WITH SECURITY OPERATION METHODS FOR ACTIVE RESPONSE | December 2022 | May 2025 | Allow | 29 | 1 | 1 | Yes | No |
| 18076097 | AUTHENTICATION OF VIRTUAL MACHINE IMAGES USING DIGITAL CERTIFICATES | December 2022 | July 2023 | Allow | 7 | 0 | 0 | No | No |
| 18074203 | SECURE LINK AGGREGATION FOR ESTABLISHING SECURE SESSION BETWEEN PEERS | December 2022 | January 2025 | Abandon | 25 | 2 | 0 | No | No |
| 17968488 | REDUNDANT DATA LOG RETRIEVAL IN MULTI-PROCESSOR DEVICE | October 2022 | September 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17955820 | SINGLE SIGN-ON BETWEEN 2 INDEPENDENT STATES | September 2022 | April 2025 | Allow | 31 | 1 | 0 | No | No |
| 17906969 | METHOD AND APPARATUS FOR MONITORING SOFTWARE LICENSE INFORMATION AND ADDING INFORMATION BLOCK INTO AN INFORMATION CHAIN, AND SERVER AND STORAGE MEDIUM | September 2022 | June 2025 | Allow | 32 | 2 | 1 | Yes | No |
| 17900173 | SYSTEM AND METHOD FOR SECURED SHARING OF MEDICAL DATA GENERATED BY A PATIENT MEDICAL DEVICE | August 2022 | January 2024 | Abandon | 16 | 1 | 0 | No | No |
| 17893170 | PRIVACY PROTECTION AUTHENTICATION METHOD BASED ON WIRELESS BODY AREA NETWORK | August 2022 | March 2023 | Allow | 7 | 1 | 0 | No | No |
| 17892346 | IDENTIFYING SENSITIVE DATA USING REDACTED DATA | August 2022 | June 2025 | Abandon | 34 | 1 | 0 | Yes | No |
| 17813734 | MACHINE LEARNING MODEL GENERATING SYSTEM WITH ENHANCED PRIVACY PROTECTION, MACHINE LEARNING MODEL GENERATING METHOD WITH ENHANCED PRIVACY PROTECTION | July 2022 | October 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17867019 | PROTECTING COMPUTERS FROM MALICIOUS DISTRIBUTED CONFIGURATION PROFILES | July 2022 | April 2024 | Allow | 21 | 0 | 0 | No | No |
| 17866871 | PROTECTING NON-HTTP AND TCP/UDP APPLICATIONS IN A ZTNA/WEBVPN ENVIRONMENT | July 2022 | April 2024 | Allow | 21 | 0 | 0 | No | No |
| 17867066 | CLASSIFICATION DEVICE WITH ADAPTIVE CLUSTERING FUNCTION AND RELATED COMPUTER PROGRAM PRODUCT | July 2022 | April 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 17867076 | GRAPHICAL WATERMARK, METHOD AND APPARATUS FOR GENERATING SAME, AND METHOD AND APPARATUS FOR AUTHENTICATING SAME | July 2022 | August 2024 | Allow | 25 | 0 | 0 | No | No |
| 17758594 | REMOTE ATTESTATION | July 2022 | December 2024 | Abandon | 29 | 0 | 1 | No | No |
| 17758386 | CRYPTO-JACKING DETECTION | July 2022 | July 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17855044 | SECURE DEVICE PAIRING | June 2022 | May 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17848762 | INTELLIGENT AUTHENTICATION OF USERS IN METAVERSE LEVERAGING NON-FUNGIBLE TOKENS AND BEHAVIOR ANALYSIS | June 2022 | March 2024 | Allow | 21 | 0 | 0 | No | No |
| 17831699 | IDENTITY MANAGEMENT FOR SOFTWARE COMPONENTS | June 2022 | February 2024 | Allow | 21 | 1 | 1 | No | No |
| 17780266 | Method for coordinating the mitigation of a cyber attack, associated device and system | May 2022 | June 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17779202 | KEY GENERATION APPARATUS, KEY UTILIZATION APPARATUS, AND KEY GENERATION METHOD | May 2022 | May 2024 | Allow | 23 | 0 | 0 | No | No |
| 17748205 | AUTHORIZATION AND AUDIT CONTROL IN A MULTI-PROTOCOL IOT DOMAIN | May 2022 | March 2024 | Allow | 22 | 0 | 0 | No | No |
| 17748981 | MULTIPLE HOST WEB AUTHENTICATION ON THE SAME PORT USING SEGMENT SECURITY | May 2022 | July 2024 | Allow | 26 | 0 | 1 | No | No |
| 17746314 | METHOD AND NETWORK SYSTEM FOR DEFEATING MEDIA-COORDINATED ATTACKS ON EMERGENCY CALL NETWORKS | May 2022 | February 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 17777093 | METHOD AND APPARATUS FOR PREVENTING ACCESS TO AN IOT DEVICE | May 2022 | May 2024 | Allow | 24 | 1 | 0 | Yes | No |
| 17743215 | DETECTING PATTERNS IN NETWORK TRAFFIC RESPONSES FOR MITIGATING DDOS ATTACKS | May 2022 | May 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17742187 | CLOUD CONTROL MANAGEMENT SYSTEM INCLUDING A DISTRIBUTED SYSTEM FOR TRACKING DEVELOPMENT WORKFLOW | May 2022 | September 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17716214 | Network Telemetry with Byte Distribution and Cryptographic Protocol Data Elements | April 2022 | June 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17708913 | METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT | March 2022 | May 2023 | Allow | 14 | 0 | 0 | Yes | No |
| 17687756 | STORAGE SYSTEM HAVING MULTIPLE MANAGEMENT CONTROLLERS FOR DETECTING A FAILURE | March 2022 | May 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17673692 | AUTHENTICATION AND ACCESS MANAGEMENT FOR HETEROGENEOUS SOURCES OF ANOMALY DETECTION DATA | February 2022 | February 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17635905 | METHODS AND DEVICES FOR PAIRING IN A WIRELESS NETWORK | February 2022 | September 2022 | Allow | 7 | 0 | 0 | Yes | No |
| 17671108 | ANONYMOUS COMMUNICATION OVER VIRTUAL, MODULAR AND DISTRIBUTED SATELLITE COMMUNICATIONS NETWORK | February 2022 | November 2023 | Abandon | 21 | 1 | 0 | No | No |
| 17665507 | ENABLING A SECURE MESH NETWORK | February 2022 | October 2023 | Abandon | 20 | 1 | 0 | No | No |
| 17665506 | ENABLING A SECURE MESH NETWORK | February 2022 | October 2023 | Abandon | 21 | 1 | 0 | No | No |
| 17592463 | ENABLING A SECURE MESH NETWORK USING PUBLIC KEYS AND COMMUNICATION PARAMETERS OF DEVICES | February 2022 | October 2023 | Abandon | 21 | 4 | 0 | Yes | No |
| 17591557 | ACCESSING DATA FROM ELECTRONIC DISCOVERY APPLICATIONS | February 2022 | September 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17583313 | BOOTSTRAPPING AND TROUBLESHOOTING OF REMOTE DEVICES | January 2022 | December 2024 | Abandon | 34 | 2 | 0 | Yes | No |
| 17583284 | VERIFYING TRUST POSTURES OF HETEROGENEOUS CONFIDENTIAL COMPUTING CLUSTERS | January 2022 | January 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17578658 | OFF-LINE BATTERY SWAP METHOD, BATTERY CHARGING AND SWAP STATION, VEHICLE WITH BATTERY TO BE SWAPPED, AND READABLE STORAGE MEDIUM | January 2022 | July 2024 | Allow | 30 | 1 | 0 | No | No |
| 17573831 | METHODS, SYSTEMS, AND DEVICES FOR VERIFYING A LOCATION OF A COMMUNICATION DEVICE | January 2022 | March 2024 | Allow | 26 | 0 | 0 | No | No |
| 17570966 | METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT | January 2022 | March 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17570363 | MULTI-UPLINK PATH QUALITY AWARE IPSEC | January 2022 | June 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17565127 | ENHANCED SECURITY FEATURES FOR CONTROLLING ACCESS TO SHARED CONTENT AND PRIVATE CONTENT OF A SHARED DOCUMENT | December 2021 | March 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17556449 | METHODS AND SYSTEMS FOR VERIFYING APPLICATIONS | December 2021 | March 2023 | Allow | 15 | 0 | 0 | Yes | No |
| 17556318 | Efficient SSL/TLS Proxy | December 2021 | January 2024 | Allow | 25 | 0 | 1 | No | No |
| 17555266 | BLOCKCHAIN-BASED METHOD AND DEVICE FOR PROCESSING DRIVING DATA | December 2021 | October 2022 | Allow | 10 | 0 | 0 | No | No |
| 17549193 | DETECTING ANOMALOUS RESOURCES AND EVENTS IN SOCIAL DATA USING A TRAINED ANOMALY DETECTOR | December 2021 | January 2025 | Allow | 37 | 1 | 0 | Yes | No |
| 17549591 | BATCH PROCESSING OF AUDIT RECORDS | December 2021 | July 2024 | Abandon | 31 | 1 | 0 | No | No |
| 17536996 | Connected Vehicle Network Access Optimization Using an Intermediary Platform | November 2021 | March 2023 | Allow | 15 | 0 | 0 | No | No |
| 17537064 | AUTHENTICATOR CENTRALIZATION AND PROTECTION INCLUDING SELECTION OF AUTHENTICATOR TYPE BASED ON AUTHENTICATION POLICY | November 2021 | June 2024 | Allow | 31 | 3 | 0 | Yes | No |
| 17455000 | IDENTITY-BASED MESSAGE INTEGRITY PROTECTION AND VERIFICATION FOR WIRELESS COMMUNICATION | November 2021 | August 2023 | Allow | 21 | 0 | 0 | No | No |
| 17520497 | DETECTING UNAUTHORIZED DEVICES BY TRACKING CHANGES IN PARAMETER BEHAVIOR | November 2021 | October 2024 | Abandon | 35 | 4 | 0 | Yes | No |
| 17506298 | Common Access Management Across Role-Based Access Control and Attribute-Based Access Control | October 2021 | July 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17497383 | AUTHENTICATION AND AUTHORIZATION IN PROXIMITY BASED SERVICE COMMUNICATION USING A GROUP KEY | October 2021 | October 2024 | Abandon | 36 | 3 | 0 | Yes | No |
| 17488593 | METHOD AND ELECTRONIC VEHICLE SYSTEM FOR PROCESSING V2X MESSAGES INCLUDING FORWARDING MESSAGES FOR VERIFICATION | September 2021 | March 2025 | Abandon | 41 | 4 | 0 | Yes | No |
| 17488002 | COMMUNICATION APPARATUS USING DEVICE PROVISIONING PROTOCOL TO SEND OR RECEIVE A COMMUNICATION PARAMETER FOR EXECUTING 802.11r FAST TRANSITION CONNECTION PROCESSING, AND COMMUNICATION METHOD AND STORAGE MEDIUM THEREOF | September 2021 | August 2024 | Allow | 34 | 1 | 1 | Yes | No |
| 17484510 | COMMUNICATION APPARATUS FOR PROVIDING A SETTING SCREEN HAVING HIGH CONVENIENCE OF USER INPUT OF COMMUNICATION PARAMETERS, CONTROL METHOD, AND STORAGE MEDIUM | September 2021 | January 2025 | Allow | 39 | 2 | 0 | Yes | No |
| 17475244 | DATA PROCESSING SYSTEMS AND METHODS FOR USING A DATA MODEL TO SELECT A TARGET DATA ASSET IN A DATA MIGRATION | September 2021 | March 2022 | Allow | 6 | 0 | 1 | No | No |
| 17472256 | SEMICONDUCTOR DEVICE INCLUDING A NORMAL MODE, A DEBUG MODE, AND A KEY | September 2021 | March 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17466542 | SERVER WITH DATA SECURITY MEASURE | September 2021 | November 2023 | Allow | 26 | 0 | 0 | No | No |
| 17410561 | Virus immune computer system and method | August 2021 | August 2023 | Abandon | 24 | 1 | 0 | No | No |
| 17398723 | CHECKPOINT IDENTITY VERIFICATION USING MOBILE IDENTIFICATION CREDENTIAL | August 2021 | February 2023 | Allow | 18 | 0 | 0 | No | No |
| 17395906 | CYBERSECURITY VULNERABILITY MANAGEMENT BASED ON APPLICATION RANK AND NETWORK LOCATION | August 2021 | January 2023 | Allow | 18 | 0 | 0 | Yes | No |
| 17390958 | AGGREGATION PLATFORM PORTAL FOR DISPLAYING AND UPDATING DATA FOR THIRD-PARTY SERVICE PROVIDERS | July 2021 | June 2023 | Allow | 22 | 1 | 0 | No | No |
| 17389537 | Network Telemetry with Byte Distribution and Cryptographic Protocol Data Elements | July 2021 | October 2021 | Allow | 3 | 0 | 0 | Yes | No |
| 17387027 | METHOD AND APPARATUS FOR ESTABLISHING CONNECTION WITH MESH NETWORKING, AND GATEWAY DEVICE | July 2021 | November 2023 | Allow | 28 | 1 | 0 | No | No |
| 17385647 | MODELING TECHNIQUES TO CLASSIFY DATA SETS CONTAINING PERSONAL IDENTIFIABLE INFORMATION COMPRISING NUMERICAL IDENTIFIERS | July 2021 | September 2023 | Allow | 26 | 0 | 0 | Yes | No |
| 17366754 | AUTOMATED DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATICALLY PROCESSING DATA SUBJECT ACCESS REQUESTS USING A CHATBOT | July 2021 | March 2022 | Allow | 8 | 0 | 1 | No | No |
| 17360060 | FAST BASIC SERVICE SET TRANSITION FOR MULTI-LINK OPERATION | June 2021 | August 2023 | Allow | 26 | 0 | 1 | Yes | No |
| 17415231 | USER AUTHENTICATION | June 2021 | June 2024 | Abandon | 36 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner PATEL, HARESH N.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 36.4% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner PATEL, HARESH N works in Art Unit 2496 and has examined 266 patent applications in our dataset. With an allowance rate of 82.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.
Examiner PATEL, HARESH N's allowance rate of 82.7% places them in the 49% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by PATEL, HARESH N receive 1.42 office actions before reaching final disposition. This places the examiner in the 32% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by PATEL, HARESH N is 28 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +12.0% benefit to allowance rate for applications examined by PATEL, HARESH N. This interview benefit is in the 51% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 31.7% of applications are subsequently allowed. This success rate is in the 58% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 18.8% of cases where such amendments are filed. This entry rate is in the 15% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 57.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 46% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 75.0% of appeals filed. This is in the 60% percentile among all examiners. Of these withdrawals, 55.6% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 43.2% are granted (fully or in part). This grant rate is in the 46% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.