Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19108933 | METHOD OF UTILIZING PHYSICAL OBJECTS IN A BLOCKCHAIN | March 2025 | January 2026 | Allow | 10 | 1 | 0 | Yes | No |
| 18748821 | ACCESS CONTROL LISTS RULES REDUCTION | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18747969 | Identification of Command Injection Attacks | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18680661 | SYSTEM AND METHOD FOR CONTROLLING AKMA APPLICATION KEYS FOR ROAMING MOBILE DEVICES | May 2024 | March 2026 | Allow | 22 | 2 | 0 | No | No |
| 18673003 | DATA ENCRYPTION FOR DATA TRANSFERS BETWEEN SEMICONDUCTOR DIES USING A KEYSTREAM GENERATOR | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18673057 | SYSTEM AND METHOD FOR ANALYZING VULNERABILITY IN SOFTWARE INSTALLED ON IOT DEVICE | May 2024 | November 2024 | Allow | 6 | 1 | 0 | No | No |
| 18673066 | SYSTEM AND METHOD FOR ANLAYZING VULNERABILITY IN IOT DEVICES THROUGH PREPROCESSING IDENTIFICATION INFORMATION OF CONTAMINATION PATHS | May 2024 | January 2026 | Allow | 20 | 1 | 0 | No | No |
| 18673062 | SYSTEM AND METHOD FOR ANALYZING CONTAMINATION PATHS TO ANALYZE VULNERABILITIES IN IOT DEVICES | May 2024 | January 2026 | Allow | 20 | 1 | 0 | No | No |
| 18442457 | CRYPTOGRAPHIC DATA PROCESSING USING A DMA ENGINE | February 2024 | April 2025 | Allow | 14 | 1 | 0 | No | No |
| 18439138 | SYSTEM TO MANAGE PRIVACY PREFERENCES | February 2024 | March 2026 | Allow | 25 | 2 | 0 | Yes | No |
| 18421779 | SECURED POSITION AWARE CONTINUOUS AUTHENTICATION MESH NETWORK | January 2024 | November 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18405804 | MOBILE DEVICE INTERFACE | January 2024 | June 2025 | Allow | 18 | 1 | 0 | No | No |
| 18403436 | SLICE-BASED SECURITY PROTOCOL SELECTION FOR INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM (IMS) | January 2024 | October 2025 | Allow | 21 | 1 | 0 | No | No |
| 18543902 | AUTOMATIC SIGN-IN UPON ACCOUNT SIGNUP | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18540242 | METHOD AND DEVICE FOR PROTECTING SENSITIVE USER PLANE TRAFFIC | December 2023 | October 2024 | Allow | 10 | 1 | 0 | No | No |
| 18535512 | SYSTEM AND METHOD OF PRIVACY-AWARE INTER-CHANNEL COMMUNICATION BETWEEN A BUSINESS ENTITY AND A PERSON | December 2023 | August 2025 | Allow | 20 | 0 | 0 | No | No |
| 18529558 | Issuing Delegate Credentials for Accessing Target Resources | December 2023 | March 2026 | Allow | 27 | 1 | 0 | Yes | No |
| 18527493 | CROSS-CHAIN RESOURCE TRANSFER USING RESOURCE TRANSFER CERTIFICATE | December 2023 | August 2025 | Allow | 20 | 0 | 0 | No | No |
| 18389026 | Methods and Systems for Efficient Encrypted SNI Filtering for Cybersecurity Applications | November 2023 | November 2024 | Allow | 12 | 1 | 0 | No | No |
| 18494287 | SECURITY LIFECYCLE MANAGEMENT OF DEVICES IN A COMMUNICATIONS NETWORK | October 2023 | August 2024 | Allow | 10 | 1 | 0 | No | No |
| 18491643 | SECURE ZERO TOUCH PROVISIONING OF NETWORK DEVICES USING BLUETOOTH APPLICATION | October 2023 | January 2026 | Allow | 27 | 2 | 0 | Yes | No |
| 18555227 | MAGNETIC PORT COVERS FOR COMPUTING DEVICES | October 2023 | February 2026 | Abandon | 28 | 1 | 0 | No | No |
| 18373465 | METHODS FOR GENERATING AN ACTION BASED ON TLS PARAMETERS AND DEVICES THEREOF | September 2023 | February 2026 | Allow | 29 | 2 | 0 | No | No |
| 18369070 | VIRTUALIZING SECURE VAULT OF DATA PROCESSING UNIT FOR SECURE HARDWARE SECURITY MODULE FOR HOSTS | September 2023 | October 2025 | Allow | 25 | 1 | 0 | No | No |
| 18460913 | IIoT CROSS-DOMAIN AUTHENTICATION USING IDENTITY FEDERATED SMART CONTRACTS | September 2023 | October 2025 | Allow | 26 | 1 | 0 | No | No |
| 18234238 | SYSTEM AND METHOD FOR LOCATION-BASED ACCESS CONTROL | August 2023 | November 2024 | Allow | 15 | 1 | 0 | No | No |
| 18226074 | ONLINE COMMAND INJECTION ATTACKS IDENTIFICATION | July 2023 | March 2024 | Allow | 8 | 1 | 0 | No | No |
| 18222887 | SYSTEM AND METHOD FOR PERFORMING REMOTE SECURITY ASSESSMENT OF FIREWALLED COMPUTER | July 2023 | June 2024 | Allow | 11 | 1 | 0 | No | No |
| 18347385 | Attestation Of A Cloud-Based Execution Environment For Project Planning | July 2023 | March 2026 | Allow | 32 | 4 | 0 | No | No |
| 18341450 | Wireless Earpieces for Hub Communications | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18339571 | PLATFORM SECURITY MECHANISM | June 2023 | July 2025 | Abandon | 25 | 4 | 0 | Yes | No |
| 18202329 | NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM AND METHOD | May 2023 | January 2026 | Allow | 31 | 1 | 0 | No | No |
| 18142858 | SYSTEMS AND METHODS FOR AIDA BASED EXPLOIT SELECTION | May 2023 | June 2024 | Allow | 13 | 2 | 0 | No | No |
| 18311149 | SYSTEMS AND METHODS FOR SIMULTANEOUS MULTIFACTOR AUTHENTICATION | May 2023 | September 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18309722 | CRYPTOGRAPHIC PROCESS FOR PORTABLE DEVICES, AND USER PRESENCE AND/OR ACCESS AUTHORIZATION SYSTEM AND METHOD EMPLOYING SAME | April 2023 | July 2024 | Abandon | 15 | 1 | 0 | No | No |
| 18303901 | ACCESS TO DATA BROADCAST IN ENCRYPTED FORM BASED ON BLOCKCHAIN | April 2023 | February 2024 | Allow | 10 | 1 | 0 | No | No |
| 18031183 | RELAY UE AND REMOTE UE AUTHORIZATION | April 2023 | July 2025 | Allow | 27 | 1 | 0 | No | No |
| 18119823 | METHOD FOR PROVIDING DEVICE SHARING SERVICE IN ISOLATION ENVIRONMENT AND SERVER PERFORMING THE SAME | March 2023 | February 2026 | Abandon | 35 | 2 | 0 | No | No |
| 18114955 | SYSTEMS AND METHODS FOR HYBRID BLOCKCHAIN CONTROL | February 2023 | October 2023 | Allow | 8 | 1 | 0 | No | No |
| 18167744 | Function Call Authentication for Program Flow Control | February 2023 | September 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 18165724 | PRIVACY PROTECTING TRANSACTION ENGINE FOR A CLOUD PROVIDER NETWORK | February 2023 | March 2024 | Allow | 13 | 1 | 0 | No | No |
| 18056723 | INFORMATION SECURITY EARLY WARNING DEVICE AND METHOD THEREOF | November 2022 | October 2025 | Abandon | 35 | 1 | 0 | No | No |
| 18045929 | PASSWORD-LESS WIRELESS AUTHENTICATION | October 2022 | April 2024 | Allow | 18 | 3 | 0 | No | No |
| 17958538 | SYSTEM TO TERMINATE MALICIOUS PROCESS IN A DATA CENTER | October 2022 | September 2025 | Abandon | 36 | 1 | 0 | No | No |
| 17958794 | SYSTEM AND METHOD FOR SECURE CODE SCANNING | October 2022 | February 2026 | Abandon | 41 | 4 | 0 | No | No |
| 17953177 | MOBILE DEVICE INTERFACE | September 2022 | August 2023 | Allow | 11 | 1 | 0 | No | No |
| 17913889 | REPRESENTATION TOKENS IN INDIRECT COMMUNICATION | September 2022 | September 2025 | Abandon | 36 | 1 | 0 | No | No |
| 17911830 | METHOD AND DEVICE FOR PROTECTING SENSITIVE USER PLANE TRAFFIC | September 2022 | September 2023 | Allow | 12 | 2 | 0 | No | No |
| 17939602 | MANAGING COMPOSITE TOKENS FOR CONTENT ACCESS REQUESTS | September 2022 | February 2025 | Allow | 30 | 0 | 0 | No | No |
| 17908083 | Method and device for detecting the use of an uncertified domain name server | August 2022 | February 2026 | Allow | 41 | 3 | 0 | Yes | No |
| 17890682 | PRIVACY ARRANGEMENT FOR DIRECTIONAL DATA | August 2022 | February 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17889858 | METHOD AND APPARATUS FOR CONTROLLING COMPUTING ASSETS WITHIN A ZERO-TRUST ARCHITECTURE | August 2022 | February 2024 | Allow | 18 | 0 | 0 | No | No |
| 17904210 | IMPROVED PACKET TRANSFER | August 2022 | September 2025 | Allow | 37 | 3 | 0 | Yes | No |
| 17886862 | ELECTRONIC SYSTEM FOR SECURITY ANALYSIS AND VALIDATION DURING CONSTRUCTION AND DEPLOYMENT OF DYNAMIC NETWORK COMPONENTS | August 2022 | August 2024 | Allow | 24 | 0 | 0 | No | No |
| 17818264 | MUTUAL AUTHENTICATION FOR RELIABLE CONFIGURATION RECEPTION OVER REFERENCE SIGNALS | August 2022 | June 2024 | Allow | 22 | 0 | 0 | No | No |
| 17880385 | IDENTIFYING SECURITY EVENTS IN PROGRAMMING CODE FOR LOGGING | August 2022 | January 2025 | Allow | 30 | 1 | 0 | No | No |
| 17863414 | BLOCKCHAIN-BASED PRIVACY PROTECTION METHOD FOR CONTENT CENTRIC NETWORK (CCN) | July 2022 | June 2024 | Allow | 24 | 0 | 0 | No | No |
| 17863487 | NETWORKING DEVICE CREDENTIAL INFORMATION RESET SYSTEM | July 2022 | September 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17863140 | DETECTING IDENTITY SPOOFING ATTACKS IN MULTI-SENSOR SYSTEMS AND APPLICATIONS | July 2022 | June 2025 | Allow | 35 | 4 | 0 | Yes | No |
| 17849406 | METHOD AND APPARATUS FOR DETECTING ABNORMAL ROAMING REQUEST | June 2022 | August 2024 | Abandon | 26 | 1 | 0 | No | No |
| 17783920 | Apparatus and Methods for Encrypted Communication | June 2022 | October 2025 | Allow | 40 | 3 | 0 | No | No |
| 17783644 | METHOD AND SYSTEM FOR MANAGING IMPERSONATED, FORGED/TAMPERED EMAIL | June 2022 | March 2026 | Abandon | 45 | 5 | 0 | Yes | No |
| 17783301 | RENDERING OF UNSAFE WEBPAGES | June 2022 | January 2025 | Abandon | 31 | 2 | 0 | Yes | No |
| 17783077 | ACCESS CONTROL APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | June 2022 | October 2024 | Allow | 28 | 1 | 0 | No | No |
| 17830181 | ACCESS CONTROL LISTS RULES REDUCTION | June 2022 | March 2024 | Allow | 22 | 0 | 0 | No | No |
| 17735409 | SYSTEMS AND METHODS FOR OFFLINE USAGE OF SAAS APPLICATIONS | May 2022 | September 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17730674 | Method and System for Enabling Drive Features Using Secure Certificates | April 2022 | September 2024 | Abandon | 28 | 1 | 0 | No | No |
| 17713837 | SECURE AUDIO PLAYBACK | April 2022 | January 2025 | Abandon | 34 | 2 | 0 | Yes | No |
| 17765032 | SERVER NODE, DIGITAL ASSISTANT AND METHODS IN A COMMUNICATIONS NETWORK FOR HANDLING ACCESS CONTROL | March 2022 | October 2025 | Abandon | 43 | 5 | 0 | No | No |
| 17700281 | CERTIFICATE AUTHORITY SELECTION IN A CLOUD PROVIDER NETWORK | March 2022 | August 2024 | Allow | 29 | 1 | 0 | No | No |
| 17680098 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS | February 2022 | December 2024 | Allow | 34 | 2 | 0 | No | No |
| 17679969 | METHOD, APPARATUS, ELECTRONIC DEVICE, AND MEDIUM FOR DATA TRANSFER | February 2022 | August 2024 | Allow | 29 | 2 | 0 | Yes | No |
| 17677231 | CROWDSOURCED BAYESIAN PACKET ANALYSIS FOR DETECTING ANOMALIES IN NETWORK PACKET HEADER DATA ASSOCIATED WITH A USER'S SMART DEVICE | February 2022 | July 2024 | Allow | 29 | 1 | 0 | No | No |
| 17563436 | Integrated authentication and authorization for cloud data lakes | December 2021 | March 2025 | Allow | 39 | 2 | 0 | Yes | No |
| 17644107 | RULE-BASED TARGETED EXTRACTION AND ENCRYPTION OF SENSITIVE DOCUMENT FEATURES | December 2021 | February 2026 | Abandon | 50 | 2 | 0 | Yes | Yes |
| 17617414 | Provision of Application Level Identity | December 2021 | June 2024 | Allow | 30 | 1 | 0 | No | No |
| 17595089 | LIVE USER AUTHENTICATION DEVICE, SYSTEM AND METHOD AND FRAUD OR COLLUSION PREVENTION USING SAME | November 2021 | July 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17502328 | SECURITY DEVICE TO PROTECT UNUSED COMMUNICATION PORTS | October 2021 | February 2025 | Abandon | 40 | 4 | 0 | Yes | No |
| 17502334 | SECURITY DEVICE TO PROTECT ACTIVE COMMUNICATION PORTS | October 2021 | July 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17603590 | Method to Authenticate a User at a Service Provider | October 2021 | April 2024 | Allow | 30 | 2 | 0 | No | No |
| 17476990 | ATTRIBUTION OF USER DATA SOURCES ACROSS DATASETS IN A DATA SHARING PLATFORM | September 2021 | March 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17463493 | AUTOMATIC SIGN-IN UPON ACCOUNT SIGNUP | August 2021 | November 2023 | Allow | 27 | 0 | 0 | No | No |
| 17459178 | THRESHOLD MULTI-PARTY COMPUTATION WITH MUST-HAVE MEMBER | August 2021 | December 2023 | Allow | 27 | 0 | 0 | No | No |
| 17403995 | IDENTIFYING CREDENTIAL ATTACKS ON ENCRYPTED NETWORK TRAFFIC | August 2021 | February 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17387823 | ANALYZING HARDWARE DESIGNS FOR VULNERABILITIES TO SIDE-CHANNEL ATTACKS | July 2021 | December 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17355691 | PROXY SERVICES FOR CONTROLLING THE PERSISTENCY, UTILIZATION, & DISSEMINATION OF INFORMATION PROVIDED TO A SERVICE WORKER | June 2021 | October 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17304124 | MEMORY SYSTEM AND METHOD OF MANAGING ENCRYPTION KEY | June 2021 | July 2025 | Allow | 49 | 4 | 0 | No | No |
| 17309530 | DETECTING VULNERABILITY CHANGE IN SOFTWARE SYSTEMS | June 2021 | January 2024 | Allow | 31 | 1 | 0 | No | No |
| 17309529 | DETECTING VULNERABLE SOFTWARE SYSTEMS | June 2021 | February 2024 | Allow | 32 | 1 | 0 | No | No |
| 17309531 | REMEDIATING SOFTWARE VULNERABILITIES | June 2021 | January 2024 | Allow | 32 | 1 | 0 | No | No |
| 17291872 | PROTECTION METHOD AND PROTECTION DEVICE UNDER DIRECT ROUTING MODE | May 2021 | March 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17285455 | AUTHENTICATION-PERMISSION SYSTEM, INFORMATION PROCESSING APPARATUS, EQUIPMENT, AUTHENTICATION-PERMISSION METHOD AND PROGRAM | April 2021 | April 2025 | Allow | 48 | 4 | 0 | Yes | No |
| 17215745 | METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT | March 2021 | December 2023 | Allow | 32 | 6 | 0 | Yes | No |
| 17262719 | Control Terminal | January 2021 | August 2025 | Abandon | 54 | 2 | 0 | No | Yes |
| 17250128 | Method for registering of data as a digital file in a blockchain database | December 2020 | November 2023 | Allow | 35 | 1 | 0 | Yes | No |
| 17090052 | INFORMATION PROCESSING APPARATUS, METHOD FOR ENSURING FILES AND STORAGE MEDIUM | November 2020 | October 2025 | Abandon | 59 | 6 | 0 | Yes | No |
| 17032391 | ONE-TOUCH INLINE CRYPTOGRAPHIC DATA PROCESSING | September 2020 | November 2023 | Allow | 38 | 0 | 0 | No | No |
| 16779899 | PROTECTING PERSONAL DATA AND CONTROLLING A DISTRIBUTION OF PERSONAL DATA ACQUIRED BY A POOL CLEANING ROBOT | February 2020 | July 2024 | Abandon | 53 | 2 | 0 | No | Yes |
| 16340440 | MOBILE INFORMATION TERMINAL AND METHOD FOR CONTROLLING SAME | April 2019 | March 2025 | Abandon | 60 | 7 | 0 | Yes | No |
| 16004798 | REVOKING CREDENTIALS AFTER SERVICE ACCESS | June 2018 | October 2023 | Allow | 60 | 6 | 0 | No | Yes |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner POWERS, WILLIAM S.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner POWERS, WILLIAM S works in Art Unit 2496 and has examined 76 patent applications in our dataset. With an allowance rate of 89.5%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 38 months.
Examiner POWERS, WILLIAM S's allowance rate of 89.5% places them in the 72% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by POWERS, WILLIAM S receive 2.11 office actions before reaching final disposition. This places the examiner in the 56% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by POWERS, WILLIAM S is 38 months. This places the examiner in the 30% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +1.1% benefit to allowance rate for applications examined by POWERS, WILLIAM S. This interview benefit is in the 19% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.
When applicants file an RCE with this examiner, 21.3% of applications are subsequently allowed. This success rate is in the 25% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.
This examiner enters after-final amendments leading to allowance in 27.8% of cases where such amendments are filed. This entry rate is in the 39% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 37.5% of appeals filed. This is in the 6% percentile among all examiners. Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 40.0% are granted (fully or in part). This grant rate is in the 30% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 14.5% of allowed cases (in the 96% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.