Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18892295 | CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATION | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18892283 | CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATION | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18668166 | SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION | May 2024 | December 2024 | Allow | 7 | 0 | 0 | No | No |
| 18653991 | AUTOMATICALLY COMPUTING AND IMPROVING A CYBERSECURITY RISK SCORE | May 2024 | January 2025 | Allow | 8 | 0 | 0 | No | No |
| 18652559 | Enforcing a Segmentation Policy in Co-Existence with a System Firewall | May 2024 | May 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18640567 | SYSTEMS AND METHODS FOR BLOCKING SPOOFED TRAFFIC | April 2024 | June 2025 | Allow | 14 | 1 | 0 | No | No |
| 18637358 | DECEIVING ATTACKERS ACCESSING NETWORK DATA | April 2024 | May 2025 | Allow | 13 | 1 | 0 | No | No |
| 18622996 | CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMS | March 2024 | November 2024 | Allow | 8 | 0 | 0 | No | No |
| 18607698 | Systems and Methods for Contextually Securing Remote Function Calls | March 2024 | December 2024 | Allow | 9 | 1 | 0 | No | No |
| 18593909 | CYBERSECURITY RECONNAISSANCE, ANALYSIS, AND SCORING USING DISTRIBUTED SYSTEMS | March 2024 | February 2025 | Allow | 11 | 1 | 0 | No | No |
| 18587387 | SYSTEM AND METHOD FOR SEGMENTING TRANSIT CAPABILITIES WITHIN A MULTI-CLOUD ARCHITECTURE | February 2024 | March 2025 | Allow | 12 | 1 | 0 | No | No |
| 18437347 | ADDRESSABLE SMART AGENT DATA TECHNOLOGY TO DETECT UNAUTHORIZED TRANSACTION ACTIVITY | February 2024 | April 2025 | Allow | 15 | 2 | 0 | No | No |
| 18433090 | PHISHING EMAIL CAMPAIGN IDENTIFICATION | February 2024 | June 2025 | Allow | 17 | 2 | 0 | No | No |
| 18409538 | SOURCE CODE CLUSTERING FOR AUTOMATICALLY IDENTIFYING FALSE POSITIVES GENERATED THROUGH STATIC APPLICATION SECURITY TESTING | January 2024 | October 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18402662 | AI-DRIVEN DEFENSIVE CYBERSECURITY STRATEGY ANALYSIS AND RECOMMENDATION SYSTEM | January 2024 | September 2024 | Allow | 9 | 0 | 0 | No | No |
| 18391457 | TRUSTED-CODE GENERATED REQUESTS | December 2023 | September 2024 | Allow | 9 | 0 | 0 | No | No |
| 18389082 | PROCESSING A CONTINGENT ACTION TOKEN SECURELY | November 2023 | June 2025 | Allow | 19 | 0 | 0 | No | No |
| 18501383 | SYSTEMS AND METHODS FOR REQUEST GOVERNANCE IN MULTI-TENANCY CLOUD ARCHITECTURE | November 2023 | May 2025 | Allow | 19 | 0 | 0 | No | No |
| 18381864 | APPLICATION PROGRAMMING INTERFACE FINGERPRINT DATA GENERATION AT A MOBILE DEVICE EXECUTING A NATIVE MOBILE APPLICATION | October 2023 | February 2025 | Allow | 16 | 2 | 0 | No | No |
| 18375023 | DATA AND SOURCE VALIDATION FOR EQUIPMENT OUTPUT DATA OR EQUIPMENT FAILURE PREDICTION USING BLOCKCHAINS | September 2023 | December 2024 | Allow | 14 | 1 | 0 | No | No |
| 18472790 | CROSS-REGIONAL REPLICATION OF KEYS | September 2023 | August 2024 | Allow | 11 | 1 | 0 | No | No |
| 18457557 | MULTI-FACTOR NETWORK SEGMENTATION | August 2023 | April 2025 | Allow | 20 | 0 | 0 | No | No |
| 18454166 | UNIFIED IDENTITY AND ACCESS MANAGEMENT (IAM) CONTROL PLANE FOR SERVICES ASSOCIATED WITH A HYBRID CLOUD | August 2023 | April 2024 | Allow | 8 | 0 | 0 | No | No |
| 18234241 | METHODS AND SYSTEMS FOR MULTI-MODAL SECURITY ACCESS CONTROL BASED ON DETAILS OF SECURITY CIRCUMSTANCES | August 2023 | April 2025 | Allow | 20 | 0 | 0 | No | No |
| 18362881 | NETWORK SECURITY DEVICE | July 2023 | May 2025 | Allow | 22 | 0 | 0 | No | No |
| 18228143 | SECURELY MANAGING NETWORK CONNECTIONS | July 2023 | July 2024 | Allow | 11 | 1 | 0 | No | No |
| 18227713 | UPGRADING FIREWALL MODULE ON PORT-BY-PORT BASIS | July 2023 | September 2024 | Abandon | 13 | 1 | 0 | No | No |
| 18353898 | SYSTEM AND METHOD FOR ONGOING TRIGGER-BASED SCANNING OF CYBER-PHYSICAL ASSETS | July 2023 | March 2024 | Allow | 8 | 1 | 0 | No | No |
| 18218899 | ENFORCING A SEGMENTATION POLICY IN CO-EXISTENCE WITH A SYSTEM FIREWALL | July 2023 | February 2024 | Allow | 7 | 1 | 0 | No | No |
| 18346148 | Deceiving Attackers Accessing Network Data | June 2023 | May 2025 | Allow | 23 | 3 | 0 | Yes | No |
| 18195470 | SECURED DATA ACCESS FROM A MOBILE DEVICE EXECUTING A NATIVE MOBILE APPLICATION AND A HEADLESS BROWSER | May 2023 | June 2024 | Allow | 13 | 1 | 0 | No | No |
| 18141912 | SYSTEMS AND METHODS FOR NOTARY AGENT FOR PUBLIC KEY INFRASTRUCTURE NAMES | May 2023 | January 2025 | Allow | 21 | 2 | 0 | Yes | No |
| 18304343 | SYSTEM AND METHODS FOR PREDICTIVE CYBER-PHYSICAL RESOURCE MANAGEMENT | April 2023 | April 2025 | Allow | 24 | 0 | 0 | No | No |
| 18299677 | SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION | April 2023 | January 2024 | Allow | 9 | 1 | 0 | No | No |
| 18183022 | DECEIVING ATTACKERS ACCESSING NETWORK DATA | March 2023 | January 2024 | Allow | 10 | 1 | 0 | No | No |
| 18181539 | SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION | March 2023 | January 2024 | Allow | 10 | 1 | 0 | No | No |
| 18173611 | DECEIVING ATTACKERS ACCESSING ACTIVE DIRECTORY DATA | February 2023 | January 2025 | Allow | 23 | 2 | 0 | No | No |
| 18170495 | GENERATION OF EFFECTIVE SPURIOUS DATA FOR MODEL DEGRADATION | February 2023 | April 2025 | Allow | 26 | 0 | 0 | Yes | No |
| 18167307 | Use of Obfuscation Marker to Obfuscate a Face Image and Enable Computerized Face Identification | February 2023 | March 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18106627 | MULTI-USER, SHARED BLOCKCHAIN SYSTEM | February 2023 | April 2025 | Abandon | 26 | 0 | 1 | No | No |
| 18158142 | SYSTEMS AND METHODS FOR THREAT MITIGATION USING ARTIFICIAL INTELLIGENCE | January 2023 | February 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18059541 | SYSTEMS AND METHODS FOR PERFORMING SINGLE INPUT BASED MULTIFACTOR AUTHENTICATION | November 2022 | July 2024 | Allow | 20 | 0 | 0 | No | No |
| 18057581 | One-Armed Inline Decryption/Encryption Proxy Operating in Transparent Bridge Mode | November 2022 | May 2024 | Allow | 18 | 1 | 0 | No | No |
| 17990084 | DETECTING MAN-IN-THE-MIDDLE ATTACKS IN ADAPTIVE STREAMING | November 2022 | February 2024 | Allow | 15 | 2 | 0 | No | No |
| 18055183 | DETECTING VULNERABILITIES IN CONFIGURATION CODE OF A CLOUD ENVIRONMENT UTILIZING INFRASTRUCTURE AS CODE | November 2022 | March 2025 | Allow | 28 | 1 | 0 | No | No |
| 18051110 | DETECTION OF RANSOMWARE ATTACK USING ENTROPY VALUES | October 2022 | February 2025 | Allow | 28 | 1 | 0 | No | No |
| 18049946 | SYSTEMS AND METHODS FOR INTERNET OF THINGS SECURITY ENVIRONMENT | October 2022 | April 2024 | Allow | 18 | 2 | 0 | No | No |
| 18049746 | ON-DEMAND OPERATIONAL AIRGAP POLICY - VALUE THRESHOLD | October 2022 | February 2025 | Allow | 28 | 1 | 0 | No | No |
| 17972436 | SECURE BLOCKCHAIN-BASED CONSENSUS | October 2022 | February 2024 | Allow | 16 | 1 | 0 | No | No |
| 18048248 | SECURELY MANAGING NETWORK CONNECTIONS | October 2022 | June 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18048116 | SYSTEM, METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT PROVIDING IMPROVED PASSWORD SECURITY | October 2022 | January 2025 | Abandon | 27 | 1 | 0 | No | No |
| 18046646 | MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING | October 2022 | July 2024 | Allow | 22 | 0 | 0 | No | No |
| 17956470 | THREAT CONTROL METHOD AND SYSTEM | September 2022 | December 2024 | Allow | 27 | 1 | 0 | No | No |
| 17953123 | TRUSTED-CODE GENERATED REQUESTS | September 2022 | August 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 17906591 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM | September 2022 | December 2024 | Allow | 27 | 1 | 0 | No | No |
| 17932815 | SECURITY MODEL | September 2022 | September 2024 | Allow | 24 | 1 | 0 | No | No |
| 17898531 | RECEPTION DEVICE, TRANSMISSION DEVICE, AND DATA PROCESSING METHOD | August 2022 | March 2024 | Allow | 19 | 2 | 0 | No | No |
| 17823193 | POLICY MANAGEMENT SYSTEM TO PROVIDE AUTHORIZATION INFORMATION VIA DISTRIBUTED DATA STORE | August 2022 | December 2023 | Allow | 16 | 2 | 0 | No | No |
| 17822446 | AUDIO FEEDBACK-BASED VIDEO AUTHENTICATION METHOD AND SYSTEM | August 2022 | November 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17802178 | CONNECTION OF COMPUTERS OVER NETWORKS | August 2022 | November 2024 | Allow | 27 | 1 | 0 | No | No |
| 17894115 | SYSTEMS AND METHODS FOR USING BLOCKCHAIN TO SECURE DATA ACQUIRED IN SURGICAL AND OTHER MEDICAL PROCEDURES | August 2022 | October 2024 | Allow | 26 | 1 | 0 | No | No |
| 17888908 | RULE-BASED DOCUMENT SCRUBBING OF SENSITIVE DATA | August 2022 | May 2023 | Allow | 9 | 1 | 0 | No | No |
| 17817135 | MBS Security in UE Mobility | August 2022 | April 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 17873847 | USER PLANE MODEL FOR NON-3GPP ACCESS TO FIFTH GENERATION CORE NETWORK | July 2022 | December 2024 | Abandon | 28 | 1 | 0 | No | No |
| 17759140 | A METHOD OF EFFICIENTLY PROVIDING PATHHISTORY IN C-V2X | July 2022 | February 2025 | Allow | 31 | 1 | 0 | No | No |
| 17813314 | ELECTRONIC MAIL AUTHENTICATION AND TRACKING IN DATABASE SYSTEM USING MESSAGE IDENTIFIER WITHIN BODY OF ELECTRONIC MAIL | July 2022 | October 2024 | Allow | 27 | 1 | 0 | No | No |
| 17793322 | LOGIN AUTHENTICATION METHOD, APPARATUS, AND SYSTEM | July 2022 | October 2024 | Allow | 27 | 1 | 0 | No | No |
| 17865634 | Secure Transmission | July 2022 | May 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17758829 | READER DEVICE AND METHOD OF CONFIGURING THE SAME | July 2022 | August 2024 | Allow | 25 | 0 | 0 | No | No |
| 17860333 | HIGH-SPEED NETWORK PACKET PAYLOAD INSPECTION SYSTEM BASED ON EBPF (EXTENDED BERKELEY PACKET FILTER)/XDP (EXPRESS DATA PATH) FOR CONTAINER ENVIRONMENT | July 2022 | November 2024 | Allow | 28 | 1 | 0 | No | No |
| 17859331 | User-Configured Music Room Digital Assets in Virtual Environments | July 2022 | May 2024 | Allow | 22 | 0 | 0 | No | No |
| 17854496 | IMAGE PRIVACY PROTECTION METHOD AND APPARATUS | June 2022 | May 2025 | Abandon | 35 | 2 | 0 | Yes | No |
| 17845826 | SYSTEM AND METHOD FOR DETECTION AND MITIGATION OF DATA SOURCE COMPROMISES IN ADVERSARIAL INFORMATION ENVIRONMENTS | June 2022 | December 2023 | Allow | 17 | 1 | 0 | No | No |
| 17844603 | METHODS AND SYSTEMS FOR SYSTEM VULNERABILITY DETERMINATION AND UTILIZATION FOR THREAT MITIGATION | June 2022 | November 2024 | Allow | 29 | 1 | 0 | No | No |
| 17829211 | COLLABORATIVE DATABASE AND REPUTATION MANAGEMENT IN ADVERSARIAL INFORMATION ENVIRONMENTS | May 2022 | May 2023 | Allow | 12 | 0 | 0 | Yes | No |
| 17828149 | ANOMALY DETECTION APPARATUS, ANOMALY DETECTION METHOD, AND COMPUTER READABLE MEDIUM | May 2022 | March 2025 | Abandon | 34 | 2 | 0 | Yes | No |
| 17827713 | AUTHENTICATION DEVICE USING DNA BASE SEQUENCE INFORMATION | May 2022 | October 2024 | Abandon | 29 | 1 | 0 | No | No |
| 17778384 | APPARATUS FOR GENERATING NON-COPYABLE DIGITAL VALUE, AND METHOD THEREFOR | May 2022 | September 2024 | Allow | 28 | 1 | 0 | No | No |
| 17747160 | SYSTEM AND METHOD FOR TRUSTED CONTROL FLOW ENFORCEMENT USING DERIVED ENCRYPTION KEYS | May 2022 | September 2023 | Allow | 16 | 0 | 1 | Yes | No |
| 17730447 | BIOMETRIC BASED ACCESS CONTROL FOR DaaS | April 2022 | July 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17730062 | ENFORCING A SEGMENTATION POLICY IN CO-EXISTENCE WITH A SYSTEM FIREWALL | April 2022 | April 2023 | Allow | 11 | 0 | 0 | No | No |
| 17767556 | SYSTEMS AND METHODS FOR SUBSCRIPTION AND IDENTITY AUTHENTICATION MANAGEMENT | April 2022 | March 2025 | Allow | 35 | 2 | 0 | No | No |
| 17767208 | Method, System, Electronic Device, and Storage Medium For Storing and Collecting Temperature Data | April 2022 | June 2024 | Allow | 26 | 1 | 0 | No | No |
| 17710686 | IPSEC LOAD BALANCING IN A SESSION-AWARE LOAD BALANCED CLUSTER (SLBC) NETWORK DEVICE | March 2022 | January 2024 | Allow | 21 | 0 | 0 | No | No |
| 17710766 | BSS (BASIC SERVICE SET) FAST TRANSITIONS BETWEEN ACCESS POINTS USING OPPORTUNISTIC KEY GENERATION | March 2022 | December 2024 | Allow | 32 | 1 | 0 | No | No |
| 17707834 | METHODS AND SYSTEMS TO ESTABLISH TRUSTED PEER-TO-PEER COMMUNICATIONS BETWEEN NODES IN A BLOCKCHAIN NETWORK | March 2022 | January 2024 | Allow | 21 | 1 | 0 | No | No |
| 17701482 | SECURELY MANAGING NETWORK CONNECTIONS | March 2022 | September 2022 | Allow | 6 | 1 | 0 | Yes | No |
| 17695987 | Systems and Methods for Contextually Securing Remote Function Calls | March 2022 | February 2024 | Allow | 23 | 0 | 0 | No | No |
| 17687124 | CROSS-REGIONAL REPLICATION OF KEYS | March 2022 | August 2023 | Allow | 17 | 0 | 0 | No | No |
| 17677237 | IDENTIFICATION OF ONE OR MORE SERVICES FOR A USER'S NETWORK-CONNECTED SMART DEVICE USING A SMART DEVICE FINGERPRINT OF THE NETWORK-CONNECTED SMART DEVICE | February 2022 | March 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17676054 | Managing Admin Controlled Access of External Resources to Group-Based Communication Interfaces via a Group-Based Communication System | February 2022 | November 2023 | Allow | 21 | 2 | 0 | Yes | No |
| 17589774 | SYSTEM AND METHOD FOR CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMS | January 2022 | December 2023 | Allow | 22 | 1 | 0 | No | No |
| 17589550 | PERSISTENCY OF RESOURCE REQUESTS AND RESPONSES IN PROXIED COMMUNICATIONS | January 2022 | April 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17574443 | PHISHING EMAIL CAMPAIGN IDENTIFICATION | January 2022 | December 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17567074 | SYSTEM AND METHOD FOR CYBERSECURITY RECONNAISSANCE, ANALYSIS, AND SCORE GENERATION USING DISTRIBUTED SYSTEMS | December 2021 | October 2023 | Allow | 22 | 0 | 0 | No | No |
| 17560599 | AUTOMATING TRUST IN SOFTWARE UPGRADES | December 2021 | June 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17545702 | APPARATUS, METHODS, AND SYSTEMS FOR PRE-AUTHENTICATION, KEEP-AUTHENTICATION, AND REGAIN-AUTHENTICATION | December 2021 | June 2025 | Allow | 42 | 2 | 0 | No | No |
| 17544039 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING AN OBJECT OF INTEREST WITHIN AN IMAGE FROM A DIGITAL SIGNATURE GENERATED BY A SIGNATURE ENCODING MODULE INCLUDING A HYPERNETWORK | December 2021 | January 2024 | Allow | 25 | 0 | 0 | No | No |
| 17543184 | METHODS AND SYSTEMS FOR NATURAL LANGUAGE PROCESSING OF GRAPH DATABASE QUERIES | December 2021 | August 2024 | Allow | 32 | 0 | 1 | No | No |
| 17536916 | SOURCE CODE CLUSTERING FOR AUTOMATICALLY IDENTIFYING FALSE POSITIVES GENERATED THROUGH STATIC APPLICATION SECURITY TESTING | November 2021 | October 2023 | Allow | 23 | 0 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HUANG, CHENG-FENG.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 66.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner HUANG, CHENG-FENG works in Art Unit 2497 and has examined 505 patent applications in our dataset. With an allowance rate of 88.5%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 27 months.
Examiner HUANG, CHENG-FENG's allowance rate of 88.5% places them in the 66% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by HUANG, CHENG-FENG receive 1.54 office actions before reaching final disposition. This places the examiner in the 39% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by HUANG, CHENG-FENG is 27 months. This places the examiner in the 57% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +19.0% benefit to allowance rate for applications examined by HUANG, CHENG-FENG. This interview benefit is in the 66% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 36.7% of applications are subsequently allowed. This success rate is in the 80% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 29.4% of cases where such amendments are filed. This entry rate is in the 34% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 57.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 46% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 87.5% of appeals filed. This is in the 78% percentile among all examiners. Of these withdrawals, 35.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 30.8% are granted (fully or in part). This grant rate is in the 23% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.