Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19034297 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | January 2025 | March 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 18806633 | METHOD FOR DATA PROCESSING, READABLE MEDIUM AND ELECTRONIC DEVICE | August 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18750590 | SYSTEMS AND METHODS FOR GENERATING ATTESTED DATA | June 2024 | November 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18655171 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | May 2024 | December 2024 | Allow | 7 | 2 | 0 | Yes | No |
| 18440668 | SYSTEMS AND METHODS TO ENCRYPT CENTRALIZED INFORMATION ASSOCIATED WITH USERS OF A CUSTOMER DUE DILIGENCE PLATFORM BASED ON A MODIFIED KEY EXPANSION SCHEDULE | February 2024 | July 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18540943 | MULTI-PARTY PRIVACY COMPUTING METHOD AND DEVICE BASED ON SEMI-TRUSTED HARDWARE | December 2023 | April 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18534683 | SYSTEMS AND METHODS FOR VEHICLE ENCRYPTED COMMUNICATION FOR VEHICLE-ROAD-CLOUD COLLABORATION | December 2023 | April 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18529879 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM FOR PROCESSING REGISTRATION REQUESTS | December 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18557286 | DATA COMMUNICATION METHOD, APPARATUS, AND SYSTEM | October 2023 | July 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18382427 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR OBTAINING DIGITALLY SIGNED DATA | October 2023 | November 2024 | Allow | 13 | 0 | 0 | No | No |
| 18485932 | AUTOMATION OF USER IDENTITY USING NETWORK PROTOCOL PROVIDING SECURE GRANTING OR REVOCATION OF SECURED ACCESS RIGHTS | October 2023 | June 2025 | Allow | 20 | 1 | 0 | No | No |
| 18448815 | CLOUD-BASED CREATION OF A CUSTOMER-SPECIFIC SYMMETRIC KEY ACTIVATION DATABASE | August 2023 | April 2025 | Allow | 20 | 2 | 0 | No | No |
| 18275372 | THRESHOLD KEY EXCHANGE | August 2023 | June 2025 | Allow | 22 | 0 | 0 | No | No |
| 18362452 | SYSTEMS AND METHODS TO ENCRYPT CENTRALIZED INFORMATION ASSOCIATED WITH USERS OF A CUSTOMER DUE DILIGENCE PLATFORM BASED ON A MODIFIED KEY EXPANSION SCHEDULE | July 2023 | November 2023 | Allow | 4 | 1 | 0 | No | No |
| 18352914 | HARDENED KEY DERIVATION IN MULTI-PARTY COMPUTATION | July 2023 | March 2025 | Allow | 20 | 2 | 0 | Yes | No |
| 18337757 | VALIDATING PARAMETERS ON DISCRETE COMPUTING APPLICATIONS TO GRANT ACCESS CONTROL TO CONTENT OR COMMANDS | June 2023 | August 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18208631 | VALUE PREFERENCE CAPTURE FUNNEL AND CODING SYSTEM | June 2023 | March 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18331915 | METHOD AND SYSTEM FOR SECURING CLOUD STORAGE AND DATABASES FROM INSIDER THREATS AND OPTIMIZING PERFORMANCE | June 2023 | April 2025 | Allow | 23 | 3 | 0 | Yes | No |
| 18326470 | NON-CUSTODIAL ENROLLMENT AND RECOVERY OF A SECRET | May 2023 | February 2025 | Abandon | 20 | 2 | 0 | Yes | No |
| 18200211 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | May 2023 | May 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18250935 | Database Multi-Authentication Method and System, Terminal, and Storage Medium | April 2023 | April 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18302170 | SYSTEMS AND METHODS FOR REFRESHING ENCRYPTION AND DECRYPTION KEYS AND SIGNATURES FOR A REALTIME PIPEPILINE | April 2023 | September 2023 | Allow | 5 | 1 | 0 | Yes | No |
| 18177531 | SECURE KEY EXCHANGE MECHANISM IN A WIRELESS COMMUNICATION SYSTEM | March 2023 | July 2023 | Allow | 5 | 0 | 0 | Yes | No |
| 18106302 | COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR SHARING A COMMON SECRET | February 2023 | February 2024 | Allow | 12 | 2 | 0 | Yes | No |
| 18157347 | METHOD FOR ENCRYPTING AND DECRYPTING DATA ACROSS DOMAINS BASED ON PRIVACY COMPUTING | January 2023 | October 2023 | Allow | 9 | 1 | 0 | Yes | No |
| 18091193 | SYSTEMS AND METHODS FOR ENSURING CORRECT EXECUTION OF COMPUTER PROGRAM USING A MEDIATOR COMPUTER SYSTEM | December 2022 | December 2024 | Allow | 23 | 4 | 0 | Yes | No |
| 18063546 | SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY COMMUNICATIONS CHANNELS | December 2022 | May 2023 | Allow | 5 | 0 | 0 | Yes | No |
| 17944739 | Systems and Methods for Distributed, Stateless, and Dynamic Browser Challenge Generation and Verification | September 2022 | October 2024 | Allow | 25 | 4 | 0 | Yes | No |
| 17816581 | DETECTING VULNERABILITIES IN MANAGED CLIENT DEVICES | August 2022 | July 2023 | Allow | 12 | 1 | 0 | Yes | No |
| 17877749 | ACCESS CONTROL IN MICROSERVICE ARCHITECTURES | July 2022 | September 2024 | Allow | 26 | 2 | 0 | No | Yes |
| 17861626 | Detecting and Preventing Malware Attacks Using Simulated Analytics and Continuous Authentication | July 2022 | December 2024 | Abandon | 29 | 1 | 0 | No | No |
| 17854222 | ACCESS CONTROL IN MICROSERVICE ARCHITECTURES | June 2022 | September 2024 | Allow | 26 | 2 | 0 | No | Yes |
| 17849629 | CENTRALIZED BIOMETRIC USER PROFILE SETUP IN INTERNET GATEWAY DEVICE FOR NETWORK ACCESS | June 2022 | September 2024 | Abandon | 27 | 1 | 0 | Yes | No |
| 17805577 | POST-QUANTUM CRYPTOGRAPHY RISK MODELING | June 2022 | May 2025 | Abandon | 35 | 2 | 0 | No | No |
| 17781464 | AUTOMATION OF USER IDENTITY USING NETWORK PROTOCOL PROVIDING SECURE GRANTING OR REVOCATION OF SECURED ACCESS RIGHTS | June 2022 | July 2023 | Allow | 13 | 1 | 0 | Yes | No |
| 17828160 | METHOD AND SYSTEM FOR SECURING CLOUD STORAGE AND DATABASES FROM INSIDER THREATS AND OPTIMIZING PERFORMANCE | May 2022 | March 2023 | Allow | 9 | 2 | 0 | Yes | No |
| 17748492 | Authentication System and Method for Controlling Authentication System | May 2022 | December 2024 | Allow | 30 | 2 | 0 | Yes | No |
| 17662506 | Secure Communication Encryption And Decryption Mechanism In A Wireless Communication System | May 2022 | January 2025 | Allow | 33 | 4 | 0 | Yes | No |
| 17732558 | ETHERNET DATA TRANSMISSION CIRCUIT AND SYSTEM AND ETHERNET DATA TRANSMISSION METHOD | April 2022 | February 2025 | Allow | 34 | 1 | 0 | No | No |
| 17728201 | VALUE PREFERENCE CAPTURE FUNNEL AND CODING SYSTEM | April 2022 | April 2023 | Allow | 11 | 2 | 0 | Yes | No |
| 17720381 | Remote Browsing Isolation for Resource Sharing Video Conferencing | April 2022 | March 2025 | Allow | 35 | 2 | 0 | No | No |
| 17701736 | RAPID LAUNCH OF SECURE EXECUTABLES IN A VIRTUALIZED ENVIRONMENT | March 2022 | May 2025 | Abandon | 38 | 2 | 0 | No | No |
| 17698431 | SYSTEMS AND METHODS FOR SELECTIVE DEIDENTIFICATION OF MESSAGES INCLUDING PATIENT INFORMATION | March 2022 | May 2025 | Abandon | 38 | 2 | 0 | No | No |
| 17761712 | GENERATING PRIME NUMBERS | March 2022 | December 2023 | Abandon | 21 | 1 | 0 | No | No |
| 17642397 | ELECTRONIC MAIL DECRYPTING DEVICE, ELECTRONIC MAIL DECRYPTING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM | March 2022 | August 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17685823 | METHOD, APPARATUS, ELECTRONIC DEVICE, AND MEDIUM FOR DETECTING ABNORMALITY IN NETWORK | March 2022 | October 2024 | Allow | 32 | 2 | 0 | No | No |
| 17678961 | DYNAMIC EVALUATION OF DATA STORE ACCESS PERMISSIONS | February 2022 | November 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17676428 | SYSTEM AND METHOD FOR REGISTRATION OF CARD KEYS FOR MULTIFUNCTION PERIPHERAL OPERATION | February 2022 | May 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17674118 | DETERMINISTIC CRYPTOGRAPHY DEIDENTIFICATION WITH GRANULAR DATA DESTRUCTION | February 2022 | April 2023 | Allow | 14 | 3 | 0 | Yes | No |
| 17674565 | SYSTEMS AND METHODS FOR EVALUATING SYSTEM-OF-SYSTEMS FOR CYBER VULNERABILITIES | February 2022 | December 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17635699 | SYSTEMS, DEVICES, AND METHODS FOR OBSERVING AND/OR PERFORMING DATA ACCESS COMPLIANCE TO A COMPUTER NETWORK | February 2022 | January 2025 | Allow | 35 | 2 | 0 | No | No |
| 17650885 | METHOD FOR THE EXECUTION OF A BINARY CODE OF A COMPUTER PROGRAM BY A MICROPROCESSOR | February 2022 | August 2024 | Allow | 30 | 1 | 0 | No | No |
| 17650968 | PERSONAL INFORMATION REDACTION AND VOICE DEIDENTIFICATION | February 2022 | August 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17634299 | SECURITY ASSESSMENT APPARATUS, SECURITY ASSESSMENT METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | February 2022 | March 2025 | Abandon | 37 | 2 | 0 | No | No |
| 17583150 | SYSTEMS AND METHODS FOR PROVIDING SIGNATURELESS, CONFIDENTIAL AND AUTHENTICATION OF DATA DURING HANDSHAKE FOR CLASSICAL AND QUANTUM COMPUTING ENVIRONMENTS | January 2022 | March 2025 | Allow | 37 | 1 | 1 | Yes | No |
| 17576558 | SYSTEM AND METHOD FOR IMPROVED END-TO-END CYBERSECURITY MACHINE LEARNING AND DEPLOYMENT | January 2022 | November 2023 | Allow | 22 | 2 | 0 | Yes | No |
| 17647695 | DATABASE HIERARCHICAL ENCRYPTION FOR HYBRID-CLOUD ENVIRONMENT | January 2022 | March 2025 | Allow | 39 | 2 | 0 | No | No |
| 17564014 | Systems, Methods and Media for the Creation of a Protective Layer Between an Application and a Cybersecurity Risk | December 2021 | September 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17557248 | Systems and Methods for Implementing Transparent End-To-End Network Public-Key Encryption | December 2021 | November 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17619321 | SECURED SPECULATIVE EXECUTION PROCESSOR | December 2021 | August 2024 | Allow | 33 | 2 | 0 | No | No |
| 17551441 | VERIFICATION METHOD FOR FAST SOURCE AND PATH EMBEDDED WITH RANDOM AUTHENTICATION | December 2021 | August 2024 | Allow | 32 | 1 | 0 | No | No |
| 17617906 | DYNAMIC ENCRYPTION/DECRYPTION OF GENOMIC INFORMATION | December 2021 | May 2025 | Allow | 41 | 2 | 0 | Yes | No |
| 17616703 | DICTIONARY-ATTACK-RESISTANT DATABASE ENCRYPTION | December 2021 | July 2023 | Allow | 19 | 1 | 0 | No | No |
| 17536092 | AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK | November 2021 | December 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17536076 | AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK | November 2021 | April 2023 | Allow | 16 | 3 | 0 | Yes | No |
| 17536090 | AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK | November 2021 | June 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17536087 | AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK | November 2021 | February 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17536089 | AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK | November 2021 | February 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17533515 | COMMUNICATION SYSTEM, NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE, FIRST COMMUNICATION DEVICE AND SECOND COMMUNICATION DEVICE | November 2021 | November 2024 | Allow | 36 | 2 | 0 | Yes | No |
| 17518905 | KEY GENERATION APPARATUS AND METHOD BASED ON MACHINE LEARNING | November 2021 | June 2024 | Allow | 31 | 1 | 0 | No | No |
| 17607776 | KEY EXCHANGE SYSTEM, METHOD AND PROGRAM FOR GENERATING A SHARED KEY FOR SECURE COMMUNICATION | October 2021 | October 2023 | Allow | 24 | 2 | 0 | Yes | No |
| 17505948 | Enhanced Robust Input Protocol for Secure Multi-Party Computation (MPC) via Hierarchical Pseudorandom Secret Sharing | October 2021 | August 2023 | Allow | 22 | 0 | 0 | Yes | No |
| 17501965 | System and Method for Validating In-Memory Integrity of Executable Files to Identify Malicious Activity | October 2021 | January 2023 | Allow | 16 | 0 | 0 | Yes | No |
| 17493262 | RE-ENCRYPTION DEVICE, METHOD AND COMPUTER READABLE MEDIUM TO CHANGE THE ACCESS RANGE FOR CIPHERTEXT | October 2021 | July 2023 | Allow | 21 | 0 | 0 | Yes | No |
| 17486288 | SECURE DATA CENTER UPDATE AND MONITORING | September 2021 | July 2024 | Allow | 34 | 1 | 1 | Yes | No |
| 17437636 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM | September 2021 | January 2024 | Abandon | 28 | 2 | 0 | No | No |
| 17458611 | ACCESSING CORPORATE RESOURCES THROUGH AN ENROLLED USER DEVICE | August 2021 | September 2024 | Allow | 37 | 3 | 0 | Yes | No |
| 17434189 | CONTROL SYSTEM, METHOD, AND CONTROL DEVICE | August 2021 | February 2025 | Allow | 42 | 2 | 0 | Yes | No |
| 17406696 | DEVICE COMMUNICATION MANAGEMENT FRAMEWORK FOR VOICE-BASED APPLICATIONS | August 2021 | May 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17399803 | BLOCKCHAIN WITH RANDOM COMMITTEE SELECTION | August 2021 | April 2024 | Allow | 32 | 2 | 0 | No | No |
| 17428977 | ACCESS MANAGEMENT SYSTEM, AUTHENTICATION DEVICE FOR ACCESS MANAGEMENT SYSTEM, MANAGEMENT DEVICE FOR ACCESS MANAGEMENT SYSTEM, PORTABLE TERMINAL FOR ACCESS MANAGEMENT SYSTEM, MOBILE BODY FOR ACCESS MANAGEMENT SYSTEM, DATA STRUCTURE FOR ACCESS MANAGEMENT DATA, ACCESS MANAGEMENT PROGRAM, AND CONSTRUCTION METHOD FOR ACCESS MANAGEMENT SYSTEM | August 2021 | June 2024 | Allow | 34 | 1 | 0 | No | No |
| 17393774 | SYSTEMS AND METHODS FOR SYNTHETIC FILE SCANNING | August 2021 | March 2025 | Allow | 43 | 2 | 0 | Yes | No |
| 17427862 | SYSTEMS, METHODS AND CONTROLLERS FOR SECURE COMMUNICATIONS | August 2021 | September 2024 | Allow | 37 | 3 | 0 | Yes | No |
| 17310338 | HANDLING OF MACHINE-TO-MACHINE SECURE SESSIONS | July 2021 | July 2024 | Allow | 35 | 4 | 0 | Yes | No |
| 17385972 | SECURE HIGH-SPEED COMMUNICATION INTERFACE BETWEEN A BASIC INPUT AND OUTPUT SYSTEM AND A SERVICE PROCESSOR | July 2021 | September 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17375412 | SYSTEM AND METHOD TO SECURE CONTENT AND IMPROVE COLLABORATION WITH ELECTRONIC PEN | July 2021 | September 2024 | Allow | 38 | 2 | 0 | No | No |
| 17373001 | Systems and Methods for Identifying Malware Injected into a Memory of a Computing Device | July 2021 | May 2024 | Allow | 34 | 3 | 0 | No | No |
| 17371148 | LOG ANALYSIS DEVICE | July 2021 | January 2024 | Allow | 30 | 3 | 0 | Yes | No |
| 17421363 | A METHOD AND A DEVICE FOR ENABLING KEY RE-USAGE IN A COMMUNICATION NETWORK | July 2021 | August 2024 | Allow | 37 | 3 | 0 | Yes | No |
| 17358604 | METHOD AND APPARATUS FOR FAST SYMMETRIC AUTHENTICATION AND SESSION KEY ESTABLISHMENT | June 2021 | November 2023 | Abandon | 29 | 2 | 0 | No | No |
| 17304587 | COMMUNICATION METHOD AND RELATED PRODUCT BASED ON KEY AGREEMENT AND AUTHENTICATION | June 2021 | October 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17349942 | DETECTING THREATS BASED ON API SERVICE BUSINESS LOGIC ABUSE | June 2021 | November 2024 | Allow | 41 | 3 | 0 | Yes | No |
| 17347278 | IDENTIFYING ATTACK BEHAVIOR BASED ON SCRIPTING LANGUAGE ACTIVITY | June 2021 | August 2023 | Allow | 26 | 2 | 0 | Yes | No |
| 17413578 | ANALYSIS QUERY RESPONSE SYSTEM, ANALYSIS QUERY EXECUTION APPARATUS, ANALYSIS QUERY VERIFICATION APPARATUS, ANALYSIS QUERY RESPONSE METHOD, AND PROGRAM | June 2021 | August 2024 | Allow | 38 | 2 | 0 | Yes | No |
| 17299004 | REMOTELY VERIFYING DEVICE INTEGRITY | June 2021 | December 2024 | Allow | 42 | 4 | 0 | Yes | No |
| 17329596 | SECURING COMPUTING SYSTEMS AGAINST MICROARCHITECTURAL REPLAY ATTACKS | May 2021 | April 2025 | Abandon | 47 | 2 | 0 | No | No |
| 17308698 | SURFACING REASONS FOR ANOMALOUS MULTIVARIATE SESSIONS IN AUDIT AND SECURITY LOGS | May 2021 | August 2024 | Allow | 40 | 2 | 0 | Yes | No |
| 17306088 | MEDICAL STATUS PERSONAL DEVICE | May 2021 | March 2024 | Abandon | 35 | 1 | 0 | No | No |
| 17244758 | LOCATION BASED SECURITY IN SERVICE PROVIDER NETWORKS | April 2021 | April 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17243118 | VALIDATING PARAMETERS ON DISCRETE COMPUTING APPLICATIONS TO GRANT ACCESS CONTROL TO CONTENT OR COMMANDS | April 2021 | March 2023 | Allow | 22 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner NOAMAN, BASSAM A.
With a 80.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 62.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner NOAMAN, BASSAM A works in Art Unit 2497 and has examined 244 patent applications in our dataset. With an allowance rate of 82.8%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.
Examiner NOAMAN, BASSAM A's allowance rate of 82.8% places them in the 50% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by NOAMAN, BASSAM A receive 2.04 office actions before reaching final disposition. This places the examiner in the 67% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by NOAMAN, BASSAM A is 31 months. This places the examiner in the 36% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +50.8% benefit to allowance rate for applications examined by NOAMAN, BASSAM A. This interview benefit is in the 94% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 34.5% of applications are subsequently allowed. This success rate is in the 71% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 18.5% of cases where such amendments are filed. This entry rate is in the 14% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 8% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 58.3% of appeals filed. This is in the 27% percentile among all examiners. Of these withdrawals, 14.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 27.0% are granted (fully or in part). This grant rate is in the 18% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.