Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18417915 | METHOD AND SYSTEM FOR SECURING ACCESS TO USER DATA DURING PHISHING DETECTION | January 2024 | March 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18401368 | Blockchain-based Intrusion Detection System for Railway Signals | December 2023 | August 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18532261 | POINT-OF-SERVICE DIGITAL IDENTITY VERIFICATION DEVICE | December 2023 | August 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18141973 | MANAGEMENT OF INTERNET OF THINGS (IOT) BY SECURITY FABRIC | May 2023 | May 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18310368 | SYSTEMS AND METHODS FOR DETECTING AND RESPONDING TO SECURITY THREATS USING APPLICATION EXECUTION AND CONNECTION LINEAGE TRACING | May 2023 | September 2024 | Abandon | 16 | 1 | 0 | No | No |
| 18303963 | METHOD AND SYSTEM FOR ZERO-KNOWLEDGE AND IDENTITY BASED KEY MANAGEMENT FOR DECENTRALIZED APPLICATIONS | April 2023 | April 2024 | Allow | 12 | 0 | 0 | No | No |
| 18297355 | SYSTEMS AND METHODS FOR CONTROLLING UNITS FOR A SCALE | April 2023 | December 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18111798 | SYSTEM AND METHOD FOR HANDLING EXCEPTIONS DURING HEALTHCARE RECORD PROCESSING | February 2023 | October 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18107172 | ATTACK SITUATION VISUALIZATION DEVICE, ATTACK SITUATION VISUALIZATION METHOD AND RECORDING MEDIUM | February 2023 | June 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 18164603 | DATA SENDING METHOD AND APPARATUS AND DATA RECEIVING METHOD AND APPARATUS FOR RESISTING NETWORK COMMUNICATION MONITORING | February 2023 | August 2024 | Allow | 18 | 0 | 0 | Yes | No |
| 18065160 | DYNAMIC SELF-DEFINED API VIA DIGITAL SIGNATURES | December 2022 | July 2024 | Allow | 19 | 0 | 1 | No | No |
| 18077155 | METHOD FOR DETECTING WEBPAGE SPOOFING ATTACKS | December 2022 | February 2024 | Allow | 14 | 1 | 0 | No | No |
| 17972035 | INJECTABLE HARDWARE AND SOFTWARE ATTESTATION OF SENSORY INPUT DATA | October 2022 | January 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 17970404 | METHOD AND APPARATUS FOR DETECTING MALWARE VIA ANALYSIS OF A SCREEN CAPTURE | October 2022 | January 2024 | Allow | 15 | 2 | 0 | Yes | No |
| 17963020 | GUEST ACCESS FOR LOCKING DEVICE | October 2022 | February 2024 | Allow | 16 | 2 | 0 | No | No |
| 17952426 | Dynamically Initiating and Managing Automated Spear Phishing in Enterprise Computing Environments | September 2022 | December 2023 | Allow | 15 | 1 | 0 | No | No |
| 17942242 | SYSTEMS AND METHODS FOR AUTOMATICALLY BLOCKING THE USE OF TRACKING TOOLS | September 2022 | November 2023 | Allow | 14 | 1 | 0 | No | No |
| 17859920 | METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTING | July 2022 | March 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 17849623 | SYSTEMS AND METHODS USING SEARCH ENGINES TO GENERATE CRYPTOGRAPHIC KEYS FROM ERRATIC PHYSICAL UNCLONABLE FUNCTIONS | June 2022 | June 2024 | Allow | 24 | 0 | 1 | No | No |
| 17848556 | PERVASIVE INTERMEDIATE NETWORK ATTACHED STORAGE APPLICATION | June 2022 | September 2023 | Abandon | 14 | 1 | 0 | No | No |
| 17832362 | SYSTEMS AND METHODS FOR CONTROLLING UNITS FOR A SCALE | June 2022 | February 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 17738524 | APPARATUS AND METHOD FOR VERIFYING INTEGRITY OF HARDWARE BOARD | May 2022 | June 2024 | Abandon | 25 | 1 | 0 | No | No |
| 17715836 | METHOD FOR DETECTING WEBPAGE SPOOFING ATTACKS | April 2022 | August 2022 | Allow | 5 | 0 | 0 | Yes | No |
| 17698751 | SYSTEMS, METHODS, AND MEDIA FOR DEFENDING COMPUTING SYSTEMS FROM ATTACK | March 2022 | July 2023 | Allow | 16 | 1 | 0 | Yes | No |
| 17696057 | PROVISIONING CONTROL APPARATUS AND METHOD FOR PROVISIONING ELECTRONIC COMPONENTS FOR ELECTRONIC DEVICES | March 2022 | June 2024 | Allow | 27 | 2 | 0 | Yes | No |
| 17654993 | SELECTIVELY ENCRYPTING COMMIT LOG ENTRIES | March 2022 | May 2024 | Allow | 26 | 2 | 0 | No | No |
| 17683443 | COMPUTER SECURITY | March 2022 | July 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17671729 | SYSTEM AND METHOD FOR PROVIDING A SECURE LOCALLY-BASED BOOT DISK ENCRYPTION KEY | February 2022 | April 2024 | Allow | 26 | 1 | 0 | No | No |
| 17672011 | INTERNET PROTOCOL SECURITY (IPSEC) SECURITY ASSOCIATIONS (SA) BALANCE BETWEEN HETEROGENEOUS CORES IN MULTIPLE CONTROLLER SYSTEM | February 2022 | May 2024 | Allow | 27 | 1 | 0 | No | No |
| 17651030 | EXTENSIBLE DEVICE HOSTED ROOT OF TRUST ARCHITECTURE FOR INTEGRATED CIRCUITS | February 2022 | August 2023 | Allow | 18 | 0 | 0 | No | No |
| 17666981 | VERIFICATION OF MESSAGE PATTERNS FOR VEHICLE ECUS | February 2022 | March 2024 | Allow | 25 | 0 | 0 | No | No |
| 17587336 | DYNAMIC LEARNING SYSTEM FOR INTELLIGENT AUTHENTICATION | January 2022 | June 2023 | Allow | 16 | 1 | 0 | Yes | No |
| 17439520 | METHOD FOR TRANSMITTING DATA PACKETS | January 2022 | June 2023 | Allow | 21 | 4 | 0 | Yes | No |
| 17648286 | CONTENT RECORDING AND GROUP ENCRYPTION | January 2022 | February 2024 | Allow | 25 | 2 | 0 | No | No |
| 17577003 | PHYSICAL AND NETWORK SECURITY SYSTEM AND METHODS | January 2022 | July 2022 | Allow | 6 | 1 | 0 | No | No |
| 17646555 | Zero Dwell Time Process Library and Script Monitoring | December 2021 | May 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17550783 | METHOD AND SYSTEM FOR FACILITATING IDENTIFICATION OF ELECTRONIC DATA EXFILTRATION | December 2021 | January 2024 | Allow | 25 | 1 | 0 | No | No |
| 17542556 | SYSTEMS AND METHODS FOR PREVENTING INJECTIONS OF MALICIOUS PROCESSES IN SOFTWARE | December 2021 | September 2023 | Allow | 21 | 1 | 0 | No | No |
| 17454905 | SYNTHETIC IDENTITY SIGNAL NETWORK | November 2021 | June 2023 | Allow | 19 | 1 | 0 | No | No |
| 17524118 | NETWORK FORENSIC SYSTEM FOR PERFORMING TRANSMISSION METADATA TRACKING AND ANALYSIS | November 2021 | February 2023 | Allow | 15 | 0 | 0 | No | No |
| 17490554 | DETECTING MALWARE BY LINKING BACKGROUND INTELLIGENT TRANSFER SERVICE (BITS) AND SCHEDULED TASK SERVICE (STS) ACTIVITIES TO A SOURCE PROGRAM | September 2021 | March 2023 | Allow | 18 | 0 | 0 | Yes | No |
| 17447855 | METHOD AND SYSTEM FOR CAPTURING DATA FROM AN EXTERNAL CLOUD COMPUTING PLATFORM | September 2021 | April 2024 | Allow | 31 | 2 | 0 | No | No |
| 17474121 | PHISHING DETECTION SYSTEM AND METHOD OF USE | September 2021 | July 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17437928 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM | September 2021 | June 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17431197 | SYSTEM FOR TRUSTED DISTANCE MEASUREMENT | August 2021 | April 2024 | Allow | 32 | 0 | 0 | Yes | No |
| 17444108 | METHOD FOR WATERMARKING A MACHINE LEARNING MODEL | July 2021 | March 2024 | Allow | 32 | 1 | 0 | No | No |
| 17387421 | SYSTEMS AND METHODS FOR AUTOMATICALLY BLOCKING THE USE OF TRACKING TOOLS | July 2021 | April 2022 | Allow | 9 | 1 | 0 | Yes | No |
| 17370203 | RANSOMWARE INFECTION DETECTION IN FILESYSTEMS | July 2021 | May 2023 | Allow | 23 | 1 | 0 | Yes | No |
| 17358381 | EXTRACTING PROCESS AWARE ANALYTICAL ATTACK GRAPHS THROUGH LOGICAL NETWORK ANALYSIS | June 2021 | September 2023 | Allow | 27 | 0 | 0 | Yes | No |
| 17329769 | APPARATUS FOR SELECTING REPRESENTATIVE TOKEN FROM DETECTION NAMES OF MULTIPLE VACCINES, METHOD THEREFOR, AND COMPUTER READABLE RECORDING MEDIUM STORING PROGRAM FOR PERFORMING THE METHOD | May 2021 | September 2021 | Allow | 4 | 0 | 0 | Yes | No |
| 17330313 | IDENTIFICATION OF INVALID ADVERTISING TRAFFIC | May 2021 | August 2023 | Allow | 27 | 0 | 0 | Yes | No |
| 17323719 | INTELLIGENT ORCHESTRATION TO COMBAT DENIAL OF SERVICE ATTACKS | May 2021 | January 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17242806 | SYSTEMS AND METHODS FOR AUTOMATED SIMULATED PHISHING CAMPAIGNS USING NEWSLETTERS | April 2021 | December 2023 | Abandon | 31 | 1 | 0 | No | No |
| 17240254 | SECURE COMMUNICATION OF PAYLOAD DATA | April 2021 | April 2024 | Allow | 36 | 1 | 0 | No | No |
| 17230166 | System, Method, and Computer Program Product for Network Anomaly Detection | April 2021 | May 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17227720 | Packet Detection Method and First Network Device | April 2021 | September 2024 | Abandon | 41 | 2 | 0 | No | No |
| 17217985 | Data Reduction and Evaluation via Link Analysis | March 2021 | October 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 17213684 | IDENTIFYING THREAT SIMILARITY USING FORENSICS CLUSTERING | March 2021 | February 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17211323 | METHODS OF MONITORING AND PROTECTING ACCESS TO ONLINE SERVICES | March 2021 | November 2023 | Abandon | 32 | 2 | 0 | Yes | No |
| 17199571 | MANAGEMENT OF INTERNET OF THINGS (IOT) BY SECURITY FABRIC | March 2021 | April 2023 | Allow | 25 | 1 | 0 | No | No |
| 17189232 | PROVIDING SECURITY THROUGH CHARACTERIZING MOBILE TRAFFIC BY DOMAIN NAMES | March 2021 | June 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17175103 | Digital Security Violation System | February 2021 | May 2023 | Allow | 27 | 0 | 0 | No | No |
| 17267899 | SYSTEM AND USER PATTERN AUTHENTICATION METHOD FOR PREVENTING SMUDGE AND SHOULDER SURFING ATTACK OF MOBILE DEVICE | February 2021 | July 2024 | Allow | 41 | 1 | 0 | No | No |
| 17266855 | TRANSITION DISABLE INDICATOR | February 2021 | February 2022 | Allow | 12 | 0 | 0 | No | No |
| 17168694 | DETECTION AND RECOVERY FROM RANSOMWARE INFECTIONS | February 2021 | April 2023 | Allow | 27 | 3 | 0 | Yes | No |
| 17156869 | MULTICLASS CLASSIFICATION SYSTEM WITH ACCUMULATOR-BASED ARBITRATION | January 2021 | July 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 17147373 | METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTING | January 2021 | April 2022 | Allow | 15 | 0 | 0 | Yes | No |
| 17147366 | METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTING | January 2021 | April 2022 | Allow | 15 | 0 | 0 | Yes | No |
| 17126045 | CORRELATION-BASED SECURITY THREAT ANALYSIS | December 2020 | August 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 17121172 | METHOD FOR DETECTING A WEB SKIMMER ON A "PAYMENT PAGE" | December 2020 | April 2021 | Allow | 4 | 0 | 0 | Yes | No |
| 17116446 | GRANULAR AND PRIORITIZED VISUALIZATION OF ANOMALOUS LOG DATA | December 2020 | May 2023 | Allow | 29 | 1 | 0 | No | No |
| 17108193 | AUTOMATED SOCIAL MEDIA-RELATED BRAND PROTECTION | December 2020 | June 2023 | Allow | 30 | 4 | 0 | Yes | No |
| 17100042 | INJECTABLE HARDWARE AND SOFTWARE ATTESTATION OF SENSORY INPUT DATA | November 2020 | June 2022 | Allow | 18 | 0 | 0 | Yes | No |
| 17098191 | SPECTRE FIXES WITH PREDICTOR MODE TAG | November 2020 | August 2023 | Allow | 34 | 2 | 0 | Yes | Yes |
| 17093995 | DATA INSPECTION SYSTEM AND METHOD | November 2020 | April 2023 | Allow | 29 | 1 | 0 | No | No |
| 17078588 | FILE INTEGRITY MONITORING | October 2020 | May 2023 | Allow | 30 | 2 | 0 | Yes | No |
| 17064613 | Detection of cyber machinery attacks | October 2020 | April 2022 | Allow | 18 | 1 | 0 | No | No |
| 17063151 | FILTERING STRATEGIES FOR SUBGRAPH MATCHING ON NOISY MULTIPLEX NETWORKS | October 2020 | February 2023 | Allow | 29 | 1 | 0 | No | No |
| 17037892 | CYBERSECURITY SYSTEM | September 2020 | December 2020 | Allow | 2 | 0 | 0 | Yes | No |
| 17037197 | DERIVED UNIQUE RECOVERY KEYS PER SESSION | September 2020 | September 2023 | Allow | 35 | 0 | 0 | Yes | No |
| 17034241 | TAILORED NETWORK RISK ANALYSIS USING DEEP LEARNING MODELING | September 2020 | February 2024 | Allow | 41 | 1 | 0 | Yes | No |
| 17027753 | COMPUTER FILE METADATA SEGMENTATION SECURITY SYSTEM | September 2020 | August 2022 | Allow | 22 | 3 | 0 | Yes | No |
| 17023341 | Securely Booting a Processor Complex Via a Securely Bootable Subsystem | September 2020 | January 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17021542 | COMPUTATIONAL FRAMEWORK FOR MODELING ADVERSARIAL ACTIVITIES | September 2020 | January 2023 | Allow | 28 | 1 | 0 | No | No |
| 17019219 | SERVICE ACCESS DATA ENRICHMENT FOR CYBERSECURITY | September 2020 | January 2023 | Allow | 28 | 1 | 0 | No | No |
| 17018916 | METHOD AND APPARATUS FOR DETECTING MALWARE VIA ANALYSIS OF A SCREEN CAPTURE | September 2020 | July 2022 | Allow | 22 | 2 | 0 | No | No |
| 17013310 | Systems and Methods for Detecting and Responding to Security Threats Using Application Execution and Connection Lineage Tracing | September 2020 | January 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17011335 | GUEST ACCESS FOR LOCKING DEVICE | September 2020 | June 2022 | Allow | 21 | 2 | 0 | No | No |
| 17005792 | COUNTING SYN PACKETS | August 2020 | March 2023 | Allow | 31 | 1 | 0 | No | No |
| 16994147 | One-Point Relative Voltage Fingerprinting | August 2020 | March 2024 | Allow | 43 | 2 | 0 | Yes | No |
| 16941426 | UNIQUE ID GENERATION FOR SENSORS | July 2020 | February 2023 | Allow | 31 | 3 | 0 | Yes | No |
| 16962855 | MONITORING SYSTEM, MONITORING METHOD, AND MONITORING PROGRAM | July 2020 | December 2022 | Abandon | 29 | 2 | 0 | Yes | No |
| 16922232 | METHOD AND DEVICE FOR INTRUSION DETECTION IN A COMPUTER NETWORK | July 2020 | September 2022 | Allow | 26 | 1 | 0 | Yes | No |
| 16921810 | PERVASIVE INTERMEDIATE NETWORK ATTACHED STORAGE APPLICATION | July 2020 | March 2022 | Allow | 20 | 1 | 0 | No | No |
| 16918935 | APPARATUS AND METHODS FOR DETERMINING EVENT INFORMATION AND INTRUSION DETECTION AT A HOST DEVICE | July 2020 | March 2023 | Allow | 32 | 1 | 0 | No | No |
| 16904963 | Fast identification of offense and attack execution in network traffic patterns | June 2020 | November 2023 | Allow | 41 | 2 | 0 | Yes | Yes |
| 16946313 | TRANSMITTING SENSITIVE INFORMATION SECURELY OVER UNSECURED NETWORKS WITHOUT AUTHENTICATION | June 2020 | May 2023 | Allow | 35 | 2 | 0 | No | No |
| 16899020 | DETERMINING A STATE OF A NETWORK | June 2020 | August 2023 | Allow | 38 | 2 | 1 | No | No |
| 16946185 | METHOD AND SYSTEM FOR PROVIDING VALIDATED, AUDITABLE, AND IMMUTABLE INPUTS TO A SMART CONTRACT | June 2020 | May 2022 | Allow | 23 | 2 | 0 | Yes | No |
| 16887882 | SYSTEM AND METHOD FOR MANAGING THE SECURITY HEALTH OF A NETWORK DEVICE | May 2020 | April 2023 | Allow | 34 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TAYLOR, SAKINAH W.
With a 100.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 81.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner TAYLOR, SAKINAH W works in Art Unit 2497 and has examined 324 patent applications in our dataset. With an allowance rate of 86.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.
Examiner TAYLOR, SAKINAH W's allowance rate of 86.4% places them in the 59% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by TAYLOR, SAKINAH W receive 1.77 office actions before reaching final disposition. This places the examiner in the 53% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by TAYLOR, SAKINAH W is 30 months. This places the examiner in the 41% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +21.5% benefit to allowance rate for applications examined by TAYLOR, SAKINAH W. This interview benefit is in the 70% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 31.9% of applications are subsequently allowed. This success rate is in the 58% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 47.7% of cases where such amendments are filed. This entry rate is in the 67% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 30.8% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 30% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 90.9% of appeals filed. This is in the 81% percentile among all examiners. Of these withdrawals, 40.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 32.6% are granted (fully or in part). This grant rate is in the 25% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.