Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18598831 | SECURE ELECTRIC VEHICLE CHARGER FOR PROVIDING CHARGING SESSION DATA TO MOBILE DEVICE AND ADDITIONAL CHARGER | March 2024 | February 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18597551 | TECHNIQUES FOR DETERMINING LEGITIMACY OF EMAIL ADDRESSES FOR ONLINE ACCESS CONTROL | March 2024 | February 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18589197 | BLOCKCHAIN-BASED ATOMIC SWAP WITH VEILED SECRET VALUE EXCHANGE | February 2024 | April 2025 | Allow | 13 | 2 | 0 | No | No |
| 18427483 | SYSTEMS AND METHODS FOR MULTI-SERVER QUANTUM SESSION AUTHENTICATION | January 2024 | May 2025 | Abandon | 16 | 1 | 0 | No | No |
| 18414349 | PROTECTING COMMERCIAL OFF-THE-SHELF PROGRAM BINARIES FROM PIRACY USING HARDWARE ENCLAVES | January 2024 | April 2025 | Allow | 15 | 1 | 0 | No | No |
| 18376672 | COMMUNICATION DEVICE, CONTROL DEVICE, STORAGE MEDIUM, AND SYSTEM FOR CONTROLLING RELAY OF DATA AMONG ELECTRONIC CONTROL UNITS BASED ON A TRAVELING STATE OF A VEHICLE | October 2023 | March 2025 | Allow | 18 | 2 | 0 | Yes | No |
| 18460667 | SYSTEM AND METHOD FOR COMPREHENSIVE DATA LOSS PREVENTION AND COMPLIANCE MANAGEMENT | September 2023 | November 2024 | Allow | 15 | 1 | 0 | No | No |
| 18216020 | METHODS AND SYSTEMS FOR THE RESERVATION, REGISTRATION, AND GRANTING OF DEVICE LICENSES TO INTERNET OF THINGS DEVICES | June 2023 | June 2024 | Allow | 12 | 1 | 0 | No | No |
| 18332503 | MAINTENANCE OF WIRELESS DEVICES BY ELECTRONIC DEVICES | June 2023 | July 2024 | Allow | 13 | 1 | 0 | No | No |
| 18329262 | Methods, Systems, And Media For Secure Authentication Of Users Based On A Biometric Identifier And Knowledge-Based Secondary Information | June 2023 | November 2024 | Allow | 17 | 2 | 0 | Yes | No |
| 18136254 | PROCESS PRIVILEGE ESCALATION PROTECTION IN A COMPUTING ENVIRONMENT | April 2023 | January 2024 | Allow | 9 | 1 | 0 | No | No |
| 18186117 | SYSTEM AND METHOD FOR USER AND ENTITY BEHAVIORAL ANALYSIS USING NETWORK TOPOLOGY INFORMATION | March 2023 | September 2024 | Allow | 18 | 2 | 0 | No | No |
| 18170197 | UTILIZING ENCRYPTION KEY EXCHANGE WITH ACCESS PERMISSIONS TO SHARE PASSWORDS AMONG DEVICES VIA A SHARED FOLDER | February 2023 | June 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18012998 | METHOD, COMPUTER PROGRAM, AND DATA PROCESSING CIRCUITRY FOR ACCESS CONTROL TO ENCRYPTED DATA USING ATTRIBUTES OF THE DATA | December 2022 | January 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18069049 | METHOD AND APPARATUS FOR CONTROLLING DATA ACCESS RIGHT TO DATA STORED ON A BLOCKCHAIN | December 2022 | April 2024 | Allow | 16 | 2 | 0 | No | No |
| 18081934 | Anomaly Detection on MIL-STD-1553 Dataset Using Machine Learning | December 2022 | February 2025 | Abandon | 26 | 1 | 0 | No | No |
| 18053652 | Systems and Methods for Enabling Playback of Digital Content Using Status Associable Electronic Tickets and Ticket Tokens Representing Grant of Access Rights | November 2022 | May 2025 | Abandon | 30 | 5 | 0 | No | No |
| 17977407 | INFORMATION VERIFICATION METHOD AND RELATED APPARATUS, DEVICE, AND STORAGE MEDIUM FOR LOGGING IN TO A SERVER OF A TARGET APPLICATION WITHOUT EXPOSING PRIVACY INFORMATION OF A USER TO THE TARGET APPLICATION | October 2022 | March 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18048591 | SECURING GROUP MESSAGES OVER HYPERTEXT TRANSFER PROTOCOL WITH KEY MANAGEMENT AND ROTATION FOR MULTI-PARTY GROUPS | October 2022 | December 2024 | Allow | 26 | 1 | 0 | No | No |
| 17920629 | Systems and Methods for Automated Intervention | October 2022 | June 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 17970622 | METHOD FOR COUPLING A MEDICAL DEVICE WITH A NETWORK | October 2022 | April 2025 | Allow | 30 | 2 | 0 | No | No |
| 18048324 | DETERMINING FALSE POSITIVES OF FILE CHANGE EVENTS DETECTED BY FILE INTEGRITY MONITORING TOOLS | October 2022 | December 2024 | Allow | 36 | 1 | 0 | Yes | No |
| 17970185 | PROTECTING COMMERCIAL OFF-THE-SHELF PROGRAM BINARIES FROM PIRACY USING HARDWARE ENCLAVES | October 2022 | October 2023 | Allow | 12 | 1 | 0 | No | No |
| 17936160 | Computerized Method of Managing a Computer Remote Session Operation | September 2022 | March 2024 | Allow | 18 | 2 | 0 | Yes | No |
| 17954244 | TAMPER DETECTION SYSTEMS FOR ELECTRONIC DEVICES | September 2022 | January 2025 | Allow | 27 | 1 | 0 | No | No |
| 17951763 | METHODS AND SYSTEMS FOR THE RESERVATION AND REGISTRATION OF INTERNET OF THINGS DEVICE LICENSES FROM AUTHORIZED LICENSES ASSOCIATED WITH VENDOR SOFTWARE | September 2022 | May 2023 | Allow | 8 | 1 | 0 | No | No |
| 17942271 | PERMISSION SYNCHRONIZATION ACROSS COMPUTING SITES BASED ON USER AND RESOURCE CORRESPONDENCE | September 2022 | January 2025 | Allow | 28 | 1 | 0 | No | No |
| 17901641 | SYSTEMS AND METHODS FOR CREATING MULTIPLE RECORDS BASED ON AN ORDERED SMART CONTRACT | September 2022 | April 2023 | Allow | 7 | 1 | 0 | Yes | No |
| 17901309 | SYSTEMS AND METHODS FOR PREVENTING THE SPREAD OF MALWARE IN A SYNCHRONIZED DATA NETWORK | September 2022 | March 2025 | Allow | 31 | 2 | 0 | No | No |
| 17760016 | KEY GENERATION AND PACE PROTOCOL WITH PROTECTION AGAINST SIDE CHANNEL ATTACKS SPYING OUT A NONCE | August 2022 | February 2025 | Allow | 30 | 1 | 0 | No | No |
| 17875967 | SYSTEMS AND METHODS FOR SECURE ACCESS TO A COMPUTING SYSTEM | July 2022 | January 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17845212 | METHODS, SYSTEMS, AND MEDIA FOR DETERMINING APPLICATION COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT | June 2022 | October 2023 | Allow | 15 | 2 | 0 | No | No |
| 17832102 | METHOD AND SYSTEM FOR SYMMETRIC KEY DISTRIBUTION BETWEEN ELECTRONIC VEHICLE COMPONENTS | June 2022 | February 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 17828933 | Method And System for Leakage Measurement Error Compensation Based on Cloud-Edge Collaborative Computing | May 2022 | September 2024 | Allow | 28 | 1 | 0 | No | No |
| 17829292 | EXECUTING ATTESTATION CLIENT CODE BY EXECUTING A DYNAMIC ROOT OF TRUST FOR MEASUREMENT (DRTM) SEQUENCE TO ATTEST HEALTH OF A COMPUTING DEVICE | May 2022 | February 2025 | Allow | 33 | 1 | 0 | No | No |
| 17780902 | KEY NEGOTIATION METHOD AND INTERNET OF THINGS (IOT) DEVICE | May 2022 | July 2024 | Allow | 26 | 1 | 0 | No | No |
| 17780659 | DATA COMMUNICATION SYSTEM AND METHOD FOR PROVIDING END-TO-END CIPHERING | May 2022 | February 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17664803 | Privacy-Preserving Filtering of Encrypted Traffic via Handshake Decryption and Re-Encryption | May 2022 | December 2024 | Allow | 31 | 1 | 0 | No | No |
| 17747031 | SECURE PROCESS FOR VALIDATING MACHINE LEARNING MODELS USING HOMOMORPHIC ENCRYPTION TECHNIQUES | May 2022 | August 2024 | Allow | 27 | 1 | 0 | No | No |
| 17731455 | SYSTEM AND METHOD FOR AUTHORIZING ACCESS OF LOCAL AND REMOTE CLIENT DEVICES TO SMART DEVICES IN A LOCAL ENVIRONMENT | April 2022 | February 2024 | Allow | 22 | 2 | 0 | Yes | No |
| 17723489 | USING A SERVICE WORKER TO PRESENT A THIRD-PARTY CRYPTOGRAPHIC CREDENTIAL | April 2022 | June 2023 | Abandon | 13 | 2 | 0 | No | No |
| 17701544 | BLOCKCHAIN ENABLED ACCESS TO A SERVICE DEVICE | March 2022 | September 2024 | Abandon | 29 | 2 | 0 | No | No |
| 17689811 | SECURITY FOR CELLULAR INTERNET OF THINGS IN MOBILE NETWORKS BASED ON SUBSCRIBER IDENTITY AND APPLICATION IDENTIFIER | March 2022 | March 2023 | Allow | 12 | 1 | 0 | No | No |
| 17688675 | MOBILE EQUIPMENT IDENTITY AND/OR IOT EQUIPMENT IDENTITY AND APPLICATION IDENTITY BASED SECURITY ENFORCEMENT IN SERVICE PROVIDER NETWORKS | March 2022 | September 2023 | Allow | 18 | 2 | 0 | Yes | No |
| 17674917 | Maintaining Dependencies in a Set of Rules for Security Scanning in Could-Based Web Applications and API Protection | February 2022 | January 2025 | Allow | 35 | 2 | 0 | No | No |
| 17589432 | CO-MANAGING FIRMWARE CONFIGURATION AND UPDATES | January 2022 | August 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17588455 | ENHANCING KERNEL SECURITY IN CLOUD ENVIRONMENT BY PERFORMING A RULES-BASED ANALYSIS OF INCOMING DATA PACKETS BEFORE ROUTING THEM TO THE KERNEL | January 2022 | April 2024 | Allow | 26 | 1 | 0 | No | No |
| 17589811 | SYSTEM AND METHOD FOR COMPREHENSIVE DATA LOSS PREVENTION AND COMPLIANCE MANAGEMENT | January 2022 | April 2023 | Allow | 14 | 1 | 0 | No | No |
| 17626204 | ANALYSIS SYSTEM, METHOD, AND PROGRAM | January 2022 | December 2024 | Abandon | 36 | 2 | 0 | Yes | No |
| 17626435 | VULNERABILITY INSPECTION DEVICE, VULNERABILITY INSPECTION METHOD, AND VULNERABILITY INSPECTION PROGRAM | January 2022 | September 2024 | Allow | 32 | 1 | 0 | No | No |
| 17646965 | Secure Electric Vehicle Charger and System Incorporating Thereof | January 2022 | July 2022 | Allow | 7 | 1 | 0 | No | No |
| 17564269 | SIDELINK SECURITY CONFIGURATION PROCEDURE FOR AVOIDING KEY MISALIGNMENT BETWEEN UE | December 2021 | April 2024 | Allow | 27 | 1 | 0 | No | No |
| 17544756 | SPLIT TUNNELING BASED ON CONTENT TYPE TO EXCLUDE CERTAIN NETWORK TRAFFIC FROM A TUNNEL | December 2021 | March 2023 | Allow | 16 | 1 | 0 | No | No |
| 17542481 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR MODIFYING NAME OF FOLDER OR FILE | December 2021 | July 2025 | Allow | 43 | 2 | 0 | No | No |
| 17616361 | KEY MANAGEMENT VIA KEY LISTS FOR DISTRIBUTED COMPUTING SYSTEM | December 2021 | May 2024 | Abandon | 29 | 2 | 0 | Yes | No |
| 17537152 | KEY PAIR GENERATION BASED ON ENVIRONMENTAL FACTORS | November 2021 | December 2023 | Allow | 24 | 2 | 0 | No | No |
| 17530922 | METHOD OF CREATING AN ELECTRONICALLY READABLE OPTICAL FINGERPRINT TO PROTECT AN ELECTRICAL INTERCONNECT | November 2021 | April 2025 | Allow | 41 | 3 | 0 | No | No |
| 17515129 | AUTONOMOUS CRYPTOGRAPHIC AND BLOCKCHAIN ACTOR IN A BROWSER EXECUTION CONTEXT | October 2021 | June 2024 | Abandon | 31 | 1 | 0 | No | No |
| 17512371 | Keystroke Cipher Password Management System and Method for Managing and Protecting Master Passwords Without Exposing to Others | October 2021 | August 2024 | Allow | 33 | 1 | 0 | No | No |
| 17490502 | Systems and methods for providing scalable per-client private application access directories | September 2021 | May 2025 | Allow | 43 | 3 | 0 | No | No |
| 17482525 | Managing An Unmanned Aerial Vehicle Identity | September 2021 | November 2023 | Allow | 26 | 2 | 0 | Yes | No |
| 17473772 | SOLID MODELING AND NON-FUNGIBLE VIRTUAL AND ANTI-COUNTERFEITING INTEGRATION SYSTEM | September 2021 | June 2023 | Abandon | 21 | 1 | 0 | No | No |
| 17447315 | SECURELY TRANSPORTING A ROOT KEY USING A PRIVATELY/PUBLIC KEY PAIR FOR USER-CONTROLLED AUTHENTICATION OF NODES IN A HARDWARE SECURITY MODULE CLUSTER | September 2021 | May 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17465416 | NETWORK CONFIGURATION FOR ROUTING OF DATA, AND RELATED SYSTEMS AND METHODS | September 2021 | April 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17460523 | SYSTEMS AND METHODS FOR INITIATING NETWORK ACCESS ACCORDING TO AUTOMATIC AUTHENTICATION UTILIZING A MOBILE DEVICE | August 2021 | September 2023 | Abandon | 24 | 2 | 0 | Yes | No |
| 17459445 | DISTRIBUTED TRUSTED PLATFORM MODULE KEY MANAGEMENT PROTECTION FOR ROAMING DATA | August 2021 | July 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17412123 | System and Method for Detecting a Malicious File | August 2021 | June 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17405408 | SYSTEM AND METHOD FOR MONITORING AND SECURING COMMUNICATIONS NETWORKS AND ASSOCIATED DEVICES | August 2021 | April 2024 | Abandon | 32 | 2 | 0 | No | No |
| 17402781 | Systems and methods for providing private application access via Client to Client and Server to Client communication through a cloud-based system | August 2021 | September 2024 | Allow | 37 | 4 | 0 | Yes | No |
| 17399632 | Zero trust approach to secure sensitive mobile applications and prevent distributed denial of service attacks | August 2021 | April 2024 | Allow | 32 | 3 | 0 | Yes | No |
| 17392844 | DISTRIBUTED COMMUNICATION BETWEEN INTERNET OF THINGS DEVICES | August 2021 | June 2023 | Allow | 22 | 2 | 0 | No | No |
| 17390889 | USER AND ENTITY BEHAVIORAL ANALYSIS WITH NETWORK TOPOLOGY ENHANCEMENTS | July 2021 | June 2023 | Allow | 22 | 1 | 0 | No | No |
| 17389613 | CONDITIONS-BASED CONTAINER ORCHESTRATION | July 2021 | December 2024 | Abandon | 41 | 2 | 0 | No | No |
| 17390179 | Methods, systems, apparatus and articles of manufacture to obfuscate metered data using a mask | July 2021 | June 2023 | Allow | 22 | 2 | 0 | No | No |
| 17369305 | SYSTEMS, METHODS, AND DEVICES FOR ENCRYPTED DATA TRANSFER USING A NIC AND DISTRIBUTED ROOT OF TRUST | July 2021 | November 2024 | Allow | 41 | 4 | 0 | Yes | No |
| 17367741 | Systems and methods for utilizing sub-clouds in a cloud-based system for private application access | July 2021 | January 2024 | Allow | 31 | 3 | 0 | Yes | No |
| 17367760 | Cloud-based web application and API protection from untrusted users and devices | July 2021 | January 2025 | Allow | 42 | 5 | 0 | Yes | No |
| 17367751 | Systems and methods for selecting application connectors through a cloud-based system for private application access | July 2021 | February 2024 | Allow | 31 | 3 | 0 | Yes | No |
| 17363222 | USER AND ENTITY BEHAVIORAL ANALYSIS WITH NETWORK TOPOLOGY ENHANCEMENT | June 2021 | December 2022 | Allow | 17 | 1 | 0 | No | No |
| 17360007 | SYSTEM AND METHOD FOR MODEL-BASED PREDICTION USING A DISTRIBUTED COMPUTATIONAL GRAPH WORKFLOW | June 2021 | June 2025 | Allow | 47 | 3 | 0 | No | No |
| 17357866 | TECHNIQUES FOR DETERMINING LEGITIMACY OF EMAIL ADDRESSES FOR ONLINE ACCESS CONTROL | June 2021 | November 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17352651 | Private service edge nodes in a cloud-based system for private application access | June 2021 | May 2025 | Allow | 47 | 7 | 0 | Yes | No |
| 17347787 | Vehicle bus security by corrupting suspected transmitted frames | June 2021 | September 2024 | Allow | 39 | 2 | 0 | Yes | No |
| 17348480 | Systems and Methods for Providing Real Time Security and Access Monitoring of a Removable Media Device | June 2021 | October 2022 | Allow | 16 | 1 | 0 | No | No |
| 17337447 | COMPUTER-READABLE RECORDING MEDIUM STORING GENERATION PROGRAM FOR GENERATING AGGREGATION HASH VALUE BY AGGREGATING HASH VALUES FOR BLOCKS OF CONTENT, AND GENERATION APPARATUS FOR GENERATING AGGREGATION HASH VALUE BY AGGREGATING HASH VALUES FOR BLOCKS OF CONTENT | June 2021 | September 2023 | Allow | 27 | 3 | 0 | No | No |
| 17336339 | KEY GENERATION METHOD USING A KEY GENERATION NETWORK CONSTRUCTED ACCORDING TO A GENERATOR NETWORK AND A DISCRIMINATOR NETWORK | June 2021 | February 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17297945 | SYSTEM FOR SECURE DATA TRANSMISSION IN DIGITAL DATA TRANSMISSION NETWORK USING SINGLE-PASS QUANTUM KEY DISTRIBUTION SYSTEM AND METHOD OF KEY NEGOTIATION DURING OPERATION OF THE SYSTEM | May 2021 | March 2023 | Allow | 22 | 1 | 0 | No | No |
| 17288546 | AUTHORIZING MODIFICATIONS TO FIRMWARE | April 2021 | April 2024 | Allow | 36 | 2 | 0 | Yes | No |
| 17231803 | SYSTEMS AND METHODS FOR SECURE ACCESS WITH HEARTBEAT MONITORING TO NATIVE CLOUD SERVICES TO COMPUTERS OUTSIDE THE CLOUD | April 2021 | July 2023 | Allow | 27 | 2 | 0 | No | No |
| 17219529 | METHOD FOR KEY GENERATION UPON REQUEST BY A SECURE ACCESS DEVICE, USING AN ELECTRONIC CONTROL UNIT OF A VEHICLE | March 2021 | September 2023 | Allow | 30 | 1 | 0 | No | No |
| 17201897 | USING COMMIT TOKENS TO COORDINATE PERMISSIONS SUBMISSIONS TO ADDRESS TRANSACTION CONFLICT IN BLOCKCHAIN SYSTEMS | March 2021 | August 2021 | Allow | 5 | 1 | 0 | No | No |
| 17182104 | PROCESS PRIVILEGE ESCALATION PROTECTION IN A COMPUTING ENVIRONMENT | February 2021 | January 2023 | Allow | 23 | 1 | 0 | No | No |
| 17178359 | VEHICLE ELECTRONIC CONTROL UNIT AUTHENTICATION | February 2021 | June 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17267915 | TERMINAL REGISTRATION SYSTEM AND TERMINAL REGISTRATION METHOD WITH REDUCED NUMBER OF COMMUNICATION OPERATIONS | February 2021 | May 2022 | Allow | 15 | 1 | 0 | No | No |
| 17170963 | SYSTEM AND METHOD FOR ROUTING DATA TO AUTHORIZED USERS BASED ON SECURITY CLASSIFICATION OF DATA | February 2021 | September 2022 | Allow | 19 | 1 | 0 | No | No |
| 17170568 | DEVICE FOR PROCESSING DATA INCLUDING AT LEAST TWO DATA INTERFACES, AND OPERATING METHOD THEREFOR | February 2021 | February 2023 | Allow | 24 | 1 | 0 | No | No |
| 17169036 | MAINTENANCE OF WIRELESS DEVICES | February 2021 | March 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17166860 | BLOCKCHAIN MAINTENANCE METHOD AND APPARATUS, SERVER, AND COMPUTER-READABLE STORAGE MEDIUM | February 2021 | July 2023 | Allow | 29 | 1 | 0 | No | No |
| 17248701 | KEY GENERATION DEVICE, A VEHICLE-INTERNAL COMMUNICATION SYSTEM, AND A METHOD FOR THE VEHICLE-INTERNAL MANAGEMENT OF CRYPTOGRAPHIC KEYS | February 2021 | December 2022 | Allow | 22 | 2 | 0 | Yes | No |
| 17264351 | Method for Securing a Data Communication Network | January 2021 | November 2023 | Abandon | 33 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner WRIGHT, BRYAN F.
With a 16.7% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 51.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner WRIGHT, BRYAN F works in Art Unit 2497 and has examined 545 patent applications in our dataset. With an allowance rate of 83.1%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 29 months.
Examiner WRIGHT, BRYAN F's allowance rate of 83.1% places them in the 51% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by WRIGHT, BRYAN F receive 2.19 office actions before reaching final disposition. This places the examiner in the 74% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by WRIGHT, BRYAN F is 29 months. This places the examiner in the 46% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +18.4% benefit to allowance rate for applications examined by WRIGHT, BRYAN F. This interview benefit is in the 65% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 28.0% of applications are subsequently allowed. This success rate is in the 40% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 42.9% of cases where such amendments are filed. This entry rate is in the 59% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 11.8% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 22% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 80.0% of appeals filed. This is in the 69% percentile among all examiners. Of these withdrawals, 29.2% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 33.3% are granted (fully or in part). This grant rate is in the 27% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.