Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19377532 | STITCHING PARTIAL CALL GRAPHS TO CREATE A COMPLETE CALL GRAPH TO DETERMINE WHEN TO UPGRADE TO A NEWER VERSION | November 2025 | March 2026 | Allow | 4 | 0 | 0 | Yes | No |
| 19368783 | METHODS AND SYSTEMS FOR MAINTAINING BEHAVIORAL INTEGRITY OF AUTONOMOUS ARTIFICIAL INTELLIGENCE AGENTS | October 2025 | January 2026 | Allow | 3 | 0 | 0 | Yes | No |
| 19348050 | METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION USING DIFFERENT POLICY CLASSES | October 2025 | January 2026 | Allow | 3 | 0 | 0 | Yes | No |
| 19336798 | SYSTEMS AND METHODS FOR DATA ENCRYPTION AND DECRYPTION BASED ON RANDOMIZED MATRIX AND ORDERED TRANSFORMATIONS | September 2025 | December 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19331890 | SYSTEMS AND METHODS FOR SECURE VOTING WITH ZERO-KNOWLEDGE PROOFS AND TOKENS | September 2025 | December 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19322866 | METHODS AND SYSTEM FOR SECURE TRANSMISSION AND STORAGE OF SIGNATURE DATA | September 2025 | December 2025 | Allow | 3 | 1 | 0 | No | No |
| 19319685 | INFORMATION PROCESSING SYSTEM, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING PROGRAM STORED THEREIN, AND AUTHENTICATION METHOD | September 2025 | December 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19307235 | RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTURE | August 2025 | March 2026 | Allow | 7 | 1 | 0 | No | No |
| 19304982 | SYSTEMS AND METHODS FOR REAL-TIME GENERATION AND EXECUTION OF COMPUTER-EXECUTABLE INVESTIGATIVE QUERIES IN A CYBERSECURITY EVENT DETECTION AND RESPONSE PLATFORM | August 2025 | February 2026 | Allow | 5 | 0 | 0 | No | No |
| 19303307 | SYSTEM FOR BI-DIRECTIONAL MESSAGE SCORING USING FEATURE EXTRACTION, CONTEXTUAL REFINEMENT, AND SYNTHESIS | August 2025 | October 2025 | Allow | 2 | 0 | 0 | No | No |
| 19301768 | SYSTEMS AND METHODS FOR DATA ENCRYPTION AND DECRYPTION BASED ON UNIQUE ENCRYPTION VALUE SETS | August 2025 | January 2026 | Allow | 5 | 0 | 0 | Yes | No |
| 19287749 | CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING OFFLINE STORAGE | July 2025 | October 2025 | Allow | 2 | 0 | 0 | No | No |
| 19287737 | CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING DOUBLE ENCRYPTION | July 2025 | October 2025 | Allow | 2 | 0 | 0 | No | No |
| 19287102 | SYSTEM AND METHOD FOR UTILIZING AN AI BROWSER AGENT IN IDENTITY DISCOVERY AND MANAGEMENT | July 2025 | November 2025 | Allow | 4 | 0 | 0 | No | No |
| 19286976 | SYSTEMS AND METHODS FOR HIERARCHICAL MULTITENANCY DATA ACCESS | July 2025 | October 2025 | Allow | 3 | 0 | 0 | No | No |
| 19270726 | SYSTEM AND METHOD FOR DYNAMIC MULTI-PARTY VERIFICATION OF GENERATIVE ARITIFICIAL INTELLIGENCE SYSTEMS | July 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19270295 | Distributed Adversarial Attack Detection | July 2025 | November 2025 | Allow | 4 | 1 | 0 | No | No |
| 19270079 | AUTOMATED BACK-PROPAGATION OF A FIX USING A REPRODUCIBLE BUILD, TEST, AND VALIDATION PROCESS TO CREATE A PATCHED ARTIFACT | July 2025 | December 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 19265257 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19261765 | DECRYPTING MESSAGES ADDRESSED TO A GROUP OF USERS USING WEB BROWSER STORAGE | July 2025 | January 2026 | Allow | 7 | 1 | 0 | No | No |
| 19261587 | SECURING GROUP MESSAGES OVER HYPERTEXT TRANSFER PROTOCOL WITH KEY MANAGEMENT AND ROTATION FOR MULTI-PARTY GROUPS | July 2025 | October 2025 | Allow | 3 | 1 | 0 | No | No |
| 19258509 | TECHNIQUES FOR CYBERSECURITY INCIDENT INVESTIGATION UTILIZING TIMELINE GENERATION BASED ON ENTITY QUERIES | July 2025 | October 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 19256384 | Stateless Account Authentication Provable by Cryptographic Biometric Key | July 2025 | August 2025 | Allow | 2 | 0 | 0 | No | No |
| 19254764 | SYSTEM AND METHODS FOR UNFORGEABLE TELEMETRY IN THE PRESENCE OF CYBERATTACKS ON A COMPUTER PLATFORM | June 2025 | September 2025 | Allow | 2 | 0 | 0 | No | No |
| 19255903 | PRIVACY-PRESERVING AUTHENTICATED KEY ROTATION | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19252415 | METHOD FOR IRREFUTABLY IDENTIFYING PHYSICAL ITEMS | June 2025 | January 2026 | Allow | 7 | 1 | 0 | Yes | No |
| 19250003 | NETWORK ACTIVITY DEVIATION DETECTION AND REMEDIATION | June 2025 | August 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19249918 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19242417 | Detection of Image Injection Attacks in Mobile Document Capture Systems Using Accelerometer-Based Vibration Analysis | June 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19238157 | ANALYSIS AND RIGHTS MANAGEMENT OF DISASSOCIATED SPLINTERED DATA | June 2025 | September 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19236472 | SYSTEMS AND METHODS FOR COUNTER-RECONNAISSANCE IN CLOUD INFRASTRUCTURE TO DISRUPT ADVERSARIAL TARGETING | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19235482 | TRANSCEIVER DECODING METHOD AND SYSTEM BASED ON PROTOGRAPH DIFFERENTIAL CHAOS SHIFT KEYING | June 2025 | August 2025 | Allow | 2 | 0 | 0 | No | No |
| 19232533 | METHOD AND ELECTRONIC DEVICE FOR MANAGING SENSITIVE DATA BASED ON SEMANTIC CATEGORIZATION | June 2025 | August 2025 | Allow | 2 | 0 | 0 | No | No |
| 19136423 | CONSORTIUM BLOCKCHAIN ADMISSION MANAGEMENT METHOD AND APPARATUS | June 2025 | March 2026 | Allow | 9 | 0 | 0 | Yes | No |
| 18851672 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, SERVER, BLOCK CHAIN NODE, AND PROGRAM | June 2025 | March 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 19226046 | SYSTEM AND METHOD FOR SOFTWARE INTEGRATION INTO ENTERPRISE STANDARD CONTROL SYSTEMS USING STANDARDIZED APIs | June 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19222615 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19221409 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING INFORMATION PROCESSING PROGRAM STORED THEREIN | May 2025 | November 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19221400 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING INFORMATION PROCESSING PROGRAM STORED THEREIN | May 2025 | November 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19220825 | SYSTEMS AND METHODS FOR DIGITALLY CONNECTING PATIENTS TO DE-IDENTIFIED RESEARCH SPECIMENS AND DATA USING COMPOSABLE PROTOCOLS AND TOKENIZED IDENTIFIERS | May 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19220025 | Payment management system using asymmetric cryptography to ensure information accuracy | May 2025 | September 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 19217401 | TECHNIQUES FOR EFFECTIVE NETWORK EXPOSURE DETECTION OF PRIVATE ENDPOINTS THROUGH A CLOUD-NATIVE ROUTER | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19217383 | TECHNIQUES FOR DETECTING EFFECTIVE NETWORK EXPOSURE OF A CLOUD-NATIVE PROXY APPLIANCE UTILIZING AGENTLESS INSPECTION | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19214041 | CYBERTHREAT HUNTING AND PROTECTION BASED ON CODIFIED INDICATORS OF BEHAVIOR | May 2025 | October 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19211464 | IMPLEMENTING A PRIVACY INFRASTRUCTURE FOR THE INTERNET OF THINGS | May 2025 | October 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19205793 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON DEVICE CRITICALITY SCORE AND METHODS OF USE THEREOF | May 2025 | March 2026 | Allow | 10 | 2 | 0 | Yes | No |
| 19204280 | CRYPTOGRAPHIC METHOD FOR VERIFYING DATA | May 2025 | March 2026 | Allow | 10 | 2 | 0 | Yes | No |
| 19197948 | DIGITAL SIGNATURE | May 2025 | December 2025 | Allow | 7 | 1 | 0 | No | No |
| 19196527 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | May 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19196463 | USING A TREE STRUCTURE TO SEGMENT AND DISTRIBUTE RECORDS ACROSS ONE OR MORE DECENTRALIZED, ACYCLIC GRAPHS OF CRYPTOGRAPHIC HASH POINTERS | May 2025 | September 2025 | Allow | 5 | 1 | 0 | No | No |
| 19191857 | CREATING AND USING CALL GRAPHS TO SELECT AN UPDATE | April 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19191907 | USING CALL GRAPHS TO IDENTIFY AN UPDATE WHEN UPGRADING TO A NEWER VERSION | April 2025 | June 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19191252 | Secure Media Delivery | April 2025 | September 2025 | Allow | 5 | 1 | 0 | No | No |
| 19191981 | SYSTEMS AND METHODS FOR LINKING AN AUTHENTICATION ACCOUNT TO A DEVICE | April 2025 | February 2026 | Allow | 9 | 1 | 0 | No | No |
| 19191580 | MAINTENANCE AND ADJUSTMENT OF ENCRYPTED TRAFFIC BY EXTRACTING ANCHORS OF TRUST | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19188116 | PROMPT REFINEMENT TO IMPROVE ACCURACY OF OUTPUTS FROM MACHINE LEARNING MODELS | April 2025 | September 2025 | Allow | 4 | 1 | 0 | No | No |
| 19187708 | ONE-TIME KEY DERIVATION | April 2025 | October 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19185322 | METHOD FOR CONSTRUCTING A VEHICLE NETWORKING INTRUSION DETECTION MODEL BASED ON FEDERATED LEARNING | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19122410 | CHAINING MESSAGE AUTHENTICATION CODES | April 2025 | January 2026 | Allow | 9 | 0 | 0 | Yes | No |
| 19182219 | TECHNIQUES FOR ASSESSING EXPLOITATIONS IN A RUNTIME ENVIRONMENT | April 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19181802 | SECURE CROSS-CHAIN ATOMIC SWAPS | April 2025 | January 2026 | Allow | 9 | 1 | 0 | No | No |
| 19181210 | RESYNCHRONIZING ENCRYPTED NETWORK TRAFFIC | April 2025 | October 2025 | Allow | 6 | 1 | 0 | No | No |
| 19174560 | IDENTIFYING MATCHING VIRTUAL RESOURCES | April 2025 | June 2025 | Allow | 3 | 0 | 0 | No | No |
| 19172364 | SECURE MULTI-PARTY EPHEMERAL FILE TRANSFER | April 2025 | May 2025 | Allow | 1 | 0 | 0 | No | No |
| 19097774 | TRUSTWORTHINESS OF VIDEO DATA STREAMS | April 2025 | November 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 19096043 | DIGITAL ASSET MANAGEMENT | March 2025 | September 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19096557 | DATA PROTECTION ON DISTRIBUTED DATA STORAGE (DDS) PROTECTION NETWORKS | March 2025 | September 2025 | Allow | 6 | 1 | 0 | No | No |
| 19093823 | Defanging Malicious Electronic Files Based on Trusted User Reporting | March 2025 | October 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19116114 | COMMUNICATION APPARATUS, METHOD, SYSTEM, DEVICE, MEDIUM, ENCRYPTION SYSTEM, AND SERVER | March 2025 | November 2025 | Allow | 8 | 1 | 0 | No | No |
| 19115721 | DATA ENCRYPTION METHOD AND RELATED COMPONENT | March 2025 | June 2025 | Allow | 2 | 0 | 0 | No | No |
| 19089705 | DECENTRALIZED INTEGRATION SOLUTIONS FOR SECURELY CONDUCTING LEGAL TRANSACTIONS AND PROTECTING SENSITIVE DATA | March 2025 | August 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19088334 | PORTABLE COMMUNICATION DEVICE PROFILE MANAGEMENT USING TOKEN | March 2025 | June 2025 | Allow | 2 | 1 | 0 | Yes | No |
| 19086702 | NEURAL PROCESSING DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM AND METHOD FOR TRANSFERRING OWNERSHIP OF THE NEURAL PROCESSING DEVICE THEREOF | March 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19083748 | METHODS AND SYSTEMS FOR ENHANCING A CONTEXT FOR USE IN PROCESSING A USER REQUEST | March 2025 | January 2026 | Allow | 10 | 2 | 0 | No | No |
| 19080179 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | March 2025 | October 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19078119 | Electronic Document Presentation Management System | March 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19076729 | ADVANCED ENCRYPTION STANDARD WITH FREQUENT S-BOX UPDATE AND FUSION FUNCTION APPLICATION | March 2025 | July 2025 | Allow | 4 | 1 | 0 | No | No |
| 19074401 | AUTHENTICATION SIGNATURE EMBEDDING IN DIGITAL MEDIA | March 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19108933 | METHOD OF UTILIZING PHYSICAL OBJECTS IN A BLOCKCHAIN | March 2025 | January 2026 | Allow | 10 | 1 | 0 | Yes | No |
| 19069793 | IDENTIFYING AN UPDATE OF A CODE DEPENDENCY TO USE BASED ON RISK AND BENEFIT TRADE-OFFS | March 2025 | April 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19069724 | Verification and Authentication of Robots | March 2025 | July 2025 | Allow | 4 | 1 | 0 | No | No |
| 19064080 | METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUM FOR CDN SERVICE ORCHESTRATION IN MULTI-CLOUD ENVIRONMENT | February 2025 | May 2025 | Allow | 2 | 0 | 0 | No | No |
| 19061897 | PLATFORM SYSTEM CREATING RELIABLE, TRUST SCORED, TRUSTWORTHY DATA, FROM HUMAN AND OTHER DATA SOURCES FOR TRUSTED USES BY INDIVIDUALS AND OTHER ENTITIES | February 2025 | March 2026 | Abandon | 12 | 1 | 0 | No | No |
| 19061523 | METHOD AND SYSTEM FOR DETECTING ABNORMAL NODES IN INDUSTRIAL INTERNET, AND MEDIUM AND DEVICE | February 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19058833 | TECHNIQUES FOR SEMANTIC ANALYSIS OF CYBERSECURITY EVENT DATA AND REMEDIATION OF CYBERSECURITY EVENT ROOT CAUSES | February 2025 | April 2025 | Allow | 2 | 0 | 0 | No | No |
| 19104658 | METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM FOR DATA PROCESSING | February 2025 | November 2025 | Allow | 9 | 0 | 0 | No | No |
| 19048504 | TECHNIQUES FOR CYBERSECURITY EVENT CLASSIFICATION IN DATAFLOW MANAGEMENT | February 2025 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19041074 | SECURE CONTROLLED COMMUNICATIONS | January 2025 | August 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19041984 | CYBER RESILIENCE AGENTIC MESH | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19040705 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19038599 | Systems and Methods for Performing Secure Transactions on Blockchain | January 2025 | August 2025 | Allow | 7 | 1 | 0 | No | No |
| 19038434 | SYSTEMS AND METHODS FOR RESPONSIBLE AI | January 2025 | July 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19033769 | SECURED TRANSFER MEDIUM MANAGEMENT AND GRADUATION | January 2025 | November 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 19034297 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | January 2025 | March 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19033077 | MANAGING SECURITY OF CRYPTOMINING DEVICES | January 2025 | August 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19027830 | RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTURE | January 2025 | June 2025 | Allow | 5 | 1 | 0 | No | No |
| 19031089 | METHODS AND SYSTEMS FOR IDENTIFYING ANOMALOUS USERS EXHIBITING OVERREACHING ACCESS PERMISSIONS TO DATA OBJECTS | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19030734 | RUNTIME ENVIRONMENT FOR EXECUTION OF AUTONOMOUS AGENTS | January 2025 | October 2025 | Allow | 9 | 1 | 0 | No | No |
| 19025375 | Multi-Factor Authentication with Device and Carrier Validation | January 2025 | August 2025 | Allow | 7 | 0 | 0 | No | No |
| 19025047 | GRAPH MODELS OF RELATIONSHIPS BETWEEN DATA STORED IN BLOCKS ON DISTRIBUTED LEDGERS THAT ARE LEARNED THROUGH MACHINE LEARNING AND PLATFORMS FOR CREATING, CATALOGING, AND STORING THE SAME | January 2025 | February 2026 | Allow | 13 | 2 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for group 2490.
With a 27.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 34.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Group 2490 is part of Technology Center 2400. This group has examined 47,205 patent applications in our dataset, with an overall allowance rate of 81.0%. Applications typically reach final disposition in approximately 30 months.
Applications in Group 2490 receive an average of 2.05 office actions before reaching final disposition. The median prosecution time is 30 months.
This group-level data aggregates statistics across multiple art units. For more targeted prosecution strategies, review the individual art unit and examiner statistics within this group.
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.