Prosecution Insights
Last updated: April 19, 2026
Application No. 18/743,641

LOG RECOVERY FOR INTER-TABLESPACE TABLE MIGRATION

Final Rejection §102
Filed
Jun 14, 2024
Examiner
SYED, FARHAN M
Art Unit
2161
Tech Center
2100 — Computer Architecture & Software
Assignee
BMC Software, Inc.
OA Round
2 (Final)
75%
Grant Probability
Favorable
3-4
OA Rounds
3y 9m
To Grant
98%
With Interview

Examiner Intelligence

Grants 75% — above average
75%
Career Allow Rate
621 granted / 829 resolved
+19.9% vs TC avg
Strong +23% interview lift
Without
With
+23.4%
Interview Lift
resolved cases with interview
Typical timeline
3y 9m
Avg Prosecution
29 currently pending
Career history
858
Total Applications
across all art units

Statute-Specific Performance

§101
16.8%
-23.2% vs TC avg
§103
46.1%
+6.1% vs TC avg
§102
20.8%
-19.2% vs TC avg
§112
4.8%
-35.2% vs TC avg
Black line = Tech Center average estimate • Based on career data from 829 resolved cases

Office Action

§102
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Status of Claims In response to communications filed on 29 October 2025, claims 1-20 are presently pending in the application, of which, claims 1, 11 and 17 are presented in independent form. The Examiner acknowledges amended claims 1, 7, 9-11, 16-17, and 20. No claims were cancelled or newly added. Terminal Disclaimer The terminal disclaimer filed on 29 October 2025 disclaiming the terminal portion of any patent granted on this application which would extend beyond the expiration date of U.S. 12,013,766 has been reviewed and is accepted. The terminal disclaimer has been recorded. Response to Remarks/Arguments All objections and/or rejections issued in the previous Office Action, mailed 19 May 2025, have been withdrawn, unless otherwise noted in this Office Action. Applicant’s arguments with respect to claims 1-20 have been considered but are not persuasive. Applicant’s arguments are directed to amended features of the claims and therefore have been incorporated into the rejection below. Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1-20 are rejected under 35 U.S.C. 102(a)(1)/(a)(2) as being unpatentable by Richardson, Craig, et al (U.S. 8,296,271, issued 23 October 2012, and known hereinafter as Richardson). As per claim 1, Richardson teaches a computer program product, the computer program product being tangibly embodied on a non-transitory computer-readable storage medium and comprising instructions that, when executed by at least one computing device, are configured to cause the at least one computing device to: query a database (e.g. Richardson, see column 7, lines 1-10], which discloses a user identification (User ID) parameter is provided which allows the database administrator or a user to scan (e.g. query) the transaction logs for specified user identification, uniquely distinguishing each user accessing the database, therefore log files can be scanned for all operations performed by that user. Additionally, see column 3, lines 20-25, which discloses a log scanner allows a DBMS to perform queries over the scanned transaction logs and determine the exact operations, or query that resulted in a corruption of data.) to retrieve a table movement of a moved table from a source tablespace to a target tablespace within the database (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses a log scanner may scan to determine (e.g. identify) a list of recent transaction, where the log information may include a time stamp, nature of change, source, target, etc. Richardson, see column 4, line 65 to column 5, line 30 discloses each of the nodes includes a corresponding node log, which tracks and maintains modifications, edits, or deletions performed to the database tables by the respective nodes, where a catalog node may also be provided which retrieves a list of transactions performed in each of the node logs and references the list of transactions for a selected set of nodes.), the database containing log record repository (e.g. Richardson, see column 5, lines 32-38], which discloses the database systems commonly employ transaction logs in order to provide transaction autonomy, where a transaction log is a file that records the state of the database before a modification is made and the state of the database after the modification has been made.); query the log record repository (e.g. Richardson, see column 7, lines 1-10], which discloses a user identification (User ID) parameter is provided which allows the database administrator or a user to scan (e.g. query) the transaction logs for specified user identification, uniquely distinguishing each user accessing the database, therefore log files can be scanned for all operations performed by that user. Additionally, see column 3, lines 20-25, which discloses a log scanner allows a DBMS to perform queries over the scanned transaction logs and determine the exact operations, or query that resulted in a corruption of data.) for a plurality of log records to retrieve pre-move log records logged prior to the table movement and identifying the moved table as being included within the source tablespace (Richardson, see column 4, line 65 to column 5, line 30 discloses each of the nodes includes a corresponding node log, which tracks and maintains modifications, edits, or deletions performed to the database tables by the respective nodes, where a catalog node may also be provided which retrieves a list of transactions performed in each of the node logs and references the list of transactions for a selected set of nodes, where the database system commonly employ transaction logs in order to provide transaction autonomy, where a transaction log is a file that records the state of the database before a modification is made and the state of the database after the modification has been made.), and post-move log records logged after the table movement and identifying the moved table as being included within the target tablespace (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses the operation allows a user to scan all transactions of a specific type, where once the scan parameters are chosen, the log scanning algorithm scans the individual node transaction logs, the catalog, and any additional files for transactions that meet the selected scanning parameter. The rollback manager then assimilates the data received from the log scanner and provides an interface for the administrator to select the point to which the data in the database should be rolled-back and subsequently manages the rollback of the data. The Examiner notes that the rollback process is tracked and logged thereby illustrating most-move log records.); and modify (e.g. Richardson, see column 7, lines 15-20[, which discloses operation parameters allow a user to scan all transaction of a specific type. Databases typically perform three types of activities: insert row, modify row, or delete which may be referred to simply as operations.) the pre-move log records to obtain updated pre-move log records identifying the moved table as being included within the target tablespace (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.). As per claim 11, Richardson teaches a computer-implemented method, the method comprising: query a database (e.g. Richardson, see column 7, lines 1-10], which discloses a user identification (User ID) parameter is provided which allows the database administrator or a user to scan (e.g. query) the transaction logs for specified user identification, uniquely distinguishing each user accessing the database, therefore log files can be scanned for all operations performed by that user. Additionally, see column 3, lines 20-25, which discloses a log scanner allows a DBMS to perform queries over the scanned transaction logs and determine the exact operations, or query that resulted in a corruption of data.) to retrieve a table movement of a moved table from a source tablespace to a target tablespace within the database (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses a log scanner may scan to determine (e.g. identify) a list of recent transaction, where the log information may include a time stamp, nature of change, source, target, etc. Richardson, see column 4, line 65 to column 5, line 30 discloses each of the nodes includes a corresponding node log, which tracks and maintains modifications, edits, or deletions performed to the database tables by the respective nodes, where a catalog node may also be provided which retrieves a list of transactions performed in each of the node logs and references the list of transactions for a selected set of nodes.), the database containing log record repository (e.g. Richardson, see column 5, lines 32-38], which discloses the database systems commonly employ transaction logs in order to provide transaction autonomy, where a transaction log is a file that records the state of the database before a modification is made and the state of the database after the modification has been made.); query the log record repository (e.g. Richardson, see column 7, lines 1-10], which discloses a user identification (User ID) parameter is provided which allows the database administrator or a user to scan (e.g. query) the transaction logs for specified user identification, uniquely distinguishing each user accessing the database, therefore log files can be scanned for all operations performed by that user. Additionally, see column 3, lines 20-25, which discloses a log scanner allows a DBMS to perform queries over the scanned transaction logs and determine the exact operations, or query that resulted in a corruption of data.) for a plurality of log records to retrieve pre-move log records logged prior to the table movement and identifying the moved table as being included within the source tablespace (Richardson, see column 4, line 65 to column 5, line 30 discloses each of the nodes includes a corresponding node log, which tracks and maintains modifications, edits, or deletions performed to the database tables by the respective nodes, where a catalog node may also be provided which retrieves a list of transactions performed in each of the node logs and references the list of transactions for a selected set of nodes, where the database system commonly employ transaction logs in order to provide transaction autonomy, where a transaction log is a file that records the state of the database before a modification is made and the state of the database after the modification has been made.), and post-move log records logged after the table movement and identifying the moved table as being included within the target tablespace (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses the operation allows a user to scan all transactions of a specific type, where once the scan parameters are chosen, the log scanning algorithm scans the individual node transaction logs, the catalog, and any additional files for transactions that meet the selected scanning parameter. The rollback manager then assimilates the data received from the log scanner and provides an interface for the administrator to select the point to which the data in the database should be rolled-back and subsequently manages the rollback of the data. The Examiner notes that the rollback process is tracked and logged thereby illustrating most-move log records.); and modify (e.g. Richardson, see column 7, lines 15-20[, which discloses operation parameters allow a user to scan all transaction of a specific type. Databases typically perform three types of activities: insert row, modify row, or delete which may be referred to simply as operations.) the pre-move log records to obtain updated pre-move log records identifying the moved table as being included within the target tablespace (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.). As per claim 17, Richardson teaches a system comprising: at least one memory including instructions (e.g. Richardson, see Figure 1, which discloses a processor coupled to memory.); and at least one processor that is operably coupled to the at least one memory and that is arranged and configured to execute instructions that (e.g. Richardson, see Figure 1, which discloses a processor coupled to memory.), when executed, cause the at least one processor to: query a database (e.g. Richardson, see column 7, lines 1-10], which discloses a user identification (User ID) parameter is provided which allows the database administrator or a user to scan (e.g. query) the transaction logs for specified user identification, uniquely distinguishing each user accessing the database, therefore log files can be scanned for all operations performed by that user. Additionally, see column 3, lines 20-25, which discloses a log scanner allows a DBMS to perform queries over the scanned transaction logs and determine the exact operations, or query that resulted in a corruption of data.) to retrieve a table movement of a moved table from a source tablespace to a target tablespace within the database (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses a log scanner may scan to determine (e.g. identify) a list of recent transaction, where the log information may include a time stamp, nature of change, source, target, etc. Richardson, see column 4, line 65 to column 5, line 30 discloses each of the nodes includes a corresponding node log, which tracks and maintains modifications, edits, or deletions performed to the database tables by the respective nodes, where a catalog node may also be provided which retrieves a list of transactions performed in each of the node logs and references the list of transactions for a selected set of nodes.), the database containing log record repository (e.g. Richardson, see column 5, lines 32-38], which discloses the database systems commonly employ transaction logs in order to provide transaction autonomy, where a transaction log is a file that records the state of the database before a modification is made and the state of the database after the modification has been made.); query the log record repository (e.g. Richardson, see column 7, lines 1-10], which discloses a user identification (User ID) parameter is provided which allows the database administrator or a user to scan (e.g. query) the transaction logs for specified user identification, uniquely distinguishing each user accessing the database, therefore log files can be scanned for all operations performed by that user. Additionally, see column 3, lines 20-25, which discloses a log scanner allows a DBMS to perform queries over the scanned transaction logs and determine the exact operations, or query that resulted in a corruption of data.) for a plurality of log records to retrieve pre-move log records logged prior to the table movement and identifying the moved table as being included within the source tablespace (Richardson, see column 4, line 65 to column 5, line 30 discloses each of the nodes includes a corresponding node log, which tracks and maintains modifications, edits, or deletions performed to the database tables by the respective nodes, where a catalog node may also be provided which retrieves a list of transactions performed in each of the node logs and references the list of transactions for a selected set of nodes, where the database system commonly employ transaction logs in order to provide transaction autonomy, where a transaction log is a file that records the state of the database before a modification is made and the state of the database after the modification has been made.), and post-move log records logged after the table movement and identifying the moved table as being included within the target tablespace (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses the operation allows a user to scan all transactions of a specific type, where once the scan parameters are chosen, the log scanning algorithm scans the individual node transaction logs, the catalog, and any additional files for transactions that meet the selected scanning parameter. The rollback manager then assimilates the data received from the log scanner and provides an interface for the administrator to select the point to which the data in the database should be rolled-back and subsequently manages the rollback of the data. The Examiner notes that the rollback process is tracked and logged thereby illustrating most-move log records.); and modify (e.g. Richardson, see column 7, lines 15-20[, which discloses operation parameters allow a user to scan all transaction of a specific type. Databases typically perform three types of activities: insert row, modify row, or delete which may be referred to simply as operations.) the pre-move log records to obtain updated pre-move log records identifying the moved table as being included within the target tablespace (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.). As per claims 2, 12, and 18, Richardson teaches the computer program product of claim 1, the method of claim 11, and the system of claim 17, respectively, wherein the instructions are further configured to cause the at least one computing device to: query a catalog of the database to identify table movement activity, including a list of moved tables (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the a log scanner function allows the database to perform queries over the scanned transaction logs and determine the exact operation or a query that resulted in a corruption of data.); and identify the table movement from the table movement activity, including identifying the moved table from the list of moved tables (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses a log scanner may scan to determine (e.g. identify) a list of recent transaction, where the log information may include a time stamp, nature of change, source, target, etc.). As per claims 3 and 13, Richardson teaches the computer program product of claim 1 and the method of claim 11, respectively, wherein the instructions are further configured to cause the at least one computing device to: distinguish the pre-move log records from the post-move log records by analyzing a log order value of each of the plurality of log records with respect to a movement time at which the table movement occurred (e.g. Richardson, see column 5, line 1 to column 6, line 65, which discloses each of the nodes includes a corresponding node log which tracks and maintains modifications, edits, or deletions performed to the database tables, by the respective nodes. The information regarding the nature of the modification, the time the modification has taken place and the data in the table before and after the modification, and other pertinent information regarding activities by the nodes is stored in the transaction logs.). As per claim 4, Richardson teaches the computer program product of claim 1, wherein the instructions are further configured to cause the at least one computing device to: identify a reorganization process executed with respect to the database (e.g. Richardson, see column 5, line 1 to column 6, line 65, which discloses each of the nodes includes a corresponding node log which tracks and maintains modifications, edits, or deletions performed to the database tables, by the respective nodes. The information regarding the nature of the modification, the time the modification has taken place and the data in the table before and after the modification, and other pertinent information regarding activities by the nodes is stored in the transaction logs.); and identify the table movement as occurring as part of the reorganization process (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses the operation allows a user to scan all transactions of a specific type, where once the scan parameters are chosen, the log scanning algorithm scans the individual node transaction logs, the catalog, and any additional files for transactions that meet the selected scanning parameter. The rollback manager then assimilates the data received from the log scanner and provides an interface for the administrator to select the point to which the data in the database should be rolled-back and subsequently manages the rollback of the data.). As per claim 5, Richardson teaches the computer program product of claim 1, wherein the instructions are further configured to cause the at least one computing device to: identify the table movement as occurring in response to a command of the database (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses the operation allows a user to scan all transactions of a specific type, where once the scan parameters are chosen, the log scanning algorithm scans the individual node transaction logs, the catalog, and any additional files for transactions that meet the selected scanning parameter. The rollback manager then assimilates the data received from the log scanner and provides an interface for the administrator to select the point to which the data in the database should be rolled-back and subsequently manages the rollback of the data.). As per claims 6, 14 and 19, Richardson teaches the computer program product of claim 1, the method of claim 11, and the system of claim 17, respectively, wherein the database has a database identifier (ID) and includes the source tablespace with a source tablespace ID and the target tablespace with a target tablespace ID (e.g. Richardson, see column 5, line 35 to column 6, line 55, which discloses a transaction sequence begins with a log record, where every transaction sequence is uniquely identified by a transaction identifier assigned by the database system. A transaction ID field is present in every log record.), and wherein the instructions are further configured to cause the at least one computing device to: identify the moved table within the pre-move log records using a combination of the database ID, the source tablespace ID, and a table ID of the moved table (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses a log scanner may scan to determine (e.g. identify) a list of recent transaction, where the log information may include a time stamp, nature of change, source, target, etc.); and change the source tablespace ID to the target tablespace ID within the pre-move log records to thereby obtain the updated pre-move log records (e.g. Richardson, see column 5, line 1 to column 6, line 65, which discloses each of the nodes includes a corresponding node log which tracks and maintains modifications, edits, or deletions performed to the database tables, by the respective nodes. The information regarding the nature of the modification, the time the modification has taken place and the data in the table before and after the modification, and other pertinent information regarding activities by the nodes is stored in the transaction logs.). As per claims 7, 15, and 20, Richardson teaches the computer program product of claim 1, the method of claim 11, and the system of claim 17, respectively, wherein the instructions are further configured to cause the at least one computing device to: obtain the pre-move log records and the post-move log records from log records of the database (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.); store the pre-move log records and the post-move log records within a log record buffer to obtain stored pre-move log records and store post-move log records (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.); and update the stored pre-move log records within the log record buffer to obtain the updated pre-move log records stored within the log records buffer (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.). As per claim 8, Richardson teaches the computer program product of claim 1, wherein the instructions are further configured to cause the at least one computing device to: request the updated pre-move log records and the post-move log records using an identification of the target tablespace (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.); and execute processing of the updated pre-move log records and the post-move log records (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.). As per claims 9 and 16, Richardson teaches the computer program product of claim 1, wherein the instructions are further configured to cause the at least one computing device to: obtain, from a catalog of the database and in response to identifying the table movement, event data related to the source tablespace (e.g. Richardson, see column 6, line 58 to column 8, line 50, which discloses a log scanner may scan to determine (e.g. identify) a list of recent transaction, where the log information may include a time stamp, nature of change, source, target, etc.); and process the updated pre-move log records and the post-move log records, using the event data to process the updated pre-move log records (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.). As per claim 10, Richardson teaches the computer program product of claim 9, wherein the instructions are further configured to cause the at least one computing device to: capture the event data prior to the table movement within an event repository that is external to the database (e.g. Richardson, see column 7, line 50 to column 10, line 35, which discloses the rollback function accumulates all changes that are needed in order to reverse each operation in a temporary rollback table, the changes are recorded as full data row images that are either inserted or deleted from a corresponding table (e.g. target) and updates the transaction log.). Conclusion The prior art made of record and not relied upon is considered pertinent to applicant’s disclosure. See attached PTO-892 that includes additional prior art of record describing the general state of the art in which the invention is directed to. THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Contact Information Any inquiry concerning this communication or earlier communications from the examiner should be directed to FARHAN M SYED whose telephone number is (571)272-7191. The examiner can normally be reached M-F 8:30AM-5:30PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Apu Mofiz can be reached at 571-272-4080. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /FARHAN M SYED/Primary Examiner, Art Unit 2161 February 5, 2026
Read full office action

Prosecution Timeline

Jun 14, 2024
Application Filed
May 15, 2025
Non-Final Rejection — §102
Oct 29, 2025
Response Filed
Feb 05, 2026
Final Rejection — §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602674
SYSTEM AND METHOD FOR REMOTELY MODIFYING CLOUD-BASED CLIENT APPLICATIONS
2y 5m to grant Granted Apr 14, 2026
Patent 12597071
SYSTEMS AND METHODS OF SWITCHING BETWEEN A FIRST EXECUTION MODE AND SECOND EXECUTION MODE FOR MATCH PROCESSING
2y 5m to grant Granted Apr 07, 2026
Patent 12591792
DYNAMICALLY ENRICHING SHARED KNOWLEDGE GRAPHS
2y 5m to grant Granted Mar 31, 2026
Patent 12579470
SYSTEMS AND METHODS FOR DISTRIBUTING LAYERS OF SPECIAL MIXTURE-OF-EXPERTS MACHINE LEARNING MODELS
2y 5m to grant Granted Mar 17, 2026
Patent 12579207
LOCATION-BASED SEARCHING USING A SEARCH AREA THAT CORRESPONDS TO A GEOGRAPHICAL LOCATION OF A COMPUTING DEVICE
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
75%
Grant Probability
98%
With Interview (+23.4%)
3y 9m
Median Time to Grant
Moderate
PTA Risk
Based on 829 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month