Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18669379 | Generative Artificial Intelligence Model Output Obfuscation | May 2024 | August 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18689281 | ELECTRONIC DEVICE, TRUSTED APPLICATION CALLING METHOD AND APPARATUS, DEVICE, AND MEDIUM | March 2024 | November 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18441918 | Machine Learning Model Adversarial Attack Monitoring | February 2024 | May 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18529621 | System and Method for Ransomware Early Detection Using a Security Appliance As Default Gateway With Point-To-Point Links Between Endpoints | December 2023 | April 2024 | Allow | 4 | 1 | 0 | No | No |
| 18525832 | SYSTEMS AND METHODS FOR A CONNECTED COMPUTING RESOURCE AND EVENT/ACTIVITY IDENTIFICATION INFORMATION INFRASTRUCTURE USING NEAR EXISTENTIAL OR EXISTENTIAL BIOMETRIC IDENTIFICATION OF HUMANS | November 2023 | November 2024 | Allow | 12 | 1 | 0 | No | No |
| 18388763 | PRIVACY PRESERVING CUSTOM EMBEDDINGS | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18505005 | Scanning and Detecting Threats in Machine Learning Models | November 2023 | February 2024 | Allow | 3 | 1 | 0 | No | No |
| 18386807 | Security Context Handling in 5G During Idle Mode | November 2023 | January 2025 | Allow | 15 | 1 | 0 | No | No |
| 18482073 | PRIVACY POLICY RATING SYSTEM | October 2023 | February 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18375833 | COLLABORATIVE COMPUTING AND ELECTRONIC RECORDS | October 2023 | August 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18548332 | MACHINE LEARNING METHODS AND SYSTEMS FOR DETERMINING FILE RISK USING CONTENT DISARM AND RECONSTRUCTION ANALYSIS | August 2023 | June 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18235836 | SIGNING LARGE LANGUAGE MODEL PROMPTS TO PREVENT UNINTENDED RESPONSE | August 2023 | May 2025 | Allow | 21 | 0 | 0 | No | No |
| 18349848 | System and Method To Enforce User-Based Policies In Cloud-Gateway While Accessing Protected Non-Web Resources Connected To Internet | July 2023 | January 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18333285 | REMOTING APPLICATION ACROSS A NETWORK USING DRAW COMMANDS WITH AN ISOLATOR APPLICATION | June 2023 | January 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18194028 | FRAUDULENT USER IDENTIFIER DETECTION USING MACHINE LEARNING MODELS | March 2023 | September 2023 | Allow | 5 | 0 | 1 | Yes | No |
| 18181324 | POST-QUANTUM-RESISTANT CRYPTOGRAPHIC SYSTEM AND METHODS | March 2023 | September 2024 | Allow | 18 | 0 | 0 | No | No |
| 18177396 | Antimalware Systems and Methods Using Optimal Triggering of Artificial Intelligence Modules | March 2023 | April 2025 | Allow | 26 | 0 | 0 | No | No |
| 18115341 | MODULE AND METHOD FOR MONITORING SYSTEMS OF A HOST DEVICE FOR SECURITY EXPLOITATIONS | February 2023 | December 2023 | Allow | 10 | 0 | 0 | No | No |
| 18096873 | METHOD AND SYSTEM FOR DETECTING MODEL MANIPULATION THROUGH EXPLANATION POISONING | January 2023 | December 2024 | Allow | 23 | 0 | 0 | No | No |
| 18011083 | ELECTRONIC DOCUMENT SIGNATURES | December 2022 | April 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18064177 | System and Method for Utilizing DHCP Relay to Police DHCP Address Assignment in Ransomware Protected Network | December 2022 | October 2023 | Allow | 11 | 1 | 0 | No | No |
| 18008916 | CROSS CERTIFICATION METHOD AND CERTIFYING DEVICE FOR PROVIDING THE METHOD | December 2022 | September 2024 | Allow | 22 | 0 | 0 | No | No |
| 18074651 | Firewall System With Application Identifier Based Rules | December 2022 | March 2024 | Allow | 15 | 1 | 0 | No | No |
| 17928193 | OPERATION BEHAVIOR MONITORING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | November 2022 | May 2023 | Allow | 6 | 0 | 0 | Yes | No |
| 17989591 | SYSTEM AND METHOD FOR CONTINUOUS COLLECTION, ANALYSIS AND REPORTING OF ATTACK PATHS CHOKE POINTS IN A DIRECTORY SERVICES ENVIRONMENT | November 2022 | May 2025 | Allow | 30 | 1 | 0 | No | No |
| 17986691 | SYSTEMS AND METHODS FOR RECEIVING SECURE DATA | November 2022 | December 2023 | Allow | 13 | 0 | 0 | Yes | No |
| 17977629 | SYSTEM AND METHOD FOR PROVIDING USER FEEDBACK | October 2022 | April 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18050508 | COMBINED STRUCTURE AND IMPORT BEHAVIOR SIGNATURES BASED MALWARE LEARNING AND DETECTION | October 2022 | March 2025 | Allow | 29 | 0 | 0 | No | No |
| 17973607 | SYSTEM AND METHOD FOR PROTECTING NETWORK RESOURCES | October 2022 | January 2024 | Allow | 15 | 0 | 0 | Yes | No |
| 17918940 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM | October 2022 | May 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17917262 | SYSTEM FOR PROVIDING PERSONAL INFORMATION-BASED SPEECH INFORMATION PROCESSING SERVICE | October 2022 | December 2024 | Allow | 26 | 1 | 0 | No | No |
| 17937895 | SECURE DEVICE ASSOCIATION USING AUDIO TRANSMISSIONS | October 2022 | September 2024 | Allow | 23 | 0 | 0 | No | No |
| 17823730 | ASSET DISCOVERY ENGINE WITH DEEP VULNERABILITIES SCANNER | August 2022 | June 2024 | Allow | 22 | 0 | 0 | No | No |
| 17882436 | DYNAMIC PROTECTION OF WEB FORMS | August 2022 | February 2025 | Allow | 30 | 1 | 0 | No | No |
| 17760200 | METHOD OF OPERATING A COMPUTER-CONTROLLED DEVICE FOR ESTABLISHING A SECURE DATA COMMUNICATION IN A DISTRIBUTED CONTROL SYSTEM OF A PASSENGER TRANSPORTATION ARRANGEMENT | August 2022 | September 2024 | Allow | 26 | 1 | 0 | No | No |
| 17817422 | METHOD AND APPARATUS FOR PROVIDING STRONG MUTUAL AUTHENTICATION, ENCRYPTION, AND INTEGRITY FOR CONSTRAINT DEVICES WITHOUT SECURE STORAGE AND PKI SUPPORT | August 2022 | July 2024 | Allow | 23 | 0 | 0 | No | No |
| 17870317 | Methods, Systems and Computer Program Products for Handling Data Records Using an Application Programming Interface (API) and Directory Management System | July 2022 | January 2025 | Allow | 30 | 1 | 0 | No | No |
| 17864526 | SYSTEM AND METHOD FOR SECURING DIAGNOSTIC DATA COLLECTION USING DATA CONTROL | July 2022 | November 2024 | Allow | 29 | 1 | 0 | No | No |
| 17852777 | ADAPTIVE CYBERSECURITY FOR VEHICLES | June 2022 | June 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 17844596 | APPARATUS AND METHOD FOR SYNCHRONIZING CONSENSUS NODE INFORMATION IN BLOCKCHAIN NETWORK | June 2022 | August 2024 | Allow | 26 | 1 | 0 | No | No |
| 17750737 | Signature quality evaluation | May 2022 | June 2025 | Allow | 36 | 2 | 0 | Yes | No |
| 17663333 | SECURITY DEVICE | May 2022 | September 2024 | Allow | 29 | 1 | 0 | No | No |
| 17773558 | CONSENSUS METHOD FOR BLOCKCHAIN, CONSENSUS NODE, ELECTRONIC DEVICE, AND STORAGE MEDIUM | April 2022 | December 2024 | Allow | 32 | 1 | 0 | No | No |
| 17725178 | PHYSICAL UNCLONABLE FUNCTION FAILURE PROTECTION AND PREDICTION | April 2022 | August 2024 | Allow | 28 | 0 | 1 | Yes | No |
| 17658340 | IMAGE STEGANOGRAPHY DETECTION | April 2022 | January 2025 | Allow | 33 | 1 | 0 | No | No |
| 17711586 | METHOD AND SYSTEM FOR WORKFLOW ATTESTATION | April 2022 | March 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17711613 | RISK DRIVEN PLANNING AND SIMULATION FOR A COMPUTER NETWORK | April 2022 | February 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 17651443 | ELECTRONIC DEVICE, LIBRARY, AND PROCESSING METHOD | February 2022 | November 2024 | Allow | 33 | 1 | 0 | No | No |
| 17585638 | SYSTEMS AND METHODS FOR VERIFYING ATTRIBUTES OF USERS OF ONLINE SYSTEMS | January 2022 | October 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17564913 | CYBERSECURITY FOR CONFIGURATION AND SOFTWARE UPDATES OF VEHICLE HARDWARE AND SOFTWARE BASED ON FLEET LEVEL INFORMATION | December 2021 | March 2023 | Allow | 15 | 1 | 0 | No | No |
| 17560743 | ELECTRONIC APPARATUS AND CONTROLLING METHOD THEREOF | December 2021 | July 2024 | Allow | 31 | 1 | 0 | No | No |
| 17560360 | TRANSIENT SIDE-CHANNEL AWARE ARCHITECTURE FOR CRYPTOGRAPHIC COMPUTING | December 2021 | March 2024 | Allow | 27 | 0 | 0 | No | No |
| 17560542 | ELECTRONIC DEVICE FOR SHARING ID AND PASSWORD, METHOD FOR OPERATING THEREOF, AND SERVER | December 2021 | October 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17432627 | SYSTEM AND METHOD FOR BLOCKCHAIN PLATFORM-BASED SERVICE | October 2021 | June 2024 | Allow | 34 | 1 | 0 | No | No |
| 17496055 | INTEGRATED CIRCUIT PROTECTIONS AGAINST REMOVAL AND ORACLE-GUIDED ATTACKS | October 2021 | March 2024 | Allow | 29 | 0 | 0 | No | No |
| 17473370 | SYSTEM AND METHOD FOR CONTINUOUS COLLECTION, ANALYSIS AND REPORTING OF ATTACK PATHS CHOKE POINTS IN A DIRECTORY SERVICES ENVIRONMENT | September 2021 | August 2022 | Allow | 11 | 2 | 0 | Yes | No |
| 17464847 | MICRO-FIREWALLS IN A MICROSERVICE MESH ENVIRONMENT | September 2021 | January 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17398776 | SECURITY TOOL | August 2021 | January 2024 | Allow | 29 | 1 | 0 | No | No |
| 17390297 | Security Context Handling in 5G During Idle Mode | July 2021 | August 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17387615 | System and Method For Determining Endpoint Compatibility with Subnet Prefix of All-Ones for Lateral Propagation Prevention of Ransomware | July 2021 | November 2021 | Allow | 4 | 0 | 0 | Yes | No |
| 17373832 | MULTIPLE DATA STORE AUTHENTICATION | July 2021 | August 2023 | Allow | 25 | 0 | 0 | No | No |
| 17358758 | ADAPTIVE CYBERSECURITY FOR VEHICLES | June 2021 | April 2022 | Allow | 9 | 2 | 0 | No | No |
| 17351441 | IMAGE STEGANOGRAPHY DETECTION | June 2021 | March 2022 | Allow | 9 | 1 | 1 | Yes | No |
| 17335564 | Cloud-native global file system with constant-time rekeying | June 2021 | April 2024 | Allow | 35 | 1 | 0 | No | No |
| 17237150 | ENHANCING SECURITY USING ANOMALY DETECTION | April 2021 | April 2024 | Allow | 35 | 1 | 0 | No | No |
| 17212399 | NETWORK ACTIVITY IDENTIFICATION AND CHARACTERIZATION BASED ON CHARACTERISTIC ACTIVE DIRECTORY (AD) EVENT SEGMENTS | March 2021 | January 2025 | Allow | 46 | 2 | 0 | Yes | No |
| 17211423 | RULE-BASED CONTROL OF COMMUNICATION DEVICES | March 2021 | November 2024 | Abandon | 44 | 1 | 0 | No | No |
| 17202569 | METHODS, MEDIA, AND SYSTEMS FOR DETECTING ANOMALOUS PROGRAM EXECUTIONS | March 2021 | May 2024 | Abandon | 38 | 1 | 0 | No | No |
| 17198984 | MULTIPLE DATA STORE AUTHENTICATION | March 2021 | June 2021 | Allow | 3 | 0 | 0 | Yes | No |
| 17183257 | AUTHENTICATION THROUGH SECURE SHARING OF DIGITAL SECRETS PREVIOUSLY ESTABLISHED BETWEEN DEVICES | February 2021 | December 2023 | Allow | 33 | 1 | 0 | No | No |
| 17180799 | SYSTEM AND METHOD FOR AUTOMATIC FORENSIC INVESTIGATION | February 2021 | July 2024 | Allow | 41 | 1 | 0 | Yes | No |
| 17144789 | SYSTEM AND METHOD FOR CONTINUOUS COLLECTION, ANALYSIS AND REPORTING OF ATTACK PATHS IN A DIRECTORY SERVICES ENVIRONMENT | January 2021 | April 2021 | Allow | 3 | 1 | 0 | No | No |
| 17118735 | System, Method, and Computer Program Product for Managing Computational Cluster Access to Multiple Domains | December 2020 | April 2024 | Allow | 40 | 4 | 0 | Yes | No |
| 17109194 | ROGUE BASE STATION ROUTER DETECTION WITH STATISTICAL ALGORITHMS | December 2020 | May 2024 | Abandon | 41 | 1 | 0 | No | No |
| 17107263 | COLLABORATIVE COMPUTING AND ELECTRONIC RECORDS | November 2020 | July 2023 | Allow | 31 | 0 | 0 | Yes | No |
| 17064319 | MITIGATION OF RANSOMWARE | October 2020 | November 2023 | Allow | 37 | 1 | 0 | Yes | No |
| 17044433 | VEHICLE-MOUNTED COMMUNICATION SYSTEM, DETERMINATION DEVICE, COMMUNICATION DEVICE, DETERMINATION METHOD, AND COMPUTER PROGRAM | October 2020 | August 2024 | Allow | 46 | 1 | 1 | No | No |
| 17018192 | CODE SIGNING METHOD AND SYSTEM | September 2020 | March 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 16978772 | External Terminal Protection Device and Protection System | September 2020 | November 2020 | Allow | 2 | 0 | 0 | No | No |
| 16936622 | Cloud-native global file system with constant-time rekeying | July 2020 | January 2021 | Allow | 6 | 1 | 0 | No | No |
| 16932568 | PRIVACY POLICY RATING SYSTEM | July 2020 | June 2023 | Allow | 34 | 0 | 0 | No | No |
| 16910861 | ASSESSING RISK ASSOCIATED WITH FIREWALL RULES | June 2020 | May 2023 | Allow | 35 | 0 | 0 | Yes | No |
| 16879387 | OPERATING A SECURITY ZONE ON AN AIR-GAPPED ENDPOINT | May 2020 | September 2023 | Abandon | 40 | 1 | 0 | No | No |
| 15930951 | METHODS, MEDIA AND SYSTEMS FOR DETECTING ANOMALOUS PROGRAM EXECUTIONS | May 2020 | September 2023 | Abandon | 40 | 1 | 0 | No | No |
| 16865133 | TRUSTED EXECUTION OF AN EXECUTABLE OBJECT ON A LOCAL DEVICE | May 2020 | December 2023 | Allow | 43 | 1 | 0 | Yes | No |
| 16864102 | METHODS AND APPARATUS TO ACCELERATE SECURITY THREAT INVESTIGATION | April 2020 | January 2023 | Allow | 32 | 2 | 0 | Yes | No |
| 16860208 | SYSTEMS AND METHODS FOR SECURE DATA TRANSPORT | April 2020 | February 2023 | Allow | 34 | 0 | 0 | Yes | No |
| 16855912 | AUTHENTICATED ACCESS AND AGGREGATION DATABASE PLATFORM | April 2020 | April 2024 | Allow | 48 | 1 | 0 | No | No |
| 16806875 | BLOCKCHAIN-TYPE DATA STORAGE | March 2020 | May 2020 | Allow | 3 | 0 | 0 | Yes | No |
| 16800734 | IDENTIFYING COMPUTER BEHAVIOR USING VISUAL DATA ORGANIZATION AND GRAPHS | February 2020 | November 2023 | Allow | 45 | 1 | 0 | Yes | No |
| 16641603 | SAMPLE DATA GENERATION APPARATUS, SAMPLE DATA GENERATION METHOD, AND COMPUTER READABLE MEDIUM | February 2020 | July 2023 | Allow | 40 | 1 | 0 | Yes | No |
| 16792512 | SCALING OF ADAPTIVE CRYPTO SERVICES WITHIN THE CLOUD | February 2020 | May 2021 | Allow | 15 | 0 | 0 | Yes | No |
| 16781854 | REMOTING APPLICATION ACROSS A NETWORK USING DRAW COMMANDS WITH AN ISOLATOR APPLICATION | February 2020 | April 2022 | Allow | 26 | 1 | 0 | No | No |
| 16776868 | Dynamic rules engine in a cloud-based sandbox | January 2020 | August 2023 | Allow | 42 | 1 | 0 | No | No |
| 16751261 | INTERACTIVE INTERFACES AND DATA STRUCTURES REPRESENTING PHYSICAL AND/OR VISUAL INFORMATION USING SMART PINS | January 2020 | January 2024 | Allow | 48 | 1 | 0 | Yes | No |
| 16741576 | MANAGING THE DISPLAY OF HIDDEN PROPRIETARY SOFTWARE CODE TO AUTHORIZED LICENSED USERS | January 2020 | September 2020 | Allow | 9 | 0 | 0 | Yes | No |
| 16628263 | CALL STACK ACQUISITION DEVICE, CALL STACK ACQUISITION METHOD, AND CALL STACK ACQUISITION PROGRAM | January 2020 | August 2021 | Allow | 19 | 0 | 0 | No | No |
| 16731291 | MALWARE DETECTION BY A SANDBOX SERVICE BY UTILIZING CONTEXTUAL INFORMATION | December 2019 | March 2022 | Abandon | 26 | 1 | 0 | No | No |
| 16719811 | SERVICE OBJECT ALLOCATION | December 2019 | June 2020 | Allow | 6 | 1 | 0 | Yes | No |
| 16714281 | Security Context Handling in 5G During Idle Mode | December 2019 | April 2021 | Allow | 16 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HARRIS, CHRISTOPHER C.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner HARRIS, CHRISTOPHER C works in Art Unit 2432 and has examined 223 patent applications in our dataset. With an allowance rate of 88.8%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.
Examiner HARRIS, CHRISTOPHER C's allowance rate of 88.8% places them in the 67% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by HARRIS, CHRISTOPHER C receive 1.14 office actions before reaching final disposition. This places the examiner in the 18% percentile for office actions issued. This examiner issues significantly fewer office actions than most examiners.
The median time to disposition (half-life) for applications examined by HARRIS, CHRISTOPHER C is 28 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +11.0% benefit to allowance rate for applications examined by HARRIS, CHRISTOPHER C. This interview benefit is in the 49% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 35.4% of applications are subsequently allowed. This success rate is in the 75% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 10.8% of cases where such amendments are filed. This entry rate is in the 5% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 88% percentile among all examiners. Of these withdrawals, 100.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 21.3% are granted (fully or in part). This grant rate is in the 12% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 12% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.