Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18420905 | EVENT PROCESSING METHOD AND SYSTEM | January 2024 | August 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18530052 | CONDITIONAL EGRESS IP FOR DELIVERY OF LOCALIZED CONTENT | December 2023 | May 2024 | Allow | 6 | 1 | 0 | No | No |
| 18238649 | CONNECTION REVOCATION IN OVERLAY NETWORKS | August 2023 | March 2024 | Allow | 6 | 2 | 0 | No | No |
| 18226862 | Blockchain Management Platform for Performing Asset Adjustment, Cross Sectional Editing, and Bonding | July 2023 | June 2024 | Allow | 11 | 1 | 0 | No | No |
| 18357845 | SYSTEM AND METHOD FOR APPLYING A POLICY ON A NETWORK PATH | July 2023 | January 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18318595 | SECURE ACCESS VIA A REMOTE BROWSER | May 2023 | April 2024 | Allow | 11 | 2 | 0 | Yes | No |
| 18036388 | KEY MANAGEMENT METHOD AND RELATED DEVICE | May 2023 | February 2024 | Allow | 9 | 2 | 0 | No | No |
| 18143909 | SYSTEM AND METHOD FOR HOSTING FIDO AUTHENTICATORS | May 2023 | October 2023 | Allow | 6 | 1 | 0 | No | No |
| 18132130 | Cloud security platform with contextual hot-spot permissions analytics | April 2023 | January 2024 | Allow | 9 | 1 | 0 | No | No |
| 18192295 | SECURITY MANAGEMENT ON A MOBILE DEVICE | March 2023 | February 2024 | Allow | 11 | 1 | 0 | No | No |
| 18188983 | AUTHORIZING FRONT-END DEVICES WITH TOKENS | March 2023 | February 2024 | Allow | 10 | 2 | 0 | Yes | No |
| 18186688 | AGENT-BASED VULNERABILITY MANAGEMENT | March 2023 | March 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18182915 | DETECTING FAKE USER RECOGNITION AUTHENTICATION REQUESTS | March 2023 | May 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18176951 | Systems and Methods for Automated Cloud Provisioning | March 2023 | March 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18175815 | ENFORCING SECURITY POLICIES IN A ZERO TRUST SECURITY FRAMEWORK USING A BEHAVIORAL SCORE | February 2023 | August 2023 | Allow | 6 | 1 | 0 | No | No |
| 18101404 | METHOD FOR CONFIGURING ACTIONS RESPONSIVE TO CONDITIONS OF ASSETS CONNECTED TO A COMPUTER NETWORK | January 2023 | September 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 18157459 | PREVENTING DATA EXFILTRATION TO UNSANCTIONED CLOUD COMPUTING SERVICES (CCS) ACCOUNTS USING CCS APPLICATION PROGRAMMING INTERFACES | January 2023 | July 2023 | Allow | 6 | 1 | 0 | Yes | No |
| 18154149 | DEEP SYMBOLIC VALIDATION OF INFORMATION EXTRACTION SYSTEMS | January 2023 | December 2023 | Allow | 11 | 1 | 0 | No | No |
| 18090839 | FACIAL AUTHENTICATION APPARATUS AND CONTROL METHOD FOR FACIAL AUTHENTICATION APPARATUS | December 2022 | September 2024 | Abandon | 21 | 2 | 0 | Yes | No |
| 18090977 | FACIAL AUTHENTICATION APPARATUS AND CONTROL METHOD FOR FACIAL AUTHENTICATION APPARATUS | December 2022 | September 2024 | Abandon | 21 | 2 | 0 | Yes | No |
| 18069626 | SECURE RESOURCE AUTHORIZATION FOR EXTERNAL IDENTITIES USING REMOTE PRINCIPAL OBJECTS | December 2022 | October 2023 | Allow | 10 | 1 | 0 | No | No |
| 18074763 | Calendar-Based Device Security | December 2022 | May 2024 | Allow | 17 | 3 | 0 | No | Yes |
| 17927930 | Industrial Control System Security Analysis Method and Apparatus | November 2022 | August 2023 | Allow | 8 | 1 | 0 | No | No |
| 17991723 | OPTIMIZED ACCESS CONTROL SYSTEM | November 2022 | July 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 17960471 | SECURE ACCESS VIA REMOTE BROWSER ISOLATION | October 2022 | May 2024 | Allow | 20 | 2 | 0 | No | No |
| 17954697 | CONNECTION REVOCATION IN OVERLAY NETWORKS | September 2022 | May 2023 | Allow | 7 | 1 | 0 | No | No |
| 17953349 | INTRUSION�DETECTION�METHOD�BASED�ON�IMPROVED�IMMUNE�NETWORK�ALGORITHM,�AND�APPLICATION�THEREOF | September 2022 | July 2023 | Allow | 9 | 2 | 0 | No | No |
| 17893244 | Zero Network-Profile Cryptographically Secure Network Port Access | August 2022 | December 2023 | Allow | 16 | 2 | 0 | No | No |
| 17887376 | STEERING LOGIC FOR POLICY ENFORCEMENT ON IoT DEVICES | August 2022 | July 2023 | Allow | 11 | 2 | 0 | Yes | No |
| 17878177 | DETERMINATION OF A SECURITY RATING OF A NETWORK ELEMENT | August 2022 | May 2023 | Allow | 10 | 1 | 0 | No | No |
| 17865370 | Systems and Methods for Mapping Licenses Data From Disparate Databases | July 2022 | June 2023 | Allow | 11 | 2 | 0 | No | No |
| 17830613 | METHOD, PROGRAM, AND APPARATUS FOR IDENTIFYING DEVICE BY USING CHIP UNIQUE VALUE-BASED VIRTUAL CODE | June 2022 | November 2023 | Allow | 18 | 1 | 0 | No | No |
| 17747251 | KERNEL LEVEL APPLICATION DATA PROTECTION | May 2022 | September 2023 | Allow | 16 | 1 | 0 | No | No |
| 17744816 | TRANSACTION FIREWALL METHOD AND SYSTEM | May 2022 | June 2024 | Allow | 25 | 1 | 0 | No | No |
| 17740223 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO SECURE DATA USING CUSTODIAL KEY DATA | May 2022 | November 2022 | Allow | 6 | 1 | 0 | No | No |
| 17740217 | METHOD AND SYSTEM FOR SECURING DATA USING RANDOM BITS AND ENCODED KEY DATA | May 2022 | October 2022 | Allow | 6 | 1 | 0 | No | No |
| 17687969 | DYNAMIC MANAGEMENT OF CONSENT AND PREMISSIONING BETWEEN EXECUTED APPLICATIONS AND PROGRAMMATIC INTERFACES | March 2022 | February 2024 | Allow | 23 | 2 | 0 | Yes | No |
| 17680985 | THREAT MITIGATION SYSTEM AND METHOD | February 2022 | March 2023 | Allow | 12 | 2 | 0 | No | No |
| 17666485 | SECURITY VULNERABILITY ASSESSMENT FOR USERS OF A CLOUD COMPUTING ENVIRONMENT | February 2022 | January 2024 | Allow | 23 | 1 | 0 | Yes | No |
| 17570375 | TRAFFIC SEGMENTATION FOR ENDPOINT-BASED SECURITY | January 2022 | June 2023 | Allow | 17 | 3 | 0 | Yes | No |
| 17570373 | HEADER MODIFICATION FOR ENDPOINT-BASED SECURITY | January 2022 | June 2023 | Allow | 18 | 3 | 0 | Yes | No |
| 17570370 | HEADER REPLAY FOR ENDPOINT-BASED SECURITY | January 2022 | May 2023 | Allow | 16 | 3 | 0 | Yes | No |
| 17570371 | DATA LOSS PREVENTION FOR ENDPOINT-BASED SECURITY | January 2022 | May 2023 | Allow | 16 | 3 | 0 | Yes | No |
| 17550559 | Inhibiting Memory Disclosure Attacks Using Destructive Code Reads | December 2021 | August 2023 | Allow | 20 | 1 | 0 | Yes | No |
| 17535731 | DISTRIBUTED NETWORK RESOURCE SECURITY ACCESS MANAGEMENT SYSTEM AND USER PORTAL | November 2021 | May 2022 | Allow | 6 | 1 | 0 | No | No |
| 17530583 | PRECOMPUTED AND TRANSACTIONAL MIXING | November 2021 | December 2023 | Abandon | 25 | 1 | 0 | No | No |
| 17516657 | PROVIDING SUBSTITUTE DOMAIN INFORMATION IN A VIRTUAL PRIVATE NETWORK | November 2021 | October 2023 | Allow | 24 | 2 | 0 | No | No |
| 17516612 | PROVIDING SUBSTITUTE DOMAIN INFORMATION IN A VIRTUAL PRIVATE NETWORK | November 2021 | September 2022 | Allow | 10 | 2 | 0 | Yes | No |
| 17516652 | PROVIDING SUBSTITUTE DOMAIN INFORMATION IN A VIRTUAL PRIVATE NETWORK | November 2021 | July 2023 | Allow | 20 | 2 | 0 | Yes | No |
| 17510245 | BUILDING SYSTEM WITH SMART ENTITY PERSONAL IDENTIFYING INFORMATION (PII) MASKING | October 2021 | March 2023 | Allow | 16 | 1 | 0 | No | No |
| 17507698 | AUTOMATIC CREATION AND UPDATING OF EVENT GROUP SUMMARIES | October 2021 | November 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17501068 | METHODS AND DEVICES FOR ESTABLISHING SECURE COMMUNICATION CHANNELS | October 2021 | April 2023 | Allow | 18 | 1 | 0 | No | No |
| 17487517 | MACHINE LEARNING MODEL WITH WATERMARKED WEIGHTS | September 2021 | February 2023 | Allow | 17 | 1 | 0 | No | No |
| 17447038 | Methods and Systems to Monitor Groups of Sensory Data for Malicious Behaviors Through Statistical Analysis | September 2021 | May 2024 | Allow | 32 | 1 | 0 | No | No |
| 17444750 | SECURE COMMUNICATION BETWEEN DIFFERENT AGENCIES IN AN INCIDENT AREA | August 2021 | May 2024 | Allow | 33 | 1 | 1 | No | No |
| 17391844 | METHOD, PROGRAM, AND APPARATUS FOR IDENTIFYING DEVICE BY USING CHIP UNIQUE VALUE-BASED VIRTUAL CODE | August 2021 | March 2022 | Allow | 7 | 1 | 0 | No | No |
| 17384237 | METHOD AND SYSTEM FOR SECURING DATA USING RANDOM BITS | July 2021 | February 2022 | Allow | 7 | 1 | 0 | Yes | No |
| 17378633 | ENDPOINT-BASED SECURITY | July 2021 | June 2022 | Allow | 11 | 3 | 0 | Yes | No |
| 17423105 | PROCEDURES ENABLING V2X UNICAST COMMUNICATION OVER PC5 INTERFACE | July 2021 | March 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17370484 | USER LOCATION AUTHENTICATION USING PLACE SIGNATURE | July 2021 | July 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17362142 | Blockchain Management Platform for Performing Asset Adjustment, Cross Sectional Editing, and Bonding | June 2021 | June 2023 | Allow | 23 | 1 | 0 | No | No |
| 17345817 | BUILDING MANAGEMENT SYSTEM WITH SPACE GRAPHS INCLUDING SOFTWARE COMPONENTS | June 2021 | May 2023 | Allow | 23 | 2 | 0 | No | No |
| 17326253 | REDUCING FALSE DETECTION OF ANOMALOUS USER BEHAVIOR ON A COMPUTER NETWORK | May 2021 | April 2022 | Allow | 11 | 2 | 0 | No | No |
| 17324165 | INFORMATION SECURITY SYSTEM AND METHOD FOR MACHINE-TO-MACHINE (M2M) SECURITY AND VALIDATION | May 2021 | February 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17286637 | FACIAL AUTHENTICATION APPARATUS AND CONTROL METHOD FOR FACIAL AUTHENTICATION APPARATUS | April 2021 | September 2024 | Abandon | 41 | 2 | 0 | Yes | No |
| 17226173 | ADAPTIVE MACHINE LEARNING PLATFORM FOR SECURITY PENETRATION AND RISK ASSESSMENT | April 2021 | January 2024 | Allow | 34 | 1 | 0 | No | No |
| 17301136 | CROSS-INTERFACE CORRELATION OF TRAFFIC | March 2021 | June 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17213995 | NETWORK ASSESSMENT SYSTEMS AND METHODS THEREOF | March 2021 | August 2023 | Allow | 29 | 2 | 0 | No | No |
| 17214507 | MULTI-FACTOR GEOFENCING SYSTEM FOR SECURE ENCRYPTION AND DECRYPTION SYSTEM | March 2021 | September 2023 | Allow | 30 | 2 | 0 | Yes | No |
| 17203898 | OPTIMIZED SIMULTANEOUS AUTHENTICATION OF EQUALS (SAE) AUTHENTICATION IN WIRELESS NETWORKS | March 2021 | November 2022 | Allow | 20 | 1 | 0 | No | No |
| 17195697 | OPTIMIZING SECURITY AND EVENT INFORMATION | March 2021 | April 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17182076 | BIOMETRIC AUTHENTICATION TECHNIQUES | February 2021 | August 2023 | Allow | 30 | 2 | 0 | Yes | No |
| 17250691 | DEVICE VALIDATION USING TOKENS | February 2021 | September 2024 | Abandon | 43 | 3 | 0 | Yes | No |
| 17268870 | METHOD, APPARATUS, SYSTEM AND STORAGE MEDIUM FOR ACCESS CONTROL POLICY CONFIGURATION | February 2021 | October 2023 | Allow | 32 | 1 | 0 | No | No |
| 17174749 | METHOD FOR IMPLEMENTING USER PLANE SECURITY POLICY, APPARATUS, AND SYSTEM | February 2021 | March 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17265674 | SYSTEMS AND METHODS FOR USING UNMANNED AERIAL SYSTEMS IN CELLULAR NETWORKS | February 2021 | September 2023 | Allow | 32 | 1 | 0 | No | No |
| 17259769 | COMMUNICATION DEVICE MANAGEMENT DEVICE, SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM | January 2021 | August 2023 | Allow | 31 | 1 | 0 | No | No |
| 17139756 | Transient Transaction Server DNS Strategy | December 2020 | April 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17138473 | LOW LATENCY CLOUD-ASSISTED NETWORK SECURITY WITH LOCAL CACHE | December 2020 | April 2023 | Allow | 28 | 1 | 0 | No | No |
| 17257029 | DETECTION METHOD OF SECURITY EQUIPMENT BASED ON ALG PROTOCOL TO REALIZE TCP STACK INFORMATION LEAK | December 2020 | December 2023 | Abandon | 35 | 1 | 0 | No | No |
| 17109507 | CROSS-SERVICE RULEBOOK MANAGEMENT IN A DYNAMIC AND ADVERSARIAL ENVIRONMENT | December 2020 | July 2023 | Allow | 32 | 2 | 0 | Yes | No |
| 17104984 | Contextual Policy Weighting For Permissions Searching | November 2020 | March 2023 | Allow | 27 | 1 | 0 | No | No |
| 17075717 | SYSTEMS AND METHODS FOR MAPPING LICENSES DATA FROM DISPARATE DATABASES | October 2020 | April 2022 | Allow | 18 | 2 | 0 | Yes | No |
| 17066122 | VIRTUAL NETWORK SYSTEM, VIRTUAL NETWORK CONTROL METHOD, ORCHESTRATION APPARATUS, CONTROL APPARATUS, AND CONTROL METHOD AND CONTROL PROGRAM OF CONTROL APPARATUS | October 2020 | June 2023 | Allow | 32 | 2 | 0 | No | No |
| 17025741 | SECURITY MANAGEMENT ON A MOBILE DEVICE | September 2020 | January 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17021611 | System and Method for Security Health Monitoring And Attestation Of Virtual Machines In Cloud Computing Systems | September 2020 | January 2024 | Allow | 40 | 2 | 0 | No | No |
| 16979255 | METHOD AND APPARATUS FOR VIDEO WATERMARKING, AND STORAGE MEDIUM | September 2020 | November 2023 | Allow | 38 | 1 | 0 | No | No |
| 17001292 | Adaptive Step-Up Authentication for Privileged Interface Invocations | August 2020 | February 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 16996869 | METHOD AND SYSTEM FOR HIGHLY SECURED NETWORK COMMUNICATION USING QUANTUM TECHNOLOGIES | August 2020 | July 2021 | Allow | 11 | 3 | 0 | Yes | No |
| 16968676 | REGISTRATION OF DATA AT A SENSOR READER AND REQUEST OF DATA AT THE SENSOR READER | August 2020 | May 2023 | Allow | 33 | 2 | 0 | Yes | No |
| 16965253 | Apparatus and Method for Internet Access Control of IoT Device | July 2020 | August 2022 | Abandon | 24 | 1 | 0 | No | No |
| 16933345 | Minimizing Production Disruption Through A Scan Rule Engine | July 2020 | April 2023 | Allow | 33 | 2 | 0 | Yes | No |
| 16912209 | DYNAMIC IP ADDRESS WHITELISTING | June 2020 | February 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 16910776 | HOST-BASED NETWORK SOCKET SECURITY CONTROLS AND TELEMETRY | June 2020 | September 2023 | Allow | 38 | 2 | 0 | No | Yes |
| 16905420 | METHOD AND SYSTEM FOR PROVIDING HIGHLY SECURED TRANSPORTABLE DATA | June 2020 | February 2021 | Allow | 8 | 1 | 0 | No | No |
| 16895810 | BUILDING SYSTEM WITH A SPACE GRAPH WITH NEW ENTITY RELATIONSHIP UPDATES | June 2020 | March 2021 | Allow | 9 | 2 | 0 | No | No |
| 16895908 | BUILDING SYSTEM WITH A DYNAMIC SPACE GRAPH WITH TEMPORARY RELATIONSHIPS | June 2020 | January 2021 | Allow | 7 | 1 | 0 | Yes | No |
| 16895886 | BUILDING SYSTEM WITH DYNAMIC BUILDING CONTROL BASED ON A DYNAMIC SPACE GRAPH | June 2020 | January 2021 | Allow | 7 | 1 | 0 | No | No |
| 16895918 | BUILDING SYSTEM WITH A SPACE GRAPH WITH INDIRECT IMPACT RELATIONSHIPS | June 2020 | January 2021 | Allow | 7 | 1 | 0 | No | No |
| 16895814 | BUILDING SYSTEM WITH A SPACE GRAPH WITH ENTITY RELATIONSHIPS AND INGESTED DATA | June 2020 | February 2021 | Allow | 8 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner BROWN, ANTHONY D.
With a 25.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 36.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner BROWN, ANTHONY D works in Art Unit 2433 and has examined 663 patent applications in our dataset. With an allowance rate of 82.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 27 months.
Examiner BROWN, ANTHONY D's allowance rate of 82.7% places them in the 49% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by BROWN, ANTHONY D receive 2.01 office actions before reaching final disposition. This places the examiner in the 66% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by BROWN, ANTHONY D is 27 months. This places the examiner in the 56% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +17.3% benefit to allowance rate for applications examined by BROWN, ANTHONY D. This interview benefit is in the 63% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 28.9% of applications are subsequently allowed. This success rate is in the 44% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 46.5% of cases where such amendments are filed. This entry rate is in the 65% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 73.2% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 58% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 75.0% of appeals filed. This is in the 60% percentile among all examiners. Of these withdrawals, 50.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 36.4% are granted (fully or in part). This grant rate is in the 32% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.9% of allowed cases (in the 67% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.