Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18795033 | COMPUTER INVESTIGATION METHOD AND SYSTEM | August 2024 | December 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18779858 | WATERMARKING DIGITAL MEDIA FOR AUTHENTICATED CONTENT VERIFICATION | July 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18756295 | SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION | June 2024 | December 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18754090 | MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATION | June 2024 | April 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18646225 | CONTENT PERMISSION PLATFORM | April 2024 | June 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18621269 | ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHOD | March 2024 | October 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18591842 | Message Authenticated Communication Sessions | February 2024 | January 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18585186 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | January 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18411018 | PRE-AUTHORIZATION ACCESS REQUEST SCREENING | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18407496 | SCAN ENGINE EXTENSION FOR CUSTOMIZING APPLICATION SECURITY TESTING BEHAVIOR | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18488232 | SYSTEMS AND METHODS FOR RISK ASSESSMENT OF USER ACCESSES TO DATA RESOURCES | October 2023 | June 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18374962 | SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION | September 2023 | May 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18457087 | METHODS AND SYSTEMS FOR ONBOARDING NETWORK EQUIPMENT | August 2023 | May 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18228982 | MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON MOVEMENT OF A SECURITY THREAT | August 2023 | May 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18215992 | Generative Artificial Intelligence for a Network Security Scanner | June 2023 | June 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18343716 | DYNAMIC CYBERATTACK MISSION PLANNING AND ANALYSIS | June 2023 | June 2025 | Allow | 24 | 0 | 0 | No | No |
| 18342101 | HIERARCHICAL NOVELTY DETECTION USING INTENDED STATES FOR NETWORK SECURITY | June 2023 | December 2024 | Abandon | 18 | 1 | 0 | No | No |
| 18212859 | Using Machine Learning for Collision Detection to Prevent Unauthorized Access | June 2023 | January 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18332303 | CUMULATIVE SUM MODEL FOR IP DENY LISTS | June 2023 | February 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18206018 | SYSTEMS AND METHODS FOR TRUSTED CHAIN CODE SYSTEM | June 2023 | February 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18195680 | Message Authenticated Communication Sessions | May 2023 | February 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18308786 | ADDRESS GENERATION METHOD, BLOCKCHAIN INFORMATION PROCESSING METHOD, AND RELATED DEVICE | April 2023 | April 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18296008 | DATA PLANE FRAMEWORK FOR REDIRECTING DATA PACKETS | April 2023 | April 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18194791 | ONTOLOGY-BASED RISK PROPAGATION OVER DIGITAL TWINS | April 2023 | January 2025 | Allow | 22 | 0 | 0 | No | No |
| 18123075 | SUSPICIOUS COMMUNICATION DETECTION APPARATUS, SUSPICIOUS COMMUNICATION DETECTION METHOD, AND SUSPICIOUS COMMUNICATION DETECTION PROGRAM | March 2023 | February 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18117770 | EVENT EVALUATION PIPELINE FOR ALERT ENGINE | March 2023 | November 2024 | Allow | 21 | 1 | 0 | No | No |
| 18112149 | DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATICALLY DETECTING AND DOCUMENTING PRIVACY-RELATED ASPECTS OF COMPUTER SOFTWARE | February 2023 | September 2024 | Allow | 19 | 1 | 0 | Yes | No |
| 18104153 | AUGMENTED INTELLIGENT MACHINE FOR SYSTEMATIC ATTRIBUTION OF DATA SECURITY | January 2023 | November 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18158105 | Automatic Vulnerability Mitigation in Cloud Environments | January 2023 | January 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18099117 | TOKENIZED STRUCTURED EXCHANGE TRACKING | January 2023 | October 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18098147 | DATA EXCHANGE WITH RESOURCE CONSTRAINED TECHNOLOGY IN SURGICAL ENVIRONMENT | January 2023 | November 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 18149541 | SYSTEMS AND METHODS FOR DEVICE AUTHENTICATION USING AUTHENTICATION TOKENS DERIVED FROM QUANTUM PARTICLES | January 2023 | October 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18075140 | Subscription and Key Management System | December 2022 | September 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17986661 | PRIORITIZING ASSETS USING SECURITY METRICS | November 2022 | October 2024 | Allow | 23 | 2 | 0 | Yes | No |
| 18054362 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR GENERATION AND USE OF MOBILE LEGAL IDENTIFICATION DATA OBJECTS | November 2022 | August 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18051167 | FABRIC-BASED ROOT-OF-TRUST | October 2022 | January 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 17971958 | CLOUD MANAGEMENT OF CONNECTIVITY FOR EDGE NETWORKING DEVICES | October 2022 | September 2023 | Allow | 11 | 0 | 0 | Yes | No |
| 17966805 | SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION | October 2022 | August 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17937622 | NETWORK SECURITY MANAGEMENT FOR A BUILDING AUTOMATION SYSTEM | October 2022 | August 2023 | Allow | 11 | 0 | 0 | Yes | No |
| 17956928 | MIXED NOISE MECHANISM FOR DATA ANONYMIZATION | September 2022 | March 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17952245 | Distributed one-time-use entry code generation for physical access control method of operation and mobile systems | September 2022 | April 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17952241 | Distributed one-time-use entry code generation for physical access control method of operation and mobile systems | September 2022 | April 2025 | Abandon | 30 | 1 | 0 | No | No |
| 17952243 | Distributed one-time-use entry code generation for physical access control method of operation and mobile systems | September 2022 | April 2025 | Allow | 31 | 1 | 0 | No | No |
| 17952073 | SECURE TAMPER RESISTANT DATA PROCESSING, STORAGE, AND TRANSMISSION GATEWAY AND CONTROLLER AND DATA ANOMALY DETECTION PROGRAM | September 2022 | July 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17949796 | REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSIS | September 2022 | April 2024 | Allow | 18 | 1 | 0 | No | No |
| 17943637 | Securely Rehydrating Containerized Agents | September 2022 | August 2024 | Allow | 23 | 0 | 0 | No | No |
| 17931606 | MODEM PROCESSOR FIREWALL OPERATIONS | September 2022 | December 2024 | Abandon | 27 | 1 | 0 | No | No |
| 17288236 | USER AUTHENTICATION SYSTEM, USER AUTHENTICATION SERVER, AND USER AUTHENTICATION METHOD | September 2022 | July 2024 | Allow | 38 | 0 | 0 | Yes | No |
| 17939385 | METHOD AND APPARATUS FOR CRYPTOGRAPHICALLY ALIGNING AND BINDING A SECURE ELEMENT WITH A HOST DEVICE | September 2022 | January 2024 | Allow | 16 | 1 | 0 | No | No |
| 17893124 | DYNAMIC IDENTITY ATTRIBUTION | August 2022 | June 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17891179 | DECENTRALIZED EDGE NODE AUTHENTICATION | August 2022 | September 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17815727 | ACTIVE FINGERPRINTING FOR TRANSPORT LAYER SECURITY (TLS) SERVERS | July 2022 | April 2024 | Allow | 20 | 1 | 0 | No | No |
| 17814484 | REMOTE HARDWARE ACCESS SERVICE | July 2022 | August 2023 | Allow | 13 | 1 | 0 | No | No |
| 17783240 | CUSTOMIZED ANOMALY DETECTION | June 2022 | October 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17831131 | COMPUTER-BASED SYSTEM FOR ANALYZING AND QUANTIFYING CYBER THREAT PATTERNS AND METHODS OF USE THEREOF | June 2022 | April 2023 | Allow | 11 | 0 | 0 | Yes | No |
| 17745476 | SYSTEMS AND METHODS FOR GRAPHICAL VISUALIZATION OF WEB APPLICATION VULNERABILITIES | May 2022 | February 2024 | Allow | 21 | 2 | 0 | Yes | No |
| 17662591 | MULTIPLE APPLICATION AUTHENTICATION | May 2022 | April 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17739364 | DATA PROCESSING SYSTEMS FOR ASSESSING READINESS FOR RESPONDING TO PRIVACY-RELATED INCIDENTS | May 2022 | May 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17755692 | PUBLIC KEY ENCRYPTION USING SELF POWERED TIMERS | May 2022 | October 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17709815 | PRESERVING CONFIDENTIALITY OF TENANTS IN CLOUD ENVIRONMENT WHEN DEPLOYING SECURITY SERVICES | March 2022 | February 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17710523 | IDENTIFYING AUTOMATED RESPONSES TO SECURITY THREATS BASED ON COMMUNICATION INTERACTIONS CONTENT | March 2022 | August 2023 | Allow | 17 | 1 | 0 | Yes | No |
| 17707629 | COMBINED SHA2 AND SHA3 BASED XMSS HARDWARE ACCELERATOR | March 2022 | October 2023 | Allow | 19 | 1 | 0 | Yes | No |
| 17762341 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR STORING CERTIFIED DATA ON A BLOCKCHAIN | March 2022 | April 2025 | Allow | 37 | 1 | 0 | No | No |
| 17675330 | AUTOMATED PRIORITIZATION OF PROCESS-AWARE CYBER RISK MITIGATION | February 2022 | January 2025 | Allow | 35 | 2 | 0 | No | No |
| 17592890 | SYSTEMS AND METHODS FOR MANAGING FIREWALL RULES AND CONNECTIONS BETWEEN DIFFERENT SERVICES | February 2022 | April 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17643475 | VIDEO IMAGES FOR PLATOONING | December 2021 | April 2024 | Abandon | 28 | 1 | 0 | No | No |
| 17456896 | GENERATING A SPEEDING TICKET USING A PERSISTENTLY STORED CHARACTER CODE IN A CAMERA FOR MASKING INFORMATION ABOUT CHARACTERS OF A NUMBER PLATE OF A VEHICLE | November 2021 | December 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17524741 | ENCRYPTION USING RECURSIVE KEY | November 2021 | April 2025 | Abandon | 41 | 1 | 0 | No | No |
| 17511876 | COMMUNICATION PROTOCOL FOR NON-INTERNET-ENABLED DEVICES | October 2021 | March 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17502375 | Storage Node Security Statement Management in a Distributed Storage Cluster | October 2021 | October 2023 | Allow | 24 | 0 | 0 | No | No |
| 17492973 | SYSTEMS AND METHODS TO AUTHENTICATE A NON-FIFTH GENERATION CAPABLE DEVICE ON A RESIDENTIAL GATEWAY | October 2021 | October 2023 | Allow | 24 | 0 | 0 | No | No |
| 17493060 | MULTITENANT SHARING ANOMALY CYBERATTACK CAMPAIGN DETECTION | October 2021 | October 2023 | Allow | 24 | 0 | 0 | Yes | No |
| 17493494 | DETECTING NETWORK ENTITIES THAT POSE A CYBERSECURITY RISK TO A PRIVATE COMPUTER NETWORK | October 2021 | February 2024 | Allow | 29 | 1 | 0 | No | No |
| 17493681 | POLICY-GOVERNED CRYPTOGRAPHIC SELECTION SYSTEM | October 2021 | December 2024 | Abandon | 39 | 1 | 0 | No | No |
| 17469490 | ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHOD | September 2021 | December 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17466657 | IDENTITY SYSTEMS, METHODS, AND MEDIA FOR AUDITING AND NOTIFYING USERS CONCERNING VERIFIABLE CLAIMS | September 2021 | December 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17460860 | METHODS, SYSTEMS, AND MEDIA FOR RECOVERING IDENTITY INFORMATION IN VERIFIABLE CLAIMS-BASED SYSTEMS | August 2021 | June 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17401450 | Message Authenticated Communication Sessions | August 2021 | February 2023 | Allow | 18 | 0 | 0 | Yes | No |
| 17397140 | DATA ENCRYPTION AND DECRYPTION | August 2021 | April 2022 | Allow | 8 | 1 | 0 | Yes | No |
| 17444341 | UTILIZING MODELS TO INTEGRATE DATA FROM MULTIPLE SECURITY SYSTEMS AND IDENTIFY A SECURITY RISK SCORE FOR AN ASSET | August 2021 | October 2023 | Allow | 26 | 0 | 0 | No | No |
| 17443633 | CYBERSECURITY THREAT MODELING AND ANALYSIS WITH TEXT MINER AND DATA FLOW DIAGRAM EDITOR | July 2021 | November 2022 | Allow | 15 | 0 | 0 | No | No |
| 17386378 | Domain Security Assurance Automation | July 2021 | June 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17380857 | EVENT EVALUATION PIPELINE FOR ALERT ENGINE | July 2021 | September 2022 | Allow | 14 | 0 | 0 | Yes | No |
| 17380941 | NETWORK ASSET RISK ANALYSIS | July 2021 | June 2023 | Abandon | 23 | 1 | 0 | No | No |
| 17376487 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING SYSTEM | July 2021 | May 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17371394 | Application identity-based enforcement of datagram protocols | July 2021 | February 2023 | Allow | 19 | 2 | 0 | No | No |
| 17365171 | MAN-IN-THE-MIDDLE INTERCEPTOR FOR APPLICATION SECURITY TESTING | July 2021 | October 2023 | Allow | 27 | 0 | 0 | No | No |
| 17305072 | SYSTEMS AND METHODS FOR USER-BASED AUTHENTICATION | June 2021 | April 2024 | Allow | 33 | 2 | 0 | No | No |
| 17304941 | Non-invasive virus scanning using remote access | June 2021 | November 2023 | Allow | 28 | 3 | 0 | Yes | No |
| 17358486 | EXECUTING ENTERPRISE PROCESS ABSTRACTION USING PROCESS AWARE ANALYTICAL ATTACK GRAPHS | June 2021 | October 2022 | Allow | 15 | 0 | 0 | Yes | No |
| 17309769 | PACKET ANALYSIS AND FILTERING | June 2021 | August 2023 | Allow | 26 | 0 | 0 | Yes | No |
| 17349962 | SYSTEMS AND METHODS FOR DATA TRANSFER AND STORAGE | June 2021 | December 2023 | Allow | 30 | 0 | 0 | Yes | No |
| 17346826 | WIDEBAND FEATURELESS RATELESS CHAOTIC WAVEFORM GENERATION METHOD | June 2021 | December 2022 | Allow | 18 | 0 | 0 | Yes | No |
| 17303776 | CUMULATIVE SUM MODEL FOR IP DENY LISTS | June 2021 | April 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17338345 | VIRTUAL RELAY DEVICE FOR PROVIDING A SECURE CONNECTION TO A REMOTE DEVICE | June 2021 | April 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17327555 | BINDING DATA TO A NETWORK IN THE PRESENCE OF AN ENTITY | May 2021 | April 2024 | Allow | 34 | 3 | 0 | Yes | No |
| 17323731 | DYNAMIC NETWORK SECURITY MONITORING SYSTEM | May 2021 | November 2022 | Allow | 18 | 1 | 0 | No | No |
| 17323651 | TEMPORAL-BASED ANOMALY DETECTION FOR NETWORK SECURITY | May 2021 | July 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17294682 | FLEXIBLE CREDENTIAL SUPPORTED SOFTWARE SERVICE PROVISIONING | May 2021 | July 2024 | Allow | 38 | 2 | 0 | Yes | No |
| 17319523 | SYSTEMS AND METHODS FOR TRUSTED CHAIN CODE SYSTEM | May 2021 | February 2023 | Allow | 22 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HAILU, TESHOME.
With a 40.6% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 39.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner HAILU, TESHOME works in Art Unit 2434 and has examined 821 patent applications in our dataset. With an allowance rate of 83.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.
Examiner HAILU, TESHOME's allowance rate of 83.4% places them in the 51% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by HAILU, TESHOME receive 1.69 office actions before reaching final disposition. This places the examiner in the 48% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by HAILU, TESHOME is 28 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +22.5% benefit to allowance rate for applications examined by HAILU, TESHOME. This interview benefit is in the 72% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 31.5% of applications are subsequently allowed. This success rate is in the 57% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 20.7% of cases where such amendments are filed. This entry rate is in the 18% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 44.4% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 38% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 62.8% of appeals filed. This is in the 36% percentile among all examiners. Of these withdrawals, 37.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 48.1% are granted (fully or in part). This grant rate is in the 56% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.
Examiner's Amendments: This examiner makes examiner's amendments in 1.3% of allowed cases (in the 72% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.