Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18768558 | DATA TOKENIZATION AND SEARCH IN A DISTRIBUTED NETWORK | July 2024 | July 2025 | Allow | 12 | 1 | 0 | No | No |
| 18663340 | AUTOMATIC INLINE DETECTION BASED ON STATIC DATA | May 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18609291 | DEOBFUSCATING AND DECLOAKING WEB-BASED MALWARE WITH ABSTRACT EXECUTION | March 2024 | June 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18599969 | Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying Validity | March 2024 | November 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18525710 | SYSTEM EVENT DETECTION SYSTEM AND METHOD | November 2023 | April 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18372888 | AUTHENTICATION AS A SERVICE | September 2023 | October 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18370073 | Rule-Based Network-Threat Detection For Encrypted Communications | September 2023 | November 2023 | Allow | 1 | 0 | 0 | Yes | No |
| 18244280 | SECURE DISTRIBUTION OF DIGITAL ASSETS WITHIN A COMPUTING ENVIRONMENT USING PERMISSIONED DISTRIBUTED LEDGERS | September 2023 | October 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18226775 | USE OF STATELESS MARKING TO SPEED UP STATEFUL FIREWALL RULE PROCESSING | July 2023 | March 2025 | Allow | 20 | 2 | 0 | Yes | No |
| 18353115 | Malicious C&C channel to fixed IP detection | July 2023 | September 2024 | Allow | 14 | 1 | 1 | Yes | No |
| 18198388 | Intelligent Hybrid Cloud Orchestration Engine leveraging 3 Layered Secured Data Gateway | May 2023 | June 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18318230 | METHOD AND SYSTEM FOR ESTABLISHING TRUST FOR A CYBERSECURITY POSTURE OF A V2X ENTITY | May 2023 | August 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 18192469 | DATA PROCESSING PERMITS SYSTEM WITH KEYS | March 2023 | November 2024 | Allow | 20 | 2 | 0 | Yes | No |
| 18122958 | SYSTEM AND METHOD FOR SECURE AND PERFORMANT ECU PAIRING | March 2023 | June 2025 | Allow | 27 | 1 | 0 | No | No |
| 18177434 | DETECTING PHISHING ATTACKS | March 2023 | January 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18109362 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | August 2024 | Allow | 18 | 2 | 0 | Yes | No |
| 18109312 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | July 2024 | Allow | 17 | 2 | 0 | Yes | No |
| 18109366 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | April 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18109314 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | April 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18109356 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | July 2024 | Allow | 17 | 2 | 0 | Yes | No |
| 18109048 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | April 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18109014 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | June 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 18109001 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | March 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18108721 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | February 2023 | September 2024 | Allow | 19 | 2 | 0 | Yes | No |
| 18107237 | CAN BUS PROTECTION SYSTEMS AND METHODS | February 2023 | February 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18099202 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR IMPROVING INTER-PUBLIC LAND MOBILE NETWORK (PLMN) ROUTING ACROSS SECURITY EDGE PROTECTION PROXIES (SEPPs) BY IMPLEMENTING HEALTH CHECKS FOR REMOTE SEPPs | January 2023 | May 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18013074 | Cryptographic Computation Techniques for Multi-Party Reach and Frequency | December 2022 | April 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18009201 | METHOD, SYSTEM AND APPARATUS FOR UNIFIED PLUG-IN MICRO-SERVICE ACCESS CONTROL | December 2022 | March 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18056977 | Extended Security Scheme for Reducing the Prevalence of Broken Object Level Authorization | November 2022 | March 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18056909 | VERIFICATION AND/OR VALIDATION OF UNREVERSIBLE INFORMATION HANDLING SYSTEM COMMANDS | November 2022 | April 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18055291 | SANITIZING PERSONALLY IDENTIFIABLE INFORMATION (PII) IN AUDIO AND VISUAL DATA | November 2022 | April 2025 | Allow | 29 | 2 | 0 | Yes | No |
| 18049654 | Stacked Malware Detector For Mobile Platforms | October 2022 | April 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17920978 | SYSTEM AND METHOD FOR PATTERN-BASED DETECTION AND MITIGATION OF ZERO-DAY VULNERABILITY EXPLOITATION | October 2022 | February 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17960546 | Hybrid Approach To Data Governance | October 2022 | May 2024 | Allow | 19 | 2 | 0 | Yes | No |
| 17951690 | THREAT MITIGATION SYSTEM AND METHOD | September 2022 | November 2023 | Allow | 13 | 1 | 0 | Yes | No |
| 17909295 | CLUSTER ACCESS METHOD, ELECTRONIC DEVICE AND MEDIUM | September 2022 | March 2025 | Abandon | 31 | 1 | 0 | No | No |
| 17901164 | SYSTEM AND METHOD FOR DECRYPTING ENCRYPTED SECRET DATA ITEMS WITHOUT MASTER PASSWORD | September 2022 | February 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17901575 | VAULTLESS TOKENIZATION | September 2022 | December 2024 | Allow | 27 | 1 | 0 | No | No |
| 17896553 | Method and Apparatus for Security Management based on I2NSF Analytics Interface YANG Data Model | August 2022 | March 2025 | Allow | 39 | 2 | 0 | Yes | No |
| 17890826 | SYSTEM AND RELATED METHODS FOR EFFICIENTLY PROVIDING RESOURCES AND TECHNOLOGY TO REMOTELY WORKING EMPLOYEES | August 2022 | February 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17818970 | METHODS AND SYSTEMS FOR DETECTING MALICIOUS MESSAGES | August 2022 | June 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 17878592 | IOT Blockchain DDOS Detection and Countermeasures | August 2022 | June 2025 | Allow | 35 | 2 | 1 | No | No |
| 17814908 | MONITORING FOR LATERAL MOVEMENTS-RELATED SECURITY THREATS | July 2022 | July 2023 | Allow | 12 | 1 | 0 | Yes | No |
| 17791248 | DATA PRIVACY PROTECTION BASED POLAR CODING | July 2022 | December 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17858322 | SYSTEMS AND METHODS FOR DYNAMIC TRAFFIC CONTROL AT A FIREWALL | July 2022 | February 2025 | Allow | 31 | 2 | 0 | No | No |
| 17745417 | SECURITY PROFILE SELECTION AND CONFIGURATION OF NETWORK DEVICES VIA OWNERSHIP VOUCHER EXTENSION | May 2022 | September 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17737316 | RULE SELECTION MANAGEMENT BASED ON CURRENTLY AVAILABLE DOMAIN NAME SYSTEM (DNS) SERVERS | May 2022 | August 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17723957 | DATA TREATMENT APPARATUS AND METHODS | April 2022 | May 2025 | Allow | 37 | 1 | 0 | Yes | No |
| 17767138 | EVALUATION APPARATUS, EVALUATION METHOD, AND PROGRAM | April 2022 | November 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17695177 | SYSTEM AND METHOD FOR SECURE TRANSFER OF COMPLETELY ENCRYPTED DATA AT WIRE SPEEDS | March 2022 | February 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17685880 | AUTHENTICATION AS A SERVICE | March 2022 | May 2023 | Allow | 15 | 1 | 0 | Yes | No |
| 17684143 | MANAGING TRAFFIC RULES IN ASSOCIATION WITH FULLY QUALIFIED DOMAIN NAMES (FQDNS) USING POSTURE INFORMATION ASSOCIATED WITH DNS RECORDS | March 2022 | October 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17638728 | SECURED HD MAP SERVICES USING BLOCKCHAIN | February 2022 | May 2025 | Abandon | 38 | 2 | 0 | Yes | No |
| 17650333 | ZERO TRUST BASED ACCESS MANAGEMENT OF INFRASTRUCTURE WITHIN ENTERPRISE USING MICRO-SEGMENTATION AND DECENTRALIZED IDENTIFIER NETWORK | February 2022 | September 2024 | Allow | 31 | 1 | 0 | No | No |
| 17579383 | SANITIZING PERSONALLY IDENTIFIABLE INFORMATION (PII) IN AUDIO AND VISUAL DATA | January 2022 | November 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17625282 | CUSTODIAL INTEGRITY FOR VIRTUAL DIGITAL ASSETS AND RELATED TECHNOLOGIES | January 2022 | October 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17546944 | SYSTEM AND METHOD FOR NETWORK SECURITY | December 2021 | October 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17545831 | AUTOMATIC VERIFICATION OF DECENTRAILIZED PROTOCOLS | December 2021 | June 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17545594 | SYSTEMS AND METHODS OF NETWORK SECURITY ANOMALY DETECTION | December 2021 | July 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17545303 | METHOD AND APPARATUS FOR COUNTERING DDOS ATTACKS IN NDN NETWORK | December 2021 | February 2025 | Abandon | 38 | 2 | 0 | No | No |
| 17541998 | CUSTOM RULES FOR GLOBAL CERTIFICATE ISSUANCE | December 2021 | May 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17613406 | KNOWLEDGE PROOF | November 2021 | September 2024 | Allow | 34 | 2 | 0 | No | No |
| 17500308 | DEOBFUSCATING AND DECLOAKING WEB-BASED MALWARE WITH ABSTRACT EXECUTION | October 2021 | January 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17602112 | SYSTEMS AND METHODS FOR HANDLING TELESCOPIC FQDNS | October 2021 | February 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17492591 | DATA TOKENIZATION AND SEARCH IN A DISTRIBUTED NETWORK | October 2021 | June 2024 | Allow | 33 | 2 | 0 | No | No |
| 17489117 | DETECTING VISUAL SIMILARITY BETWEEN DNS FULLY QUALIFIED DOMAIN NAMES | September 2021 | March 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17489168 | CONTAINER-BASED ASSOCIATION AND SHARING OF DOMAIN NAME SYSTEM CONFIGURATION OBJECTS | September 2021 | May 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17482894 | Rule-Based Network-Threat Detection For Encrypted Communications | September 2021 | July 2023 | Allow | 22 | 3 | 0 | Yes | No |
| 17482921 | Rule-Based Network Threat Detection for Encrypted Communications | September 2021 | June 2023 | Allow | 20 | 3 | 0 | Yes | No |
| 17482910 | Rule-Based Network-Threat Detection for Encrypted Communications | September 2021 | August 2022 | Allow | 11 | 2 | 0 | Yes | No |
| 17471414 | Rule Detection Method and Related Device | September 2021 | October 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17461551 | SYSTEMS AND METHODS FOR USE OF ADDRESS FIELDS IN A SIMULATED PHISHING ATTACK | August 2021 | March 2023 | Allow | 18 | 3 | 0 | Yes | No |
| 17443316 | TREE-BASED LEARNING OF APPLICATION PROGRAMMING INTERFACE SPECIFICATION | July 2021 | January 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17383784 | Rule-Based Network-Threat Detection For Encrypted Communications | July 2021 | June 2023 | Allow | 23 | 3 | 0 | Yes | No |
| 17383702 | Rule-Based Network-Threat Detection For Encrypted Communications | July 2021 | May 2023 | Allow | 22 | 3 | 0 | Yes | No |
| 17424987 | SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATION | July 2021 | July 2024 | Allow | 36 | 2 | 0 | Yes | No |
| 17375869 | GENERATING NETWORK INFASTRUCTURE FIREWALLS | July 2021 | July 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17355371 | Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying Validity | June 2021 | January 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17354103 | GENERATIVE CRYPTOGRAM FOR BLOCKCHAIN DATA MANAGMENT | June 2021 | January 2024 | Allow | 31 | 1 | 0 | No | No |
| 17350890 | Protocol Switching For Connections To Zero-Trust Proxy | June 2021 | May 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17341976 | DETECTING POTENTIAL MALICIOUS USE OF A RESOURCE MANAGEMENT AGENT USING A RESOURCE MANAGEMENT LOG | June 2021 | January 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17339780 | DATA PROCESSING PERMITS SYSTEM WITH KEYS | June 2021 | August 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17339782 | DATA PROCESSING PERMITS SYSTEM WITH KEYS | June 2021 | April 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17333433 | CONFIGURING A SYSTEM FOR SELECTIVELY OBFUSCATING DATA TRANSMITTED BETWEEN SERVERS AND END-USER DEVICES | May 2021 | October 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17321423 | USE OF STATELESS MARKING TO SPEED UP STATEFUL FIREWALL RULE PROCESSING | May 2021 | April 2023 | Allow | 23 | 1 | 0 | Yes | No |
| 17307304 | DOCUMENT MANAGEMENT APPARATUS, DOCUMENT MANAGEMENT SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | May 2021 | July 2024 | Abandon | 39 | 1 | 0 | No | No |
| 17243874 | SECURE REMOTE SUPPORT AUTHORIZATION | April 2021 | August 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17238774 | INTELLIGENT MONITORING AND LOGGING PLATFORM | April 2021 | February 2024 | Allow | 34 | 2 | 0 | No | No |
| 17287768 | Technique for collecting information relating to a flow routed in a network | April 2021 | January 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17215809 | SYSTEM AND METHOD FOR DETECTION OF ABNORMAL DEVICE TRAFFIC BEHAVIOR | March 2021 | November 2024 | Allow | 43 | 3 | 0 | Yes | No |
| 17276725 | CONFIDENTIAL METHOD FOR PROCESSING LOGS OF A COMPUTER SYSTEM | March 2021 | August 2024 | Allow | 41 | 2 | 0 | Yes | No |
| 17275921 | Message Processing | March 2021 | July 2024 | Allow | 40 | 3 | 0 | No | No |
| 17193757 | FACILITATION OF NETWORK PROTECTION FOR 5G OR OTHER NEXT GENERATION NETWORK | March 2021 | October 2023 | Abandon | 32 | 2 | 0 | Yes | No |
| 17191350 | Automatic Inline Detection based on Static Data | March 2021 | February 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17191467 | PROTECTING SENSITIVE DATA FROM BEING EXPOSED IN GRAPH EMBEDDING VECTORS | March 2021 | December 2023 | Allow | 34 | 1 | 0 | No | No |
| 17178669 | PRIVACY PRESERVATION IN NETWORK CONNECTIONS | February 2021 | May 2023 | Abandon | 26 | 1 | 0 | No | No |
| 17175872 | DETECTING BOTNETS | February 2021 | July 2023 | Allow | 29 | 2 | 0 | Yes | No |
| 17162906 | DETECTING FRAUD BY CORRELATING USER BEHAVIOR BIOMETRICS WITH OTHER DATA SOURCES | January 2021 | June 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17160164 | AI/ML APPROACH FOR DDOS PREVENTION ON 5G CBRS NETWORKS | January 2021 | March 2024 | Allow | 38 | 4 | 0 | Yes | No |
| 17125818 | SYSTEM AND METHOD FOR ANALYTICS BASED WAF SERVICE CONFIGURATION | December 2020 | January 2024 | Allow | 37 | 3 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LEE, MICHAEL M.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 55.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LEE, MICHAEL M works in Art Unit 2436 and has examined 217 patent applications in our dataset. With an allowance rate of 83.9%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 33 months.
Examiner LEE, MICHAEL M's allowance rate of 83.9% places them in the 53% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by LEE, MICHAEL M receive 2.43 office actions before reaching final disposition. This places the examiner in the 83% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by LEE, MICHAEL M is 33 months. This places the examiner in the 27% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +56.9% benefit to allowance rate for applications examined by LEE, MICHAEL M. This interview benefit is in the 96% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 33.0% of applications are subsequently allowed. This success rate is in the 64% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 18.5% of cases where such amendments are filed. This entry rate is in the 14% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 57.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 46% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 88% percentile among all examiners. Of these withdrawals, 66.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 31.6% are granted (fully or in part). This grant rate is in the 24% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 2.2% of allowed cases (in the 66% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.