Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18946352 | ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENT | November 2024 | March 2025 | Allow | 4 | 0 | 0 | No | No |
| 18807438 | System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js Applications | August 2024 | November 2024 | Allow | 3 | 1 | 0 | No | No |
| 18436862 | AGENTLESS RUNTIME CYBERSECURITY ANALYSIS | February 2024 | June 2024 | Allow | 4 | 1 | 0 | No | No |
| 18430355 | Container Image Deduplication for Vulnerability Detection and Management in IT Systems | February 2024 | August 2024 | Allow | 6 | 0 | 0 | No | No |
| 18426038 | HIERARCHICAL RISK SCORING FOR SAAS APPLICATIONS | January 2024 | August 2024 | Allow | 7 | 1 | 0 | No | No |
| 18414325 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | January 2024 | April 2024 | Allow | 3 | 1 | 0 | No | No |
| 18528247 | Counting Machine for Manufacturing and Validating Event-Relevant Identities via an Ensemble Network | December 2023 | August 2024 | Allow | 9 | 2 | 0 | Yes | No |
| 18520394 | INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL, AND STORAGE MEDIUM | November 2023 | April 2025 | Allow | 16 | 3 | 0 | Yes | No |
| 18368572 | MACHINE LEARNING DEVICE, MACHINE LEARNING SYSTEM, AND MACHINE LEARNING METHOD | September 2023 | February 2024 | Allow | 5 | 1 | 0 | No | No |
| 18241550 | Timeline Building System | September 2023 | November 2024 | Allow | 15 | 3 | 0 | Yes | No |
| 18456427 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | August 2023 | November 2023 | Allow | 3 | 1 | 0 | No | No |
| 18547421 | ENCRYPTED SCALAR MULTIPLICATION | August 2023 | July 2024 | Allow | 11 | 1 | 1 | Yes | No |
| 18361144 | SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONS | July 2023 | June 2025 | Allow | 23 | 1 | 0 | No | No |
| 18351538 | SECURE MULTI-ENDPOINT CIPHER NEGOTIATION | July 2023 | May 2025 | Allow | 22 | 0 | 0 | No | No |
| 18340510 | SYSTEMS AND METHODS FOR A DATA-DRIVEN WORKFLOW PLATFORM | June 2023 | August 2024 | Allow | 14 | 2 | 0 | Yes | No |
| 18339690 | APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION | June 2023 | May 2025 | Allow | 23 | 1 | 0 | No | No |
| 18318882 | DYNAMIC NETWORK RISK PREDICTING METHOD BASED ON A GRAPH NEURAL NETWORK | May 2023 | December 2023 | Allow | 7 | 1 | 0 | No | No |
| 18318945 | INTERACTIVE WEB APPLICATION SCANNING | May 2023 | May 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18317512 | DEFENSE METHOD OF DEEP LEARNING MODEL AIMING AT ADVERSARIAL ATTACKS | May 2023 | August 2023 | Allow | 3 | 0 | 0 | No | No |
| 18143420 | SECURE ELECTRONIC CIRCUITRY WITH TAMPER DETECTION | May 2023 | February 2025 | Allow | 21 | 1 | 0 | Yes | No |
| 18250809 | FULLY HOMOMORPHIC CRYPTOGRAPHY WITH IMPROVED DATA ITEM REPRESENTATION | April 2023 | January 2024 | Allow | 9 | 1 | 0 | No | No |
| 18303545 | SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONS | April 2023 | July 2023 | Allow | 3 | 0 | 0 | No | No |
| 18122101 | GRAPHICAL QUERY BUILDER FOR CLOUD DATA ATTACK DETECTION | March 2023 | July 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18181972 | Data Processing Method Based on Secure Multi-Party Computation, Electronic Device, and Storage Medium | March 2023 | September 2023 | Allow | 6 | 1 | 0 | No | No |
| 18114682 | Copy-and-Recurse Operations for Fully Homomorphic Encrypted Database Query Processing | February 2023 | June 2025 | Allow | 28 | 1 | 0 | No | No |
| 18172998 | METHOD AND SYSTEM FOR CONFIDENTIAL REPOSITORY SEARCHING AND RETRIEVAL | February 2023 | August 2023 | Allow | 5 | 1 | 0 | Yes | No |
| 18111096 | SYSTEM AND METHOD FOR SECURING DATA FILES | February 2023 | January 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18167490 | Private Information Retrieval with Sublinear Public-Key Operations | February 2023 | July 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18089646 | CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATION | December 2022 | August 2024 | Allow | 19 | 1 | 0 | No | No |
| 18145790 | MALICIOUS ENTERPRISE BEHAVIOR DETECTION TOOL | December 2022 | October 2024 | Allow | 22 | 2 | 0 | Yes | No |
| 18068470 | SECURE COMMUNICATION SESSION RESUMPTION IN A SERVICE FUNCTION CHAIN | December 2022 | March 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 18080294 | THIRD PARTY BIOMETRIC HOMOMORPHIC ENCRYPTION MATCHING FOR PRIVACY PROTECTION | December 2022 | October 2023 | Allow | 10 | 2 | 0 | No | No |
| 18080416 | METHOD FOR TRAINING MODEL BASED ON HOMOMORPHIC ENCRYPTION, DEVICE, AND STORAGE MEDIUM | December 2022 | October 2023 | Abandon | 10 | 1 | 0 | No | No |
| 18075091 | METHODS AND SYSTEMS FOR EVALUATING EFFECTS OF CYBER ATTACKS ON CYBER-PHYSICAL SYSTEMS | December 2022 | January 2025 | Allow | 26 | 2 | 0 | Yes | No |
| 18074260 | ADVERSARIAL ATTACK PREVENTION AND MALWARE DETECTION SYSTEM | December 2022 | February 2025 | Abandon | 27 | 2 | 0 | Yes | No |
| 18052747 | Method and System for Detecting Two-Factor Authentication | November 2022 | March 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18050398 | APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION | October 2022 | May 2023 | Allow | 7 | 1 | 0 | No | No |
| 17967570 | APPARATUS AND METHODS FOR VERIFYING LOST USER DATA | October 2022 | August 2024 | Allow | 22 | 1 | 0 | No | No |
| 17963886 | APPARATUS AND METHOD FOR PROVIDING CYBER SECURITY DEFENSE IN DIGITAL ENVIRONMENTS | October 2022 | September 2023 | Allow | 11 | 4 | 0 | Yes | No |
| 17937026 | ENHANCED ENCRYPTION FOR FACE-RELATED DATA | September 2022 | March 2024 | Allow | 17 | 1 | 0 | No | No |
| 17956001 | BIOMETRIC DATA SECURITY SYSTEM AND METHOD | September 2022 | December 2023 | Allow | 14 | 1 | 0 | No | No |
| 17936770 | LOGGING FROM USER-DEFINED FUNCTIONS | September 2022 | March 2024 | Allow | 17 | 1 | 0 | No | No |
| 17952550 | Product Traceability Processing | September 2022 | July 2024 | Allow | 21 | 1 | 1 | Yes | No |
| 17932405 | TRAINING METHOD AND APPARATUS FOR A DISTRIBUTED MACHINE LEARNING MODEL AND MEDIUM | September 2022 | June 2023 | Allow | 9 | 1 | 0 | No | No |
| 17939489 | CLOUD DATA ATTACK DETECTION QUERY BUILDER | September 2022 | November 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17929676 | INTELLIGENT VULNERABILITY LIFECYCLE MANAGEMENT SYSTEM | September 2022 | May 2024 | Allow | 20 | 1 | 0 | No | No |
| 17887027 | TWO-DIMENSIONALITY DETECTION METHOD FOR INDUSTRIAL CONTROL SYSTEM ATTACKS | August 2022 | March 2023 | Allow | 7 | 1 | 0 | No | No |
| 17885330 | SOFTWARE VULNERABILITY DETECTION IN MANAGED NETWORKS | August 2022 | April 2024 | Allow | 20 | 2 | 0 | Yes | No |
| 17882929 | SYSTEM AND METHOD FOR SENDING AND/OR RECEIVING ENTROPY AND ENTROPY EXPANSION | August 2022 | October 2024 | Allow | 26 | 1 | 1 | Yes | No |
| 17872447 | SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTION | July 2022 | July 2024 | Abandon | 23 | 1 | 0 | No | No |
| 17868894 | SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTION | July 2022 | July 2024 | Abandon | 23 | 1 | 0 | No | No |
| 17862504 | System, Method, and Computer Program Product for Maintaining User Privacy in Advertisement Networks | July 2022 | October 2023 | Allow | 16 | 1 | 0 | No | No |
| 17810666 | SYSTEM AND METHOD FOR FACILITATING DISTRIBUTED PEER TO PEER STORAGE OF DATA | July 2022 | January 2023 | Allow | 6 | 0 | 0 | No | No |
| 17840848 | CLUSTER SECURITY BASED ON VIRTUAL MACHINE CONTENT | June 2022 | April 2025 | Allow | 34 | 3 | 0 | Yes | No |
| 17785235 | SIMULATION DEVICE AND METHOD FOR HOMOMORPHIC CRYPTOSYSTEM | June 2022 | July 2023 | Allow | 13 | 0 | 0 | Yes | No |
| 17738666 | LARGE-WORD APPROXIMATE HOMOMORPHIC ENCRYPTION | May 2022 | September 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17735087 | DATA STRUCTURE FOR TRUST STORE | May 2022 | July 2023 | Allow | 14 | 1 | 0 | No | No |
| 17735101 | SYSTEMS AND METHODS FOR IMPLEMENTING CYBERSECURITY USING BLOCKCHAIN VALIDATION | May 2022 | November 2023 | Allow | 19 | 1 | 0 | No | No |
| 17716424 | ENHANCED ENCRYPTION FOR FACE-RELATED DATA | April 2022 | June 2022 | Allow | 3 | 0 | 0 | No | No |
| 17715075 | Adaptive Cyber-Attack Emulation | April 2022 | October 2022 | Allow | 6 | 2 | 0 | Yes | No |
| 17709673 | Entity Behavior Catalog Architecture | March 2022 | June 2023 | Allow | 14 | 1 | 0 | No | No |
| 17695049 | APPARATUS AND METHODS FOR VERIFYING LOST USER DATA | March 2022 | June 2022 | Allow | 3 | 0 | 0 | No | No |
| 17691474 | SECURING SOFTWARE PACKAGE COMPOSITION INFORMATION | March 2022 | March 2024 | Allow | 25 | 1 | 0 | Yes | No |
| 17688878 | SYSTEMS AND METHODS FOR IMPLEMENTING CYBERSECURITY USING TRUST BINARIES | March 2022 | April 2025 | Allow | 38 | 3 | 0 | Yes | No |
| 17684363 | SYSTEMS AND METHODS FOR GENERATING TRUST BINARIES | March 2022 | August 2022 | Allow | 5 | 1 | 0 | Yes | No |
| 17668294 | COMPREHENSIVE RISK ASSESSMENT | February 2022 | April 2025 | Allow | 38 | 4 | 0 | Yes | No |
| 17582139 | SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED PERMISSIONING USING SECURITY NODE HASH IDENTIFIERS | January 2022 | July 2023 | Allow | 17 | 1 | 0 | No | No |
| 17582492 | Location Aware Authorization System | January 2022 | August 2023 | Allow | 18 | 1 | 0 | Yes | No |
| 17578022 | Web Attack Simulator | January 2022 | September 2024 | Allow | 32 | 1 | 0 | No | No |
| 17555462 | SYSTEMS AND METHODS FOR ADJUSTING DATA PROTECTION LEVELS BASED ON SYSTEM METADATA | December 2021 | October 2023 | Allow | 22 | 0 | 0 | No | No |
| 17644503 | GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS | December 2021 | December 2023 | Allow | 24 | 2 | 0 | Yes | No |
| 17551759 | SYSTEM FOR STATIC ANALYSIS OF BINARY EXECUTABLE CODE AND SOURCE CODE USING FUZZY LOGIC AND METHOD THEREOF | December 2021 | December 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17551763 | SYSTEM AND PROCESS USING HOMOMORPHIC ENCRYPTION TO SECURE NEURAL NETWORK PARAMETERS FOR A MOTOR VEHICLE | December 2021 | October 2024 | Abandon | 34 | 2 | 0 | Yes | No |
| 17549705 | SECURE RESOLUTION OF EMAIL-BASED QUERIES INVOLVING CONFIDENTIAL THIRD-PARTY DATA | December 2021 | July 2024 | Allow | 31 | 1 | 1 | Yes | No |
| 17539136 | DETECTING SECURITY VULNERABILITIES IN QUERIES VIA AN INFORMATION FLOW GRAPH | November 2021 | October 2023 | Allow | 22 | 0 | 0 | No | No |
| 17614451 | Device and Method for Certifying Reliability of Public Key, and Program for Same | November 2021 | April 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17533374 | Partial Cryptographic Key Transport Using One-Time Pad Encryption | November 2021 | September 2023 | Allow | 22 | 1 | 0 | No | No |
| 17454789 | DYNAMIC CERTIFICATE GENERATION ON A CERTIFICATE AUTHORITY CLOUD | November 2021 | March 2023 | Allow | 16 | 1 | 0 | No | No |
| 17511219 | QUANTIFIED SOCIAL MEDIA PRIVACY | October 2021 | April 2025 | Allow | 42 | 3 | 1 | Yes | No |
| 17452195 | ARTIFICIAL INTELLIGENCE (AI) BASED PRIVACY AMPLIFICATION | October 2021 | November 2023 | Allow | 24 | 1 | 0 | No | No |
| 17605836 | METHODS AND SYSTEMS FOR PRIVACY PRESERVING EVALUATION OF MACHINE LEARNING MODELS | October 2021 | September 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17506114 | TRANSMITTING ENCODED DATA ALONG TRANSMISSION MEDIUMS BASED ON COLORSPACE SCHEMES | October 2021 | July 2023 | Allow | 21 | 1 | 0 | Yes | No |
| 17496806 | INFORMATION TECHNOLOGY SECURITY ASSESSMENT MODEL FOR PROCESS FLOWS AND ASSOCIATED AUTOMATED REMEDIATION | October 2021 | June 2023 | Allow | 20 | 1 | 0 | Yes | No |
| 17493316 | SYSTEM AND METHOD FOR VULNERABILITY DETECTION IN COMPUTER CODE | October 2021 | December 2023 | Allow | 26 | 1 | 0 | No | No |
| 17491234 | DETECTING SECOND-ORDER SECURITY VULNERABILITIES VIA MODELLING INFORMATION FLOW THROUGH PERSISTENT STORAGE | September 2021 | April 2023 | Allow | 19 | 1 | 0 | No | No |
| 17477222 | SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTION | September 2021 | April 2022 | Allow | 7 | 1 | 0 | Yes | No |
| 17459415 | SYSTEM AND METHOD FOR ANOMALOUS DATABASE ACCESS MONITORING | August 2021 | March 2024 | Allow | 30 | 1 | 0 | No | No |
| 17460004 | Automated Application Vulnerability And Risk Assessment | August 2021 | December 2023 | Allow | 28 | 1 | 0 | No | No |
| 17445363 | CREDENTIAL-BASED DATA ACCESS AND SYNTHESIS | August 2021 | April 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17402544 | Automatic identification of flaws in software systems | August 2021 | August 2024 | Allow | 36 | 3 | 0 | Yes | No |
| 17385589 | METHODS AND APPARATUS TO DETECT SIDE-CHANNEL ATTACKS | July 2021 | December 2023 | Allow | 29 | 2 | 0 | Yes | No |
| 17384052 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | July 2021 | November 2024 | Abandon | 39 | 2 | 0 | Yes | No |
| 17382886 | METHOD AND SYSTEM TO PLACE RESOURCES IN A KNOWN STATE TO BE USED IN A COMPOSED INFORMATION HANDLING SYSTEM | July 2021 | January 2024 | Allow | 30 | 1 | 0 | No | No |
| 17382390 | Detecting exploitable paths in application software that uses third-party libraries | July 2021 | September 2023 | Allow | 26 | 1 | 0 | No | No |
| 17371977 | THREAT IDENTIFICATION-BASED COLLECTION OF FORENSIC DATA FROM ENDPOINT DEVICES | July 2021 | April 2023 | Allow | 21 | 1 | 0 | No | No |
| 17364458 | METHODS AND SYSTEMS FOR PROCESSING CONTENT RIGHTS | June 2021 | March 2025 | Allow | 44 | 4 | 0 | Yes | No |
| 17361375 | METHOD AND SYSTEM FOR ENABLING PRIVACY IN AN APPLICATION USING FULLY HOMOMORPHIC ENCRYPTION | June 2021 | March 2023 | Allow | 20 | 0 | 0 | No | No |
| 17305018 | METHOD AND APPARATUS FOR SYSTEM PROTECTION MAINTENANCE ANALYSIS | June 2021 | April 2023 | Allow | 21 | 1 | 0 | No | No |
| 17305005 | METHOD AND APPARATUS FOR SYSTEM INFORMATION PROTECTION PROCESSES AND PROCEDURES ANALYSIS | June 2021 | April 2023 | Allow | 21 | 1 | 0 | Yes | No |
| 17358765 | SYSTEMS AND METHODS FOR DYNAMIC DETECTION OF VULNERABLE CREDENTIALS | June 2021 | March 2024 | Allow | 33 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LI, MENG.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 33.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner LI, MENG works in Art Unit 2437 and has examined 516 patent applications in our dataset. With an allowance rate of 91.5%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 25 months.
Examiner LI, MENG's allowance rate of 91.5% places them in the 75% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by LI, MENG receive 1.67 office actions before reaching final disposition. This places the examiner in the 47% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by LI, MENG is 25 months. This places the examiner in the 66% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +14.0% benefit to allowance rate for applications examined by LI, MENG. This interview benefit is in the 56% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 35.5% of applications are subsequently allowed. This success rate is in the 75% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 27.7% of cases where such amendments are filed. This entry rate is in the 31% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 142.9% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 87% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 75.0% of appeals filed. This is in the 60% percentile among all examiners. Of these withdrawals, 77.8% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 22.0% are granted (fully or in part). This grant rate is in the 12% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.4% of allowed cases (in the 48% percentile). This examiner issues Quayle actions less often than average. Allowances may come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.