Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 17135003 | Digitally Signing Documents Using Digital Signatures | December 2020 | August 2022 | Allow | 20 | 1 | 0 | Yes | No |
| 17120952 | CRYPTOGRAPHIC PROCESSING METHOD, ASSOCIATED ELECTRONIC DEVICE AND COMPUTER PROGRAM | December 2020 | October 2024 | Abandon | 46 | 4 | 0 | Yes | No |
| 17117265 | ENHANCED BEACON PROTECTION REKEYING AND ATTACK DETECTION FOR WIRELESS COMMUNICATIONS | December 2020 | June 2024 | Abandon | 42 | 2 | 0 | No | No |
| 17114308 | DETECTING AND PREVENTING CIPHER KEY DISCLOSURE | December 2020 | August 2022 | Allow | 20 | 1 | 0 | Yes | No |
| 16953151 | FIRMWARE RUNTIME PATCH SECURE RELEASE PROCESS | November 2020 | July 2024 | Abandon | 44 | 4 | 1 | Yes | No |
| 16951993 | DETECTING AND PREVENTING UNAUTHORIZED COMMAND INJECTION | November 2020 | March 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17054597 | BIOS ACCESS | November 2020 | June 2023 | Allow | 31 | 2 | 1 | Yes | No |
| 17081594 | METHOD AND APPARATUS FOR DETECTING VULNERABILITY OF MULTI-LANGUAGE PROGRAM | October 2020 | February 2024 | Abandon | 40 | 4 | 0 | No | No |
| 17048339 | VULNERABILITY STATE REPORT | October 2020 | November 2022 | Abandon | 25 | 2 | 0 | Yes | No |
| 16980974 | APPARATUS, SYSTEM AND METHOD FOR ASSOCIATING A DEVICE TO A USER OF A SERVICE | September 2020 | September 2023 | Allow | 36 | 4 | 0 | Yes | No |
| 17008896 | SYSTEMS AND METHODS FOR AUTOMATED ATTACK PLANNING, ANALYSIS, AND EVALUATION | September 2020 | July 2023 | Abandon | 35 | 2 | 0 | No | No |
| 17005685 | METHOD AND APPARATUS FOR DETECTING AND REMEDIATING SECURITY VULNERABILITIES IN COMPUTER READABLE CODE | August 2020 | May 2023 | Abandon | 33 | 2 | 0 | Yes | No |
| 16937952 | BLIND KEY GENERATOR AND EXCHANGE | July 2020 | April 2023 | Abandon | 33 | 1 | 0 | No | No |
| 16936981 | METHOD AND SYSTEM FOR DOS DETECTION, MITIGATION AND NOTIFICATION | July 2020 | March 2022 | Allow | 19 | 0 | 0 | Yes | No |
| 16928969 | GLOBAL NAVIGATION SATELLITE SYSTEM INTERFERENCE ATTACK DETECTION | July 2020 | July 2023 | Allow | 36 | 3 | 0 | Yes | No |
| 16923437 | SECURITY INFRASTRUCTURE AS A SERVICE | July 2020 | May 2022 | Abandon | 22 | 1 | 0 | No | No |
| 16917494 | VULNERABILITY INFERENCE FOR IDENTIFYING VULNERABLE PROCESSES | June 2020 | May 2023 | Allow | 35 | 3 | 0 | No | No |
| 16957598 | Security Mechanism for Interworking with Independent SEAF in 5G Networks | June 2020 | August 2023 | Allow | 38 | 2 | 0 | No | No |
| 16955542 | DATA PRODUCT RELEASE METHOD OR SYSTEM | June 2020 | June 2024 | Allow | 48 | 4 | 0 | Yes | No |
| 16902071 | DYNAMICALLY ENCRYPTED RADIO FREQUENCY FINGERPRINTING | June 2020 | July 2024 | Allow | 49 | 3 | 0 | Yes | No |
| 16887602 | POWER SIDE-CHANNEL ATTACK VULNERABILITY ASSESSMENT SYSTEMS AND METHODS | May 2020 | March 2023 | Abandon | 34 | 2 | 0 | Yes | No |
| 16880819 | POLICY BASED ACCESS CONTROL OF SUBSYSTEM ASSETS VIA EXTERNAL DEBUG INTERFACE | May 2020 | September 2022 | Abandon | 28 | 1 | 0 | No | No |
| 16763936 | VEHICLE ENTERPRISE FLEET MANAGEMENT SYSTEM AND METHOD | May 2020 | December 2023 | Abandon | 43 | 2 | 0 | No | No |
| 16870895 | SYSTEMS AND METHODS FOR IDENTIFYING SOFTWARE VULNERABILITIES IN EMBEDDED DEVICE FIRMWARE | May 2020 | February 2023 | Abandon | 34 | 2 | 0 | Yes | No |
| 16865959 | REDUCING AUTHENTICATION STEPS DURING WI-FI AND 5G HANDOVER | May 2020 | February 2023 | Allow | 34 | 2 | 0 | Yes | No |
| 16754846 | REGULATING ACCESS | April 2020 | November 2022 | Abandon | 31 | 2 | 0 | Yes | No |
| 16828908 | TEST SCENARIO GENERATION DEVICE, TEST SCENARIO GENERATION METHOD AND TEST SCENARIO GENERATION PROGRAM | March 2020 | December 2022 | Abandon | 33 | 1 | 0 | No | No |
| 16801173 | GENETIC FUZZING FOR CUSTOMIZATION OF SECURITY OPERATIONS CENTER RULES PER ORGANIZATION | February 2020 | March 2023 | Allow | 37 | 2 | 0 | Yes | No |
| 16794730 | Secure Ranging | February 2020 | August 2023 | Allow | 41 | 2 | 0 | Yes | No |
| 16745334 | SHARING ENCRYPTED ITEMS WITH PARTICIPANTS VERIFICATION | January 2020 | April 2022 | Allow | 27 | 3 | 0 | Yes | No |
| 16727983 | ELECTRONIC CIRCUITS FOR SECURE COMMUNICATIONS AND ASSOCIATED SYSTEMS AND METHODS | December 2019 | November 2021 | Abandon | 22 | 1 | 0 | No | No |
| 16724281 | ANALYTICS INTERFACE WITH PRIVACY MANAGEMENT | December 2019 | April 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16596467 | SYSTEM AND METHOD FOR IDENTITY VERIFICATION ACROSS MOBILE APPLICATIONS | October 2019 | October 2021 | Allow | 24 | 0 | 0 | Yes | No |
| 16572995 | SECURE CONFIRMATION EXCHANGE FOR OFFLINE INDUSTRIAL MACHINE | September 2019 | October 2021 | Allow | 25 | 0 | 0 | Yes | No |
| 16555035 | Securing Data In A Dispersed Storage Network | August 2019 | June 2021 | Allow | 22 | 0 | 0 | Yes | No |
| 16452317 | Indication Of Additional Security Capabilities Using NAS Signaling In 5G Mobile Communications | June 2019 | June 2022 | Allow | 36 | 1 | 0 | Yes | No |
| 16287308 | IDENTITY PRIVACY IN WIRELESS NETWORKS | February 2019 | September 2022 | Allow | 42 | 2 | 0 | Yes | No |
| 16260315 | INTRA-CARRIER AND INTER-CARRIER NETWORK SECURITY SYSTEM | January 2019 | September 2019 | Allow | 7 | 0 | 0 | Yes | No |
| 15991274 | DYNAMIC BYPASS OF TLS CONNECTIONS MATCHING EXCLUSION LIST IN DPI-SSL IN A NAT DEPLOYMENT | May 2018 | April 2021 | Abandon | 35 | 2 | 0 | Yes | Yes |
| 15970711 | INFORMATION PROCESSING APPARATUS, STORAGE MEDIUM, AND CONTROL METHOD THEREFOR | May 2018 | April 2022 | Abandon | 48 | 4 | 0 | No | No |
| 15968335 | SYSTEMS AND METHODS FOR USER SPECIFIC DATA TRANSMISSION WITH IMPROVED DATA PROTECTION | May 2018 | December 2021 | Abandon | 43 | 3 | 0 | Yes | No |
| 15965486 | Anti-Attack Data Transmission Method and Device | April 2018 | November 2021 | Allow | 43 | 4 | 0 | Yes | No |
| 15944456 | LOCATION-BASED SECURITY OF STORAGE DRIVES | April 2018 | February 2023 | Abandon | 59 | 4 | 0 | No | No |
| 15944022 | AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM | April 2018 | June 2022 | Abandon | 50 | 1 | 0 | No | No |
| 15943217 | ANNOUNCEMENT SMART CONTRACTS TO ANNOUNCE SOFTWARE RELEASE | April 2018 | May 2022 | Abandon | 49 | 1 | 0 | No | No |
| 15943571 | DATA PROTECTION METHOD | April 2018 | March 2022 | Abandon | 48 | 1 | 0 | Yes | No |
| 15942129 | MALWARE DETECTION IN APPLICATIONS BASED ON PRESENCE OF COMPUTER GENERATED STRINGS | March 2018 | March 2023 | Abandon | 60 | 3 | 0 | No | No |
| 15941992 | TECHNIQUES TO PROVIDE HARDWARE ENFORCED PROTECTION ENVIRONMENT FOR A SYSTEM MANAGEMENT MODE | March 2018 | May 2023 | Allow | 60 | 4 | 0 | Yes | No |
| 15942096 | DISPLAY OF PROTECTED CONTENT USING TRUSTED EXECUTION ENVIRONMENT | March 2018 | August 2022 | Allow | 52 | 2 | 0 | Yes | No |
| 15941219 | USER VERIFICATION OF MALWARE IMPACTED FILES | March 2018 | December 2021 | Allow | 45 | 3 | 0 | No | No |
| 15940797 | EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC) PROFILE CONTENT MANAGEMENT | March 2018 | August 2022 | Allow | 52 | 2 | 1 | No | No |
| 15938015 | SYSTEMS, METHODS, AND APPARATUS FOR DETECTING CONTROL FLOW ATTACKS | March 2018 | December 2020 | Allow | 33 | 0 | 0 | Yes | No |
| 15938857 | APPARATUS, SYSTEM, AND METHOD FOR EFFICIENTLY FILTERING PACKETS AT NETWORK DEVICES | March 2018 | March 2022 | Allow | 48 | 3 | 0 | Yes | No |
| 15937226 | Information Processing Device that Processes Information Using Private Key and Public Key | March 2018 | November 2021 | Allow | 44 | 2 | 0 | Yes | No |
| 15933548 | APPARATUS AND METHOD FOR GENERATING KEY, AND APPARATUS AND METHOD FOR ENCRYPTION | March 2018 | December 2023 | Abandon | 60 | 5 | 1 | Yes | No |
| 15934489 | TRUSTED CYBER PHYSICAL SYSTEM | March 2018 | February 2022 | Allow | 46 | 2 | 1 | Yes | No |
| 15928265 | IAAS-AIDED ACCESS CONTROL FOR INFORMATION CENTRIC NETWORKING WITH INTERNET-OF-THINGS | March 2018 | February 2021 | Allow | 35 | 1 | 0 | Yes | No |
| 15926800 | METHOD AND APPARATUS FOR SIGNING AND VERIFYING APPLICATION INSTALLATION PACKAGE, AND STORAGE MEDIUM | March 2018 | August 2022 | Abandon | 53 | 4 | 0 | Yes | No |
| 15925144 | INFORMATION REGISTRATION AND AUTHENTICATION METHOD AND DEVICE | March 2018 | August 2021 | Allow | 41 | 3 | 0 | Yes | No |
| 15913035 | CONFIDENCE LEVELS IN REPUTABLE ENTITIES | March 2018 | January 2021 | Abandon | 34 | 2 | 0 | No | No |
| 15903801 | IDENTITY AUTHENTICATION USING BIOMETRICS | February 2018 | January 2022 | Allow | 47 | 2 | 0 | Yes | No |
| 15870004 | SYSTEM AND METHOD FOR DETECTING AND PREVENTING NETWORK INTRUSION OF MALICIOUS DATA FLOWS | January 2018 | March 2022 | Allow | 50 | 3 | 0 | No | No |
| 15853556 | SECURE TIME SERVICE | December 2017 | December 2021 | Allow | 48 | 3 | 0 | Yes | No |
| 15852327 | DATA PROCESSING MEANS AND METHOD FOR OPERATING THE SAME | December 2017 | June 2021 | Allow | 42 | 2 | 0 | Yes | No |
| 15850788 | DEVICE DISPLAY SECURITY WITH USER-SPECIFIED FILTERING OF DISPLAY CONTENTS | December 2017 | April 2020 | Allow | 27 | 4 | 0 | Yes | No |
| 15847409 | BLIND KEY GENERATOR AND EXCHANGE | December 2017 | January 2021 | Abandon | 37 | 1 | 0 | No | No |
| 15783244 | METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATION IN A SELF-ORGANIZING NETWORK | October 2017 | May 2021 | Allow | 43 | 2 | 0 | Yes | No |
| 15701229 | CRYPTOGRAPHIC KEY EXCHANGE OVER AN ELECTROSTATIC CHANNEL | September 2017 | March 2018 | Allow | 6 | 0 | 0 | Yes | No |
| 15676533 | SYSTEMS AND METHODS FOR SECURE COLLABORATION WITH PRECISION ACCESS MANAGEMENT | August 2017 | March 2020 | Abandon | 32 | 1 | 0 | No | No |
| 15674411 | DATA INTERWORKING METHOD AND DATA INTERWORKING DEVICE | August 2017 | May 2022 | Abandon | 57 | 4 | 0 | Yes | No |
| 15670585 | ELECTRONIC DEVICE | August 2017 | August 2022 | Abandon | 60 | 4 | 0 | Yes | No |
| 15525260 | AUTHENTICATION METHOD, AUTHENTICATION SYSTEM AND AUTHENTICATION DEVICES FOR AUTHENTICATING AN OBJECT | July 2017 | July 2019 | Abandon | 26 | 1 | 0 | No | No |
| 15542561 | Subscriber Identification Module and Application Executable on a Subscriber Identification Module | July 2017 | January 2025 | Abandon | 60 | 8 | 0 | Yes | Yes |
| 15540311 | METHOD AND APPARATUS PROVIDING SECURITY USING GRAPHIC ELEMENTS | June 2017 | September 2019 | Abandon | 27 | 2 | 0 | No | No |
| 15587694 | Social Campaign Network and Method for Dynamic Content Delivery In Same | May 2017 | January 2021 | Abandon | 44 | 2 | 0 | No | No |
| 15477063 | Systems and Methods for Uploading Streamed Objects to a Cloud Storage System | April 2017 | September 2022 | Allow | 60 | 5 | 0 | Yes | No |
| 15454451 | METHOD AND SYSTEM FOR SECURITY AND AUTHENTICATION OF AIRCRAFT DATA TRANSMISSIONS | March 2017 | March 2021 | Allow | 48 | 3 | 0 | Yes | No |
| 15438251 | APPLICATION SECURITY PROTECTION METHOD, TERMINAL, AND STORAGE MEDIUM | February 2017 | May 2021 | Allow | 51 | 4 | 0 | Yes | No |
| 15426525 | DEVICE DISPLAY SECURITY WITH USER-SPECIFIED FILTERING OF DISPLAY CONTENTS | February 2017 | March 2020 | Allow | 38 | 4 | 0 | Yes | No |
| 15407181 | Digitally Signing Documents Using Digital Signatures | January 2017 | August 2020 | Allow | 43 | 2 | 0 | Yes | No |
| 15403639 | METHOD AND APPARATUS FOR CONTROLLING A DEVICE USING BLUETOOTH TECHNOLOGY | January 2017 | March 2020 | Allow | 38 | 2 | 0 | No | No |
| 15382806 | Efficient Packet Capture for Cyber Threat Analysis | December 2016 | March 2023 | Allow | 60 | 8 | 0 | Yes | No |
| 15362938 | High Latency Channel and Low Latency Channel | November 2016 | November 2019 | Allow | 35 | 2 | 0 | Yes | Yes |
| 15335562 | DETECTING AN ATTEMPTED THEFT OF INFORMATION STORED IN AN RFID-ENABLED CARD | October 2016 | May 2020 | Allow | 43 | 5 | 0 | Yes | No |
| 15286505 | METHOD OF USING ONE DEVICE TO UNLOCK ANOTHER DEVICE | October 2016 | December 2021 | Allow | 60 | 4 | 0 | Yes | No |
| 15285313 | Techniques for Detecting Encryption | October 2016 | January 2020 | Allow | 40 | 2 | 1 | Yes | No |
| 15254088 | HYBRID HYPERVISOR-ASSISTED SECURITY MODEL | September 2016 | December 2019 | Allow | 39 | 3 | 0 | Yes | No |
| 15225280 | METHOD AND SYSTEM TO MANAGE ACCESS TO A WIRELESS LOCAL AREA NETWORK | August 2016 | February 2021 | Allow | 55 | 4 | 0 | Yes | No |
| 15223962 | ENCRYPTION OF APPLICATION DATA USING FIELD-LEVEL METADATA | July 2016 | February 2022 | Allow | 60 | 5 | 0 | Yes | No |
| 15200682 | Mutable Fields in Digital Certificates | July 2016 | August 2019 | Allow | 37 | 1 | 0 | Yes | No |
| 15201180 | SENSITIVE DATA SERVICE STORAGE | July 2016 | March 2022 | Abandon | 60 | 6 | 0 | Yes | No |
| 15192360 | METHODS AND APPARATUS FOR DETECTING SUSPICIOUS NETWORK ACTIVITY | June 2016 | May 2019 | Allow | 35 | 2 | 0 | Yes | Yes |
| 15185380 | Data Anonymization for Distributed Hierarchical Networks | June 2016 | May 2020 | Allow | 47 | 2 | 0 | Yes | No |
| 15177070 | METHOD AND APPARATUS FOR DETECTING UNAUTHORIZED USE OF A MOBILE DEVICE | June 2016 | January 2021 | Abandon | 55 | 4 | 0 | Yes | No |
| 15171099 | SYSTEM, METHOD, AND RECORDING MEDIUM FOR MOVING TARGET DEFENSE | June 2016 | July 2020 | Allow | 49 | 5 | 0 | Yes | No |
| 15144080 | SECURELY STORING DATA IN A DISPERSED STORAGE NETWORK | May 2016 | July 2019 | Allow | 39 | 3 | 0 | Yes | Yes |
| 15095177 | Identifying security breaches from clustering properties | April 2016 | June 2020 | Abandon | 50 | 4 | 0 | Yes | No |
| 15016447 | ELECTRONIC DEVICE AND DATA TRANSMISSION METHOD THEREOF | February 2016 | November 2020 | Abandon | 58 | 3 | 1 | No | No |
| 15015901 | NETWORK CAPABLE OF DETECTING DoS ATTACKS AND METHOD OF CONTROLLING THE SAME, GATEWAY AND MANAGING SERVER INCLUDED IN THE NETWORK | February 2016 | September 2019 | Abandon | 60 | 2 | 0 | No | No |
| 15015441 | ELECTRONIC CIRCUITS FOR SECURE COMMUNICATIONS AND ASSOCIATED SYSTEMS AND METHODS | February 2016 | November 2019 | Allow | 45 | 3 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner CAREY, FORREST L.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 16.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner CAREY, FORREST L works in Art Unit 2491 and has examined 217 patent applications in our dataset. With an allowance rate of 52.1%, this examiner allows applications at a lower rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 43 months.
Examiner CAREY, FORREST L's allowance rate of 52.1% places them in the 15% percentile among all USPTO examiners. This examiner is less likely to allow applications than most examiners at the USPTO.
On average, applications examined by CAREY, FORREST L receive 3.12 office actions before reaching final disposition. This places the examiner in the 86% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by CAREY, FORREST L is 43 months. This places the examiner in the 17% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.
Conducting an examiner interview provides a +55.1% benefit to allowance rate for applications examined by CAREY, FORREST L. This interview benefit is in the 94% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 19.3% of applications are subsequently allowed. This success rate is in the 22% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.
This examiner enters after-final amendments leading to allowance in 8.2% of cases where such amendments are filed. This entry rate is in the 9% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 60.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 51% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 63.2% of appeals filed. This is in the 42% percentile among all examiners. Of these withdrawals, 41.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 77.8% are granted (fully or in part). This grant rate is in the 82% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.