USPTO Examiner NOAMAN BASSAM A - Art Unit 2497

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19034297SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONJanuary 2025March 2025Allow100YesNo
18806633METHOD FOR DATA PROCESSING, READABLE MEDIUM AND ELECTRONIC DEVICEAugust 2024January 2025Allow610NoNo
18750590SYSTEMS AND METHODS FOR GENERATING ATTESTED DATAJune 2024November 2024Allow510YesNo
18655171SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONMay 2024December 2024Allow720YesNo
18440668SYSTEMS AND METHODS TO ENCRYPT CENTRALIZED INFORMATION ASSOCIATED WITH USERS OF A CUSTOMER DUE DILIGENCE PLATFORM BASED ON A MODIFIED KEY EXPANSION SCHEDULEFebruary 2024July 2025Allow1700YesNo
18540943MULTI-PARTY PRIVACY COMPUTING METHOD AND DEVICE BASED ON SEMI-TRUSTED HARDWAREDecember 2023April 2024Allow400YesNo
18534683SYSTEMS AND METHODS FOR VEHICLE ENCRYPTED COMMUNICATION FOR VEHICLE-ROAD-CLOUD COLLABORATIONDecember 2023April 2024Allow410YesNo
18529879INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM FOR PROCESSING REGISTRATION REQUESTSDecember 2023June 2025Allow1900YesNo
18557286DATA COMMUNICATION METHOD, APPARATUS, AND SYSTEMOctober 2023July 2024Allow910YesNo
18382427COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR OBTAINING DIGITALLY SIGNED DATAOctober 2023November 2024Allow1300NoNo
18485932AUTOMATION OF USER IDENTITY USING NETWORK PROTOCOL PROVIDING SECURE GRANTING OR REVOCATION OF SECURED ACCESS RIGHTSOctober 2023June 2025Allow2010NoNo
18448815CLOUD-BASED CREATION OF A CUSTOMER-SPECIFIC SYMMETRIC KEY ACTIVATION DATABASEAugust 2023April 2025Allow2020NoNo
18275372THRESHOLD KEY EXCHANGEAugust 2023June 2025Allow2200NoNo
18362452SYSTEMS AND METHODS TO ENCRYPT CENTRALIZED INFORMATION ASSOCIATED WITH USERS OF A CUSTOMER DUE DILIGENCE PLATFORM BASED ON A MODIFIED KEY EXPANSION SCHEDULEJuly 2023November 2023Allow410NoNo
18352914HARDENED KEY DERIVATION IN MULTI-PARTY COMPUTATIONJuly 2023March 2025Allow2020YesNo
18337757VALIDATING PARAMETERS ON DISCRETE COMPUTING APPLICATIONS TO GRANT ACCESS CONTROL TO CONTENT OR COMMANDSJune 2023August 2024Allow1410YesNo
18208631VALUE PREFERENCE CAPTURE FUNNEL AND CODING SYSTEMJune 2023March 2024Allow900YesNo
18331915METHOD AND SYSTEM FOR SECURING CLOUD STORAGE AND DATABASES FROM INSIDER THREATS AND OPTIMIZING PERFORMANCEJune 2023April 2025Allow2330YesNo
18326470NON-CUSTODIAL ENROLLMENT AND RECOVERY OF A SECRETMay 2023February 2025Abandon2020YesNo
18200211SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONMay 2023May 2024Allow1200YesNo
18250935Database Multi-Authentication Method and System, Terminal, and Storage MediumApril 2023April 2024Allow1210YesNo
18302170SYSTEMS AND METHODS FOR REFRESHING ENCRYPTION AND DECRYPTION KEYS AND SIGNATURES FOR A REALTIME PIPEPILINEApril 2023September 2023Allow510YesNo
18177531SECURE KEY EXCHANGE MECHANISM IN A WIRELESS COMMUNICATION SYSTEMMarch 2023July 2023Allow500YesNo
18106302COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR SHARING A COMMON SECRETFebruary 2023February 2024Allow1220YesNo
18157347METHOD FOR ENCRYPTING AND DECRYPTING DATA ACROSS DOMAINS BASED ON PRIVACY COMPUTINGJanuary 2023October 2023Allow910YesNo
18091193SYSTEMS AND METHODS FOR ENSURING CORRECT EXECUTION OF COMPUTER PROGRAM USING A MEDIATOR COMPUTER SYSTEMDecember 2022December 2024Allow2340YesNo
18063546SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY COMMUNICATIONS CHANNELSDecember 2022May 2023Allow500YesNo
17944739Systems and Methods for Distributed, Stateless, and Dynamic Browser Challenge Generation and VerificationSeptember 2022October 2024Allow2540YesNo
17816581DETECTING VULNERABILITIES IN MANAGED CLIENT DEVICESAugust 2022July 2023Allow1210YesNo
17877749ACCESS CONTROL IN MICROSERVICE ARCHITECTURESJuly 2022September 2024Allow2620NoYes
17861626Detecting and Preventing Malware Attacks Using Simulated Analytics and Continuous AuthenticationJuly 2022December 2024Abandon2910NoNo
17854222ACCESS CONTROL IN MICROSERVICE ARCHITECTURESJune 2022September 2024Allow2620NoYes
17849629CENTRALIZED BIOMETRIC USER PROFILE SETUP IN INTERNET GATEWAY DEVICE FOR NETWORK ACCESSJune 2022September 2024Abandon2710YesNo
17805577POST-QUANTUM CRYPTOGRAPHY RISK MODELINGJune 2022May 2025Abandon3520NoNo
17781464AUTOMATION OF USER IDENTITY USING NETWORK PROTOCOL PROVIDING SECURE GRANTING OR REVOCATION OF SECURED ACCESS RIGHTSJune 2022July 2023Allow1310YesNo
17828160METHOD AND SYSTEM FOR SECURING CLOUD STORAGE AND DATABASES FROM INSIDER THREATS AND OPTIMIZING PERFORMANCEMay 2022March 2023Allow920YesNo
17748492Authentication System and Method for Controlling Authentication SystemMay 2022December 2024Allow3020YesNo
17662506Secure Communication Encryption And Decryption Mechanism In A Wireless Communication SystemMay 2022January 2025Allow3340YesNo
17732558ETHERNET DATA TRANSMISSION CIRCUIT AND SYSTEM AND ETHERNET DATA TRANSMISSION METHODApril 2022February 2025Allow3410NoNo
17728201VALUE PREFERENCE CAPTURE FUNNEL AND CODING SYSTEMApril 2022April 2023Allow1120YesNo
17720381Remote Browsing Isolation for Resource Sharing Video ConferencingApril 2022March 2025Allow3520NoNo
17701736RAPID LAUNCH OF SECURE EXECUTABLES IN A VIRTUALIZED ENVIRONMENTMarch 2022May 2025Abandon3820NoNo
17698431SYSTEMS AND METHODS FOR SELECTIVE DEIDENTIFICATION OF MESSAGES INCLUDING PATIENT INFORMATIONMarch 2022May 2025Abandon3820NoNo
17761712GENERATING PRIME NUMBERSMarch 2022December 2023Abandon2110NoNo
17642397ELECTRONIC MAIL DECRYPTING DEVICE, ELECTRONIC MAIL DECRYPTING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAMMarch 2022August 2024Allow3010YesNo
17685823METHOD, APPARATUS, ELECTRONIC DEVICE, AND MEDIUM FOR DETECTING ABNORMALITY IN NETWORKMarch 2022October 2024Allow3220NoNo
17678961DYNAMIC EVALUATION OF DATA STORE ACCESS PERMISSIONSFebruary 2022November 2024Allow3310YesNo
17676428SYSTEM AND METHOD FOR REGISTRATION OF CARD KEYS FOR MULTIFUNCTION PERIPHERAL OPERATIONFebruary 2022May 2024Allow2710YesNo
17674118DETERMINISTIC CRYPTOGRAPHY DEIDENTIFICATION WITH GRANULAR DATA DESTRUCTIONFebruary 2022April 2023Allow1430YesNo
17674565SYSTEMS AND METHODS FOR EVALUATING SYSTEM-OF-SYSTEMS FOR CYBER VULNERABILITIESFebruary 2022December 2024Allow3420YesNo
17635699SYSTEMS, DEVICES, AND METHODS FOR OBSERVING AND/OR PERFORMING DATA ACCESS COMPLIANCE TO A COMPUTER NETWORKFebruary 2022January 2025Allow3520NoNo
17650885METHOD FOR THE EXECUTION OF A BINARY CODE OF A COMPUTER PROGRAM BY A MICROPROCESSORFebruary 2022August 2024Allow3010NoNo
17650968PERSONAL INFORMATION REDACTION AND VOICE DEIDENTIFICATIONFebruary 2022August 2024Allow3010YesNo
17634299SECURITY ASSESSMENT APPARATUS, SECURITY ASSESSMENT METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUMFebruary 2022March 2025Abandon3720NoNo
17583150SYSTEMS AND METHODS FOR PROVIDING SIGNATURELESS, CONFIDENTIAL AND AUTHENTICATION OF DATA DURING HANDSHAKE FOR CLASSICAL AND QUANTUM COMPUTING ENVIRONMENTSJanuary 2022March 2025Allow3711YesNo
17576558SYSTEM AND METHOD FOR IMPROVED END-TO-END CYBERSECURITY MACHINE LEARNING AND DEPLOYMENTJanuary 2022November 2023Allow2220YesNo
17647695DATABASE HIERARCHICAL ENCRYPTION FOR HYBRID-CLOUD ENVIRONMENTJanuary 2022March 2025Allow3920NoNo
17564014Systems, Methods and Media for the Creation of a Protective Layer Between an Application and a Cybersecurity RiskDecember 2021September 2024Allow3310YesNo
17557248Systems and Methods for Implementing Transparent End-To-End Network Public-Key EncryptionDecember 2021November 2024Allow3420YesNo
17619321SECURED SPECULATIVE EXECUTION PROCESSORDecember 2021August 2024Allow3320NoNo
17551441VERIFICATION METHOD FOR FAST SOURCE AND PATH EMBEDDED WITH RANDOM AUTHENTICATIONDecember 2021August 2024Allow3210NoNo
17617906DYNAMIC ENCRYPTION/DECRYPTION OF GENOMIC INFORMATIONDecember 2021May 2025Allow4120YesNo
17616703DICTIONARY-ATTACK-RESISTANT DATABASE ENCRYPTIONDecember 2021July 2023Allow1910NoNo
17536092AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKNovember 2021December 2023Allow2410YesNo
17536076AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKNovember 2021April 2023Allow1630YesNo
17536090AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKNovember 2021June 2024Allow3010YesNo
17536087AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKNovember 2021February 2024Allow2710YesNo
17536089AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKNovember 2021February 2024Allow2710YesNo
17533515COMMUNICATION SYSTEM, NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE, FIRST COMMUNICATION DEVICE AND SECOND COMMUNICATION DEVICENovember 2021November 2024Allow3620YesNo
17518905KEY GENERATION APPARATUS AND METHOD BASED ON MACHINE LEARNINGNovember 2021June 2024Allow3110NoNo
17607776KEY EXCHANGE SYSTEM, METHOD AND PROGRAM FOR GENERATING A SHARED KEY FOR SECURE COMMUNICATIONOctober 2021October 2023Allow2420YesNo
17505948Enhanced Robust Input Protocol for Secure Multi-Party Computation (MPC) via Hierarchical Pseudorandom Secret SharingOctober 2021August 2023Allow2200YesNo
17501965System and Method for Validating In-Memory Integrity of Executable Files to Identify Malicious ActivityOctober 2021January 2023Allow1600YesNo
17493262RE-ENCRYPTION DEVICE, METHOD AND COMPUTER READABLE MEDIUM TO CHANGE THE ACCESS RANGE FOR CIPHERTEXTOctober 2021July 2023Allow2100YesNo
17486288SECURE DATA CENTER UPDATE AND MONITORINGSeptember 2021July 2024Allow3411YesNo
17437636INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUMSeptember 2021January 2024Abandon2820NoNo
17458611ACCESSING CORPORATE RESOURCES THROUGH AN ENROLLED USER DEVICEAugust 2021September 2024Allow3730YesNo
17434189CONTROL SYSTEM, METHOD, AND CONTROL DEVICEAugust 2021February 2025Allow4220YesNo
17406696DEVICE COMMUNICATION MANAGEMENT FRAMEWORK FOR VOICE-BASED APPLICATIONSAugust 2021May 2024Allow3320YesNo
17399803BLOCKCHAIN WITH RANDOM COMMITTEE SELECTIONAugust 2021April 2024Allow3220NoNo
17428977ACCESS MANAGEMENT SYSTEM, AUTHENTICATION DEVICE FOR ACCESS MANAGEMENT SYSTEM, MANAGEMENT DEVICE FOR ACCESS MANAGEMENT SYSTEM, PORTABLE TERMINAL FOR ACCESS MANAGEMENT SYSTEM, MOBILE BODY FOR ACCESS MANAGEMENT SYSTEM, DATA STRUCTURE FOR ACCESS MANAGEMENT DATA, ACCESS MANAGEMENT PROGRAM, AND CONSTRUCTION METHOD FOR ACCESS MANAGEMENT SYSTEMAugust 2021June 2024Allow3410NoNo
17393774SYSTEMS AND METHODS FOR SYNTHETIC FILE SCANNINGAugust 2021March 2025Allow4320YesNo
17427862SYSTEMS, METHODS AND CONTROLLERS FOR SECURE COMMUNICATIONSAugust 2021September 2024Allow3730YesNo
17310338HANDLING OF MACHINE-TO-MACHINE SECURE SESSIONSJuly 2021July 2024Allow3540YesNo
17385972SECURE HIGH-SPEED COMMUNICATION INTERFACE BETWEEN A BASIC INPUT AND OUTPUT SYSTEM AND A SERVICE PROCESSORJuly 2021September 2023Allow2610YesNo
17375412SYSTEM AND METHOD TO SECURE CONTENT AND IMPROVE COLLABORATION WITH ELECTRONIC PENJuly 2021September 2024Allow3820NoNo
17373001Systems and Methods for Identifying Malware Injected into a Memory of a Computing DeviceJuly 2021May 2024Allow3430NoNo
17371148LOG ANALYSIS DEVICEJuly 2021January 2024Allow3030YesNo
17421363A METHOD AND A DEVICE FOR ENABLING KEY RE-USAGE IN A COMMUNICATION NETWORKJuly 2021August 2024Allow3730YesNo
17358604METHOD AND APPARATUS FOR FAST SYMMETRIC AUTHENTICATION AND SESSION KEY ESTABLISHMENTJune 2021November 2023Abandon2920NoNo
17304587COMMUNICATION METHOD AND RELATED PRODUCT BASED ON KEY AGREEMENT AND AUTHENTICATIONJune 2021October 2023Allow2820YesNo
17349942DETECTING THREATS BASED ON API SERVICE BUSINESS LOGIC ABUSEJune 2021November 2024Allow4130YesNo
17347278IDENTIFYING ATTACK BEHAVIOR BASED ON SCRIPTING LANGUAGE ACTIVITYJune 2021August 2023Allow2620YesNo
17413578ANALYSIS QUERY RESPONSE SYSTEM, ANALYSIS QUERY EXECUTION APPARATUS, ANALYSIS QUERY VERIFICATION APPARATUS, ANALYSIS QUERY RESPONSE METHOD, AND PROGRAMJune 2021August 2024Allow3820YesNo
17299004REMOTELY VERIFYING DEVICE INTEGRITYJune 2021December 2024Allow4240YesNo
17329596SECURING COMPUTING SYSTEMS AGAINST MICROARCHITECTURAL REPLAY ATTACKSMay 2021April 2025Abandon4720NoNo
17308698SURFACING REASONS FOR ANOMALOUS MULTIVARIATE SESSIONS IN AUDIT AND SECURITY LOGSMay 2021August 2024Allow4020YesNo
17306088MEDICAL STATUS PERSONAL DEVICEMay 2021March 2024Abandon3510NoNo
17244758LOCATION BASED SECURITY IN SERVICE PROVIDER NETWORKSApril 2021April 2023Allow2410YesNo
17243118VALIDATING PARAMETERS ON DISCRETE COMPUTING APPLICATIONS TO GRANT ACCESS CONTROL TO CONTENT OR COMMANDSApril 2021March 2023Allow2200YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner NOAMAN, BASSAM A.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
5
Examiner Affirmed
1
(20.0%)
Examiner Reversed
4
(80.0%)
Reversal Percentile
90.1%
Higher than average

What This Means

With a 80.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.

Strategic Value of Filing an Appeal

Total Appeal Filings
8
Allowed After Appeal Filing
5
(62.5%)
Not Allowed After Appeal Filing
3
(37.5%)
Filing Benefit Percentile
89.5%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 62.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner NOAMAN, BASSAM A - Prosecution Strategy Guide

Executive Summary

Examiner NOAMAN, BASSAM A works in Art Unit 2497 and has examined 244 patent applications in our dataset. With an allowance rate of 82.8%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.

Allowance Patterns

Examiner NOAMAN, BASSAM A's allowance rate of 82.8% places them in the 50% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by NOAMAN, BASSAM A receive 2.04 office actions before reaching final disposition. This places the examiner in the 67% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by NOAMAN, BASSAM A is 31 months. This places the examiner in the 36% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +50.8% benefit to allowance rate for applications examined by NOAMAN, BASSAM A. This interview benefit is in the 94% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 34.5% of applications are subsequently allowed. This success rate is in the 71% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 18.5% of cases where such amendments are filed. This entry rate is in the 14% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 8% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 58.3% of appeals filed. This is in the 27% percentile among all examiners. Of these withdrawals, 14.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 27.0% are granted (fully or in part). This grant rate is in the 18% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.