Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18672750 | METHODS AND APPARATUS FOR CONTROL AND DETECTION OF MALICIOUS CONTENT USING A SANDBOX ENVIRONMENT | May 2024 | July 2025 | Allow | 13 | 1 | 0 | No | No |
| 18656336 | COMPUTING SYSTEM PERMISSION ADMINISTRATION ENGINE | May 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18648519 | SYSTEM AND DEVICE FOR DATA PROTECTION AND METHOD THEREOF | April 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18649734 | Visual Detection of Phishing Websites Via Headless Browser | April 2024 | May 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18648419 | SYSTEM FOR SECURED ELECTRONIC DATA ACCESS THROUGH MACHINE-LEARNING BASED ANALYSIS OF COMBINED ACCESS AUTHORIZATIONS | April 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18648125 | Information security system and method for secure data transmission among user profiles using a blockchain network | April 2024 | January 2025 | Allow | 9 | 1 | 0 | No | No |
| 18616616 | SYSTEMS AND METHODS FOR CONTENT RIGHTS PORTABILITY | March 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18603810 | User Presence Detection for Authentication Question Generation | March 2024 | October 2024 | Allow | 7 | 1 | 0 | No | No |
| 18519175 | ASSET ANOMALY DETECTION BASED ON CROSS ORGANIZATIONAL ASSET DATA MODELING | November 2023 | October 2024 | Allow | 10 | 1 | 0 | No | No |
| 18387727 | USER AUTHORIZATION FOR FILE LEVEL RESTORATION FROM IMAGE LEVEL BACKUPS | November 2023 | February 2025 | Allow | 15 | 1 | 0 | No | No |
| 18496514 | System and Method for Securing Personal Information Via Biometric Public Key | October 2023 | October 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18383811 | TELEMETRY SAMPLING SCANNING FOR EXPOSED SECRETS AND OTHER SENSITIVE DATA | October 2023 | May 2025 | Allow | 19 | 0 | 0 | No | No |
| 18381756 | SYSTEMS AND METHODS FOR MANAGING ACCESS TO MEDIA ASSETS BASED ON A PROJECTED LOCATION OF A USER | October 2023 | September 2024 | Allow | 11 | 1 | 0 | No | No |
| 18487736 | SYSTEMS AND METHODS TO TRACK, STORE, AND MANAGE EVENTS, RIGHTS, AND LIABILITIES | October 2023 | June 2024 | Allow | 8 | 0 | 0 | No | No |
| 18458805 | SYSTEMS AND METHODS FOR HEALTHCARE ID | August 2023 | June 2025 | Allow | 21 | 0 | 0 | No | No |
| 18261597 | METHOD FOR CHECKING INDIVIDUALS WITH SIMPLIFIED AUTHENTICATION | July 2023 | May 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18212775 | SECURING SENSITIVE DATA IN A CONTAINER MANAGEMENT SYSTEM | June 2023 | March 2025 | Allow | 21 | 0 | 0 | No | No |
| 18331366 | STRUCTURED DATA FOLDING WITH TRANSMUTATIONS | June 2023 | January 2025 | Allow | 20 | 2 | 0 | No | No |
| 18204038 | CORE SERVICES DETECTION FOR A SEGMENTED NETWORK ENVIRONMENT | May 2023 | October 2024 | Allow | 16 | 1 | 0 | No | No |
| 18131327 | TECHNIQUES FOR PEER-TO-PEER KEY VERIFICATION | April 2023 | March 2025 | Allow | 23 | 0 | 0 | No | No |
| 18128938 | SYSTEMS AND METHODS OF DATA TRANSFORMATION FOR DATA POOLING | March 2023 | August 2024 | Allow | 17 | 1 | 0 | No | No |
| 18108978 | Reduction of Security Detection False Positives | February 2023 | June 2025 | Allow | 28 | 0 | 0 | No | No |
| 18105820 | INFORMATION PROCESSING SYSTEM, SETTING CHANGE METHOD, AND NON-TRANSITORY RECORDING MEDIUM | February 2023 | June 2025 | Allow | 28 | 1 | 0 | No | No |
| 18157025 | METHODS AND APPARATUS FOR AUTOMATIC PERMISSION ASSIGNMENT | January 2023 | January 2024 | Allow | 12 | 1 | 0 | No | No |
| 18091010 | STATELESS CLOUD AUTHENTICATION FOR SECURITY SERVICES | December 2022 | April 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18079851 | TRANSFERRING APPLICATION DATA BETWEEN DEVICES | December 2022 | January 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18064165 | ACCESS POINT NAME AND APPLICATION IDENTITY BASED SECURITY ENFORCEMENT IN SERVICE PROVIDER NETWORKS | December 2022 | February 2024 | Allow | 14 | 1 | 0 | No | No |
| 18063060 | AUTHENTICATING ELECTRONIC DEVICES VIA MULTI TONE ANALYSIS | December 2022 | May 2025 | Allow | 29 | 1 | 0 | No | No |
| 17928917 | BIOMETRIC FEATURE VERIFICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | November 2022 | June 2025 | Allow | 31 | 1 | 0 | No | No |
| 17994543 | FAST PURGE ON STORAGE DEVICES | November 2022 | February 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18052211 | SYSTEM AND DEVICE FOR DATA PROTECTION AND METHOD THEREOF | November 2022 | January 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 17961735 | PROVISIONING CONTROL APPARATUS AND METHOD FOR PROVISIONING ELECTRONIC COMPONENTS OR DEVICES | October 2022 | October 2024 | Allow | 24 | 1 | 0 | No | No |
| 17961775 | PROVISIONING CONTROL APPARATUS AND METHOD FOR PROVISIONING ELECTRONIC COMPONENTS OR DEVICES | October 2022 | October 2024 | Allow | 24 | 0 | 0 | No | No |
| 17941670 | METHOD AND APPARATUS WITH PROVIDER INFORMATION ACCESS AUTHORIZATION | September 2022 | September 2024 | Allow | 24 | 2 | 0 | No | No |
| 17894280 | Method and System for Protecting User Information in an Overlay Management System | August 2022 | January 2025 | Allow | 28 | 1 | 0 | No | No |
| 17893588 | DATA EXTRACTION SYSTEM, DATA EXTRACTION METHOD, REGISTRATION APPARATUS, AND PROGRAM | August 2022 | December 2023 | Allow | 16 | 1 | 0 | No | No |
| 17889782 | AUTHENTICATING KEY-VALUE DATA PAIRS FOR PROTECTING NODE RELATED DATA | August 2022 | August 2024 | Allow | 24 | 1 | 0 | No | No |
| 17882460 | Visual Detection of Phishing Websites Via Headless Browser | August 2022 | April 2024 | Allow | 20 | 2 | 0 | Yes | No |
| 17760176 | BLUETOOTH DEVICE AND BLUETOOTH GATEWAY | August 2022 | June 2025 | Allow | 34 | 2 | 0 | No | No |
| 17875422 | ENCRYPTION PROCESSING SYSTEM, NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ENCRYPTION PROCESSING PROGRAM, AND ENCRYPTION PROCESSING METHOD | July 2022 | May 2025 | Allow | 33 | 1 | 0 | No | No |
| 17812977 | COMPUTING SYSTEM PERMISSION ADMINISTRATION ENGINE | July 2022 | February 2024 | Allow | 19 | 1 | 0 | No | No |
| 17852709 | Video Surveillance Systems Using Out of Band Key Exchange | June 2022 | October 2024 | Allow | 27 | 0 | 0 | No | No |
| 17844870 | USER AUTHENTICATION APPARATUS AND METHOD USING BRAINWAVE SIGNAL ACCORDING TO IMAGINED SPEECH | June 2022 | September 2024 | Allow | 27 | 1 | 0 | No | No |
| 17845376 | SERVICE MANAGEMENT SYSTEM, TOKEN ISSUING SERVER, AND METHOD FOR TOKEN ISSUING SERVER | June 2022 | April 2024 | Allow | 22 | 0 | 0 | No | No |
| 17837817 | SYSTEM, METHODS, AND DEVICES FOR DATA STORAGE AND PROCESSING WITH IDENTITY MANAGEMENT | June 2022 | December 2023 | Allow | 19 | 1 | 0 | No | No |
| 17833448 | SYSTEM AND METHOD FOR ANONYMOUS LOCATION VERIFICATION | June 2022 | August 2024 | Allow | 26 | 1 | 0 | No | No |
| 17726691 | METHOD FOR GENERATING AN ENCODED IMAGE, COMPUTER PROGRAM, STORAGE MEDIUM, AND ELECTRONIC IMAGE ANALYSIS DEVICE | April 2022 | January 2025 | Abandon | 33 | 2 | 0 | Yes | No |
| 17726914 | Instant Rekey In A Storage System | April 2022 | December 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17725017 | SYSTEM FOR SECURED ELECTRONIC DATA ACCESS THROUGH MACHINE-LEARNING BASED ANALYSIS OF COMBINED ACCESS AUTHORIZATIONS | April 2022 | April 2024 | Allow | 23 | 0 | 0 | No | No |
| 17657166 | CLASSIFICATION OF UNKNOWN NETWORK TRAFFIC | March 2022 | January 2024 | Allow | 21 | 1 | 0 | No | No |
| 17763755 | AUTOMATED CAN MESSAGE TRANSLATOR | March 2022 | October 2024 | Allow | 30 | 1 | 0 | No | No |
| 17698269 | Device ID for Memory Protection | March 2022 | December 2024 | Abandon | 33 | 1 | 0 | No | No |
| 17694420 | DATA TRAFFIC CHARACTERIZATION PRIORITIZATION | March 2022 | June 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17672440 | CO-PROCESSOR FOR CRYPTOGRAPHIC OPERATIONS | February 2022 | August 2024 | Allow | 30 | 0 | 0 | No | No |
| 17667099 | Systems and Methods for Increasing Robustness of Machine-Learned Models and Other Software Systems against Adversarial Attacks | February 2022 | December 2023 | Allow | 22 | 1 | 0 | No | No |
| 17631866 | Secure Media Delivery | January 2022 | December 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17626456 | SECURITY PROCESSING DEVICE | January 2022 | April 2024 | Allow | 27 | 1 | 0 | No | No |
| 17621431 | METHOD AND SYSTEM FOR USER AUTHENTICATION | December 2021 | June 2024 | Allow | 30 | 1 | 0 | No | No |
| 17555158 | SYSTEMS AND METHODS TO FACILITATE AUTHORIZATION KEY OBFUSCATION VALIDATION | December 2021 | April 2024 | Allow | 28 | 2 | 0 | No | No |
| 17545197 | HARDWARE INTEGRITY VERIFICATION MECHANISM | December 2021 | January 2025 | Abandon | 37 | 2 | 0 | Yes | No |
| 17542289 | Proximity Based Identity Modulation for an Identity Verification System | December 2021 | August 2024 | Allow | 33 | 1 | 0 | No | No |
| 17542307 | FLEXIBLY OBTAINING DEVICE POSTURE SIGNALS IN MULTI-TENANT AUTHENTICATION SYSTEM | December 2021 | August 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17608898 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD | November 2021 | April 2024 | Allow | 30 | 1 | 0 | No | No |
| 17512589 | SYSTEM AND METHOD FOR INSTANTIATION OF STATELESS EXTRANETS | October 2021 | October 2023 | Allow | 24 | 0 | 0 | No | No |
| 17449919 | MITIGATION CONTROL OF INADVERTENT PROCESSING OF SENSITIVE DATA | October 2021 | August 2023 | Allow | 23 | 1 | 0 | No | No |
| 17482661 | RE-KEYING THE CONTENTS OF A STORAGE DEVICE | September 2021 | June 2024 | Allow | 33 | 3 | 0 | Yes | No |
| 17476677 | CHANNEL KEY LOADING IN A COMPUTING ENVIRONMENT | September 2021 | September 2023 | Allow | 24 | 1 | 0 | No | No |
| 17438165 | METHOD FOR ADJUSTING A PERIODICITY OF COMMUNICATION BETWEEN A WHEEL UNIT AND AN AUTHORIZED DEVICE | September 2021 | February 2024 | Allow | 29 | 3 | 0 | Yes | No |
| 17468912 | DEVICES AND METHODS UTILIZING SENSOR INFORMATION FOR INCREASED TRUST LEVEL | September 2021 | January 2025 | Allow | 40 | 2 | 0 | Yes | No |
| 17469067 | REMOTELY MANAGING DEVICES USING BLOCKCHAIN AND DICE-RIOT | September 2021 | June 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17468078 | System and Method for Securing Personal Information Via Biometric Public Key | September 2021 | July 2023 | Allow | 22 | 1 | 0 | No | No |
| 17464928 | PRIVILEGE GRAPH-BASED REPRESENTATION OF DATA ACCESS AUTHORIZATIONS | September 2021 | May 2025 | Allow | 45 | 2 | 0 | Yes | No |
| 17310969 | ACCESS CONTROL CLASSIFIER TRAINING | September 2021 | July 2024 | Abandon | 34 | 2 | 0 | No | No |
| 17464387 | DEVICES AND TECHNIQUES TO PERFORM ENTROPY-BASED RANDOMNESS VIA A CONTACTLESS CARD | September 2021 | January 2025 | Allow | 40 | 1 | 0 | No | No |
| 17461464 | SECURE DEVICE COUPLING | August 2021 | January 2024 | Allow | 28 | 1 | 0 | No | No |
| 17411383 | MATCHING CRYPTOGRAPHIC COMPUTING RESOURCES TO THE PREDICTED REQUIREMENTS FOR DECRYPTING ENCRYPTED COMMUNICATIONS | August 2021 | November 2023 | Allow | 26 | 0 | 0 | Yes | No |
| 17402693 | SECURE MESSAGE ROUTING | August 2021 | January 2024 | Allow | 29 | 1 | 0 | No | No |
| 17403165 | INFORMATION SECURITY SYSTEM AND METHOD FOR SECURE DATA TRANSMISSION AMONG USER PROFILES USING A BLOCKCHAIN NETWORK | August 2021 | December 2023 | Allow | 28 | 0 | 0 | No | No |
| 17390610 | DYNAMIC TRANSACTION-AWARE WEB APPLICATION AUTHENTICATION USING CALL INTERCEPTS | July 2021 | January 2025 | Allow | 41 | 3 | 0 | Yes | No |
| 17384169 | SYSTEMS AND METHODS FOR CONTENT RIGHTS PORTABILITY | July 2021 | December 2023 | Allow | 29 | 1 | 0 | No | No |
| 17380307 | MANAGING COMMUNICATION INTERFERENCE IN LEADLESS DUAL-CHAMBER PACING SYSTEMS AND OTHER IMD SYSTEMS | July 2021 | July 2023 | Allow | 24 | 1 | 0 | No | No |
| 17376254 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO DATA RECORDS | July 2021 | July 2024 | Allow | 36 | 1 | 0 | No | No |
| 17375695 | METHODS AND SYSTEMS FOR API DECEPTION ENVIRONMENT AND API TRAFFIC CONTROL AND SECURITY | July 2021 | November 2023 | Allow | 28 | 1 | 0 | No | No |
| 17368035 | User Presence Detection for Authentication Question Generation | July 2021 | January 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17299772 | CERTIFICATELESS PUBLIC KEY ENCRYPTION USING PAIRINGS | June 2021 | October 2023 | Allow | 28 | 1 | 0 | No | No |
| 17329732 | USER AUTHORIZATION FOR FILE LEVEL RESTORATION FROM IMAGE LEVEL BACKUPS | May 2021 | April 2023 | Allow | 23 | 1 | 0 | No | No |
| 17236601 | SYSTEMS AND METHODS FOR MANAGING ACCESS TO MEDIA ASSETS BASED ON A PROJECTED LOCATION OF A USER | April 2021 | July 2023 | Allow | 27 | 2 | 0 | No | No |
| 17235998 | Reducing The Impact Of Border Gateway Protocol (BGP) Hijacks | April 2021 | March 2023 | Allow | 23 | 1 | 0 | No | No |
| 17236222 | Obtaining A User Input | April 2021 | March 2023 | Allow | 23 | 1 | 0 | Yes | No |
| 17236825 | SYSTEMS AND METHODS TO TRACK, STORE, AND MANAGE EVENTS, RIGHTS, AND LIABILITIES | April 2021 | June 2023 | Allow | 26 | 1 | 0 | No | No |
| 17235504 | LIMITING DEVICE FUNCTIONALITY BASED ON DATA DETECTION AND PROCESSING | April 2021 | May 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17232929 | STRUCTURED DATA FOLDING WITH TRANSMUTATIONS | April 2021 | March 2023 | Allow | 23 | 1 | 0 | No | No |
| 17229874 | QUANTUM-COMPUTING THREATS SURVEILLANCE SYSTEM AND METHOD FOR USE IN QUANTUM COMMUNICATION ENVIRONMENTS | April 2021 | February 2024 | Allow | 34 | 1 | 0 | No | No |
| 17228840 | PUF METHOD AND STRUCTURE | April 2021 | June 2024 | Abandon | 38 | 1 | 0 | No | No |
| 17215746 | Encryption and Decryption for a Multi-Tile Processing Unit | March 2021 | October 2022 | Allow | 18 | 0 | 0 | No | No |
| 17211540 | KEY BASED PARTIAL DATA RESTRICTION IN STORAGE SYSTEMS | March 2021 | February 2024 | Allow | 34 | 1 | 0 | No | No |
| 17211412 | METHODS AND APPARATUS FOR CONTROL AND DETECTION OF MALICIOUS CONTENT USING A SANDBOX ENVIRONMENT | March 2021 | February 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17209524 | Secure System Having a Multi-Locking Mechanism for Devices Having Embedded Systems | March 2021 | January 2023 | Allow | 21 | 1 | 0 | No | No |
| 17209328 | NETWORK SYSTEM ARCHITECTURE USING A VIRTUAL PRIVATE NETWORK (VPN) AS A SIDECAR FOR CONTAINERIZED DEVICES SUPPORTING CONTAINERS | March 2021 | April 2024 | Allow | 37 | 2 | 0 | No | No |
| 17208494 | SECURE LOCKING OF PHYSICAL RESOURCES USING ASYMMETRIC CRYPTOGRAPHY | March 2021 | June 2023 | Allow | 27 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner SONG, HEE K.
With a 25.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 52.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner SONG, HEE K works in Art Unit 2497 and has examined 633 patent applications in our dataset. With an allowance rate of 90.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 27 months.
Examiner SONG, HEE K's allowance rate of 90.7% places them in the 73% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by SONG, HEE K receive 1.44 office actions before reaching final disposition. This places the examiner in the 33% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by SONG, HEE K is 27 months. This places the examiner in the 57% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +11.6% benefit to allowance rate for applications examined by SONG, HEE K. This interview benefit is in the 50% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 36.3% of applications are subsequently allowed. This success rate is in the 78% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 54.5% of cases where such amendments are filed. This entry rate is in the 76% percentile among all examiners. Strategic Recommendation: This examiner is highly receptive to after-final amendments compared to other examiners. Per MPEP § 714.12, after-final amendments may be entered "under justifiable circumstances." Consider filing after-final amendments with a clear showing of allowability rather than immediately filing an RCE, as this examiner frequently enters such amendments.
When applicants request a pre-appeal conference (PAC) with this examiner, 22.2% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 26% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 78.9% of appeals filed. This is in the 67% percentile among all examiners. Of these withdrawals, 60.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 41.8% are granted (fully or in part). This grant rate is in the 43% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 1.6% of allowed cases (in the 74% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.3% of allowed cases (in the 47% percentile). This examiner issues Quayle actions less often than average. Allowances may come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.