Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18964330 | DERIVED ACCESS PERMISSIONS FOR INPUTS TO ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18961639 | SECURE DEVICE COMMUNICATION USING MULTI-KEY ENCAPSULATION | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18945409 | Canonicalization of Unicode Prompt Injections | November 2024 | February 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 18922019 | INFORMATION PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | October 2024 | June 2025 | Allow | 8 | 2 | 0 | No | No |
| 18843232 | CONTAINER OPERATION CONTROL METHOD AND APPARATUS | August 2024 | June 2025 | Allow | 9 | 0 | 0 | No | No |
| 18807827 | METHOD, APPARATUS, DEVICE, AND MEDIUM FOR PERMISSION PROCESSING | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18758159 | ACCESS CONTROL POLICY FOR PROXY SERVICES | June 2024 | May 2025 | Allow | 11 | 0 | 0 | No | No |
| 18747859 | SYSTEM AND METHOD FOR MONITORING DATA INPUT INTO MACHINE LEARNING MODELS | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18746458 | OPEN SOURCE LIBRARY SECURITY RATING | June 2024 | May 2025 | Allow | 11 | 1 | 0 | No | No |
| 18638996 | Dispersed rebuilding of encoded data slices in a storage network | April 2024 | June 2025 | Allow | 14 | 0 | 0 | No | No |
| 18600744 | SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION | March 2024 | March 2025 | Allow | 13 | 1 | 0 | No | No |
| 18587518 | CONTEXTUAL KEY MANAGEMENT FOR DATA ENCRYPTION | February 2024 | June 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18438817 | SYSTEMS, METHODS, AND APPLICATIONS FOR TRANSCODING DATA INTO MEDIA FILES | February 2024 | April 2025 | Allow | 14 | 1 | 1 | No | No |
| 18423666 | SYSTEM AND METHOD FOR SECURITY SUITE CONCATENATING VALIDATION ELEMENTS FOR BLOCKCHAIN BINDING OPERATIONS | January 2024 | January 2025 | Allow | 12 | 1 | 0 | No | No |
| 18401950 | Monitor and Control Toxic Configuration in Container Deployment | January 2024 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18535370 | SECURE DOCUMENT MANAGEMENT SYSTEMS | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18476453 | END-TO-END TAGGING AND TRACKING OF EVENT SIGNALS SUBJECT TO PRIVACY POLICIES | September 2023 | March 2025 | Allow | 18 | 1 | 0 | No | No |
| 18470407 | WEARABLE ARTICLE WITH INTEGRATED DISPLAY FOR DISPLAYING CRYPTOGRAPHICALLY SECURED DIGITAL IMAGES | September 2023 | April 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18461417 | SYSTEM AND METHOD FOR FIREWALL POLICY RULE MANAGEMENT | September 2023 | November 2024 | Allow | 14 | 3 | 0 | Yes | No |
| 18232692 | METHOD FOR DATA PROTECTION ACROSS SHARING PLATFORMS | August 2023 | March 2025 | Allow | 20 | 3 | 0 | Yes | No |
| 18353618 | AUTOMATED DETECTION, REDACTION, AND REPORTING OF SENSITIVE INFORMATION | July 2023 | July 2025 | Allow | 24 | 0 | 0 | No | No |
| 18345436 | DOCUMENT PERMISSION PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | June 2023 | January 2025 | Allow | 18 | 3 | 0 | No | No |
| 18216403 | DASHBOARD CAMERA AND ASSOCIATED CLOUD STORAGE SERVICE HAVING INTEGRATED FILE VALIDATION | June 2023 | March 2025 | Allow | 21 | 0 | 0 | No | No |
| 18343020 | Data Encryption Method | June 2023 | March 2025 | Allow | 21 | 0 | 0 | No | No |
| 18212120 | SYSTEM AND METHOD FOR MONITORING DATA INPUT INTO MACHINE LEARNING MODELS | June 2023 | May 2024 | Allow | 10 | 2 | 0 | Yes | No |
| 18207419 | Methods and Systems for Efficient Adaptive Logging of Cyber Threat Incidents | June 2023 | June 2024 | Allow | 12 | 1 | 0 | No | No |
| 18205911 | OPEN SOURCE LIBRARY SECURITY RATING | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18327941 | METHOD FOR DETECTING VULNERABILITIES IN SOFTWARE | June 2023 | August 2024 | Allow | 14 | 0 | 0 | No | No |
| 18202284 | MODIFICATION OF DEVICE BEHAVIOR FOR USE IN SECURE NETWORKING | May 2023 | August 2024 | Abandon | 15 | 1 | 0 | No | No |
| 18201448 | THREAT ACTOR IDENTIFICATION SYSTEMS AND METHODS | May 2023 | June 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18319949 | SYSTEM AND METHOD FOR SECURITY SUITE CONCATENATING VALIDATION ELEMENTS FOR BLOCKCHAIN BINDING OPERATIONS | May 2023 | October 2023 | Allow | 5 | 1 | 0 | No | No |
| 18196266 | CONTRIBUTION SIGNATURES FOR TAGGING | May 2023 | March 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18132756 | Secure Methods, Systems, And Media For Generating And Verifying User Credentials | April 2023 | April 2024 | Allow | 12 | 1 | 0 | No | No |
| 18130638 | APPARATUS AND METHODS FOR SELECTIVELY REVEALING DATA | April 2023 | May 2024 | Abandon | 13 | 1 | 0 | No | No |
| 18187206 | STORED IMAGE PRIVACY VIOLATION DETECTION METHOD AND SYSTEM | March 2023 | January 2024 | Allow | 10 | 2 | 0 | No | No |
| 18118862 | METHODS AND SYSTEMS FOR HIGHLY SECURE DATA ANALYTIC ENCRYPTION AND DETECTION AND EXTRACTION OF TRUTHFUL CONTENT | March 2023 | April 2025 | Allow | 25 | 0 | 1 | Yes | No |
| 18178090 | PROTECTION OF PUBLIC-FACING COMPUTING ASSETS OF AN ORGANIZATION | March 2023 | March 2025 | Allow | 24 | 0 | 0 | No | No |
| 18023703 | SYSTEMS AND METHODS FOR PROTECTING MACHINE LEARNING MODELS AGAINST ADVERSARIAL ATTACKS | February 2023 | January 2025 | Allow | 22 | 0 | 0 | No | No |
| 18108200 | SYSTEMS AND METHODS FOR SIDE-CHANNEL MONITORING OF A LOCAL NETWORK | February 2023 | December 2023 | Allow | 10 | 1 | 0 | No | No |
| 18105360 | Disabling Executable Instructions from a Network Message | February 2023 | February 2025 | Allow | 25 | 1 | 0 | No | No |
| 18158395 | EXPLORATION AND ACCESS TO ELECTRONIC DATA ASSETS | January 2023 | March 2025 | Allow | 26 | 0 | 0 | No | No |
| 18157596 | SHARING AND REQUESTING PRIVATE DATA USING CRYPTOGRAPHY | January 2023 | May 2025 | Allow | 28 | 0 | 1 | No | No |
| 18098102 | SECURE DOCUMENT MANAGEMENT SYSTEMS | January 2023 | August 2023 | Allow | 6 | 2 | 0 | Yes | No |
| 18095353 | DETECTING SUSPICIOUS FILE ACTIVITY | January 2023 | August 2023 | Allow | 8 | 1 | 0 | No | No |
| 18093184 | POWER LINE COMMUNICATION CHANNEL IMPULSE RESPONSE MULTILEVEL QUANTIZATION FOR PHYSICAL LAYER SECURITY | January 2023 | October 2024 | Allow | 22 | 0 | 0 | No | No |
| 18145717 | METHOD FOR ANTI-TAMPERING APPARATUS SERVICING DATA AND SYSTEM THEREOF | December 2022 | December 2024 | Allow | 24 | 0 | 0 | No | No |
| 18145788 | DYNAMIC SECURITY ACTIONS FOR NETWORK TUNNELS AGAINST SPOOFING | December 2022 | September 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 18011620 | CONSENSUS METHOD FOR A DISTRIBUTED DATABASE | December 2022 | April 2023 | Allow | 4 | 0 | 0 | No | No |
| 18075121 | Methods and Systems for Efficient Adaptive Logging of Cyber Threat Incidents | December 2022 | March 2023 | Allow | 3 | 0 | 0 | No | No |
| 17925081 | METHOD FOR ROUTING ACCESS, USER EQUIPMENT, AND STORAGE MEDIUM | November 2022 | May 2025 | Allow | 30 | 1 | 0 | No | No |
| 17997511 | ENCRYPTED VERIFIABLE CREDENTIALS | October 2022 | September 2024 | Allow | 23 | 0 | 0 | No | No |
| 18050184 | DATA DISCOVERY AND GENERATION OF LIVE DATA MAP FOR INFORMATION PRIVACY | October 2022 | August 2023 | Allow | 9 | 0 | 0 | No | No |
| 17973803 | PROVISIONING MULTIPLE PLATFORM ROOT OF TRUST ENTITIES OF A HARDWARE DEVICE USING ROLE-BASED IDENTITY CERTIFICATES | October 2022 | September 2024 | Allow | 23 | 0 | 0 | No | No |
| 17971961 | METHODS AND SYSTEMS FOR DETERMINING THE AUTHENTICITY OF AN IDENTITY DOCUMENT | October 2022 | May 2023 | Allow | 6 | 0 | 0 | No | No |
| 17972549 | SECURE FAST CHANNEL CHANGE | October 2022 | November 2023 | Allow | 12 | 1 | 0 | No | No |
| 17964811 | ENCRYPTION KEY BASED ON SYSTEM CLOCK CHARACTERISTICS | October 2022 | September 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17933685 | Method for remotely monitoring host based on chip-level privacy-preserving computation (PPC) | September 2022 | March 2023 | Allow | 6 | 1 | 0 | No | No |
| 17930286 | SECURING A CONTAINER ECOSYSTEM | September 2022 | January 2025 | Allow | 28 | 1 | 0 | No | No |
| 17929814 | SECURING A CONTAINER ECOSYSTEM | September 2022 | September 2024 | Allow | 24 | 0 | 0 | No | No |
| 17892207 | METHODS AND SYSTEMS FOR IP-BASED NETWORK INTRUSION DETECTION AND PREVENTION | August 2022 | November 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17891448 | METHOD FOR DATA PROTECTION ACROSS SHARING PLATFORMS | August 2022 | May 2023 | Allow | 9 | 1 | 0 | No | No |
| 17891076 | Single Sign-On From Desktop to Network | August 2022 | August 2023 | Allow | 11 | 0 | 0 | No | No |
| 17888595 | Point-To-Point Tokens for Software-Defined Network Anti-Spoof Protection | August 2022 | September 2024 | Allow | 25 | 0 | 0 | No | No |
| 17888387 | EXTENDED ENTERPRISE BROWSER BLOCKING SPREAD OF RANSOMWARE FROM ALTERNATE BROWSERS IN A SYSTEM PROVIDING AGENTLESS LATERAL MOVEMENT PROTECTION FROM RANSOMWARE FOR ENDPOINTS DEPLOYED UNDER A DEFAULT GATEWAY WITH POINT TO POINT LINKS | August 2022 | February 2023 | Allow | 6 | 1 | 0 | Yes | No |
| 17875813 | ACCESS CONTROL POLICY FOR PROXY SERVICES | July 2022 | March 2024 | Allow | 20 | 2 | 0 | No | No |
| 17872415 | COMPUTER-IMPLEMENTED METHODS AND SYSTEM FOR PREVENTING AND REMOVING UNAUTHORIZED FILE MODIFICATION BY MALICIOUS SOFTWARE AND THE LIKE | July 2022 | November 2024 | Allow | 27 | 1 | 0 | No | No |
| 17814173 | Shared Resource Identification | July 2022 | August 2023 | Allow | 13 | 1 | 0 | No | No |
| 17813430 | Secured Search for Ready-Made Search Software | July 2022 | October 2024 | Allow | 27 | 1 | 0 | No | No |
| 17813394 | METHOD AND SYSTEM FOR PERMITTING ONE OR MORE FEATURES ON A COMPUTER PROGRAM | July 2022 | December 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17811621 | Systems and Methods for Dynamic Checksum Generation and Validation with Customizable Levels of Integrity Verification | July 2022 | January 2023 | Allow | 6 | 1 | 0 | Yes | No |
| 17791374 | METHOD AND APPARATUS FOR AUTHORITY CONTROL, COMPUTER DEVICE AND STORAGE MEDIUM | July 2022 | January 2023 | Allow | 6 | 0 | 0 | No | No |
| 17808921 | DEEP LEARNING ACCESS AND AUTHENTICATION IN A COMPUTING ARCHITECTURE | June 2022 | January 2025 | Allow | 31 | 2 | 0 | No | No |
| 17838478 | METHODS AND SYSTEMS FOR EFFICIENT ADAPTIVE LOGGING OF CYBER THREAT INCIDENTS | June 2022 | August 2022 | Allow | 2 | 0 | 0 | No | No |
| 17804588 | MALICIOUS SOFTWARE DETECTION AND MITIGATION | May 2022 | December 2023 | Abandon | 18 | 1 | 0 | No | No |
| 17824206 | AUTOMATIC SEGMENTATION USING HIERARCHICAL TIMESERIES ANALYSIS | May 2022 | April 2024 | Allow | 23 | 0 | 0 | No | No |
| 17824533 | METHOD OF CONTROLLING CLIPBOARD AND ELECTRONIC DEVICE FOR PERFORMING THE SAME | May 2022 | July 2024 | Allow | 26 | 1 | 0 | No | No |
| 17824427 | AUTOMATICALLY DETECTING UNKNOWN PACKERS | May 2022 | August 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17752158 | SYSTEM AND METHOD FOR GUIDING PRIVACY-ENHANCING TRANSFORMATIONS | May 2022 | April 2025 | Allow | 35 | 2 | 0 | No | No |
| 17745703 | SECURE DEPLOYMENT OF DE-RISKED CONFIDENTIAL DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT | May 2022 | January 2025 | Allow | 32 | 2 | 0 | No | No |
| 17738274 | INFERENCE-BASED DETECTION OF PROXIMITY CHANGES | May 2022 | October 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17737180 | AUTOMATED VALIDATION AND SECURITY FOR DIGITAL ASSETS IN A COMPUTER ENVIRONMENT | May 2022 | March 2024 | Allow | 23 | 0 | 0 | No | No |
| 17737363 | Masking Sensitive Information While Screensharing HTML Elements | May 2022 | October 2024 | Allow | 29 | 1 | 0 | No | No |
| 17731396 | APPROVAL SYSTEM | April 2022 | November 2024 | Allow | 31 | 1 | 1 | No | No |
| 17732071 | METHOD OF NON-INTERACTIVE ZERO-KNOWLEDGE CROWD VERIFIABLE DIGITAL CONTACT TRACING | April 2022 | March 2024 | Allow | 23 | 0 | 0 | No | No |
| 17721514 | MONITORING ENCRYPTED NETWORK TRAFFIC | April 2022 | September 2022 | Allow | 5 | 1 | 0 | No | No |
| 17717832 | METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM OF DATA ACQUISITION | April 2022 | June 2023 | Allow | 14 | 3 | 0 | No | No |
| 17712168 | ACCIDENT AND/OR BODILY INJURY MANAGEMENT AND MONITORING APPLICATION FOR LAW FIRMS, MEDICAL PROVIDERS, INSURANCE COMPANIES, PROCESS, SYSTEM, APPARATUS, AND A METHOD OF USING SAME | April 2022 | September 2024 | Abandon | 29 | 1 | 0 | No | No |
| 17684962 | CONTENT MANAGEMENT DEVICE, CONTENT MANAGEMENT SYSTEM, AND CONTROL METHOD | March 2022 | September 2024 | Allow | 30 | 5 | 0 | Yes | No |
| 17667501 | APPARATUS AND METHODS FOR SELECTIVELY REVEALING DATA | February 2022 | February 2023 | Allow | 12 | 2 | 0 | No | No |
| 17581090 | Method and System for Updating of an Application Layer for a Third-Party Telematics Provider | January 2022 | April 2023 | Allow | 15 | 0 | 0 | No | No |
| 17571667 | MACHINE LEARNING NOTEBOOK CELL OBFUSCATION | January 2022 | July 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17562553 | ACCESS CONTROL POLICY FOR PROXY SERVICES | December 2021 | March 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17645980 | SECURING A STORAGE SYSTEM | December 2021 | September 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17535838 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR FRICTIONLESS ELECTRONIC SIGNATURE MANAGEMENT | November 2021 | July 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17534442 | SYSTEM, METHOD AND APPLICATION FOR TRANSCODING DATA INTO MEDIA FILES | November 2021 | October 2023 | Allow | 23 | 1 | 0 | Yes | No |
| 17525705 | Systems and Methods for Dynamic Checksum Generation and Validation with Customizable Levels of Integrity Verification | November 2021 | May 2022 | Allow | 6 | 1 | 0 | Yes | No |
| 17511415 | VERIFYING DATA SOURCES USING ATTESTATION BASED METHODS | October 2021 | June 2025 | Allow | 44 | 3 | 0 | Yes | No |
| 17452084 | Automatic Resource Access Policy Generation and Implementation | October 2021 | December 2024 | Allow | 38 | 2 | 0 | Yes | Yes |
| 16974367 | Resolving Storage Inconsistencies For A Set Of Encoded Data Slices | October 2021 | December 2023 | Allow | 26 | 2 | 0 | Yes | No |
| 17503222 | Ensuring Replacement of a Memory Device Key | October 2021 | December 2024 | Allow | 38 | 2 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LITTLE, VANCE M.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 80.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LITTLE, VANCE M works in Art Unit 2494 and has examined 237 patent applications in our dataset. With an allowance rate of 92.8%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 26 months.
Examiner LITTLE, VANCE M's allowance rate of 92.8% places them in the 79% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by LITTLE, VANCE M receive 1.24 office actions before reaching final disposition. This places the examiner in the 22% percentile for office actions issued. This examiner issues significantly fewer office actions than most examiners.
The median time to disposition (half-life) for applications examined by LITTLE, VANCE M is 26 months. This places the examiner in the 61% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +7.3% benefit to allowance rate for applications examined by LITTLE, VANCE M. This interview benefit is in the 37% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 37.7% of applications are subsequently allowed. This success rate is in the 83% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 44.4% of cases where such amendments are filed. This entry rate is in the 62% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 150.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 89% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 89% percentile among all examiners. Of these withdrawals, 100.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 28.6% are granted (fully or in part). This grant rate is in the 20% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 20% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.