Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19242417 | Detection of Image Injection Attacks in Mobile Document Capture Systems Using Accelerometer-Based Vibration Analysis | June 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19172364 | SECURE MULTI-PARTY EPHEMERAL FILE TRANSFER | April 2025 | May 2025 | Allow | 1 | 0 | 0 | No | No |
| 18964330 | DERIVED ACCESS PERMISSIONS FOR INPUTS TO ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18961639 | SECURE DEVICE COMMUNICATION USING MULTI-KEY ENCAPSULATION | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18945409 | Canonicalization of Unicode Prompt Injections | November 2024 | February 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 18922019 | INFORMATION PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | October 2024 | June 2025 | Allow | 8 | 2 | 0 | No | No |
| 18895998 | TECHNOLOGIES FOR AUDITING AND MAINTAINING ACCESS TO PROTECTED DATA | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18292830 | ENCRYPTED SEAL, AND SECONDARY ENCRYPTION METHOD FOR STRIP-SHAPED DATA | September 2024 | August 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18825239 | SECURE RELAY DEVICE AND DATA TRANSMISSION RECEPTION SYSTEM | September 2024 | December 2025 | Allow | 16 | 0 | 0 | No | No |
| 18843232 | CONTAINER OPERATION CONTROL METHOD AND APPARATUS | August 2024 | June 2025 | Allow | 9 | 0 | 0 | No | No |
| 18820959 | Methods and Systems for Efficient Adaptive Logging of Cyber Threat Incidents | August 2024 | December 2025 | Allow | 16 | 0 | 0 | No | No |
| 18809198 | NESTED ENCRYPTION PROTOCOL INDICATORS FOR WEB TOKENS | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18807827 | METHOD, APPARATUS, DEVICE, AND MEDIUM FOR PERMISSION PROCESSING | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18792476 | AUTOMATIC SEGMENTATION USING HIERARCHICAL TIMESERIES ANALYSIS | August 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18776556 | SYSTEM AND METHOD FOR FIREWALL POLICY RULE MANAGEMENT | July 2024 | July 2025 | Allow | 12 | 3 | 0 | Yes | No |
| 18758159 | ACCESS CONTROL POLICY FOR PROXY SERVICES | June 2024 | May 2025 | Allow | 11 | 0 | 0 | No | No |
| 18747859 | SYSTEM AND METHOD FOR MONITORING DATA INPUT INTO MACHINE LEARNING MODELS | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18746458 | OPEN SOURCE LIBRARY SECURITY RATING | June 2024 | May 2025 | Allow | 11 | 1 | 0 | No | No |
| 18679445 | Long-Term Access Control for Therapeutic Journey Authentication | May 2024 | November 2025 | Allow | 18 | 1 | 0 | No | No |
| 18678631 | SALTING BINARIES FOR HUMAN READABLE PRIME NUMBER COMPRESSION (HRPNC) | May 2024 | December 2025 | Allow | 18 | 0 | 0 | No | No |
| 18674303 | SYSTEMS AND METHODS FOR BLOCKCHAIN-BASED SECURE MULTIPARTY COMPUTATION | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18638996 | Dispersed rebuilding of encoded data slices in a storage network | April 2024 | June 2025 | Allow | 14 | 0 | 0 | No | No |
| 18630217 | SYSTEM AND METHOD OF SEQUENTIAL CYPHER ENCRYPTION BASED ON CONTEXTUAL MACHINE LEARNING POWERED PERFORMANCE TESTING ENGINE FOR PRODUCTION ENVIRONMENT | April 2024 | October 2025 | Allow | 19 | 0 | 0 | No | No |
| 18699341 | RISK INFORMATION OUTPUT DEVICE, INFORMATION OUTPUT SYSTEM, RISK INFORMATION OUTPUT METHOD, AND RECORDING MEDIUM | April 2024 | February 2026 | Allow | 23 | 1 | 0 | No | No |
| 18626273 | SYSTEMS AND METHODS FOR MITIGATING DDOS ATTACKS ON INTERNET PROTOCOL NETWORKS | April 2024 | October 2025 | Allow | 18 | 0 | 0 | No | No |
| 18619624 | METHOD AND A SYSTEM FOR TRAFFIC TUNNELING IN A DISTRIBUTED NETWORK FOR MALWARE DETECTION | March 2024 | January 2026 | Allow | 21 | 0 | 1 | No | No |
| 18602102 | ARTIFICIAL INTELLIGENCE (AI) BASED SECURE NETWORK PROTOCOLS WITH DYNAMIC MULTILAYER ENCRYPTION | March 2024 | September 2025 | Allow | 18 | 0 | 0 | No | No |
| 18600744 | SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION | March 2024 | March 2025 | Allow | 13 | 1 | 0 | No | No |
| 18592382 | ADJUSTING SUBSYSTEM DATA EXPIRATION DURATION | February 2024 | February 2026 | Allow | 24 | 1 | 0 | Yes | No |
| 18587518 | CONTEXTUAL KEY MANAGEMENT FOR DATA ENCRYPTION | February 2024 | June 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18438817 | SYSTEMS, METHODS, AND APPLICATIONS FOR TRANSCODING DATA INTO MEDIA FILES | February 2024 | April 2025 | Allow | 14 | 1 | 1 | No | No |
| 18438249 | MALWARE PROCESS INJECTION DETECTION | February 2024 | August 2025 | Allow | 18 | 0 | 0 | No | No |
| 18423666 | SYSTEM AND METHOD FOR SECURITY SUITE CONCATENATING VALIDATION ELEMENTS FOR BLOCKCHAIN BINDING OPERATIONS | January 2024 | January 2025 | Allow | 12 | 1 | 0 | No | No |
| 18401950 | Monitor and Control Toxic Configuration in Container Deployment | January 2024 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18399970 | SYSTEM AND METHOD FOR HIGH-RESOLUTION BLACKBOX PATCH ATTACK WITH BAYESIAN OPTMIZIATION | December 2023 | July 2025 | Allow | 19 | 0 | 0 | No | No |
| 18535370 | SECURE DOCUMENT MANAGEMENT SYSTEMS | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18566934 | DATA VERIFICATION METHOD AND SYSTEM, AND EDGE-END DEVICE | December 2023 | September 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18526235 | SYSTEMS AND METHODS FOR EFFICIENT CONTENT PACKAGING | December 2023 | March 2026 | Allow | 27 | 1 | 0 | No | No |
| 18521888 | DEFENDING LARGE GENERATIVE MODELS FROM PROMPT INJECTION ATTACKS | November 2023 | August 2025 | Allow | 21 | 0 | 0 | No | No |
| 18510229 | SECURE SERVICE ADVERTISEMENT IN MULTICAST DNS | November 2023 | January 2026 | Allow | 26 | 2 | 0 | No | No |
| 18386362 | SYSTEM AND METHOD FOR COMMENT PERMISSIONS | November 2023 | February 2026 | Allow | 28 | 5 | 0 | Yes | No |
| 18481441 | ENTERPRISE DOCUMENT CLASSIFICATION | October 2023 | August 2025 | Allow | 22 | 2 | 0 | Yes | No |
| 18476453 | END-TO-END TAGGING AND TRACKING OF EVENT SIGNALS SUBJECT TO PRIVACY POLICIES | September 2023 | March 2025 | Allow | 18 | 1 | 0 | No | No |
| 18370221 | INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING SYSTEM | September 2023 | February 2026 | Allow | 29 | 2 | 0 | No | No |
| 18470407 | WEARABLE ARTICLE WITH INTEGRATED DISPLAY FOR DISPLAYING CRYPTOGRAPHICALLY SECURED DIGITAL IMAGES | September 2023 | April 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18244244 | EXTENSION OF NETWORK CONTROL SYSTEM INTO PUBLIC CLOUD | September 2023 | July 2025 | Allow | 23 | 1 | 0 | No | No |
| 18461417 | SYSTEM AND METHOD FOR FIREWALL POLICY RULE MANAGEMENT | September 2023 | November 2024 | Allow | 14 | 3 | 0 | Yes | No |
| 18456613 | DETECTING SENSITIVE INFORMATION IN IMAGES | August 2023 | January 2026 | Abandon | 29 | 1 | 0 | No | No |
| 18232692 | METHOD FOR DATA PROTECTION ACROSS SHARING PLATFORMS | August 2023 | March 2025 | Allow | 20 | 3 | 0 | Yes | No |
| 18356739 | CRYPTOGRAPHIC AGILITY FOR DATA STORAGE | July 2023 | January 2026 | Abandon | 30 | 1 | 0 | No | No |
| 18353618 | AUTOMATED DETECTION, REDACTION, AND REPORTING OF SENSITIVE INFORMATION | July 2023 | July 2025 | Allow | 24 | 0 | 0 | No | No |
| 18345436 | DOCUMENT PERMISSION PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | June 2023 | January 2025 | Allow | 18 | 3 | 0 | No | No |
| 18216403 | DASHBOARD CAMERA AND ASSOCIATED CLOUD STORAGE SERVICE HAVING INTEGRATED FILE VALIDATION | June 2023 | March 2025 | Allow | 21 | 0 | 0 | No | No |
| 18343020 | Data Encryption Method | June 2023 | March 2025 | Allow | 21 | 0 | 0 | No | No |
| 18212120 | SYSTEM AND METHOD FOR MONITORING DATA INPUT INTO MACHINE LEARNING MODELS | June 2023 | May 2024 | Allow | 10 | 2 | 0 | Yes | No |
| 18207419 | Methods and Systems for Efficient Adaptive Logging of Cyber Threat Incidents | June 2023 | June 2024 | Allow | 12 | 1 | 0 | No | No |
| 18329483 | Automatic Protection of Partial Document Content | June 2023 | September 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18205911 | OPEN SOURCE LIBRARY SECURITY RATING | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18327941 | METHOD FOR DETECTING VULNERABILITIES IN SOFTWARE | June 2023 | August 2024 | Allow | 14 | 0 | 0 | No | No |
| 18325723 | DIGITAL DOCUMENT SEAL | May 2023 | November 2025 | Allow | 29 | 2 | 0 | Yes | No |
| 18202284 | MODIFICATION OF DEVICE BEHAVIOR FOR USE IN SECURE NETWORKING | May 2023 | August 2024 | Abandon | 15 | 1 | 0 | No | No |
| 18201448 | THREAT ACTOR IDENTIFICATION SYSTEMS AND METHODS | May 2023 | June 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18319949 | SYSTEM AND METHOD FOR SECURITY SUITE CONCATENATING VALIDATION ELEMENTS FOR BLOCKCHAIN BINDING OPERATIONS | May 2023 | October 2023 | Allow | 5 | 1 | 0 | No | No |
| 18196266 | CONTRIBUTION SIGNATURES FOR TAGGING | May 2023 | March 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18195963 | Method and System for Early Detection of Malicious Behavior Based Using Self-Supervised Learning | May 2023 | October 2025 | Allow | 29 | 1 | 0 | No | No |
| 18248983 | MAPPING A TANGIBLE INSTANCE OF A DOCUMENT | April 2023 | January 2026 | Allow | 33 | 2 | 0 | Yes | No |
| 18134122 | Unauthorized Activity Detection Based on User Agent String | April 2023 | November 2025 | Allow | 31 | 2 | 0 | No | No |
| 18133289 | WEBSITE SECURITY WITH DECEPTIVE RESPONSES | April 2023 | November 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 18132760 | MITIGATION OF ROUTE HIJACKING TECHNIQUES IN A NETWORK | April 2023 | October 2025 | Abandon | 30 | 4 | 0 | No | No |
| 18132756 | Secure Methods, Systems, And Media For Generating And Verifying User Credentials | April 2023 | April 2024 | Allow | 12 | 1 | 0 | No | No |
| 18130638 | APPARATUS AND METHODS FOR SELECTIVELY REVEALING DATA | April 2023 | May 2024 | Abandon | 13 | 1 | 0 | No | No |
| 18187206 | STORED IMAGE PRIVACY VIOLATION DETECTION METHOD AND SYSTEM | March 2023 | January 2024 | Allow | 10 | 2 | 0 | No | No |
| 18122914 | SELECTIVE REDACTION AND ACCESS CONTROL FOR DOCUMENT SEGMENTS | March 2023 | January 2026 | Abandon | 34 | 2 | 1 | No | No |
| 18118862 | METHODS AND SYSTEMS FOR HIGHLY SECURE DATA ANALYTIC ENCRYPTION AND DETECTION AND EXTRACTION OF TRUTHFUL CONTENT | March 2023 | April 2025 | Allow | 25 | 0 | 1 | Yes | No |
| 18178090 | PROTECTION OF PUBLIC-FACING COMPUTING ASSETS OF AN ORGANIZATION | March 2023 | March 2025 | Allow | 24 | 0 | 0 | No | No |
| 18023703 | SYSTEMS AND METHODS FOR PROTECTING MACHINE LEARNING MODELS AGAINST ADVERSARIAL ATTACKS | February 2023 | January 2025 | Allow | 22 | 0 | 0 | No | No |
| 18108200 | SYSTEMS AND METHODS FOR SIDE-CHANNEL MONITORING OF A LOCAL NETWORK | February 2023 | December 2023 | Allow | 10 | 1 | 0 | No | No |
| 18105360 | Disabling Executable Instructions from a Network Message | February 2023 | February 2025 | Allow | 25 | 1 | 0 | No | No |
| 18158395 | EXPLORATION AND ACCESS TO ELECTRONIC DATA ASSETS | January 2023 | March 2025 | Allow | 26 | 0 | 0 | No | No |
| 18017159 | PROVIDING WI-FI PROTECTED SETUP (WPS) BY SENDING A CODE TO A NETWORK DEVICE USING A PHONE | January 2023 | July 2025 | Allow | 30 | 2 | 0 | No | No |
| 18157596 | SHARING AND REQUESTING PRIVATE DATA USING CRYPTOGRAPHY | January 2023 | May 2025 | Allow | 28 | 0 | 1 | No | No |
| 18098102 | SECURE DOCUMENT MANAGEMENT SYSTEMS | January 2023 | August 2023 | Allow | 6 | 2 | 0 | Yes | No |
| 18095353 | DETECTING SUSPICIOUS FILE ACTIVITY | January 2023 | August 2023 | Allow | 8 | 1 | 0 | No | No |
| 18093184 | POWER LINE COMMUNICATION CHANNEL IMPULSE RESPONSE MULTILEVEL QUANTIZATION FOR PHYSICAL LAYER SECURITY | January 2023 | October 2024 | Allow | 22 | 0 | 0 | No | No |
| 18148125 | NEIGHBOR AWARENESS NETWORKING PAIRING TERMINATION | December 2022 | September 2025 | Allow | 32 | 2 | 0 | No | No |
| 18145717 | METHOD FOR ANTI-TAMPERING APPARATUS SERVICING DATA AND SYSTEM THEREOF | December 2022 | December 2024 | Allow | 24 | 0 | 0 | No | No |
| 18145788 | DYNAMIC SECURITY ACTIONS FOR NETWORK TUNNELS AGAINST SPOOFING | December 2022 | September 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 18011620 | CONSENSUS METHOD FOR A DISTRIBUTED DATABASE | December 2022 | April 2023 | Allow | 4 | 0 | 0 | No | No |
| 18062463 | SHARING WITH MULTIPLE PEOPLE ACCESS TO ONE OR MORE RESOURCES EACH CONVEYED IN A SINGLE NFT | December 2022 | September 2023 | Allow | 9 | 0 | 0 | Yes | No |
| 18061890 | Blockchain Escrow and Auditing Service | December 2022 | September 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 18075121 | Methods and Systems for Efficient Adaptive Logging of Cyber Threat Incidents | December 2022 | March 2023 | Allow | 3 | 0 | 0 | No | No |
| 18056745 | COMMUNICATION DEVICE, VEHICLE, COMMUNICATION METHOD, AND RECORDING MEDIUM RECORDED WITH PROGRAM | November 2022 | July 2025 | Allow | 32 | 2 | 0 | No | No |
| 17925081 | METHOD FOR ROUTING ACCESS, USER EQUIPMENT, AND STORAGE MEDIUM | November 2022 | May 2025 | Allow | 30 | 1 | 0 | No | No |
| 17997511 | ENCRYPTED VERIFIABLE CREDENTIALS | October 2022 | September 2024 | Allow | 23 | 0 | 0 | No | No |
| 18050184 | DATA DISCOVERY AND GENERATION OF LIVE DATA MAP FOR INFORMATION PRIVACY | October 2022 | August 2023 | Allow | 9 | 0 | 0 | No | No |
| 17973803 | PROVISIONING MULTIPLE PLATFORM ROOT OF TRUST ENTITIES OF A HARDWARE DEVICE USING ROLE-BASED IDENTITY CERTIFICATES | October 2022 | September 2024 | Allow | 23 | 0 | 0 | No | No |
| 17972549 | SECURE FAST CHANNEL CHANGE | October 2022 | November 2023 | Allow | 12 | 1 | 0 | No | No |
| 17971961 | METHODS AND SYSTEMS FOR DETERMINING THE AUTHENTICITY OF AN IDENTITY DOCUMENT | October 2022 | May 2023 | Allow | 6 | 0 | 0 | No | No |
| 17964811 | ENCRYPTION KEY BASED ON SYSTEM CLOCK CHARACTERISTICS | October 2022 | September 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17954121 | SHARING WITH MULTIPLE PEOPLE ACCESS TO ONE OR MORE RESOURCES EACH CONVEYED IN A SINGLE NFT | September 2022 | August 2025 | Abandon | 34 | 0 | 1 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LITTLE, VANCE M.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 83.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LITTLE, VANCE M works in Art Unit 2494 and has examined 165 patent applications in our dataset. With an allowance rate of 91.5%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 28 months.
Examiner LITTLE, VANCE M's allowance rate of 91.5% places them in the 76% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by LITTLE, VANCE M receive 1.48 office actions before reaching final disposition. This places the examiner in the 25% percentile for office actions issued. This examiner issues significantly fewer office actions than most examiners.
The median time to disposition (half-life) for applications examined by LITTLE, VANCE M is 28 months. This places the examiner in the 68% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +6.9% benefit to allowance rate for applications examined by LITTLE, VANCE M. This interview benefit is in the 35% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 34.3% of applications are subsequently allowed. This success rate is in the 76% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 42.9% of cases where such amendments are filed. This entry rate is in the 65% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 150.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 89% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 90% percentile among all examiners. Of these withdrawals, 83.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 45.5% are granted (fully or in part). This grant rate is in the 39% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 22% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.