Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19082761 | NEURAL NETWORK-BASED SECURITY DEFENSE METHOD FOR ENCRYPTED MULTIMEDIA DATA, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT | March 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19067972 | Secure and Scalable Model Splicing of Digital Engineering Models for Software-Code-Defined Digital Threads | March 2025 | April 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19048457 | EVALUATING SECURITY POLICIES IN AGGREGATE | February 2025 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19031211 | WAPI TRUSTED WIRELESS LOCAL AREA NETWORK DEVICE | January 2025 | March 2025 | Allow | 2 | 0 | 0 | No | No |
| 18988185 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON RISK SCORE ANALYSIS AND METHODS OF USE THEREOF | December 2024 | March 2025 | Allow | 3 | 1 | 0 | No | No |
| 18981637 | SYSTEM AND METHOD FOR DISTRIBUTED EDGE-CLOUD HOMOMORPHIC COMPRESSION USING ADAPTIVE NEURAL NETWORKS | December 2024 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18962126 | SYSTEMS AND METHODS OF DIGITAL RIGHTS MANAGEMENT | November 2024 | June 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18922798 | Directory Service Recommender Assessment & Scoring | October 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18906462 | Cybersecurity Protection and Recovery Capability Measurement System | October 2024 | April 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18903573 | RISK SCORING OF CLOUD PERMISSION ASSIGNMENTS USING SUPERVISED MACHINE LEARNING | October 2024 | January 2025 | Allow | 3 | 0 | 0 | No | No |
| 18893774 | Artificially Intelligent Systems and Methods for Managing Data Security | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18888941 | TECHNIQUE AND METHOD FOR DETECTION AND DISPLAY OF THE CYBERSECURITY RISK CONTEXT OF A CLOUD ENVIRONMENT | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18887627 | REMOTE COMPUTER NETWORK SECURITY TESTING | September 2024 | February 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 18827265 | POLICY SELECTION SYSTEM | September 2024 | April 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18812238 | ACCESS LIMITING METHOD, APPARATUS AND DEVICE FOR METADATA SERVER | August 2024 | May 2025 | Allow | 9 | 2 | 0 | No | No |
| 18812503 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT AND METHODS OF USE THEREOF | August 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18805871 | DOMAIN NAME ENCRYPTION METHOD, DECRYPTION METHOD, AND APPARATUS BASED ON CONTENT DELIVERY NETWORK | August 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18800166 | MICROGRID SELF-TRIGGERING CONTROL METHOD AND SYSTEM FOR RESISTING FDI ATTACKS | August 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18795592 | AUTOMATED DISCOVERY AND EVALUATION OF VULNERABILITY HOTSPOTS IN COMPUTER NETWORKS | August 2024 | October 2024 | Allow | 2 | 0 | 0 | No | No |
| 18785813 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON RISK SCORE ANALYSIS AND METHODS OF USE THEREOF | July 2024 | November 2024 | Allow | 3 | 0 | 0 | No | No |
| 18783154 | CELLULAR IoT SECURITY USING DYNAMIC POLICY-DRIVEN MECHANISMS FOR THREAT MITIGATION | July 2024 | September 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18778183 | SYSTEMS AND METHODS FOR ANALYZING SPEECH DATA TO REMOVE SENSITIVE DATA | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18769693 | System, Method, and Apparatus for Initiating Outbound Communications From a User Device | July 2024 | January 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18760297 | SYSTEMS, METHODS, AND DEVICES FOR MULTI-STAGE PROVISIONING AND MULTI-TENANT OPERATION FOR A SECURITY CREDENTIAL MANAGEMENT SYSTEM | July 2024 | January 2025 | Allow | 7 | 0 | 0 | No | No |
| 18756812 | SYSTEM AND METHOD FOR SECURITY PROTECTION OF NAS MESSAGES | June 2024 | February 2025 | Allow | 7 | 0 | 0 | No | No |
| 18755777 | Cloud security control platform that enforces scope-based security controls | June 2024 | December 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18755627 | CODEBOOK-BASED HOMOMORPHIC ENCRYPTION FOR EFFICIENT AND PRIVACY-PRESERVING DATA PROCESSING | June 2024 | August 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18742234 | SECURITY MODEL UTILIZING MULTI-CHANNEL DATA WITH VULNERABILITY REMEDIATION CIRCUITRY | June 2024 | June 2025 | Allow | 12 | 1 | 0 | No | No |
| 18742430 | CONFERENCE SECURITY FOR USER GROUPS | June 2024 | June 2025 | Allow | 12 | 1 | 0 | No | No |
| 18741445 | NETWORK CONFIGURATION ANALYSIS AND MANAGEMENT | June 2024 | February 2025 | Allow | 8 | 0 | 0 | Yes | No |
| 18737090 | OBFUSCATION | June 2024 | November 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18680722 | END-TO-END ENCRYPTION WITH DISTRIBUTED KEY MANAGEMENT IN A TRACKING DEVICE ENVIRONMENT | May 2024 | March 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18673681 | MANAGING VERSION SHARING IN A DATA EXCHANGE | May 2024 | June 2025 | Allow | 13 | 0 | 0 | No | No |
| 18672978 | INTRUSION DETECTION USING A HEARTBEAT | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18672749 | SYSTEM AND METHOD FOR DETECTING CYBERSECURITY RISKS IN MANAGED ARTIFICIAL INTELLIGENCE MODELS | May 2024 | December 2024 | Allow | 7 | 1 | 0 | No | No |
| 18669528 | CYBERSECURITY ARCHITECTURES FOR MULTI-CONTEXTUAL RISK QUANTIFICATION | May 2024 | September 2024 | Allow | 4 | 0 | 0 | No | No |
| 18667464 | SYSTEMS AND METHODS FOR SECURITY PROCESS ANALYSIS | May 2024 | October 2024 | Allow | 5 | 1 | 0 | No | No |
| 18665954 | DISTRIBUTED PRIVACY-PRESERVING COMPUTING ON PROTECTED DATA | May 2024 | July 2025 | Allow | 14 | 1 | 0 | No | No |
| 18651556 | AGGREGATED AUTHORIZATION TOKEN | April 2024 | September 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18649846 | SYSTEMS AND METHODS FOR EFFICIENT AND SECURE PROCESSING, ACCESSING AND TRANSMISSION OF DATA VIA A BLOCKCHAIN NETWORK | April 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18649529 | TECHNIQUES FOR CIRCUMVENTING PROVIDER-IMPOSED LIMITATIONS IN SNAPSHOT INSPECTION OF DISKS FOR CYBERSECURITY | April 2024 | September 2024 | Allow | 5 | 1 | 0 | No | No |
| 18649633 | UNIVERSAL AUTHENTICATOR APPARATUS FOR OBTAINING HOST SERVICES | April 2024 | September 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18643874 | MOBILE ENROLLMENT USING A KNOWN BIOMETRIC | April 2024 | November 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18634199 | Non-Persistent Data Caching Web Server | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18630430 | ALTERNATIVE APPROACH TO THE GENERATION OF A UNIQUE RESPONSE TO A CHALLENGE | April 2024 | August 2024 | Allow | 4 | 1 | 0 | No | No |
| 18629254 | SYSTEM AND METHOD FOR SECURE ACCESS CONTROL | April 2024 | April 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18628343 | SYSTEMS AND METHODS FOR CONFIGURATION LOCKING | April 2024 | January 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18627926 | SYSTEMS AND METHODS FOR POSTURE-BASED MODELING | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18628314 | SYSTEMS AND METHODS FOR SECURITY INTELLIGENCE EXCHANGE | April 2024 | August 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18698636 | COHERENT IMAGE ENCRYPTION | April 2024 | August 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18621751 | Generative Artificial Intelligence Model Personally Identifiable Information Detection and Protection | March 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18622676 | SYSTEMS AND METHODS FOR AUTOMATED RISK-BASED NETWORK SECURITY FOCUS | March 2024 | November 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18618684 | TECHNIQUE AND METHOD FOR DETECTION AND DISPLAY OF THE CYBERSECURITY RISK CONTEXT OF A CLOUD ENVIRONMENT | March 2024 | October 2024 | Allow | 6 | 1 | 0 | No | No |
| 18612055 | STATED AGE FILTER | March 2024 | March 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18612921 | ADVANCED DEIDENTIFICATION OF INFORMATION, SUCH AS INFORMATION ABOUT A PERSON | March 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18605359 | SYSTEM, METHOD, AND PROGRAM FOR PROVIDING VIRTUAL CODE, VIRTUAL CODE GENERATING DEVICE, AND VIRTUAL CODE VERIFYING DEVICE | March 2024 | April 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18600073 | SECURITY ARCHITECTURE FOR INTERCONNECTED DIGITAL ENGINEERING AND CERTIFICATION ECOSYSTEM | March 2024 | May 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18600282 | System and Method for Outlier and Anomaly Detection in Identity Management Artificial Intelligence Systems Using Cluster Based Analysis of Network Identity Graphs | March 2024 | April 2025 | Allow | 14 | 0 | 0 | Yes | No |
| 18600442 | Attack Path and Graph Creation Based on User and System Profiling | March 2024 | May 2025 | Allow | 14 | 1 | 0 | No | No |
| 18595625 | IDENTIFYING LEGITIMATE WEBSITES TO REMOVE FALSE POSITIVES FROM DOMAIN DISCOVERY ANALYSIS | March 2024 | February 2025 | Allow | 12 | 1 | 0 | No | No |
| 18592137 | ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFIC | February 2024 | May 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18587821 | TUNNELLING WITH SUPPORT FOR DYNAMIC NAMING RESOLUTION | February 2024 | April 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18587346 | AI-Based Vehicle Cybersecurity with 5G/6G Sub-Network Topology | February 2024 | November 2024 | Allow | 9 | 1 | 1 | No | No |
| 18584670 | SYSTEM AND METHOD FOR DETECTING CYBERSECURITY RISKS IN MANAGED ARTIFICIAL INTELLIGENCE MODELS | February 2024 | May 2024 | Allow | 2 | 1 | 0 | No | No |
| 18443896 | DETECTING RANSOMWARE IN MONITORED DATA | February 2024 | February 2025 | Allow | 12 | 1 | 0 | No | No |
| 18435762 | TECHNIQUES FOR CYBERSECURITY RISK-BASED FIREWALL CONFIGURATION | February 2024 | August 2024 | Allow | 6 | 1 | 0 | No | No |
| 18429175 | MIDDLE-WARE ARTIFICIAL INTELLIGENCE (AI) ENGINE | January 2024 | July 2024 | Allow | 6 | 1 | 0 | No | No |
| 18416122 | Method and System for Cheon Resistant Static Diffie-Hellman Security | January 2024 | March 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18416439 | ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFIC | January 2024 | March 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18414137 | SERVICE ASSURANCE VIA FEDERATION-BASED NETWORK DURING ROAMING | January 2024 | November 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18410625 | SYSTEMS AND METHODS FOR MALWARE DETECTION IN PORTABLE EXECUTABLE FILES | January 2024 | June 2024 | Allow | 5 | 1 | 0 | No | No |
| 18408909 | AI-DRIVEN INTEGRATION PLATFORM AND USER-ADAPTIVE INTERFACE FOR BUSINESS RELATIONSHIP ORCHESTRATION | January 2024 | October 2024 | Allow | 9 | 1 | 0 | No | No |
| 18408878 | AI-DRIVEN INTEGRATION PLATFORM AND USER-ADAPTIVE INTERFACE FOR BUSINESS RELATIONSHIP ORCHESTRATION | January 2024 | October 2024 | Allow | 9 | 1 | 0 | No | No |
| 18409412 | DEVICE VISIBILITY AND SCANNING INCLUDING NETWORK SEGMENTS | January 2024 | April 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18399225 | REAL-TIME MITIGATIVE SECURITY ARCHITECTURE | December 2023 | May 2025 | Abandon | 17 | 1 | 0 | No | No |
| 18395745 | SCAN CHAIN SECURITY CIRCUIT AND DRIVING METHOD THEREOF | December 2023 | July 2025 | Allow | 18 | 0 | 0 | No | No |
| 18395400 | BUSINESS EMAIL COMPROMISE DETECTION SYSTEM | December 2023 | June 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18392878 | SYSTEMS AND METHODS FOR FEDERATED SEARCHES OF ASSETS IN DISPARATE DAM REPOSITORIES | December 2023 | July 2024 | Allow | 7 | 0 | 0 | No | No |
| 18389730 | Threat Disposition Analysis and Modeling Using Supervised Machine Learning | December 2023 | February 2025 | Allow | 14 | 1 | 0 | No | No |
| 18545960 | COMPLEX NETWORK ATTACK DETECTION METHOD BASED ON CROSS-HOST ABNORMAL BEHAVIOR RECOGNITION | December 2023 | April 2024 | Allow | 4 | 1 | 0 | No | No |
| 18572088 | COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR CHECKING DATA ANONYMIZATION | December 2023 | June 2024 | Allow | 6 | 0 | 0 | No | No |
| 18543497 | SYSTEM AND METHOD FOR GENERATING CYBERSECURITY REMEDIATION IN COMPUTING ENVIRONMENTS | December 2023 | July 2024 | Allow | 7 | 1 | 0 | No | No |
| 18542848 | VALIDATED TELEMETRY IN A ZERO-TRUST COMPUTING ENVIRONMENT | December 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18539989 | ELLIPTIC CURVE RANDOM NUMBER GENERATION | December 2023 | February 2025 | Allow | 14 | 1 | 0 | No | No |
| 18538955 | Method and Device for Spatially Designating Private Content | December 2023 | October 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18532335 | NON-REPUDIABLE PROOF OF DIGITAL IDENTITY VERIFICATION | December 2023 | May 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18531600 | PUBLIC KEY INFRASTRUCTURE USING QUANTUM COMPUTERS (PKIQC) | December 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18528893 | SECURING NODE GROUPS | December 2023 | April 2025 | Allow | 17 | 1 | 0 | No | No |
| 18527258 | SOCIAL MEDIA PROFILE IDENTIFICATION CONNECTED TO CRYPTOGRAPHIC TOKEN | December 2023 | July 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18519076 | METHOD FOR AUTHENTICATING USER FOR eKYC AUTOMATION | November 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18563447 | DEVICES, SYSTEMS, AND METHODS FOR STANDARDIZING AND STREAMLINING THE DEPLOYMENT OF SECURITY INFORMATION AND EVENT MANAGEMENT ARTIFACTS FOR MULTIPLE TENANTS | November 2023 | May 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18516088 | RANDOM NUMBER GENERATION SYSTEMS AND METHODS | November 2023 | August 2024 | Allow | 9 | 0 | 0 | No | No |
| 18516520 | HOMOMORPHIC ENCRYPTION FOR WEB APPLICATION FIREWALL PROCESSING | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18515410 | ADAPTIVE ARTIFICIAL INTELLIGENCE SYSTEMS AND METHODS FOR TOKEN VERIFICATION | November 2023 | June 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18510913 | Cyber Vulnerability Assessment Tool Threat Assessment Heuristic | November 2023 | February 2025 | Allow | 15 | 1 | 0 | No | No |
| 18510310 | BLOCKCHAIN DATA PROCESSING METHOD, APPARATUS, AND DEVICE, COMPUTER-READABLE STORAGE MEDIUM, AND COMPUTER PROGRAM PRODUCT | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18507015 | CONVERSATION MERGING FOR ELECTRONIC DEVICES | November 2023 | October 2024 | Allow | 11 | 1 | 0 | No | No |
| 18506318 | SYSTEMS AND METHODS OF SECURE PIN CODE ENTRY | November 2023 | September 2024 | Allow | 11 | 1 | 0 | No | No |
| 18505391 | COMMUNICATION METHOD AND APPARATUS | November 2023 | May 2025 | Allow | 18 | 0 | 0 | No | No |
| 18387624 | METHOD AND SYSTEM FOR GENERATING CRYPTOGRAPHIC KEYS ASSOCIATED WITH BIOLOGICAL EXTRACTION DATA | November 2023 | May 2025 | Allow | 18 | 0 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2431.
With a 32.8% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 34.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2431 is part of Group 2430 in Technology Center 2400. This art unit has examined 10,053 patent applications in our dataset, with an overall allowance rate of 84.5%. Applications typically reach final disposition in approximately 29 months.
Art Unit 2431's allowance rate of 84.5% places it in the 78% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.
Applications in Art Unit 2431 receive an average of 1.79 office actions before reaching final disposition (in the 47% percentile). The median prosecution time is 29 months (in the 49% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.