Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19370903 | SELECTING A MALWARE SCANNER FROM MULTIPLE MALWARE SCANNERS | October 2025 | March 2026 | Allow | 4 | 0 | 0 | No | No |
| 19347347 | SYSTEM AND A METHOD FOR IDENTIFYING PRIVATE USER INFORMATION | October 2025 | February 2026 | Allow | 4 | 0 | 0 | Yes | No |
| 19315759 | GENERATING, USING ARTIFICIAL INTELLIGENCE, TEST DATA TO TEST MALWARE SCANNER(S) | September 2025 | January 2026 | Allow | 4 | 0 | 0 | Yes | No |
| 19301013 | SALTED BLOOM FILTERS FOR PEER-TO-PEER DATA DISSEMINATION | August 2025 | December 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 19286965 | Real Time Translation System and Method Involving Burdened and Unburdened Content | July 2025 | November 2025 | Allow | 3 | 0 | 1 | No | No |
| 19280803 | AI-DRIVEN COMPLIANCE MAPPING FOR REGULATORY STANDARDS | July 2025 | January 2026 | Allow | 5 | 1 | 0 | Yes | No |
| 19261964 | REFLEX-REACTION SERVER LEAKAGE CONTAINMENT SYSTEM | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19232164 | TOKENIZATION WITH FORMAT PRESERVATION | June 2025 | November 2025 | Allow | 5 | 1 | 0 | No | No |
| 19227656 | SYSTEMS AND METHODS FOR MALWARE DETECTION IN PORTABLE EXECUTABLE FILES | June 2025 | October 2025 | Allow | 4 | 1 | 0 | No | No |
| 19228045 | STATEFUL API ATTACKS DETECTION | June 2025 | December 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19180193 | SECURITY CALCULATION METHOD AND SYSTEM FOR SIDE CHANNEL RESISTANCE BASED ON DATA MARKING | April 2025 | November 2025 | Allow | 7 | 1 | 0 | No | No |
| 19116990 | Secure Learning System | March 2025 | October 2025 | Allow | 7 | 1 | 0 | No | No |
| 19084548 | Ransomware Behavioral Kernel Model | March 2025 | June 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 19068128 | REAL TIME TRANSLATION SYSTEM AND METHOD INVOLVING BURDENED AND UNBURDENED CONTENT | March 2025 | January 2026 | Abandon | 10 | 2 | 0 | Yes | No |
| 19059945 | SYSTEMS AND METHODS FOR AUTOMATICALLY TUNING ONE OR MORE API POLLERS IN A CYBERSECURITY EVENT DETECTION AND RESPONSE SERVICE | February 2025 | September 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19057964 | SYSTEMS AND METHODS FOR A CONNECTED COMPUTING RESOURCE AND EVENT/ACTIVITY IDENTIFICATION INFORMATION INFRASTRUCTURE USING NEAR EXISTENTIAL OR EXISTENTIAL BIOMETRIC IDENTIFICATION OF HUMANS | February 2025 | July 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 19029931 | SYSTEM AND METHOD FOR LOADING ENCLAVE-AWARE EXECUTABLES | January 2025 | February 2026 | Allow | 13 | 1 | 1 | Yes | No |
| 19017057 | INFORMATION PROCESSING DEVICE AND METHOD FOR CONTROLLING INFORMATION PROCESSING DEVICE | January 2025 | January 2026 | Abandon | 12 | 2 | 0 | Yes | No |
| 19014025 | CUSTOM LOSS FUNCTIONS FOR TRAINING MODELS FOR CYBERSECURITY APPLICATIONS | January 2025 | June 2025 | Allow | 5 | 1 | 0 | No | No |
| 19003927 | USER CALIBRATION OF A MACHINE LEARNING MODEL TO RECOGNIZE NEURAL ACTIVITIES, AND APPLICATIONS THEREOF | December 2024 | May 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19000677 | SYSTEMS AND METHODS FOR EXECUTING AN ANALYTICAL OPERATION ACROSS A PLURALITY OF COMPUTER PROCESSES | December 2024 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18991584 | Systems and Methods for Updating and Distributing Information Associated with an Individual | December 2024 | October 2025 | Allow | 10 | 2 | 0 | No | No |
| 18984909 | ALARM MESSAGE PROCESSING METHOD, SYSTEM, DEVICE, AND MEDIUM | December 2024 | July 2025 | Allow | 7 | 1 | 0 | No | No |
| 18962559 | CYBERSECURITY THREAT DETECTION UTILIZING SENSOR-BASED AGGREGATED RUNTIME EXECUTION DATA | November 2024 | June 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18907977 | METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF | October 2024 | December 2024 | Allow | 2 | 2 | 0 | Yes | No |
| 18903977 | TECHNOLOGIES FOR TRUSTED I/O PROTECTION OF I/O DATA WITH HEADER INFORMATION | October 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18887722 | ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPE | September 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18885799 | System and Method for Efficient Malicious Code Detection and Malicious Open-Source Software Package Detection Using Large Language Models | September 2024 | January 2025 | Allow | 4 | 0 | 1 | Yes | No |
| 18885585 | DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT SELECTIONS | September 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18823336 | METHOD AND SYSTEM FOR PROVIDING A SECURE COMMUNICATION | September 2024 | February 2026 | Allow | 17 | 1 | 0 | No | No |
| 18817848 | METHOD AND SYSTEM FOR ENHANCING REAL-TIME GRID SECURITY OF POWER SYSTEM | August 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18811449 | METHOD FOR UNLOCKING AN ELECTRONIC DEVICE | August 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18809220 | SYSTEMS AND METHODS FOR PROVIDING CONTAINERIZED APPLICATIONS WITH UPDATED SECRET VALUES | August 2024 | January 2026 | Allow | 17 | 0 | 0 | No | No |
| 18795244 | Detecting Security Vulnerabilities Associated with Transient Radio Frequency Devices | August 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18793122 | SYSTEMS AND METHODS FOR GENERATING ACCOUNT PERMISSIONS BASED ON APPLICATION PROGRAMMING INTERFACE INTERACTIONS | August 2024 | May 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 18792444 | Generative AI Model Protection using Sidecars | August 2024 | December 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18787274 | PROVIDING RANDOM NUMBERS OVER AN INSECURE CHANNEL USING DISGUISED CYPHERTEXTS | July 2024 | January 2026 | Allow | 18 | 0 | 0 | No | No |
| 18780721 | SYSTEM FOR REAL-TIME AUTHENTICATED OBFUSCATION OF ELECTRONIC DATA | July 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18769102 | REFLEX-REACTION SERVER LEAKAGE CONTAINMENT SYSTEM | July 2024 | June 2025 | Allow | 12 | 2 | 0 | Yes | No |
| 18760945 | METHOD AND SYSTEM OF PROVIDING ACCESS TO DOCUMENTS STORED IN PERSONAL STORAGE MEDIUMS | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18758874 | SYSTEM AND METHODS FOR DATA ENCRYPTION AND APPLICATION-AGNOSTIC QUERYING OF ENCRYPTED DATA | June 2024 | January 2026 | Allow | 19 | 0 | 0 | No | No |
| 18757198 | INTELLIGENT AI RISK MANAGEMENT FRAMEWORK | June 2024 | December 2024 | Allow | 5 | 0 | 1 | Yes | No |
| 18751956 | Multiplexing Encrypted Tunnels | June 2024 | February 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18750942 | SERVICE PROVIDING SYSTEM AND METHOD FOR SECURITY OF DATA BASED ON WEB BROWSER | June 2024 | September 2025 | Allow | 15 | 0 | 0 | No | No |
| 18748596 | ADDING POLICY CODING TO PACKET HEADERS TO USE TO ACCESS RESOURCES IN A SECURE NETWORK | June 2024 | January 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18744505 | SYSTEMS AND METHODS FOR AUTHENTICATION AND AUTHORIZATION FOR SOFTWARE LICENSE MANAGEMENT | June 2024 | December 2025 | Allow | 18 | 2 | 0 | No | No |
| 18743399 | ITEM TRACKING WITH A WIRELESS COMMUNICATION SYSTEM BASED ON A FIFTH GENERATION IDENTIFIER (5GID) AND A GLOBAL TRACKING ITEM NUMBER (GTIN) | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18743002 | DOCUMENT CREATION AND MANAGEMENT SYSTEM | June 2024 | September 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18741768 | PERFORMING A SECURITY ACTION BASED ON A SUSPICIOUS CROSS AUTHORIZATION EVENT | June 2024 | August 2025 | Allow | 15 | 0 | 0 | No | No |
| 18718126 | ACCESS CONTROL APPARATUS, ACCESS CONTROL METHOD, AND PROGRAM | June 2024 | September 2025 | Allow | 15 | 0 | 0 | No | No |
| 18735593 | METHODS AND SYSTEMS FOR DETECTING INADVERTENT UNAUTHORIZED ACCOUNT ACCESS | June 2024 | July 2025 | Allow | 13 | 1 | 0 | No | No |
| 18733034 | JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTION | June 2024 | February 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18715965 | UNIVERSAL QUANTUM SECURE DEVICE, METHOD OF SENDING DATA AND METHOD OF RECEIVING DATA | June 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18680718 | STRUCTURING IPV6 ADDRESSES INTO BIT FIELDS TO EMBED LANGUAGE LOCALIZATION AND SERVICES | May 2024 | March 2026 | Allow | 21 | 1 | 0 | No | No |
| 18680289 | SYSTEMS AND METHODS OF PERFORMING MACHINE LEARNING OPERATIONS USING SECURE ENCLAVES | May 2024 | March 2026 | Allow | 21 | 1 | 0 | No | No |
| 18678673 | CONTROLLED ENVIRONMENT SECURE MEDIA STREAMING SYSTEM | May 2024 | June 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18676304 | SYSTEMS AND METHODS FOR IMPROVING ACCURACY IN RECOGNIZING AND NEUTRALIZING INJECTION ATTACKS IN COMPUTER SERVICES | May 2024 | September 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18672460 | ASYNCHRONOUS SUPERVISION FOR SOVEREIGN CLOUD PLATFORMS | May 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18673183 | UPSTREAM APPROACH FOR SECURE CRYPTOGRAPHY KEY DISTRIBUTION AND MANAGEMENT FOR MULTI-SITE DATA CENTERS | May 2024 | October 2024 | Allow | 5 | 0 | 0 | No | No |
| 18670285 | RADIO ACCESS NODES AND TERMINAL DEVICES IN A COMMUNICATION NETWORK | May 2024 | September 2024 | Allow | 4 | 0 | 0 | No | No |
| 18669379 | Generative Artificial Intelligence Model Output Obfuscation | May 2024 | August 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18669491 | SYSTEMS AND METHODS FOR INCREASED SECURITY IN CLUSTER FORMATION | May 2024 | October 2025 | Allow | 17 | 0 | 0 | No | No |
| 18668741 | SYSTEMS AND METHODS FOR IDENTITY VERIFICATION AND AUTHENTICATION | May 2024 | February 2025 | Allow | 9 | 1 | 0 | No | No |
| 18667367 | NETWORK SYSTEM, DEVICE, AND PROCESSING METHOD | May 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18666801 | Static Trusted Execution Environment for Inter-Architecture Processor Program Compatibility | May 2024 | January 2026 | Allow | 20 | 2 | 0 | Yes | No |
| 18659351 | HEADLESS NODE PROGRAMMING SYSTEM | May 2024 | October 2025 | Allow | 17 | 0 | 0 | No | No |
| 18657011 | TRACTION POWER SIMULATION | May 2024 | April 2025 | Abandon | 11 | 1 | 0 | No | No |
| 18655439 | SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK | May 2024 | September 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18652268 | Secure Distributed Samplers for Cryptographic Reference Strings | May 2024 | November 2025 | Allow | 18 | 0 | 0 | No | No |
| 18648987 | SYSTEMS AND METHODS FOR GENERATING SNAPSHOTS BASED ON FILE INPUTS AND OUTPUTS | April 2024 | February 2026 | Allow | 21 | 1 | 0 | No | No |
| 18645395 | Context-Based Risk Assessment for an Identity Verification System | April 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18645125 | STORAGE ACCESS MONITORING METHOD AND STORAGE ACCESS MONITORING DEVICE | April 2024 | March 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18639267 | SYSTEM AND METHOD FOR IMPLEMENTING DATA SOVEREIGNTY SAFEGUARDS IN A DISTRIBUTED SERVICES NETWORK ARCHITECTURE | April 2024 | February 2025 | Allow | 10 | 1 | 0 | Yes | No |
| 18638789 | METHODS FOR FILTERING AND FOR QUALIFYING SECURITY EVENTS OF AN INTRUSION DETECTION SYSTEM | April 2024 | January 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18636918 | SYSTEMS AND METHODS FOR PRIVACY-PRESERVING INVENTORY MATCHING WITH SECURITY AGAINST MALICIOUS ADVERSARIES | April 2024 | December 2024 | Allow | 8 | 1 | 0 | No | No |
| 18634092 | Program Execution Anomaly Detection for CyberSecurity | April 2024 | October 2025 | Allow | 18 | 0 | 0 | No | No |
| 18700529 | THRESHOLD SIGNATURE SCHEME | April 2024 | August 2025 | Allow | 16 | 0 | 0 | No | No |
| 18631768 | LOAD BALANCING NETWORK FOR DYNAMICALLY ADAPTING AND COMMUNICATING DATA | April 2024 | July 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18630360 | SESSION RECOVERY MECHANISM | April 2024 | September 2025 | Allow | 17 | 3 | 0 | Yes | No |
| 18630298 | SECURE MEDIA STREAMING COMMUNICATION VIA USER DATAGRAM PROTOCOL | April 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18631006 | System and method for generating sandbox environments in a computing network | April 2024 | September 2025 | Allow | 17 | 0 | 0 | No | No |
| 18627200 | NUMBER-THEORETIC TRANSFORM ARCHITECTURE FOR LATTICE-BASED CRYPTOGRAPHIC ALGORITHMS | April 2024 | January 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18626083 | SYSTEMS AND METHODS FOR ADDRESSING SECURITY-RELATED VULNERABILITIES ARISING IN RELATION TO OFF-BLOCKCHAIN CHANNELS IN THE EVENT OF FAILURES IN A NETWORK | April 2024 | October 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18624818 | SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE | April 2024 | January 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18622167 | ADVERSARIAL SCRIPT GENERATION USING ARTIFICIAL INTELLIGENCE MODELS | March 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18618519 | ARTIFICIAL INTELLIGENCE BASED INTEGRATION FRAMEWORKS | March 2024 | May 2025 | Allow | 13 | 2 | 0 | No | No |
| 18617981 | GRANTING RESOURCE ACCESS USING INTEGRATION OF SENSITIVITY DATA TAGS | March 2024 | September 2025 | Allow | 18 | 0 | 0 | No | No |
| 18617424 | DETECTING RANSOMWARE | March 2024 | July 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18617219 | ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPE | March 2024 | October 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18615945 | Method and Apparatus for Utilization of Domain Name System for Efficient Certificate Data Retrieval in Plug and Charge Ecosystems | March 2024 | February 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18614589 | SYSTEMS AND METHODS FOR USE IN DATA COUPLING AMONG DATA STRUCTURES | March 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18694041 | AUTHENTICATION SYSTEM, USER DEVICE, AND KEY INFORMATION TRANSMISSION METHOD | March 2024 | December 2025 | Allow | 21 | 1 | 0 | No | No |
| 18608444 | SECURE ARBITRATION MODE TO BUILD AND OPERATE WITHIN TRUST DOMAIN EXTENSIONS | March 2024 | November 2025 | Allow | 20 | 1 | 0 | No | No |
| 18602158 | FIRST FACTOR CONTACTLESS CARD AUTHENTICATION SYSTEM AND METHOD | March 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18602162 | CRYPTO RECOVERY SEED PHRASE STORAGE DEVICE | March 2024 | February 2026 | Allow | 23 | 2 | 0 | No | No |
| 18601747 | QUANTUM KEY DISTRIBUTION FOR SECURE AND PRIVATE TRANSACTIONS | March 2024 | February 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18601012 | Entity Profile Signatures for Improving Malware Detection | March 2024 | January 2026 | Allow | 23 | 1 | 0 | No | No |
| 18600480 | UNIVERSAL PRIVILEGED ACCESS FOR WEB APPLICATIONS THROUGH REMOTE BROWSER ISOLATION | March 2024 | October 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18600516 | BIT-LEVEL DATA EXTRACTION AND THREAT DETECTION | March 2024 | March 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18689281 | ELECTRONIC DEVICE, TRUSTED APPLICATION CALLING METHOD AND APPARATUS, DEVICE, AND MEDIUM | March 2024 | November 2024 | Allow | 8 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2432.
With a 25.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 28.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2432 is part of Group 2430 in Technology Center 2400. This art unit has examined 6,528 patent applications in our dataset, with an overall allowance rate of 75.5%. Applications typically reach final disposition in approximately 38 months.
Art Unit 2432's allowance rate of 75.5% places it in the 47% percentile among all USPTO art units. This art unit has a below-average allowance rate compared to other art units.
Applications in Art Unit 2432 receive an average of 2.24 office actions before reaching final disposition (in the 75% percentile). The median prosecution time is 38 months (in the 20% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.