Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19335440 | Method and System for Securing SCADA and Industrial Control Software through Secure-Write Operations | September 2025 | March 2026 | Allow | 5 | 1 | 0 | Yes | No |
| 19306182 | AUTHENTICATION WITH DYNAMIC USER IDENTIFICATION | August 2025 | December 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 19269404 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | October 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19269354 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | October 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 19269462 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | March 2026 | Allow | 8 | 0 | 0 | Yes | No |
| 19269215 | Management of Connector Services and Connected Artificial Intelligence Agents for Message Senders | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19268594 | Privacy-Preserving Fuzzy Query System and Method | July 2025 | September 2025 | Allow | 2 | 0 | 0 | No | No |
| 19247384 | AUTHENTICATION WITH DYNAMIC USER IDENTIFICATION | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19236071 | AUTOMATED LEAST PRIVILEGE USING RISK AND USAGE | June 2025 | February 2026 | Allow | 8 | 1 | 0 | Yes | No |
| 19234232 | Automated Tool Discovery and Ingestion for Artificial Intelligence Agents | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19233602 | TECHNIQUES FOR SECURING SOFTWARE COMPONENTS THROUGH SECURITY PACKAGES DEFINED IN SOFTWARE IMAGE RECIPES | June 2025 | November 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19223292 | MULTITIERED INTERFACING ARCHITECTURE | May 2025 | August 2025 | Allow | 2 | 1 | 0 | No | No |
| 19222997 | BEHAVIORAL AUTHORSHIP VERIFICATION SYSTEM AND METHOD | May 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19209249 | SYSTEM AND METHOD FOR SEARCHING FOR AND IDENTIFYING UNAUTHORIZED WEBSITES | May 2025 | October 2025 | Allow | 6 | 1 | 0 | No | No |
| 19201966 | SYSTEM AND METHOD FOR REPOSITORY MANAGEMENT | May 2025 | September 2025 | Allow | 4 | 1 | 0 | No | No |
| 19195323 | CONNECTIONLESS-VIRTUAL PRIVATE NETWORK FOR SECURE CLOUD TO USER COMMUNICATION OVER THE INTERNET USING A PLURALITY OF SERVERS | April 2025 | November 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19170041 | Systems and Methods for a Hierarchical Record-Level Security Architecture | April 2025 | July 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 19097965 | AUTHENTICATION WITH DYNAMIC USER IDENTIFICATION | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19091881 | BLOOD FLOW AUTHENTICATION RING | March 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19067812 | Management of Connector Services and Connected Artificial Intelligence Agents for Message Senders | February 2025 | May 2025 | Allow | 2 | 0 | 0 | No | No |
| 19040344 | Method and System for Securing SCADA and Industrial Control Software through Secure-Write Operations | January 2025 | July 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19040357 | Method and System for Securing SCADA and Industrial Control Software through Secure-Write Operations | January 2025 | July 2025 | Allow | 6 | 1 | 0 | No | No |
| 19034984 | METHODS AND SYSTEMS FOR ENHANCING DETECTION OF FRAUDULENT AUTHENTICATION DATA | January 2025 | June 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18831407 | System and method for machine learning and augmented reality based user application | January 2025 | January 2026 | Abandon | 12 | 1 | 0 | No | No |
| 18980850 | Techniques, Machine Intelligence, and Mechanisms for Suspicious Entity Clustering Using Credential Information | December 2024 | June 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18978819 | SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEY | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18976263 | SYSTEMS AND METHODS FOR AUTHENTICATION TO RESOURCE SERVERS | December 2024 | October 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 18963681 | SYSTEMS AND METHODS FOR CONNECTING TO PLURALITY OF SYSTEMS OF RECORD | November 2024 | May 2025 | Allow | 6 | 1 | 0 | No | No |
| 18962991 | PROVIDING ACCESS TO COMPOSITE AI-GENERATED DATA | November 2024 | July 2025 | Allow | 8 | 1 | 0 | No | No |
| 18958426 | SECURITY COMMUNICATION IN PROSE U2N RELAY | November 2024 | August 2025 | Allow | 9 | 2 | 0 | Yes | No |
| 18954166 | SYSTEMS AND METHODS FOR A CONNECTED COMPUTING RESOURCE AND EVENT/ACTIVITY IDENTIFICATION INFORMATION INFRASTRUCTURE USING NEAR EXISTENTIAL OR EXISTENTIAL BIOMETRIC IDENTIFICATION OF HUMANS | November 2024 | March 2026 | Allow | 16 | 1 | 0 | Yes | No |
| 18948343 | Agent Functionality Extensions Using Surveyors | November 2024 | March 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 18946848 | AUTHENTICATION SERVER FOR PROVIDING SERVICE RELATED TO AUTHENTICATION OF COMPANION ANIMAL AND OPERATION METHOD THEREOF | November 2024 | June 2025 | Allow | 7 | 1 | 0 | No | No |
| 18946880 | DERIVING INPUT RESTRICTIONS FOR ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | May 2025 | Allow | 6 | 1 | 0 | No | No |
| 18940845 | SAFETY MANAGEMENT AND CONTROL SYSTEM FOR FULL LIFECYCLE OF INDUSTRIAL CONTROL DATA | November 2024 | February 2025 | Allow | 3 | 1 | 0 | No | No |
| 18923367 | EVENT BASED AUTHENTICATION | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18922304 | SIGNAL PROTECTION AND RETRIEVAL BY NON-LINEAR ANALOG MODULATION | October 2024 | March 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18898450 | USER INTERFACES FOR AUTHENTICATING TO PERFORM SECURE OPERATIONS | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18898536 | ESTABLISHING A DATA SUBSCRIPTION FOR UTILITY USAGE INFORMATION | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18849353 | A SECURE AUTHENTICATION TOKEN | September 2024 | May 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18886003 | SYSTEMS AND METHODS FOR PROVIDING PRIORITY FOR USER EQUIPMENT | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18886124 | System and method to detect boot kit attacks | September 2024 | December 2025 | Allow | 15 | 0 | 0 | No | No |
| 18885584 | DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT PROVIDERS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18847078 | CIPHERTEXT HYBRID OPERATION METHOD AND DEVICE | September 2024 | March 2026 | Allow | 18 | 0 | 0 | No | No |
| 18826616 | SECURE NTT AND INTT | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18825004 | ADAPTIVE META-ATTACK SYSTEM AND METHOD FOR TARGET TRACKER UNDER AUTONOMOUS DRIVING SCENARIOS | September 2024 | March 2026 | Allow | 18 | 0 | 1 | No | No |
| 18823435 | MULTI-FACTOR AUTHENTICATION WORKFLOW MANAGEMENT WITH DISTRIBUTED ACCESS | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18816457 | System and Method for Detecting Hidden Executable Media Files Using Artificial Intelligence and Hashing Algorithms | August 2024 | November 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18814652 | INFORMATION PROCESSING DEVICE FOR VEHICLE | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18840363 | A CRYPTOGRAPHIC PROCESSING SYSTEM AND METHOD FOR IMPLEMENTING CRYSTALS-KYBER CRYPTOGRAPHIC ALGORITHMS AND CRYSTALS-DILITHIUM CRYPTOGRAPHIC ALGORITHMS USING TABLE-BASED ARITHMETIC-TO-BOOLEAN (A2B) MASKED SHARE CONVERSION | August 2024 | March 2025 | Allow | 7 | 0 | 0 | No | No |
| 18809806 | SYSTEM AND METHOD FOR SEARCHING FOR AND IDENTIFYING UNAUTHORIZED WEBSITES | August 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18809912 | CYBERSECURITY GAP IDENTIFICATION USING KNOWLEDGE GRAPHS | August 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18839332 | Secure Pseudo-Random Number Generator (PRNG) Reseeding | August 2024 | October 2025 | Allow | 14 | 0 | 0 | No | No |
| 18795878 | SYSTEM AND METHOD FOR MODELLING A CYBER-PHYSICAL SYSTEM TO ACT AS A HONEYPOT FOR CYBERATTACKS | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18793542 | SECURING AN INTERCONNECTED DIGITAL ENGINEERING AND CERTIFICATION ECOSYSTEM | August 2024 | January 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18790417 | Method and Device for Detecting Security of Internet of Things Data of Market Transaction, and Electronic Apparatus | July 2024 | November 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18786731 | CREATING LANGUAGE INDEPENDENT CRYPTO ASSETS | July 2024 | March 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18834120 | METHOD AND APPARATUS FOR SECURING POWER DELIVERY SIDE CHANNEL | July 2024 | December 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18787154 | MULTICOMPUTER PROCESSING TO PROTECT DATA FROM UNAUTHORIZED MODIFICATION | July 2024 | October 2024 | Allow | 2 | 1 | 0 | No | No |
| 18833737 | BIOMETRIC IDENTIFICATION METHOD, SERVER, AND CLIENT | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18783573 | NETWORK SECURITY DEVICE | July 2024 | June 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18832560 | AUTHENTICATION SYSTEM, SERVER APPARATUS AND METHOD | July 2024 | February 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18782414 | SYSTEMS AND METHODS FOR IMPROVING DATA SECURITY BY GENERATING SURROUNDING IMAGE SONIFICATION AND DYNAMICALLY ADJUSTING GRAPHICAL USER INTERFACES | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18783300 | INFORMATION COMPARTMENTALIZING DATA STORE | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18781088 | PROBE-BASED VIRTUAL NETWORK SENSITIVE DATA TRAFFIC DETECTION | July 2024 | January 2026 | Allow | 17 | 4 | 0 | Yes | No |
| 18778111 | PARALLEL ARTIFICIAL INTELLIGENCE DRIVEN IDENTITY CHECKING WITH BIOMETRIC PROMPTING | July 2024 | September 2025 | Allow | 14 | 0 | 0 | No | No |
| 18777578 | SECURE AND TRUSTED THREE-PARTY DEVICE FINGERPRINT AUTHENTICATION METHOD | July 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18773689 | MACHINE OPERATION RECOGNITION ENGINE WITH AUTOMATED MACHINE LEARNING MODEL UPDATE | July 2024 | March 2026 | Allow | 20 | 0 | 0 | Yes | No |
| 18728108 | FACE AUTHENTICATION INCLUDING MATERIAL DATA EXTRACTED FROM IMAGE | July 2024 | January 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18763433 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING A SET OF MESSAGES OF INTEREST IN A NETWORK | July 2024 | August 2025 | Allow | 14 | 1 | 0 | No | No |
| 18761930 | GENERATION AND USE OF PSEUDO-MALWARE FOR BLACK BOX TESTING OF CYBERSECURITY SYSTEMS | July 2024 | November 2025 | Allow | 17 | 0 | 0 | No | No |
| 18725997 | A HARDWARE ARCHITECTURE CONFIGURED TO IMPLIMENT ASCON CRYPTOGRAPHIC ALGORITHMS AND PROTECT AGAINST SIDE-CHANNEL ATTACKS | July 2024 | November 2024 | Allow | 5 | 1 | 0 | No | No |
| 18726038 | QUANTUM-SECURE DIGITAL CURRENCY | July 2024 | February 2026 | Allow | 19 | 0 | 1 | No | No |
| 18760171 | Storage Network with Audit Records Aggregation and Methods for Use Therewith | July 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18757766 | Determining an Environmental Parameter From Sensor Data of a Plurality of Automobiles Using a Cellular Network | June 2024 | January 2026 | Abandon | 18 | 2 | 0 | No | No |
| 18759262 | Method And System For Homomorphic Encryption | June 2024 | September 2024 | Allow | 3 | 0 | 0 | No | No |
| 18759479 | CONNECTIONLESS-VIRTUAL PRIVATE NETWORK FOR SECURE CLOUD TO USER COMMUNICATION OVER THE INTERNET USING A PLURALITY OF SERVERS | June 2024 | February 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18755251 | METHOD AND SYSTEM FOR SECURING SCADA AND INDUSTRIAL CONTROL SOFTWARE THROUGH SECURE-WRITE OPERATIONS | June 2024 | January 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18754444 | SYSTEMS AND METHODS FOR IDENTITY VERIFICATION | June 2024 | January 2025 | Allow | 7 | 0 | 0 | No | No |
| 18755347 | RESOURCE ACCESS MANAGEMENT AND SECURE AUTHORIZATION SYSTEMS AND METHODS | June 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18754038 | MULTI-USER BIOMETRIC AUTHENTICATION ON A MOBILE DEVICE | June 2024 | May 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18724115 | SYSTEMS, APPARATUS AND METHODS FOR AUTOMATICALLY TESTING SECURITY DEVICES | June 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18751929 | METHOD AND SYSTEM FOR RE-ENCRYPTION OF ENCRYPTED DATA BY GENERATING RE-ENCRYPTION KEY | June 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18751240 | Detection and Prevention of Artificial Intelligence Attacks Using Digital Twin Based Artificial Intelligence Centric Polymorphic Honey Net | June 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18721963 | AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AND NON-TRANSITORY RECORDING MEDIUM USING BIOMETRIC INFORMATION AND KNOWLEDGE INFORMATION | June 2024 | November 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18745488 | SYSTEM AND METHOD FOR DYNAMIC MANAGEMENT OF PRIVATE DATA | June 2024 | January 2025 | Allow | 7 | 1 | 0 | No | No |
| 18744827 | METHOD AND SYSTEM FOR PROVIDING DATA PRIVACY IN SERVICE OPERATIONS | June 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18743814 | Systems and Methods for Quick Start-Up of Playback | June 2024 | January 2026 | Allow | 19 | 1 | 0 | No | No |
| 18742081 | METHODS AND APPARATUS FOR AUTHENTICATING AN ENCRYPTION KEY STORED IN REMOVABLE MEMORY DEVICES, TO ACCESS A COMPUTE DEVICE | June 2024 | June 2025 | Allow | 13 | 0 | 0 | Yes | No |
| 18718442 | USING LEVELED HOMOMORPHIC ENCRYPTION IN A CLIENT-SERVER SETTING FOR EVALUATING AN ARTIFICIAL NEURAL NETWORK OVER AN ENCRYPTED INPUT | June 2024 | March 2026 | Allow | 21 | 1 | 0 | No | No |
| 18737074 | SYSTEMS AND METHODS FOR PARALLELIZED CUSTOM DATA-PROCESSING AND SEARCH | June 2024 | May 2025 | Allow | 11 | 1 | 0 | No | No |
| 18678768 | SYSTEMS AND METHODS FOR USER VERIFICATION | May 2024 | July 2025 | Allow | 14 | 2 | 0 | Yes | No |
| 18677203 | DEVICE FOR PROTECTING CONTENT BY USING BIOMETRIC INFORMATION AND OPERATING METHOD THEREOF | May 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18677776 | IDENTIFICATION METHOD AND IDENTIFICATION SYSTEM AND STORAGE MEDIUM | May 2024 | September 2024 | Allow | 4 | 1 | 0 | No | No |
| 18676190 | GenAI Prompt Injection Classifier Training Using Prompt Attack Structures | May 2024 | September 2024 | Allow | 4 | 1 | 0 | No | No |
| 18674292 | Device Administration with Public Key Infrastructure | May 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18672768 | TECHNIQUES FOR MULTI-TENANT VULNERABILITY SCANNING UTILIZING SENSITIVE DATA | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18670541 | PREDICTIVE DNS CACHE TO IMPROVE SECURITY AND PERFORMANCE | May 2024 | January 2025 | Allow | 8 | 0 | 0 | Yes | No |
| 18670086 | TRANSFORMED ONE TIME PASSWORD (OTP) FOR AUTHENTICATION | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18666994 | ACCOUNT AUTHENTICATION EXCLUDING MERCHANTS BASED ON MERCHANT LOGOS | May 2024 | March 2025 | Allow | 10 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2433.
With a 38.3% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 37.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2433 is part of Group 2430 in Technology Center 2400. This art unit has examined 8,304 patent applications in our dataset, with an overall allowance rate of 80.4%. Applications typically reach final disposition in approximately 31 months.
Art Unit 2433's allowance rate of 80.4% places it in the 65% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2433 receive an average of 2.06 office actions before reaching final disposition (in the 63% percentile). The median prosecution time is 31 months (in the 49% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.