Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19301719 | METHODS FOR NON-INVASIVE API DISCOVERY, MONITORING AND EXPLOITATION DETECTION IN THIRD-PARTY PROCESSES | August 2025 | November 2025 | Allow | 3 | 0 | 0 | No | No |
| 19214704 | SECURITY PLATFORMS WITH INTEGRATED POLICY ENFORCEMENT | May 2025 | December 2025 | Allow | 7 | 1 | 0 | No | No |
| 19203103 | GENERATING PARAMETERS FOR MALICIOUS ACTIVITY DETECTION USING DECISION TREES | May 2025 | June 2025 | Allow | 2 | 0 | 0 | No | No |
| 19123076 | PROGRAMMABLE DEVICE, VERSION CONTROL SYSTEM, VERSION CONTROL METHOD, AND PROGRAM | April 2025 | January 2026 | Allow | 9 | 0 | 0 | No | No |
| 19169644 | Method and System for Request Identification for Security and Fairness in Serverless Functions | April 2025 | October 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19097466 | DIRECTIVE MIGRATION WITH EPHEMERAL TRIGGERS | April 2025 | October 2025 | Allow | 7 | 1 | 0 | No | No |
| 19041961 | Secure Environment Public Register (SEPR) | January 2025 | January 2026 | Allow | 12 | 2 | 0 | Yes | No |
| 19041958 | Secure Environment Public Register (SEPR) | January 2025 | December 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 19029580 | METHOD FOR EMULATING AN ATTACK ON AN ASSET WITHIN A TARGET NETWORK | January 2025 | May 2025 | Allow | 4 | 1 | 0 | No | No |
| 19019501 | AUTHENTICATION USING SESSION-LESS LOGIN | January 2025 | August 2025 | Allow | 7 | 1 | 0 | No | No |
| 19014413 | ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHOD | January 2025 | February 2026 | Allow | 13 | 1 | 0 | No | No |
| 18878264 | Communication System, Adapter for a Terminal and Method for Securely Transmitting Time-Critical Data within the Communication System | December 2024 | March 2025 | Allow | 3 | 0 | 0 | No | No |
| 18999682 | UTILIZING MACHINE-LEARNING MODELS TO DETERMINE TAKE-OVER SCORES AND INTELLIGENTLY SECURE DIGITAL ACCOUNT FEATURES | December 2024 | February 2026 | Allow | 14 | 0 | 0 | No | No |
| 18999167 | CONSTRAINT-BASED RESOURCE PLANNING FOR SERVER CLUSTERS | December 2024 | July 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18990450 | SECURE TRANSLATOR FOR INSECURE COMPUTING DEVICE | December 2024 | October 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18978826 | BROADCAST SYNCHRONIZATION WITH FAN ENGAGEMENT PLATFORM | December 2024 | January 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 18976319 | SECURE MOBILE DEVICE MANAGEMENT | December 2024 | February 2025 | Allow | 3 | 0 | 0 | No | No |
| 18966712 | WATERMARKING DIGITAL MEDIA FOR CONTENT VERIFICATION WITH DIFFERENTIAL DETECTION | December 2024 | October 2025 | Allow | 11 | 0 | 0 | No | No |
| 18964338 | DYNAMIC PRIVILEGE ADJUSTMENT FOR DATA ACCESSIBLE TO ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | November 2025 | Allow | 12 | 2 | 0 | Yes | No |
| 18959418 | CONSISTENT ACCESS CONTROL LISTS ACROSS FILE SERVERS FOR LOCAL USERS IN A DISTRIBUTED FILE SERVER ENVIRONMENT | November 2024 | March 2026 | Allow | 16 | 0 | 0 | No | No |
| 18952377 | DETERMINISTIC USER DEVICE IDENTIFICATION | November 2024 | June 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18948553 | Selective Online Content Removal Based on Activity History | November 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18912441 | SECURE TAMPER RESISTANT DATA PROCESSING, STORAGE, AND TRANSMISSION GATEWAY AND CONTROLLER AND DATA ANOMALY DETECTION PROGRAM | October 2024 | March 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18907610 | SECURE COMMUNICATION BETWEEN INFORMATION TECHNOLOGY NETWORK AND OPERATIONAL TECHNOLOGY NETWORK | October 2024 | March 2026 | Allow | 17 | 0 | 0 | No | No |
| 18906943 | SYSTEM AND METHOD FOR IMPROVED USER AUTHENTICATION IN A MULTISYSTEM NETWORK | October 2024 | October 2025 | Allow | 13 | 0 | 0 | Yes | No |
| 18907308 | MULTI-FACTOR DIGITAL TRANSMISSION SCREENING | October 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18902566 | SYSTEM FOR SURVEYING SECURITY ENVIRONMENTS | September 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18851393 | SINGLE REQUEST ARCHITECTURE FOR INCREASING EFFICIENCY OF SECURE MULTI-PARTY COMPUTATIONS | September 2024 | January 2026 | Allow | 15 | 0 | 0 | No | No |
| 18897790 | Secure Modular Machine Learning Platform | September 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18847420 | SECURE DATA EXCHANGE MATCHING ACROSS IDENTITY PROVIDERS | September 2024 | February 2025 | Allow | 5 | 0 | 0 | No | No |
| 18885820 | DEVICE UPDATE TRANSMISSION USING A FILTER | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18884765 | METHOD OF SECURE DATA STORAGE AND TRANSFER | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18882398 | METHODS AND SYSTEMS FOR VERIFYING A WORKER AGENT | September 2024 | November 2024 | Allow | 3 | 0 | 0 | No | No |
| 18882096 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A RESOURCE BASED ON A COMPLIANCE SCORE | September 2024 | December 2025 | Allow | 15 | 0 | 0 | No | No |
| 18829648 | COMPUTER SYSTEM AND METHOD FOR SYSTEM MEMORY ENCRYPTION AND DECRYPTION | September 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18845824 | THRESHOLD SEARCHABLE SYMMETRIC ENCRYPTION | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18830499 | INTELLIGENT PHOTO ALBUM SORTING AND PRIVACY PROTECTION METHOD | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18845203 | COMMUNICATION NETWORK DEVICES, COMMUNICATION NETWORK SYSTEM AND METHOD FOR MONITORING UNMANNED AERIAL SYSTEMS IN A COMMUNICATION NETWORK | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18829034 | QUIC AND ANYCAST PROXY RESILIENCY | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18845144 | TIME-BASED APPROACHES IN MALWARE SIMULATION FOR RESPONSIVE MEASURE DEPLOYMENT | September 2024 | January 2026 | Allow | 16 | 1 | 0 | No | No |
| 18825028 | IDENTITY AUTHENTICATION SYSTEM FOR DISTRIBUTED INTERNET OF VEHICLES | September 2024 | November 2024 | Allow | 2 | 0 | 0 | No | No |
| 18823368 | SYSTEMS AND METHODS FOR DISTRIBUTED TRUST MODEL AND FRAMEWORK | September 2024 | December 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18843024 | PROOF OF DATA RETENTION WITH BLOCKCHAIN | August 2024 | March 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18820043 | SYSTEMS, METHODS, AND GRAPHICAL USER INTERFACES FOR CONFIGURING AND EXECUTING ONE OR MORE COMPUTER-EXECUTABLE THREAT HUNTING PROTOCOLS IN A CYBERSECURITY THREAT DETECTION AND MITIGATION PLATFORM | August 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18820107 | SYSTEMS AND METHODS FOR ENFORCING CRYPTOGRAPHICALLY SECURE ACTIONS IN PUBLIC, NON-PERMISSIONED BLOCKCHAINS USING BIFURCATED SELF-EXECUTING PROGRAMS COMPRISING SHARED DIGITAL SIGNATURE REQUIREMENTS | August 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18812568 | SYSTEMS AND METHODS FOR APPLYING POLICIES IN A DATACENTER ENVIRONMENT | August 2024 | February 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18811060 | SECURE PACKET RECORD IN MULTI-SOURCE VR ENVIRONMENT | August 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18800982 | SYSTEMS AND METHODS FOR PROVIDING USER PREFERENCES FOR A CONNECTED DEVICE | August 2024 | December 2025 | Allow | 17 | 0 | 0 | No | No |
| 18799687 | MULTI-ROUTE VIRTUAL PRIVATE NETWORKING | August 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18797912 | METHODS, COMPUTER DEVICES, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIA FOR LEARNING OF WATERMARKING MODEL USING COMPLEX ATTACK | August 2024 | December 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18795848 | REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSIS | August 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18795033 | COMPUTER INVESTIGATION METHOD AND SYSTEM | August 2024 | December 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18790505 | TRAINING AND USING MULTI-TASK PREDICTIVE RISK MODELS IN SOFTWARE APPLICATIONS | July 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18787690 | EFFICIENT AND SECURE KEY ROTATION FOR BACKUP STORAGE | July 2024 | November 2025 | Allow | 16 | 0 | 0 | No | No |
| 18787691 | SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICES | July 2024 | February 2025 | Allow | 6 | 0 | 0 | Yes | No |
| 18781942 | REDUCING CYBERSECURITY RISK LEVEL OF A PORTFOLIO OF COMPANIES USING A CYBERSECURITY RISK MULTIPLIER | July 2024 | December 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18779858 | WATERMARKING DIGITAL MEDIA FOR AUTHENTICATED CONTENT VERIFICATION | July 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18778640 | USING EMBEDDINGS TO OBFUSCATE PRIVATE DATA IN RESOURCE ASSIGNMENTS | July 2024 | January 2026 | Allow | 18 | 0 | 0 | No | No |
| 18775854 | SYSTEM AND METHOD FOR DISK INSPECTION UTILIZING DISK CLONING TECHNIQUES | July 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18772926 | PERIPHERAL DEVICE SANDBOX | July 2024 | February 2026 | Allow | 19 | 1 | 0 | No | No |
| 18773139 | COMPUTER-BASED SYSTEMS HAVING COMPONENTS CONFIGURED/PROGRAMMED FOR VIDEO PASSWORD BASED AUTHENTICATION AND METHODS OF USE THEREOF | July 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18773421 | METHODS FOR PROVIDING AN ALERT OR AN ALARM TO A USER OF A MOBILE COMMUNICATIONS DEVICE | July 2024 | February 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18773210 | SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICES | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18769455 | KEY STORAGE DEVICE AND METHOD FOR WRITING KEY VALUE INTO ONE-TIME-PROGRAMMABLE DEVICE | July 2024 | November 2025 | Allow | 16 | 0 | 0 | No | No |
| 18770173 | METHOD AND SYSTEM FOR IMPLEMENTING HIGH AVAILABILITY (HA) WEB APPLICATION FIREWALL (WAF) FUNCTIONALITY | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18770469 | AUTONOMOUS SERVER AGENTS | July 2024 | January 2026 | Allow | 19 | 1 | 0 | No | No |
| 18770596 | INFERRING TRUST IN COMPUTER NETWORKS | July 2024 | March 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18769044 | APPARATUS AND METHOD FOR PERFORMING THREAT ANALYSIS AND RISK ASSESSMENT FOR VEHICLE CYBERSECURITY | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18761508 | SYSTEMS AND METHODS FOR VARIABLE-LENGTH ENCODING AND DECODING FOR ENHANCING COMPUTER SYSTEMS | July 2024 | March 2025 | Allow | 9 | 1 | 0 | No | No |
| 18761517 | LLM POWERED SECURITY PRODUCT FACADE | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18761613 | SYSTEMS AND METHODS FOR ACCESS CONTROL | July 2024 | February 2026 | Allow | 20 | 2 | 0 | Yes | No |
| 18759426 | RECORD-LEVEL ENCRYPTION SCHEME FOR DATA OWNERSHIP PLATFORM | June 2024 | April 2025 | Allow | 9 | 2 | 0 | Yes | No |
| 18759530 | DATA AUGMENTATION FOR THREAT INVESTIGATION IN AN ENTERPRISE NETWORK | June 2024 | July 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18759745 | ENTITY MALICIOUSNESS ANALYSIS USING AUTONOMOUS ARTIFICIAL INTELLIGENCE AGENTS | June 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18759753 | NETWORK SECURITY SYSTEMS AND METHODS | June 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18759286 | AUTOMATED THREAT MODEL GENERATION | June 2024 | January 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18756295 | SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION | June 2024 | December 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18756165 | SECURING SENSITIVE DATA IN EDGE DEVICES USING STEGANOGRAPHY | June 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18755276 | SYSTEMS AND METHODS FOR PROVIDING ENHANCED SECURITY IN EDGE COMPUTING ENVIRONMENTS | June 2024 | June 2025 | Allow | 11 | 1 | 0 | No | No |
| 18752893 | SEGMENTATION OF WEB DOCUMENTS BASED ON DETECTED SECURITY VULNERABILITIES | June 2024 | August 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18754090 | MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATION | June 2024 | April 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18753250 | ANONYMIZATION IN A LOW POWER PHYSICAL ASSET TRACKING SYSTEM | June 2024 | July 2025 | Allow | 13 | 1 | 1 | No | No |
| 18751999 | Personal Data Discovery | June 2024 | January 2026 | Allow | 19 | 1 | 0 | No | No |
| 18752000 | ROLLING ENCRYPTION AND AUTHENTICATION IN A LOW POWER PHYSICAL ASSET TRACKING SYSTEM | June 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18747324 | SECURE ONLINE ID VALIDATION AND REVIEW | June 2024 | December 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18745043 | Managing and Routing Messages to Distributed User Devices in an Enterprise Computing Environment | June 2024 | June 2025 | Allow | 12 | 1 | 0 | No | No |
| 18744401 | INSPECTING REQUESTS AND RESPONSES TO IDENTIFY APPLICATION VULNERABILITIES | June 2024 | September 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18742372 | SYSTEM AND METHOD FOR UTILIZATION OF THREAT DATA FOR NETWORK SECURITY | June 2024 | October 2025 | Allow | 16 | 2 | 0 | No | No |
| 18740097 | ARTIFICIAL INTELLIGENCE ADVERSARY RED TEAM | June 2024 | September 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18735120 | PRESERVING CONFIDENTIALITY OF TENANTS | June 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18734887 | THIRD-PARTY SERVICE FOR SUGGESTING RESOURCES FOR A RECEIVED MESSAGE | June 2024 | September 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18732277 | SYSTEM AND METHOD FOR MANAGING THREATS IN OPEN TRANSACTION NETWORKS | June 2024 | November 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18731679 | METHOD AND SYSTEM FOR MODIFYING AND VALIDATING API REQUESTS | June 2024 | April 2025 | Allow | 10 | 1 | 0 | No | No |
| 18732285 | SYSTEM AND METHOD FOR IDENTIFYING AND BLOCKING SYNTHETIC MEDIA BASED MISAPPROPRIATION ATTEMPTS ASSOCIATED WITH ELECTRONIC COMMUNICATIONS | June 2024 | January 2026 | Allow | 19 | 0 | 0 | No | No |
| 18732095 | Secure Server Digital Signature Generation for Post-Quantum Cryptography Key Encapsulations | June 2024 | January 2026 | Allow | 20 | 0 | 0 | Yes | No |
| 18680079 | AUTHENTICATION FOR WIRELESS NETWORKS | May 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18680098 | AUTHENTICATION FOR INTERMITTENTLY CONNECTED NETWORKS | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18679355 | DYNAMIC RECONSTRUCTION OF CLOUD APPLICATION TRAFFIC FOR SECURITY MONITORING | May 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18676099 | MEDIATED TRAFFIC CONTROL THROUGH MID-LINK SERVER | May 2024 | August 2025 | Allow | 14 | 0 | 0 | Yes | No |
| 18672970 | HYBRID PKI KEYLOADER METHODS AND SYSTEMS | May 2024 | October 2025 | Allow | 17 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2434.
With a 28.7% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 31.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2434 is part of Group 2430 in Technology Center 2400. This art unit has examined 9,281 patent applications in our dataset, with an overall allowance rate of 81.8%. Applications typically reach final disposition in approximately 31 months.
Art Unit 2434's allowance rate of 81.8% places it in the 70% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2434 receive an average of 1.91 office actions before reaching final disposition (in the 52% percentile). The median prosecution time is 31 months (in the 50% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.