Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19029580 | METHOD FOR EMULATING AN ATTACK ON AN ASSET WITHIN A TARGET NETWORK | January 2025 | May 2025 | Allow | 4 | 1 | 0 | No | No |
| 18878264 | Communication System, Adapter for a Terminal and Method for Securely Transmitting Time-Critical Data within the Communication System | December 2024 | March 2025 | Allow | 3 | 0 | 0 | No | No |
| 18978826 | BROADCAST SYNCHRONIZATION WITH FAN ENGAGEMENT PLATFORM | December 2024 | January 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 18902566 | SYSTEM FOR SURVEYING SECURITY ENVIRONMENTS | September 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18847420 | SECURE DATA EXCHANGE MATCHING ACROSS IDENTITY PROVIDERS | September 2024 | February 2025 | Allow | 5 | 0 | 0 | No | No |
| 18882398 | METHODS AND SYSTEMS FOR VERIFYING A WORKER AGENT | September 2024 | November 2024 | Allow | 3 | 0 | 0 | No | No |
| 18830499 | INTELLIGENT PHOTO ALBUM SORTING AND PRIVACY PROTECTION METHOD | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18825028 | IDENTITY AUTHENTICATION SYSTEM FOR DISTRIBUTED INTERNET OF VEHICLES | September 2024 | November 2024 | Allow | 2 | 0 | 0 | No | No |
| 18820043 | SYSTEMS, METHODS, AND GRAPHICAL USER INTERFACES FOR CONFIGURING AND EXECUTING ONE OR MORE COMPUTER-EXECUTABLE THREAT HUNTING PROTOCOLS IN A CYBERSECURITY THREAT DETECTION AND MITIGATION PLATFORM | August 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18795033 | COMPUTER INVESTIGATION METHOD AND SYSTEM | August 2024 | December 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18787691 | SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICES | July 2024 | February 2025 | Allow | 6 | 0 | 0 | Yes | No |
| 18779858 | WATERMARKING DIGITAL MEDIA FOR AUTHENTICATED CONTENT VERIFICATION | July 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18775854 | SYSTEM AND METHOD FOR DISK INSPECTION UTILIZING DISK CLONING TECHNIQUES | July 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18773421 | METHODS FOR PROVIDING AN ALERT OR AN ALARM TO A USER OF A MOBILE COMMUNICATIONS DEVICE | July 2024 | February 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18773210 | SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICES | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18770596 | INFERRING TRUST IN COMPUTER NETWORKS | July 2024 | March 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18761508 | SYSTEMS AND METHODS FOR VARIABLE-LENGTH ENCODING AND DECODING FOR ENHANCING COMPUTER SYSTEMS | July 2024 | March 2025 | Allow | 9 | 1 | 0 | No | No |
| 18756295 | SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION | June 2024 | December 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18755276 | SYSTEMS AND METHODS FOR PROVIDING ENHANCED SECURITY IN EDGE COMPUTING ENVIRONMENTS | June 2024 | June 2025 | Allow | 11 | 1 | 0 | No | No |
| 18754090 | MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATION | June 2024 | April 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18752000 | ROLLING ENCRYPTION AND AUTHENTICATION IN A LOW POWER PHYSICAL ASSET TRACKING SYSTEM | June 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18745043 | Managing and Routing Messages to Distributed User Devices in an Enterprise Computing Environment | June 2024 | June 2025 | Allow | 12 | 1 | 0 | No | No |
| 18670151 | Scheme for Transferring and Authenticating Data | May 2024 | March 2025 | Allow | 10 | 1 | 0 | Yes | No |
| 18670049 | FILE REPAIR METHOD AND FILE REPAIR DEVICE FOR USER EQUIPMENT | May 2024 | December 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18668209 | SECURE USER AUTHENTICATION LEVERAGING QUANTUM KEY AND STEGANOGRAPHY | May 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18664119 | AUTOMATIC ASSESSMENT OF POTENTIALLY MALICIOUS WEB CONTENT VIA WEB PAGE INVESTIGATOR | May 2024 | January 2025 | Allow | 8 | 1 | 0 | No | No |
| 18662646 | EGRESS PIPELINE WITH TAG MANIPULATION AND ESI LABEL PUSH CAPABILITY | May 2024 | December 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18661092 | CLOUD PACKET TAP | May 2024 | November 2024 | Allow | 6 | 1 | 0 | No | No |
| 18657613 | AUTHENTICATION USING SESSION-LESS LOGIN | May 2024 | October 2024 | Allow | 5 | 2 | 0 | No | No |
| 18652087 | CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATES | May 2024 | July 2024 | Allow | 2 | 0 | 0 | No | No |
| 18652093 | SYSTEM FOR SURVEYING SECURITY ENVIRONMENTS | May 2024 | July 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18652747 | Gambling Service with Adaptive Location Checking Frequency | May 2024 | August 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18704941 | BLOCKCHAIN NETWORK SECURITY COMMUNICATION METHOD BASED ON QUANTUM KEY | April 2024 | October 2024 | Allow | 6 | 0 | 0 | No | No |
| 18646225 | CONTENT PERMISSION PLATFORM | April 2024 | June 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18646319 | SYSTEMS AND METHODS FOR TOKEN METADATA MANAGEMENT | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18637995 | SYSTEMS AND METHODS FOR USE IN APPENDING LOG ENTRIES TO DATA STRUCTURES | April 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18630518 | DIGITAL FILE FORENSIC ACCOUNTING AND MANAGEMENT SYSTEM | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18626087 | AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER | April 2024 | September 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18625948 | SECURE CONNECTIONS BETWEEN SERVERS IN A VIRTUAL PRIVATE NETWORK | April 2024 | January 2025 | Allow | 10 | 1 | 0 | Yes | No |
| 18623310 | DYNAMIC CREATION OF OVERLAY NETWORK SLICES USING BORDER GATEWAY PROTOCOL FLOW SPECIFICATIONS | April 2024 | October 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18621269 | ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHOD | March 2024 | October 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18622118 | PROGRESSIVE PREFETCHING | March 2024 | April 2025 | Allow | 13 | 1 | 0 | No | No |
| 18620370 | A METHOD AND SYSTEM FOR SECURE DATA TRANSMISSION | March 2024 | March 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18618039 | DIGITAL ACCESS CONTROL USING TIME-BASED BASELINE ACCESS DISTRIBUTIONS | March 2024 | February 2025 | Allow | 11 | 1 | 0 | No | No |
| 18618570 | BROADCAST SYNCHRONIZATION WITH FAN ENGAGEMENT PLATFORM | March 2024 | October 2024 | Allow | 7 | 1 | 0 | No | No |
| 18618895 | DEVICE PROVISIONING USING PARTIAL PERSONALIZATION SCRIPTS | March 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18616156 | SYSTEM AND METHOD FOR RESTRICTING COMMUNICATIONS BETWEEN VIRTUAL PRIVATE CLOUD NETWORKS THROUGH SECURITY DOMAINS | March 2024 | March 2025 | Allow | 12 | 1 | 0 | No | No |
| 18613728 | Detecting Data Exfiltration and Compromised User Accounts in a Computing Network | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18693563 | IMAGE ENCRYPTION METHOD AND APPARATUS, IMAGE PROCESSING METHOD AND APPARATUS, AND DEVICE AND MEDIUM | March 2024 | February 2025 | Allow | 11 | 0 | 0 | No | No |
| 18602593 | I/O CIRCUIT DESIGN FOR SRAM-BASED PUF GENERATORS | March 2024 | June 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18603103 | Techniques For Automatically Configuring Minimal Cloud Service Access Rights For Container Applications | March 2024 | March 2025 | Allow | 12 | 2 | 0 | No | No |
| 18598621 | EFFICIENT AUTHENTIC COMMUNICATION SYSTEM AND METHOD | March 2024 | February 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18597654 | PARALLEL NETWORK-BASED VULNERABILITY SCANNING | March 2024 | November 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18593566 | AUTHENTICATION USING SESSION-LESS LOGIN | March 2024 | August 2024 | Allow | 6 | 2 | 0 | Yes | No |
| 18591842 | Message Authenticated Communication Sessions | February 2024 | January 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18589466 | Hardware-Agnostic Specification of Packet-Processing Pipelines | February 2024 | September 2024 | Allow | 7 | 0 | 0 | No | No |
| 18585120 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | February 2025 | Allow | 12 | 2 | 0 | Yes | No |
| 18585428 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | April 2025 | Allow | 14 | 2 | 0 | No | No |
| 18585186 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | January 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18585011 | SYSTEMS AND METHODS FOR AUTHENTICATION OF PHYSICAL ACCESS TOKENS AT ACCESS TERMINALS | February 2024 | August 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18443380 | AUTOMATIC PRIVACY-AWARE MACHINE LEARNING METHOD AND APPARATUS | February 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18440636 | System and Method for Controlling Access Based on Preconditioned Activities | February 2024 | June 2025 | Abandon | 16 | 2 | 0 | No | No |
| 18440942 | METHODS AND APPARATUS FOR OFFLOADING ENCRYPTION | February 2024 | March 2025 | Allow | 13 | 1 | 0 | No | No |
| 18438881 | SYSTEMS AND METHODS FOR ENHANCED AUTHORIZATION MESSAGES | February 2024 | January 2025 | Allow | 11 | 1 | 0 | No | No |
| 18438625 | CROSS-DOMAIN DISCOVERY BETWEEN SERVICE LAYER SYSTEMS AND WEB OF THINGS SYSTEMS | February 2024 | January 2025 | Allow | 11 | 1 | 0 | No | No |
| 18436242 | ONLINE SECURITY CENTER | February 2024 | January 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18435546 | TECHNOLOGIES FOR PROVIDING SECURE UTILIZATION OF TENANT KEYS | February 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18433657 | CONTROL APPARATUS, IN-VEHICLE COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD AND PROGRAM | February 2024 | May 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18429681 | SYSTEM FOR DYNAMIC COMMUNICATION CHANNEL SWITCHING BASED ON PRECONFIGURED NETWORK SECURITY PROTOCOLS | February 2024 | February 2025 | Allow | 12 | 1 | 0 | No | No |
| 18428890 | SECURE EXECUTION OF USER-DEFINED FUNCTIONS | January 2024 | March 2025 | Allow | 13 | 1 | 0 | No | No |
| 18425433 | DECENTRALIZED IDENTITY-BASED ACCESS CONTROL SYSTEMS AND METHODS | January 2024 | November 2024 | Allow | 10 | 1 | 0 | No | No |
| 18425906 | Methods and Systems for Indicating the Possibility of a Cyber-Attack on a Computer Network | January 2024 | July 2024 | Allow | 6 | 1 | 0 | No | No |
| 18425019 | SYSTEMS AND METHODS FOR PASSWORD MANAGERS | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18423012 | DATA PLATFORM WITH UNIFIED PRIVILEGES | January 2024 | March 2025 | Allow | 14 | 1 | 0 | No | No |
| 18420652 | CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATES | January 2024 | March 2025 | Allow | 14 | 1 | 0 | No | No |
| 18417253 | SECURE AUTHENTICATION | January 2024 | July 2024 | Allow | 6 | 1 | 0 | No | No |
| 18413496 | Processing External Messages Using a Secure Email Relay | January 2024 | February 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18411018 | PRE-AUTHORIZATION ACCESS REQUEST SCREENING | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18407496 | SCAN ENGINE EXTENSION FOR CUSTOMIZING APPLICATION SECURITY TESTING BEHAVIOR | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18406799 | NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS | January 2024 | April 2024 | Allow | 3 | 1 | 0 | No | No |
| 18407223 | SECURE ELECTRONIC TRANSACTIONS USING TRANSPORT LAYER SECURITY (SETUTLS) | January 2024 | March 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18399561 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR FAULT RESISTANT MULTI-NODE COMMUNICATION | December 2023 | March 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18396309 | SYSTEM AND METHOD FOR ENCRYPTED DISK INSPECTION UTILIZING DISK CLONING TECHNIQUES | December 2023 | July 2024 | Allow | 6 | 1 | 0 | No | No |
| 18393335 | SYSTEMS AND METHODS FOR PRIORITIZING URL REVIEW FOR SANDBOXING BASED ON ACCELERATED VELOCITIES OF URL FEATURES IN NETWORK TRAFFIC | December 2023 | October 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18392985 | Virtual Secure Rooms | December 2023 | August 2024 | Allow | 8 | 1 | 0 | No | No |
| 18393174 | METHODS AND APPARATUS FOR INTERFERING WITH MALWARE USING DISPLACED DISPLAY ELEMENTS | December 2023 | February 2025 | Allow | 14 | 1 | 0 | No | No |
| 18389969 | SYSTEMS AND METHODS FOR AUTHENTICATING END USERS OF A WEB SERVICE | December 2023 | January 2025 | Allow | 12 | 0 | 0 | Yes | No |
| 18390091 | SENSITIVE DATA LEAKAGE PROTECTION | December 2023 | July 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18545519 | SECURELY MANIPULATING AND UTILIZING USER CREDENTIALS | December 2023 | May 2025 | Abandon | 17 | 1 | 0 | No | No |
| 18543380 | Command and Control Steganographic Communications Detection Engine | December 2023 | October 2024 | Allow | 10 | 1 | 0 | No | No |
| 18543453 | METHOD AND SYSTEM FOR EXCHANGING WEB AUTHENTICATION PROTOCOLS FOR PUBLIC CLOUD MIGRATIONS | December 2023 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18544419 | INSTRUCTIONS AND LOGIC TO PROVIDE SIMD SM4 CRYPTOGRAPHIC BLOCK CIPHER FUNCTIONALITY | December 2023 | January 2025 | Allow | 13 | 0 | 0 | Yes | No |
| 18542406 | POLICY-BASED SECURE CONTAINERS FOR MULTIPLE ENTERPRISE APPLICATIONS | December 2023 | August 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18542551 | SECURE INSTALLATION OF APPLICATION KEYS | December 2023 | October 2024 | Allow | 11 | 1 | 0 | No | No |
| 18542094 | QUIC AND ANYCAST PROXY RESILIENCY | December 2023 | July 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18539735 | NETWORK SECURITY ENFORCEMENT USING FLEXIBLE CLIENT GROUPING AT THE CONTROL PLANE AND DATA PLANE | December 2023 | May 2025 | Allow | 17 | 0 | 0 | No | No |
| 18538809 | SYNCHRONIZATION OF DIGITAL RIGHTS MANAGEMENT DATA | December 2023 | January 2025 | Allow | 13 | 1 | 0 | No | No |
| 18535021 | AUTOMATIC RETRAINING OF MACHINE LEARNING MODELS TO DETECT DDOS ATTACKS | December 2023 | October 2024 | Allow | 10 | 1 | 0 | No | No |
| 18536028 | CONTROLLED TOKEN DISTRIBUTION TO PROTECT AGAINST MALICIOUS DATA AND RESOURCE ACCESS | December 2023 | March 2025 | Allow | 60 | 2 | 0 | No | No |
| 18535884 | PATTERNLESS OBFUSCATION OF DATA WITH LOW-COST DATA RECOVERY | December 2023 | November 2024 | Allow | 11 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2434.
With a 30.6% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 31.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2434 is part of Group 2430 in Technology Center 2400. This art unit has examined 9,404 patent applications in our dataset, with an overall allowance rate of 83.6%. Applications typically reach final disposition in approximately 29 months.
Art Unit 2434's allowance rate of 83.6% places it in the 74% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2434 receive an average of 1.81 office actions before reaching final disposition (in the 49% percentile). The median prosecution time is 29 months (in the 49% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.