Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19118772 | TRAINING A SUPERVISED MACHINE LEARNING MODEL FOR ANOMALY DETECTION | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19045368 | Detection of Privacy Attacks on Machine Learning Models | February 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19035283 | NETWORK DATA DECODING AND ENCODING | January 2025 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18981911 | PERSONALLY IDENTIFIABLE INFORMATION SCRUBBER WITH LANGUAGE MODELS | December 2024 | April 2025 | Allow | 4 | 0 | 0 | No | No |
| 18954015 | SYSTEM AND METHOD FOR TRACING CLOUD COMPUTING ENVIRONMENT DEPLOYMENTS TO CODE OBJECTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18951209 | SYSTEM AND METHOD FOR APPLYING MULTI-SOURCE CYBERSECURITY POLICY ON COMPUTING ENVIRONMENTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18947102 | DYNAMIC MULTI-MODEL MONITORING AND VALIDATION FOR ARTIFICIAL INTELLIGENCE MODELS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18945370 | Detection of Machine Learning Model Attacks Obfuscated in Unicode | November 2024 | March 2025 | Allow | 4 | 1 | 0 | No | No |
| 18938365 | SYSTEMS AND METHODS FOR DETECTING NON-PROVISIONED USAGE OF APPLICATIONS IN AN ORGANIZATION | November 2024 | March 2025 | Allow | 4 | 0 | 0 | No | No |
| 18923655 | DETECTION AND MITIGATION OF MACHINE LEARNING MODEL ADVERSARIAL ATTACKS | October 2024 | January 2025 | Allow | 3 | 0 | 0 | No | No |
| 18900430 | GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATION | September 2024 | March 2025 | Allow | 6 | 0 | 0 | No | No |
| 18888967 | TECHNIQUES FOR DETECTING ARTIFICIAL INTELLIGENCE MODEL CYBERSECURITY RISK IN A COMPUTING ENVIRONMENT | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18819405 | WEB SERVICE-BASED MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE OF CALLING SERVICE | August 2024 | December 2024 | Allow | 4 | 1 | 0 | No | No |
| 18819535 | DATA PROCESSING METHOD, DEVICE, AND STORAGE MEDIUM | August 2024 | December 2024 | Allow | 4 | 0 | 0 | No | No |
| 18817890 | ACTIVE DATA DISPOSAL | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18811739 | SYSTEMS AND METHODS FOR PREVENTING CYBERSECURITY ATTACKS THROUGH DIGITAL IDENTITY VERIFICATION | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18809750 | METHOD AND SYSTEM FOR A SECURE MULTILEVEL NESTED BLOCKCHAIN DATA STORAGE | August 2024 | December 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18808231 | DYNAMIC DEFENSE SYSTEM AND METHOD OF NEW ENERGY CENTRALIZED CONTROL STATION NETWORK BASED ON DYNAMIC IP | August 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18807245 | METHOD FOR IMPROVED BIOMETRIC AUTHENTICATION | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18805460 | WATERMARK EMBEDDING METHOD BASED ON SERVICE INVOCATION DATA | August 2024 | January 2025 | Allow | 5 | 1 | 0 | No | No |
| 18798872 | AUTOMATED SECURE ACCESS TO ONLINE ACCOUNTS | August 2024 | January 2025 | Allow | 5 | 2 | 0 | No | No |
| 18798404 | METHOD FOR DATA ACQUISITION, DEVICE AND STORAGE MEDIUM | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18792523 | GENERATIVE CYBERSECURITY EXPLOIT SYNTHESIS AND MITIGATION | August 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18787768 | Prompt Injection Classifier Using Intermediate Results | July 2024 | September 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18779132 | ANONYMITY ALGORITHM-BASED DATA SHARING PRIVACY PROTECTION METHOD | July 2024 | March 2025 | Allow | 8 | 2 | 0 | Yes | No |
| 18779064 | RAPID PREDICTIVE ANALYSIS OF VERY LARGE DATA SETS USING THE DISTRIBUTED COMPUTATIONAL GRAPH | July 2024 | October 2024 | Allow | 3 | 1 | 0 | Yes | No |
| 18773081 | SYSTEM AND METHOD FOR DIGITAL SIGNATURE FOR ELECTRONIC TEXT DOCUMENT SECURITY | July 2024 | February 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18769250 | METHOD FOR PUF GENERATION USING VARIATIONS IN TRANSISTOR THRESHOLD VOLTAGE AND SUBTHRESHOLD LEAKAGE CURRENT | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18768079 | METHOD FOR WEB PAGE FRAUD ACTIVITY | July 2024 | December 2024 | Allow | 5 | 1 | 0 | No | No |
| 18768082 | DOCUMENT IMAGE CLASSIFYING SYSTEM | July 2024 | January 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18768090 | SYSTEM FOR DETECTING WEB PAGE FRAUD BASED ON WORDLIST CATEGORIZATION | July 2024 | February 2025 | Allow | 7 | 1 | 0 | No | No |
| 18767089 | KEY RECOVERY BASED ON CONTACTLESS CARD AUTHENTICATION | July 2024 | April 2025 | Allow | 9 | 1 | 0 | No | No |
| 18765121 | Real-Time Precision Care Plan Support During Remote Care Management | July 2024 | November 2024 | Allow | 5 | 1 | 0 | No | No |
| 18760439 | System and Method for Securing and Facilitating Access to a Digital Legacy | July 2024 | May 2025 | Allow | 10 | 2 | 0 | No | No |
| 18759026 | BIOMETRIC AUTHENTICATION BASED ON BEHAVIORAL ANALYSIS | June 2024 | February 2025 | Allow | 7 | 1 | 0 | No | No |
| 18753154 | SYSTEMS AND METHODS FOR POPULATING ONLINE APPLICATIONS USING THIRD PARTY PLATFORMS | June 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18751229 | NETWORK CYBER SECURITY PLATFORM | June 2024 | January 2025 | Allow | 7 | 1 | 0 | No | No |
| 18751008 | Methods for Reconfigurable Intelligent Surface (RIS) Aided Cooperative Directional Security | June 2024 | March 2025 | Allow | 9 | 1 | 0 | No | No |
| 18744908 | ENTITY IP MAPPING | June 2024 | January 2025 | Allow | 7 | 1 | 0 | No | No |
| 18745774 | METHOD TO PREVENT ROOT LEVEL ACCESS ATTACK AND MEASURABLE SLA SECURITY AND COMPLIANCE PLATFORM | June 2024 | April 2025 | Allow | 10 | 1 | 0 | No | No |
| 18744564 | Agent Message Bus | June 2024 | September 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18744554 | CLOUD RESOURCE PRIORITIZATION FOR DATA SECURITY POSTURE MANAGEMENT BASED ON DETECTION OF CLOUD DATA PEAK SIGNALS | June 2024 | May 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18740667 | VIRTUALIZED PERMISSION AND SECURITY ENFORCEMENT | June 2024 | January 2025 | Allow | 7 | 1 | 0 | No | No |
| 18739111 | END-TO-END MEASUREMENT, GRADING AND EVALUATION OF PRETRAINED ARTIFICIAL INTELLIGENCE MODELS VIA A GRAPHICAL USER INTERFACE (GUI) SYSTEMS AND METHODS | June 2024 | December 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18737353 | Scalable, Secure, And Broad-Spectrum Mechanism For Enforcement Of Protocols Over Multi-Agent Systems | June 2024 | January 2025 | Allow | 8 | 2 | 0 | No | No |
| 18732988 | NETWORK ACCESS SYSTEM FOR DETECTING INTRUSIONS OVER A NETWORK | June 2024 | February 2025 | Allow | 9 | 1 | 0 | No | No |
| 18732712 | Anti-counterfeiting System and Method of Use | June 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18732644 | ZERO-WATERMARKING METHOD AND DEVICE FOR BIM DATA, AND MEDIUM | June 2024 | October 2024 | Allow | 4 | 1 | 0 | No | No |
| 18679532 | ESTABLISHING A TOKENIZED LICENSE OF A VIRTUAL ENVIRONMENT LEARNING OBJECT | May 2024 | April 2025 | Allow | 10 | 1 | 0 | No | No |
| 18678016 | ENHANCING HYBRID TRADITIONAL NEURAL NETWORKS WITH LIQUID NEURAL NETWORK UNITS FOR CYBER SECURITY AND OFFENSE PROTECTION | May 2024 | January 2025 | Allow | 8 | 1 | 0 | No | No |
| 18677595 | PROCESSING ACCESS REQUESTS ON A SERVICE-TO-SERVICE BASIS USING A THIRD-PARTY IDENTIFICATION TOKEN | May 2024 | October 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18677279 | SYSTEMS AND METHODS FOR DIGITAL THREAT ASSESSMENT AND MITIGATION USING T-DIGEST SCORE DISTRIBUTION REPRESENTATIONS AND PERCENTILE-BASED THREAT SCORING IN A DIGITAL THREAT MITIGATION PLATFORM | May 2024 | January 2025 | Allow | 7 | 1 | 0 | No | No |
| 18673033 | Generative AI Model Information Leakage Prevention | May 2024 | October 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18672655 | Configuring Context-Based Restrictions For A Computing Device | May 2024 | June 2025 | Allow | 12 | 2 | 0 | Yes | No |
| 18670016 | SECURITY AND PRIVACY INSPECTION OF BIDIRECTIONAL GENERATIVE ARTIFICIAL INTELLIGENCE TRAFFIC USING API NOTIFICATIONS | May 2024 | December 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18669980 | SECURITY AND PRIVACY INSPECTION OF BIDIRECTIONAL GENERATIVE ARTIFICIAL INTELLIGENCE TRAFFIC USING A FORWARD PROXY | May 2024 | December 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18669396 | METHOD AND SYSTEM FOR GENERATING STATEFUL ATTACKS | May 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18668279 | PARTIAL LIMITATION OF A MOBILE NETWORK DEVICE | May 2024 | April 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18665656 | SYSTEM AND METHOD OF CREATING CHAIN-ASSISTED DIGITAL SIGNATURE | May 2024 | October 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18666296 | System and Method for Authenticating Client Devices Communicating with an Enterprise System | May 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18664884 | EFFICIENT SUBORDINATE REQUEST WEB PAGE LOGGING | May 2024 | January 2025 | Allow | 8 | 1 | 0 | No | No |
| 18657549 | METHOD FOR SAFETY RESPONSES TO SECURITY POLICY VIOLATIONS | May 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18655436 | LINK ANOMALY DETECTOR | May 2024 | April 2025 | Allow | 11 | 2 | 0 | No | No |
| 18654684 | MACHINE LEARNING MODELING TO IDENTIFY SENSITIVE DATA | May 2024 | January 2025 | Allow | 8 | 1 | 0 | No | No |
| 18653459 | Managing Data Availability on Encryption Key Status Changes in Replicated Storage Systems | May 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18653746 | SYSTEMS AND METHODS FOR VERIFYING OR ENSURING COMMUNICATION PATHS | May 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18649532 | CYBERSECURITY INCIDENT RESPONSE TECHNIQUES UTILIZING ARTIFICIAL INTELLIGENCE | April 2024 | July 2024 | Allow | 3 | 1 | 0 | No | No |
| 18648430 | ELECTRONIC SYSTEM FOR CONVERGENT DISTRIBUTION OF ELECTRONIC DIGITAL CERTIFICATES | April 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18648445 | BLOCKCHAIN-BASED METHOD AND SYSTEM FOR SPECIFYING THE RECIPIENT OF AN ELECTRONIC COMMUNICATION | April 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18647876 | TECHNIQUES FOR DETECTING ARTIFICIAL INTELLIGENCE MODEL CYBERSECURITY RISK IN A COMPUTING ENVIRONMENT | April 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18648252 | Prompt Injection Classifier Using Intermediate Results | April 2024 | July 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18644463 | NETWORK ACCESS BASED ON AI FILTERING | April 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18644315 | INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE | April 2024 | March 2025 | Allow | 10 | 3 | 0 | Yes | No |
| 18638708 | SYSTEM AND METHOD FOR PRIVACY POLICY ENFORCEMENT | April 2024 | March 2025 | Allow | 11 | 2 | 0 | No | No |
| 18636468 | Browser extensionless phish-proof multi-factor authentication (MFA) | April 2024 | January 2025 | Allow | 9 | 1 | 0 | No | No |
| 18635879 | SYSTEMS AND METHODS FOR GENERATION OF THE LAST OBFUSCATED SECRET USING A SEED | April 2024 | June 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18635680 | THREAT MITIGATION SYSTEM AND METHOD | April 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18634793 | MULTI FACTOR AUTHENTICATION | April 2024 | December 2024 | Allow | 8 | 1 | 0 | No | No |
| 18627890 | SYSTEMS AND METHODS FOR PROTECTION MODELING | April 2024 | November 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18628332 | SYSTEMS AND METHODS FOR INTELLIGENCE VERIFICATION | April 2024 | November 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18623417 | SYSTEM AND METHOD FOR PROVIDING PROVABLE END-TO-END GUARANTEES ON COMMODITY HETEROGENEOUS INTERCONNECTED COMPUTING PLATFORMS | April 2024 | November 2024 | Allow | 8 | 1 | 0 | No | No |
| 18621791 | Selective Redaction of Personally Identifiable Information in Generative Artificial Intelligence Model Outputs | March 2024 | July 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18620714 | ADAPTIVE NETWORK SECURITY USING ZERO TRUST MICROSEGMENTATION | March 2024 | October 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18619952 | SYSTEMS AND METHODS FOR TEMPORARY ACCESS WITH ADAPTIVE TRUST LEVELS FOR AUTHENTICATION AND AUTHORIZATION | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18695687 | METHODS AND SYSTEMS OF OPERATING SOFTWARE-DEFINED NETWORKS | March 2024 | December 2024 | Allow | 9 | 2 | 0 | No | No |
| 18614345 | ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE | March 2024 | November 2024 | Allow | 8 | 1 | 0 | No | No |
| 18614127 | ADAPTIVE SECURITY ARCHITECTURE USING EMBEDDED PROTECTION IN VENDOR APPLICATIONS | March 2024 | April 2025 | Allow | 13 | 0 | 0 | No | No |
| 18612690 | PRIVACY PRESERVING LOCATION TRACKING | March 2024 | April 2025 | Allow | 13 | 2 | 0 | Yes | Yes |
| 18612766 | CONTROL DEVICE AND CONTROL METHOD | March 2024 | October 2024 | Allow | 7 | 1 | 0 | No | No |
| 18608780 | TRANSMISSION OF SECURE INFORMATION IN A CONTENT DISTRIBUTION NETWORK | March 2024 | February 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18608457 | USER IDENTIFICATION PROOFING USING A COMBINATION OF USER RESPONSES TO SYSTEM TURING TESTS USING BIOMETRIC METHODS | March 2024 | June 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18607193 | AUTOMATED ID PROOFING USING A RANDOM MULTITUDE OF REAL-TIME BEHAVIORAL BIOMETRIC SAMPLINGS | March 2024 | June 2025 | Allow | 15 | 1 | 0 | No | No |
| 18692524 | METHOD AND APPARATUS FOR ENHANCING SECURITY OF QUANTUM KEY DISTRIBUTION NETWORK | March 2024 | December 2024 | Allow | 9 | 1 | 0 | No | No |
| 18602866 | ECDHE Key Exchange for Server Authentication and a Key Server | March 2024 | October 2024 | Allow | 7 | 1 | 0 | No | No |
| 18602035 | SYSTEM AND METHOD FOR SECURE RELAYED COMMUNICATIONS FROM AN IMPLANTABLE MEDICAL DEVICE | March 2024 | September 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18600245 | SECURE DATA COLLECTION FROM AN AIR-GAPPED NETWORK | March 2024 | December 2024 | Allow | 9 | 1 | 0 | No | No |
| 18599864 | CONTROL DEVICE AND CONTROL METHOD | March 2024 | November 2024 | Allow | 8 | 1 | 0 | No | No |
| 18600220 | SOCKET CONNECTION VERIFICATION | March 2024 | May 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18597627 | SYSTEMS, METHODS, AND DEVICES FOR SECURED NONVOLATILE MEMORIES | March 2024 | January 2025 | Allow | 11 | 1 | 0 | No | No |
| 18595262 | SECURE COMMUNICATION IN MOBILE DIGITAL PAGES | March 2024 | June 2025 | Allow | 16 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2435.
With a 25.5% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 24.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2435 is part of Group 2430 in Technology Center 2400. This art unit has examined 10,871 patent applications in our dataset, with an overall allowance rate of 85.9%. Applications typically reach final disposition in approximately 27 months.
Art Unit 2435's allowance rate of 85.9% places it in the 81% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.
Applications in Art Unit 2435 receive an average of 1.67 office actions before reaching final disposition (in the 35% percentile). The median prosecution time is 27 months (in the 61% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.