Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19340698 | INTEGRATED AGENT-DRIVEN DATA FRAMEWORK | September 2025 | March 2026 | Allow | 5 | 1 | 0 | Yes | No |
| 19328030 | RESOURCE UTILIZATION ESTIMATION AND ALLOCATION FOR MULTI-AGENT COMPUTATIONAL SYSTEMS | September 2025 | November 2025 | Allow | 2 | 0 | 0 | No | No |
| 19305988 | TYPED SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) TRIAGE PROCESSING COMPONENTS SYSTEM | August 2025 | November 2025 | Allow | 2 | 0 | 0 | No | No |
| 19301809 | ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE | August 2025 | January 2026 | Allow | 5 | 1 | 0 | No | No |
| 19301893 | ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE | August 2025 | January 2026 | Allow | 5 | 1 | 0 | No | No |
| 19300607 | METHODS AND SYSTEMS FOR DOMAIN-SPECIFIC INTERVIEW SIMULATIONS | August 2025 | November 2025 | Allow | 3 | 0 | 0 | No | No |
| 19296653 | AUTOMATED THREAT HUNTING | August 2025 | October 2025 | Allow | 3 | 0 | 0 | No | No |
| 19283194 | AUTONOMOUS AGENT OBSERVATION AND CONTROL | July 2025 | December 2025 | Allow | 5 | 0 | 0 | No | No |
| 19272328 | CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINS | July 2025 | October 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19268956 | OPERATION METHOD OF ELECTRONIC APPARATUS FOR PERFORMING LARGE LANGUAGE MODEL BASED ANALYSIS INFERENCE FOR MALICIOUS SCRIPT ACTION | July 2025 | August 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19268166 | COLLUSION-RESISTANT IDENTITY-BASED AND QUANTUM-RESILIENT SECURE CORRELATION SCHEMES | July 2025 | December 2025 | Allow | 5 | 0 | 0 | No | No |
| 19267471 | Insecure Model Context Protocol Server Remediation for Artificial Intelligence Agents | July 2025 | October 2025 | Allow | 3 | 0 | 0 | No | No |
| 19267475 | Streamlined Policy Administration of Model Context Protocol Servers for Artificial Intelligence Agents | July 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19264594 | SYSTEMS AND METHODS FOR AUTOMATIC VULNERABILITY ASSESSMENT OF MACHINE LEARNING MODELS | July 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19264639 | SYSTEMS AND METHODS FOR MEDICAL IMAGING GATEWAYS | July 2025 | November 2025 | Allow | 5 | 1 | 0 | No | No |
| 19263395 | Provenance for AI Twin of an Artist | July 2025 | January 2026 | Allow | 7 | 1 | 0 | No | No |
| 19261636 | SYSTEMS AND METHODS FOR REAL-TIME DETECTION AND MITIGATION OF MALICIOUS ELECTRONIC COMMUNICATIONS | July 2025 | September 2025 | Allow | 2 | 0 | 0 | No | No |
| 19224127 | TECHNIQUES FOR CROSS ENTITY CORRELATION OF USER ACCOUNTS IN CLOUD COMPUTING ENVIRONMENTS | May 2025 | October 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 18847213 | METHOD FOR DETECTING DATA STEALTHY ATTACK ON NETWORKED SYSTEM WITH DIFFERENTIAL PRIVACY PROTECTION | May 2025 | July 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 19217385 | TECHNIQUES FOR ACTIVE INSPECTION DETECTION OF EFFECTIVE NETWORK EXPOSURE THROUGH A CLOUD-NATIVE PROXY APPLIANCE | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19217405 | SYSTEM AND METHOD FOR APPLYING CYBERSECURITY CONTROLS ON CLOUD NATIVE ROUTING SERVICES | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19217379 | TECHNIQUES FOR DETECTION OF CYBERSECURITY ISSUES ON THIRD PARTY SOFTWARE APPLIANCES UTILIZING CUSTOM CONFIGURATION LOGS | May 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19214799 | COMPUTERIZED SECURITY PLATFORMS INCLUDING A ROLE-BASED PERMISSIONS SYSTEM | May 2025 | November 2025 | Allow | 6 | 1 | 0 | No | No |
| 19204523 | Data Processing Orchestrator Utilizing Semantic Type Inference and Privacy Preservation | May 2025 | August 2025 | Allow | 4 | 0 | 0 | No | No |
| 19193127 | CYBERSECURITY ROOT CAUSE ANALYSIS USING COMPUTING RESOURCE NAME CORRELATION | April 2025 | September 2025 | Allow | 4 | 1 | 0 | No | No |
| 19192958 | SYSTEMS AND METHODS FOR FACILITATING QUANTUM-RESISTANT ENCRYPTION OF DATA | April 2025 | September 2025 | Allow | 5 | 0 | 1 | No | No |
| 19188648 | TECHNIQUES FOR CONTROL PLANE LEVEL CONTAINMENT | April 2025 | July 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19183978 | SYSTEM AND METHOD FOR PRIVACY POLICY ENFORCEMENT | April 2025 | January 2026 | Allow | 9 | 1 | 0 | Yes | No |
| 19173428 | MACHINE LEARNING MODELING TO IDENTIFY SENSITIVE DATA | April 2025 | August 2025 | Allow | 4 | 1 | 0 | No | No |
| 19173767 | Computer-Implemented System That Enables Detection Of Fraudulent GPS Coordinates Provided During Media Collection For Inspections Performed Via Mobile Devices | April 2025 | September 2025 | Allow | 5 | 0 | 0 | No | No |
| 19118772 | TRAINING A SUPERVISED MACHINE LEARNING MODEL FOR ANOMALY DETECTION | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19118583 | CONTROLLED PRIVACY IN BIOMETRIC IDENTIFICATION | April 2025 | November 2025 | Allow | 7 | 1 | 0 | No | No |
| 19094636 | DATA MANAGEMENT PLATFORM | March 2025 | June 2025 | Allow | 3 | 1 | 0 | No | No |
| 19092750 | TECHNIQUES FOR API ENDPOINT MITIGATION | March 2025 | October 2025 | Allow | 6 | 1 | 0 | No | No |
| 19086583 | SECURE AND DYNAMIC PEER-BASED NETWORK CONNECTION CONFIGURATION, ROUTING, AND CONTROL | March 2025 | October 2025 | Allow | 7 | 1 | 0 | No | No |
| 19114194 | Method, Device and System for Managing Carbon Data and Related Apparatus | March 2025 | February 2026 | Allow | 11 | 2 | 0 | No | No |
| 19112335 | DATA SHARING SYSTEM, METHOD AND APPARATUS, AND DEVICE AND MEDIUM | March 2025 | January 2026 | Allow | 10 | 0 | 0 | No | No |
| 19070154 | DETECTION OF STALE DATA OBJECTS AND ASSOCIATED CYBERSECURITY RISK | March 2025 | June 2025 | Allow | 4 | 1 | 0 | No | No |
| 19070261 | System and Method for Performing Access Control Enforcement via Packet Inspection | March 2025 | July 2025 | Allow | 5 | 1 | 0 | No | No |
| 19069949 | SYSTEMS AND METHODS FOR DIGITAL THREAT ASSESSMENT AND MITIGATION USING T-DIGEST SCORE DISTRIBUTION REPRESENTATIONS AND PERCENTILE-BASED THREAT SCORING IN A DIGITAL THREAT MITIGATION PLATFORM | March 2025 | June 2025 | Allow | 4 | 1 | 0 | No | No |
| 19065161 | LIVE MASKING | February 2025 | August 2025 | Allow | 5 | 1 | 0 | No | No |
| 19054256 | SYSTEMS AND METHODS FOR HIGH-CONFIDENCE SYMMETRIC-KEY DOCUMENT SIGNING AND ENCRYPTION USING A COMPUTING DEVICE | February 2025 | February 2026 | Allow | 12 | 1 | 0 | Yes | No |
| 19045368 | Detection of Privacy Attacks on Machine Learning Models | February 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19040407 | ACTIVITY GRAPH FOR AUTOMATED INVESTIGATION | January 2025 | August 2025 | Allow | 6 | 1 | 0 | No | No |
| 19035283 | NETWORK DATA DECODING AND ENCODING | January 2025 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19011802 | ARTIFICIAL INTELLIGENCE BASED (AI-BASED) SYSTEM AND METHOD POWERED BY LARGE LANGUAGE MODELS (LLMs) FOR MONITORING USERS DURING TASKS PERFORMED BY THE USERS | January 2025 | June 2025 | Allow | 5 | 1 | 0 | No | No |
| 19000872 | TECHNIQUES FOR RISK AND CONSTRAINT-BASED INSPECTION | December 2024 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19000595 | SECURITY HARDENING OF A RENEWABLE ENERGY DEVICE SYSTEM | December 2024 | June 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18986948 | DETECTION ENGINE WITH STATEFUL DETECTION WITH ENTITY STREAM | December 2024 | October 2025 | Allow | 10 | 2 | 0 | No | No |
| 18981911 | PERSONALLY IDENTIFIABLE INFORMATION SCRUBBER WITH LANGUAGE MODELS | December 2024 | April 2025 | Allow | 4 | 0 | 0 | No | No |
| 18982355 | CYBERSECURITY ROOT CAUSE ANALYSIS USING COMPUTING RESOURCE NAME CORRELATION | December 2024 | April 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 18975533 | FINE-GRAINED ACCESS TO SYSTEM COMMANDS RUN VIA AN INSTALLED AGENT APPLICATION | December 2024 | July 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18954015 | SYSTEM AND METHOD FOR TRACING CLOUD COMPUTING ENVIRONMENT DEPLOYMENTS TO CODE OBJECTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18951209 | SYSTEM AND METHOD FOR APPLYING MULTI-SOURCE CYBERSECURITY POLICY ON COMPUTING ENVIRONMENTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18947102 | DYNAMIC MULTI-MODEL MONITORING AND VALIDATION FOR ARTIFICIAL INTELLIGENCE MODELS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18945370 | Detection of Machine Learning Model Attacks Obfuscated in Unicode | November 2024 | March 2025 | Allow | 4 | 1 | 0 | No | No |
| 18938365 | SYSTEMS AND METHODS FOR DETECTING NON-PROVISIONED USAGE OF APPLICATIONS IN AN ORGANIZATION | November 2024 | March 2025 | Allow | 4 | 0 | 0 | No | No |
| 18937243 | SECURE MODEL AGGREGATION METHOD AND APPARATUS | November 2024 | February 2026 | Allow | 15 | 0 | 0 | No | No |
| 18933896 | METHODS AND SYSTEMS OF FACILITATING AUTHENTICATION FOR ACCESSING A SERVICE | October 2024 | February 2026 | Allow | 15 | 0 | 0 | No | No |
| 18932272 | SYNCHRONIZED TASK MANAGEMENT FOR A SECURITY SYSTEM | October 2024 | June 2025 | Allow | 8 | 0 | 1 | Yes | No |
| 18928564 | MUTABLE ACCESS TOKENS | October 2024 | December 2025 | Allow | 13 | 1 | 0 | No | No |
| 18923930 | SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR DATA SECURITY | October 2024 | February 2026 | Allow | 15 | 0 | 0 | No | No |
| 18923655 | DETECTION AND MITIGATION OF MACHINE LEARNING MODEL ADVERSARIAL ATTACKS | October 2024 | January 2025 | Allow | 3 | 0 | 0 | No | No |
| 18917317 | VARIFOCAL THREAT ANALYSIS SYSTEM AND METHOD | October 2024 | January 2026 | Allow | 15 | 0 | 0 | Yes | No |
| 18853618 | METHOD AND APPARATUS FOR DISTRIBUTING ENCRYPTED DEVICE UNIQUE CREDENTIALS | October 2024 | February 2026 | Allow | 17 | 0 | 0 | No | No |
| 18901013 | DATA PROTECTION COMPONENT SCALING IN A CLOUD-BASED DATA STORAGE SYSTEM | September 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18902627 | AUTHENTICATION OF COMMUNICATION SESSION PARTICIPANTS USING BLOCKCHAIN | September 2024 | January 2026 | Allow | 15 | 0 | 0 | Yes | No |
| 18902564 | Agent Message Bus | September 2024 | November 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18900430 | GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATION | September 2024 | March 2025 | Allow | 6 | 0 | 0 | No | No |
| 18900216 | GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATION | September 2024 | August 2025 | Allow | 11 | 1 | 0 | No | No |
| 18890756 | METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS TO PRIVATIZE CONSUMER DATA | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18888967 | TECHNIQUES FOR DETECTING ARTIFICIAL INTELLIGENCE MODEL CYBERSECURITY RISK IN A COMPUTING ENVIRONMENT | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18848222 | MATCHING SYSTEM, MATCHING APPARATUS, MATCHING METHOD, AND PROGRAM | September 2024 | February 2026 | Allow | 17 | 0 | 0 | No | No |
| 18888882 | Intelligent Querying Of Network-Connected Devices | September 2024 | December 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18887560 | VERIFIED PRESENTATION OF NON-FUNGIBLE TOKENS | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18883288 | USING CACHED NETWORK DATA ON A DEVICE TO DISCOVER UNSCANNABLE DEVICES | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18828919 | PREVENTION OF INFORMATION LEAKAGE THROUGH SIGNATURE | September 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18822570 | SYSTEMS AND METHODS FOR ASYNCHRONOUS EVENT-BASED API CALLBACK | September 2024 | November 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18822497 | DISTRIBUTED DIGITAL WALLET SEED PHRASE | September 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18821107 | TEXT-TO-TRAFFIC SYNTHETIC NETWORK TRAFFIC DATA GENERATION SYSTEM | August 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18821924 | SYSTEMS AND METHODS TO MONITOR VERACITY OF PROFILES OF THIRD-PARTY, ONLINE PLATFORMS | August 2024 | October 2025 | Allow | 14 | 0 | 0 | No | No |
| 18819405 | WEB SERVICE-BASED MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE OF CALLING SERVICE | August 2024 | December 2024 | Allow | 4 | 1 | 0 | No | No |
| 18819535 | DATA PROCESSING METHOD, DEVICE, AND STORAGE MEDIUM | August 2024 | December 2024 | Allow | 4 | 0 | 0 | No | No |
| 18817890 | ACTIVE DATA DISPOSAL | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18812109 | PASSWORD RESET USING AN ASYMMETRIC ENCRYPTION KEY PAIR | August 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18811739 | SYSTEMS AND METHODS FOR PREVENTING CYBERSECURITY ATTACKS THROUGH DIGITAL IDENTITY VERIFICATION | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18811624 | Defense of Multimodal Machine Learning Models via Activation Analysis | August 2024 | January 2026 | Allow | 17 | 1 | 0 | No | No |
| 18840223 | METHOD FOR SECURELY NEGOTIATING SYMMETRICAL KEYS BETWEEN TWO PARTICIPANTS IN A COMMUNICATION | August 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18809750 | METHOD AND SYSTEM FOR A SECURE MULTILEVEL NESTED BLOCKCHAIN DATA STORAGE | August 2024 | December 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18808231 | DYNAMIC DEFENSE SYSTEM AND METHOD OF NEW ENERGY CENTRALIZED CONTROL STATION NETWORK BASED ON DYNAMIC IP | August 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18807000 | SYSTEMS AND METHODS FOR SIMULATING APPLICATION BREACHES | August 2024 | October 2025 | Allow | 14 | 0 | 0 | No | No |
| 18807245 | METHOD FOR IMPROVED BIOMETRIC AUTHENTICATION | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18805732 | WEBPAGE CATEGORIZATION BASED ON IMAGE CLASSIFICATION OF WEBPAGE SCREEN CAPTURE | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18806036 | APPARATUS AND METHOD FOR ENHANCING SECURITY OF IN-VEHICLE COMMUNICATION NETWORK | August 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18806291 | SYSTEM AND METHOD FOR MONITORING SECURITY VULNERABILITIES IN SOFTWARE APPLICATIONS WITH THIRD-PARTY COMPONENTS | August 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18805460 | WATERMARK EMBEDDING METHOD BASED ON SERVICE INVOCATION DATA | August 2024 | January 2025 | Allow | 5 | 1 | 0 | No | No |
| 18802307 | METHOD AND SYSTEM FOR SECURE PASSWORD MIGRATION BETWEEN AUTHENTICATION SERVERS | August 2024 | October 2025 | Allow | 14 | 0 | 0 | No | No |
| 18800427 | SUBSTITUTE USER INTERFACE FOR SENSITIVE DATA | August 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18798872 | AUTOMATED SECURE ACCESS TO ONLINE ACCOUNTS | August 2024 | January 2025 | Allow | 5 | 2 | 0 | No | No |
| 18797676 | MESSAGING LAYER SECURITY (MLS) PROTOCOL-BASED SECURE CHANNELS | August 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2435.
With a 24.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 24.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2435 is part of Group 2430 in Technology Center 2400. This art unit has examined 10,392 patent applications in our dataset, with an overall allowance rate of 83.7%. Applications typically reach final disposition in approximately 29 months.
Art Unit 2435's allowance rate of 83.7% places it in the 77% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.
Applications in Art Unit 2435 receive an average of 1.80 office actions before reaching final disposition (in the 42% percentile). The median prosecution time is 29 months (in the 59% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.