USPTO Art Unit 2436 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19278692SYSTEM FOR FEDERATED COMPLIANCE-TOKEN INHERITANCE, DIGITAL ARTIFACT REGISTRY, AND MONETIZATION IN REGULATED ENVIRONMENTS USING LARGE LANGUAGE MODELSJuly 2025October 2025Allow300YesNo
19272214CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINSJuly 2025September 2025Allow200YesNo
19241508SECURE AND TRUSTED USE METHOD AND SYSTEM FOR LARGE MODEL BASED ON CONFIDENTIAL COMPUTINGJune 2025March 2026Allow900YesNo
19208115SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORKMay 2025June 2025Allow100YesNo
19191033REMEDIATING VULNERABILITIES USING SOFTWARE UPDATE MANAGEMENT PLATFORM WITH INTEGRATED THREAT INTELLIGENCEApril 2025September 2025Allow420NoNo
19190115CENTRALIZED TECHNOLOGY ACCESS CONTROLApril 2025September 2025Allow500YesNo
19123144NON-CUSTODIAL CRYPTOCURRENCY WALLETApril 2025March 2026Allow1000YesNo
19170903SOFTWARE COMPOSITION ANALYSIS (SCA) TO IDENTIFY AI-GENERATED CODE THAT IS COPIED CODE FROM THIRD-PARTY LIBRARIESApril 2025June 2025Allow200YesNo
19075418SYSTEMS AND METHODS OF PRESERVING SECURITY AUTHENTICATION FOR MULTI-THREADED DATA PROCESSINGMarch 2025July 2025Allow410NoNo
19052090Detection of Vulnerabilities in Computational GraphsFebruary 2025December 2025Allow1020YesNo
19042955MEDICAL DEVICE AND HEALTH INFORMATION TRACKING SYSTEMS AND METHODSJanuary 2025May 2025Allow300YesNo
19022847SYSTEMS AND METHODS FOR DYNAMICALLY DETERMINING ASSESSMENT RESULTSJanuary 2025November 2025Allow1020YesNo
19002162METHOD AND SYSTEM FOR IMPROVING HOMOMORPHIC ENCRYPTION PERFORMANCE BASED ON TRUSTED EXECUTION ENVIRONMENTDecember 2024December 2025Allow1120YesNo
18975340ARTIFICIAL INTELLIGENCE FOR CYBER THREAT INTELLIGENCEDecember 2024May 2025Allow610YesNo
18969536Cyber Detection Analytics EngineDecember 2024March 2025Allow300YesNo
18966866COMPUTER-BASED SYSTEMS CONFIGURED FOR MALWARE DETECTION AND METHODS OF USE THEREOFDecember 2024March 2025Allow410YesNo
18964189METHODS AND SYSTEMS FOR OPTIMIZING GROUPING FOR ENHANCED ACCESS CONTROL AND RISK MITIGATION IN AN ENTERPRISENovember 2024April 2025Allow510NoNo
18869189TECHNIQUES FOR ANONYMIZING USER ACTIVITYNovember 2024March 2026Allow1500NoNo
18945260System and Method for Authenticating a User to a Third Party Based on One or More Words From a Word ListNovember 2024October 2025Allow1120YesNo
18940914SYSTEM AND METHOD TO ANALYZE SECURITY ACROSS DIGITAL ENVIRONMENTSNovember 2024January 2025Allow200NoNo
18927703Cryptography Bill of Materials (CBOM) Generation from Binary ExecutablesOctober 2024January 2025Allow200NoNo
18913230SYSTEMS AND METHODS FOR CHATBOT AUTHENTICATIONOctober 2024February 2026Allow1600NoNo
18905183SYSTEMS AND METHODS FOR SECURING CONTENTOctober 2024January 2026Allow1600NoNo
18889216RADIO EXPOSURE FUNCTION FOR TELECOMMUNICATIONS NETWORKSSeptember 2024May 2025Allow820YesNo
18887044SECURITY CONTROL SYSTEM AND METHODSeptember 2024August 2025Allow1020YesNo
18883251DYNAMIC KERNEL SECURITY MODULESeptember 2024July 2025Allow1020YesNo
18882699Host Deduplication for Vulnerability Detection and Management in IT SystemsSeptember 2024November 2024Allow300YesNo
18830055System and method for generating decoy data and sharding sensitive data utilizing quantum computingSeptember 2024February 2026Allow1710NoNo
18819112SUPPLEMENTAL ATTACK SURFACE SCANNER (SASS) CONFIGURATION INTEGRATION COMPONENTAugust 2024January 2026Allow1700NoNo
18818320SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORKAugust 2024March 2025Allow710YesNo
18816678ASYNCHRONOUS CYBERSECURITY EVENT DETECTION PLATFORMAugust 2024January 2026Allow1600YesNo
18811924SYSTEM AND METHOD FOR MANAGING DATA OF AN AUTOMATION FIELD DEVICE IN A SECURE MANNER AGAINST MANIPULATIONAugust 2024March 2026Allow1910YesNo
18811662Systems and Methods for Assessing Security in a Computing Device EnvironmentAugust 2024June 2025Abandon1010NoNo
18838330METHODS AND ARRANGEMENTS FOR ESTABLISHING DIGITAL IDENTITYAugust 2024November 2025Allow1500NoNo
18798510METHOD AND APPARATUS FOR USING A PICTURE AND SHARED SECRET TO CREATE REPLICABLE HIGH QUALITY POOLS OF ENTROPY FOR KEYS FOR ENCRYPTION, AUTHENTICATION AND ONE TIME PADS FOR IMAGES, DATA AND MESSAGE ENCODINGAugust 2024October 2024Allow200YesNo
18717289Systems and Methods For Facilitating Privacy Disclosure and ConsentAugust 2024November 2025Allow1700YesNo
18795239MACHINE LEARNED ALERT CLASSIFICATION SYSTEMAugust 2024December 2025Allow1600YesNo
18792338Efficient Generation of Identity Provider IntegrationsAugust 2024March 2026Allow1910NoNo
18790022SYSTEM AND METHOD FOR AUTOMATED EXPLOITATION GENERATIONJuly 2024June 2025Allow1020NoNo
18791301Cryptography Bill of Materials (CBOM) Generation from Binary ExecutablesJuly 2024October 2024Allow300YesNo
18790060LARGE LANGUAGE MODEL-BASED VULNERABILITY REMEDIATION ACTION DESCRIPTIONSJuly 2024March 2026Allow1900YesNo
18787095EARLY EXIT DYNAMIC ANALYSIS OF A VIRTUAL MACHINEJuly 2024March 2026Allow1910YesNo
18773918ENCRYPTED INFORMATION RETRIEVALJuly 2024February 2026Allow1910NoNo
18770587AUTHENTICATION AND KEY REGENERATION USING A REGENERATED SECRETJuly 2024March 2025Allow810YesNo
18769880COMPUTER SYSTEM ARCHITECTURE WITH MODULAR APPROACHJuly 2024February 2026Allow1910NoNo
18768558DATA TOKENIZATION AND SEARCH IN A DISTRIBUTED NETWORKJuly 2024July 2025Allow1210NoNo
18767276FILE SHARING OVER SECURE CONNECTIONSJuly 2024February 2025Allow710NoNo
18767063Cybersecurity Vulnerability Management Program Evaluation SystemJuly 2024October 2025Allow1500YesNo
18766200ANOMALY DETECTION DEVICE AND ANOMALY DETECTION METHODJuly 2024February 2026Allow1910YesNo
18765625INTEROPERABLE UNLOCKING TECHNOLOGY FOR WIRELESS DEVICESJuly 2024October 2025Allow1500YesNo
18764902VERIFICATION PLATFORMJuly 2024January 2026Allow1920NoNo
18761877METHOD AND APPARATUS FOR CREATING AND USING QUANTUM RESISTANT KEYSJuly 2024October 2025Allow1500YesNo
18760564TRAINING AN ARTIFICIAL INTELLIGENCE ENGINE FOR REAL-TIME MONITORING TO ELIMINATE FALSE POSITIVESJuly 2024May 2025Allow1110NoNo
18758598AUTOMATIC SECURITY MESSAGE INTERACTIONJune 2024March 2026Allow2110NoNo
18759163STATELESS APPLICATION LAYER USER SESSION TRACKINGJune 2024October 2025Allow1600YesNo
18756892SECURITY INTERCEPTOR FOR GENERATIVE ARTIFICIAL INTELLIGENCE PLATFORMSJune 2024October 2025Allow1500YesNo
18753982Policies and Encryption to Protect Digital InformationJune 2024June 2025Allow1210NoNo
18748149KEY NEGOTIATION AND PROVISIONING FOR DEVICES IN A NETWORKJune 2024June 2025Allow1210YesNo
18747406SHARING CUSTOMER DATA BETWEEN ENTITIES IN AN ORGANIZATIONJune 2024January 2026Allow1900NoNo
18744542INTERNET PROTOCOL (IP) CURATORJune 2024March 2025Allow910YesNo
18717434A METHOD FOR PROVISIONING A SECURE ELEMENT WITH A PROFILEJune 2024March 2026Allow2110YesNo
18734707SYSTEM AND METHOD FOR MITIGATING CYBER SECURITY THREATS BY DEVICES USING RISK FACTORSJune 2024May 2025Allow1210NoNo
18732709CAN BUS PROTECTION SYSTEMS AND METHODSJune 2024September 2025Allow1611NoNo
18732309GATEWAY AGNOSTIC TOKENIZATIONJune 2024June 2025Allow1310YesNo
18680878DETECTING VISUAL SIMILARITY BETWEEN DNS FULLY QUALIFIED DOMAIN NAMESMay 2024September 2025Allow1510YesNo
18680735Systems and Methods for Unauthenticated Account OpeningMay 2024September 2025Allow1600YesNo
18678578Bot detection and mitigation using dynamic web flows built via machine learningMay 2024February 2026Allow2000NoNo
18677389METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR GENERATING TEXT CONTENTMay 2024November 2025Allow1800YesNo
18676573Preventing EDR Termination using Vulnerable DriversMay 2024March 2026Allow2120YesNo
18677428SYSTEMS AND PROCESSES FOR GENERATING A SINGLE CRYPTOCURRENCY ADDRESS MAPPING SPACE FOR A PLURALITY OF CRYPTOCURRENCIES BY CLUSTERINGMay 2024April 2025Allow1010YesNo
18674570METHOD AND SYSTEM FOR PROVIDING FRACTIONALIZED ACCESS TO CYBERSECURITY INTELLIGENCE CONTENT OR CYBERSECURITY SERVICEMay 2024June 2025Abandon1310NoNo
18671494TRUSTED AND SECURED CLIENT-SERVER MODEL IN KUBERNETES CLUSTER PODSMay 2024January 2026Allow1910YesNo
18667871SYSTEMS AND METHODS FOR NETWORK-BASED UE SERVICE AUTHORIZATIONMay 2024January 2026Allow2010YesNo
18664809AGGREGATING ENCRYPTED NETWORK VALUESMay 2024January 2025Allow900YesNo
18665153SECURE MEMORY SYSTEM PROGRAMMING FOR HOST DEVICE VERIFICATIONMay 2024November 2025Allow1820NoNo
18663340AUTOMATIC INLINE DETECTION BASED ON STATIC DATAMay 2024June 2025Allow1310YesNo
18710151CONTROLLER-BASED SYSTEM FOR CONTROLLING NETWORK ACCESS, AND METHOD THEREFORMay 2024November 2025Allow1800YesNo
18662603METHOD AND APPARATUS FOR SECURE PRIVATE KEY STORAGE ON IOT DEVICEMay 2024February 2025Allow900YesNo
18662636METHOD AND APPARATUS FOR SIMULTANEOUS KEY GENERATION ON DEVICE AND SERVER FOR SECURE COMMUNICATIONMay 2024February 2025Allow900YesNo
18657183Spoofed UDP Packet DetectionMay 2024March 2026Allow2200YesNo
18657330ACCURACY IN ATTACK TECHNIQUE LABELING IN AN EXTENDED DETECTION SYSTEMMay 2024September 2025Allow1600NoNo
18656895CLASSIFIER FOR IDENTIFYING SUSPICIOUS PDF FILES TO LIMIT DEEP-SCANNINGMay 2024March 2025Allow1120YesNo
18656368INTEGRATION PACKAGING FOR A MULTI-TENANT COMPUTING ENVIRONMENTMay 2024October 2024Allow610YesNo
18654229METHOD OF AUTHENTICATION BETWEEN ELECTRONIC DEVICESMay 2024July 2025Allow1520YesNo
18654228MESSAGE SENDER SECURITY IN MESSAGING SYSTEMMay 2024September 2025Allow1610NoNo
18650200Insight Generation Using Personal Identifiable Information (PII) Footprint ModelingApril 2024September 2024Allow500YesNo
18650178INLINE DETECTION OF ENCRYPTED MALICIOUS NETWORK SESSIONSApril 2024April 2025Allow1110YesNo
18651045REQUIREMENT OPERATIONAL DEFINITIONS FOR INFORMATION SECURITY AND PRIVACY COMPLIANCEApril 2024October 2025Allow1700YesNo
18648850ORPHAN DATA IDENTIFICATION AND CLEANUP IN A DATABASE-AS-A-SERVICE CLOUD COMPUTING PLATFORMApril 2024January 2026Allow2010YesNo
18649336SECURE DATA EXCHANGEApril 2024June 2025Allow1310YesNo
18650045TREE-BASED LEARNING OF APPLICATION PROGRAMMING INTERFACE SPECIFICATIONApril 2024July 2025Allow1510YesNo
18649594PRIVACY FILTERS AND ODOMETERS FOR DEEP LEARNINGApril 2024December 2024Allow810YesNo
18649783Controlling Operator Access To Customer Cloud Infrastructure EnvironmentsApril 2024December 2025Allow2010YesNo
18649212SELECTING A TRANSMISSION PATH FOR COMMUNICATING DATA BASED ON A CLASSIFICATION FOR THE DATAApril 2024December 2025Allow1910NoNo
18649484TECHNIQUES FOR IDENTIFYING GAPS IN SECURITY CONTROLSApril 2024October 2024Allow610NoNo
18649916ELECTRONIC SYSTEM FOR GENERATING AND TRACKING LINKED ELECTRONIC DIGITAL CERTIFICATESApril 2024July 2025Allow1410NoNo
18647897TECHNIQUES FOR CYBERSECURITY IDENTITY RISK DETECTION UTILIZING DISK CLONING AND UNIFIED IDENTITY MAPPINGApril 2024October 2024Allow610YesNo
18646114SECURITY POLICIES FOR SOFTWARE CALL STACKSApril 2024December 2024Allow810YesNo
18646655DEFENSE-IN-DEPTH METHOD BASED ON KNOWN DEVICE BEHAVIORApril 2024March 2026Allow2210NoNo
18643254DECENTRALIZED PROCESSING OF INTERACTIONS ON DELIVERYApril 2024June 2025Allow1410YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2436.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
149
Examiner Affirmed
110
(73.8%)
Examiner Reversed
39
(26.2%)
Reversal Percentile
18.5%
Lower than average

What This Means

With a 26.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
812
Allowed After Appeal Filing
250
(30.8%)
Not Allowed After Appeal Filing
562
(69.2%)
Filing Benefit Percentile
42.8%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 30.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2436 - Prosecution Statistics Summary

Executive Summary

Art Unit 2436 is part of Group 2430 in Technology Center 2400. This art unit has examined 9,116 patent applications in our dataset, with an overall allowance rate of 81.7%. Applications typically reach final disposition in approximately 32 months.

Comparative Analysis

Art Unit 2436's allowance rate of 81.7% places it in the 70% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2436 receive an average of 2.12 office actions before reaching final disposition (in the 68% percentile). The median prosecution time is 32 months (in the 42% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.