Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19042955 | MEDICAL DEVICE AND HEALTH INFORMATION TRACKING SYSTEMS AND METHODS | January 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18969536 | Cyber Detection Analytics Engine | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18940914 | SYSTEM AND METHOD TO ANALYZE SECURITY ACROSS DIGITAL ENVIRONMENTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18927703 | Cryptography Bill of Materials (CBOM) Generation from Binary Executables | October 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18889216 | RADIO EXPOSURE FUNCTION FOR TELECOMMUNICATIONS NETWORKS | September 2024 | May 2025 | Allow | 8 | 2 | 0 | Yes | No |
| 18882699 | Host Deduplication for Vulnerability Detection and Management in IT Systems | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18818320 | SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORK | August 2024 | March 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18811662 | Systems and Methods for Assessing Security in a Computing Device Environment | August 2024 | June 2025 | Abandon | 10 | 1 | 0 | No | No |
| 18798510 | METHOD AND APPARATUS FOR USING A PICTURE AND SHARED SECRET TO CREATE REPLICABLE HIGH QUALITY POOLS OF ENTROPY FOR KEYS FOR ENCRYPTION, AUTHENTICATION AND ONE TIME PADS FOR IMAGES, DATA AND MESSAGE ENCODING | August 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18790022 | SYSTEM AND METHOD FOR AUTOMATED EXPLOITATION GENERATION | July 2024 | June 2025 | Allow | 10 | 2 | 0 | No | No |
| 18791301 | Cryptography Bill of Materials (CBOM) Generation from Binary Executables | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18770587 | AUTHENTICATION AND KEY REGENERATION USING A REGENERATED SECRET | July 2024 | March 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18768558 | DATA TOKENIZATION AND SEARCH IN A DISTRIBUTED NETWORK | July 2024 | July 2025 | Allow | 12 | 1 | 0 | No | No |
| 18767276 | FILE SHARING OVER SECURE CONNECTIONS | July 2024 | February 2025 | Allow | 7 | 1 | 0 | No | No |
| 18760564 | TRAINING AN ARTIFICIAL INTELLIGENCE ENGINE FOR REAL-TIME MONITORING TO ELIMINATE FALSE POSITIVES | July 2024 | May 2025 | Allow | 11 | 1 | 0 | No | No |
| 18753982 | Policies and Encryption to Protect Digital Information | June 2024 | June 2025 | Allow | 12 | 1 | 0 | No | No |
| 18748149 | KEY NEGOTIATION AND PROVISIONING FOR DEVICES IN A NETWORK | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18744542 | INTERNET PROTOCOL (IP) CURATOR | June 2024 | March 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18734707 | SYSTEM AND METHOD FOR MITIGATING CYBER SECURITY THREATS BY DEVICES USING RISK FACTORS | June 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18732309 | GATEWAY AGNOSTIC TOKENIZATION | June 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18677428 | SYSTEMS AND PROCESSES FOR GENERATING A SINGLE CRYPTOCURRENCY ADDRESS MAPPING SPACE FOR A PLURALITY OF CRYPTOCURRENCIES BY CLUSTERING | May 2024 | April 2025 | Allow | 10 | 1 | 0 | Yes | No |
| 18674570 | METHOD AND SYSTEM FOR PROVIDING FRACTIONALIZED ACCESS TO CYBERSECURITY INTELLIGENCE CONTENT OR CYBERSECURITY SERVICE | May 2024 | June 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18664809 | AGGREGATING ENCRYPTED NETWORK VALUES | May 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18663340 | AUTOMATIC INLINE DETECTION BASED ON STATIC DATA | May 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18662603 | METHOD AND APPARATUS FOR SECURE PRIVATE KEY STORAGE ON IOT DEVICE | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18662636 | METHOD AND APPARATUS FOR SIMULTANEOUS KEY GENERATION ON DEVICE AND SERVER FOR SECURE COMMUNICATION | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18656368 | INTEGRATION PACKAGING FOR A MULTI-TENANT COMPUTING ENVIRONMENT | May 2024 | October 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18650200 | Insight Generation Using Personal Identifiable Information (PII) Footprint Modeling | April 2024 | September 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18650178 | INLINE DETECTION OF ENCRYPTED MALICIOUS NETWORK SESSIONS | April 2024 | April 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18649594 | PRIVACY FILTERS AND ODOMETERS FOR DEEP LEARNING | April 2024 | December 2024 | Allow | 8 | 1 | 0 | Yes | No |
| 18649484 | TECHNIQUES FOR IDENTIFYING GAPS IN SECURITY CONTROLS | April 2024 | October 2024 | Allow | 6 | 1 | 0 | No | No |
| 18647897 | TECHNIQUES FOR CYBERSECURITY IDENTITY RISK DETECTION UTILIZING DISK CLONING AND UNIFIED IDENTITY MAPPING | April 2024 | October 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18646114 | SECURITY POLICIES FOR SOFTWARE CALL STACKS | April 2024 | December 2024 | Allow | 8 | 1 | 0 | Yes | No |
| 18643254 | DECENTRALIZED PROCESSING OF INTERACTIONS ON DELIVERY | April 2024 | June 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18635144 | ASSESSMENT OF SECURITY RISK FROM AN EXTERNAL COMPUTING ENVIRONMENT | April 2024 | January 2025 | Allow | 9 | 2 | 0 | No | No |
| 18628172 | INJECTED BYTE BUFFER DATA CLASSIFICATION | April 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18625085 | SYSTEMS AND METHODS FOR TRANSFORMING INSTRUCTIONS FOR METADATA PROCESSING | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18623887 | BIOMETRIC IDENTIFICATION PLATFORM | April 2024 | September 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18622578 | HASH CONTRACT GENERATION AND VERIFICATION SYSTEM | March 2024 | June 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18616032 | KNOWLEDGE PROOF | March 2024 | April 2025 | Abandon | 12 | 1 | 0 | No | No |
| 18613738 | METHODS AND APPARATUS FOR DETECTING A PRESENCE OF A MALICIOUS APPLICATION | March 2024 | March 2025 | Allow | 12 | 1 | 0 | No | No |
| 18609291 | DEOBFUSCATING AND DECLOAKING WEB-BASED MALWARE WITH ABSTRACT EXECUTION | March 2024 | June 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18690341 | OPERATING A USER EQUIPMENT WITHIN OR AS PART OF A TELECOMMUNICATIONS NETWORK | March 2024 | November 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18599969 | Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying Validity | March 2024 | November 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18600176 | PROVIDING ZERO TRUST NETWORK SECURITY WITHOUT MODIFICATION OF NETWORK INFRASTRUCTURE | March 2024 | March 2025 | Allow | 12 | 1 | 0 | No | No |
| 18599025 | GROUP VERIFICATION OF A TRANSMISSION SOURCE | March 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18596393 | AUTOMATED USER PROFILE PROVISIONING IN MULTI-TENANT CLOUD NETWORKS | March 2024 | March 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18592148 | NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE, COMMUNICATION DEVICE, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR SERVER | February 2024 | April 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18441324 | BIOMETRIC AUTHENTICATED BIOMETRIC ENROLLMENT | February 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18440780 | OPENROAMING AUGMENTATION METHOD FOR EAP FAILURES | February 2024 | April 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18440551 | RECONSTRUCTING NETWORK ACTIVITY FROM SAMPLED NETWORK DATA USING ARCHETYPAL ANALYSIS | February 2024 | April 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18439015 | Methods and Apparatus to Automate Cyber Defense Decision Process and Response Actions by Operationalizing Adversarial Technique Frameworks | February 2024 | March 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18435380 | VULNERABILITY ANALYSIS OF A COMPUTER DRIVER | February 2024 | January 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18430366 | Host Deduplication for Vulnerability Detection and Management in IT Systems | February 2024 | November 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18429022 | TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS | January 2024 | October 2024 | Allow | 8 | 1 | 0 | No | No |
| 18429261 | IDENTITY RESOLUTION AND DATA ENRICHMENT FRAMEWORK | January 2024 | March 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18426724 | Uniform Resource Locator Classifier and Visual Comparison Platform for Malicious Site Detection | January 2024 | March 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18420929 | PROVIDING ACCESS CONTROL TO DISTRIBUTED RESOURCES TO AN INFORMATION HANDLING SYSTEM | January 2024 | October 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18409273 | METHODS AND SYSTEMS FOR LEVERAGING EXISTING USER DATA TO VERIFY USER CREDENTIALS | January 2024 | October 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18404630 | MEMORY SYSTEMS AND OPERATION METHODS THEREOF, HOST AND OPERATION METHODS THEREOF, AND ELECTRONIC APPARATUSES | January 2024 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18403339 | Pure Differentially Private Algorithms for Summation in the Shuffled Model | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18402384 | ASYNCHRONOUS AND CONCURRENT TRANSACTION PROCESSING METHOD WITH HIGH-PERFORMANCE ORIENTED TO PERMISSIONED BLOCKCHAIN | January 2024 | March 2024 | Allow | 2 | 0 | 0 | No | No |
| 18402052 | SIDE-CHANNEL COMMUNICATION RECONCILIATION OF BIOMETRIC TIMING DATA FOR USER AUTHENTICATION DURING REMOTE DESKTOP SESSIONS | January 2024 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18401500 | APPARATUS, SYSTEM AND METHOD FOR PATIENT-AUTHORIZED SECURE AND TIME-LIMITED ACCESS TO PATIENT MEDICAL RECORDS UTILIZING KEY ENCRYPTION | December 2023 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18401547 | AUTONOMOUS NETWORK POLICY GENERATOR | December 2023 | June 2025 | Allow | 17 | 0 | 0 | No | No |
| 18400705 | DETECTING SECURITY EXCEPTIONS ACROSS MULTIPLE COMPUTE ENVIRONMENTS | December 2023 | September 2024 | Allow | 8 | 2 | 0 | Yes | No |
| 18400748 | TECHNOLOGY DISCOVERY TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS UTILIZING DISK CLONING | December 2023 | June 2025 | Allow | 18 | 3 | 0 | Yes | No |
| 18400720 | TECHNIQUES FOR DETECTING SENSITIVE DATA IN CLOUD COMPUTING ENVIRONMENTS UTILIZING CLONING | December 2023 | December 2024 | Allow | 11 | 3 | 0 | No | No |
| 18398669 | SECURITY SYSTEMS AND METHODS FOR DETECTING MALLEABLE COMMAND AND CONTROL | December 2023 | April 2024 | Allow | 3 | 0 | 0 | No | No |
| 18397544 | SYSTEM AND METHOD FOR PROVIDING THIRD PARTY COMPLIANCE TO COMPUTER AND SOFTWARE ENVIRONMENTS | December 2023 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18395186 | METHOD AND APPARATUS FOR SUPPORTING DYNAMIC RECONFIGURATION | December 2023 | February 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18390213 | SYSTEMS AND METHODS FOR DATA COLLECTION USING WORKFLOW FORMS | December 2023 | December 2024 | Allow | 11 | 1 | 0 | No | No |
| 18391440 | USE OF WORD EMBEDDINGS TO LOCATE SENSITIVE TEXT IN COMPUTER PROGRAMMING SCRIPTS | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18544066 | LEARNING BASED PROTECTION OF INFORMATION TECHNOLOGY INFRASTRUCTURE | December 2023 | March 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18540980 | RISK SCORING SYSTEM FOR VULNERABILITY MITIGATION | December 2023 | April 2025 | Allow | 16 | 2 | 0 | No | No |
| 18540677 | Validating Authenticity of Electronic Documents Shared via Computer Networks | December 2023 | March 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18538582 | BATTERY MONITOR SYSTEM AND METHOD | December 2023 | May 2025 | Allow | 17 | 1 | 0 | No | No |
| 18536364 | Active Locking Mechanism Using Machine Learning | December 2023 | March 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18536144 | SYSTEMS AND METHODS FOR AUTHENTICATING CLIENTS TO ACCESS DATA | December 2023 | May 2025 | Allow | 17 | 0 | 0 | No | No |
| 18535835 | MALICIOUS JS DETECTION BASED ON AUTOMATED USER INTERACTION EMULATION | December 2023 | September 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18535873 | SYSTEMS AND METHODS FOR FACILITATING USE OF ARTIFICIAL INTELLIGENCE PLATFORMS TRAINED ON BLOCKCHAIN ACTION LINEAGES TO CONDUCT BLOCKCHAIN ACTIONS | December 2023 | March 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18532008 | WEBSITE VERIFICATION PLATFORM | December 2023 | September 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18529289 | SYSTEMS AND METHODS FOR MEDIATING PERMISSIONS | December 2023 | September 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18528139 | BLUETOOTH LOW ENERGY (BLE) ADVERTISING PACKET SECURITY | December 2023 | July 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18527887 | CLOUD-BASED SECURITY SERVICE THAT INCLUDES EXTERNAL EVALUATION FOR ACCESSING A THIRD-PARTY APPLICATION | December 2023 | March 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18526977 | THIRD PARTY BIOMETRIC HOMOMORPHIC ENCRYPTION MATCHING FOR PRIVACY PROTECTION | December 2023 | May 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18525260 | METHOD & APPARATUS FOR AN ULTRA LOW POWER VLSI IMPLEMENTATION OF THE 128-BIT AES ALGORITHM USING A NOVEL APPROACH TO THE SHIFTROW TRANSFORMATION | November 2023 | November 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18525759 | SYSTEMS AND METHODS FOR SECURING COMMUNICATION DATA AND PROPERTY USING BLOCKCHAIN | November 2023 | December 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18525710 | SYSTEM EVENT DETECTION SYSTEM AND METHOD | November 2023 | April 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18517713 | Systems and Methods for Validation of a Device | November 2023 | February 2024 | Allow | 2 | 0 | 0 | No | No |
| 18515155 | ELECTRONIC DEVICE FOR SECURE COMMUNICATIONS WITH AN AUTOMOBILE | November 2023 | November 2024 | Allow | 12 | 1 | 0 | No | No |
| 18513552 | DETECTION OF VULNERABLE WIRELESS NETWORKS | November 2023 | February 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18513168 | DERIVED UNIQUE TOKEN PER TRANSACTION | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18509533 | VALIDATION OF COMPONENT TRANSFERS BETWEEN INFORMATION HANDLING SYSTEMS | November 2023 | June 2025 | Allow | 19 | 0 | 0 | No | No |
| 18389097 | SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING VIRTUALIZED ELEMENTS | November 2023 | November 2024 | Allow | 12 | 1 | 0 | No | No |
| 18506280 | TOKEN STATE SYNCHRONIZATION | November 2023 | September 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18506992 | RADIO EXPOSURE FUNCTION FOR TELECOMMUNICATIONS NETWORKS | November 2023 | June 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18388615 | SYSTEMS AND METHODS FOR ARTIFICIAL INTELLIGENCE (AI)-DRIVEN CYBERSECURITY ENCLAVES | November 2023 | July 2024 | Allow | 8 | 1 | 0 | No | No |
| 18387632 | SYSTEM TO DETECT, ASSESS AND COUNTER DISINFORMATION | November 2023 | January 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18387642 | SYSTEM TO DETECT, ASSESS AND COUNTER DISINFORMATION | November 2023 | October 2024 | Allow | 11 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2436.
With a 26.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 30.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2436 is part of Group 2430 in Technology Center 2400. This art unit has examined 9,139 patent applications in our dataset, with an overall allowance rate of 83.4%. Applications typically reach final disposition in approximately 30 months.
Art Unit 2436's allowance rate of 83.4% places it in the 73% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2436 receive an average of 2.00 office actions before reaching final disposition (in the 66% percentile). The median prosecution time is 30 months (in the 44% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.