USPTO Art Unit 2436 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19042955MEDICAL DEVICE AND HEALTH INFORMATION TRACKING SYSTEMS AND METHODSJanuary 2025May 2025Allow300YesNo
18969536Cyber Detection Analytics EngineDecember 2024March 2025Allow300YesNo
18940914SYSTEM AND METHOD TO ANALYZE SECURITY ACROSS DIGITAL ENVIRONMENTSNovember 2024January 2025Allow200NoNo
18927703Cryptography Bill of Materials (CBOM) Generation from Binary ExecutablesOctober 2024January 2025Allow200NoNo
18889216RADIO EXPOSURE FUNCTION FOR TELECOMMUNICATIONS NETWORKSSeptember 2024May 2025Allow820YesNo
18882699Host Deduplication for Vulnerability Detection and Management in IT SystemsSeptember 2024November 2024Allow300YesNo
18818320SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORKAugust 2024March 2025Allow710YesNo
18811662Systems and Methods for Assessing Security in a Computing Device EnvironmentAugust 2024June 2025Abandon1010NoNo
18798510METHOD AND APPARATUS FOR USING A PICTURE AND SHARED SECRET TO CREATE REPLICABLE HIGH QUALITY POOLS OF ENTROPY FOR KEYS FOR ENCRYPTION, AUTHENTICATION AND ONE TIME PADS FOR IMAGES, DATA AND MESSAGE ENCODINGAugust 2024October 2024Allow200YesNo
18790022SYSTEM AND METHOD FOR AUTOMATED EXPLOITATION GENERATIONJuly 2024June 2025Allow1020NoNo
18791301Cryptography Bill of Materials (CBOM) Generation from Binary ExecutablesJuly 2024October 2024Allow300YesNo
18770587AUTHENTICATION AND KEY REGENERATION USING A REGENERATED SECRETJuly 2024March 2025Allow810YesNo
18768558DATA TOKENIZATION AND SEARCH IN A DISTRIBUTED NETWORKJuly 2024July 2025Allow1210NoNo
18767276FILE SHARING OVER SECURE CONNECTIONSJuly 2024February 2025Allow710NoNo
18760564TRAINING AN ARTIFICIAL INTELLIGENCE ENGINE FOR REAL-TIME MONITORING TO ELIMINATE FALSE POSITIVESJuly 2024May 2025Allow1110NoNo
18753982Policies and Encryption to Protect Digital InformationJune 2024June 2025Allow1210NoNo
18748149KEY NEGOTIATION AND PROVISIONING FOR DEVICES IN A NETWORKJune 2024June 2025Allow1210YesNo
18744542INTERNET PROTOCOL (IP) CURATORJune 2024March 2025Allow910YesNo
18734707SYSTEM AND METHOD FOR MITIGATING CYBER SECURITY THREATS BY DEVICES USING RISK FACTORSJune 2024May 2025Allow1210NoNo
18732309GATEWAY AGNOSTIC TOKENIZATIONJune 2024June 2025Allow1310YesNo
18677428SYSTEMS AND PROCESSES FOR GENERATING A SINGLE CRYPTOCURRENCY ADDRESS MAPPING SPACE FOR A PLURALITY OF CRYPTOCURRENCIES BY CLUSTERINGMay 2024April 2025Allow1010YesNo
18674570METHOD AND SYSTEM FOR PROVIDING FRACTIONALIZED ACCESS TO CYBERSECURITY INTELLIGENCE CONTENT OR CYBERSECURITY SERVICEMay 2024June 2025Abandon1310NoNo
18664809AGGREGATING ENCRYPTED NETWORK VALUESMay 2024January 2025Allow900YesNo
18663340AUTOMATIC INLINE DETECTION BASED ON STATIC DATAMay 2024June 2025Allow1310YesNo
18662603METHOD AND APPARATUS FOR SECURE PRIVATE KEY STORAGE ON IOT DEVICEMay 2024February 2025Allow900YesNo
18662636METHOD AND APPARATUS FOR SIMULTANEOUS KEY GENERATION ON DEVICE AND SERVER FOR SECURE COMMUNICATIONMay 2024February 2025Allow900YesNo
18656368INTEGRATION PACKAGING FOR A MULTI-TENANT COMPUTING ENVIRONMENTMay 2024October 2024Allow610YesNo
18650200Insight Generation Using Personal Identifiable Information (PII) Footprint ModelingApril 2024September 2024Allow500YesNo
18650178INLINE DETECTION OF ENCRYPTED MALICIOUS NETWORK SESSIONSApril 2024April 2025Allow1110YesNo
18649594PRIVACY FILTERS AND ODOMETERS FOR DEEP LEARNINGApril 2024December 2024Allow810YesNo
18649484TECHNIQUES FOR IDENTIFYING GAPS IN SECURITY CONTROLSApril 2024October 2024Allow610NoNo
18647897TECHNIQUES FOR CYBERSECURITY IDENTITY RISK DETECTION UTILIZING DISK CLONING AND UNIFIED IDENTITY MAPPINGApril 2024October 2024Allow610YesNo
18646114SECURITY POLICIES FOR SOFTWARE CALL STACKSApril 2024December 2024Allow810YesNo
18643254DECENTRALIZED PROCESSING OF INTERACTIONS ON DELIVERYApril 2024June 2025Allow1410YesNo
18635144ASSESSMENT OF SECURITY RISK FROM AN EXTERNAL COMPUTING ENVIRONMENTApril 2024January 2025Allow920NoNo
18628172INJECTED BYTE BUFFER DATA CLASSIFICATIONApril 2024September 2024Allow610YesNo
18625085SYSTEMS AND METHODS FOR TRANSFORMING INSTRUCTIONS FOR METADATA PROCESSINGApril 2024December 2024Allow800YesNo
18623887BIOMETRIC IDENTIFICATION PLATFORMApril 2024September 2024Allow600YesNo
18622578HASH CONTRACT GENERATION AND VERIFICATION SYSTEMMarch 2024June 2025Abandon1410NoNo
18616032KNOWLEDGE PROOFMarch 2024April 2025Abandon1210NoNo
18613738METHODS AND APPARATUS FOR DETECTING A PRESENCE OF A MALICIOUS APPLICATIONMarch 2024March 2025Allow1210NoNo
18609291DEOBFUSCATING AND DECLOAKING WEB-BASED MALWARE WITH ABSTRACT EXECUTIONMarch 2024June 2025Allow1510YesNo
18690341OPERATING A USER EQUIPMENT WITHIN OR AS PART OF A TELECOMMUNICATIONS NETWORKMarch 2024November 2024Allow910YesNo
18599969Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying ValidityMarch 2024November 2024Allow800YesNo
18600176PROVIDING ZERO TRUST NETWORK SECURITY WITHOUT MODIFICATION OF NETWORK INFRASTRUCTUREMarch 2024March 2025Allow1210NoNo
18599025GROUP VERIFICATION OF A TRANSMISSION SOURCEMarch 2024September 2024Allow700YesNo
18596393AUTOMATED USER PROFILE PROVISIONING IN MULTI-TENANT CLOUD NETWORKSMarch 2024March 2025Allow1310YesNo
18592148NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE, COMMUNICATION DEVICE, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR SERVERFebruary 2024April 2025Allow1310YesNo
18441324BIOMETRIC AUTHENTICATED BIOMETRIC ENROLLMENTFebruary 2024September 2024Allow700YesNo
18440780OPENROAMING AUGMENTATION METHOD FOR EAP FAILURESFebruary 2024April 2025Allow1410YesNo
18440551RECONSTRUCTING NETWORK ACTIVITY FROM SAMPLED NETWORK DATA USING ARCHETYPAL ANALYSISFebruary 2024April 2025Allow1410YesNo
18439015Methods and Apparatus to Automate Cyber Defense Decision Process and Response Actions by Operationalizing Adversarial Technique FrameworksFebruary 2024March 2025Allow1310YesNo
18435380VULNERABILITY ANALYSIS OF A COMPUTER DRIVERFebruary 2024January 2025Allow1110YesNo
18430366Host Deduplication for Vulnerability Detection and Management in IT SystemsFebruary 2024November 2024Allow1000YesNo
18429022TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTSJanuary 2024October 2024Allow810NoNo
18429261IDENTITY RESOLUTION AND DATA ENRICHMENT FRAMEWORKJanuary 2024March 2025Allow1310YesNo
18426724Uniform Resource Locator Classifier and Visual Comparison Platform for Malicious Site DetectionJanuary 2024March 2025Allow1310YesNo
18420929PROVIDING ACCESS CONTROL TO DISTRIBUTED RESOURCES TO AN INFORMATION HANDLING SYSTEMJanuary 2024October 2024Allow910YesNo
18409273METHODS AND SYSTEMS FOR LEVERAGING EXISTING USER DATA TO VERIFY USER CREDENTIALSJanuary 2024October 2024Allow910YesNo
18404630MEMORY SYSTEMS AND OPERATION METHODS THEREOF, HOST AND OPERATION METHODS THEREOF, AND ELECTRONIC APPARATUSESJanuary 2024June 2025Allow1800NoNo
18403339Pure Differentially Private Algorithms for Summation in the Shuffled ModelJanuary 2024September 2024Allow800YesNo
18402384ASYNCHRONOUS AND CONCURRENT TRANSACTION PROCESSING METHOD WITH HIGH-PERFORMANCE ORIENTED TO PERMISSIONED BLOCKCHAINJanuary 2024March 2024Allow200NoNo
18402052SIDE-CHANNEL COMMUNICATION RECONCILIATION OF BIOMETRIC TIMING DATA FOR USER AUTHENTICATION DURING REMOTE DESKTOP SESSIONSJanuary 2024August 2024Allow700YesNo
18401500APPARATUS, SYSTEM AND METHOD FOR PATIENT-AUTHORIZED SECURE AND TIME-LIMITED ACCESS TO PATIENT MEDICAL RECORDS UTILIZING KEY ENCRYPTIONDecember 2023August 2024Allow700YesNo
18401547AUTONOMOUS NETWORK POLICY GENERATORDecember 2023June 2025Allow1700NoNo
18400705DETECTING SECURITY EXCEPTIONS ACROSS MULTIPLE COMPUTE ENVIRONMENTSDecember 2023September 2024Allow820YesNo
18400748TECHNOLOGY DISCOVERY TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS UTILIZING DISK CLONINGDecember 2023June 2025Allow1830YesNo
18400720TECHNIQUES FOR DETECTING SENSITIVE DATA IN CLOUD COMPUTING ENVIRONMENTS UTILIZING CLONINGDecember 2023December 2024Allow1130NoNo
18398669SECURITY SYSTEMS AND METHODS FOR DETECTING MALLEABLE COMMAND AND CONTROLDecember 2023April 2024Allow300NoNo
18397544SYSTEM AND METHOD FOR PROVIDING THIRD PARTY COMPLIANCE TO COMPUTER AND SOFTWARE ENVIRONMENTSDecember 2023September 2024Allow800YesNo
18395186METHOD AND APPARATUS FOR SUPPORTING DYNAMIC RECONFIGURATIONDecember 2023February 2025Allow1410YesNo
18390213SYSTEMS AND METHODS FOR DATA COLLECTION USING WORKFLOW FORMSDecember 2023December 2024Allow1110NoNo
18391440USE OF WORD EMBEDDINGS TO LOCATE SENSITIVE TEXT IN COMPUTER PROGRAMMING SCRIPTSDecember 2023December 2024Allow1210NoNo
18544066LEARNING BASED PROTECTION OF INFORMATION TECHNOLOGY INFRASTRUCTUREDecember 2023March 2025Abandon1510NoNo
18540980RISK SCORING SYSTEM FOR VULNERABILITY MITIGATIONDecember 2023April 2025Allow1620NoNo
18540677Validating Authenticity of Electronic Documents Shared via Computer NetworksDecember 2023March 2025Allow1510YesNo
18538582BATTERY MONITOR SYSTEM AND METHODDecember 2023May 2025Allow1710NoNo
18536364Active Locking Mechanism Using Machine LearningDecember 2023March 2025Allow1520YesNo
18536144SYSTEMS AND METHODS FOR AUTHENTICATING CLIENTS TO ACCESS DATADecember 2023May 2025Allow1700NoNo
18535835MALICIOUS JS DETECTION BASED ON AUTOMATED USER INTERACTION EMULATIONDecember 2023September 2024Allow1010YesNo
18535873SYSTEMS AND METHODS FOR FACILITATING USE OF ARTIFICIAL INTELLIGENCE PLATFORMS TRAINED ON BLOCKCHAIN ACTION LINEAGES TO CONDUCT BLOCKCHAIN ACTIONSDecember 2023March 2024Allow300YesNo
18532008WEBSITE VERIFICATION PLATFORMDecember 2023September 2024Allow910YesNo
18529289SYSTEMS AND METHODS FOR MEDIATING PERMISSIONSDecember 2023September 2024Allow1010YesNo
18528139BLUETOOTH LOW ENERGY (BLE) ADVERTISING PACKET SECURITYDecember 2023July 2025Allow1920YesNo
18527887CLOUD-BASED SECURITY SERVICE THAT INCLUDES EXTERNAL EVALUATION FOR ACCESSING A THIRD-PARTY APPLICATIONDecember 2023March 2025Allow1510YesNo
18526977THIRD PARTY BIOMETRIC HOMOMORPHIC ENCRYPTION MATCHING FOR PRIVACY PROTECTIONDecember 2023May 2024Allow510YesNo
18525260METHOD & APPARATUS FOR AN ULTRA LOW POWER VLSI IMPLEMENTATION OF THE 128-BIT AES ALGORITHM USING A NOVEL APPROACH TO THE SHIFTROW TRANSFORMATIONNovember 2023November 2024Allow1210YesNo
18525759SYSTEMS AND METHODS FOR SECURING COMMUNICATION DATA AND PROPERTY USING BLOCKCHAINNovember 2023December 2024Allow1210YesNo
18525710SYSTEM EVENT DETECTION SYSTEM AND METHODNovember 2023April 2025Allow1720YesNo
18517713Systems and Methods for Validation of a DeviceNovember 2023February 2024Allow200NoNo
18515155ELECTRONIC DEVICE FOR SECURE COMMUNICATIONS WITH AN AUTOMOBILENovember 2023November 2024Allow1210NoNo
18513552DETECTION OF VULNERABLE WIRELESS NETWORKSNovember 2023February 2025Abandon1510NoNo
18513168DERIVED UNIQUE TOKEN PER TRANSACTIONNovember 2023June 2025Allow1900YesNo
18509533VALIDATION OF COMPONENT TRANSFERS BETWEEN INFORMATION HANDLING SYSTEMSNovember 2023June 2025Allow1900NoNo
18389097SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING VIRTUALIZED ELEMENTSNovember 2023November 2024Allow1210NoNo
18506280TOKEN STATE SYNCHRONIZATIONNovember 2023September 2024Allow1010YesNo
18506992RADIO EXPOSURE FUNCTION FOR TELECOMMUNICATIONS NETWORKSNovember 2023June 2024Allow710YesNo
18388615SYSTEMS AND METHODS FOR ARTIFICIAL INTELLIGENCE (AI)-DRIVEN CYBERSECURITY ENCLAVESNovember 2023July 2024Allow810NoNo
18387632SYSTEM TO DETECT, ASSESS AND COUNTER DISINFORMATIONNovember 2023January 2025Allow1410YesNo
18387642SYSTEM TO DETECT, ASSESS AND COUNTER DISINFORMATIONNovember 2023October 2024Allow1110NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2436.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
128
Examiner Affirmed
94
(73.4%)
Examiner Reversed
34
(26.6%)
Reversal Percentile
20.3%
Lower than average

What This Means

With a 26.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
712
Allowed After Appeal Filing
218
(30.6%)
Not Allowed After Appeal Filing
494
(69.4%)
Filing Benefit Percentile
36.9%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 30.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2436 - Prosecution Statistics Summary

Executive Summary

Art Unit 2436 is part of Group 2430 in Technology Center 2400. This art unit has examined 9,139 patent applications in our dataset, with an overall allowance rate of 83.4%. Applications typically reach final disposition in approximately 30 months.

Comparative Analysis

Art Unit 2436's allowance rate of 83.4% places it in the 73% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2436 receive an average of 2.00 office actions before reaching final disposition (in the 66% percentile). The median prosecution time is 30 months (in the 44% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.