Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19278692 | SYSTEM FOR FEDERATED COMPLIANCE-TOKEN INHERITANCE, DIGITAL ARTIFACT REGISTRY, AND MONETIZATION IN REGULATED ENVIRONMENTS USING LARGE LANGUAGE MODELS | July 2025 | October 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19272214 | CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINS | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19241508 | SECURE AND TRUSTED USE METHOD AND SYSTEM FOR LARGE MODEL BASED ON CONFIDENTIAL COMPUTING | June 2025 | March 2026 | Allow | 9 | 0 | 0 | Yes | No |
| 19208115 | SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORK | May 2025 | June 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19191033 | REMEDIATING VULNERABILITIES USING SOFTWARE UPDATE MANAGEMENT PLATFORM WITH INTEGRATED THREAT INTELLIGENCE | April 2025 | September 2025 | Allow | 4 | 2 | 0 | No | No |
| 19190115 | CENTRALIZED TECHNOLOGY ACCESS CONTROL | April 2025 | September 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 19123144 | NON-CUSTODIAL CRYPTOCURRENCY WALLET | April 2025 | March 2026 | Allow | 10 | 0 | 0 | Yes | No |
| 19170903 | SOFTWARE COMPOSITION ANALYSIS (SCA) TO IDENTIFY AI-GENERATED CODE THAT IS COPIED CODE FROM THIRD-PARTY LIBRARIES | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19075418 | SYSTEMS AND METHODS OF PRESERVING SECURITY AUTHENTICATION FOR MULTI-THREADED DATA PROCESSING | March 2025 | July 2025 | Allow | 4 | 1 | 0 | No | No |
| 19052090 | Detection of Vulnerabilities in Computational Graphs | February 2025 | December 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 19042955 | MEDICAL DEVICE AND HEALTH INFORMATION TRACKING SYSTEMS AND METHODS | January 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19022847 | SYSTEMS AND METHODS FOR DYNAMICALLY DETERMINING ASSESSMENT RESULTS | January 2025 | November 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 19002162 | METHOD AND SYSTEM FOR IMPROVING HOMOMORPHIC ENCRYPTION PERFORMANCE BASED ON TRUSTED EXECUTION ENVIRONMENT | December 2024 | December 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18975340 | ARTIFICIAL INTELLIGENCE FOR CYBER THREAT INTELLIGENCE | December 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18969536 | Cyber Detection Analytics Engine | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18966866 | COMPUTER-BASED SYSTEMS CONFIGURED FOR MALWARE DETECTION AND METHODS OF USE THEREOF | December 2024 | March 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 18964189 | METHODS AND SYSTEMS FOR OPTIMIZING GROUPING FOR ENHANCED ACCESS CONTROL AND RISK MITIGATION IN AN ENTERPRISE | November 2024 | April 2025 | Allow | 5 | 1 | 0 | No | No |
| 18869189 | TECHNIQUES FOR ANONYMIZING USER ACTIVITY | November 2024 | March 2026 | Allow | 15 | 0 | 0 | No | No |
| 18945260 | System and Method for Authenticating a User to a Third Party Based on One or More Words From a Word List | November 2024 | October 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18940914 | SYSTEM AND METHOD TO ANALYZE SECURITY ACROSS DIGITAL ENVIRONMENTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18927703 | Cryptography Bill of Materials (CBOM) Generation from Binary Executables | October 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18913230 | SYSTEMS AND METHODS FOR CHATBOT AUTHENTICATION | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18905183 | SYSTEMS AND METHODS FOR SECURING CONTENT | October 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18889216 | RADIO EXPOSURE FUNCTION FOR TELECOMMUNICATIONS NETWORKS | September 2024 | May 2025 | Allow | 8 | 2 | 0 | Yes | No |
| 18887044 | SECURITY CONTROL SYSTEM AND METHOD | September 2024 | August 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 18883251 | DYNAMIC KERNEL SECURITY MODULE | September 2024 | July 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 18882699 | Host Deduplication for Vulnerability Detection and Management in IT Systems | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18830055 | System and method for generating decoy data and sharding sensitive data utilizing quantum computing | September 2024 | February 2026 | Allow | 17 | 1 | 0 | No | No |
| 18819112 | SUPPLEMENTAL ATTACK SURFACE SCANNER (SASS) CONFIGURATION INTEGRATION COMPONENT | August 2024 | January 2026 | Allow | 17 | 0 | 0 | No | No |
| 18818320 | SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORK | August 2024 | March 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18816678 | ASYNCHRONOUS CYBERSECURITY EVENT DETECTION PLATFORM | August 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18811924 | SYSTEM AND METHOD FOR MANAGING DATA OF AN AUTOMATION FIELD DEVICE IN A SECURE MANNER AGAINST MANIPULATION | August 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18811662 | Systems and Methods for Assessing Security in a Computing Device Environment | August 2024 | June 2025 | Abandon | 10 | 1 | 0 | No | No |
| 18838330 | METHODS AND ARRANGEMENTS FOR ESTABLISHING DIGITAL IDENTITY | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18798510 | METHOD AND APPARATUS FOR USING A PICTURE AND SHARED SECRET TO CREATE REPLICABLE HIGH QUALITY POOLS OF ENTROPY FOR KEYS FOR ENCRYPTION, AUTHENTICATION AND ONE TIME PADS FOR IMAGES, DATA AND MESSAGE ENCODING | August 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18717289 | Systems and Methods For Facilitating Privacy Disclosure and Consent | August 2024 | November 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18795239 | MACHINE LEARNED ALERT CLASSIFICATION SYSTEM | August 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18792338 | Efficient Generation of Identity Provider Integrations | August 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18790022 | SYSTEM AND METHOD FOR AUTOMATED EXPLOITATION GENERATION | July 2024 | June 2025 | Allow | 10 | 2 | 0 | No | No |
| 18791301 | Cryptography Bill of Materials (CBOM) Generation from Binary Executables | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18790060 | LARGE LANGUAGE MODEL-BASED VULNERABILITY REMEDIATION ACTION DESCRIPTIONS | July 2024 | March 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18787095 | EARLY EXIT DYNAMIC ANALYSIS OF A VIRTUAL MACHINE | July 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18773918 | ENCRYPTED INFORMATION RETRIEVAL | July 2024 | February 2026 | Allow | 19 | 1 | 0 | No | No |
| 18770587 | AUTHENTICATION AND KEY REGENERATION USING A REGENERATED SECRET | July 2024 | March 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18769880 | COMPUTER SYSTEM ARCHITECTURE WITH MODULAR APPROACH | July 2024 | February 2026 | Allow | 19 | 1 | 0 | No | No |
| 18768558 | DATA TOKENIZATION AND SEARCH IN A DISTRIBUTED NETWORK | July 2024 | July 2025 | Allow | 12 | 1 | 0 | No | No |
| 18767276 | FILE SHARING OVER SECURE CONNECTIONS | July 2024 | February 2025 | Allow | 7 | 1 | 0 | No | No |
| 18767063 | Cybersecurity Vulnerability Management Program Evaluation System | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18766200 | ANOMALY DETECTION DEVICE AND ANOMALY DETECTION METHOD | July 2024 | February 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18765625 | INTEROPERABLE UNLOCKING TECHNOLOGY FOR WIRELESS DEVICES | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18764902 | VERIFICATION PLATFORM | July 2024 | January 2026 | Allow | 19 | 2 | 0 | No | No |
| 18761877 | METHOD AND APPARATUS FOR CREATING AND USING QUANTUM RESISTANT KEYS | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18760564 | TRAINING AN ARTIFICIAL INTELLIGENCE ENGINE FOR REAL-TIME MONITORING TO ELIMINATE FALSE POSITIVES | July 2024 | May 2025 | Allow | 11 | 1 | 0 | No | No |
| 18758598 | AUTOMATIC SECURITY MESSAGE INTERACTION | June 2024 | March 2026 | Allow | 21 | 1 | 0 | No | No |
| 18759163 | STATELESS APPLICATION LAYER USER SESSION TRACKING | June 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18756892 | SECURITY INTERCEPTOR FOR GENERATIVE ARTIFICIAL INTELLIGENCE PLATFORMS | June 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18753982 | Policies and Encryption to Protect Digital Information | June 2024 | June 2025 | Allow | 12 | 1 | 0 | No | No |
| 18748149 | KEY NEGOTIATION AND PROVISIONING FOR DEVICES IN A NETWORK | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18747406 | SHARING CUSTOMER DATA BETWEEN ENTITIES IN AN ORGANIZATION | June 2024 | January 2026 | Allow | 19 | 0 | 0 | No | No |
| 18744542 | INTERNET PROTOCOL (IP) CURATOR | June 2024 | March 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18717434 | A METHOD FOR PROVISIONING A SECURE ELEMENT WITH A PROFILE | June 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18734707 | SYSTEM AND METHOD FOR MITIGATING CYBER SECURITY THREATS BY DEVICES USING RISK FACTORS | June 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18732709 | CAN BUS PROTECTION SYSTEMS AND METHODS | June 2024 | September 2025 | Allow | 16 | 1 | 1 | No | No |
| 18732309 | GATEWAY AGNOSTIC TOKENIZATION | June 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18680878 | DETECTING VISUAL SIMILARITY BETWEEN DNS FULLY QUALIFIED DOMAIN NAMES | May 2024 | September 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18680735 | Systems and Methods for Unauthenticated Account Opening | May 2024 | September 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18678578 | Bot detection and mitigation using dynamic web flows built via machine learning | May 2024 | February 2026 | Allow | 20 | 0 | 0 | No | No |
| 18677389 | METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR GENERATING TEXT CONTENT | May 2024 | November 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18676573 | Preventing EDR Termination using Vulnerable Drivers | May 2024 | March 2026 | Allow | 21 | 2 | 0 | Yes | No |
| 18677428 | SYSTEMS AND PROCESSES FOR GENERATING A SINGLE CRYPTOCURRENCY ADDRESS MAPPING SPACE FOR A PLURALITY OF CRYPTOCURRENCIES BY CLUSTERING | May 2024 | April 2025 | Allow | 10 | 1 | 0 | Yes | No |
| 18674570 | METHOD AND SYSTEM FOR PROVIDING FRACTIONALIZED ACCESS TO CYBERSECURITY INTELLIGENCE CONTENT OR CYBERSECURITY SERVICE | May 2024 | June 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18671494 | TRUSTED AND SECURED CLIENT-SERVER MODEL IN KUBERNETES CLUSTER PODS | May 2024 | January 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18667871 | SYSTEMS AND METHODS FOR NETWORK-BASED UE SERVICE AUTHORIZATION | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18664809 | AGGREGATING ENCRYPTED NETWORK VALUES | May 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18665153 | SECURE MEMORY SYSTEM PROGRAMMING FOR HOST DEVICE VERIFICATION | May 2024 | November 2025 | Allow | 18 | 2 | 0 | No | No |
| 18663340 | AUTOMATIC INLINE DETECTION BASED ON STATIC DATA | May 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18710151 | CONTROLLER-BASED SYSTEM FOR CONTROLLING NETWORK ACCESS, AND METHOD THEREFOR | May 2024 | November 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18662603 | METHOD AND APPARATUS FOR SECURE PRIVATE KEY STORAGE ON IOT DEVICE | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18662636 | METHOD AND APPARATUS FOR SIMULTANEOUS KEY GENERATION ON DEVICE AND SERVER FOR SECURE COMMUNICATION | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18657183 | Spoofed UDP Packet Detection | May 2024 | March 2026 | Allow | 22 | 0 | 0 | Yes | No |
| 18657330 | ACCURACY IN ATTACK TECHNIQUE LABELING IN AN EXTENDED DETECTION SYSTEM | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18656895 | CLASSIFIER FOR IDENTIFYING SUSPICIOUS PDF FILES TO LIMIT DEEP-SCANNING | May 2024 | March 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18656368 | INTEGRATION PACKAGING FOR A MULTI-TENANT COMPUTING ENVIRONMENT | May 2024 | October 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18654229 | METHOD OF AUTHENTICATION BETWEEN ELECTRONIC DEVICES | May 2024 | July 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18654228 | MESSAGE SENDER SECURITY IN MESSAGING SYSTEM | May 2024 | September 2025 | Allow | 16 | 1 | 0 | No | No |
| 18650200 | Insight Generation Using Personal Identifiable Information (PII) Footprint Modeling | April 2024 | September 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18650178 | INLINE DETECTION OF ENCRYPTED MALICIOUS NETWORK SESSIONS | April 2024 | April 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18651045 | REQUIREMENT OPERATIONAL DEFINITIONS FOR INFORMATION SECURITY AND PRIVACY COMPLIANCE | April 2024 | October 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18648850 | ORPHAN DATA IDENTIFICATION AND CLEANUP IN A DATABASE-AS-A-SERVICE CLOUD COMPUTING PLATFORM | April 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18649336 | SECURE DATA EXCHANGE | April 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18650045 | TREE-BASED LEARNING OF APPLICATION PROGRAMMING INTERFACE SPECIFICATION | April 2024 | July 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18649594 | PRIVACY FILTERS AND ODOMETERS FOR DEEP LEARNING | April 2024 | December 2024 | Allow | 8 | 1 | 0 | Yes | No |
| 18649783 | Controlling Operator Access To Customer Cloud Infrastructure Environments | April 2024 | December 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18649212 | SELECTING A TRANSMISSION PATH FOR COMMUNICATING DATA BASED ON A CLASSIFICATION FOR THE DATA | April 2024 | December 2025 | Allow | 19 | 1 | 0 | No | No |
| 18649484 | TECHNIQUES FOR IDENTIFYING GAPS IN SECURITY CONTROLS | April 2024 | October 2024 | Allow | 6 | 1 | 0 | No | No |
| 18649916 | ELECTRONIC SYSTEM FOR GENERATING AND TRACKING LINKED ELECTRONIC DIGITAL CERTIFICATES | April 2024 | July 2025 | Allow | 14 | 1 | 0 | No | No |
| 18647897 | TECHNIQUES FOR CYBERSECURITY IDENTITY RISK DETECTION UTILIZING DISK CLONING AND UNIFIED IDENTITY MAPPING | April 2024 | October 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18646114 | SECURITY POLICIES FOR SOFTWARE CALL STACKS | April 2024 | December 2024 | Allow | 8 | 1 | 0 | Yes | No |
| 18646655 | DEFENSE-IN-DEPTH METHOD BASED ON KNOWN DEVICE BEHAVIOR | April 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18643254 | DECENTRALIZED PROCESSING OF INTERACTIONS ON DELIVERY | April 2024 | June 2025 | Allow | 14 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2436.
With a 26.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 30.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2436 is part of Group 2430 in Technology Center 2400. This art unit has examined 9,116 patent applications in our dataset, with an overall allowance rate of 81.7%. Applications typically reach final disposition in approximately 32 months.
Art Unit 2436's allowance rate of 81.7% places it in the 70% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2436 receive an average of 2.12 office actions before reaching final disposition (in the 68% percentile). The median prosecution time is 32 months (in the 42% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.