USPTO Art Unit 2437 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19214617MULTIMODAL FINGERPRINTING OF DIGITAL ASSETSMay 2025November 2025Allow510YesNo
19208461QUANTUM SECURE COMMUNICATION PROTOCOL AND DEVICE BASED ON DOUBLE-HELIX STRUCTURE COMPOSITE MULTI-LAYER ENCODINGMay 2025September 2025Allow410NoNo
19169111PARTIALLY HOMOMORPHIC ENCRYPTION (PHE) IN DISTRIBUTED 1-BIT LARGE LANGUAGE MODEL (LLM) ARCHITECTUREApril 2025October 2025Allow620NoNo
19080000SYSTEM AND METHOD FOR SECURE KNOWLEDGE DISTILLATION USING HOMOMORPHIC ENCRYPTION IN MACHINE LEARNING ENVIRONMENTSMarch 2025August 2025Allow510NoNo
19070170TECHNIQUES FOR PRIORITIZING CYBERSECURITY REMEDIATION ACTIONS BASED ON A DATA RISK SCOREMarch 2025July 2025Allow400YesNo
19056084COMPUTING SYSTEM FOR FULLY HOMOMORPHIC ENCRYPTION APPLICATIONS USING PARALLELIZABLE HYBRID BOOTSTRAPPINGFebruary 2025April 2025Allow200NoNo
19053825COMPUTER-BASED SYSTEMS CONFIGURED FOR DOMAIN NAME CENTRAL BLOCKING SYSTEMS AND METHODS OF USE THEREOFFebruary 2025July 2025Allow500YesNo
19006173HIGH-TEMPORAL-ACCURACY ELECTROMAGNETIC FAULT INJECTION METHOD AND APPARATUS FOR CRYPTOGRAPHIC CHIPDecember 2024May 2025Allow400NoNo
19004413METHOD OF CONTROLLING REMOTE DATA BASED ON CONFIDENTIAL COMPUTING AND SYSTEM THEREOFDecember 2024August 2025Allow820NoNo
19004215CONFIDENTIAL COMPUTING-BASED METHOD FOR CUSTOMIZEDLY BALANCING BETWEEN SECURITY AND PERFORMANCE OF HOMOMORPHIC ENCRYPTIONDecember 2024July 2025Allow610NoNo
18946352ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENTNovember 2024March 2025Allow400NoNo
18941347COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A FREQUENCY CONTENT OF AN ENCRYPTED RAW AUDIO SIGNALNovember 2024June 2025Allow710YesNo
18913331SYSTEM AND METHOD FOR SOFTWARE SERVICE CYBERSECURITY REMEDIATIONOctober 2024January 2025Allow400YesNo
18906646USE OF AN APPLICATION CONTROLLER TO MONITOR AND CONTROL SOFTWARE FILE AND APPLICATION ENVIRONMENTSOctober 2024February 2026Allow1600NoNo
18886286SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUMSeptember 2024February 2026Allow1700NoNo
18807438System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js ApplicationsAugust 2024November 2024Allow310NoNo
18800762RADIO LINK RECOVERY FOR USER EQUIPMENTAugust 2024January 2026Allow1810NoNo
18796250METHOD AND AN ELECTRONIC DEVICE FOR DECODING INFORMATION IN A MULTI-DIMENSIONAL ENCRYPTED CODEAugust 2024July 2025Allow1120NoNo
18789018A METHOD OF OPTIMIZING LINEAR TRANSFORMATIONJuly 2024March 2026Allow1910YesNo
18763675POST-QUANTUM CRYPTOGRAPHY FOR SECURE BOOTJuly 2024November 2025Allow1600NoNo
18744901ENHANCED ENCRYPTION FOR FACE-RELATED DATAJune 2024February 2026Allow2010NoNo
18744240CYBERSECURITY FOR RESOURCE SHARING AMONG INTERNET OF THINGS DEVICESJune 2024January 2026Allow1910YesNo
18743030GENERATING THREAT STATEMENTS FOR A THREAT MODEL USING ARTIFICIAL INTELLIGENCEJune 2024March 2026Allow2110YesNo
18738764CYBER-SECURITY PRESENCE MONITORING AND ASSESSMENTJune 2024August 2025Allow1410NoNo
18738690BIOMETRIC AUTHENTICATION USING A SMART RINGJune 2024March 2026Allow2160YesNo
18737485INTEGRATED SECURITY ANALYSIS DATA STRUCTURE AND METHOD FOR MULTI-CONTAINER SOFTWARE PROJECTSJune 2024October 2025Allow1600NoNo
18714541KEY MANAGEMENT METHOD, KEY MANAGEMENT DEVICE AND STORAGE MEDIUMMay 2024March 2025Allow1010NoNo
18671602AUTONOMOUS MACHINE LEARNING METHODS FOR DETECTING AND THWARTING RANSOMWARE ATTACKSMay 2024February 2025Allow900YesNo
18664488PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION TO AN ENTITY TO BE VERIFIEDMay 2024September 2025Allow1630YesNo
18664480PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION TO AN ENTITY TO BE VERIFIEDMay 2024November 2025Allow1840YesNo
18662448AGENTLESS RUNTIME CYBERSECURITY ANALYSISMay 2024March 2026Allow2210NoNo
18660513Secure Permissioning of Access to User Accounts, Including Secure Deauthorization of Access to User AccountsMay 2024August 2025Allow1500YesNo
18656486ROBUST ENCODING OF MACHINE READABLE INFORMATION IN HOST OBJECTS AND BIOMETRICS, AND ASSOCIATED DECODING AND AUTHENTICATIONMay 2024June 2025Allow1410NoNo
18655095Antiransomware File Analysis and ScoringMay 2024December 2024Allow720NoNo
18652421ENHANCED SYSTEMS AND METHODS FOR PIRATE DECODER IDENTIFICATIONMay 2024November 2025Allow1800NoNo
18651643MALICIOUS PROMPT MANAGEMENT FOR LARGE LANGUAGE MODELSApril 2024August 2025Allow1600YesNo
18649560DIGITAL IDENTITY PROXYApril 2024September 2025Allow1600NoNo
18649766SYSTEM AND METHOD FOR MULTIFACTOR AUTHENTICATION FOR ACCESS TO A RESOURCE BASED ON CO-CONNECTED DEVICE PRESENCEApril 2024September 2025Allow1710NoNo
18646624Domain Name System Data Exfiltration Detection Using Machine Learning TechniquesApril 2024September 2025Allow1700YesNo
18636129Home-Based Physical and Cyber Integrated Security - Intrusion Detection System (PCIS-IDS)April 2024April 2025Allow1210YesNo
18633880Detecting and Preventing Installation and Execution of Malicious Browser ExtensionsApril 2024March 2025Allow1110NoNo
18627259Managing Implementation Of Application-Code Scanning ProcessesApril 2024February 2026Allow2210YesNo
18697315DIGITAL SIGNATURES WITH KEY-DERIVATIONMarch 2024November 2025Allow1900YesNo
18696398PORT MANAGEMENT METHOD, SYSTEM AND DEVICE, AND COMPUTER READABLE STORAGE MEDIUMMarch 2024August 2024Allow510NoNo
18617225DETECTING MALWARE INFECTION PATH IN A CLOUD COMPUTING ENVIRONMENT UTILIZING A SECURITY GRAPHMarch 2024November 2024Allow800YesNo
18615747ADAPTIVE LANGUAGE MODEL-BASED SOLUTION FOR INTERACTIVE SECURITY AND SAFETY WITH DATA PRIVACYMarch 2024September 2024Allow611NoNo
18613785Object Movement Method, Apparatus and Electronic DeviceMarch 2024February 2026Allow2210NoNo
18608599TURING MACHINE AGENT FOR BEHAVIORAL THREAT DETECTIONMarch 2024January 2026Allow2220YesNo
18607843Multi-Array User Authorization For Cloud-Based Storage SystemsMarch 2024August 2025Allow1720YesNo
18607384Digital Key Authentication Utilizing Device MetadataMarch 2024October 2025Allow1900NoNo
18607279GENERATING REMEDIATION STRATEGIES FOR RESPONDING TO SECURITY DEFICIENCIES USING GENERATIVE MACHINE LEARNING MODELSMarch 2024February 2026Allow2310YesNo
18606839METHOD AND SYSTEM FOR ASSESING RISK ASSOCIATED WITH AI MODELSMarch 2024February 2026Allow2310NoNo
18603931SYSTEM AND METHOD FOR NEAR-REAL TIME CLOUD SECURITY POSTURE MANAGEMENTMarch 2024May 2024Allow200YesNo
18602218Web Page Risk Analysis Using Machine LearningMarch 2024June 2025Allow1510NoNo
18600086SYSTEMS AND METHODS FOR AUTHENTICATION USING RELATIVISTIC ZERO KNOWLEDGE PROOFSMarch 2024October 2025Allow1900NoNo
18588781SYSTEMS AND METHODS FOR MODEL SECURITY IN DISTRIBUTED MODEL TRAINING APPLICATIONSFebruary 2024June 2024Allow300YesNo
18585687THREAT MITIGATION SYSTEM AND METHODFebruary 2024March 2025Allow1320YesNo
18685831DEVICES, SYSTEMS, AND METHODS FOR PROVISIONING AND UPDATING SECURITY INFORMATION & EVENT MANAGEMENT ARTIFACTS FOR MULTIPLE TENANTSFebruary 2024September 2025Allow1930YesYes
18442722STORAGE SYSTEM AND MALICIOUS PROGRAM DETECTION METHODFebruary 2024January 2026Allow2310NoNo
18683757STORING CRYPTOGRAPHIC KEYS SECURELYFebruary 2024February 2026Allow2420YesNo
18439856AUTO EXPIRING MULTI-TENANT MULTI-ENTITY SLIDING WINDOW EVENT COUNTERFebruary 2024August 2025Allow1800NoNo
18438623CREDENTIALED WIRELESS FOB TO CONTROL POWER TOOL DEVICESFebruary 2024September 2025Allow1920YesNo
18437034Dynamic Hierarchical Tagging System and MethodFebruary 2024November 2024Allow900YesNo
18436862AGENTLESS RUNTIME CYBERSECURITY ANALYSISFebruary 2024June 2024Allow410NoNo
18430355Container Image Deduplication for Vulnerability Detection and Management in IT SystemsFebruary 2024August 2024Allow600NoNo
18429388CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS WITH AN EMBEDDED VERIFICATION LOG IN A BACKUP SYSTEMJanuary 2024December 2025Allow2210YesNo
18426038HIERARCHICAL RISK SCORING FOR SAAS APPLICATIONSJanuary 2024August 2024Allow710NoNo
18418938CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS FOR OPAQUE DATA IN A BACKUP SYSTEMJanuary 2024December 2025Allow2210YesNo
18416368Systems and Methods for Network SecurityJanuary 2024February 2026Allow2520YesNo
18416171PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTSJanuary 2024January 2025Allow1210NoNo
18414373CROSS-NETWORK SECURITY EVALUATIONJanuary 2024August 2024Allow700YesNo
18413174OBTAINING IMMUTABLE SNAPSHOTS IN STORAGE SYSTEMS FOR RECOVERY AFTER CORRUPTED DATA DETECTIONJanuary 2024February 2026Allow2510YesNo
18414325SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT RESTJanuary 2024April 2024Allow310NoNo
18412492CLIENT IDENTIFICATION METHOD AND APPARATUS, AND STORAGE MEDIUM AND NETWORK DEVICEJanuary 2024August 2024Allow710NoNo
18410231Issuing Surrogate Credentials For Accessing Target ResourcesJanuary 2024September 2025Allow2000NoNo
18410717Dynamic Cloud Workload Reallocation Based On Active Security Exploits In Dynamic Random Access Memory (DRAM)January 2024December 2025Allow2310NoNo
18404355METHOD AND APPARATUS FOR PROTECTING A PUF GENERATORJanuary 2024November 2024Allow1010NoNo
18402394Authenticating Based on Behavioral Transactional PatternsJanuary 2024December 2024Allow1110NoNo
18400689METHODS AND APPARATUSES FOR JOINTLY PROCESSING DATA BY TWO PARTIES FOR DATA PRIVACY PROTECTIONDecember 2023February 2026Allow2620NoNo
18398666Systems and Methods for Network SecurityDecember 2023January 2026Allow2520YesNo
18394419Homomorphic Encryption-Based Image Encryption And Decryption Method And DeviceDecember 2023November 2025Allow2310NoNo
18544387APPARATUS AND METHOD FOR SECURING WEB APPLICATION SERVER SOURCE CODEDecember 2023April 2025Allow1510NoNo
18541979Applying Attestation to the Border Gateway Protocol (BGP)December 2023July 2025Allow1920YesNo
18533615SYSTEM OF MANAGING DATA ACROSS DISPARATE BLOCKCHAINSDecember 2023November 2024Allow1110NoNo
18529596SECURE CIRCUIT INTEGRATED WITH MEMORY LAYERDecember 2023November 2024Allow1110NoNo
18528320Secure Web Container for a Secure Online User EnvironmentDecember 2023October 2024Allow1110YesNo
18528247Counting Machine for Manufacturing and Validating Event-Relevant Identities via an Ensemble NetworkDecember 2023August 2024Allow920YesNo
18528638DYNAMIC KEY EXCHANGE FOR MOVING TARGETDecember 2023December 2024Allow1210NoNo
18526452SECURITY THREAT MITIGATION FOR LARGE LANGUAGE MODELSDecember 2023June 2025Allow1900NoNo
18519364USER CONSENT SERVICE UTILIZING MOBILE DEVICE IDENTIFIERSNovember 2023November 2024Allow1140YesNo
18519270FACILITATING MODIFICATION OF COMPONENTS OF ARTIFICIAL INTELLIGENCE COMPUTING APPLICATIONS VIA AGGREGATED RISK SCORESNovember 2023January 2026Allow2610NoNo
18520394INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL, AND STORAGE MEDIUMNovember 2023April 2025Allow1630YesNo
18515895Vertically Integrated Automatic Threat Level Determination For Containers And Hosts In A Containerization EnvironmentNovember 2023May 2025Allow1810NoNo
18562200PERSONAL DIGITAL IDENTITY MANAGEMENT SYSTEM AND METHODNovember 2023January 2026Allow2610YesNo
18508345SECURE CONNECTION BROKER FOR SWARM COMMUNICATIONSNovember 2023December 2025Allow2520NoNo
18507436Systems and methods for intelligent application definition and protectionNovember 2023February 2026Allow2710YesNo
18504807TRUSTED COMMUNICATION SESSION AND CONTENT DELIVERYNovember 2023October 2025Allow2310NoNo
18501895TECHNIQUES TO PROCESS THREE-DIMENSIONAL OBJECT FILES WHILE MAINTAINING PRIVACYNovember 2023January 2026Allow2610YesNo
18499684Location Aware Authorization SystemNovember 2023December 2025Allow2610YesNo
18498395MANAGING ENTITLEMENTS USING OWNERSHIP VOUCHERSOctober 2023May 2025Allow1900YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2437.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
248
Examiner Affirmed
189
(76.2%)
Examiner Reversed
59
(23.8%)
Reversal Percentile
12.0%
Lower than average

What This Means

With a 23.8% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
717
Allowed After Appeal Filing
213
(29.7%)
Not Allowed After Appeal Filing
504
(70.3%)
Filing Benefit Percentile
33.9%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 29.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2437 - Prosecution Statistics Summary

Executive Summary

Art Unit 2437 is part of Group 2430 in Technology Center 2400. This art unit has examined 8,585 patent applications in our dataset, with an overall allowance rate of 78.6%. Applications typically reach final disposition in approximately 32 months.

Comparative Analysis

Art Unit 2437's allowance rate of 78.6% places it in the 57% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2437 receive an average of 2.11 office actions before reaching final disposition (in the 68% percentile). The median prosecution time is 32 months (in the 42% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.