Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18946352 | ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENT | November 2024 | March 2025 | Allow | 4 | 0 | 0 | No | No |
| 18913331 | SYSTEM AND METHOD FOR SOFTWARE SERVICE CYBERSECURITY REMEDIATION | October 2024 | January 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 18807438 | System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js Applications | August 2024 | November 2024 | Allow | 3 | 1 | 0 | No | No |
| 18714541 | KEY MANAGEMENT METHOD, KEY MANAGEMENT DEVICE AND STORAGE MEDIUM | May 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18671602 | AUTONOMOUS MACHINE LEARNING METHODS FOR DETECTING AND THWARTING RANSOMWARE ATTACKS | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18656486 | ROBUST ENCODING OF MACHINE READABLE INFORMATION IN HOST OBJECTS AND BIOMETRICS, AND ASSOCIATED DECODING AND AUTHENTICATION | May 2024 | June 2025 | Allow | 36 | 1 | 0 | No | No |
| 18655095 | Antiransomware File Analysis and Scoring | May 2024 | December 2024 | Allow | 7 | 2 | 0 | No | No |
| 18636129 | Home-Based Physical and Cyber Integrated Security - Intrusion Detection System (PCIS-IDS) | April 2024 | April 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18633880 | Detecting and Preventing Installation and Execution of Malicious Browser Extensions | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18696398 | PORT MANAGEMENT METHOD, SYSTEM AND DEVICE, AND COMPUTER READABLE STORAGE MEDIUM | March 2024 | August 2024 | Allow | 5 | 1 | 0 | No | No |
| 18617225 | DETECTING MALWARE INFECTION PATH IN A CLOUD COMPUTING ENVIRONMENT UTILIZING A SECURITY GRAPH | March 2024 | November 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18615747 | ADAPTIVE LANGUAGE MODEL-BASED SOLUTION FOR INTERACTIVE SECURITY AND SAFETY WITH DATA PRIVACY | March 2024 | September 2024 | Allow | 6 | 1 | 1 | No | No |
| 18603931 | SYSTEM AND METHOD FOR NEAR-REAL TIME CLOUD SECURITY POSTURE MANAGEMENT | March 2024 | May 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18602218 | Web Page Risk Analysis Using Machine Learning | March 2024 | June 2025 | Allow | 15 | 1 | 0 | No | No |
| 18588781 | SYSTEMS AND METHODS FOR MODEL SECURITY IN DISTRIBUTED MODEL TRAINING APPLICATIONS | February 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18585687 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | March 2025 | Allow | 13 | 2 | 0 | Yes | No |
| 18437034 | Dynamic Hierarchical Tagging System and Method | February 2024 | November 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18436862 | AGENTLESS RUNTIME CYBERSECURITY ANALYSIS | February 2024 | June 2024 | Allow | 4 | 1 | 0 | No | No |
| 18430355 | Container Image Deduplication for Vulnerability Detection and Management in IT Systems | February 2024 | August 2024 | Allow | 6 | 0 | 0 | No | No |
| 18426038 | HIERARCHICAL RISK SCORING FOR SAAS APPLICATIONS | January 2024 | August 2024 | Allow | 7 | 1 | 0 | No | No |
| 18416171 | PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTS | January 2024 | January 2025 | Allow | 12 | 1 | 0 | No | No |
| 18414373 | CROSS-NETWORK SECURITY EVALUATION | January 2024 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18414325 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | January 2024 | April 2024 | Allow | 3 | 1 | 0 | No | No |
| 18412492 | CLIENT IDENTIFICATION METHOD AND APPARATUS, AND STORAGE MEDIUM AND NETWORK DEVICE | January 2024 | August 2024 | Allow | 7 | 1 | 0 | No | No |
| 18404355 | METHOD AND APPARATUS FOR PROTECTING A PUF GENERATOR | January 2024 | November 2024 | Allow | 10 | 1 | 0 | No | No |
| 18402394 | Authenticating Based on Behavioral Transactional Patterns | January 2024 | December 2024 | Allow | 11 | 1 | 0 | No | No |
| 18544387 | APPARATUS AND METHOD FOR SECURING WEB APPLICATION SERVER SOURCE CODE | December 2023 | April 2025 | Allow | 15 | 1 | 0 | No | No |
| 18533615 | SYSTEM OF MANAGING DATA ACROSS DISPARATE BLOCKCHAINS | December 2023 | November 2024 | Allow | 11 | 1 | 0 | No | No |
| 18529596 | SECURE CIRCUIT INTEGRATED WITH MEMORY LAYER | December 2023 | November 2024 | Allow | 11 | 1 | 0 | No | No |
| 18528320 | Secure Web Container for a Secure Online User Environment | December 2023 | October 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18528247 | Counting Machine for Manufacturing and Validating Event-Relevant Identities via an Ensemble Network | December 2023 | August 2024 | Allow | 9 | 2 | 0 | Yes | No |
| 18528638 | DYNAMIC KEY EXCHANGE FOR MOVING TARGET | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18519364 | USER CONSENT SERVICE UTILIZING MOBILE DEVICE IDENTIFIERS | November 2023 | November 2024 | Allow | 11 | 3 | 0 | Yes | No |
| 18520394 | INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL, AND STORAGE MEDIUM | November 2023 | April 2025 | Allow | 16 | 3 | 0 | Yes | No |
| 18515895 | Vertically Integrated Automatic Threat Level Determination For Containers And Hosts In A Containerization Environment | November 2023 | May 2025 | Allow | 18 | 1 | 0 | No | No |
| 18498395 | MANAGING ENTITLEMENTS USING OWNERSHIP VOUCHERS | October 2023 | May 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18497537 | PREVENTING DATA MANIPULATION AND PROTECTING USER PRIVACY IN DETERMINING ACCURATE LOCATION EVENT MEASUREMENTS | October 2023 | November 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18557672 | SYSTEMS AND METHODS FOR ENTANGLED AUTHENTICATION OF BIOSENSORS AND BIOSENSOR OUTPUTS | October 2023 | July 2025 | Allow | 20 | 0 | 0 | No | No |
| 18493113 | PAIRING WITH COMPANION DEVICE | October 2023 | June 2024 | Allow | 8 | 0 | 0 | No | No |
| 18490006 | METHODS AND SYSTEMS FOR PROVISIONING CLOUD COMPUTING SERVICES | October 2023 | July 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18375872 | ASYMMETRIC PARALLEL PROCESSING APPLIANCE FOR GENERATION OF SUPERIOR STRATEGIES FOR DEPLOYMENT TO REAL TIME ACTUAL CONDITIONS | October 2023 | December 2024 | Abandon | 14 | 1 | 0 | No | No |
| 18374188 | DETECTING MALICIOUS SCRIPTS IN A WEB PAGE | September 2023 | July 2024 | Allow | 10 | 1 | 0 | No | No |
| 18368609 | COMPUTER INTERFACES AND AUTHENTICATION PROTOCOLS FOR SECURELY LINKING AND TRANSFERRING CONTENT BETWEEN ONLINE ACCOUNTS | September 2023 | November 2023 | Allow | 2 | 1 | 0 | No | No |
| 18368572 | MACHINE LEARNING DEVICE, MACHINE LEARNING SYSTEM, AND MACHINE LEARNING METHOD | September 2023 | February 2024 | Allow | 5 | 1 | 0 | No | No |
| 18466986 | AUTONOMOUS MACHINE LEARNING METHODS FOR DETECTING AND THWARTING RANSOMWARE ATTACKS | September 2023 | February 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18243799 | QUANTUM NETWORK DEVICES, SYSTEMS, AND METHODS | September 2023 | August 2024 | Allow | 12 | 0 | 1 | No | No |
| 18462849 | COMPUTER AUGMENTED THREAT EVALUATION | September 2023 | March 2025 | Allow | 18 | 1 | 0 | No | No |
| 18241527 | SECURE PORTABLE MEDICAL INFORMATION ACCESS SYSTEMS AND METHODS RELATED THERETO | September 2023 | October 2024 | Abandon | 14 | 1 | 0 | No | No |
| 18241550 | Timeline Building System | September 2023 | November 2024 | Allow | 15 | 3 | 0 | Yes | No |
| 18457250 | AUTOMATED DEVICE ACCESS | August 2023 | May 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18456427 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | August 2023 | November 2023 | Allow | 3 | 1 | 0 | No | No |
| 18547421 | ENCRYPTED SCALAR MULTIPLICATION | August 2023 | July 2024 | Allow | 11 | 1 | 1 | Yes | No |
| 18453087 | FRICTION-LESS IDENTITY PROOFING DURING EMPLOYEE SELF-SERVICE REGISTRATION | August 2023 | September 2024 | Allow | 13 | 0 | 0 | Yes | No |
| 18452033 | METHODS, SYSTEMS AND MACHINE-READABLE PROGRAMS FOR COMMUNICATING SELF DESTRUCTIVE MESSAGES | August 2023 | July 2024 | Allow | 11 | 1 | 0 | No | No |
| 18232336 | METHOD AND APPARATUS FOR LOGIC CELL-BASED PUF GENERATORS | August 2023 | April 2024 | Allow | 9 | 1 | 0 | No | No |
| 18446175 | SYSTEM AND METHOD FOR CATASTROPHIC EVENT MODELING | August 2023 | April 2025 | Abandon | 20 | 2 | 0 | No | No |
| 18228468 | DISPOSABLE BROWSERS AND AUTHENTICATION TECHNIQUES FOR A SECURE ONLINE USER ENVIRONMENT | July 2023 | September 2024 | Allow | 13 | 1 | 0 | No | No |
| 18361144 | SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONS | July 2023 | June 2025 | Allow | 23 | 1 | 0 | No | No |
| 18360624 | DYNAMIC MANAGEMENT OF DATA WITH CONTEXT-BASED PROCESSING | July 2023 | October 2024 | Allow | 14 | 0 | 0 | No | No |
| 18359283 | USE OF AN APPLICATION CONTROLLER TO MONITOR AND CONTROL SOFTWARE FILE AND APPLICATION ENVIRONMENTS | July 2023 | June 2024 | Allow | 10 | 0 | 0 | No | No |
| 18358799 | TOKENIZED HARDWARE SECURITY MODULES | July 2023 | January 2025 | Allow | 18 | 1 | 0 | No | No |
| 18358283 | FAST UNBREAKABLE CIPHER | July 2023 | March 2024 | Allow | 8 | 1 | 0 | No | No |
| 18225260 | NON-FUNGIBLE TOKEN AUTHENTICATION | July 2023 | July 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18224518 | BINDING WITH CRYPTOGRAPHIC KEY ATTESTATION | July 2023 | June 2024 | Allow | 10 | 1 | 0 | No | No |
| 18223718 | TECHNIQUES TO PRE-AUTHENTICATE A USER IDENTITY FOR AN ELECTRONIC ACCOUNT | July 2023 | March 2024 | Allow | 8 | 0 | 0 | No | No |
| 18354046 | Protection of Personal Data Stored in Vehicular Computing Systems | July 2023 | December 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18353445 | FIRST CLASS DATABASE OBJECT SERVER APPLICATION | July 2023 | May 2025 | Allow | 21 | 1 | 0 | No | No |
| 18351538 | SECURE MULTI-ENDPOINT CIPHER NEGOTIATION | July 2023 | May 2025 | Allow | 22 | 0 | 0 | No | No |
| 18349226 | INTEGRATED SECURITY AND THREAT PREVENTION AND DETECTION PLATFORM | July 2023 | February 2025 | Allow | 20 | 3 | 0 | No | No |
| 18220181 | SECURE COMMUNICATIONS VIA THIRD-PARTY SYSTEMS THROUGH FRAMES | July 2023 | October 2024 | Allow | 16 | 1 | 0 | No | No |
| 18220186 | SECURE COMMUNICATIONS VIA THIRD-PARTY SYSTEMS THROUGH FRAMES | July 2023 | October 2024 | Allow | 16 | 1 | 0 | No | No |
| 18349059 | SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM | July 2023 | June 2024 | Allow | 12 | 0 | 0 | No | No |
| 18347239 | SYSTEMS AND METHODS FOR AUTHENTICATING PHOTOGRAPHIC IMAGE DATA | July 2023 | August 2024 | Allow | 14 | 1 | 0 | No | No |
| 18215943 | ANALYSIS OF HISTORICAL NETWORK TRAFFIC TO IDENTIFY NETWORK VULNERABILITIES | June 2023 | March 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18215924 | LIGHTWEIGHT ELECTRONIC CONTROL UNIT FINGERPRINTING | June 2023 | June 2024 | Allow | 11 | 1 | 0 | No | No |
| 18216093 | SECURE FEATURE AND KEY MANAGEMENT IN INTEGRATED CIRCUITS | June 2023 | June 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18344003 | Authentication of Medical Device Computing Systems by Using Metadata Signature | June 2023 | January 2024 | Allow | 7 | 0 | 0 | No | No |
| 18215609 | SECURE COMMUNICATIONS VIA THIRD-PARTY SYSTEMS THROUGH FRAMES | June 2023 | October 2024 | Allow | 16 | 1 | 0 | No | No |
| 18340510 | SYSTEMS AND METHODS FOR A DATA-DRIVEN WORKFLOW PLATFORM | June 2023 | August 2024 | Allow | 14 | 2 | 0 | Yes | No |
| 18339690 | APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION | June 2023 | May 2025 | Allow | 23 | 1 | 0 | No | No |
| 18338909 | CERTIFICATE REVOCATION CHECK PROXY SERVICE | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18339058 | METHOD AND APPARATUS TO FACILITATE TRANSMISSION OF AN ENCRYPTED ROLLING CODE | June 2023 | July 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18335406 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR SEARCHING POLYMORPHICALLY ENCRYPTED DATA | June 2023 | March 2025 | Allow | 21 | 2 | 0 | No | Yes |
| 18209789 | Hardware Component Monitoring-based Performance of a Remedial Action | June 2023 | June 2025 | Abandon | 24 | 1 | 0 | Yes | No |
| 18333242 | DATA ACCESS AND FIREWALL TUNNELING USING A CUSTOM SOCKET FACTORY | June 2023 | June 2024 | Allow | 12 | 1 | 0 | No | No |
| 18265980 | METHOD FOR SECURING AN AES BLOCK CIPHER ALGORITHM AGAINST HIGH-ORDER SIDE-CHANNEL ATTACKS | June 2023 | May 2025 | Allow | 24 | 1 | 0 | No | No |
| 18325361 | DETECTING MALWARE INFECTION PATH IN A CLOUD COMPUTING ENVIRONMENT UTILIZING A SECURITY GRAPH | May 2023 | February 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18201346 | DYNAMIC ENROLLMENT USING BIOMETRIC TOKENIZATION | May 2023 | April 2025 | Abandon | 23 | 3 | 0 | Yes | No |
| 18199927 | SYSTEM AND METHOD FOR FEDERATED IDENTITY FUNCTIONALITY FOR API DEVELOPMENT | May 2023 | June 2024 | Abandon | 13 | 1 | 0 | No | No |
| 18199413 | DISPLAY SYSTEM, DISPLAY METHOD, AND RECORDING MEDIUM | May 2023 | May 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18320509 | BATTERY WITH MATERIAL ON EXTERIOR OF CASING TO ABSORB MATTER FROM INSIDE BATTERY AND DISLODGE BATTERY FROM ELECTRICAL CONTACT(S) | May 2023 | February 2025 | Abandon | 21 | 0 | 0 | No | No |
| 18318882 | DYNAMIC NETWORK RISK PREDICTING METHOD BASED ON A GRAPH NEURAL NETWORK | May 2023 | December 2023 | Allow | 7 | 1 | 0 | No | No |
| 18318945 | INTERACTIVE WEB APPLICATION SCANNING | May 2023 | May 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18319030 | RISK ASSESSMENT SYSTEM FOR IDENTIFYING DATA FILES WITH SENSITIVE INFORMATION | May 2023 | March 2025 | Allow | 22 | 0 | 0 | No | No |
| 18317512 | DEFENSE METHOD OF DEEP LEARNING MODEL AIMING AT ADVERSARIAL ATTACKS | May 2023 | August 2023 | Allow | 3 | 0 | 0 | No | No |
| 18317476 | SYSTEMS AND METHODS FOR PROVIDING ENHANCED MULTI-LAYERED SECURITY WITH ENCRYPTION MODELS THAT IMPROVE ZERO-TRUST ARCHITECTURES | May 2023 | March 2025 | Allow | 22 | 0 | 0 | No | No |
| 18196358 | RESOURCE ALLOCATION METHOD AND SYSTEM IN QUANTUM KEY DISTRIBUTION OPTICAL NETWORK | May 2023 | April 2025 | Allow | 24 | 1 | 0 | No | No |
| 18195624 | ANTI-CLONING ARCHITECTURE FOR DEVICE IDENTITY PROVISIONING | May 2023 | June 2025 | Allow | 25 | 1 | 0 | No | No |
| 18315126 | PERSONAL INFORMATION PLATFORMS | May 2023 | May 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18143498 | MULTIFACTOR IDENTITY AUTHENTICATION VIA CUMULATIVE DYNAMIC CONTEXTUAL IDENTITY | May 2023 | April 2024 | Allow | 11 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2437.
With a 23.8% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 29.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2437 is part of Group 2430 in Technology Center 2400. This art unit has examined 8,620 patent applications in our dataset, with an overall allowance rate of 80.0%. Applications typically reach final disposition in approximately 30 months.
Art Unit 2437's allowance rate of 80.0% places it in the 58% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2437 receive an average of 2.03 office actions before reaching final disposition (in the 68% percentile). The median prosecution time is 30 months (in the 44% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.