Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19214617 | MULTIMODAL FINGERPRINTING OF DIGITAL ASSETS | May 2025 | November 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19208461 | QUANTUM SECURE COMMUNICATION PROTOCOL AND DEVICE BASED ON DOUBLE-HELIX STRUCTURE COMPOSITE MULTI-LAYER ENCODING | May 2025 | September 2025 | Allow | 4 | 1 | 0 | No | No |
| 19169111 | PARTIALLY HOMOMORPHIC ENCRYPTION (PHE) IN DISTRIBUTED 1-BIT LARGE LANGUAGE MODEL (LLM) ARCHITECTURE | April 2025 | October 2025 | Allow | 6 | 2 | 0 | No | No |
| 19080000 | SYSTEM AND METHOD FOR SECURE KNOWLEDGE DISTILLATION USING HOMOMORPHIC ENCRYPTION IN MACHINE LEARNING ENVIRONMENTS | March 2025 | August 2025 | Allow | 5 | 1 | 0 | No | No |
| 19070170 | TECHNIQUES FOR PRIORITIZING CYBERSECURITY REMEDIATION ACTIONS BASED ON A DATA RISK SCORE | March 2025 | July 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 19056084 | COMPUTING SYSTEM FOR FULLY HOMOMORPHIC ENCRYPTION APPLICATIONS USING PARALLELIZABLE HYBRID BOOTSTRAPPING | February 2025 | April 2025 | Allow | 2 | 0 | 0 | No | No |
| 19053825 | COMPUTER-BASED SYSTEMS CONFIGURED FOR DOMAIN NAME CENTRAL BLOCKING SYSTEMS AND METHODS OF USE THEREOF | February 2025 | July 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 19006173 | HIGH-TEMPORAL-ACCURACY ELECTROMAGNETIC FAULT INJECTION METHOD AND APPARATUS FOR CRYPTOGRAPHIC CHIP | December 2024 | May 2025 | Allow | 4 | 0 | 0 | No | No |
| 19004413 | METHOD OF CONTROLLING REMOTE DATA BASED ON CONFIDENTIAL COMPUTING AND SYSTEM THEREOF | December 2024 | August 2025 | Allow | 8 | 2 | 0 | No | No |
| 19004215 | CONFIDENTIAL COMPUTING-BASED METHOD FOR CUSTOMIZEDLY BALANCING BETWEEN SECURITY AND PERFORMANCE OF HOMOMORPHIC ENCRYPTION | December 2024 | July 2025 | Allow | 6 | 1 | 0 | No | No |
| 18946352 | ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENT | November 2024 | March 2025 | Allow | 4 | 0 | 0 | No | No |
| 18941347 | COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A FREQUENCY CONTENT OF AN ENCRYPTED RAW AUDIO SIGNAL | November 2024 | June 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18913331 | SYSTEM AND METHOD FOR SOFTWARE SERVICE CYBERSECURITY REMEDIATION | October 2024 | January 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 18906646 | USE OF AN APPLICATION CONTROLLER TO MONITOR AND CONTROL SOFTWARE FILE AND APPLICATION ENVIRONMENTS | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18886286 | SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM | September 2024 | February 2026 | Allow | 17 | 0 | 0 | No | No |
| 18807438 | System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js Applications | August 2024 | November 2024 | Allow | 3 | 1 | 0 | No | No |
| 18800762 | RADIO LINK RECOVERY FOR USER EQUIPMENT | August 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18796250 | METHOD AND AN ELECTRONIC DEVICE FOR DECODING INFORMATION IN A MULTI-DIMENSIONAL ENCRYPTED CODE | August 2024 | July 2025 | Allow | 11 | 2 | 0 | No | No |
| 18789018 | A METHOD OF OPTIMIZING LINEAR TRANSFORMATION | July 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18763675 | POST-QUANTUM CRYPTOGRAPHY FOR SECURE BOOT | July 2024 | November 2025 | Allow | 16 | 0 | 0 | No | No |
| 18744901 | ENHANCED ENCRYPTION FOR FACE-RELATED DATA | June 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18744240 | CYBERSECURITY FOR RESOURCE SHARING AMONG INTERNET OF THINGS DEVICES | June 2024 | January 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18743030 | GENERATING THREAT STATEMENTS FOR A THREAT MODEL USING ARTIFICIAL INTELLIGENCE | June 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18738764 | CYBER-SECURITY PRESENCE MONITORING AND ASSESSMENT | June 2024 | August 2025 | Allow | 14 | 1 | 0 | No | No |
| 18738690 | BIOMETRIC AUTHENTICATION USING A SMART RING | June 2024 | March 2026 | Allow | 21 | 6 | 0 | Yes | No |
| 18737485 | INTEGRATED SECURITY ANALYSIS DATA STRUCTURE AND METHOD FOR MULTI-CONTAINER SOFTWARE PROJECTS | June 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18714541 | KEY MANAGEMENT METHOD, KEY MANAGEMENT DEVICE AND STORAGE MEDIUM | May 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18671602 | AUTONOMOUS MACHINE LEARNING METHODS FOR DETECTING AND THWARTING RANSOMWARE ATTACKS | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18664488 | PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION TO AN ENTITY TO BE VERIFIED | May 2024 | September 2025 | Allow | 16 | 3 | 0 | Yes | No |
| 18664480 | PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION TO AN ENTITY TO BE VERIFIED | May 2024 | November 2025 | Allow | 18 | 4 | 0 | Yes | No |
| 18662448 | AGENTLESS RUNTIME CYBERSECURITY ANALYSIS | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18660513 | Secure Permissioning of Access to User Accounts, Including Secure Deauthorization of Access to User Accounts | May 2024 | August 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18656486 | ROBUST ENCODING OF MACHINE READABLE INFORMATION IN HOST OBJECTS AND BIOMETRICS, AND ASSOCIATED DECODING AND AUTHENTICATION | May 2024 | June 2025 | Allow | 14 | 1 | 0 | No | No |
| 18655095 | Antiransomware File Analysis and Scoring | May 2024 | December 2024 | Allow | 7 | 2 | 0 | No | No |
| 18652421 | ENHANCED SYSTEMS AND METHODS FOR PIRATE DECODER IDENTIFICATION | May 2024 | November 2025 | Allow | 18 | 0 | 0 | No | No |
| 18651643 | MALICIOUS PROMPT MANAGEMENT FOR LARGE LANGUAGE MODELS | April 2024 | August 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18649560 | DIGITAL IDENTITY PROXY | April 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18649766 | SYSTEM AND METHOD FOR MULTIFACTOR AUTHENTICATION FOR ACCESS TO A RESOURCE BASED ON CO-CONNECTED DEVICE PRESENCE | April 2024 | September 2025 | Allow | 17 | 1 | 0 | No | No |
| 18646624 | Domain Name System Data Exfiltration Detection Using Machine Learning Techniques | April 2024 | September 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18636129 | Home-Based Physical and Cyber Integrated Security - Intrusion Detection System (PCIS-IDS) | April 2024 | April 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18633880 | Detecting and Preventing Installation and Execution of Malicious Browser Extensions | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18627259 | Managing Implementation Of Application-Code Scanning Processes | April 2024 | February 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18697315 | DIGITAL SIGNATURES WITH KEY-DERIVATION | March 2024 | November 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18696398 | PORT MANAGEMENT METHOD, SYSTEM AND DEVICE, AND COMPUTER READABLE STORAGE MEDIUM | March 2024 | August 2024 | Allow | 5 | 1 | 0 | No | No |
| 18617225 | DETECTING MALWARE INFECTION PATH IN A CLOUD COMPUTING ENVIRONMENT UTILIZING A SECURITY GRAPH | March 2024 | November 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18615747 | ADAPTIVE LANGUAGE MODEL-BASED SOLUTION FOR INTERACTIVE SECURITY AND SAFETY WITH DATA PRIVACY | March 2024 | September 2024 | Allow | 6 | 1 | 1 | No | No |
| 18613785 | Object Movement Method, Apparatus and Electronic Device | March 2024 | February 2026 | Allow | 22 | 1 | 0 | No | No |
| 18608599 | TURING MACHINE AGENT FOR BEHAVIORAL THREAT DETECTION | March 2024 | January 2026 | Allow | 22 | 2 | 0 | Yes | No |
| 18607843 | Multi-Array User Authorization For Cloud-Based Storage Systems | March 2024 | August 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18607384 | Digital Key Authentication Utilizing Device Metadata | March 2024 | October 2025 | Allow | 19 | 0 | 0 | No | No |
| 18607279 | GENERATING REMEDIATION STRATEGIES FOR RESPONDING TO SECURITY DEFICIENCIES USING GENERATIVE MACHINE LEARNING MODELS | March 2024 | February 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18606839 | METHOD AND SYSTEM FOR ASSESING RISK ASSOCIATED WITH AI MODELS | March 2024 | February 2026 | Allow | 23 | 1 | 0 | No | No |
| 18603931 | SYSTEM AND METHOD FOR NEAR-REAL TIME CLOUD SECURITY POSTURE MANAGEMENT | March 2024 | May 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18602218 | Web Page Risk Analysis Using Machine Learning | March 2024 | June 2025 | Allow | 15 | 1 | 0 | No | No |
| 18600086 | SYSTEMS AND METHODS FOR AUTHENTICATION USING RELATIVISTIC ZERO KNOWLEDGE PROOFS | March 2024 | October 2025 | Allow | 19 | 0 | 0 | No | No |
| 18588781 | SYSTEMS AND METHODS FOR MODEL SECURITY IN DISTRIBUTED MODEL TRAINING APPLICATIONS | February 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18585687 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | March 2025 | Allow | 13 | 2 | 0 | Yes | No |
| 18685831 | DEVICES, SYSTEMS, AND METHODS FOR PROVISIONING AND UPDATING SECURITY INFORMATION & EVENT MANAGEMENT ARTIFACTS FOR MULTIPLE TENANTS | February 2024 | September 2025 | Allow | 19 | 3 | 0 | Yes | Yes |
| 18442722 | STORAGE SYSTEM AND MALICIOUS PROGRAM DETECTION METHOD | February 2024 | January 2026 | Allow | 23 | 1 | 0 | No | No |
| 18683757 | STORING CRYPTOGRAPHIC KEYS SECURELY | February 2024 | February 2026 | Allow | 24 | 2 | 0 | Yes | No |
| 18439856 | AUTO EXPIRING MULTI-TENANT MULTI-ENTITY SLIDING WINDOW EVENT COUNTER | February 2024 | August 2025 | Allow | 18 | 0 | 0 | No | No |
| 18438623 | CREDENTIALED WIRELESS FOB TO CONTROL POWER TOOL DEVICES | February 2024 | September 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18437034 | Dynamic Hierarchical Tagging System and Method | February 2024 | November 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18436862 | AGENTLESS RUNTIME CYBERSECURITY ANALYSIS | February 2024 | June 2024 | Allow | 4 | 1 | 0 | No | No |
| 18430355 | Container Image Deduplication for Vulnerability Detection and Management in IT Systems | February 2024 | August 2024 | Allow | 6 | 0 | 0 | No | No |
| 18429388 | CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS WITH AN EMBEDDED VERIFICATION LOG IN A BACKUP SYSTEM | January 2024 | December 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18426038 | HIERARCHICAL RISK SCORING FOR SAAS APPLICATIONS | January 2024 | August 2024 | Allow | 7 | 1 | 0 | No | No |
| 18418938 | CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS FOR OPAQUE DATA IN A BACKUP SYSTEM | January 2024 | December 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18416368 | Systems and Methods for Network Security | January 2024 | February 2026 | Allow | 25 | 2 | 0 | Yes | No |
| 18416171 | PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTS | January 2024 | January 2025 | Allow | 12 | 1 | 0 | No | No |
| 18414373 | CROSS-NETWORK SECURITY EVALUATION | January 2024 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18413174 | OBTAINING IMMUTABLE SNAPSHOTS IN STORAGE SYSTEMS FOR RECOVERY AFTER CORRUPTED DATA DETECTION | January 2024 | February 2026 | Allow | 25 | 1 | 0 | Yes | No |
| 18414325 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | January 2024 | April 2024 | Allow | 3 | 1 | 0 | No | No |
| 18412492 | CLIENT IDENTIFICATION METHOD AND APPARATUS, AND STORAGE MEDIUM AND NETWORK DEVICE | January 2024 | August 2024 | Allow | 7 | 1 | 0 | No | No |
| 18410231 | Issuing Surrogate Credentials For Accessing Target Resources | January 2024 | September 2025 | Allow | 20 | 0 | 0 | No | No |
| 18410717 | Dynamic Cloud Workload Reallocation Based On Active Security Exploits In Dynamic Random Access Memory (DRAM) | January 2024 | December 2025 | Allow | 23 | 1 | 0 | No | No |
| 18404355 | METHOD AND APPARATUS FOR PROTECTING A PUF GENERATOR | January 2024 | November 2024 | Allow | 10 | 1 | 0 | No | No |
| 18402394 | Authenticating Based on Behavioral Transactional Patterns | January 2024 | December 2024 | Allow | 11 | 1 | 0 | No | No |
| 18400689 | METHODS AND APPARATUSES FOR JOINTLY PROCESSING DATA BY TWO PARTIES FOR DATA PRIVACY PROTECTION | December 2023 | February 2026 | Allow | 26 | 2 | 0 | No | No |
| 18398666 | Systems and Methods for Network Security | December 2023 | January 2026 | Allow | 25 | 2 | 0 | Yes | No |
| 18394419 | Homomorphic Encryption-Based Image Encryption And Decryption Method And Device | December 2023 | November 2025 | Allow | 23 | 1 | 0 | No | No |
| 18544387 | APPARATUS AND METHOD FOR SECURING WEB APPLICATION SERVER SOURCE CODE | December 2023 | April 2025 | Allow | 15 | 1 | 0 | No | No |
| 18541979 | Applying Attestation to the Border Gateway Protocol (BGP) | December 2023 | July 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18533615 | SYSTEM OF MANAGING DATA ACROSS DISPARATE BLOCKCHAINS | December 2023 | November 2024 | Allow | 11 | 1 | 0 | No | No |
| 18529596 | SECURE CIRCUIT INTEGRATED WITH MEMORY LAYER | December 2023 | November 2024 | Allow | 11 | 1 | 0 | No | No |
| 18528320 | Secure Web Container for a Secure Online User Environment | December 2023 | October 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18528247 | Counting Machine for Manufacturing and Validating Event-Relevant Identities via an Ensemble Network | December 2023 | August 2024 | Allow | 9 | 2 | 0 | Yes | No |
| 18528638 | DYNAMIC KEY EXCHANGE FOR MOVING TARGET | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18526452 | SECURITY THREAT MITIGATION FOR LARGE LANGUAGE MODELS | December 2023 | June 2025 | Allow | 19 | 0 | 0 | No | No |
| 18519364 | USER CONSENT SERVICE UTILIZING MOBILE DEVICE IDENTIFIERS | November 2023 | November 2024 | Allow | 11 | 4 | 0 | Yes | No |
| 18519270 | FACILITATING MODIFICATION OF COMPONENTS OF ARTIFICIAL INTELLIGENCE COMPUTING APPLICATIONS VIA AGGREGATED RISK SCORES | November 2023 | January 2026 | Allow | 26 | 1 | 0 | No | No |
| 18520394 | INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL, AND STORAGE MEDIUM | November 2023 | April 2025 | Allow | 16 | 3 | 0 | Yes | No |
| 18515895 | Vertically Integrated Automatic Threat Level Determination For Containers And Hosts In A Containerization Environment | November 2023 | May 2025 | Allow | 18 | 1 | 0 | No | No |
| 18562200 | PERSONAL DIGITAL IDENTITY MANAGEMENT SYSTEM AND METHOD | November 2023 | January 2026 | Allow | 26 | 1 | 0 | Yes | No |
| 18508345 | SECURE CONNECTION BROKER FOR SWARM COMMUNICATIONS | November 2023 | December 2025 | Allow | 25 | 2 | 0 | No | No |
| 18507436 | Systems and methods for intelligent application definition and protection | November 2023 | February 2026 | Allow | 27 | 1 | 0 | Yes | No |
| 18504807 | TRUSTED COMMUNICATION SESSION AND CONTENT DELIVERY | November 2023 | October 2025 | Allow | 23 | 1 | 0 | No | No |
| 18501895 | TECHNIQUES TO PROCESS THREE-DIMENSIONAL OBJECT FILES WHILE MAINTAINING PRIVACY | November 2023 | January 2026 | Allow | 26 | 1 | 0 | Yes | No |
| 18499684 | Location Aware Authorization System | November 2023 | December 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18498395 | MANAGING ENTITLEMENTS USING OWNERSHIP VOUCHERS | October 2023 | May 2025 | Allow | 19 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2437.
With a 23.8% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 29.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2437 is part of Group 2430 in Technology Center 2400. This art unit has examined 8,585 patent applications in our dataset, with an overall allowance rate of 78.6%. Applications typically reach final disposition in approximately 32 months.
Art Unit 2437's allowance rate of 78.6% places it in the 57% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2437 receive an average of 2.11 office actions before reaching final disposition (in the 68% percentile). The median prosecution time is 32 months (in the 42% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.