Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19080748 | SECURE BEACON IDENTITY | March 2025 | June 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 19028234 | PRIVACY-PRESERVING TRANSFORMER MODEL WITH ENCRYPTED DIMENSIONALITY REDUCTION | January 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19025713 | INFORMATION OUTPUT DEVICE, INFORMATION OUTPUT METHOD, AND RECORDING MEDIUM | January 2025 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19003945 | AUTHENTICATION USING A BIOMETRIC TEMPLATE RELATED TO NEURAL ACTIVITY, AND APPLICATIONS THEREOF | December 2024 | June 2025 | Allow | 5 | 1 | 0 | No | No |
| 18982812 | REAL-TIME ANOMALY DETECTION AND MITIGATION FOR STREAMING FUNCTIONAL DATA | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18975491 | ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE | December 2024 | February 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18951202 | SECURE COMMUNICATIONS IN INTERACTIVE COMPUTING ENVIRONMENT | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18949882 | Hidden Compartments in Data Encrypted Using Machine Learning | November 2024 | January 2025 | Allow | 2 | 1 | 0 | No | No |
| 18946325 | SYSTEMS AND METHODS FOR SECURE USER AUTHENTICATION WITH PASSKEYS ON SHARED COMPUTING DEVICES | November 2024 | April 2025 | Allow | 6 | 1 | 0 | No | No |
| 18923219 | ACCESS CONTROL MANAGEMENT | October 2024 | March 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18900142 | METHOD FOR TRANSMITTING MESSAGE APPLIED TO PRESET SERVER AND TERMINAL, AND ELECTRONIC DEVICE | September 2024 | July 2025 | Allow | 9 | 1 | 1 | Yes | No |
| 18892232 | Machine Learning Model Parameter Based Encryption | September 2024 | April 2025 | Allow | 7 | 2 | 0 | Yes | No |
| 18892113 | Hidden Compartments in Data Encrypted Using Machine Learning | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18823485 | Management System for Networked Endpoints | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18820411 | WEIGHTED TIMES SERIES FREQUENCY - INVERSE DOCUMENT FREQUENCY SCORING FOR CYBERSECURITY ALERTS | August 2024 | December 2024 | Allow | 4 | 1 | 0 | No | No |
| 18796334 | ABNORMAL BEHAVIOR DETECTION METHOD, ELECTRONIC DEVICE AND NON-TRANSIENT COMPUTER-READABLE STORAGE MEDIUM | August 2024 | April 2025 | Allow | 8 | 2 | 0 | Yes | No |
| 18774270 | CYBERSECURITY THREAT HUNTING | July 2024 | June 2025 | Abandon | 11 | 1 | 0 | No | No |
| 18773057 | SYSTEMS AND METHODS OF ACCESS VALIDATION USING DISTRIBUTED LEDGER IDENTITY MANAGEMENT | July 2024 | June 2025 | Allow | 11 | 0 | 0 | Yes | No |
| 18769641 | COMPROMISED ENDPOINT CREDENTIALS INTERCEPTOR | July 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18764190 | SYSTEM AND METHOD FOR PERFORMING TASKS BY PROVIDING A DECENTRALIZED COMMUNICATION BETWEEN ENTITIES | July 2024 | January 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18763469 | MULTI-DIMENSIONAL ANOMALY SOURCE DETECTION | July 2024 | January 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18747496 | METHODS AND SYSTEMS FOR FACILITATING AUTHENTICATING OF USERS | June 2024 | March 2025 | Allow | 9 | 2 | 0 | Yes | No |
| 18740622 | IDENTITY AND ACTIVITY BASED NETWORK SECURITY POLICIES | June 2024 | May 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18718645 | A COMPUTER ARCHITECTURE AND METHOD FOR PERFORMING LATTICE-BASED CRYPTOGRAPHIC PRIMITIVES WITH RESISTANCE TO SIDE-CHANNEL ATTACKS | June 2024 | February 2025 | Allow | 9 | 1 | 0 | No | No |
| 18734452 | LOCATION-BASED MOBILE DEVICE AUTHENTICATION | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18733767 | METHOD FOR DETECTING ANOMALIES IN GROUPS OF USER VERIFICATION REQUESTS | June 2024 | November 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18733553 | PROVIDING DATABASE PERFORMANCE REPORT IN RESTRICTED ENVIRONMENT | June 2024 | March 2025 | Allow | 9 | 1 | 0 | No | No |
| 18732000 | TECHNIQUES FOR SECURING NETWORK ENVIRONMENTS BY IDENTIFYING DEVICE ATTRIBUTES BASED ON STRING FIELD CONVENTIONS | June 2024 | May 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18679347 | HOSTED EMAIL AUTHENTICATION | May 2024 | December 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18665845 | VULNERABILITY DETECTION PLATFORM | May 2024 | January 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18662793 | SYSTEMS AND METHODS FOR PROCESSING OPTIMIZATIONS AND TEMPLATING USING METADATA-DRIVEN BLOCKCHAIN TECHNIQUES | May 2024 | April 2025 | Allow | 11 | 0 | 0 | Yes | No |
| 18661204 | Systems and Methods for Cryptography | May 2024 | April 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18660676 | DELIVERING STANDALONE NON-PUBLIC NETWORK (SNPN) CREDENTIALS FROM AN ENTERPRISE AUTHENTICATION SERVER TO A USER EQUIPMENT OVER EXTENSIBLE AUTHENTICATION PROTOCOL (EAP) | May 2024 | January 2025 | Allow | 8 | 0 | 0 | No | No |
| 18655094 | SECURELY ISOLATING ONE OR MORE QUALIFIED DIGITAL IDENTIFIERS ASSOCIATED WITH A USER WHEN ACCESSING A DIGITAL SERVICE | May 2024 | February 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18649492 | TECHNIQUES FOR MAPPING SECURITY CONTROLS TO CYBER THREATS | April 2024 | October 2024 | Allow | 5 | 1 | 0 | No | No |
| 18647831 | IOT DEVICE INSPECTION METHOD, AND DEVICE THEREFOR | April 2024 | October 2024 | Allow | 6 | 1 | 0 | No | No |
| 18641988 | TECHNIQUES TO FACILITATE FAST ROAMING BETWEEN A MOBILE NETWORK OPERATOR PUBLIC WIRELESS WIDE AREA ACCESS NETWORK AND AN ENTERPRISE PRIVATE WIRELESS WIDE AREA ACCESS NETWORK | April 2024 | November 2024 | Allow | 7 | 0 | 0 | No | No |
| 18639422 | COLLABORATIVE COMMUNICATIONS ENVIRONMENT AND PRIVACY SETTING ASSOCIATED THEREWITH | April 2024 | May 2025 | Allow | 13 | 2 | 0 | Yes | No |
| 18701403 | INFORMATION PROCESSING SYSTEM | April 2024 | July 2024 | Allow | 3 | 0 | 0 | No | No |
| 18634920 | STATELESS SYSTEM TO ENABLE DATA BREACH LOOKUP | April 2024 | October 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18699540 | CONFINING LATERAL TRAVERSAL WITHIN A COMPUTER NETWORK | April 2024 | April 2025 | Allow | 12 | 2 | 0 | Yes | No |
| 18628581 | SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTS | April 2024 | October 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18624274 | Method for Automating Security Architecture Reviews and Assessments | April 2024 | June 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18621304 | TECHNIQUES FOR CYBERSECURITY INVESTIGATION OF CLOUD ENTITY MISUSE LEVERAGING RUNTIME CONTEXT | March 2024 | October 2024 | Allow | 7 | 1 | 0 | No | No |
| 18622553 | APPARATUS, METHOD AND ARTICLE TO FACILITATE AUTOMATIC DETECTION AND REMOVAL OF FRAUDULENT USER INFORMATION IN A NETWORK ENVIRONMENT | March 2024 | March 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18610733 | SYSTEMS AND METHODS FOR BLOCKCHAIN-ENABLED END-TO-END ENCRYPTION | March 2024 | April 2025 | Allow | 13 | 2 | 1 | Yes | No |
| 18603926 | LIVENESS IN CONSENSUS PROTOCOL | March 2024 | February 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18603590 | ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE | March 2024 | August 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18602639 | NETWORK ISOLATION BY POLICY COMPLIANCE EVALUATION | March 2024 | November 2024 | Allow | 8 | 1 | 0 | No | No |
| 18689112 | SYSTEM AND METHOD FOR MANAGING DATA ACCESS REQUESTS | March 2024 | May 2025 | Allow | 14 | 2 | 0 | No | No |
| 18585635 | Methods and Apparatus for Encoding Passwords or Other Information | February 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18685885 | OBJECT STORY TO TRACK ASPECTS OF OBJECT LIFECYCLE | February 2024 | July 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18581424 | ENDOGENOUS DYNAMIC DEFENSE ARCHITECTURE-BASED MULTI-OBJECTIVE SERVICE FUNCTION CHAIN DEPLOYMENT METHOD | February 2024 | April 2024 | Allow | 2 | 0 | 0 | No | No |
| 18441657 | SYSTEM FOR TRACKING RESOURCES USING NON-FUNGIBLE TOKENS | February 2024 | January 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18440800 | MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONS | February 2024 | August 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18438741 | SENDING AND RECEIVING MESSAGES | February 2024 | May 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18435148 | COMMUNICATION TERMINAL, CORE NETWORK DEVICE, CORE NETWORK NODE, NETWORK NODE, AND KEY DERIVING METHOD | February 2024 | June 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18429215 | BI-DIRECTIONAL DATA SHARING BETWEEN PRIVATE AND PUBLIC CLOUDS | January 2024 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18425847 | APPLICATION ENDPOINT CYBERSECURITY TECHNIQUES | January 2024 | August 2024 | Allow | 6 | 1 | 0 | No | No |
| 18421697 | CONTROL TOWER FOR LINKING ACCOUNTS TO APPLICATIONS | January 2024 | October 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18420638 | DETECTION OF UNKNOWN APPLICATIONS | January 2024 | November 2024 | Allow | 10 | 2 | 0 | Yes | No |
| 18420458 | TTP BASED AUTOMATED PLAYBOOK GENERATION METHOD AND SYSTEM PERFORMING THE SAME | January 2024 | August 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18411184 | UNIQUE PASSWORD POLICY CREATION | January 2024 | November 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18409143 | MULTI-FACTOR AUTHENTICATION USING SYMBOLS | January 2024 | January 2025 | Allow | 12 | 0 | 0 | Yes | No |
| 18406488 | SYSTEMS AND METHODS FOR IMAGE ENCRYPTION | January 2024 | March 2025 | Allow | 14 | 3 | 0 | Yes | No |
| 18575641 | SERVER APPARATUS, ONLINE LEARNING SYSTEM, PROGRAM, AND STORAGE MEDIUM | December 2023 | June 2025 | Allow | 17 | 3 | 0 | Yes | No |
| 18400591 | Secure Authentication | December 2023 | December 2024 | Allow | 11 | 2 | 0 | Yes | No |
| 18398791 | PRESERVING DLL HOOKS | December 2023 | January 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18397866 | MACHINE-DRIVEN CROWD-DISAMBIGUATION OF DATA RESOURCES | December 2023 | January 2025 | Allow | 13 | 1 | 0 | No | No |
| 18396581 | Distributed Routing and Load Balancing in a Dynamic Service Chain | December 2023 | May 2025 | Allow | 16 | 1 | 0 | No | No |
| 18395691 | UNLINKING APPLICATIONS FROM ACCOUNTS | December 2023 | September 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18572915 | COMPUTER-IMPLEMENTED METHOD FOR COMPUTING UNBALANCED L-TREES EFFICIENTLY FOR HASH-BASED SIGNATURES USED IN POST-QUANTUM CRYPTOGRAPHIC AUTHENTICATION | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18392906 | CYBERSECURITY VULNERABILITY VALIDATION TECHNIQUES UTILIZING RUNTIME DATA, STATIC ANALYSIS AND DYNAMIC INSPECTION | December 2023 | May 2024 | Allow | 5 | 1 | 0 | No | No |
| 18390905 | SECURE COMMUNICATION BETWEEN IN-VEHICLE ELECTRONIC CONTROL UNITS | December 2023 | January 2025 | Allow | 13 | 0 | 0 | No | No |
| 18541973 | CREDENTIAL DEPENDENCY ENCODING AND VERIFICATION BASED ON OTHER CREDENTIAL RESOURCES | December 2023 | March 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18541374 | Methods and Systems for Connecting Physical Objects to Digital Communications | December 2023 | November 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18538418 | SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE | December 2023 | August 2024 | Allow | 8 | 0 | 0 | No | No |
| 18569015 | METHOD AND SYSTEM FOR PROCESSING ACTION DATA | December 2023 | June 2024 | Allow | 6 | 0 | 0 | No | No |
| 18533978 | SECURE TOKEN DRIVEN CONDITIONAL ROUTING OF PROCEEDS | December 2023 | April 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18533124 | DIGITAL-ASSET AUTHENTICATION WITH ANONYMITY | December 2023 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18531147 | METHOD AND A SYSTEM FOR A SECURE HIERARCHICAL COMMUNICATION | December 2023 | August 2024 | Allow | 8 | 2 | 0 | Yes | No |
| 18530505 | SYSTEMS AND METHODS FOR DYNAMIC GRANULAR ACCESS PERMISSIONS | December 2023 | November 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18531578 | SECURELY COMMUNICATING DATA BETWEEN AN APPLICATION ASSOCIATED WITH AN ENTITY AND A THIRD-PARTY SYSTEM | December 2023 | July 2024 | Allow | 7 | 2 | 0 | Yes | No |
| 18525146 | SYSTEMS AND METHODS FOR MULTI-FACTOR LOCATION-BASED DEVICE VERIFICATION | November 2023 | July 2024 | Allow | 7 | 0 | 0 | No | No |
| 18521589 | ROW-LEVEL SECURITY | November 2023 | June 2024 | Allow | 7 | 0 | 0 | No | No |
| 18565035 | PASSWORD PROTECTION METHOD AND APPARATUS, AND MEDIUM | November 2023 | December 2024 | Allow | 13 | 1 | 0 | No | No |
| 18517490 | NETWORK DEVICE PROXIMITY-BASED AUTHENTICATION | November 2023 | March 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18512603 | DISCRETE PROCESSOR FEATURE BEHAVIOR COLLECTION | November 2023 | September 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18508861 | NETWORK SECURITY GATEWAY | November 2023 | June 2025 | Allow | 19 | 3 | 1 | Yes | No |
| 18508122 | Authoritative Domain Name System (DNS) Server Responding to DNS Requests With IP Addresses Selected from a Larger Pool Of IP Addresses | November 2023 | November 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18503601 | COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE | November 2023 | June 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18503954 | BLOCKCHAIN APPLICATION METHOD AND BLOCKCHAIN APPLICATION TERMINAL APPARATUS | November 2023 | November 2024 | Abandon | 13 | 2 | 0 | No | No |
| 18503503 | SYSTEMS AND METHODS FOR IDENTIFYING PERSONAL IDENTIFIERS IN CONTENT | November 2023 | January 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18502556 | DATA PROVENANCE TRACKING SERVICE | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18387322 | CYBER SECURITY APPLIANCE FOR AN OPERATIONAL TECHNOLOGY NETWORK | November 2023 | March 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18502181 | SYSTEMS AND METHODS FOR DETECTING INTERCEPTION DEVICES | November 2023 | November 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18500845 | ARTIFICIAL INTELLIGENCE (AI) DRIVEN CLASSIFIER USING DEFINED TAXONOMY FRAMEWORK | November 2023 | April 2024 | Allow | 5 | 1 | 0 | No | No |
| 18385386 | SYSTEM AND METHOD FOR GENERATING AND MANAGING VIRTUAL REALITY IDENTIFICATION ON BASIS OF REAL-WORLD PERSONAL INFORMATION | October 2023 | July 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18497549 | SYSTEMS AND METHODS FOR ENHANCED MOBILE DEVICE AUTHENTICATION | October 2023 | November 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18496831 | SYSTEMS AND METHODS FOR DETECTED-CAPABILITY-BASED AUTHENTICATION OF A MOBILE DEVICE FOR PERFORMING AN ACCESS OPERATION WITH A LOCAL DEVICE | October 2023 | March 2025 | Allow | 16 | 3 | 0 | Yes | Yes |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2439.
With a 34.7% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 32.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2439 is part of Group 2430 in Technology Center 2400. This art unit has examined 7,853 patent applications in our dataset, with an overall allowance rate of 76.1%. Applications typically reach final disposition in approximately 35 months.
Art Unit 2439's allowance rate of 76.1% places it in the 44% percentile among all USPTO art units. This art unit has a below-average allowance rate compared to other art units.
Applications in Art Unit 2439 receive an average of 2.46 office actions before reaching final disposition (in the 90% percentile). The median prosecution time is 35 months (in the 21% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.