Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19307235 | RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTURE | August 2025 | March 2026 | Allow | 7 | 1 | 0 | No | No |
| 19287749 | CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING OFFLINE STORAGE | July 2025 | October 2025 | Allow | 2 | 0 | 0 | No | No |
| 19270726 | SYSTEM AND METHOD FOR DYNAMIC MULTI-PARTY VERIFICATION OF GENERATIVE ARITIFICIAL INTELLIGENCE SYSTEMS | July 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19104658 | METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM FOR DATA PROCESSING | February 2025 | November 2025 | Allow | 9 | 0 | 0 | No | No |
| 19027830 | RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTURE | January 2025 | June 2025 | Allow | 5 | 1 | 0 | No | No |
| 18922825 | Nested Permissions Policy Generation | October 2024 | January 2026 | Allow | 15 | 0 | 0 | No | No |
| 18902633 | Penetration Testing in Zero Trust Network Environment | September 2024 | March 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18901801 | AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTION | September 2024 | March 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18887282 | SYSTEM AND METHOD FOR CLASSIFICATION OF NORMAL ENCRYPTED NETWORK TRAFFIC AND TRANSPORT LAYER SECURITY (TLS)-BASED VIRTUAL PRIVATE NETWORK TRAFFIC | September 2024 | December 2025 | Allow | 15 | 0 | 0 | No | No |
| 18887372 | SESSION ANALYSIS FOR IDENTITY THREAT DETECTION AND IDENTITY SECURITY POSTURE MANAGEMENT | September 2024 | February 2026 | Allow | 17 | 0 | 0 | No | No |
| 18826238 | SYSTEM AND INFORMATION PROCESSING METHOD | September 2024 | March 2026 | Allow | 18 | 1 | 0 | Yes | No |
| 18822686 | SYSTEMS AND METHODS FOR SECURE ONLINE CREDENTIAL AUTHENTICATION | September 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18816682 | METHOD BY WHICH DEVICE SHARES DIGITAL KEY | August 2024 | March 2026 | Allow | 18 | 0 | 0 | No | No |
| 18815246 | ANONYMOUS EVENT ATTESTATION | August 2024 | February 2026 | Allow | 18 | 0 | 0 | No | No |
| 18808789 | Systems and Methods for Graph-Based Access Control | August 2024 | January 2026 | Allow | 17 | 0 | 0 | No | No |
| 18807395 | DATA PROCESSING METHOD AND DEVICE BASED ON HOMOMORPHIC ENCRYPTION | August 2024 | January 2026 | Allow | 17 | 0 | 0 | No | No |
| 18787403 | SYSTEMS AND METHODS FOR AUTOMATED REFERRAL WITH CONCURRENT INFORMATION TRANSMISSION | July 2024 | May 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 18767929 | METHODS FOR REVALIDATING FQDN RULESETS IN A FIREWALL | July 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18757651 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM | June 2024 | May 2025 | Allow | 10 | 1 | 0 | No | No |
| 18759353 | METHOD AND SYSTEM FOR WATERMARKING A USB PD PROTOCOL HARDWARE SUB-SYSTEM | June 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18754170 | SYSTEM AND METHOD FOR PROVIDING FLEET CYBER-SECURITY | June 2024 | March 2026 | Allow | 21 | 2 | 0 | No | No |
| 18752742 | BACK LIGHT CORRECTING DEVICE, METHOD OF OPERATING BACK LIGHT CORRECTING DEVICE, PROGRAM OF OPERATING BACK LIGHT CORRECTING DEVICE, AND IMAGING APPARATUS | June 2024 | March 2026 | Allow | 21 | 1 | 0 | No | No |
| 18749199 | PRIVACY-PRESERVING DATA COLLECTING | June 2024 | May 2025 | Allow | 11 | 1 | 0 | No | No |
| 18745138 | SECURE VSAN CLUSTER USING DEVICE AUTHENTICATION AND INTEGRITY MEASUREMENTS | June 2024 | July 2025 | Allow | 13 | 2 | 0 | No | No |
| 18741634 | SECURE AUTHENTICATION FOR ACCESSING REMOTE RESOURCES | June 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18718764 | FILE SHARING METHOD AND SYSTEM, ELECTRONIC DEVICE AND READABLE STORAGE MEDIUM | June 2024 | October 2024 | Allow | 4 | 0 | 0 | No | No |
| 18738985 | SYSTEM AND METHOD FOR DECENTRALIZED DATA MANAGEMENT AND DYNAMIC VERIFICATION, VALUATION, AND MONETIZATION OF DATA QUERIES | June 2024 | August 2024 | Allow | 2 | 0 | 0 | No | No |
| 18716369 | AES CRYPTOGRAPHIC SYSTEM AND METHOD | June 2024 | March 2026 | Abandon | 21 | 1 | 0 | No | No |
| 18680087 | ELECTRONIC ACCESS CONTROL SYSTEM | May 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18680373 | SYSTEMS AND METHOD OF CYBER-MONITORING WHICH UTILIZES A KNOWLEDGE DATABASE | May 2024 | September 2025 | Abandon | 16 | 1 | 0 | No | No |
| 18713805 | SECURITY COUNTERMEASURE PLANNING SYSTEM, SECURITY COUNTERMEASURE PLANNING METHOD, AND PROGRAM | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18671378 | THREAT ANALYSIS APPARATUS, THREAT ANALYSIS METHOD, AND RECORDING MEDIUM | May 2024 | November 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18670221 | ENCRYPTION PROCESSING APPARATUS AND ENCRYPTION PROCESSING METHOD | May 2024 | January 2026 | Allow | 20 | 1 | 0 | No | No |
| 18668671 | METHOD AND SYSTEM FOR DETECTION OF PHISHING EMAILS AND SUSPECT MALICIOUS EXECUTABLE HYPERLINKS | May 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18666236 | DIGITAL ASSET MANAGEMENT | May 2024 | December 2025 | Allow | 19 | 1 | 0 | No | No |
| 18663192 | SYSTEMS AND METHODS FOR FIRMWARE PASSWORD MANAGEMENT | May 2024 | February 2026 | Allow | 21 | 0 | 0 | No | No |
| 18664064 | LEDGER-BASED VALIDATION AND RE-ENCODING OF DIGITAL MEDIA | May 2024 | April 2025 | Allow | 11 | 2 | 0 | No | No |
| 18661295 | Cyberanalysis Workflow Acceleration | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18657862 | HIERARCHICALLY CONFIGURED INTERCONNECT-BASED ACCESS MECHANISM | May 2024 | November 2025 | Allow | 18 | 0 | 1 | Yes | No |
| 18658512 | ENCRYPTION PROCESSING APPARATUS AND ENCRYPTION PROCESSING METHOD | May 2024 | February 2026 | Allow | 21 | 0 | 0 | No | No |
| 18706249 | METHOD FOR QUANTUM-SECURED COMMUNICATION | April 2024 | January 2026 | Allow | 21 | 1 | 0 | No | No |
| 18646690 | LIFECYCLE ADMINISTRATION OF DOMAIN NAME BLOCKCHAIN ADDRESSES | April 2024 | January 2026 | Allow | 21 | 1 | 0 | No | No |
| 18644508 | System, Method, and Computer Program Product for Patient Authentication and Identity Risk Assessment | April 2024 | December 2025 | Allow | 20 | 0 | 0 | No | No |
| 18641585 | AUTHENTICATION OF A RADIO COMMUNICATION DEVICE TO A NETWORK | April 2024 | July 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18639173 | IDENTITY EXPERIENCE FRAMEWORK | April 2024 | August 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18639241 | RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTURE | April 2024 | November 2024 | Allow | 7 | 0 | 0 | No | No |
| 18638905 | Multi-Tiered Data Security and Auditing System | April 2024 | October 2025 | Allow | 18 | 0 | 0 | No | No |
| 18702071 | APPARATUS AND METHOD FOR CIPHERTEXT COMPARISON CAPABLE OF PREVENTING SIDE CHANNEL ATTACK | April 2024 | November 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18637855 | USER INTERFACE FOR MANAGING EFFECTIVE PERMISSIONS ON A GRAPH DATABASE | April 2024 | October 2025 | Allow | 18 | 0 | 0 | No | No |
| 18636319 | INFORMATION PROCESSING APPARATUS, SERVICE PROVIDING SYSTEM, AND METHOD TO MODIFY A LICENSE BASED ON USAGE | April 2024 | March 2026 | Allow | 23 | 1 | 0 | No | No |
| 18635433 | MANAGEMENT CONTROLLER RESOURCE USAGE BY A SECURITY PROCESSOR | April 2024 | March 2026 | Allow | 23 | 1 | 0 | No | No |
| 18631299 | AUXILIARY DEVICE AUTHENTICATION SYSTEM AND METHOD | April 2024 | August 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18627192 | PROVISIONING TRUSTED EXECUTION ENVIRONMENT(S) BASED ON CHAIN OF TRUST INCLUDING PLATFORM | April 2024 | July 2025 | Allow | 16 | 0 | 1 | No | No |
| 18627148 | RETROSPECTIVE MEMORY ANALYSIS | April 2024 | January 2026 | Allow | 22 | 2 | 0 | No | No |
| 18623850 | METHOD AND SYSTEM FOR DETERMINING AND ACTING ON A STRUCTURED DOCUMENT CYBER THREAT RISK | April 2024 | February 2026 | Allow | 23 | 2 | 0 | Yes | No |
| 18619659 | MANAGING KEY ROTATION FOR ENDPOINT DEVICES USING RE-KEYING RULES | March 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18620303 | ADAPTIVE DETECTION OF SECURITY THREATS THROUGH TRAINING OF COMPUTER-IMPLEMENTED MODELS | March 2024 | August 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18613112 | MULTI-STEP APPROACH FOR RANSOMWARE DETECTION | March 2024 | April 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18612164 | SYSTEMS AND METHODS FOR IMAGE PREPROCESSING AND SEGMENTATION FOR VISUAL DATA PRIVACY | March 2024 | September 2025 | Allow | 18 | 1 | 0 | No | No |
| 18609904 | MULTI-LEVEL SECURITY ANALYSIS AND INTERMEDIATE DELIVERY OF AN ELECTRONIC MESSAGE | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18610045 | SECURE RE-USE OF PRIVATE KEY FOR DYNAMIC GROUP OF NODES | March 2024 | November 2025 | Allow | 20 | 0 | 0 | No | No |
| 18609298 | DOMAIN SQUATTING DETECTION | March 2024 | March 2025 | Allow | 12 | 1 | 0 | No | No |
| 18608860 | SYSTEM AND METHOD FOR COST MANAGEMENT USING BLOCKCHAIN AND ENCRYPTION | March 2024 | November 2025 | Allow | 20 | 0 | 0 | No | No |
| 18607838 | Quantum vault for protecting secrets against quantum computing | March 2024 | March 2026 | Allow | 24 | 1 | 0 | Yes | No |
| 18605680 | SCALABLE ASSURED DELETE WITH AONT | March 2024 | August 2025 | Allow | 17 | 0 | 0 | No | No |
| 18605239 | Physical Environment Based Account Authentication | March 2024 | January 2025 | Allow | 11 | 1 | 0 | No | No |
| 18601498 | Consumer Choice for Broadband Application and Content Services | March 2024 | March 2025 | Allow | 12 | 1 | 0 | No | No |
| 18600739 | ELECTRONIC SYSTEM FOR PREDICTING, DETECTING, AND PREVENTING UNAUTHORIZED ACCESS EVENTS ASSOCIATED WITH ELECTRONIC SYSTEMS | March 2024 | January 2025 | Allow | 11 | 1 | 0 | No | No |
| 18599430 | COMMUNICATION DEVICE, COMPUTER-READABLE STORAGE MEDIUM, AND METHOD FOR USING APPROPRIATE ACCESS CONTROL METHOD | March 2024 | March 2026 | Allow | 24 | 1 | 1 | Yes | No |
| 18600377 | Information security system and method for denial-of-service detection | March 2024 | November 2024 | Allow | 9 | 1 | 0 | No | No |
| 18597512 | SYSTEMS AND METHODS FOR SUPPORT OF SECURITY FOR SIDELINK COMMUNICATION AND POSITIONING | March 2024 | February 2026 | Allow | 24 | 1 | 0 | Yes | No |
| 18592679 | Systems and Methods for Passwordless Logon | March 2024 | August 2025 | Allow | 17 | 0 | 0 | No | No |
| 18688531 | METHOD AND SYSTEM FOR VALIDATING A DIGITAL CONTENT | March 2024 | November 2025 | Allow | 20 | 0 | 0 | No | No |
| 18591554 | DETERMINING A PHYSICALLY UNCLONABLE FUNCTION (PUF) SELECTION VECTOR | February 2024 | October 2025 | Allow | 20 | 0 | 0 | No | No |
| 18591669 | USER AND GROUP SPECIFIC THREAT PROTECTION SYSTEM AND METHOD | February 2024 | June 2025 | Allow | 15 | 2 | 0 | No | No |
| 18589792 | AUTOMATED BOT BLOCKING | February 2024 | December 2024 | Allow | 10 | 1 | 0 | No | No |
| 18590412 | EXTERNAL MULTI-CHANNEL COMMUNICATION MODULARIZATION, ROUTING, TRANSMISSION, AND ACCESS CONTROL IN A DATABASE SYSTEM | February 2024 | November 2025 | Allow | 21 | 1 | 0 | Yes | No |
| 18588077 | PASSWORD SIMILARITY CHECKING USING HOMOMORPHIC ENCRYPTION OPERATIONS | February 2024 | January 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18586778 | COMPUTER-BASED SYSTEMS CONFIGURED FOR DETECTING AND SANDBOXING EXTERNAL RESOURCES AND METHODS OF USE THEREOF | February 2024 | January 2025 | Allow | 11 | 1 | 0 | No | No |
| 18581754 | SYNTHETIC AND VARIABLE DEVICE IDENTIFICATIONS | February 2024 | April 2025 | Allow | 14 | 1 | 0 | No | No |
| 18443454 | SECURE COMPONENT VERIFICATION USING NFC | February 2024 | November 2025 | Allow | 21 | 1 | 0 | Yes | No |
| 18444428 | VISUAL AND AUDIO OUTPUT AUTHENTICATION IN AVATAR SYSTEMS | February 2024 | January 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18441218 | METHODS, DEVICES AND SYSTEMS FOR REPEATING SECURE WIRELESS CONNECTIONS | February 2024 | January 2026 | Allow | 23 | 1 | 0 | No | No |
| 18441414 | ANALYZING ENCRYPTED TRAFFIC BEHAVIOR USING CONTEXTUAL TRAFFIC DATA | February 2024 | March 2026 | Allow | 25 | 3 | 0 | Yes | No |
| 18440743 | SYSTEM AND METHOD FOR AN EGRESS WEB GATEWAY TO REGULATE AI APPLICATION QUERIES | February 2024 | March 2026 | Allow | 25 | 1 | 1 | Yes | No |
| 18439782 | MEMBERSHIP INFERENCE ATTACKS USING MULTIPLE SPECIALIZED MACHINE LEARNING MODELS | February 2024 | January 2026 | Allow | 23 | 0 | 0 | No | No |
| 18439860 | ELEVATED DEVICE AUTHENTICATION THROUGH MUTUAL IDENTIFICATION | February 2024 | December 2025 | Allow | 22 | 1 | 0 | No | No |
| 18440917 | DETECTION OF PERSONALLY IDENTIFIABLE INFORMATION | February 2024 | April 2025 | Allow | 14 | 1 | 0 | No | No |
| 18438962 | USER BASED THREAT RESPONSE RECOMMENDATIONS | February 2024 | September 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18439655 | SYSTEM FOR SECURE CHANNEL SELECTION FOR MULTI-FACTOR AUTHENTICATION USING NON-FUNGIBLE ELECTRONIC RESOURCES | February 2024 | November 2024 | Allow | 9 | 1 | 0 | No | No |
| 18438197 | METHOD OF CONSORTIUM HASHING | February 2024 | July 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18438053 | Blockchain Index Tracking | February 2024 | May 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18436471 | USER ACCESS GROUP DISCOVERY | February 2024 | January 2026 | Allow | 23 | 1 | 0 | No | No |
| 18433869 | Cryptographic System Real-Time Test Vector Leakage Assessment | February 2024 | July 2025 | Allow | 18 | 0 | 0 | No | No |
| 18432879 | AUTOMORPHIC TRANSFORMATIONS OF SIGNAL SAMPLES WITHIN A TRANSMITTER OR RECEIVER | February 2024 | September 2024 | Allow | 7 | 0 | 0 | No | No |
| 18430950 | METHODS AND APPARATUS FOR AMBIENT COMPUTING | February 2024 | October 2025 | Allow | 21 | 0 | 1 | Yes | No |
| 18431059 | DISTINGUISHING BETWEEN FUNCTIONAL TRACKING DOMAINS AND NONFUNCTIONAL TRACKING DOMAINS ON A HOST WEB PAGE | February 2024 | August 2024 | Allow | 7 | 0 | 0 | No | No |
| 18424854 | DETERMINING A COMMON SECRET FOR THE SECURE EXCHANGE OF INFORMATION AND HIERARCHICAL, DETERMINISTIC CRYPTOGRAPHIC KEYS | January 2024 | July 2025 | Allow | 17 | 1 | 0 | No | No |
| 18423905 | Data Center Monitoring And Management Operation Including Configuration For Customer Sensitive Data | January 2024 | November 2025 | Allow | 22 | 2 | 0 | Yes | No |
| 18420897 | FULLY HOMOMORPHIC ENCRYPTION AND DECRYPTION APPARATUS AND METHOD FOR OPERATING THE SAME | January 2024 | May 2024 | Allow | 4 | 0 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2491.
With a 26.5% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 29.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2491 is part of Group 2490 in Technology Center 2400. This art unit has examined 6,598 patent applications in our dataset, with an overall allowance rate of 73.3%. Applications typically reach final disposition in approximately 33 months.
Art Unit 2491's allowance rate of 73.3% places it in the 40% percentile among all USPTO art units. This art unit has a below-average allowance rate compared to other art units.
Applications in Art Unit 2491 receive an average of 2.39 office actions before reaching final disposition (in the 83% percentile). The median prosecution time is 33 months (in the 38% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.