Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19265257 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19226046 | SYSTEM AND METHOD FOR SOFTWARE INTEGRATION INTO ENTERPRISE STANDARD CONTROL SYSTEMS USING STANDARDIZED APIs | June 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19205793 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON DEVICE CRITICALITY SCORE AND METHODS OF USE THEREOF | May 2025 | March 2026 | Allow | 10 | 2 | 0 | Yes | No |
| 19122410 | CHAINING MESSAGE AUTHENTICATION CODES | April 2025 | January 2026 | Allow | 9 | 0 | 0 | Yes | No |
| 19089705 | DECENTRALIZED INTEGRATION SOLUTIONS FOR SECURELY CONDUCTING LEGAL TRANSACTIONS AND PROTECTING SENSITIVE DATA | March 2025 | August 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18959552 | ATA SYSTEMS AND METHODS FOR ADVANCED DYNAMIC TRUST STORE MANAGEMENT SYSTEMS | November 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18942118 | MULTIMEDIA CONTAINER FOR PHYSICAL OBJECT AUTHENTICATION AND VERIFICATION OF ATTENDANCE | November 2024 | January 2026 | Abandon | 15 | 3 | 0 | Yes | No |
| 18902634 | SYSTEMS AND METHODS TO PERFORM PHISHING DETECTION AND DEVICE ATTESTATION VIA BROWSER EXTENSION | September 2024 | March 2025 | Allow | 5 | 0 | 1 | Yes | No |
| 18885207 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | September 2024 | April 2025 | Allow | 7 | 0 | 1 | Yes | No |
| 18843974 | METHOD AND APPARATUS FOR DETECTING URL RELATED TO PHISHING SITE USING ARTIFICIAL INTELLIGENCE AND GENERATIVE AI ALGORITHM | September 2024 | March 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18823604 | IMPLEMENTATION OF BIOMETRIC AUTHENTICATION | September 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18820347 | INTEGRATED SECURITY FOR CLOUD APPLICATIONS | August 2024 | December 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18816291 | SECURITY DEVICE COMPUTATION MATCHING | August 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18841847 | METHOD AND SYSTEM FOR DETECTING ANOMALY IN RADIO ACCESS NETWORK | August 2024 | May 2025 | Allow | 9 | 2 | 0 | No | No |
| 18814720 | CIPHERTEXT CONVERSION SYSTEM, CIPHERTEXT CONVERSION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | August 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18814401 | COMMUNICATION METHOD AND COMMUNICATION SYSTEM | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18811402 | SCALABLE SEARCH AND RANKING OF BIOMETRIC SIGNATURES | August 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18808212 | CHECKOUT WITH MAC | August 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18806047 | CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAME | August 2024 | March 2025 | Allow | 7 | 2 | 0 | No | No |
| 18802673 | SYSTEMS AND METHODS FOR CANDIDACY DETERMINATIONS AND REQUEST PROCESSING WHILE MAINTAINING USER DATA ANONYMITY | August 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18800553 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON AUTOMATED KEY TERRAIN IDENTIFICATION AND METHODS OF USE THEREOF | August 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18798314 | MULTI-PARTY COMPUTATION OF SPLIT PRIVATE DATA WITH ADDRESS GEO-CODED COMPONENT | August 2024 | December 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18791780 | PERSONAL AWARENESS SYSTEM AND METHOD FOR PERSONAL SAFETY AND DIGITAL CONTENT SAFETY OF A USER | August 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18787250 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | July 2024 | April 2025 | Allow | 8 | 2 | 0 | No | No |
| 18770236 | PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERS | July 2024 | March 2025 | Allow | 8 | 1 | 0 | No | No |
| 18767037 | METHOD OF OPERATING SECURE PROGRAMMING SYSTEM | July 2024 | January 2026 | Allow | 18 | 1 | 0 | Yes | No |
| 18765860 | Advanced SIP-Based Caller Identification and Voicemail Analysis System for Fraud Prevention in Telecommunications | July 2024 | January 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18766305 | SYSTEM AND METHOD FOR COMPUTER SYSTEM SECURITY AUTHORIZATION INTERFACES | July 2024 | October 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18726435 | METHOD FOR MANAGING A REMOTE SERVER | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18763525 | Intelligent Technical Protocol Based Approach Leveraging AI-ML to Block Vishing Scammers | July 2024 | January 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18761151 | METHOD FOR IDENTIFYING TRUSTED USERS | July 2024 | December 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18754308 | System and Method for Dynamically Encrypting and Ingesting Private Cloud Data into a Hybrid Cloud Based on Data Sensitivity | June 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18751017 | DIGITAL RIGHTS MANAGEMENT SYSTEMS AND METHODS USING EFFICIENT MESSAGING ARCHITECTURES | June 2024 | January 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18744095 | USER MANAGEMENT SYSTEM FOR COMPUTING SUPPORT | June 2024 | January 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18744248 | METHODS AND APPARATUSES FOR IMPLEMENTING HIGH-SPEED CRYPTOGRAPHIC COMPUTATION BASED ON SOFTWARE-HARDWARE COLLABORATION, AND ELECTRONIC DEVICES | June 2024 | January 2025 | Allow | 7 | 1 | 0 | No | No |
| 18718704 | A METHOD FOR MONITORING AN INTEGRITY OF A SYSTEM BY A MONITORING DEVICE, COMPUTER PROGRAM PRODUCT AS WELL AS MONITORING DEVICE | June 2024 | September 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18736505 | INTELLIGENT ANTI-PHISHING MANAGEMENT | June 2024 | August 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18736499 | INTELLIGENT ANTI-PHISHING MANAGEMENT | June 2024 | August 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18674385 | ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE | May 2024 | November 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18670919 | SIGNCRYPTED ENVELOPE MESSAGE | May 2024 | July 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18670367 | PHYSICALLY UNCLONABLE FUNCTION (PUF) GENERATION | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18668612 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS USING RISK FACTORS | May 2024 | November 2024 | Allow | 6 | 1 | 0 | No | No |
| 18657317 | Electronic Messaging System for Mobile Devices with Reduced Traceability of Electronic Messages | May 2024 | June 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18654782 | TOKEN PROCESSING SYSTEM AND METHOD | May 2024 | May 2025 | Allow | 12 | 1 | 1 | Yes | No |
| 18652281 | Decentralized Techniques for Verification of Data in Transport Layer Security and other Contexts | May 2024 | May 2025 | Abandon | 12 | 1 | 0 | No | No |
| 18651423 | Dynamic Detection for Mobile Device Security | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18647427 | SYSTEM AND METHOD FOR CLASSIFYING A USER FOR DETECTING PHISHING ATTACKS | April 2024 | July 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18647943 | Systems and Methods for a Cryptographic File System Layer | April 2024 | November 2025 | Allow | 19 | 1 | 0 | No | No |
| 18644669 | METHOD AND SYSTEM FOR DETECTING A CHANGE IN MEMORY | April 2024 | August 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18643030 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR AUTHENTICATING DEVICES WITH DEVICE AUTHENTICATION IDENTIFIERS | April 2024 | February 2026 | Allow | 22 | 4 | 0 | Yes | No |
| 18643631 | HOMOMORPHIC ENCRYPTION ARITHMETIC DEVICE AND OPERATING METHOD THEREOF | April 2024 | August 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18640446 | END-POINT MEDIA WATERMARKING | April 2024 | December 2024 | Allow | 8 | 0 | 0 | No | No |
| 18702684 | COMPUTER PROCESSING SYSTEM AND METHOD CONFIGURED TO EFFECTUATE LOWER-ORDER MASKING IN A HIGHER-ORDER MASKED DESIGN | April 2024 | August 2024 | Allow | 4 | 0 | 0 | No | No |
| 18632778 | SECRET SEARCH SYSTEM, SECRET SEARCH METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | April 2024 | September 2025 | Allow | 17 | 0 | 0 | No | No |
| 18699648 | METHOD AND DEVICE FOR AUTHENTICATING A MOTOR VEHICLE AT A HYDROGEN FUEL PUMP | April 2024 | January 2026 | Allow | 21 | 1 | 0 | No | No |
| 18630339 | HOME NETWORK SYSTEM BLOCKING UNAUTHORIZED DEVICE AND METHOD OF BLOCKING UNAUTHORIZED DEVICE IN HOME NETWORK SYSTEM | April 2024 | August 2025 | Allow | 16 | 0 | 0 | No | No |
| 18629283 | NESTED BLOCKCHAIN SYSTEM | April 2024 | January 2026 | Allow | 22 | 1 | 0 | No | No |
| 18627845 | FAST JOINS AND LOW MEMORY USAGE FOR END-TO-END (E2E)-SECURE APPLICATIONS USING LIGHT MLS CLIENTS | April 2024 | February 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18626441 | CORE NETWORK ELEMENT, ACCESS-NETWORK DEVICE, AND TERMINAL DEVICE | April 2024 | March 2026 | Allow | 23 | 0 | 0 | No | No |
| 18627243 | Method and System of Securing VPN Communications | April 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18626304 | SYSTEMS AND METHODS FOR SELECTIVE DECRYPTION OF ENCRYPTED DATA PACKETS | April 2024 | August 2025 | Allow | 16 | 0 | 0 | No | No |
| 18626174 | Secure Content Management Through Authentication | April 2024 | November 2025 | Allow | 20 | 2 | 0 | No | No |
| 18625809 | METHOD AND SYSTEM FOR MANAGING PERIPHERAL DEVICE FUNCTIONS USING MANIFEST FILES | April 2024 | February 2026 | Allow | 23 | 1 | 0 | No | No |
| 18625154 | PROVISION OF A LEASE FOR STREAMING CONTENT | April 2024 | March 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18623916 | SYSTEMS AND METHODS FOR MANAGING DEVICE ASSOCIATION | April 2024 | September 2025 | Allow | 18 | 2 | 0 | Yes | No |
| 18621689 | COMMUNICATION DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE, AND METHOD EXECUTED BY COMMUNICATION DEVICE FOR AUTHENTICATION | March 2024 | November 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18697423 | METHOD AND SYSTEM FOR PROCESSING FULL-STACK NETWORK CARD TASK BASED ON FPGA | March 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18622516 | Methods And Systems For Memory Tracing In Asset Managing Systems | March 2024 | July 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18621079 | TRAINING TRUSTED USERS OF AN ENTERPRISE NETWORK FOR PHISHING ATTACKS ON A PER-USER BASIS | March 2024 | November 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18696628 | METHOD AND APPARATUS FOR PREVENTING PROCESSING BY SECURITY PROCESSOR FROM BEING INTERRUPTED | March 2024 | July 2025 | Allow | 16 | 0 | 0 | No | No |
| 18696841 | ROUND OPTIMAL OBLIVIOUS TRANSFERS FROM ISOGENIES | March 2024 | November 2025 | Allow | 20 | 0 | 1 | No | No |
| 18696069 | CERTIFICATE SCHEMAS FOR PUBLIC KEY CERTIFICATES | March 2024 | February 2026 | Allow | 23 | 2 | 0 | No | No |
| 18617953 | DETECTION OF SUSPICIOUS OBJECTS IN CUSTOMER PREMISES EQUIPMENT (CPE) | March 2024 | December 2025 | Abandon | 20 | 2 | 0 | No | No |
| 18613700 | SYSTEM AND METHOD FOR PROVIDING SECURED CAN COMMUNICATIONS | March 2024 | March 2026 | Allow | 23 | 2 | 0 | Yes | No |
| 18694058 | BACKDOOR DETECTION DEVICE, BACKDOOR DETECTION METHOD, AND RECORDING MEDIUM | March 2024 | February 2026 | Abandon | 23 | 1 | 0 | No | No |
| 18607463 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | March 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18607012 | Function Execution Device and Communication Terminal | March 2024 | August 2025 | Allow | 17 | 3 | 0 | Yes | No |
| 18605351 | SYSTEMS AND METHODS FOR RESTRICTED RESOURCE ACCESS MANAGEMENT | March 2024 | October 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18603564 | Fast Polynomial Evaluation Under Fully Homomorphic Encryption by Products of Differences from Roots Using Rotations | March 2024 | December 2025 | Allow | 21 | 1 | 0 | Yes | No |
| 18604174 | TECHNIQUES FOR SECURELY COMMUNICATING SENSITIVE DATA FOR DISPARATE DATA MESSAGES | March 2024 | September 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18600727 | COMPLEX IT PROCESS ANNOTATION, TRACING, ANALYSIS, AND SIMULATION | March 2024 | October 2025 | Allow | 19 | 0 | 0 | No | No |
| 18599669 | Artificial Reality Encryption and Decryption | March 2024 | April 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18598654 | METHOD,APPARATUS,STORAGE MEDIUM AND ELECTRONIC DEVICE FOR NETWORK AUTHENTICATION | March 2024 | November 2025 | Allow | 20 | 1 | 0 | No | No |
| 18595462 | CREATING SIMULATION MODELS FOR COMPLEX ADAPTIVE SYSTEMS USING A MULTI-MODEL, GENERATIVE APPROACH | March 2024 | October 2025 | Allow | 20 | 1 | 0 | No | No |
| 18595449 | MODELING MULTI-PERIL CATASTROPHE USING A DISTRIBUTED SIMULATION ENGINE | March 2024 | October 2025 | Allow | 19 | 0 | 0 | No | No |
| 18594727 | System and Method for Multi-PHY based MACsec over Secure Tunnels | March 2024 | July 2025 | Allow | 16 | 0 | 0 | No | No |
| 18594374 | SELECTING BETWEEN RAY TRACING AND NON-RAY TRACING CHANNEL MODELS FOR POSITIONING | March 2024 | February 2026 | Allow | 24 | 0 | 0 | No | No |
| 18592170 | METHODS AND SYSTEMS FOR PROVIDING NETWORK CONNECTIVITY TO A SECURE ACCESS SERVICE EDGE (SASE) DOMAIN VIA AN ISP | February 2024 | January 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18592333 | SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTION | February 2024 | May 2025 | Allow | 15 | 1 | 0 | No | No |
| 18585880 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | February 2024 | March 2026 | Allow | 25 | 1 | 0 | No | No |
| 18585274 | MULTI-VENDOR WEB SECURITY CONTROL INTEGRATION AND MANAGEMENT PLATFORM | February 2024 | January 2026 | Allow | 23 | 1 | 0 | No | No |
| 18585545 | Tying Access/Redaction to Authentication Levels | February 2024 | January 2026 | Allow | 23 | 2 | 0 | Yes | No |
| 18584839 | METHOD AND SYSTEM OF AUTOMATING AUTHENTICATION AND AUTHORIZATION IN INDUSTRIAL CONTROL SYSTEM OFFLINE ENVIRONMENT | February 2024 | February 2026 | Abandon | 24 | 1 | 0 | No | No |
| 18585017 | SYSTEMS AND METHODS FOR REMOTE SERVER AUTHENTICATION OF PHYSICAL ACCESS TOKENS | February 2024 | April 2024 | Allow | 2 | 0 | 0 | No | No |
| 18582051 | Blocking of Exfiltration Events via Browser Extensions | February 2024 | October 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18685212 | OPERATING METHOD FOR DATABASE AND FULLY ENCRYPTED DATABASE | February 2024 | September 2025 | Allow | 18 | 0 | 0 | No | No |
| 18443591 | SYSTEMS AND METHODS FOR CANDIDACY DETERMINATIONS AND REQUEST PROCESSING WHILE MAINTAINING USER DATA ANONYMITY | February 2024 | May 2024 | Allow | 3 | 0 | 0 | No | No |
| 18443976 | SYNTHETIC REQUEST INJECTION FOR REAL-TIME CLOUD SECURITY POSTURE MANAGEMENT | February 2024 | June 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18444005 | SIGNAL STRENGTH BASED POSITIONING WITH CARRIER FREQUENCY INFORMATION | February 2024 | January 2026 | Allow | 23 | 0 | 0 | No | No |
| 18442614 | MEDICAL IMPLANT SOFTWARE SYSTEMS AND METHODS | February 2024 | October 2024 | Allow | 8 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2492.
With a 26.9% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 31.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2492 is part of Group 2490 in Technology Center 2400. This art unit has examined 6,892 patent applications in our dataset, with an overall allowance rate of 78.6%. Applications typically reach final disposition in approximately 32 months.
Art Unit 2492's allowance rate of 78.6% places it in the 56% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2492 receive an average of 2.25 office actions before reaching final disposition (in the 76% percentile). The median prosecution time is 32 months (in the 43% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.