Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18902634 | SYSTEMS AND METHODS TO PERFORM PHISHING DETECTION AND DEVICE ATTESTATION VIA BROWSER EXTENSION | September 2024 | March 2025 | Allow | 5 | 0 | 1 | Yes | No |
| 18885207 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | September 2024 | April 2025 | Allow | 7 | 0 | 1 | Yes | No |
| 18843974 | METHOD AND APPARATUS FOR DETECTING URL RELATED TO PHISHING SITE USING ARTIFICIAL INTELLIGENCE AND GENERATIVE AI ALGORITHM | September 2024 | March 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18820347 | INTEGRATED SECURITY FOR CLOUD APPLICATIONS | August 2024 | December 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18841847 | METHOD AND SYSTEM FOR DETECTING ANOMALY IN RADIO ACCESS NETWORK | August 2024 | May 2025 | Allow | 9 | 2 | 0 | No | No |
| 18806047 | CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAME | August 2024 | March 2025 | Allow | 7 | 2 | 0 | No | No |
| 18802673 | SYSTEMS AND METHODS FOR CANDIDACY DETERMINATIONS AND REQUEST PROCESSING WHILE MAINTAINING USER DATA ANONYMITY | August 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18800553 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON AUTOMATED KEY TERRAIN IDENTIFICATION AND METHODS OF USE THEREOF | August 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18787250 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | July 2024 | April 2025 | Allow | 8 | 2 | 0 | No | No |
| 18770236 | PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERS | July 2024 | March 2025 | Allow | 8 | 1 | 0 | No | No |
| 18751017 | DIGITAL RIGHTS MANAGEMENT SYSTEMS AND METHODS USING EFFICIENT MESSAGING ARCHITECTURES | June 2024 | January 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18744095 | USER MANAGEMENT SYSTEM FOR COMPUTING SUPPORT | June 2024 | January 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18744248 | METHODS AND APPARATUSES FOR IMPLEMENTING HIGH-SPEED CRYPTOGRAPHIC COMPUTATION BASED ON SOFTWARE-HARDWARE COLLABORATION, AND ELECTRONIC DEVICES | June 2024 | January 2025 | Allow | 7 | 1 | 0 | No | No |
| 18736505 | INTELLIGENT ANTI-PHISHING MANAGEMENT | June 2024 | August 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18736499 | INTELLIGENT ANTI-PHISHING MANAGEMENT | June 2024 | August 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18668612 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS USING RISK FACTORS | May 2024 | November 2024 | Allow | 6 | 1 | 0 | No | No |
| 18657317 | Electronic Messaging System for Mobile Devices with Reduced Traceability of Electronic Messages | May 2024 | June 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18654782 | TOKEN PROCESSING SYSTEM AND METHOD | May 2024 | May 2025 | Allow | 12 | 1 | 1 | Yes | No |
| 18652281 | Decentralized Techniques for Verification of Data in Transport Layer Security and other Contexts | May 2024 | May 2025 | Abandon | 12 | 1 | 0 | No | No |
| 18647427 | SYSTEM AND METHOD FOR CLASSIFYING A USER FOR DETECTING PHISHING ATTACKS | April 2024 | July 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18640446 | END-POINT MEDIA WATERMARKING | April 2024 | December 2024 | Allow | 8 | 0 | 0 | No | No |
| 18702684 | COMPUTER PROCESSING SYSTEM AND METHOD CONFIGURED TO EFFECTUATE LOWER-ORDER MASKING IN A HIGHER-ORDER MASKED DESIGN | April 2024 | August 2024 | Allow | 4 | 0 | 0 | No | No |
| 18627243 | Method and System of Securing VPN Communications | April 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18625154 | PROVISION OF A LEASE FOR STREAMING CONTENT | April 2024 | March 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18697423 | METHOD AND SYSTEM FOR PROCESSING FULL-STACK NETWORK CARD TASK BASED ON FPGA | March 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18607463 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | March 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18599669 | Artificial Reality Encryption and Decryption | March 2024 | April 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18592333 | SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTION | February 2024 | May 2025 | Allow | 15 | 1 | 0 | No | No |
| 18585017 | SYSTEMS AND METHODS FOR REMOTE SERVER AUTHENTICATION OF PHYSICAL ACCESS TOKENS | February 2024 | April 2024 | Allow | 2 | 0 | 0 | No | No |
| 18443591 | SYSTEMS AND METHODS FOR CANDIDACY DETERMINATIONS AND REQUEST PROCESSING WHILE MAINTAINING USER DATA ANONYMITY | February 2024 | May 2024 | Allow | 3 | 0 | 0 | No | No |
| 18443976 | SYNTHETIC REQUEST INJECTION FOR REAL-TIME CLOUD SECURITY POSTURE MANAGEMENT | February 2024 | June 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18442614 | MEDICAL IMPLANT SOFTWARE SYSTEMS AND METHODS | February 2024 | October 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18435114 | Generating Simulated Spear Phishing Messages and Customized Cybersecurity Training Modules Using Machine Learning | February 2024 | June 2025 | Allow | 16 | 1 | 0 | No | No |
| 18434537 | QUANTUM PHENOMENON-BASED OBFUSCATION OF MEMORY | February 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18429740 | SYSTEMS AND METHODS FOR BLOCKCHAIN WALLET OWNER VERIFICATION AND ACCESS MANAGEMENT | February 2024 | May 2024 | Allow | 3 | 1 | 0 | Yes | No |
| 18421006 | IMPLEMENTING DECOYS IN A NETWORK ENVIRONMENT | January 2024 | February 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18421790 | SYSTEM AND METHOD FOR DETECTING PHISHING ATTACKS IN SMS COMMUNICATIONS | January 2024 | April 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18419534 | Method and System for Forensic Data Tracking | January 2024 | April 2025 | Allow | 15 | 1 | 0 | No | No |
| 18418086 | SYSTEMS AND METHODS FOR DIGITAL DATA MANAGEMENT INCLUDING CREATION OF STORAGE LOCATION WITH STORAGE ACCESS ID | January 2024 | April 2024 | Allow | 3 | 0 | 0 | No | No |
| 18412353 | CONFIGURABLE NETWORK SECURITY FOR NETWORKED ENERGY RESOURCES, AND ASSOCIATED SYSTEMS AND METHODS | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18405738 | Secure Multi-Party Reach and Frequency Estimation | January 2024 | May 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18576729 | SYSTEM AND METHODS FOR DATA SECURITY USING DISTANCE MEASUREMENT | January 2024 | June 2024 | Allow | 5 | 0 | 0 | No | No |
| 18390744 | MECHANISM TO PROVIDE CUSTOMER VCN NETWORK ENCRYPTION USING CUSTOMER-MANAGED KEYS IN NETWORK VIRTUALIZATION DEVICE | December 2023 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18541887 | SECURITY CAPSULE FOR ENABLING RESTRICTED FEATURES OF A MEMORY DEVICE | December 2023 | March 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18541860 | PROTECTION OF A TRANSACTION IN NEAR-FIELD COMMUNICATIONS | December 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18538896 | DIGITAL INSTANT ISSUANCE WITH INSTANT PROCESSING | December 2023 | April 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18518343 | SYSTEMS AND METHODS TO PERFORM END TO END ENCRYPTION | November 2023 | February 2024 | Allow | 3 | 0 | 0 | No | No |
| 18514095 | USER DATA MANAGEMENT METHOD AND RELATED DEVICE | November 2023 | May 2025 | Allow | 18 | 0 | 0 | No | No |
| 18511465 | PREVENTING DATA MANIPULATION AND PROTECTING USER PRIVACY IN TELECOMMUNICATION NETWORK MEASUREMENTS | November 2023 | February 2025 | Allow | 15 | 2 | 0 | No | No |
| 18506475 | INTELLIGENT ANTI-PHISHING MANAGEMENT | November 2023 | May 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18506495 | INTELLIGENT ANTI-PHISHING MANAGEMENT | November 2023 | May 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18506960 | MANAGEMENT OF NETWORK INTERCEPT PORTALS FOR NETWORK DEVICES WITH DURABLE AND NON-DURABLE IDENTIFIERS | November 2023 | September 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18503771 | INFORMATION SECURITY SYSTEM AND METHOD FOR PHISHING WEBSITE IDENTIFICATION BASED ON IMAGE HASHING | November 2023 | March 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18502673 | A TRANSFORMED PARTIAL CONVOLUTION ALGORITHM FOR COMPOSITION DETERMINATION | November 2023 | June 2025 | Allow | 19 | 0 | 0 | No | No |
| 18386953 | ELECTRONIC SYSTEM FOR IDENTIFYING FAULTY CODE AND VULNERABILITIES IN SOFTWARE PROGRAMS USING LINKED EVALUATION TOOLS | November 2023 | June 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18386341 | SYSTEMS AND METHODS OF KEY SELECTION FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | November 2023 | April 2025 | Allow | 17 | 1 | 0 | No | No |
| 18385854 | SYSTEMS AND METHODS FOR DIGITAL DATA MANAGEMENT INCLUDING CREATION OF STORAGE LOCATION WITH STORAGE ACESS ID | October 2023 | February 2024 | Allow | 3 | 0 | 1 | No | No |
| 18495557 | CRYPTOGRAPHIC HASH CHAIN FOR VEHICLE CONFIGURATION VERIFICATION | October 2023 | November 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18495429 | NETWORK CONNECTIVITY POLICY MANAGEMENT SYSTEM | October 2023 | July 2025 | Allow | 20 | 1 | 0 | No | No |
| 18383796 | METHOD OF RANKING AND ADDRESS NETWORK THREATS | October 2023 | March 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18491191 | SYSTEMS, METHODS, AND COMPUTING PLATFORMS FOR EXECUTING CREDENTIAL-LESS NETWORK-BASED COMMUNICATION EXCHANGES | October 2023 | December 2023 | Allow | 2 | 0 | 0 | No | No |
| 18491202 | SYSTEMS, METHODS, AND COMPUTING PLATFORMS FOR EXECUTING CREDENTIAL-LESS NETWORK-BASED COMMUNICATION EXCHANGES | October 2023 | May 2024 | Allow | 7 | 1 | 0 | No | No |
| 18490239 | EXTENDING CLOUD-BASED VIRTUAL PRIVATE NETWORKS TO RADIO-BASED NETWORKS | October 2023 | August 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18489317 | DECENTRALIZED INTERNET PROTOCOL SECURITY KEY NEGOTIATION | October 2023 | June 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18378613 | PACKET WATERMARK WITH STATIC SALT AND TOKEN VALIDATION | October 2023 | June 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18483018 | REAL-TIME ORCHESTRATION ENGINE | October 2023 | June 2025 | Allow | 21 | 2 | 0 | Yes | No |
| 18482947 | DYNAMIC USER INTERFACE (UI) FRAMEWORK | October 2023 | April 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18482280 | PREFERENCE-BASED HOME ENVIRONMENT CONTROL SYSTEM | October 2023 | October 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18377573 | OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENT | October 2023 | September 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18482407 | Authenticating Accesses to a Shared Datastore of a Multi-Tenant Computer System | October 2023 | May 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18481512 | ACTIVE DATA LOSS PREVENTION (DLP) ENGINE | October 2023 | April 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18480815 | HARDWARE PROTECTION OF INLINE CRYPTOGRAPHIC PROCESSOR | October 2023 | October 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18481091 | TECHNIQUES FOR ENCRYPTED DISK CYBERSECURITY INSPECTION UTILIZING DISK CLONING | October 2023 | August 2024 | Allow | 11 | 3 | 0 | Yes | No |
| 18480667 | STATE MANAGEMENT FOR COMPLEX REAL-TIME WORKFLOWS | October 2023 | April 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18480865 | SINGLE SIGN-ON (SSO) MULTI-IDENTITY PROVIDER (IDP) ENGINE | October 2023 | April 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18479465 | METHODS AND APPARATUSES FOR HANDLING END-TO-END ENCRYPTION | October 2023 | May 2025 | Allow | 19 | 1 | 0 | No | No |
| 18476896 | SYSTEMS AND METHODS FOR ENDPOINT MANAGEMENT | September 2023 | June 2025 | Allow | 21 | 2 | 0 | Yes | No |
| 18477530 | DEVICES, SYSTEMS, AND METHODS FOR SECURELY STORING AND MANAGING SENSITIVE INFORMATION | September 2023 | June 2025 | Allow | 20 | 1 | 0 | No | No |
| 18373822 | METHODS AND SYSTEMS FOR CURATING DATA IN A MULTI-APPLICATION NETWORK | September 2023 | December 2024 | Abandon | 15 | 2 | 0 | No | No |
| 18475653 | SYSTEMS AND METHODS FOR BLOCKCHAIN WALLET OWNER VERIFICATION AND ACCESS MANAGEMENT | September 2023 | January 2024 | Allow | 4 | 1 | 0 | No | No |
| 18474524 | Utilizing Machine Learning to detect malicious executable files efficiently and effectively | September 2023 | August 2024 | Allow | 11 | 1 | 0 | No | No |
| 18472510 | WIRELESS KILL SWITCH | September 2023 | August 2024 | Allow | 11 | 0 | 0 | No | No |
| 18371891 | METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORK | September 2023 | February 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18370918 | SECURE COMMUNICATION TOOL FOR USE ALONGSIDE NON-SECURE COMMUNICATIONS | September 2023 | August 2024 | Allow | 11 | 1 | 0 | No | No |
| 18371320 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | September 2023 | April 2025 | Allow | 18 | 1 | 0 | No | No |
| 18471084 | UNIFIED LENDING PLATFORM | September 2023 | February 2025 | Allow | 17 | 1 | 0 | Yes | No |
| 18469549 | Containerized Build Steps | September 2023 | April 2024 | Allow | 7 | 0 | 0 | No | No |
| 18468584 | SYSTEMS AND METHODS FOR PERFORMING AN EXTERNAL VULNERABILITY SCAN USING EXTERNAL INTERNET PROTOCOL ADDRESSES | September 2023 | May 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18466540 | SYSTEMS AND METHODS FOR CYBERSECURITY ANALYSIS AND CONTROL OF CLOUD-BASED SYSTEMS | September 2023 | March 2025 | Allow | 18 | 1 | 0 | No | No |
| 18465959 | VIRTUAL NOTARIZATION USING CRYPTOGRAPHIC TECHNIQUES AND BIOMETRIC INFORMATION | September 2023 | November 2024 | Allow | 14 | 1 | 0 | No | No |
| 18463750 | TECHNIQUES FOR DIGITAL WALLET INTEGRATION AND FOR SCANNING TRANSACTIONS USING INTEGRATED MODULES | September 2023 | November 2023 | Allow | 2 | 0 | 0 | Yes | No |
| 18244093 | SYSTEM AND METHOD FOR ANONYMOUS DATA SHARING AMONG NODES OF A PRIVATE DATA NETWORK | September 2023 | October 2024 | Allow | 13 | 2 | 0 | Yes | No |
| 18463829 | TECHNOLOGIES FOR MEMORY REPLAY PREVENTION USING COMPRESSIVE ENCRYPTION | September 2023 | April 2025 | Allow | 19 | 2 | 0 | No | No |
| 18244048 | Resolving Access Policies Between Intent-Based Network Architectures and Cloud Native Architectures | September 2023 | September 2024 | Allow | 13 | 1 | 0 | No | No |
| 18463191 | SECURE PROVISIONING, BY A CLIENT DEVICE, CRYPTOGRAPHIC KEYS FOR EXPLOITING SERVICES PROVIDED BY AN OPERATOR | September 2023 | July 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18461875 | BIOMETRIC AUTHENTICATION | September 2023 | May 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18461946 | AUTHENTICATION DEVICE, AUTHENTICATION SYSTEM, AND AUTHENTICATION METHOD | September 2023 | November 2024 | Allow | 14 | 1 | 0 | No | No |
| 18462121 | AUTOMATIC SECURITY DEVICE NETWORK | September 2023 | March 2024 | Allow | 6 | 2 | 0 | No | No |
| 18461342 | BUDGET TRACKING IN A DIFFERENTIALLY PRIVATE DATABASE SYSTEM | September 2023 | July 2024 | Allow | 10 | 1 | 0 | No | No |
| 18461087 | INFORMATION TECHNOLOGY SECURITY ASSESSMENT SYSTEM | September 2023 | October 2023 | Allow | 2 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2492.
With a 27.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 32.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Art Unit 2492 is part of Group 2490 in Technology Center 2400. This art unit has examined 7,260 patent applications in our dataset, with an overall allowance rate of 79.7%. Applications typically reach final disposition in approximately 30 months.
Art Unit 2492's allowance rate of 79.7% places it in the 57% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2492 receive an average of 2.13 office actions before reaching final disposition (in the 74% percentile). The median prosecution time is 30 months (in the 45% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.