Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19368783 | METHODS AND SYSTEMS FOR MAINTAINING BEHAVIORAL INTEGRITY OF AUTONOMOUS ARTIFICIAL INTELLIGENCE AGENTS | October 2025 | January 2026 | Allow | 3 | 0 | 0 | Yes | No |
| 19319685 | INFORMATION PROCESSING SYSTEM, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING PROGRAM STORED THEREIN, AND AUTHENTICATION METHOD | September 2025 | December 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19232533 | METHOD AND ELECTRONIC DEVICE FOR MANAGING SENSITIVE DATA BASED ON SEMANTIC CATEGORIZATION | June 2025 | August 2025 | Allow | 2 | 0 | 0 | No | No |
| 19136423 | CONSORTIUM BLOCKCHAIN ADMISSION MANAGEMENT METHOD AND APPARATUS | June 2025 | March 2026 | Allow | 9 | 0 | 0 | Yes | No |
| 19197948 | DIGITAL SIGNATURE | May 2025 | December 2025 | Allow | 7 | 1 | 0 | No | No |
| 19097774 | TRUSTWORTHINESS OF VIDEO DATA STREAMS | April 2025 | November 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 19074401 | AUTHENTICATION SIGNATURE EMBEDDING IN DIGITAL MEDIA | March 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19061897 | PLATFORM SYSTEM CREATING RELIABLE, TRUST SCORED, TRUSTWORTHY DATA, FROM HUMAN AND OTHER DATA SOURCES FOR TRUSTED USES BY INDIVIDUALS AND OTHER ENTITIES | February 2025 | March 2026 | Abandon | 12 | 1 | 0 | No | No |
| 19041074 | SECURE CONTROLLED COMMUNICATIONS | January 2025 | August 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19025375 | Multi-Factor Authentication with Device and Carrier Validation | January 2025 | August 2025 | Allow | 7 | 0 | 0 | No | No |
| 19017845 | MULTI-LAYERED VERIFICATION OF DIGITAL APPEARANCES | January 2025 | May 2025 | Allow | 4 | 1 | 0 | No | No |
| 18956421 | Server, Switch and Endpoints for Secure Communications | November 2024 | May 2025 | Allow | 6 | 1 | 0 | No | No |
| 18956015 | DI CHIP, COMMUNICATION DEVICE, SYSTEM, AND OPERATING METHOD | November 2024 | January 2026 | Allow | 14 | 1 | 0 | No | No |
| 18858177 | NON-NATIVE BLOCKCHAIN SIGNATURES | October 2024 | January 2026 | Allow | 15 | 0 | 0 | No | No |
| 18914475 | SYSTEM AND METHOD FOR EVALUATING COMPUTER PROGRAM HALTS | October 2024 | July 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18909109 | AUTHENTICATED CROSS-SUBNET COMMUNICATION | October 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18903315 | IMAGE PROCESSING DEVICE, ATTACK COUTERMEASURE METHOD, AND COMPUTER READABLE MEDIUM | October 2024 | February 2026 | Allow | 17 | 0 | 0 | No | No |
| 18900562 | INTERACTIVE ELECTRONIC SIGNATURE PLATFORM UTILIZING EMBEDDED PERSONALIZED MEDIA | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18892806 | Preventing the disclosure of sensitive information in attempts to Utilize Generative Artificial Intelligence (AI) through a Chat-Style Interface | September 2024 | March 2026 | Allow | 18 | 0 | 0 | No | No |
| 18826156 | METHOD FOR DETECTING NETWORK ATTACK BASED ON KERNEL OPERATING CHARACTERISTICS OF SOFTWARE SWITCH | September 2024 | February 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18822595 | TAMPER RESPONSE AGAINST PHYSICAL AND LOGICAL ATTACKS ON AN HSM | September 2024 | December 2025 | Allow | 15 | 0 | 0 | No | No |
| 18823610 | PROCESSING QUERY PREDICATES INVOLVING FINE-GRAINED PRIVACY-PRESERVING COLUMNS | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18820694 | SYSTEMS AND METHODS FOR USE IN SECURING BACKUP DATA FILES | August 2024 | November 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18816983 | Masking Sensitive Data On Detecting Presence Of Non-Authorized User | August 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18802706 | SYSTEM AND METHOD FOR SECURELY DELIVERING KEYS AND ENCRYPTING CONTENT IN CLOUD COMPUTING ENVIRONMENTS | August 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18799815 | DERIVED UNIQUE KEY FOR PRE-SHARED KEY (DUK-PSK) | August 2024 | February 2026 | Allow | 18 | 1 | 0 | Yes | No |
| 18794408 | TELEPHONE SERVICE DELAY AND CONNECTION SYSTEM | August 2024 | March 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18793094 | System and Method for Grip Gesture Authentication based on Pressure Gradient Mapping | August 2024 | November 2025 | Allow | 16 | 0 | 0 | No | No |
| 18791249 | SELECTIVE AUTHORIZATION CONTROL IN MULTI-TENANT APPLICATIONS | July 2024 | March 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18833946 | QUANTUM-COMPUTING SECURE DIGITAL AND PHYSICAL PROOF OF WORK | July 2024 | January 2026 | Allow | 18 | 1 | 0 | Yes | No |
| 18784334 | GATHERING UNIVERSAL SERIAL BUS THREAT INTELLIGENCE | July 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18779960 | SYSTEMS AND METHODS FOR AUTOMATICALLY AND DYNAMICALLY GENERATING A CROSS-CHANNEL IDENTIFIER FOR DISPARATE DATA IN AN ELECTRONIC NETWORK | July 2024 | September 2025 | Allow | 14 | 0 | 0 | No | No |
| 18778925 | CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE | July 2024 | January 2026 | Allow | 18 | 1 | 0 | Yes | No |
| 18778532 | CONNECTION MANAGEMENT DEVICE AND COMMON API | July 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18771583 | SYSTEMS, METHODS, AND APPARATUSES FOR NETWORK MANAGEMENT | July 2024 | March 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18769029 | INCREMENTAL VERIFICATION OF TAMPER-RESISTANT LEDGER | July 2024 | March 2026 | Allow | 20 | 0 | 0 | No | No |
| 18767725 | PRESERVING PRIVACY DURING SECURE TRANSACTIONS WITH AMBIENT POWER DEVICES | July 2024 | December 2025 | Allow | 17 | 0 | 0 | No | No |
| 18766605 | CREATING A TRUSTED ZONE SYSTEM TO SUPPORT AN ARTIFICIAL INTELLIGENCE INSTANCE BY CREATING A VIEWPOINT FROM WHICH TO VIEW AUTHENTICATED AND ATTRIBUTED DATA FROM A CURATED DATA REPOSITORY OF MORALS, CULTURE AND HISTORY AND A CURATED DATA REPOSITORY AND EVALUATION SYSTEM, WHICH INCORPORATE TRUST-SCORED FACTS AS STABLE REFERENCES TO SUPPORT AI SUPERINTELLIGENCE ALIGNMENT THROUGH WHICH SMART AI SYSTEMS WILL BE MORE LIKELY TO FOLLOW HUMAN INTENT AND LESS LIKELY TO DO WHAT HUMANS DO NOT WANT THEM TO DO | July 2024 | September 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18759433 | ON DEMAND TOKENIZATION PROCESSING | June 2024 | November 2025 | Allow | 17 | 0 | 0 | No | No |
| 18756066 | Email Verification Using Injected Tokens for Message Authentication | June 2024 | March 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18755766 | SYSTEM FOR ASSURING CYBER SECURITY ACROSS SUPPLY CHAINS | June 2024 | November 2025 | Allow | 17 | 0 | 0 | No | No |
| 18722799 | AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY RECORDING MEDIUM | June 2024 | January 2026 | Allow | 19 | 1 | 0 | No | No |
| 18722813 | CRYPTOGRAPHIC KEY SHARING SYSTEM | June 2024 | January 2026 | Allow | 19 | 1 | 0 | No | No |
| 18749880 | ADVANCED MULTI-LAYER ACCESS CONTROL POLICY ENFORCEMENT IN A MULTI-TENANT CLOUD ENVIRONMENT | June 2024 | January 2026 | Allow | 19 | 1 | 0 | No | No |
| 18748591 | STREAMLINED INSTALLATION AND MANAGEMENT OF REMOTE COMPUTING APPLICATIONS | June 2024 | January 2026 | Allow | 19 | 1 | 0 | No | No |
| 18747589 | SYSTEMS AND METHODS FOR TRACKING EXECUTION FLOWS FOR AUTOMATED MALWARE DETECTION | June 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18746270 | TECHNIQUES FOR ENRICHING DEVICE PROFILES AND MITIGATING CYBERSECURITY THREATS USING ENRICHED DEVICE PROFILES | June 2024 | November 2025 | Allow | 17 | 1 | 0 | No | No |
| 18745796 | SYSTEMS AND METHODS FOR ACCESS PROVISIONING USING A DATA PROTECTION ARCHITECTURE | June 2024 | September 2025 | Allow | 15 | 0 | 0 | No | No |
| 18744435 | TRUSTED PLATFORM MODULE CRYPTOCURRENCY MINER WITH SECURE ZERO TOUCH PROVISIONING CAPABILITY | June 2024 | August 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18744428 | HARDWARE SPECIFIC CRYPTOGRAPHIC KEY | June 2024 | March 2026 | Allow | 21 | 1 | 0 | No | No |
| 18743220 | LEVERAGING QUANTUM ENTANGLEMENT FOR REPLICATING DATA IN MULTIPLE LOCATIONS AND TWIN TAGGING THE DATA | June 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18742399 | SYSTEMS AND METHODS FOR INTELLIGENTLY CONSTRUCTING, TRANSMITTING, AND VALIDATING SPOOFING-CONSCIOUS DIGITALLY SIGNED WEB TOKENS USING MICROSERVICE COMPONENTS OF A CYBERSECURITY THREAT MITIGATION PLATFORM | June 2024 | July 2025 | Allow | 13 | 1 | 0 | No | No |
| 18740973 | OPTIMIZED HEADER INFORMATION TO ENABLE ACCESS CONTROL | June 2024 | August 2025 | Allow | 14 | 1 | 0 | No | No |
| 18735394 | EVIDENCE ORACLES | June 2024 | June 2025 | Allow | 12 | 1 | 0 | No | No |
| 18734076 | ELECTRIC DEVICE AND KEY SWITCHING METHOD THEREOF | June 2024 | March 2026 | Allow | 21 | 1 | 0 | No | No |
| 18733543 | SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS | June 2024 | November 2025 | Allow | 17 | 1 | 0 | Yes | No |
| 18733780 | AUTHENTICATION FRAMEWORK | June 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18731619 | Machine learning techniques for automated document and organization validation | June 2024 | March 2026 | Allow | 21 | 1 | 0 | No | No |
| 18680143 | INTERNET PACKET PROVENANCE TO VERIFY PACKET VALIDITY AND CONTROL PACKET USAGE | May 2024 | October 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18679365 | RESTRICTED OPERATIONS DUE TO ATTACHMENT OF COMPUTE INSTANCES OWNED BY DIFFERENT TENANCIES | May 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18679330 | METHOD OF MALWARE DETECTION AND SYSTEM THEREOF | May 2024 | July 2025 | Allow | 14 | 0 | 0 | Yes | No |
| 18678350 | ENCRYPTED CONTEXT-BASED PROMPT SYSTEM | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18679436 | Electronic Device for Accessing Data and Method Thereof | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18677816 | CATEGORIZING POLICY-BASED CONTROL MAPPING FOR REAL-TIME SECURITY AND COMPLIANCE MONITORING | May 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18674855 | FULLY HOMOMORPHIC ENCRYPTED PROCESSING ACCELERATION | May 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18674804 | ATTRIBUTE-BASED CREDENTIALS FOR RESOURCE ACCESS | May 2024 | February 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18713110 | CET MECHANISM-BASED METHOD FOR PROTECTING INTEGRITY OF GENERAL-PURPOSE MEMORY | May 2024 | January 2026 | Allow | 20 | 0 | 0 | No | No |
| 18671646 | IMAGE PROCESSING DEVICE SECURITY | May 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18671840 | SYSTEMS AND METHODS FOR COHORT DENIAL OF SERVICE ATTACK DETECTION AND MITIGATION | May 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18670205 | Role-Based Permission by a Data Platform | May 2024 | July 2025 | Allow | 13 | 0 | 0 | Yes | No |
| 18670201 | TECHNIQUES FOR TOKEN PROXIMITY TRANSACTIONS | May 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18662429 | KMS DEDICATED HSM DESIGN (DIRECT ACCESS) | May 2024 | August 2025 | Allow | 15 | 0 | 0 | No | No |
| 18661842 | METHODS AND SYSTEMS FOR ADAPTING AN APPLICATION PROGRAMMING INTERFACE | May 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18659597 | PINNING DEVICE IDENTIFIERS TO CRYPTOGRAPHIC KEY PAIRS | May 2024 | March 2026 | Allow | 22 | 2 | 0 | Yes | No |
| 18658647 | METHOD AND DEVICE FOR CONNECTING MAP APPLICATION TO PROCESS FOR AFFILIATION AUTHENTICATION OF USER ACCOUNT` | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18655537 | INTELLIGENT DISPLAY OF CONTENT | May 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18655740 | Continuous User Authentication Criteria for Access to Encrypted Files | May 2024 | January 2025 | Abandon | 9 | 1 | 0 | No | No |
| 18652944 | MICROCONTROLLER HAVING WIRELESS COMMUNICATION MODULE FOR USE WITH A SYSTEM | May 2024 | November 2025 | Allow | 19 | 0 | 0 | No | No |
| 18653656 | SECURE RANGING SECRET KEY COMPLIANCE FOR SHORT-RANGE COMMUNICATION DEVICES | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18646607 | APPARATUS, SYSTEMS, AND METHODS RELYING ON NON-FLASHABLE CIRCUITRY FOR IMPROVING SECURITY ON PUBLIC OR PRIVATE NETWORKS | April 2024 | July 2024 | Allow | 3 | 1 | 0 | No | No |
| 18646554 | PROTECTION OF SECRET DATA USING UNPROTECTED DATA PATH | April 2024 | February 2026 | Allow | 22 | 1 | 0 | No | No |
| 18646617 | KUBERNETES SECURITY ISOLATION BASED ON CLASSIFIED INFORMATION AND RISK LEVELS | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18646095 | LIMITING DISCOVERY OF A PROTECTED RESOURCE IN A ZERO TRUST ACCESS MODEL | April 2024 | June 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18640903 | SECURING LEGACY ADAPTERS WITH A SECURE MICROCONTROLLER UNIT AND LEGACY ADAPTER RECOVERY | April 2024 | January 2026 | Allow | 21 | 1 | 0 | No | No |
| 18639954 | DETECTING KERBEROS TICKET ATTACKS WITHIN A DOMAIN | April 2024 | June 2025 | Allow | 14 | 0 | 0 | Yes | No |
| 18702638 | SECURE ASSET MANAGEMENT INFRASTRUCTURE FOR ENFORCING ACCESS CONTROL POLICIES | April 2024 | February 2026 | Allow | 22 | 1 | 0 | No | No |
| 18637848 | Blockchain Encoding System | April 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18635080 | GENERATIVE ARTIFICIAL INTELLIGENCE FOR VALIDATION OF A HUMAN USER | April 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18634128 | HASHING MESSAGES WITH CRYPTOGRAPHIC KEY COMPONENTS | April 2024 | April 2025 | Allow | 12 | 2 | 1 | Yes | No |
| 18634857 | Recovering from Ransomware Attacks | April 2024 | August 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18632751 | CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE | April 2024 | January 2026 | Allow | 21 | 2 | 0 | No | No |
| 18699722 | Stateful Hash-Based Signing with a Single Public Key and Multiple Independent Signers | April 2024 | January 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18627961 | RECURRENT NEURAL NETWORK-BASED USER IDENTITY MISAPPROPRIATION PREVENTION FROM PUBLIC DOMAINS AND CONNECTIONS | April 2024 | January 2026 | Allow | 21 | 0 | 0 | No | No |
| 18628625 | AMPLIFICATION OF FORMAL METHOD AND FUZZ TESTING TO ENABLE SCALABLE ASSURANCE FOR COMMUNICATION SYSTEM | April 2024 | February 2026 | Allow | 23 | 1 | 1 | No | No |
| 18627166 | METHOD FOR GENERATING AT LEAST ONE CRYPTOGRAPHIC KEY AS WELL AS A COMPUTER PROGRAM PRODUCT AND A DEVICE THEREFOR | April 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18623737 | COMPUTER SYSTEMS AND COMPUTER-IMPLEMENTED METHODS UTILIZING DIGITAL RESOURCE ACCESSING MECHANISM SCHEMA FOR DIGITAL TOKENS | April 2024 | July 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18621771 | IMMUTABLE WATERMARKING FOR AUTHENTICATING AND VERIFYING AI-GENERATED OUTPUT | March 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18697240 | MODEL PROTECTION METHOD AND APPARATUS, DATA PROCESSING METHOD AND APPARATUS, AND DEVICE AND MEDIUM | March 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18622022 | MALWARE DETECTION TECHNIQUES | March 2024 | January 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18696479 | METHOD FOR DETECTING MOBILE MALICIOUS APPLICATION BASED ON IMPLEMENTATION FEATURES, RECORDING MEDIUM, AND DEVICE FOR PERFORMING THE METHOD | March 2024 | January 2026 | Allow | 21 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2493.
With a 27.3% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 33.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2493 is part of Group 2490 in Technology Center 2400. This art unit has examined 6,997 patent applications in our dataset, with an overall allowance rate of 79.5%. Applications typically reach final disposition in approximately 29 months.
Art Unit 2493's allowance rate of 79.5% places it in the 60% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2493 receive an average of 2.06 office actions before reaching final disposition (in the 64% percentile). The median prosecution time is 29 months (in the 60% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.