Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19041984 | CYBER RESILIENCE AGENTIC MESH | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19040705 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19021683 | NETWORK EDGE DIGITAL TWIN FOR IOT ATTACK DETECTION | January 2025 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19020851 | INFORMATION NOTIFICATION METHOD AND INFORMATION NOTIFICATION DEVICE | January 2025 | June 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18964330 | DERIVED ACCESS PERMISSIONS FOR INPUTS TO ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18963186 | PROBABILISTIC EVENT LINKING | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18961639 | SECURE DEVICE COMMUNICATION USING MULTI-KEY ENCAPSULATION | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18961324 | ALARM DATA PROCESSING METHOD, APPARATUS, MEDIUM AND ELECTRONIC DEVICE | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18946217 | Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation Platform | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18945409 | Canonicalization of Unicode Prompt Injections | November 2024 | February 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 18932967 | CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUS | October 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18923017 | LIGHTWEIGHT INTRUSION DETECTION METHOD AND SYSTEM OF INTERNET OF VEHICLES BASED ON KNOWLEDGE DISTILLATION | October 2024 | January 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18922019 | INFORMATION PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | October 2024 | June 2025 | Allow | 8 | 2 | 0 | No | No |
| 18914035 | DETECTING MALICIOUS ACTIVITY USING USER-SPECIFIC PARAMETERS | October 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18906652 | SYSTEMS AND METHODS FOR IMPLEMENTING INTERIM SECURITY POLICIES | October 2024 | December 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18888947 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888955 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888973 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18887706 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | September 2024 | March 2025 | Allow | 6 | 2 | 0 | No | No |
| 18887697 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | September 2024 | December 2024 | Allow | 2 | 1 | 0 | No | No |
| 18887807 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2024 | November 2024 | Allow | 2 | 1 | 0 | No | No |
| 18882373 | METHODS AND SYSTEMS FOR VERIFYING A USER AGENT | September 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18829996 | THREAT CLASSIFICATION IN A STREAMING SYSTEM | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18829109 | SYSTEM FOR CYBERSECURITY CAMPAIGN ARTIFACT DISCOVERY AND TASKING | September 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18824956 | Secure localization method for multi-mobile robots based on network communication | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18843232 | CONTAINER OPERATION CONTROL METHOD AND APPARATUS | August 2024 | June 2025 | Allow | 9 | 0 | 0 | No | No |
| 18807827 | METHOD, APPARATUS, DEVICE, AND MEDIUM FOR PERMISSION PROCESSING | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18785419 | CLOUD DATA ATTACK SURFACE TRACKING USING GRAPH-BASED EXCESSIVE PRIVILEGE DETECTION | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18781121 | RISK EVENT DETECTION USING ACTIVITY AND GRAPH-BASED CONTEXT FOR CLOUD DATA SECURITY POSTURE MANAGEMENT | July 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18770937 | METHODS AND APPARATUS FOR WTRU-TO-WTRU RELAY DISCOVERY SECURITY AND PRIVACY | July 2024 | December 2024 | Allow | 5 | 1 | 0 | No | No |
| 18767075 | REMOTE IDENTIFICATION AND MANAGEMENT OF MANNED AND UNMANNED SYSTEMS AND DEVICES | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18758159 | ACCESS CONTROL POLICY FOR PROXY SERVICES | June 2024 | May 2025 | Allow | 11 | 0 | 0 | No | No |
| 18752409 | METHODS AND APPARATUSES TO PROVIDE INFORMATION SECURITY TO AN ENTITY BY USING MULTIPLE CLOUD-BASED APPLICATION SERVICES | June 2024 | February 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18747859 | SYSTEM AND METHOD FOR MONITORING DATA INPUT INTO MACHINE LEARNING MODELS | June 2024 | June 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18746458 | OPEN SOURCE LIBRARY SECURITY RATING | June 2024 | May 2025 | Allow | 11 | 1 | 0 | No | No |
| 18743120 | COMMUTATIVE ENCRYPTION AND WATERMARKING METHOD BASED ON CHAOTIC SYSTEM AND ZERO WATERMARK FOR VECTOR GEOSPATIAL DATA | June 2024 | September 2024 | Allow | 3 | 0 | 0 | No | No |
| 18742168 | TRUSTED LOCAL MEMORY MANAGEMENT IN A VIRTUALIZED GPU | June 2024 | March 2025 | Allow | 9 | 0 | 0 | No | No |
| 18738014 | Method for increasing security level of one-time-password message formats | June 2024 | September 2024 | Allow | 3 | 1 | 0 | No | No |
| 18737679 | IDENTITY-BY-DESCENT RELATEDNESS BASED ON FOCAL AND REFERENCE SEGMENTS | June 2024 | November 2024 | Allow | 5 | 1 | 0 | No | No |
| 18737481 | TECHNIQUES FOR INCIDENT RESPONSE AND STATIC ANALYSIS REPRESENTATION IN COMPUTING ENVIRONMENTS | June 2024 | August 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18732401 | CONSTRUCTING MACHINE LEARNING MODELS | June 2024 | January 2025 | Allow | 8 | 0 | 0 | No | No |
| 18674083 | CLAIMING DELAYED LIVE REFERENCE STREAMS | May 2024 | September 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18670003 | SECURITY AND PRIVACY INSPECTION OF BIDIRECTIONAL GENERATIVE ARTIFICIAL INTELLIGENCE TRAFFIC USING A REVERSE PROXY | May 2024 | December 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18670032 | EFFICIENT TRAINING DATA GENERATION FOR TRAINING MACHINE LEARNING MODELS FOR SECURITY AND PRIVACY INSPECTION OF BIDIRECTIONAL GENERATIVE ARTIFICIAL INTELLIGENCE TRAFFIC | May 2024 | December 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18669276 | Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation Platform | May 2024 | August 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18666973 | STACK PIVOT EXPLOIT DETECTION AND MITIGATION | May 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18667281 | Voice Biometric Authentication in a Virtual Assistant | May 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18665672 | DEFENSIVE DEEPFAKE FOR DETECTING SPOOFED ACCOUNTS | May 2024 | January 2025 | Allow | 9 | 0 | 0 | No | No |
| 18657686 | IDENTITY AUTHENTICATION USING MOBILE CARRIER ACCOUNT INFORMATION AND CREDIT BUREAU INFORMATION | May 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18655138 | DOMAIN DESCRIPTION LANGUAGE SYSTEM AND METHODS FOR DATA SUBJECT REQUEST (DSR) PROCESSING | May 2024 | November 2024 | Allow | 6 | 1 | 0 | No | No |
| 18646124 | Systems Using an Authorization Service User Interface for Secure Role-Based Access Control | April 2024 | February 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18638996 | Dispersed rebuilding of encoded data slices in a storage network | April 2024 | June 2025 | Allow | 14 | 0 | 0 | No | No |
| 18636243 | RESOURCE TRANSFER SETUP AND VERIFICATION | April 2024 | April 2025 | Allow | 12 | 1 | 0 | No | No |
| 18634032 | DISTRIBUTED COMPUTER ARCHITECTURE FOR PROCESSING DATA | April 2024 | November 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18632273 | BATCH PRIVACY INFORMATION RETRIEVAL METHOD AND APPARATUS | April 2024 | August 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18629204 | UPDATING A MACHINE LEARNING FRAUD MODEL BASED ON THIRD PARTY TRANSACTION INFORMATION | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18629085 | METHODS AND SYSTEMS FOR ENHANCING THE DETECTION OF SYNTHETIC SPEECH | April 2024 | November 2024 | Allow | 8 | 1 | 0 | No | No |
| 18627058 | SHARING DATA IN AN ORGANIZED STORAGE SYSTEM | April 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18622522 | METHOD TO INTELLIGENTLY MANAGE THE END TO END CONTAINER COMPLIANCE IN CLOUD ENVIRONMENTS | March 2024 | May 2025 | Allow | 14 | 1 | 0 | No | No |
| 18622215 | METHOD, SYSTEMS AND APPARATUS FOR INTELLIGENTLY EMULATING FACTORY CONTROL SYSTEMS AND SIMULATING RESPONSE DATA | March 2024 | June 2024 | Allow | 2 | 0 | 0 | No | No |
| 18620080 | SYSTEMS AND METHODS FOR SECURITY POLICY ORGANIZATION USING A DUAL BITMAP | March 2024 | September 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18617210 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | March 2024 | October 2024 | Allow | 6 | 2 | 0 | No | No |
| 18608098 | MANAGING THE LOADING OF SENSITIVE MODULES | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18601064 | SYSTEMS AND METHODS FOR EVALUATING, VALIDATING, AND IMPLEMENTING CHANGE REQUESTS TO A SYSTEM ENVIRONMENT BASED ON ARTIFICIAL INTELLIGENCE INPUT | March 2024 | October 2024 | Allow | 7 | 0 | 0 | No | No |
| 18600744 | SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION | March 2024 | March 2025 | Allow | 13 | 1 | 0 | No | No |
| 18595155 | NETWORK TRAFFIC INSPECTION | March 2024 | September 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18593371 | SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO POLICY DATA ON BLOCKCHAIN | March 2024 | March 2025 | Allow | 13 | 0 | 0 | Yes | No |
| 18592069 | SYSTEMS AND METHODS FOR ACCELERATED REMEDIATIONS OF CYBERSECURITY ALERTS AND CYBERSECURITY EVENTS IN A CYBERSECURITY EVENT DETECTION AND RESPONSE PLATFORM | February 2024 | January 2025 | Allow | 11 | 0 | 0 | Yes | No |
| 18588981 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | February 2024 | June 2024 | Allow | 4 | 1 | 0 | No | No |
| 18587518 | CONTEXTUAL KEY MANAGEMENT FOR DATA ENCRYPTION | February 2024 | June 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18444928 | Cloud Data Security Posture Detection Based On Network Communication Paths And Sensitivity Data | February 2024 | February 2025 | Allow | 12 | 0 | 0 | Yes | No |
| 18581254 | INTERPRETABILITY FRAMEWORK FOR DIFFERENTIALLY PRIVATE DEEP LEARNING | February 2024 | September 2024 | Allow | 7 | 0 | 0 | No | No |
| 18442946 | TECHNIQUES FOR GENERATING SIGNATURES CHARACTERIZING ADVANCED APPLICATION LAYER FLOOD ATTACK TOOLS | February 2024 | November 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18438817 | SYSTEMS, METHODS, AND APPLICATIONS FOR TRANSCODING DATA INTO MEDIA FILES | February 2024 | April 2025 | Allow | 14 | 1 | 1 | No | No |
| 18439516 | QUERY PROCESSING USING MULTIPLE INDICES | February 2024 | December 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18423666 | SYSTEM AND METHOD FOR SECURITY SUITE CONCATENATING VALIDATION ELEMENTS FOR BLOCKCHAIN BINDING OPERATIONS | January 2024 | January 2025 | Allow | 12 | 1 | 0 | No | No |
| 18424651 | METHODS FOR GRINDING-RESISTANT CONSENSUS IN A PROOF-OF-SPACE-BASED BLOCKCHAIN | January 2024 | October 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18419953 | METHOD AND APPARATUS FOR ENCRYPTION KEY EXCHANGE WITH ENHANCED SECURITY THROUGH OPTI-ENCRYPTION CHANNEL | January 2024 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18418524 | MULTI-LEGGED NETWORK ATTRIBUTION USING TRACKING TOKENS AND ATTRIBUTION STACK | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18412556 | IDENTIFYING FRAUDULENT REQUESTS FOR CONTENT | January 2024 | November 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18411495 | SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO BLOCKCHAIN DATA | January 2024 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18409315 | DATA ACCESS CONTROL FOR USER DEVICES USING A BLOCKCHAIN | January 2024 | June 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18407834 | ORGANIZED DATA STORAGE SYSTEM | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18401953 | Method, System, and Computer Program Product for Preventing Transmission of Malicious Data | January 2024 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18401950 | Monitor and Control Toxic Configuration in Container Deployment | January 2024 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18396393 | SYSTEMS AND METHODS FOR USING A NETWORK ACCESS DEVICE TO SECURE A NETWORK PRIOR TO REQUESTING ACCESS TO THE NETWORK BY THE NETWORK ACCESS DEVICE | December 2023 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18394109 | SYSTEMS AND METHODS FOR IDENTIFYING MALICIOUS CRYPTOGRAPHIC ADDRESSES | December 2023 | August 2024 | Allow | 8 | 1 | 0 | No | No |
| 18394608 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | December 2023 | July 2024 | Allow | 6 | 2 | 0 | No | No |
| 18393487 | METHOD FOR USING GENERATIVE LARGE LANGUAGE MODELS (LLM) FOR CYBERSECURITY DECEPTION AND HONEYPOTS | December 2023 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18545330 | SYSTEMS AND METHODS FOR DETECTING KEYBOARD CHARACTERISTICS | December 2023 | July 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18543118 | MALWARE MITIGATION BASED ON RUNTIME MEMORY ALLOCATION | December 2023 | September 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18540978 | SECURE ACCESS TO MULTIPLE ISOLATED NETWORKS | December 2023 | February 2025 | Allow | 14 | 1 | 0 | No | No |
| 18540308 | DYNAMIC COMMAND EXTENSION FOR A MEMORY SUB-SYSTEM | December 2023 | February 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18540473 | Systems and Methods for Distributed P25 LMR Radio Vulnerability Management and Real-Time Interference Monitoring | December 2023 | August 2024 | Allow | 8 | 0 | 0 | No | No |
| 18536393 | BATCH TOKENIZATION SERVICE | December 2023 | August 2024 | Allow | 8 | 0 | 0 | No | No |
| 18535370 | SECURE DOCUMENT MANAGEMENT SYSTEMS | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18530502 | SUSPICIOUS GROUP DETECTION | December 2023 | August 2024 | Allow | 8 | 1 | 0 | No | No |
| 18525432 | BLOCK CHAIN MODIFICATION CORRELATION | November 2023 | January 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18521189 | Key Diversification in a Tracking Device Environment | November 2023 | June 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18521899 | SYSTEM AND METHOD FOR IDENTIFYING ALTERED CONTENT | November 2023 | January 2025 | Allow | 14 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2494.
With a 24.8% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 41.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2494 is part of Group 2490 in Technology Center 2400. This art unit has examined 6,521 patent applications in our dataset, with an overall allowance rate of 82.0%. Applications typically reach final disposition in approximately 29 months.
Art Unit 2494's allowance rate of 82.0% places it in the 68% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2494 receive an average of 1.92 office actions before reaching final disposition (in the 59% percentile). The median prosecution time is 29 months (in the 50% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.