Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19287737 | CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING DOUBLE ENCRYPTION | July 2025 | October 2025 | Allow | 2 | 0 | 0 | No | No |
| 19270295 | Distributed Adversarial Attack Detection | July 2025 | November 2025 | Allow | 4 | 1 | 0 | No | No |
| 19258509 | TECHNIQUES FOR CYBERSECURITY INCIDENT INVESTIGATION UTILIZING TIMELINE GENERATION BASED ON ENTITY QUERIES | July 2025 | October 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 19254764 | SYSTEM AND METHODS FOR UNFORGEABLE TELEMETRY IN THE PRESENCE OF CYBERATTACKS ON A COMPUTER PLATFORM | June 2025 | September 2025 | Allow | 2 | 0 | 0 | No | No |
| 19250003 | NETWORK ACTIVITY DEVIATION DETECTION AND REMEDIATION | June 2025 | August 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19249918 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19242417 | Detection of Image Injection Attacks in Mobile Document Capture Systems Using Accelerometer-Based Vibration Analysis | June 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19236472 | SYSTEMS AND METHODS FOR COUNTER-RECONNAISSANCE IN CLOUD INFRASTRUCTURE TO DISRUPT ADVERSARIAL TARGETING | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19217401 | TECHNIQUES FOR EFFECTIVE NETWORK EXPOSURE DETECTION OF PRIVATE ENDPOINTS THROUGH A CLOUD-NATIVE ROUTER | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19217383 | TECHNIQUES FOR DETECTING EFFECTIVE NETWORK EXPOSURE OF A CLOUD-NATIVE PROXY APPLIANCE UTILIZING AGENTLESS INSPECTION | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19214041 | CYBERTHREAT HUNTING AND PROTECTION BASED ON CODIFIED INDICATORS OF BEHAVIOR | May 2025 | October 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19196527 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | May 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19185322 | METHOD FOR CONSTRUCTING A VEHICLE NETWORKING INTRUSION DETECTION MODEL BASED ON FEDERATED LEARNING | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19182219 | TECHNIQUES FOR ASSESSING EXPLOITATIONS IN A RUNTIME ENVIRONMENT | April 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19172364 | SECURE MULTI-PARTY EPHEMERAL FILE TRANSFER | April 2025 | May 2025 | Allow | 1 | 0 | 0 | No | No |
| 19093823 | Defanging Malicious Electronic Files Based on Trusted User Reporting | March 2025 | October 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19116114 | COMMUNICATION APPARATUS, METHOD, SYSTEM, DEVICE, MEDIUM, ENCRYPTION SYSTEM, AND SERVER | March 2025 | November 2025 | Allow | 8 | 1 | 0 | No | No |
| 19083748 | METHODS AND SYSTEMS FOR ENHANCING A CONTEXT FOR USE IN PROCESSING A USER REQUEST | March 2025 | January 2026 | Allow | 10 | 2 | 0 | No | No |
| 19061523 | METHOD AND SYSTEM FOR DETECTING ABNORMAL NODES IN INDUSTRIAL INTERNET, AND MEDIUM AND DEVICE | February 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19048504 | TECHNIQUES FOR CYBERSECURITY EVENT CLASSIFICATION IN DATAFLOW MANAGEMENT | February 2025 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19041984 | CYBER RESILIENCE AGENTIC MESH | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19040705 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19033769 | SECURED TRANSFER MEDIUM MANAGEMENT AND GRADUATION | January 2025 | November 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 19031089 | METHODS AND SYSTEMS FOR IDENTIFYING ANOMALOUS USERS EXHIBITING OVERREACHING ACCESS PERMISSIONS TO DATA OBJECTS | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19025047 | GRAPH MODELS OF RELATIONSHIPS BETWEEN DATA STORED IN BLOCKS ON DISTRIBUTED LEDGERS THAT ARE LEARNED THROUGH MACHINE LEARNING AND PLATFORMS FOR CREATING, CATALOGING, AND STORING THE SAME | January 2025 | February 2026 | Allow | 13 | 2 | 0 | No | No |
| 19021683 | NETWORK EDGE DIGITAL TWIN FOR IOT ATTACK DETECTION | January 2025 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19020851 | INFORMATION NOTIFICATION METHOD AND INFORMATION NOTIFICATION DEVICE | January 2025 | June 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19020133 | OPTIMIZED CYBERSECURITY SYSTEM AND METHODS OF USE THEREOF | January 2025 | July 2025 | Allow | 6 | 0 | 0 | Yes | No |
| 19013980 | MULTIMODAL DATA FUSION FOR CYBERSECURITY APPLICATIONS | January 2025 | July 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19006418 | Detection and Prevention Of Adversarial Attacks Against Large Language Models | December 2024 | July 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 19000479 | URL PARAMETER VALUE ANOMALY DETECTION METHOD AND SYSTEM FOR THE SAME | December 2024 | May 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 18987001 | DETECTION ENGINE THREAT GROUPING BY CLOUD ENTITIES | December 2024 | July 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18988175 | METHODS FOR GRINDING-RESISTANT CONSENSUS IN A PROOF-OF-SPACE-BASED BLOCKCHAIN | December 2024 | January 2026 | Allow | 13 | 1 | 0 | Yes | No |
| 18964871 | SYSTEM AND METHOD FOR PASSIVE IDENTIFICATION AND DETECTION OF BOTNETS | December 2024 | June 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18964330 | DERIVED ACCESS PERMISSIONS FOR INPUTS TO ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18963186 | PROBABILISTIC EVENT LINKING | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18961639 | SECURE DEVICE COMMUNICATION USING MULTI-KEY ENCAPSULATION | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18961324 | ALARM DATA PROCESSING METHOD, APPARATUS, MEDIUM AND ELECTRONIC DEVICE | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18947397 | SYSTEMS AND METHODS FOR CYBERSECURITY RISK ASSESSMENT | November 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18946217 | Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation Platform | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18945409 | Canonicalization of Unicode Prompt Injections | November 2024 | February 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 18943284 | TECHNIQUES FOR INCIDENT RESPONSE AND STATIC ANALYSIS REPRESENTATION IN COMPUTING ENVIRONMENTS | November 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18932967 | CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUS | October 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18931982 | DATA MAINTENANCE SYSTEM, DATA MAINTENANCE METHOD, COMPUTER READABLE MEDIUM, AND DATA VERIFICATION APPARATUS | October 2024 | February 2026 | Allow | 15 | 0 | 0 | No | No |
| 18929284 | NESTED MODEL STRUCTURES FOR THE PERFORMANCE OF COMPLEX TASKS | October 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18927514 | SYSTEMS AND METHODS FOR CRYPTOGRAPHICALLY VERIFYING QUERIES | October 2024 | April 2025 | Allow | 6 | 1 | 0 | No | No |
| 18923017 | LIGHTWEIGHT INTRUSION DETECTION METHOD AND SYSTEM OF INTERNET OF VEHICLES BASED ON KNOWLEDGE DISTILLATION | October 2024 | January 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18922019 | INFORMATION PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | October 2024 | June 2025 | Allow | 8 | 2 | 0 | No | No |
| 18920106 | METHOD AND APPARATUS TO DYNAMICALLY CONTROL FACIAL ILLUMINATION | October 2024 | January 2026 | Allow | 15 | 0 | 0 | Yes | No |
| 18919358 | METHODS AND SYSTEMS FOR FRAUD CONTAINMENT | October 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18918406 | SYSTEMS AND METHODS OF ADAPTIVELY IDENTIFYING ANOMALOUS NETWORK COMMUNICATION TRAFFIC | October 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18914035 | DETECTING MALICIOUS ACTIVITY USING USER-SPECIFIC PARAMETERS | October 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18906652 | SYSTEMS AND METHODS FOR IMPLEMENTING INTERIM SECURITY POLICIES | October 2024 | December 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18901840 | SYSTEM AND METHOD OF INTEGRATED UNIQUE IDENTITY MANAGEMENT | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18895998 | TECHNOLOGIES FOR AUDITING AND MAINTAINING ACCESS TO PROTECTED DATA | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18292830 | ENCRYPTED SEAL, AND SECONDARY ENCRYPTION METHOD FOR STRIP-SHAPED DATA | September 2024 | August 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18888955 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888973 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888947 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18887807 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2024 | November 2024 | Allow | 2 | 1 | 0 | No | No |
| 18887697 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | September 2024 | December 2024 | Allow | 2 | 1 | 0 | No | No |
| 18887706 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | September 2024 | March 2025 | Allow | 6 | 2 | 0 | No | No |
| 18884552 | Email Processing for Improved Authentication Question Accuracy | September 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18882373 | METHODS AND SYSTEMS FOR VERIFYING A USER AGENT | September 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18829996 | THREAT CLASSIFICATION IN A STREAMING SYSTEM | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18829109 | SYSTEM FOR CYBERSECURITY CAMPAIGN ARTIFACT DISCOVERY AND TASKING | September 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18824956 | Secure localization method for multi-mobile robots based on network communication | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18825239 | SECURE RELAY DEVICE AND DATA TRANSMISSION RECEPTION SYSTEM | September 2024 | December 2025 | Allow | 16 | 0 | 0 | No | No |
| 18820323 | ARTIFICIAL INTELLIGENCE (AI)-BASED SYSTEM FOR DETECTING MALWARE IN ENDPOINT DEVICES USING A MULTI-SOURCE DATA FUSION AND METHOD THEREOF | August 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18843232 | CONTAINER OPERATION CONTROL METHOD AND APPARATUS | August 2024 | June 2025 | Allow | 9 | 0 | 0 | No | No |
| 18820959 | Methods and Systems for Efficient Adaptive Logging of Cyber Threat Incidents | August 2024 | December 2025 | Allow | 16 | 0 | 0 | No | No |
| 18808084 | Key Diversification in a Tracking Device Environment | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18809198 | NESTED ENCRYPTION PROTOCOL INDICATORS FOR WEB TOKENS | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18807853 | METHOD AND APPARATUS FOR DETECTING FALSE BASE STATION | August 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18807827 | METHOD, APPARATUS, DEVICE, AND MEDIUM FOR PERMISSION PROCESSING | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18798689 | SYSTEM AND METHOD FOR CYBERSECURITY RISK MANAGEMENT | August 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18798703 | PRE-TASK ASSIGNMENT TRUST EVALUATION IN DISTRIBUTED COMPUTING AND COMMUNICATION SYSTEMS | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18794676 | MICROSERVICES ANOMALY DETECTION | August 2024 | January 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18792476 | AUTOMATIC SEGMENTATION USING HIERARCHICAL TIMESERIES ANALYSIS | August 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18785419 | CLOUD DATA ATTACK SURFACE TRACKING USING GRAPH-BASED EXCESSIVE PRIVILEGE DETECTION | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18786353 | MODULAR DATA CENTER | July 2024 | March 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18785397 | DATA PROCESSING SYSTEM PERIPHERAL DEVICE MANAGEMENT USING COMPONENT CERTIFICATES | July 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18781121 | RISK EVENT DETECTION USING ACTIVITY AND GRAPH-BASED CONTEXT FOR CLOUD DATA SECURITY POSTURE MANAGEMENT | July 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18779156 | INFORMATION PROCESSING APPARATUS, METHOD FOR DISPLAYING PASSWORD STRENGTH, AND MEDIUM | July 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18778536 | SYSTEM AND METHOD FOR PROVIDING CONTRACT SUPPORT SERVICE | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18776556 | SYSTEM AND METHOD FOR FIREWALL POLICY RULE MANAGEMENT | July 2024 | July 2025 | Allow | 12 | 3 | 0 | Yes | No |
| 18770937 | METHODS AND APPARATUS FOR WTRU-TO-WTRU RELAY DISCOVERY SECURITY AND PRIVACY | July 2024 | December 2024 | Allow | 5 | 1 | 0 | No | No |
| 18728535 | A CYBER-ATTACK DETECTION AND PREVENTION SYSTEM | July 2024 | December 2025 | Allow | 17 | 1 | 0 | No | No |
| 18769927 | Data Protection with Two Password Asymmetric Encryption | July 2024 | January 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18768653 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | July 2024 | December 2025 | Abandon | 17 | 2 | 0 | No | No |
| 18767075 | REMOTE IDENTIFICATION AND MANAGEMENT OF MANNED AND UNMANNED SYSTEMS AND DEVICES | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18765759 | HARDWARE-BASED CONTROL OF PERIPHERAL DEVICES | July 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18766355 | OPERATIONS AND MAINTENANCE TECHNIQUES SUBSYSTEM FOR SECURE CLASSIFIED REMOTE ACCESS AS A SERVICE | July 2024 | March 2025 | Allow | 8 | 0 | 0 | Yes | No |
| 18765114 | Third-Party Analytic and Machine Learning Model Validation | July 2024 | March 2026 | Allow | 21 | 0 | 0 | Yes | No |
| 18762260 | DYNAMIC ACCESS CONTROL TO ELECTRONIC PATIENT RECORDS | July 2024 | January 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18759421 | Systems and Methods for Automating Processes for Remote Work | June 2024 | December 2025 | Allow | 18 | 1 | 0 | No | No |
| 18757652 | AUTO-HEALING FOR BLOCKCHAIN CONFIGURATION DRIFTS | June 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18758159 | ACCESS CONTROL POLICY FOR PROXY SERVICES | June 2024 | May 2025 | Allow | 11 | 0 | 0 | No | No |
| 18756258 | SECURITY-ENHANCED STORAGE DEVICE | June 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18752409 | METHODS AND APPARATUSES TO PROVIDE INFORMATION SECURITY TO AN ENTITY BY USING MULTIPLE CLOUD-BASED APPLICATION SERVICES | June 2024 | February 2025 | Allow | 8 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2494.
With a 24.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 40.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2494 is part of Group 2490 in Technology Center 2400. This art unit has examined 5,947 patent applications in our dataset, with an overall allowance rate of 80.9%. Applications typically reach final disposition in approximately 30 months.
Art Unit 2494's allowance rate of 80.9% places it in the 66% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2494 receive an average of 2.03 office actions before reaching final disposition (in the 62% percentile). The median prosecution time is 30 months (in the 56% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.