Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19304982 | SYSTEMS AND METHODS FOR REAL-TIME GENERATION AND EXECUTION OF COMPUTER-EXECUTABLE INVESTIGATIVE QUERIES IN A CYBERSECURITY EVENT DETECTION AND RESPONSE PLATFORM | August 2025 | February 2026 | Allow | 5 | 0 | 0 | No | No |
| 19287102 | SYSTEM AND METHOD FOR UTILIZING AN AI BROWSER AGENT IN IDENTITY DISCOVERY AND MANAGEMENT | July 2025 | November 2025 | Allow | 4 | 0 | 0 | No | No |
| 19181802 | SECURE CROSS-CHAIN ATOMIC SWAPS | April 2025 | January 2026 | Allow | 9 | 1 | 0 | No | No |
| 19076729 | ADVANCED ENCRYPTION STANDARD WITH FREQUENT S-BOX UPDATE AND FUSION FUNCTION APPLICATION | March 2025 | July 2025 | Allow | 4 | 1 | 0 | No | No |
| 18880027 | END TO END ENCRYPTION WITH ROAMING CAPABILITIES | December 2024 | October 2025 | Allow | 9 | 2 | 0 | No | No |
| 18975690 | UNIFIED THREAT MANAGEMENT AND MITIGATION | December 2024 | April 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18957307 | ARTIFICIAL INTELLIGENCE CHATBOT FOR DATA PLATFORM SECURITY ANALYSIS | November 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18957354 | Privacy-Preserving Biometric Authentication Using Asymmetrically Loaded Servers | November 2024 | April 2025 | Allow | 5 | 1 | 0 | No | No |
| 18945631 | METHOD AND SYSTEM FOR PRESERVING PRIVACY OF TELEMATIC DATA | November 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18943149 | Methods and Systems for Efficient Cybersecurity Policy Enforcement on Network Communications | November 2024 | February 2025 | Allow | 3 | 0 | 0 | No | No |
| 18940631 | TECHNOLOGIES FOR AUTHENTICATIONS VIA WEB COMPONENTS | November 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18938151 | ASSOCIATING DECENTRALIZED IDENTIFIERS WITH ONE OR MORE DEVICES | November 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18934095 | SYSTEM AND METHOD FOR A TRUST EVALUATION AND SHARING SYSTEM | October 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18919222 | SECURITY GROUP RESOLUTION AT INGRESS ACROSS VIRTUAL NETWORKS | October 2024 | March 2026 | Allow | 17 | 0 | 0 | No | No |
| 18918795 | METHODS AND APPARATUS FOR VISUALIZATION OF MACHINE LEARNING MALWARE DETECTION MODELS | October 2024 | March 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18917690 | SYSTEM AND METHOD FOR DETERMINING CODE REACHABILITY IN A NETWORKED COMPUTING ENVIRONMENT | October 2024 | January 2025 | Allow | 3 | 1 | 0 | No | No |
| 18912666 | SYSTEM AND METHOD FOR PROVIDING PEER-TO-PEER VIRTUAL PRIVATE NETWORK CONNECTIONS IN MULTI-GATEWAY ENTERPRISE NETWORKS | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18909465 | NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHOD | October 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18890942 | SYSTEMS AND METHODS FOR ORCHESTRATING APPLICATION USE WHILE PREVENTING UNAUTHORIZED DATA SHARING | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18892215 | Data Obfuscation Using Encoder-Multi-Decoder Architecture | September 2024 | March 2025 | Allow | 5 | 1 | 0 | No | No |
| 18890223 | HOMOMORPHIC ENCRYPTION IN A HEALTHCARE NETWORK ENVIRONMENT, SYSTEM AND METHODS | September 2024 | December 2025 | Allow | 15 | 4 | 0 | No | No |
| 18888599 | FACE IDENTIFICATION SYSTEM AND METHOD FOR IDENTIFYING FACE IMAGE | September 2024 | April 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18886034 | CLASSIFYING A SOURCE OF A LOGIN ATTEMPT TO A USER ACCOUNT USING MACHINE LEARNING | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18885510 | CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATION | September 2024 | December 2024 | Allow | 3 | 1 | 0 | No | No |
| 18885474 | CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATION | September 2024 | December 2024 | Allow | 3 | 1 | 0 | No | No |
| 18827391 | METHODS AND SYSTEMS FOR ASSET RISK DETERMINATION AND UTILIZATION FOR THREAT MITIGATION | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18824228 | KEY MANAGEMENT METHOD AND RELATED DEVICE | September 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18823115 | INTEGRATED PRIVATE CLOUD AI PLATFORM | September 2024 | January 2026 | Allow | 17 | 0 | 0 | No | No |
| 18821048 | QUERY INFORMATION PROCESSING METHOD USING FULLY HOMOMORPHIC ENCRYPTED DATABASE WITH FIELD EXPANSION AND COMPUTING DEVICE FOR PERFORMING THE SAME | August 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18842723 | REQUESTING A CERTIFICATE IN A DOCUMENTED MANNER USING A REGISTRATION POINT | August 2024 | March 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18816546 | DYNAMIC BYPASS | August 2024 | February 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18815573 | COMPUTER-IMPLEMENTED AUTHENTICATION PLATFORM | August 2024 | December 2024 | Allow | 4 | 1 | 0 | No | No |
| 18841316 | SECURE AND PRIVACY PRESERVING MESSAGE ROUTING SYSTEM | August 2024 | February 2025 | Allow | 6 | 0 | 0 | No | No |
| 18809959 | COMMUNICATION SYSTEM, SERVER, AND FUNCTION EXECUTING DEVICE | August 2024 | October 2025 | Allow | 14 | 0 | 0 | No | No |
| 18806918 | TECHNIQUES FOR JUST-IN-TIME CONTEXT BASED PERMISSION ACCESS OF COMPUTING RESOURCES | August 2024 | January 2026 | Allow | 17 | 2 | 0 | No | No |
| 18805624 | On-Demand Private Network Creation and Management | August 2024 | October 2025 | Allow | 14 | 0 | 0 | No | No |
| 18806184 | METHOD AND SYSTEM FOR COLLECTING CONSUMPTION DATA MEASURED BY SMART METERS | August 2024 | June 2025 | Allow | 10 | 1 | 0 | No | No |
| 18799237 | ENHANCEMENT OF MUD FILES BASED ON BEHAVIORAL ANALYSIS | August 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18796117 | LOW LATENCY AND REDUNDANT PROOF OF POSSESSION FOR CONTENT SUBSCRIPTION | August 2024 | January 2026 | Allow | 18 | 0 | 0 | No | No |
| 18794036 | Cyber Protection Automation with Secure Physical Vault | August 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18835737 | ROUTING-POLICY-BASED GLOBAL USER COMPLIANCE ACCESS METHOD AND APPARATUS | August 2024 | November 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18790563 | METHOD AND SYSTEM FOR MANAGING GLOBAL CONTROL GROUP (GCG) | July 2024 | June 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18788296 | SECURED ONBOARDING OF TEMPORARILY TRANSFERRED ENDPOINT DEVICES | July 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18833841 | PRECACHING-BASED AUTHENTICATION METHOD AND DEVICE IN WIRELESS POWER TRANSMISSION SYSTEM | July 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18778425 | MULTI-TIER TOKENIZATION WITH LONG TERM TOKEN | July 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18775540 | ANOMALY DETECTION USING CHANGE BLOCKS AND DISK EXTENTS | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18774753 | SERVER AUTHENTICITY VERIFICATION USING A CHAIN OF NESTED PROOFS | July 2024 | February 2026 | Allow | 19 | 0 | 0 | No | No |
| 18773300 | ENFORCING GRANULAR ACCESS CONTROL POLICY | July 2024 | January 2026 | Allow | 18 | 1 | 0 | Yes | No |
| 18708806 | PROCESS FOR SEARCHING FOR SENSITIVE DATA IN AT LEAST ONE DATA PACKET, ASSOCIATED DEVICE AND SYSTEM | July 2024 | March 2026 | Allow | 22 | 2 | 0 | No | No |
| 18770575 | CRYPTOGRAPHIC KEY MANAGEMENT AND TRANSFER | July 2024 | February 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18770199 | SYSTEM AND METHOD FOR SECURELY SHARING CRYPTOGRAPHIC MATERIAL | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18769845 | TOKEN MANAGEMENT SYSTEM AND METHOD | July 2024 | January 2026 | Allow | 18 | 1 | 0 | Yes | No |
| 18764409 | SYSTEM AND METHOD USING TRUSTED AUTHORIZATION MECHANISM BASED ON POLYNOMIAL COMMITMENT MULTIPLE ACCESS FOR DATA EXCHANGE | July 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18763615 | INTELLIGENT AND SECURE PACKET CAPTURES FOR CLOUD SOLUTIONS | July 2024 | November 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18763526 | SECURITY DEVICE AND OPERATION METHOD THEREOF | July 2024 | September 2025 | Allow | 15 | 0 | 0 | No | No |
| 18761268 | Policy-based Data Store Access Authorization | July 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18758510 | TECHNIQUES FOR DETECTING CLOUD IDENTITY MISUSE BASED ON RUNTIME CONTEXT AND STATIC ANALYSIS | June 2024 | September 2024 | Allow | 2 | 0 | 0 | No | No |
| 18725455 | METHOD AND SYSTEM FOR GENERATING DIGITAL SIGNATURES USING UNIVERSAL COMPOSITION | June 2024 | November 2025 | Allow | 16 | 0 | 0 | No | No |
| 18753260 | SYSTEM AND METHOD FOR UPDATING ACCESS TOKENS IN AN INFORMATION PROCESSING APPARATUS | June 2024 | December 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18749928 | PROTECTION OF CRYPTOGRAPHIC PARAMETERS USED IN CRYPTOGRAPHIC PROCESSING | June 2024 | February 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18749324 | RISK ASSESSMENT FOR NETWORK ACCESS CONTROL THROUGH DATA ANALYTICS | June 2024 | February 2026 | Allow | 19 | 1 | 0 | No | No |
| 18720685 | METHOD SECURED AGAINST SIDE-CHANNEL ATTACKS PERFORMING A CRYPTOGRAPHIC ALGORITHM COMPRISING A POLYNOMIAL OPERATION | June 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18742305 | BLOCKCHAIN-BASED PLATFORM-INDEPENDENT PERSONAL PROFILES | June 2024 | February 2026 | Allow | 20 | 2 | 0 | Yes | No |
| 18741748 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR USING SERVICE COMMUNICATION PROXY (SCP) TO OFFLOAD VERIFICATION OF CONSUMER NETWORK FUNCTION (NF) SECURITY CERTIFICATES | June 2024 | November 2025 | Allow | 17 | 0 | 0 | No | No |
| 18740200 | SECURITY PROTOCOL FOR PAIRING COLLOCATED USERS | June 2024 | September 2025 | Allow | 15 | 2 | 0 | No | No |
| 18740069 | SYSTEMS AND METHOD OF CONTEXTUAL DATA MASKING FOR PRIVATE AND SECURE DATA LINKAGE | June 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18738356 | GARBLING SCHEME-BASED SECURE MULTI-PARTY COMPUTATION (MPC) | June 2024 | January 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18738179 | METHOD AND SYSTEM FOR AUTHENTICATING A SECURE CREDENTIAL TRANSFER TO A DEVICE | June 2024 | May 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18735142 | SYSTEM AND METHOD FOR EXECUTING MACHINE LEARNING MODEL INFERENCE | June 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18715748 | METHOD FOR GENERATING AN INDEPENDENT BIT SEQUENCE | June 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18731017 | SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEM | May 2024 | April 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18678569 | MANAGING INFERENCE MODELS IN VIEW OF RECONSTRUCTABILITY OF SENSITIVE INFORMATION | May 2024 | December 2025 | Allow | 19 | 0 | 0 | No | No |
| 18678718 | COMPUTER VIRUS INTERCEPTION METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT | May 2024 | September 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18679367 | SECURE DYNAMIC THRESHOLD SIGNATURE SCHEME EMPLOYING TRUSTED HARDWARE | May 2024 | September 2025 | Allow | 15 | 1 | 0 | No | No |
| 18672353 | Methods and Systems for Efficient Cybersecurity Policy Enforcement on Network Communications | May 2024 | August 2024 | Allow | 3 | 0 | 0 | No | No |
| 18671693 | SECURING AUTHENTICATION FLOWS USING A DECENTRALIZED IDENTIFIER | May 2024 | April 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18670823 | AUTHENTICATED ENCRYPTION APPARATUS, AUTHENTICATED DECRYPTION APPARATUS, AUTHENTICATED ENCRYPTION SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | May 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18670358 | RADIO AUTHENTICATION AS ROOT OF TRUST FOR TRANSPORT LAYER SECURITY | May 2024 | March 2026 | Allow | 21 | 0 | 0 | No | No |
| 18668697 | AUTOMATICALLY DETECTING AUTHORIZED REMOTE ADMINISTRATION SESSIONS IN A NETWORK MONITORING SYSTEM | May 2024 | September 2025 | Allow | 16 | 3 | 0 | Yes | No |
| 18667434 | METHOD AND DEVICE FOR PROVING ORIGINALITY OF CREATIVE DESIGN IN COMMUNICATION SYSTEM | May 2024 | July 2024 | Allow | 2 | 0 | 0 | No | No |
| 18664515 | INTERWORKING BETWEEN IOT SERVICE LAYER SYSTEMS AND DISTRIBUTED LEDGER SYSTEMS | May 2024 | May 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18665246 | GENERATING KEYS USING CONTROLLED CORRUPTION IN COMPUTER NETWORKS | May 2024 | June 2025 | Abandon | 13 | 0 | 1 | No | No |
| 18664216 | CONTENT ACTIVATION VIA INTERACTION-BASED AUTHENTICATION, SYSTEMS AND METHOD | May 2024 | January 2026 | Allow | 21 | 2 | 0 | Yes | No |
| 18710064 | COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, METHOD, AND PROGRAM | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18662689 | DETECTING MATCHING CLIENT DEVICES BASED ON LOCATION DATA | May 2024 | August 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18662297 | SUBSTANTIATING A COMPLIANCE STANDARD WITH SECONDARY EVIDENCE | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18660250 | DETECTING APPARATUS OF AVOID TYPE MALICIOUS CODE FOR VIRTUALIZATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE USING INTEGRATED FEATURES | May 2024 | October 2025 | Allow | 17 | 0 | 0 | No | No |
| 18661549 | SYSTEMS AND METHODS FOR ENCRYPTING DATA | May 2024 | August 2024 | Allow | 3 | 0 | 0 | No | No |
| 18660989 | Decision Engine Consistency Verification System | May 2024 | February 2026 | Allow | 21 | 1 | 0 | No | No |
| 18658736 | METHOD AND SYSTEM FOR CONFIDENTIAL COMPUTING | May 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18657350 | System And Method For Managing Exception Request Blocks In A Blockchain Network | May 2024 | December 2025 | Allow | 19 | 1 | 0 | No | No |
| 18655858 | ONLINE PURCHASE AUTOFILL PLUG-IN | May 2024 | June 2025 | Allow | 13 | 2 | 0 | Yes | No |
| 18654448 | SOVEREIGN DATA CENTER INCOMING DATA MANAGEMENT | May 2024 | December 2025 | Allow | 19 | 0 | 0 | No | No |
| 18653362 | Hybrid Cryptography Virtual Private Networks | May 2024 | December 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18706457 | SELF-ORGANIZED MESH NETWORK | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18648692 | METHOD AND SYSTEM FOR EVALUATING INDIVIDUAL AND GROUP CYBER THREAT AWARENESS | April 2024 | March 2026 | Allow | 22 | 2 | 0 | No | No |
| 18649820 | SYSTEM SUPPORTING OPERATIONS ON SECURELY COMMINGLING SELF-GOVERNING DATA SETS FROM A PLURALITY OF PUBLISHERS | April 2024 | August 2025 | Allow | 16 | 0 | 0 | No | No |
| 18647363 | SEAMLESS NETWORK CONFIDENTIALITY FOR A CONTAINERIZED APPLICATION ON EDGE INFRASTRUCTURE | April 2024 | September 2025 | Allow | 17 | 0 | 0 | No | No |
| 18647565 | SYSTEM AND PROCESS FOR PROVIDING NETWORK INTRUSION DETECTION | April 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18647422 | RULES GENERATION TO PRIORITIZE COMPUTER NETWORK DEVICES | April 2024 | February 2025 | Allow | 10 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2495.
With a 24.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 34.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2495 is part of Group 2490 in Technology Center 2400. This art unit has examined 5,843 patent applications in our dataset, with an overall allowance rate of 82.3%. Applications typically reach final disposition in approximately 29 months.
Art Unit 2495's allowance rate of 82.3% places it in the 72% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.
Applications in Art Unit 2495 receive an average of 2.00 office actions before reaching final disposition (in the 59% percentile). The median prosecution time is 29 months (in the 61% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.