Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19078119 | Electronic Document Presentation Management System | March 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19034297 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | January 2025 | March 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 18985870 | DYNAMIC ORCHESTRATION-BASED AUDIO-VIDEO SECURITY PROTECTION METHOD, DEVICE AND SYSTEM | December 2024 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18863577 | METHOD FOR REMOTE GENERATION OF TWO ARBITRARY-LENGTH IDENTICAL RANDOM CRYPTOGRAPHIC KEYS WITH THE DEVICE-INDEPENDENT SECURITY USING ENTANGLED MULTI-PHOTON SOURCES OF QUANTUM LIGHT | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18892295 | CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATION | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18892283 | CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATION | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18806633 | METHOD FOR DATA PROCESSING, READABLE MEDIUM AND ELECTRONIC DEVICE | August 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18797027 | PROXY AUTONOMOUS PROTOCOL FOR BLOCKCHAIN ACCESS CONTROL | August 2024 | October 2024 | Allow | 3 | 0 | 0 | No | No |
| 18774334 | RECEIVING INFORMATION THROUGH A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK | July 2024 | January 2025 | Allow | 6 | 0 | 1 | Yes | No |
| 18770585 | CONSENT DATA PIPELINE ARCHITECTURE AND OPERATION | July 2024 | February 2025 | Allow | 8 | 0 | 0 | No | No |
| 18768151 | DEVICE PAIRING WITH OPTICAL CODES | July 2024 | April 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18766474 | SECURING ATTESTATION USING A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK | July 2024 | November 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18758378 | Apparatus for Irrefutably Identifying a Physical Item | June 2024 | December 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18756639 | SECRET SPLITTING AND METADATA STORAGE | June 2024 | February 2025 | Allow | 8 | 0 | 0 | Yes | No |
| 18756274 | SYSTEMS AND METHODS OF ENABLING BLOCKCHAIN-BASED BUILDING AUTOMATION SYSTEMS | June 2024 | February 2025 | Allow | 8 | 1 | 0 | No | No |
| 18755039 | SYSTEMS AND METHODS FOR PASSWORD SPRAYING IDENTIFICATION AND PREVENTION USING HASH SIGNATURE SEGMENTATION AND BEHAVIOR CLUSTERING ANALYSIS | June 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18752521 | EAP-TLS Authentication with Concealed User Identities and Wireless Networks | June 2024 | March 2025 | Allow | 8 | 0 | 0 | No | No |
| 18750590 | SYSTEMS AND METHODS FOR GENERATING ATTESTED DATA | June 2024 | November 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18740976 | IDENTIFYING AND ADDRESSING POTENTIAL VULNERABILITIES IN THIRD-PARTY CODE | June 2024 | August 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18673699 | DETECTING PROFILE-BASED WIRELESS MESH NODE FAILOVER IN COMMUNICATION NETWORKS | May 2024 | March 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18672626 | SEARCHABLE INDEX ENCRYPTION | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18672750 | METHODS AND APPARATUS FOR CONTROL AND DETECTION OF MALICIOUS CONTENT USING A SANDBOX ENVIRONMENT | May 2024 | July 2025 | Allow | 13 | 1 | 0 | No | No |
| 18668166 | SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION | May 2024 | December 2024 | Allow | 7 | 0 | 0 | No | No |
| 18667910 | SYSTEM FOR SECURING VERIFICATION KEY FROM ALTERATION AND VERIFYING VALIDITY OF A PROOF OF CORRECTNESS | May 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18662556 | SECURE AUTHENTICATION | May 2024 | December 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18658487 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR COMBINING BLOCKCHAIN TECHNOLOGY WITH DIGITAL TWINS | May 2024 | March 2025 | Allow | 10 | 1 | 0 | Yes | No |
| 18656443 | Systems and Methods for Protecting Elementary Bitstreams Incorporating Independently Encoded Tiles | May 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18656044 | PREVENTING FRAUD IN AGGREGATED NETWORK MEASUREMENTS | May 2024 | December 2024 | Allow | 7 | 0 | 0 | No | No |
| 18656336 | COMPUTING SYSTEM PERMISSION ADMINISTRATION ENGINE | May 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18653991 | AUTOMATICALLY COMPUTING AND IMPROVING A CYBERSECURITY RISK SCORE | May 2024 | January 2025 | Allow | 8 | 0 | 0 | No | No |
| 18655171 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | May 2024 | December 2024 | Allow | 7 | 2 | 0 | Yes | No |
| 18652559 | Enforcing a Segmentation Policy in Co-Existence with a System Firewall | May 2024 | May 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18648519 | SYSTEM AND DEVICE FOR DATA PROTECTION AND METHOD THEREOF | April 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18649734 | Visual Detection of Phishing Websites Via Headless Browser | April 2024 | May 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18648914 | FLEXIBLE FORMAT ENCRYPTION | April 2024 | March 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18648419 | SYSTEM FOR SECURED ELECTRONIC DATA ACCESS THROUGH MACHINE-LEARNING BASED ANALYSIS OF COMBINED ACCESS AUTHORIZATIONS | April 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18648125 | Information security system and method for secure data transmission among user profiles using a blockchain network | April 2024 | January 2025 | Allow | 9 | 1 | 0 | No | No |
| 18642515 | Automated System for Program Identity-Driven Program Access Control | April 2024 | November 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18640567 | SYSTEMS AND METHODS FOR BLOCKING SPOOFED TRAFFIC | April 2024 | June 2025 | Allow | 14 | 1 | 0 | No | No |
| 18638766 | AUTHENTICATION BYPASS INFRASTRUCTURE | April 2024 | November 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18637358 | DECEIVING ATTACKERS ACCESSING NETWORK DATA | April 2024 | May 2025 | Allow | 13 | 1 | 0 | No | No |
| 18635726 | CYBER SECURITY SYSTEM AND METHOD USING INTELLIGENT AGENTS | April 2024 | February 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18632591 | Security Configuration Optimizer Systems and Methods | April 2024 | May 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18626878 | METHODS, SYSTEMS, AND DEVICES FOR CONFIGURING A FEDERATED BLOCKCHAIN NETWORK | April 2024 | November 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18626043 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR DISTRIBUTING SHARES OF DIGITALLY SIGNED DATA | April 2024 | November 2024 | Allow | 7 | 0 | 0 | No | No |
| 18625058 | SCALEABLE RISK MANAGEMENT ASSESSMENT SYSTEM AND METHOD | April 2024 | November 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18622996 | CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMS | March 2024 | November 2024 | Allow | 8 | 0 | 0 | No | No |
| 18622026 | System and Method for Mining Digital Currency in a Blockchain Network | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18622728 | DATA PROTECTION IN A TRACKING DEVICE ENVIRONMENT | March 2024 | January 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18616616 | SYSTEMS AND METHODS FOR CONTENT RIGHTS PORTABILITY | March 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18694817 | METHODS, DEVICES AND SYSTEMS FOR MANAGING USER AUTHENTICATION IN IIOT ENVIRONMENTS USING HARDWARE TOKENS | March 2024 | October 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18611979 | De-Tokenization Patterns And Solutions | March 2024 | September 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18611948 | HIERARCHICAL PERMISSIONS MODEL WITHIN A DOCUMENT | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18607698 | Systems and Methods for Contextually Securing Remote Function Calls | March 2024 | December 2024 | Allow | 9 | 1 | 0 | No | No |
| 18606564 | CRYPTOGRAPHIC METHOD FOR VERIFYING DATA | March 2024 | May 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18606795 | METHOD AND SYSTEM FOR SHARING SENSOR INSIGHTS BASED ON APPLICATION REQUESTS | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18603810 | User Presence Detection for Authentication Question Generation | March 2024 | October 2024 | Allow | 7 | 1 | 0 | No | No |
| 18602523 | SYSTEMS AND METHODS FOR ESTABLISHING DATA PROVENANCE BY GENERATING ONE-TIME SIGNATURES | March 2024 | October 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18598831 | SECURE ELECTRIC VEHICLE CHARGER FOR PROVIDING CHARGING SESSION DATA TO MOBILE DEVICE AND ADDITIONAL CHARGER | March 2024 | February 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18597551 | TECHNIQUES FOR DETERMINING LEGITIMACY OF EMAIL ADDRESSES FOR ONLINE ACCESS CONTROL | March 2024 | February 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18595780 | System for Improving Data Security Through Key Management | March 2024 | December 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18593909 | CYBERSECURITY RECONNAISSANCE, ANALYSIS, AND SCORING USING DISTRIBUTED SYSTEMS | March 2024 | February 2025 | Allow | 11 | 1 | 0 | No | No |
| 18588542 | SELF-SERVICE LENDER PORTAL | February 2024 | February 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18589197 | BLOCKCHAIN-BASED ATOMIC SWAP WITH VEILED SECRET VALUE EXCHANGE | February 2024 | April 2025 | Allow | 13 | 2 | 0 | No | No |
| 18587387 | SYSTEM AND METHOD FOR SEGMENTING TRANSIT CAPABILITIES WITHIN A MULTI-CLOUD ARCHITECTURE | February 2024 | March 2025 | Allow | 12 | 1 | 0 | No | No |
| 18586201 | Tokenized Identify And Credentials Verification System | February 2024 | April 2025 | Abandon | 13 | 3 | 0 | Yes | No |
| 18583677 | METHOD FOR COMPILING FROM A HIGH-LEVEL SCRIPTING LANGUAGE TO A BLOCKCHAIN NATIVE SCRIPTING LANGUAGE | February 2024 | February 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18441288 | PREVENTING MASQUERADING SERVICE ATTACKS | February 2024 | April 2025 | Allow | 14 | 1 | 0 | No | No |
| 18440668 | SYSTEMS AND METHODS TO ENCRYPT CENTRALIZED INFORMATION ASSOCIATED WITH USERS OF A CUSTOMER DUE DILIGENCE PLATFORM BASED ON A MODIFIED KEY EXPANSION SCHEDULE | February 2024 | July 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18437347 | ADDRESSABLE SMART AGENT DATA TECHNOLOGY TO DETECT UNAUTHORIZED TRANSACTION ACTIVITY | February 2024 | April 2025 | Allow | 15 | 2 | 0 | No | No |
| 18433090 | PHISHING EMAIL CAMPAIGN IDENTIFICATION | February 2024 | June 2025 | Allow | 17 | 2 | 0 | No | No |
| 18430766 | PERSISTENT LOGIN | February 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18428770 | SYSTEMS AND METHODS FOR CONNECTING A PUBLIC DEVICE TO A PRIVATE DEVICE WITH PRE-INSTALLED CONTENT MANAGEMENT APPLICATIONS | January 2024 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18427483 | SYSTEMS AND METHODS FOR MULTI-SERVER QUANTUM SESSION AUTHENTICATION | January 2024 | May 2025 | Abandon | 16 | 1 | 0 | No | No |
| 18424361 | TRANSPARENT SHORT-RANGE WIRELESS DEVICE FACTOR IN A MULTI-FACTOR AUTHENTICATION SYSTEM | January 2024 | May 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18417915 | METHOD AND SYSTEM FOR SECURING ACCESS TO USER DATA DURING PHISHING DETECTION | January 2024 | March 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18414349 | PROTECTING COMMERCIAL OFF-THE-SHELF PROGRAM BINARIES FROM PIRACY USING HARDWARE ENCLAVES | January 2024 | April 2025 | Allow | 15 | 1 | 0 | No | No |
| 18411982 | CRYPTOCURRENCY BASED MALWARE AND RANSOMWARE DETECTION SYSTEMS AND METHODS | January 2024 | April 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18411698 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR AUTHENTICATION AND AUTHORIZATION OF NETWORKED DATA TRANSACTIONS | January 2024 | December 2024 | Allow | 11 | 1 | 0 | No | No |
| 18409538 | SOURCE CODE CLUSTERING FOR AUTOMATICALLY IDENTIFYING FALSE POSITIVES GENERATED THROUGH STATIC APPLICATION SECURITY TESTING | January 2024 | October 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18407352 | ASSOCIATING MULTIPLE USER ACCOUNTS WITH A CONTENT OUTPUT DEVICE | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18405094 | Cryptographic method for verifying data | January 2024 | January 2025 | Allow | 12 | 1 | 0 | No | No |
| 18403295 | Method And System For Improving Coupling And Cohesion Of At Least One Educational Program | January 2024 | January 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18402662 | AI-DRIVEN DEFENSIVE CYBERSECURITY STRATEGY ANALYSIS AND RECOMMENDATION SYSTEM | January 2024 | September 2024 | Allow | 9 | 0 | 0 | No | No |
| 18401368 | Blockchain-based Intrusion Detection System for Railway Signals | December 2023 | August 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18398453 | METHOD OF DETECTING ANDROID MALWARE BASED ON HETEROGENEOUS GRAPH AND APPARATUS THEREOF | December 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18391457 | TRUSTED-CODE GENERATED REQUESTS | December 2023 | September 2024 | Allow | 9 | 0 | 0 | No | No |
| 18541627 | RECEIVING INFORMATION THROUGH A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK | December 2023 | April 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18540943 | MULTI-PARTY PRIVACY COMPUTING METHOD AND DEVICE BASED ON SEMI-TRUSTED HARDWARE | December 2023 | April 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18570187 | ENHANCED LOGIN PROCESSES USING PROPRIETARY SECURITY AND PROTOCOL FOR SHARING AND MANAGING PERSONAL INFORMATION | December 2023 | May 2025 | Allow | 17 | 0 | 0 | No | No |
| 18536736 | Automated Identification of Malware Families Based on Shared Evidences | December 2023 | August 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18534683 | SYSTEMS AND METHODS FOR VEHICLE ENCRYPTED COMMUNICATION FOR VEHICLE-ROAD-CLOUD COLLABORATION | December 2023 | April 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18531886 | SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE | December 2023 | January 2025 | Allow | 14 | 1 | 0 | No | No |
| 18532261 | POINT-OF-SERVICE DIGITAL IDENTITY VERIFICATION DEVICE | December 2023 | August 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18529879 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM FOR PROCESSING REGISTRATION REQUESTS | December 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18528460 | SYSTEMS AND METHODS FOR TOKENIZATION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) AND PERSONAL HEALTH INFORMATION (PHI) | December 2023 | July 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18526398 | METHODS AND SYSTEMS FOR AUTOMATICALLY PRESERVING A USER SESSION ON A PUBLIC ACCESS SHARED COMPUTER | December 2023 | September 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18566566 | METHOD FOR VERIFIABLY DOCUMENTING INFORMATION | December 2023 | April 2025 | Abandon | 17 | 2 | 0 | No | No |
| 18521868 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD FOR MULTI-LINK SECURED RETRANSMISSIONS | November 2023 | November 2024 | Allow | 12 | 2 | 0 | No | No |
| 18521004 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD FOR MULTI-LINK SECURED RETRANSMISSIONS | November 2023 | August 2024 | Allow | 8 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2497.
With a 28.9% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2497 is part of Group 2490 in Technology Center 2400. This art unit has examined 7,201 patent applications in our dataset, with an overall allowance rate of 88.4%. Applications typically reach final disposition in approximately 26 months.
Art Unit 2497's allowance rate of 88.4% places it in the 87% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.
Applications in Art Unit 2497 receive an average of 1.57 office actions before reaching final disposition (in the 29% percentile). The median prosecution time is 26 months (in the 69% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.