Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19238157 | ANALYSIS AND RIGHTS MANAGEMENT OF DISASSOCIATED SPLINTERED DATA | June 2025 | September 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18851672 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, SERVER, BLOCK CHAIN NODE, AND PROGRAM | June 2025 | March 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 19174560 | IDENTIFYING MATCHING VIRTUAL RESOURCES | April 2025 | June 2025 | Allow | 3 | 0 | 0 | No | No |
| 19096043 | DIGITAL ASSET MANAGEMENT | March 2025 | September 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18974123 | SYSTEM AND METHOD FOR SCANNING PRIVATE CODE AND CI/CD REGISTRIES | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18859887 | METHODS AND APPARATUSES FOR DETECTING AND LOCALIZING FAULTS USING MACHINE LEARNING MODELS | October 2024 | January 2026 | Allow | 15 | 0 | 0 | Yes | No |
| 18923095 | SYSTEMS AND METHODS FOR CONTEXTUAL ALERT ENRICHMENT IN COMPUTING INFRASTRUCTURE AND REMEDIATION THEREOF | October 2024 | October 2025 | Allow | 12 | 2 | 0 | No | No |
| 18910150 | Method and device for controlling the execution of at least one action of an object connected in a communication network | October 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18909635 | EMBEDDED RESOURCE MANAGEMENT PLATFORM | October 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18895230 | BLOCKCHAIN TRANSACTIONS INCLUDING PORTIONS OF CODE IN DIFFERENT LANGUAGES FOR COMPLEX VALIDATION | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18893670 | Mutually Authenticated ECDHE Key Exchange for a Device and a Network Using Multiple PKI Key Pairs | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18888661 | PUF APPLICATIONS IN MEMORIES | September 2024 | February 2026 | Allow | 16 | 1 | 0 | No | No |
| 18886833 | PUF-PROTECTED PSEUDO-HOMOMORPHIC METHODS TO GENERATE SESSION KEYS | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18830111 | MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD | September 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18823271 | DIGITAL ASSET MANAGEMENT | September 2024 | November 2024 | Allow | 3 | 0 | 0 | No | No |
| 18813195 | METHODS AND SYSTEMS FOR DETECTING DENIAL OF SERVICE ATTACKS ON A NETWORK | August 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18811488 | INCREMENTAL ENRICHMENT OF THREAT DATA | August 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18808778 | SYSTEMS AND METHODS FOR END POINT INTEGRATION AND MAPPING | August 2024 | January 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18806828 | REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMS | August 2024 | January 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18801261 | DYNAMIC TRAFFIC PRIORITIZATION ACROSS DATA CENTERS | August 2024 | January 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18789389 | Identifying Atypical Activity Involving an Entity in a Computer System | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18776050 | SYSTEM AND METHOD OF MULTI-ROUND TOKEN DISTRIBUTION USING A BLOCKCHAIN NETWORK | July 2024 | December 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18769267 | SECURITY INTEGRATION FOR CLOUD SERVICES | July 2024 | November 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18769344 | BLOCKCHAIN FOR GENERAL COMPUTATION | July 2024 | June 2025 | Allow | 11 | 1 | 0 | No | No |
| 18767953 | SECURITY ANALYSIS METHOD AND SYSTEM BASED ON PROTOCOL STATE | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18762403 | AUTHENTICATION OF USERS UTILIZING BIOMETRIC DATA IN A NON-CENTRALIZED COMPUTER SYSTEM | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18759366 | RANGE CONSTRAINED DEVICE CONFIGURATION | June 2024 | January 2026 | Abandon | 18 | 2 | 0 | Yes | No |
| 18724674 | METHOD, APPARATUS AND DEVICE FOR SECURE DATA TRANSMISSION | June 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18756159 | Executing Digital Signature Operations In A Secure Element Platform Runtime Environment | June 2024 | January 2026 | Allow | 19 | 0 | 0 | No | No |
| 18753432 | DYNAMICALLY ENFORCING SECURITY POLICIES ON CLIENT DEVICES USING A DEVICE IDENTITY ENTITY AND A SECURITY POLICY ENFORCEMENT ENTITY | June 2024 | May 2025 | Allow | 10 | 1 | 0 | Yes | No |
| 18752011 | SYSTEM AND METHOD FOR SECURE CLOUD FPGA DEPLOYMENT | June 2024 | September 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18750179 | HEALTH CARE INFORMATION SYSTEM PROVIDING ADDITIONAL DATA FIELDS IN PATIENT DATA | June 2024 | May 2025 | Allow | 11 | 1 | 0 | No | No |
| 18749865 | INSTRUCTION TO ACCELERATE CRYPTOGRAPHIC PROCESSING | June 2024 | January 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18742570 | SOFTWARE RELEASE TRACKING AND LOGGING | June 2024 | June 2025 | Allow | 12 | 1 | 0 | No | No |
| 18740389 | METHOD OF ENABLING DIGITAL MUSIC CONTENT TO BE DOWNLOADED TO AND USED ON A PORTABLE WIRELESS COMPUTING DEVICE | June 2024 | October 2025 | Allow | 16 | 2 | 0 | No | No |
| 18740080 | DECENTRALIZED CONSENSUS NETWORK | June 2024 | February 2025 | Allow | 8 | 1 | 0 | No | No |
| 18738422 | SECURE CREDENTIALING SYSTEMS AND METHODS | June 2024 | September 2025 | Allow | 15 | 1 | 0 | No | No |
| 18732987 | SYSTEM AND METHOD FOR SECURE ELECTRONIC DATA TRANSFER | June 2024 | February 2025 | Allow | 8 | 0 | 0 | Yes | No |
| 18732294 | SYNTHESIZING USER TRANSACTIONAL DATA FOR DE-IDENTIFYING SENSITIVE INFORMATION | June 2024 | March 2025 | Allow | 9 | 1 | 0 | No | No |
| 18679611 | PRIVACY PARAMETER RECYCLING DIFFERENTIAL PRIVACY | May 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18679186 | DNS AUTOMATED INTELLIGENCE | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18678988 | COMMUNICATION METHOD FOR QUANTUM SECURITY AND COMMUNICATION DEVICE SUPPORTING THE SAME | May 2024 | October 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18675754 | SECURE DOCUMENT STORAGE SYSTEM | May 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18712800 | INFORMATION PROCESSING DEVICE AND KEY MANAGEMENT DEVICE | May 2024 | January 2026 | Allow | 20 | 1 | 0 | No | No |
| 18710567 | CORRELATING REMOTE ATTESTATION QUOTES WITH A VIRTUALIZED NETWORK FUNCTION (VNF) RESOURCE ALLOCATION EVENT | May 2024 | February 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18665419 | THIRD-PARTY PRIVATE SET DIFFERENCE | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18663842 | BLOCKCHAIN-BASED AUTHENTICATION SYSTEM AND METHOD | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18662434 | KMS DEDICATED HSM DESIGN (CLAIMING OWNERSHIP) | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18661021 | Secure Intrusive and Non-Intrusive Real-Time Diagnostics Across Secure Perimeters | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18660978 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR HIGHLY SECURE, HIGH SPEED ENCRYPTION AND TRANSMISSION OF DATA | May 2024 | May 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18709089 | COMMUNICATION SYSTEM, TRANSMISSION APPARATUS, RECEPTION APPARATUS, AND METHOD AND PROGRAM THEREOF | May 2024 | March 2026 | Abandon | 22 | 1 | 0 | No | No |
| 18660104 | PHISHING URL DETECTION USING TRANSFORMERS | May 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18659987 | LOW LATENCY METADATA DECRYPTION USING HASH AND PSEUDORANDOM FUNCTIONS | May 2024 | January 2026 | Allow | 21 | 0 | 0 | No | No |
| 18656000 | Internal Storage In Cloud Disk To Support Encrypted Hard Drive And Other Stateful Features | May 2024 | June 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18651810 | METHOD FOR PAIRING A CONTENT PROVIDER SYSTEM AND A RECEIVING DEVICE, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES | May 2024 | February 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18651671 | DATA COMPRESSION WITH INTRUSION DETECTION | April 2024 | April 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18648504 | SPLIT KEY ARCHITECTURE FOR FACILITATING AUTHENTICATION BETWEEN AN IMPLANTED MEDICAL DEVICE AND AN EXTERNAL DEVICE | April 2024 | August 2025 | Allow | 16 | 2 | 0 | No | No |
| 18648813 | SYSTEMS AND METHODS FOR PROCESSING REQUESTS FOR ACCESS | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18645055 | EFFICIENT TOKEN PROVISIONING SYSTEM AND METHOD | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18645206 | Monitoring The Usage Of An Application At An Edge Device | April 2024 | October 2025 | Allow | 18 | 2 | 0 | No | No |
| 18642244 | AUGMENTED-REALITY EXPERIENCE CONTROL THROUGH NON-FUNGIBLE TOKEN | April 2024 | October 2025 | Allow | 18 | 3 | 0 | No | No |
| 18640510 | NETWORK DEVICE AND DATA DECRYPTION METHOD | April 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18638603 | DCF-DRIVEN ADAPTIVE SECURITY POLICIES | April 2024 | September 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18638412 | BIOMETRY WITH CHALLENGE RESPONSE PAIR MECHANISM | April 2024 | February 2026 | Allow | 22 | 1 | 1 | No | No |
| 18637168 | ATM INTEGRITY MONITOR (AIM) SYSTEM AND METHOD FOR DETECTING CYBER ATTACKS ON ATMS NETWORKS | April 2024 | February 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18635801 | REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMS | April 2024 | September 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18636001 | REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMS | April 2024 | June 2025 | Allow | 14 | 2 | 0 | No | No |
| 18632837 | MULTIPLE-FACTOR AUTHENTICATION | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18633023 | MEDIA DATA ENCRYPTION, AND MEDIA DATA PLAYBACK | April 2024 | August 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18631792 | TECHNIQUES TO CONTROL APPLETS FOR CONTACTLESS CARDS | April 2024 | September 2025 | Allow | 17 | 2 | 0 | No | No |
| 18631208 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION INTEGRATION ACROSS DISPARATE INFORMATION SYSTEMS | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18626323 | SYSTEMS AND METHODS FOR IN-PROCESS URL CONDEMNATION | April 2024 | March 2025 | Allow | 11 | 0 | 0 | No | No |
| 18626215 | QUICK ACCESS CONTENT SEARCH IN A WORKSPACE | April 2024 | August 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18625414 | DATA INTEGRITY VALIDATION VIA DEGENERATE KEYS | April 2024 | July 2025 | Allow | 15 | 1 | 0 | No | No |
| 18624664 | SYSTEMS AND METHODS FOR AUTO-ESTABLISHING SECURE CONNECTIONS FOR INTERRUPTED DATA TRANSMISSIONS | April 2024 | July 2025 | Allow | 16 | 0 | 0 | No | No |
| 18623679 | SECURE TRANSMISSION OF ELECTRONIC HEALTH RECORDS VIA BLOCKCHAIN | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18620364 | PROTECTION OF DATA KEYS USED IN CRYPTOGRAPHIC PROCESSING | March 2024 | January 2026 | Allow | 22 | 1 | 0 | No | No |
| 18620485 | INTERNET OF THINGS SECURITY WITH MULTI-PARTY COMPUTATION (MPC) | March 2024 | April 2025 | Allow | 13 | 1 | 0 | No | No |
| 18618479 | PRIVACY CONTROL GEOFENCING | March 2024 | December 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18696264 | AUTHENTICATION OF LOGIC CIRCUITRY PACKAGES | March 2024 | December 2025 | Allow | 20 | 2 | 0 | No | No |
| 18617288 | AUTHENTICATION OF DEVICE CONFIGURATIONS FOR AUTHENTICATED DEVICES | March 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18609114 | PERIMETER OFFLINE SECURE EXCHANGE OF ACCESS CONTROL TOKEN | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18609752 | METHOD AND SYSTEM FOR ONLINE THIRD-PARTY AUTHENTICATION OF IDENTITY ATTRIBUTES | March 2024 | June 2025 | Allow | 15 | 2 | 0 | No | No |
| 18604001 | DETECTION AND PREVENTION OF LOGIN ATTACKS | March 2024 | February 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18603700 | Virtual Environment Type Validation For Policy Enforcement | March 2024 | July 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18600767 | ENCRYPTED CACHE PROTECTION | March 2024 | March 2025 | Allow | 12 | 0 | 0 | Yes | No |
| 18598104 | Image Sensor, Method and Host | March 2024 | November 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18598105 | Computer-Implemented System for Comprehensive Cybersecurity Threat Modeling and Analysis | March 2024 | July 2025 | Allow | 17 | 0 | 0 | No | No |
| 18597093 | SYSTEMS, METHODS, AND MEDIA FOR GENERATING AND USING A MULTI-SIGNATURE TOKEN FOR ELECTRONIC COMMUNICATION VALIDATION | March 2024 | March 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18595850 | SYMMETRIC ENCRYPTION FOR PRIVATE SMART CONTRACTS AMONG MULTIPLE PARTIES IN A PRIVATE PEER-TO-PEER NETWORK | March 2024 | April 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18596253 | CENTRALIZED AND DECENTRALIZED INDIVIDUALIZED MEDICINE PLATFORM | March 2024 | November 2025 | Allow | 20 | 0 | 0 | No | No |
| 18689259 | SECURITY IN RELATION TO A MALICIOUSLY CONTROLLED RECEIVER | March 2024 | July 2025 | Allow | 17 | 0 | 0 | No | No |
| 18595299 | SYSTEMS AND METHODS FOR USE IN SECURING DIGITAL IDENTITIES FOR USER AUTHENTICATION | March 2024 | November 2025 | Allow | 20 | 1 | 0 | No | No |
| 18593243 | Authentication and Control of Encryption Keys | March 2024 | February 2025 | Allow | 11 | 0 | 0 | Yes | No |
| 18592723 | SECURITY SYSTEM, DEVICE, AND METHOD FOR PROTECTING CONTROL SYSTEMS | March 2024 | December 2025 | Allow | 21 | 1 | 0 | No | No |
| 18590920 | TECHNIQUES FOR SINGLE ROUND MULTI-PARTY COMPUTATION FOR DIGITAL SIGNATURES | February 2024 | April 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18589125 | APPARATUSES, METHODS, AND SYSTEMS FOR INSTRUCTIONS FOR USAGE RESTRICTIONS CRYPTOGRAPHICALLY TIED WITH DATA | February 2024 | October 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18588059 | BIOMETRIC ACCESS SENSITIVITY | February 2024 | July 2025 | Allow | 17 | 2 | 0 | No | No |
| 18588859 | ELECTRONIC DEVICE AND METHOD FOR PREVENTING NON-FUNGIBLE TOKEN PLAGIARISM IN ELECTRONIC DEVICE | February 2024 | September 2025 | Allow | 19 | 0 | 0 | No | No |
| 18587250 | SYSTEMS AND METHODS FOR ENSURING DATA SECURITY IN THE TREATMENT OF DISEASES AND DISORDERS USING DIGITAL THERAPEUTICS | February 2024 | November 2025 | Allow | 21 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2498.
With a 32.7% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 36.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2498 is part of Group 2490 in Technology Center 2400. This art unit has examined 4,251 patent applications in our dataset, with an overall allowance rate of 85.1%. Applications typically reach final disposition in approximately 28 months.
Art Unit 2498's allowance rate of 85.1% places it in the 79% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.
Applications in Art Unit 2498 receive an average of 1.91 office actions before reaching final disposition (in the 51% percentile). The median prosecution time is 28 months (in the 66% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.