Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19115721 | DATA ENCRYPTION METHOD AND RELATED COMPONENT | March 2025 | June 2025 | Allow | 2 | 0 | 0 | No | No |
| 19058833 | TECHNIQUES FOR SEMANTIC ANALYSIS OF CYBERSECURITY EVENT DATA AND REMEDIATION OF CYBERSECURITY EVENT ROOT CAUSES | February 2025 | April 2025 | Allow | 2 | 0 | 0 | No | No |
| 19006065 | METHOD FOR PROTECTING DATA IN A WIRELESS BODY AREA NETWORK (WBAN) SYSTEM | December 2024 | April 2025 | Allow | 4 | 0 | 0 | No | No |
| 18964322 | DERIVED PERMISSIONS FOR STORED OUTPUTS FROM ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | February 2025 | Allow | 3 | 0 | 0 | No | No |
| 18954389 | DYNAMIC SYSTEM RESOURCE-SENSITIVE MODEL SOFTWARE AND HARDWARE SELECTION | November 2024 | March 2025 | Allow | 4 | 1 | 0 | No | No |
| 18949425 | ENCRYPTOR, DECRYPTOR, COMMUNICATIONS SYSTEM, METHODS, COMMUNICATIONS METHOD | November 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18938972 | GRANULAR SECURITY SEGMENTATION FOR COMPUTING ASSETS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18930882 | TRAFFIC TRANSMISSION CONTROL METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUM | October 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18910161 | SYSTEMS AND METHODS FOR USER AUTHENTICATION ON SHARED MOBILE DEVICES | October 2024 | January 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 18902822 | METHOD FOR AUTHENTICATING THE QURAN IN DIGITAL FORMAT AND CERTIFYING THE AUTHENTICITY OF THE DIGITAL QURAN | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18899726 | Information Processing Method, Information Processing Apparatus, and Non-Transitory Computer-Readable Storage Medium | September 2024 | July 2025 | Allow | 9 | 2 | 0 | No | No |
| 18892131 | DISTRIBUTED TRAFFIC STEERING AND ENFORCEMENT FOR SECURITY SOLUTIONS | September 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18830573 | LATENCY-, ACCURACY-, AND PRIVACY-SENSITIVE TUNING OF ARTIFICIAL INTELLIGENCE MODEL SELECTION PARAMETERS AND SYSTEMS AND METHODS OF THE SAME | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18830359 | IMPROVEMENTS TO SEARCHABLE SYMMETRIC ENCRYPTION | September 2024 | June 2025 | Allow | 9 | 1 | 0 | No | No |
| 18809098 | System for Cross-Domain Identity Management (SCIM) Proxy Service | August 2024 | October 2024 | Allow | 2 | 0 | 0 | No | No |
| 18782019 | IDENTIFYING AND ANALYZING ACTIONS FROM VECTOR REPRESENTATIONS OF ALPHANUMERIC CHARACTERS USING A LARGE LANGUAGE MODEL | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18779552 | ACTIVE ACCESS AUTHENTICATION METHOD AND DEVICE USING THE SAME | July 2024 | September 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18776878 | TECHNIQUES TO SUPPORT TIERED SECURITY ZONES FOR WEB-BASED APPLICATIONS | July 2024 | October 2024 | Allow | 3 | 0 | 0 | No | No |
| 18771876 | MAPPING IDENTIFIED GAPS IN CONTROLS TO OPERATIVE STANDARDS USING A GENERATIVE ARTIFICIAL INTELLIGENCE MODEL | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18767960 | SECURITY PROTECTION METHOD AND DEVICE BASED ON INDUSTRIAL INTERNET | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18751440 | HIGH DIMENSIONAL SYSTEM AND METHOD FOR GENERATING QUANTUM RANDOM NUMBERS CERTIFIED VIA VALUE INDEFINITENESS | June 2024 | October 2024 | Allow | 4 | 1 | 0 | No | No |
| 18751150 | DATA PROTECTION ON DISTRIBUTED DATA STORAGE (DDS) PROTECTION NETWORKS | June 2024 | December 2024 | Allow | 5 | 1 | 0 | No | No |
| 18742330 | SEMI-CUSTOM ACCELERATOR DEVICE FOR BOOTSTRAPPABLE FULLY HOMOMORPHIC ENCRYPTION | June 2024 | September 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18679180 | PATIENT-EMPOWERED DATA MANAGEMENT: A SECURE BLOCKCHAIN ARCHITECTURE WITH DECENTRALIZED OWNERSHIP | May 2024 | October 2024 | Allow | 4 | 0 | 0 | No | No |
| 18675443 | METHODS AND SYSTEMS FOR CREATING, VERIFYING, AND ENTERING SECURITY INFORMATION | May 2024 | January 2025 | Allow | 8 | 1 | 0 | No | No |
| 18671930 | AUTOMATED DATA ANONYMIZATION | May 2024 | June 2025 | Allow | 13 | 0 | 0 | No | No |
| 18666527 | DIGITAL SIGNATURE USING PHONOMETRY AND COMPILED BIOMETRIC DATA SYSTEM AND METHOD | May 2024 | June 2025 | Allow | 13 | 1 | 0 | No | No |
| 18661532 | DYNAMIC INPUT-SENSITIVE VALIDATION OF MACHINE LEARNING MODEL OUTPUTS AND METHODS AND SYSTEMS OF THE SAME | May 2024 | August 2024 | Allow | 3 | 0 | 0 | No | No |
| 18661519 | DYNAMIC, RESOURCE-SENSITIVE MODEL SELECTION AND OUTPUT GENERATION AND METHODS AND SYSTEMS OF THE SAME | May 2024 | July 2024 | Allow | 3 | 0 | 0 | No | No |
| 18652750 | SMART PHONE WITH GAMBLING APPLICATION THAT CHECKS FOR UNAUTHORIZED APPLICATIONS AND PROCESSES | May 2024 | March 2025 | Allow | 10 | 1 | 0 | Yes | No |
| 18651127 | METHOD AND SYSTEM FOR FULLY ENCRYPTED REPOSITORY | April 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18643700 | Systems and Methods for WebAuthn Transport Via a WebAuthn Proxy | April 2024 | December 2024 | Allow | 8 | 0 | 0 | No | No |
| 18638005 | APPARATUS AND METHOD FOR CONDUCTING ENDPOINT-NETWORK-MONITORING | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18635293 | SYSTEM AND METHOD FOR SINGLE SIGN ON ACROSS MULTIPLE APPLICATIONS WITH LICENSE ENABLEMENT | April 2024 | December 2024 | Allow | 8 | 0 | 0 | No | No |
| 18633293 | DYNAMIC EVALUATION OF LANGUAGE MODEL PROMPTS FOR MODEL SELECTION AND OUTPUT VALIDATION AND METHODS AND SYSTEMS OF THE SAME | April 2024 | September 2024 | Allow | 5 | 1 | 0 | No | No |
| 18631333 | CONFIRMING AUTHENTICITY OF A USER TO A THIRD-PARTY SYSTEM | April 2024 | November 2024 | Allow | 7 | 0 | 0 | No | No |
| 18629781 | SYSTEMS AND METHODS FOR ACCESSING DIGITAL ASSETS IN A BLOCKCHAIN USING GLOBAL CONSENT CONTRACTS | April 2024 | November 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18629160 | INFORMATION PROCESSING DEVICE AND CONTROL METHOD FOR INFORMATION PROCESSING DEVICE | April 2024 | May 2024 | Allow | 1 | 0 | 0 | No | No |
| 18624646 | INTEGRATED CIRCUIT (IC) SIGNATURES WITH RANDOM NUMBER GENERATOR AND ONE-TIME PROGRAMMABLE DEVICE | April 2024 | March 2025 | Allow | 11 | 1 | 0 | No | No |
| 18616986 | SYSTEMS AND METHODS FOR LINKING AN AUTHENTICATION ACCOUNT TO A DEVICE | March 2024 | January 2025 | Allow | 9 | 0 | 0 | No | No |
| 18613550 | SEPARATING HASHING FROM PROOF-OF-WORK IN BLOCKCHAIN ENVIRONMENTS | March 2024 | November 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18612708 | ADMINISTRATION OF SERVICES EXECUTING IN CLOUD PLATFORM BASED DATACENTERS USING TOKEN WITH DATA STRUCTURE | March 2024 | October 2024 | Allow | 7 | 0 | 0 | No | No |
| 18609846 | AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AND AUTHENTICATION DEVICE | March 2024 | January 2025 | Allow | 9 | 0 | 0 | No | No |
| 18607783 | AUTHENTICATION OF A VENTILATOR | March 2024 | October 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18606013 | DETERMINING AN EXPOSURE RATING TO HELP PREVENT FRAUD RISK FROM USER DATA EXPOSURE | March 2024 | August 2024 | Allow | 5 | 1 | 0 | No | No |
| 18602687 | Cloud-native global file system with rapid ransomware recovery | March 2024 | October 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18601742 | PRIVACY PRESERVING IDENTITY DATA EXCHANGE BASED ON HYBRID ENCRYPTION | March 2024 | December 2024 | Allow | 10 | 0 | 0 | No | No |
| 18599019 | SYSTEMS AND METHODS FOR ACCESSING DIGITAL ASSETS IN A BLOCKCHAIN USING GLOBAL CONSENT CONTRACTS | March 2024 | January 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18598480 | SYSTEMS AND METHODS FOR DYNAMIC FORMJACKING PROTECTION | March 2024 | March 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18598706 | ARITHMETIC PROCESSING APPARATUS, ARITHMETIC PROCESSING SYSTEM, ARITHMETIC PROCESSING METHOD, AND ARITHMETIC PROCESSING PROGRAM | March 2024 | February 2025 | Allow | 11 | 1 | 0 | No | No |
| 18597030 | HIGH DIMENSIONAL SYSTEM AND METHOD FOR GENERATING QUANTUM RANDOM NUMBERS CERTIFIED VIA VALUE INDEFINITENESS | March 2024 | June 2024 | Allow | 3 | 1 | 0 | No | No |
| 18593403 | SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS | March 2024 | September 2024 | Allow | 6 | 1 | 0 | No | No |
| 18585936 | BROADCAST-FREE THRESHOLD POST-QUANTUM KEY GENERATION AND VERIFICATION OVER UNENCRYPTED CHANNELS FROM HARDWARE-BASED CORRELATED RANDOMNESS | February 2024 | May 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18583022 | METHODS AND SYSTEMS FOR SECURE USER AUTHENTICATION | February 2024 | August 2024 | Allow | 5 | 1 | 0 | No | No |
| 18443065 | SECURING BROWSER COOKIES | February 2024 | July 2025 | Allow | 17 | 1 | 0 | No | No |
| 18438922 | Ransomware Detection Using Multiple Security Threat Detection Processes | February 2024 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18439709 | SYSTEM FOR IMPLEMENTING DYMANIC NETWORK CHANNEL SWITCHING FOR SECURE COMMUNICATION | February 2024 | March 2025 | Allow | 13 | 1 | 0 | No | No |
| 18439723 | SYSTEM FOR IMPLEMENTING DYMANIC NETWORK CHANNEL SWITCHING FOR SECURE COMMUNICATION | February 2024 | March 2025 | Allow | 13 | 1 | 0 | No | No |
| 18436571 | SYSTEMS AND METHODS FOR DETECTION AND MITIGATION OF MALICIOUS ENCRYPTION | February 2024 | January 2025 | Allow | 12 | 1 | 0 | No | No |
| 18432907 | Detecting And Analyzing Phishing Attacks Through Artificial Intelligence | February 2024 | April 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18427707 | ACCESS MANAGEMENT SYSTEM AND ACCESS MANAGEMENT METHOD | January 2024 | March 2025 | Allow | 13 | 1 | 0 | No | No |
| 18425098 | Storing, Processing and Analyzing Large Volumes of Data in a Storage Network | January 2024 | February 2025 | Allow | 13 | 1 | 0 | No | No |
| 18424943 | SYSTEMS AND METHODS INCLUDING USER AUTHENTICATION | January 2024 | November 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18419162 | UPDATING SECURITY RULE SETS USING REPOSITORY SWITCHING | January 2024 | September 2024 | Allow | 8 | 0 | 0 | No | No |
| 18419313 | PROVISIONING OF ENCRYPTED DNS SERVICES | January 2024 | February 2025 | Allow | 13 | 0 | 0 | Yes | No |
| 18419457 | SUPPORTING NON-SNAPPABLE DATA SOURCES | January 2024 | June 2025 | Allow | 17 | 0 | 0 | No | No |
| 18419359 | PERIPHERAL DEVICE | January 2024 | May 2025 | Allow | 16 | 0 | 0 | No | No |
| 18416148 | METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING CERTIFICATES | January 2024 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18415791 | SYSTEMS AND METHODS FOR ATTACKS, COUNTERMEASURES, ARCHIVING, DATA LEAK PREVENTION, AND OTHER NOVEL SERVICES FOR ACTIVE MESSAGES | January 2024 | May 2025 | Abandon | 16 | 1 | 0 | No | No |
| 18413429 | LOCATION VERIFICATION SYSTEM AND METHOD OF VERIFYING A LOCATION OF AN ENTITY | January 2024 | May 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18412012 | INTERFACE-BASED ACLS IN A LAYER-2 NETWORK | January 2024 | December 2024 | Allow | 11 | 1 | 0 | No | No |
| 18411699 | ENCRYPTION FOR A DISTRIBUTED FILESYSTEM | January 2024 | November 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18407060 | Isolating Internet-of-Things (IoT) Devices Using a Secure Overlay Network | January 2024 | December 2024 | Allow | 11 | 1 | 0 | No | No |
| 18407134 | DIGITAL IDENTITY SIGN-IN | January 2024 | July 2024 | Allow | 7 | 0 | 0 | No | No |
| 18406854 | VERIFYING IDENTITY OF A SOURCE OF A TRANSMISSION | January 2024 | December 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18403913 | DETECTION OF ABNORMAL APPLICATION PROGRAMMING INTERFACE (API) SESSIONS INCLUDING A SEQUENCE OF API REQUESTS | January 2024 | August 2024 | Allow | 7 | 0 | 0 | No | No |
| 18404747 | Zero Trust System and Method for Securing Data | January 2024 | May 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18400714 | DIGITAL PROCESSING SYSTEMS AND METHODS FOR FACILITATING THE DEVELOPMENT AND IMPLEMENTATION OF APPLICATIONS IN CONJUNCTION WITH A SERVERLESS ENVIRONMENT | December 2023 | March 2024 | Allow | 2 | 0 | 0 | No | No |
| 18399956 | SYSTEM AND METHOD FOR GENERATING DYNAMICALLY VARIABLE MULTI-DIMENSIONAL PRIVACY RATING FOR VEHICLES | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18392055 | Secure Collaboration Between Processors And Processing Accelerators In Enclaves | December 2023 | March 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18393469 | NORMALIZING EXTERNAL APPLICATION DATA | December 2023 | November 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18390384 | LAYER-2 NETWORKING USING ACCESS CONTROL LISTS IN A VIRTUALIZED CLOUD ENVIRONMENT | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18390042 | IDENTIFY MALICIOUS SOFTWARE | December 2023 | July 2024 | Allow | 7 | 0 | 0 | No | No |
| 18390657 | SECURITY CIRCUIT FOR DETECTING PHYSICAL ATTACK ON SYSTEM SEMICONDUCTOR | December 2023 | July 2024 | Allow | 7 | 0 | 0 | No | No |
| 18539812 | Using Neural Networks to Process Forensics and Generate Threat Intelligence Information | December 2023 | May 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18569094 | METHOD AND SYSTEM FOR INTEGRATING IDENTITY PROVIDER | December 2023 | February 2025 | Allow | 15 | 2 | 0 | No | No |
| 18531978 | Permissions-Based Communication of Information | December 2023 | January 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18528252 | System and Method for Operating an Endpoint Agent at an Endpoint Device | December 2023 | August 2024 | Allow | 9 | 0 | 0 | No | No |
| 18528124 | System, Apparatus And Method For Integrity Protecting Tenant Workloads In A Multi-Tenant Computing Environment | December 2023 | June 2025 | Allow | 18 | 2 | 0 | No | No |
| 18526017 | COMMUNICATION PROTOCOLS FOR AN ONLINE CONTENT MANAGEMENT SYSTEM | December 2023 | April 2025 | Allow | 16 | 1 | 0 | No | No |
| 18563713 | ACCESS CONTROL METHOD, DEVICE, APPARATUS AND READABLE STORAGE MEDIUM | November 2023 | October 2024 | Allow | 11 | 1 | 0 | No | No |
| 18517329 | PARALLEL BLOCK PROCESSING IN BLOCKCHAINS | November 2023 | July 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18516907 | DEVICE PROGRAMMING WITH SYSTEM GENERATION | November 2023 | July 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18509954 | SYSTEMS AND METHODS FOR DYNAMICALLY GENERATING FINGERPRINT SIGNATURES | November 2023 | May 2025 | Allow | 18 | 0 | 0 | No | No |
| 18510362 | METHOD OF PROVIDING PERSONAL DATA STORAGE SERVICE BETWEEN A FIRST USER WHO IS A DATA PROVIDER AND A SECOND USER WHO IS A DATA REQUESTER BY USING SMART CONTRACT BASED ON FIRST LAYER AND PRIVACY LAYER AND STORAGE LAYER BASED ON SECOND LAYER, AND STORAGE NODE USING THE SAME | November 2023 | January 2024 | Allow | 2 | 0 | 0 | No | No |
| 18507793 | DEPLOYING SESSION INITIATION PROTOCOL APPLICATION NETWORK SECURITY | November 2023 | August 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18505546 | MITIGATING FPGA RELATED RISKS | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18503978 | INFORMATION SECURITY SYSTEM AND METHOD FOR PHISHING THREAT PREVENTION USING TOKENS | November 2023 | December 2024 | Allow | 14 | 1 | 0 | No | No |
| 18499076 | DETECTING MALICIOUS BEHAVIOR IN A NETWORK USING SECURITY ANALYTICS BY ANALYZING PROCESS INTERACTION RATIOS | October 2023 | August 2024 | Allow | 9 | 0 | 0 | No | No |
| 18384966 | Device, System, and Method of Detecting Vishing Attacks | October 2023 | May 2024 | Allow | 7 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2499.
With a 34.6% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 38.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2499 is part of Group 2490 in Technology Center 2400. This art unit has examined 1,728 patent applications in our dataset, with an overall allowance rate of 89.5%. Applications typically reach final disposition in approximately 28 months.
Art Unit 2499's allowance rate of 89.5% places it in the 90% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.
Applications in Art Unit 2499 receive an average of 1.60 office actions before reaching final disposition (in the 31% percentile). The median prosecution time is 28 months (in the 57% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.