Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19286976 | SYSTEMS AND METHODS FOR HIERARCHICAL MULTITENANCY DATA ACCESS | July 2025 | October 2025 | Allow | 3 | 0 | 0 | No | No |
| 19256384 | Stateless Account Authentication Provable by Cryptographic Biometric Key | July 2025 | August 2025 | Allow | 2 | 0 | 0 | No | No |
| 19235482 | TRANSCEIVER DECODING METHOD AND SYSTEM BASED ON PROTOGRAPH DIFFERENTIAL CHAOS SHIFT KEYING | June 2025 | August 2025 | Allow | 2 | 0 | 0 | No | No |
| 19221409 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING INFORMATION PROCESSING PROGRAM STORED THEREIN | May 2025 | November 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19221400 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING INFORMATION PROCESSING PROGRAM STORED THEREIN | May 2025 | November 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19220825 | SYSTEMS AND METHODS FOR DIGITALLY CONNECTING PATIENTS TO DE-IDENTIFIED RESEARCH SPECIMENS AND DATA USING COMPOSABLE PROTOCOLS AND TOKENIZED IDENTIFIERS | May 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19191981 | SYSTEMS AND METHODS FOR LINKING AN AUTHENTICATION ACCOUNT TO A DEVICE | April 2025 | February 2026 | Allow | 9 | 1 | 0 | No | No |
| 19191580 | MAINTENANCE AND ADJUSTMENT OF ENCRYPTED TRAFFIC BY EXTRACTING ANCHORS OF TRUST | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19188116 | PROMPT REFINEMENT TO IMPROVE ACCURACY OF OUTPUTS FROM MACHINE LEARNING MODELS | April 2025 | September 2025 | Allow | 4 | 1 | 0 | No | No |
| 19096557 | DATA PROTECTION ON DISTRIBUTED DATA STORAGE (DDS) PROTECTION NETWORKS | March 2025 | September 2025 | Allow | 6 | 1 | 0 | No | No |
| 19115721 | DATA ENCRYPTION METHOD AND RELATED COMPONENT | March 2025 | June 2025 | Allow | 2 | 0 | 0 | No | No |
| 19069724 | Verification and Authentication of Robots | March 2025 | July 2025 | Allow | 4 | 1 | 0 | No | No |
| 19064080 | METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUM FOR CDN SERVICE ORCHESTRATION IN MULTI-CLOUD ENVIRONMENT | February 2025 | May 2025 | Allow | 2 | 0 | 0 | No | No |
| 19058833 | TECHNIQUES FOR SEMANTIC ANALYSIS OF CYBERSECURITY EVENT DATA AND REMEDIATION OF CYBERSECURITY EVENT ROOT CAUSES | February 2025 | April 2025 | Allow | 2 | 0 | 0 | No | No |
| 19038434 | SYSTEMS AND METHODS FOR RESPONSIBLE AI | January 2025 | July 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19033077 | MANAGING SECURITY OF CRYPTOMINING DEVICES | January 2025 | August 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19030734 | RUNTIME ENVIRONMENT FOR EXECUTION OF AUTONOMOUS AGENTS | January 2025 | October 2025 | Allow | 9 | 1 | 0 | No | No |
| 19019365 | IDENTIFYING AND ANALYZING ACTIONS FROM VECTOR REPRESENTATIONS OF ALPHANUMERIC CHARACTERS USING A LARGE LANGUAGE MODEL | January 2025 | October 2025 | Allow | 9 | 1 | 0 | No | No |
| 19006608 | METHOD FOR ENHANCING KEY-SWITCHING EFFICIENCY FOLLOWING MODRAISE IN FULLY HOMOMORPHIC ENCRYPTION | December 2024 | July 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 19006065 | METHOD FOR PROTECTING DATA IN A WIRELESS BODY AREA NETWORK (WBAN) SYSTEM | December 2024 | April 2025 | Allow | 4 | 0 | 0 | No | No |
| 18981000 | DUAL EMBEDDING INDEX SYSTEM FOR IDENTIFY VERIFICATION | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18964322 | DERIVED PERMISSIONS FOR STORED OUTPUTS FROM ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | February 2025 | Allow | 3 | 0 | 0 | No | No |
| 18954389 | DYNAMIC SYSTEM RESOURCE-SENSITIVE MODEL SOFTWARE AND HARDWARE SELECTION | November 2024 | March 2025 | Allow | 4 | 1 | 0 | No | No |
| 18954031 | INVALID TRAFFIC DETECTION USING EXPLAINABLE UNSUPERVISED GRAPH ML | November 2024 | February 2026 | Allow | 15 | 0 | 0 | No | No |
| 18949425 | ENCRYPTOR, DECRYPTOR, COMMUNICATIONS SYSTEM, METHODS, COMMUNICATIONS METHOD | November 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18948632 | MOBILE SECURITY FILE LEAKAGE DETECTION METHOD AND SYSTEM | November 2024 | September 2025 | Abandon | 10 | 1 | 0 | No | No |
| 18938972 | GRANULAR SECURITY SEGMENTATION FOR COMPUTING ASSETS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18936791 | DATA WRITING METHOD, RECOVERY METHOD, AND READING METHOD, AND CORRESPONDING APPARATUS | November 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18930882 | TRAFFIC TRANSMISSION CONTROL METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUM | October 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18925605 | IDENTIFY MALICIOUS SOFTWARE | October 2024 | February 2026 | Allow | 15 | 0 | 0 | No | No |
| 18922174 | INLINE MALWARE DETECTION | October 2024 | February 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18918899 | ANOMALY DETECTION DEVICE AND METHOD BY UTILIZING DATA AUGMENTATION | October 2024 | January 2026 | Allow | 15 | 0 | 0 | No | No |
| 18856678 | METHOD FOR SECURING A BIOMETRIC RECOGNITION OF A USER | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18912668 | SYSTEM AND METHOD FOR PROVIDING TRUSTWORTHY ACCESS ENFORCEMENT TO MICROSERVICE CONTAINER IMAGES ON ORCHESTRATION PLATFORMS | October 2024 | March 2026 | Allow | 17 | 0 | 0 | No | No |
| 18910870 | METHOD FOR VERIFYING A FIRST TIME RECORDING UNIT OF A FIELD DEVICE IN AUTOMATION TECHNOLOGY | October 2024 | January 2026 | Allow | 15 | 0 | 0 | No | No |
| 18910161 | SYSTEMS AND METHODS FOR USER AUTHENTICATION ON SHARED MOBILE DEVICES | October 2024 | January 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 18852994 | PROCESSING METHOD OF REMOTE ATTESTATION REPORT, DATABASE SERVICE END AND DATABASE CLIENT END | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18902822 | METHOD FOR AUTHENTICATING THE QURAN IN DIGITAL FORMAT AND CERTIFYING THE AUTHENTICITY OF THE DIGITAL QURAN | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18899726 | Information Processing Method, Information Processing Apparatus, and Non-Transitory Computer-Readable Storage Medium | September 2024 | July 2025 | Allow | 9 | 2 | 0 | No | No |
| 18892131 | DISTRIBUTED TRAFFIC STEERING AND ENFORCEMENT FOR SECURITY SOLUTIONS | September 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18890235 | ENHANCED LEARNING AND DETERMINATION OF SECURITY RULES FOR DATA TRAFFIC | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18885801 | Device, System, and Method of Detecting Vishing Attacks | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18847163 | SYSTEMS, AND METHODS FOR SECURE REMOTE MULTI-USER LAN ACCESS | September 2024 | July 2025 | Allow | 10 | 0 | 0 | No | No |
| 18883621 | PRESERVING SECURITY INFORMATION OVER NAT ENABLED DEVICES USING ENCAPSULATION | September 2024 | June 2025 | Allow | 9 | 2 | 0 | Yes | No |
| 18830573 | LATENCY-, ACCURACY-, AND PRIVACY-SENSITIVE TUNING OF ARTIFICIAL INTELLIGENCE MODEL SELECTION PARAMETERS AND SYSTEMS AND METHODS OF THE SAME | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18830359 | IMPROVEMENTS TO SEARCHABLE SYMMETRIC ENCRYPTION | September 2024 | June 2025 | Allow | 9 | 1 | 0 | No | No |
| 18820525 | MANAGING A DATA PROCESSING SYSTEM USING A MANAGEMENT CONTROLLER AND A SECURED STORAGE REGION | August 2024 | March 2026 | Allow | 18 | 1 | 0 | No | No |
| 18818441 | Retention Policy-based Protection of Data Written to a Data Store | August 2024 | November 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18809488 | GENERATING CONFIGURATION CHANGE EVENT STREAM FOR EVENT-DRIVEN ASSESSMENT OF RESOURCES | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18809544 | MANAGING NETWORK ACCESS FOR VULNERABLE DEVICES | August 2024 | December 2025 | Allow | 16 | 0 | 0 | No | No |
| 18809098 | System for Cross-Domain Identity Management (SCIM) Proxy Service | August 2024 | October 2024 | Allow | 2 | 0 | 0 | No | No |
| 18808879 | MOBILE DEVICE AUTHENTICATION WITHOUT ELECTRONIC SUBSCRIBER IDENTITY MODULE (ESIM) CREDENTIALS | August 2024 | November 2025 | Allow | 15 | 0 | 0 | No | No |
| 18795700 | 0-RTT CAPABLE, TUNNEL-LESS, MULTI-TENANT POLICY ARCHITECTURE | August 2024 | November 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18782237 | MANAGEMENT SYSTEM, MANAGEMENT METHOD, AND STORAGE MEDIUM | July 2024 | November 2025 | Allow | 16 | 0 | 0 | No | No |
| 18782019 | IDENTIFYING AND ANALYZING ACTIONS FROM VECTOR REPRESENTATIONS OF ALPHANUMERIC CHARACTERS USING A LARGE LANGUAGE MODEL | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18782006 | SYSTEM AND METHOD OF UNIVERSAL BLOCKCHAIN EMAIL ADDRESS FORMAT | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18779552 | ACTIVE ACCESS AUTHENTICATION METHOD AND DEVICE USING THE SAME | July 2024 | September 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18730250 | AUTHENTICATION SYSTEM AND METHOD WITH ZERO-KNOWLEDGE PROOF | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18776878 | TECHNIQUES TO SUPPORT TIERED SECURITY ZONES FOR WEB-BASED APPLICATIONS | July 2024 | October 2024 | Allow | 3 | 0 | 0 | No | No |
| 18774767 | METHOD OF USING A BLOCKCHAIN | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18774430 | SYSTEM AND METHOD FOR FACT VERIFICATION USING BLOCKCHAIN AND MACHINE LEARNING TECHNOLOGIES | July 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18774039 | ENABLING COMMUNICATIONS BETWEEN APPLICATIONS IN A MOBILE OPERATING SYSTEM | July 2024 | January 2026 | Allow | 18 | 2 | 0 | Yes | No |
| 18773303 | INTERNET OF THINGS (IOT) SYSTEMS AND METHODS | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18771876 | MAPPING IDENTIFIED GAPS IN CONTROLS TO OPERATIVE STANDARDS USING A GENERATIVE ARTIFICIAL INTELLIGENCE MODEL | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18770578 | EXTERNAL KEY AUTHENTICATION AND REGENERATION | July 2024 | August 2025 | Allow | 13 | 2 | 0 | Yes | No |
| 18767960 | SECURITY PROTECTION METHOD AND DEVICE BASED ON INDUSTRIAL INTERNET | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18766401 | Quantification of Adversary Tactics, Techniques, and Procedures using Threat Attribute Groupings and Correlation | July 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18761614 | MANAGING DATA ACCESS VIA HYBRID CLOUD AND MULTI-CLOUD DATA STORES | July 2024 | November 2025 | Allow | 17 | 1 | 0 | No | No |
| 18759568 | NETWORK AUTHENTICATION SERVICE SECURITY | June 2024 | February 2026 | Allow | 20 | 0 | 0 | No | No |
| 18757161 | APPARATUS AND METHOD FOR USING A DECENTRALIZED IDENTITY VERIFIABLE CREDENTIAL TO AUTHENTICATE A USER IN THE OPEN AUTHORIZATION FRAMEWORK | June 2024 | November 2025 | Allow | 17 | 1 | 0 | Yes | No |
| 18757201 | SYNERGISTIC PHYSICAL UNCLONABLE FUNCTION (PUF) USING MEMORY REPAIR DATA AND RING OSCILLATORS | June 2024 | September 2025 | Allow | 15 | 0 | 0 | No | No |
| 18756969 | SYSTEMS AND METHODS FOR SECURE AND PRIVACY PRESERVING DEVICE CLASSIFICATION | June 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18754830 | MANAGING ENCRYPTION KEYS PER LOGICAL BLOCK ON A PERSISTENT MEMORY DEVICE | June 2024 | August 2025 | Allow | 14 | 1 | 0 | No | No |
| 18723536 | SECURE CHANNEL SLEEP WAKE-UP METHOD, APPARATUS AND DEVICE | June 2024 | January 2026 | Allow | 19 | 0 | 0 | No | No |
| 18751440 | HIGH DIMENSIONAL SYSTEM AND METHOD FOR GENERATING QUANTUM RANDOM NUMBERS CERTIFIED VIA VALUE INDEFINITENESS | June 2024 | October 2024 | Allow | 4 | 1 | 0 | No | No |
| 18751150 | DATA PROTECTION ON DISTRIBUTED DATA STORAGE (DDS) PROTECTION NETWORKS | June 2024 | December 2024 | Allow | 5 | 1 | 0 | No | No |
| 18749623 | ELECTRONIC SYSTEM OF PUF-BASED ROOT KEY ENTANGLEMENT WITH MULTIPLE DIGITAL INPUT SEQUENCES AND ROOT KEY EXTRACTOR | June 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18748307 | PROFILING OF SPAWNED PROCESSES IN CONTAINER IMAGES AND ENFORCING SECURITY POLICIES RESPECTIVE THEREOF | June 2024 | July 2025 | Allow | 13 | 1 | 0 | No | No |
| 18748066 | METHOD FOR DISTRIBUTING AUTHENTICATABLE SATELLITE DATA BETWEEN ENTITIES | June 2024 | December 2025 | Allow | 18 | 0 | 0 | No | No |
| 18747136 | Liquidity Intelligence Provider | June 2024 | September 2025 | Allow | 15 | 0 | 0 | No | No |
| 18744773 | METHOD FOR TRACKING THE PROCESSING OF A DIGITAL ASSET, METHOD FOR IDENTIFYING SUCH PROCESSING, CORRESPONDING COMPUTER PROGRAM PRODUCTS AND DEVICES | June 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18745240 | BROADCAST-FREE THRESHOLD POST-QUANTUM KEY GENERATION AND VERIFICATION OVER UNENCRYPTED CHANNELS FROM HARDWARE-BASED CORRELATED RANDOMNESS | June 2024 | July 2025 | Allow | 13 | 1 | 0 | No | No |
| 18743458 | MEMORY SYSTEM AND CONTROL METHOD | June 2024 | December 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18742330 | SEMI-CUSTOM ACCELERATOR DEVICE FOR BOOTSTRAPPABLE FULLY HOMOMORPHIC ENCRYPTION | June 2024 | September 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18741396 | Asynchronous Counting Gate | June 2024 | September 2025 | Allow | 15 | 0 | 0 | No | No |
| 18739776 | CLOUD ARCHITECTURE FOR ENFORCING MULTI-DIMENSIONAL DATA SECURITY USING SECURITY ASSIGNMENTS BEYOND ROLE-BASED ACCESS CONTROLS | June 2024 | November 2025 | Allow | 17 | 0 | 0 | No | No |
| 18737815 | TECHNIQUES FOR STORING KEY BACKUPS | June 2024 | October 2025 | Allow | 17 | 0 | 0 | No | No |
| 18733736 | A method and system for verifying user authorization using zero-proof verification | June 2024 | February 2026 | Allow | 20 | 0 | 0 | No | No |
| 18714700 | CODE CONVERSION APPARATUS, CODE CONVERSION METHOD, AND COMPUTER READABLE RECORDING MEDIUM | May 2024 | November 2025 | Allow | 18 | 0 | 0 | No | No |
| 18678832 | SYSTEM AND METHOD FOR CONTROLLING AND EXECUTING ANOMALY COMMANDS IN MULTI-NETWORK ENVIRONMENT | May 2024 | September 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18679180 | PATIENT-EMPOWERED DATA MANAGEMENT: A SECURE BLOCKCHAIN ARCHITECTURE WITH DECENTRALIZED OWNERSHIP | May 2024 | October 2024 | Allow | 4 | 0 | 0 | No | No |
| 18678216 | MEMORY SYSTEM AND METHOD OF OPERATING THE SAME | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18677476 | ELIMINATING A REDUNDANT LOGIN BY LEVERAGING A SECURE POSIX ENVIRONMENT SESSION | May 2024 | January 2026 | Allow | 19 | 0 | 0 | No | No |
| 18677758 | APP PROFILE VERIFICATION SETUP | May 2024 | January 2026 | Allow | 20 | 1 | 0 | No | No |
| 18676636 | Tracking hash-based signatures in LMS and XMSS using a distributed ledger | May 2024 | December 2025 | Allow | 19 | 1 | 0 | No | No |
| 18677622 | PASSWORD PROMPT FOR SECURE CAMERA ACTIVATION | May 2024 | December 2025 | Allow | 18 | 1 | 0 | No | No |
| 18675443 | METHODS AND SYSTEMS FOR CREATING, VERIFYING, AND ENTERING SECURITY INFORMATION | May 2024 | January 2025 | Allow | 8 | 1 | 0 | No | No |
| 18671930 | AUTOMATED DATA ANONYMIZATION | May 2024 | June 2025 | Allow | 13 | 0 | 0 | No | No |
| 18669001 | ENCRYPTION APPARATUS, DECRYPTION APPARATUS, DECRYPTION-POSSIBLE VERIFICATION APPARATUS, CRYPTOSYSTEM, ENCRYPTION METHOD, AND COMPUTER READABLE MEDIUM | May 2024 | October 2025 | Allow | 17 | 0 | 0 | No | No |
| 18666634 | COMPUTER-IMPLEMENTED SYSTEM AND MEHTODS FOR OFF-CHAIN EXCHANGE OF TRANSACTIONS PERTAINING TO A DISTRIBUTED LEDGER | May 2024 | September 2025 | Abandon | 16 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2499.
With a 38.2% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 37.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Art Unit 2499 is part of Group 2490 in Technology Center 2400. This art unit has examined 1,214 patent applications in our dataset, with an overall allowance rate of 88.8%. Applications typically reach final disposition in approximately 31 months.
Art Unit 2499's allowance rate of 88.8% places it in the 88% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.
Applications in Art Unit 2499 receive an average of 1.96 office actions before reaching final disposition (in the 56% percentile). The median prosecution time is 31 months (in the 50% percentile).
When prosecuting applications in this art unit, consider the following:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.