Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19370903 | SELECTING A MALWARE SCANNER FROM MULTIPLE MALWARE SCANNERS | October 2025 | March 2026 | Allow | 4 | 0 | 0 | No | No |
| 19347347 | SYSTEM AND A METHOD FOR IDENTIFYING PRIVATE USER INFORMATION | October 2025 | February 2026 | Allow | 4 | 0 | 0 | Yes | No |
| 19340698 | INTEGRATED AGENT-DRIVEN DATA FRAMEWORK | September 2025 | March 2026 | Allow | 5 | 1 | 0 | Yes | No |
| 19340363 | FLEXIBLE SOFTWARE-DEFINED RADIO ACCESS NETWORK ARCHITECTURE WITH SLICING SUPPORT AND METHODS FOR USE THEREWITH | September 2025 | December 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19335440 | Method and System for Securing SCADA and Industrial Control Software through Secure-Write Operations | September 2025 | March 2026 | Allow | 5 | 1 | 0 | Yes | No |
| 19328030 | RESOURCE UTILIZATION ESTIMATION AND ALLOCATION FOR MULTI-AGENT COMPUTATIONAL SYSTEMS | September 2025 | November 2025 | Allow | 2 | 0 | 0 | No | No |
| 19315759 | GENERATING, USING ARTIFICIAL INTELLIGENCE, TEST DATA TO TEST MALWARE SCANNER(S) | September 2025 | January 2026 | Allow | 4 | 0 | 0 | Yes | No |
| 19315444 | System and Method for Enforcing PII Segregation in a Distributed Data Processing System for Privacy-Preserving AI Corpus Generation | August 2025 | October 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19306182 | AUTHENTICATION WITH DYNAMIC USER IDENTIFICATION | August 2025 | December 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 19305988 | TYPED SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) TRIAGE PROCESSING COMPONENTS SYSTEM | August 2025 | November 2025 | Allow | 2 | 0 | 0 | No | No |
| 19301754 | TRUSTWORTHINESS OF A VIDEO DATA STREAM | August 2025 | February 2026 | Allow | 6 | 1 | 0 | No | No |
| 19301013 | SALTED BLOOM FILTERS FOR PEER-TO-PEER DATA DISSEMINATION | August 2025 | December 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 19301719 | METHODS FOR NON-INVASIVE API DISCOVERY, MONITORING AND EXPLOITATION DETECTION IN THIRD-PARTY PROCESSES | August 2025 | November 2025 | Allow | 3 | 0 | 0 | No | No |
| 19301809 | ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE | August 2025 | January 2026 | Allow | 5 | 1 | 0 | No | No |
| 19301893 | ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE | August 2025 | January 2026 | Allow | 5 | 1 | 0 | No | No |
| 19300607 | METHODS AND SYSTEMS FOR DOMAIN-SPECIFIC INTERVIEW SIMULATIONS | August 2025 | November 2025 | Allow | 3 | 0 | 0 | No | No |
| 19300512 | Methods for Internet Communication Security | August 2025 | January 2026 | Allow | 5 | 0 | 0 | Yes | No |
| 19296400 | SYSTEM AND METHOD FOR DELAYED LOG INGESTION UTILIZING AGENTLESS COLLECTION | August 2025 | October 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19296653 | AUTOMATED THREAT HUNTING | August 2025 | October 2025 | Allow | 3 | 0 | 0 | No | No |
| 19294714 | CONTEXTUAL TRUST ASSESSMENT OF ELECTRONIC MESSAGES USING LARGE LANGUAGE MODELS IN COMPUTERIZED ORGANIZATIONAL NETWORKS | August 2025 | January 2026 | Allow | 6 | 1 | 0 | No | No |
| 19288526 | NETWORK-LEVEL, KEY-BASED PLATFORM LINKING | August 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19286965 | Real Time Translation System and Method Involving Burdened and Unburdened Content | July 2025 | November 2025 | Allow | 3 | 0 | 1 | No | No |
| 19283194 | AUTONOMOUS AGENT OBSERVATION AND CONTROL | July 2025 | December 2025 | Allow | 5 | 0 | 0 | No | No |
| 19280803 | AI-DRIVEN COMPLIANCE MAPPING FOR REGULATORY STANDARDS | July 2025 | January 2026 | Allow | 5 | 1 | 0 | Yes | No |
| 19278692 | SYSTEM FOR FEDERATED COMPLIANCE-TOKEN INHERITANCE, DIGITAL ARTIFACT REGISTRY, AND MONETIZATION IN REGULATED ENVIRONMENTS USING LARGE LANGUAGE MODELS | July 2025 | October 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19276173 | SYSTEM AND METHOD FOR DECENTRALIZED PERSONA AGENT GOVERNANCE IN REGULATED ENVIRONMENTS USING LARGE LANGUAGE MODELS | July 2025 | January 2026 | Allow | 5 | 0 | 0 | Yes | No |
| 19272328 | CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINS | July 2025 | October 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19272214 | CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINS | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19271586 | METHOD FOR EXTENDING A PROOF OF SPACE BLOCKCHAIN | July 2025 | January 2026 | Allow | 6 | 1 | 0 | No | No |
| 19270384 | ITERATIVELY TRAINED MACHINE LEARNING MODELS FOR CONFIGURATIONS OF APPLICATION PROTECTION | July 2025 | January 2026 | Allow | 6 | 1 | 0 | No | No |
| 19269404 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | October 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19269354 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | October 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 19269462 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | March 2026 | Allow | 8 | 0 | 0 | Yes | No |
| 19269215 | Management of Connector Services and Connected Artificial Intelligence Agents for Message Senders | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19270337 | Adversarial Attack Detection Based on Similarity | July 2025 | February 2026 | Allow | 7 | 2 | 0 | No | No |
| 19268594 | Privacy-Preserving Fuzzy Query System and Method | July 2025 | September 2025 | Allow | 2 | 0 | 0 | No | No |
| 19268956 | OPERATION METHOD OF ELECTRONIC APPARATUS FOR PERFORMING LARGE LANGUAGE MODEL BASED ANALYSIS INFERENCE FOR MALICIOUS SCRIPT ACTION | July 2025 | August 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19268166 | COLLUSION-RESISTANT IDENTITY-BASED AND QUANTUM-RESILIENT SECURE CORRELATION SCHEMES | July 2025 | December 2025 | Allow | 5 | 0 | 0 | No | No |
| 19268121 | ELECTRONIC APPARATUS FOR PERFORMING LOG LIGHTWEIGHTING USING EXTENDED BLOOM FILTER, AND OPERATION METHOD THEREOF | July 2025 | December 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19267471 | Insecure Model Context Protocol Server Remediation for Artificial Intelligence Agents | July 2025 | October 2025 | Allow | 3 | 0 | 0 | No | No |
| 19267475 | Streamlined Policy Administration of Model Context Protocol Servers for Artificial Intelligence Agents | July 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19264635 | SYSTEMS AND METHODS FOR DETECTING MALICIOUS WEBASSEMBLY MODULES UNDER SOURCE CODE OBFUSCATION | July 2025 | November 2025 | Allow | 4 | 1 | 0 | No | No |
| 19264594 | SYSTEMS AND METHODS FOR AUTOMATIC VULNERABILITY ASSESSMENT OF MACHINE LEARNING MODELS | July 2025 | December 2025 | Allow | 5 | 1 | 0 | No | No |
| 19264639 | SYSTEMS AND METHODS FOR MEDICAL IMAGING GATEWAYS | July 2025 | November 2025 | Allow | 5 | 1 | 0 | No | No |
| 19263395 | Provenance for AI Twin of an Artist | July 2025 | January 2026 | Allow | 7 | 1 | 0 | No | No |
| 19261964 | REFLEX-REACTION SERVER LEAKAGE CONTAINMENT SYSTEM | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19261636 | SYSTEMS AND METHODS FOR REAL-TIME DETECTION AND MITIGATION OF MALICIOUS ELECTRONIC COMMUNICATIONS | July 2025 | September 2025 | Allow | 2 | 0 | 0 | No | No |
| 19259636 | ADAPTIVE SELECTION OF SECURITY SCANNING IN SOFTWARE DEPLOYMENTS | July 2025 | January 2026 | Allow | 6 | 1 | 0 | Yes | No |
| 19254267 | SYSTEMS AND METHODS FOR DYNAMIC DE-IDENTIFICATION AND ANONYMITY FOR USER INPUT TO ARTIFICIAL INTELLIGENCE (AI)-BASED MODELS | June 2025 | August 2025 | Allow | 1 | 0 | 0 | No | No |
| 19255270 | METHOD AND SYSTEM FOR CONSTRUCTING VECTOR DATABASES USED FOR CONVERTING FREE TEXT QUERIES TO CYBER LANGUAGE QUERIES | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19254093 | METHODS AND SYSTEMS FOR FACILITATING AUTHENTICATING OF USERS | June 2025 | March 2026 | Allow | 9 | 2 | 0 | No | No |
| 19247384 | AUTHENTICATION WITH DYNAMIC USER IDENTIFICATION | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19245204 | METHODS AND SYSTEMS FOR MAINTAINING FIDELITY OF A BOND BETWEEN A PERSON AND AN ARTIFICIAL INTELLIGENCE AGENT | June 2025 | September 2025 | Allow | 3 | 1 | 0 | No | No |
| 19242263 | ATTACK DETECTION AND SOURCE TRACING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | June 2025 | December 2025 | Allow | 6 | 1 | 0 | No | No |
| 19241508 | SECURE AND TRUSTED USE METHOD AND SYSTEM FOR LARGE MODEL BASED ON CONFIDENTIAL COMPUTING | June 2025 | March 2026 | Allow | 9 | 0 | 0 | Yes | No |
| 19236071 | AUTOMATED LEAST PRIVILEGE USING RISK AND USAGE | June 2025 | February 2026 | Allow | 8 | 1 | 0 | Yes | No |
| 19234232 | Automated Tool Discovery and Ingestion for Artificial Intelligence Agents | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19233602 | TECHNIQUES FOR SECURING SOFTWARE COMPONENTS THROUGH SECURITY PACKAGES DEFINED IN SOFTWARE IMAGE RECIPES | June 2025 | November 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19232164 | TOKENIZATION WITH FORMAT PRESERVATION | June 2025 | November 2025 | Allow | 5 | 1 | 0 | No | No |
| 19231175 | BLOCKCHAIN-BASED ARTIFICIAL INTELLIGENCE AGENT LIFE CYCLE MANAGEMENT AND AUTHENTICATION SYSTEMS AND METHODS | June 2025 | October 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 19229801 | METHOD FOR EVALUATING SECURITY OF IN-VEHICLE NETWORK | June 2025 | October 2025 | Allow | 4 | 1 | 0 | No | No |
| 19227656 | SYSTEMS AND METHODS FOR MALWARE DETECTION IN PORTABLE EXECUTABLE FILES | June 2025 | October 2025 | Allow | 4 | 1 | 0 | No | No |
| 19228045 | STATEFUL API ATTACKS DETECTION | June 2025 | December 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19227264 | IDENTITY PROVIDER (IDP) AGNOSTIC AUTHENTICATION ENFORCEMENT | June 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19224661 | GENOMIC CRYPTOGRAPHY | May 2025 | February 2026 | Abandon | 9 | 1 | 0 | No | No |
| 19224345 | MITIGATING DDOS ATTACKS ON INTERNET PROTOCOL NETWORKS | May 2025 | August 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19224202 | SMART JUST-IN-TIME PRIVILEGE MANAGEMENT | May 2025 | November 2025 | Allow | 6 | 1 | 0 | No | No |
| 19223465 | SIGNED BI-DIRECTIONAL ANOMALY NEIGHBORHOOD ALGORITHM | May 2025 | November 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 19223292 | MULTITIERED INTERFACING ARCHITECTURE | May 2025 | August 2025 | Allow | 2 | 1 | 0 | No | No |
| 19224127 | TECHNIQUES FOR CROSS ENTITY CORRELATION OF USER ACCOUNTS IN CLOUD COMPUTING ENVIRONMENTS | May 2025 | October 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 19222997 | BEHAVIORAL AUTHORSHIP VERIFICATION SYSTEM AND METHOD | May 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18847213 | METHOD FOR DETECTING DATA STEALTHY ATTACK ON NETWORKED SYSTEM WITH DIFFERENTIAL PRIVACY PROTECTION | May 2025 | July 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 19217385 | TECHNIQUES FOR ACTIVE INSPECTION DETECTION OF EFFECTIVE NETWORK EXPOSURE THROUGH A CLOUD-NATIVE PROXY APPLIANCE | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19217405 | SYSTEM AND METHOD FOR APPLYING CYBERSECURITY CONTROLS ON CLOUD NATIVE ROUTING SERVICES | May 2025 | July 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19217379 | TECHNIQUES FOR DETECTION OF CYBERSECURITY ISSUES ON THIRD PARTY SOFTWARE APPLIANCES UTILIZING CUSTOM CONFIGURATION LOGS | May 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19216285 | TECHNIQUES FOR CODE INTENT DISCOVERY | May 2025 | November 2025 | Allow | 6 | 1 | 0 | No | No |
| 19216072 | MULTI-PERIMETER FIREWALL IN THE CLOUD | May 2025 | August 2025 | Allow | 3 | 1 | 0 | No | No |
| 19214704 | SECURITY PLATFORMS WITH INTEGRATED POLICY ENFORCEMENT | May 2025 | December 2025 | Allow | 7 | 1 | 0 | No | No |
| 19214799 | COMPUTERIZED SECURITY PLATFORMS INCLUDING A ROLE-BASED PERMISSIONS SYSTEM | May 2025 | November 2025 | Allow | 6 | 1 | 0 | No | No |
| 19214617 | MULTIMODAL FINGERPRINTING OF DIGITAL ASSETS | May 2025 | November 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19211129 | Anticipatory Authentication for Account-specific Artificial Intelligence Agents | May 2025 | November 2025 | Allow | 6 | 1 | 0 | No | No |
| 19209249 | SYSTEM AND METHOD FOR SEARCHING FOR AND IDENTIFYING UNAUTHORIZED WEBSITES | May 2025 | October 2025 | Allow | 6 | 1 | 0 | No | No |
| 19208115 | SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORK | May 2025 | June 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19208461 | QUANTUM SECURE COMMUNICATION PROTOCOL AND DEVICE BASED ON DOUBLE-HELIX STRUCTURE COMPOSITE MULTI-LAYER ENCODING | May 2025 | September 2025 | Allow | 4 | 1 | 0 | No | No |
| 19206573 | LIVENESS IN CONSENSUS PROTOCOL | May 2025 | October 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19204523 | Data Processing Orchestrator Utilizing Semantic Type Inference and Privacy Preservation | May 2025 | August 2025 | Allow | 4 | 0 | 0 | No | No |
| 19203661 | SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY ASSIGNING A UNIQUE IDENTIFIER TO A DETECTED DEVICE | May 2025 | August 2025 | Allow | 3 | 0 | 0 | No | No |
| 19201966 | SYSTEM AND METHOD FOR REPOSITORY MANAGEMENT | May 2025 | September 2025 | Allow | 4 | 1 | 0 | No | No |
| 19203103 | GENERATING PARAMETERS FOR MALICIOUS ACTIVITY DETECTION USING DECISION TREES | May 2025 | June 2025 | Allow | 2 | 0 | 0 | No | No |
| 19200398 | DYNAMIC, CONTROL-SENSITIVE DATA MANAGEMENT PLATFORM | May 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19196987 | System, Method, and Apparatus for Initiating Outbound Communications From a User Device | May 2025 | December 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 19197952 | DIGITAL SIGNATURE | May 2025 | August 2025 | Allow | 4 | 0 | 0 | No | No |
| 19197933 | DIGITAL SIGNATURE | May 2025 | October 2025 | Allow | 5 | 1 | 0 | No | No |
| 19195323 | CONNECTIONLESS-VIRTUAL PRIVATE NETWORK FOR SECURE CLOUD TO USER COMMUNICATION OVER THE INTERNET USING A PLURALITY OF SERVERS | April 2025 | November 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 19193127 | CYBERSECURITY ROOT CAUSE ANALYSIS USING COMPUTING RESOURCE NAME CORRELATION | April 2025 | September 2025 | Allow | 4 | 1 | 0 | No | No |
| 19192958 | SYSTEMS AND METHODS FOR FACILITATING QUANTUM-RESISTANT ENCRYPTION OF DATA | April 2025 | September 2025 | Allow | 5 | 0 | 1 | No | No |
| 19193315 | SYSTEMS, METHODS, AND STORAGE MEDIA FOR API DETECTION AND MANAGEMENT IN A SOURCE-CODE REPOSITORY USING A COMPUTING PLATFORM | April 2025 | August 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19191033 | REMEDIATING VULNERABILITIES USING SOFTWARE UPDATE MANAGEMENT PLATFORM WITH INTEGRATED THREAT INTELLIGENCE | April 2025 | September 2025 | Allow | 4 | 2 | 0 | No | No |
| 19190115 | CENTRALIZED TECHNOLOGY ACCESS CONTROL | April 2025 | September 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 19189337 | METHODS, SYSTEMS, APPARATUSES, AND DEVICES FOR FACILITATING ACCURATE USER AUTHENTICATION | April 2025 | September 2025 | Allow | 5 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for group 2430.
With a 29.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 31.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Group 2430 is part of Technology Center 2400. This group has examined 77,957 patent applications in our dataset, with an overall allowance rate of 80.3%. Applications typically reach final disposition in approximately 32 months.
Applications in Group 2430 receive an average of 2.05 office actions before reaching final disposition. The median prosecution time is 32 months.
This group-level data aggregates statistics across multiple art units. For more targeted prosecution strategies, review the individual art unit and examiner statistics within this group.
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.