Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19118772 | TRAINING A SUPERVISED MACHINE LEARNING MODEL FOR ANOMALY DETECTION | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19082761 | NEURAL NETWORK-BASED SECURITY DEFENSE METHOD FOR ENCRYPTED MULTIMEDIA DATA, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT | March 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19080748 | SECURE BEACON IDENTITY | March 2025 | June 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 19067972 | Secure and Scalable Model Splicing of Digital Engineering Models for Software-Code-Defined Digital Threads | March 2025 | April 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19048457 | EVALUATING SECURITY POLICIES IN AGGREGATE | February 2025 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19045368 | Detection of Privacy Attacks on Machine Learning Models | February 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19044591 | SECURE MULTI-AGENT SYSTEM FOR PRIVACY-PRESERVING DISTRIBUTED COMPUTATION | February 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19042955 | MEDICAL DEVICE AND HEALTH INFORMATION TRACKING SYSTEMS AND METHODS | January 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19035283 | NETWORK DATA DECODING AND ENCODING | January 2025 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19031211 | WAPI TRUSTED WIRELESS LOCAL AREA NETWORK DEVICE | January 2025 | March 2025 | Allow | 2 | 0 | 0 | No | No |
| 19029580 | METHOD FOR EMULATING AN ATTACK ON AN ASSET WITHIN A TARGET NETWORK | January 2025 | May 2025 | Allow | 4 | 1 | 0 | No | No |
| 19028234 | PRIVACY-PRESERVING TRANSFORMER MODEL WITH ENCRYPTED DIMENSIONALITY REDUCTION | January 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19025713 | INFORMATION OUTPUT DEVICE, INFORMATION OUTPUT METHOD, AND RECORDING MEDIUM | January 2025 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18880251 | SYSTEM AND METHOD FOR REAL-TIME APPLICATIONS OVER WIRELESS NETWORKS | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19003927 | USER CALIBRATION OF A MACHINE LEARNING MODEL TO RECOGNIZE NEURAL ACTIVITIES, AND APPLICATIONS THEREOF | December 2024 | May 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19003945 | AUTHENTICATION USING A BIOMETRIC TEMPLATE RELATED TO NEURAL ACTIVITY, AND APPLICATIONS THEREOF | December 2024 | June 2025 | Allow | 5 | 1 | 0 | No | No |
| 19000677 | SYSTEMS AND METHODS FOR EXECUTING AN ANALYTICAL OPERATION ACROSS A PLURALITY OF COMPUTER PROCESSES | December 2024 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18878264 | Communication System, Adapter for a Terminal and Method for Securely Transmitting Time-Critical Data within the Communication System | December 2024 | March 2025 | Allow | 3 | 0 | 0 | No | No |
| 18988185 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON RISK SCORE ANALYSIS AND METHODS OF USE THEREOF | December 2024 | March 2025 | Allow | 3 | 1 | 0 | No | No |
| 18981911 | PERSONALLY IDENTIFIABLE INFORMATION SCRUBBER WITH LANGUAGE MODELS | December 2024 | April 2025 | Allow | 4 | 0 | 0 | No | No |
| 18982812 | REAL-TIME ANOMALY DETECTION AND MITIGATION FOR STREAMING FUNCTIONAL DATA | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18981637 | SYSTEM AND METHOD FOR DISTRIBUTED EDGE-CLOUD HOMOMORPHIC COMPRESSION USING ADAPTIVE NEURAL NETWORKS | December 2024 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18978819 | SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEY | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18978826 | BROADCAST SYNCHRONIZATION WITH FAN ENGAGEMENT PLATFORM | December 2024 | January 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 18975491 | ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE | December 2024 | February 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18969536 | Cyber Detection Analytics Engine | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18962126 | SYSTEMS AND METHODS OF DIGITAL RIGHTS MANAGEMENT | November 2024 | June 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18955799 | Talking Head Digital Identity Authentication On A Distributed Network | November 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18954015 | SYSTEM AND METHOD FOR TRACING CLOUD COMPUTING ENVIRONMENT DEPLOYMENTS TO CODE OBJECTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18951209 | SYSTEM AND METHOD FOR APPLYING MULTI-SOURCE CYBERSECURITY POLICY ON COMPUTING ENVIRONMENTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18951202 | SECURE COMMUNICATIONS IN INTERACTIVE COMPUTING ENVIRONMENT | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18949882 | Hidden Compartments in Data Encrypted Using Machine Learning | November 2024 | January 2025 | Allow | 2 | 1 | 0 | No | No |
| 18948343 | Agent Functionality Extensions Using Surveyors | November 2024 | March 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 18947102 | DYNAMIC MULTI-MODEL MONITORING AND VALIDATION FOR ARTIFICIAL INTELLIGENCE MODELS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18946848 | AUTHENTICATION SERVER FOR PROVIDING SERVICE RELATED TO AUTHENTICATION OF COMPANION ANIMAL AND OPERATION METHOD THEREOF | November 2024 | June 2025 | Allow | 7 | 1 | 0 | No | No |
| 18946352 | ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENT | November 2024 | March 2025 | Allow | 4 | 0 | 0 | No | No |
| 18946325 | SYSTEMS AND METHODS FOR SECURE USER AUTHENTICATION WITH PASSKEYS ON SHARED COMPUTING DEVICES | November 2024 | April 2025 | Allow | 6 | 1 | 0 | No | No |
| 18945370 | Detection of Machine Learning Model Attacks Obfuscated in Unicode | November 2024 | March 2025 | Allow | 4 | 1 | 0 | No | No |
| 18940845 | SAFETY MANAGEMENT AND CONTROL SYSTEM FOR FULL LIFECYCLE OF INDUSTRIAL CONTROL DATA | November 2024 | February 2025 | Allow | 3 | 1 | 0 | No | No |
| 18940914 | SYSTEM AND METHOD TO ANALYZE SECURITY ACROSS DIGITAL ENVIRONMENTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18940371 | MULTI-PERIMETER FIREWALL IN THE CLOUD | November 2024 | March 2025 | Allow | 5 | 1 | 0 | No | No |
| 18938365 | SYSTEMS AND METHODS FOR DETECTING NON-PROVISIONED USAGE OF APPLICATIONS IN AN ORGANIZATION | November 2024 | March 2025 | Allow | 4 | 0 | 0 | No | No |
| 18927703 | Cryptography Bill of Materials (CBOM) Generation from Binary Executables | October 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18922798 | Directory Service Recommender Assessment & Scoring | October 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18923655 | DETECTION AND MITIGATION OF MACHINE LEARNING MODEL ADVERSARIAL ATTACKS | October 2024 | January 2025 | Allow | 3 | 0 | 0 | No | No |
| 18923219 | ACCESS CONTROL MANAGEMENT | October 2024 | March 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18913331 | SYSTEM AND METHOD FOR SOFTWARE SERVICE CYBERSECURITY REMEDIATION | October 2024 | January 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 18907977 | METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF | October 2024 | December 2024 | Allow | 2 | 1 | 0 | Yes | No |
| 18906462 | Cybersecurity Protection and Recovery Capability Measurement System | October 2024 | April 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18903573 | RISK SCORING OF CLOUD PERMISSION ASSIGNMENTS USING SUPERVISED MACHINE LEARNING | October 2024 | January 2025 | Allow | 3 | 0 | 0 | No | No |
| 18902566 | SYSTEM FOR SURVEYING SECURITY ENVIRONMENTS | September 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18900430 | GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATION | September 2024 | March 2025 | Allow | 6 | 0 | 0 | No | No |
| 18899772 | TOKEN MANAGEMENT IN A DIGITAL ENGINEERING PLATFORM | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18900142 | METHOD FOR TRANSMITTING MESSAGE APPLIED TO PRESET SERVER AND TERMINAL, AND ELECTRONIC DEVICE | September 2024 | July 2025 | Allow | 9 | 1 | 1 | Yes | No |
| 18893774 | Artificially Intelligent Systems and Methods for Managing Data Security | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18849353 | A SECURE AUTHENTICATION TOKEN | September 2024 | May 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18892232 | Machine Learning Model Parameter Based Encryption | September 2024 | April 2025 | Allow | 7 | 2 | 0 | Yes | No |
| 18892113 | Hidden Compartments in Data Encrypted Using Machine Learning | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18888941 | TECHNIQUE AND METHOD FOR DETECTION AND DISPLAY OF THE CYBERSECURITY RISK CONTEXT OF A CLOUD ENVIRONMENT | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888967 | TECHNIQUES FOR DETECTING ARTIFICIAL INTELLIGENCE MODEL CYBERSECURITY RISK IN A COMPUTING ENVIRONMENT | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18889216 | RADIO EXPOSURE FUNCTION FOR TELECOMMUNICATIONS NETWORKS | September 2024 | May 2025 | Allow | 8 | 2 | 0 | Yes | No |
| 18887627 | REMOTE COMPUTER NETWORK SECURITY TESTING | September 2024 | February 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 18887722 | ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPE | September 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18847840 | DEVICES, SYSTEMS, AND METHODS FOR SUMMARIZING ANALYTIC OBSERVATIONS | September 2024 | February 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 18885799 | System and Method for Efficient Malicious Code Detection and Malicious Open-Source Software Package Detection Using Large Language Models | September 2024 | January 2025 | Allow | 4 | 0 | 1 | Yes | No |
| 18847420 | SECURE DATA EXCHANGE MATCHING ACROSS IDENTITY PROVIDERS | September 2024 | February 2025 | Allow | 5 | 0 | 0 | No | No |
| 18885585 | DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT SELECTIONS | September 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18885584 | DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT PROVIDERS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18882398 | METHODS AND SYSTEMS FOR VERIFYING A WORKER AGENT | September 2024 | November 2024 | Allow | 3 | 0 | 0 | No | No |
| 18882699 | Host Deduplication for Vulnerability Detection and Management in IT Systems | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18830499 | INTELLIGENT PHOTO ALBUM SORTING AND PRIVACY PROTECTION METHOD | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18827265 | POLICY SELECTION SYSTEM | September 2024 | April 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18825028 | IDENTITY AUTHENTICATION SYSTEM FOR DISTRIBUTED INTERNET OF VEHICLES | September 2024 | November 2024 | Allow | 2 | 0 | 0 | No | No |
| 18823435 | MULTI-FACTOR AUTHENTICATION WORKFLOW MANAGEMENT WITH DISTRIBUTED ACCESS | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18823035 | SECURITY IN A FLEXIBLE SOFTWARE-DEFINED RADIO ACCESS NETWORK ARCHITECTURE AND METHODS FOR USE THEREWITH | September 2024 | March 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18823485 | Management System for Networked Endpoints | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18820411 | WEIGHTED TIMES SERIES FREQUENCY - INVERSE DOCUMENT FREQUENCY SCORING FOR CYBERSECURITY ALERTS | August 2024 | December 2024 | Allow | 4 | 1 | 0 | No | No |
| 18820043 | SYSTEMS, METHODS, AND GRAPHICAL USER INTERFACES FOR CONFIGURING AND EXECUTING ONE OR MORE COMPUTER-EXECUTABLE THREAT HUNTING PROTOCOLS IN A CYBERSECURITY THREAT DETECTION AND MITIGATION PLATFORM | August 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18819405 | WEB SERVICE-BASED MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE OF CALLING SERVICE | August 2024 | December 2024 | Allow | 4 | 1 | 0 | No | No |
| 18819535 | DATA PROCESSING METHOD, DEVICE, AND STORAGE MEDIUM | August 2024 | December 2024 | Allow | 4 | 0 | 0 | No | No |
| 18817890 | ACTIVE DATA DISPOSAL | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18818320 | SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORK | August 2024 | March 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18818560 | DYNAMIC, CONTROL-SENSITIVE DATA MANAGEMENT PLATFORM | August 2024 | March 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18812238 | ACCESS LIMITING METHOD, APPARATUS AND DEVICE FOR METADATA SERVER | August 2024 | May 2025 | Allow | 9 | 2 | 0 | No | No |
| 18812503 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT AND METHODS OF USE THEREOF | August 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18840363 | A CRYPTOGRAPHIC PROCESSING SYSTEM AND METHOD FOR IMPLEMENTING CRYSTALS-KYBER CRYPTOGRAPHIC ALGORITHMS AND CRYSTALS-DILITHIUM CRYPTOGRAPHIC ALGORITHMS USING TABLE-BASED ARITHMETIC-TO-BOOLEAN (A2B) MASKED SHARE CONVERSION | August 2024 | March 2025 | Allow | 7 | 0 | 0 | No | No |
| 18811739 | SYSTEMS AND METHODS FOR PREVENTING CYBERSECURITY ATTACKS THROUGH DIGITAL IDENTITY VERIFICATION | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18811662 | Systems and Methods for Assessing Security in a Computing Device Environment | August 2024 | June 2025 | Abandon | 10 | 1 | 0 | No | No |
| 18809806 | SYSTEM AND METHOD FOR SEARCHING FOR AND IDENTIFYING UNAUTHORIZED WEBSITES | August 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18809750 | METHOD AND SYSTEM FOR A SECURE MULTILEVEL NESTED BLOCKCHAIN DATA STORAGE | August 2024 | December 2024 | Allow | 4 | 1 | 0 | Yes | No |
| 18808231 | DYNAMIC DEFENSE SYSTEM AND METHOD OF NEW ENERGY CENTRALIZED CONTROL STATION NETWORK BASED ON DYNAMIC IP | August 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18807245 | METHOD FOR IMPROVED BIOMETRIC AUTHENTICATION | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18807438 | System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js Applications | August 2024 | November 2024 | Allow | 3 | 1 | 0 | No | No |
| 18805871 | DOMAIN NAME ENCRYPTION METHOD, DECRYPTION METHOD, AND APPARATUS BASED ON CONTENT DELIVERY NETWORK | August 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18805460 | WATERMARK EMBEDDING METHOD BASED ON SERVICE INVOCATION DATA | August 2024 | January 2025 | Allow | 5 | 1 | 0 | No | No |
| 18800166 | MICROGRID SELF-TRIGGERING CONTROL METHOD AND SYSTEM FOR RESISTING FDI ATTACKS | August 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18798872 | AUTOMATED SECURE ACCESS TO ONLINE ACCOUNTS | August 2024 | January 2025 | Allow | 5 | 2 | 0 | No | No |
| 18798404 | METHOD FOR DATA ACQUISITION, DEVICE AND STORAGE MEDIUM | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18798510 | METHOD AND APPARATUS FOR USING A PICTURE AND SHARED SECRET TO CREATE REPLICABLE HIGH QUALITY POOLS OF ENTROPY FOR KEYS FOR ENCRYPTION, AUTHENTICATION AND ONE TIME PADS FOR IMAGES, DATA AND MESSAGE ENCODING | August 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18796334 | ABNORMAL BEHAVIOR DETECTION METHOD, ELECTRONIC DEVICE AND NON-TRANSIENT COMPUTER-READABLE STORAGE MEDIUM | August 2024 | April 2025 | Allow | 8 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for group 2430.
With a 30.1% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 32.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Group 2430 is part of Technology Center 2400. This group has examined 79,569 patent applications in our dataset, with an overall allowance rate of 82.1%. Applications typically reach final disposition in approximately 30 months.
Applications in Group 2430 receive an average of 1.93 office actions before reaching final disposition. The median prosecution time is 30 months.
This group-level data aggregates statistics across multiple art units. For more targeted prosecution strategies, review the individual art unit and examiner statistics within this group.
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.