Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19115721 | DATA ENCRYPTION METHOD AND RELATED COMPONENT | March 2025 | June 2025 | Allow | 2 | 0 | 0 | No | No |
| 19078119 | Electronic Document Presentation Management System | March 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19074401 | AUTHENTICATION SIGNATURE EMBEDDING IN DIGITAL MEDIA | March 2025 | May 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19058833 | TECHNIQUES FOR SEMANTIC ANALYSIS OF CYBERSECURITY EVENT DATA AND REMEDIATION OF CYBERSECURITY EVENT ROOT CAUSES | February 2025 | April 2025 | Allow | 2 | 0 | 0 | No | No |
| 19041984 | CYBER RESILIENCE AGENTIC MESH | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19040705 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19034297 | SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION | January 2025 | March 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 19027830 | RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTURE | January 2025 | June 2025 | Allow | 5 | 1 | 0 | No | No |
| 19021683 | NETWORK EDGE DIGITAL TWIN FOR IOT ATTACK DETECTION | January 2025 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19020851 | INFORMATION NOTIFICATION METHOD AND INFORMATION NOTIFICATION DEVICE | January 2025 | June 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 19006065 | METHOD FOR PROTECTING DATA IN A WIRELESS BODY AREA NETWORK (WBAN) SYSTEM | December 2024 | April 2025 | Allow | 4 | 0 | 0 | No | No |
| 18985870 | DYNAMIC ORCHESTRATION-BASED AUDIO-VIDEO SECURITY PROTECTION METHOD, DEVICE AND SYSTEM | December 2024 | April 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18983922 | METHOD AND APPARATUS FOR SUPPORTING NETWORK ASSISTANCE SECURITY ESTABLISHMENT IN UE-TO-UE RELAY IN A WIRELESS COMMUNICATION SYSTEM | December 2024 | March 2025 | Allow | 3 | 0 | 0 | No | No |
| 18974123 | SYSTEM AND METHOD FOR SCANNING PRIVATE CODE AND CI/CD REGISTRIES | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18964330 | DERIVED ACCESS PERMISSIONS FOR INPUTS TO ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18964322 | DERIVED PERMISSIONS FOR STORED OUTPUTS FROM ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | February 2025 | Allow | 3 | 0 | 0 | No | No |
| 18963186 | PROBABILISTIC EVENT LINKING | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18961639 | SECURE DEVICE COMMUNICATION USING MULTI-KEY ENCAPSULATION | November 2024 | February 2025 | Allow | 2 | 0 | 0 | No | No |
| 18961324 | ALARM DATA PROCESSING METHOD, APPARATUS, MEDIUM AND ELECTRONIC DEVICE | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18956421 | Server, Switch and Endpoints for Secure Communications | November 2024 | May 2025 | Allow | 6 | 1 | 0 | No | No |
| 18954389 | DYNAMIC SYSTEM RESOURCE-SENSITIVE MODEL SOFTWARE AND HARDWARE SELECTION | November 2024 | March 2025 | Allow | 4 | 1 | 0 | No | No |
| 18949425 | ENCRYPTOR, DECRYPTOR, COMMUNICATIONS SYSTEM, METHODS, COMMUNICATIONS METHOD | November 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18946217 | Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation Platform | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18945409 | Canonicalization of Unicode Prompt Injections | November 2024 | February 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 18943149 | Methods and Systems for Efficient Cybersecurity Policy Enforcement on Network Communications | November 2024 | February 2025 | Allow | 3 | 0 | 0 | No | No |
| 18940631 | TECHNOLOGIES FOR AUTHENTICATIONS VIA WEB COMPONENTS | November 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18863577 | METHOD FOR REMOTE GENERATION OF TWO ARBITRARY-LENGTH IDENTICAL RANDOM CRYPTOGRAPHIC KEYS WITH THE DEVICE-INDEPENDENT SECURITY USING ENTANGLED MULTI-PHOTON SOURCES OF QUANTUM LIGHT | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18938972 | GRANULAR SECURITY SEGMENTATION FOR COMPUTING ASSETS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18932967 | CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUS | October 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18930882 | TRAFFIC TRANSMISSION CONTROL METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUM | October 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18923017 | LIGHTWEIGHT INTRUSION DETECTION METHOD AND SYSTEM OF INTERNET OF VEHICLES BASED ON KNOWLEDGE DISTILLATION | October 2024 | January 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18922019 | INFORMATION PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | October 2024 | June 2025 | Allow | 8 | 2 | 0 | No | No |
| 18917690 | SYSTEM AND METHOD FOR DETERMINING CODE REACHABILITY IN A NETWORKED COMPUTING ENVIRONMENT | October 2024 | January 2025 | Allow | 3 | 1 | 0 | No | No |
| 18914035 | DETECTING MALICIOUS ACTIVITY USING USER-SPECIFIC PARAMETERS | October 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18910161 | SYSTEMS AND METHODS FOR USER AUTHENTICATION ON SHARED MOBILE DEVICES | October 2024 | January 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 18909109 | AUTHENTICATED CROSS-SUBNET COMMUNICATION | October 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18906652 | SYSTEMS AND METHODS FOR IMPLEMENTING INTERIM SECURITY POLICIES | October 2024 | December 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18901801 | AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTION | September 2024 | March 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18902634 | SYSTEMS AND METHODS TO PERFORM PHISHING DETECTION AND DEVICE ATTESTATION VIA BROWSER EXTENSION | September 2024 | March 2025 | Allow | 5 | 0 | 1 | Yes | No |
| 18902822 | METHOD FOR AUTHENTICATING THE QURAN IN DIGITAL FORMAT AND CERTIFYING THE AUTHENTICITY OF THE DIGITAL QURAN | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18900562 | INTERACTIVE ELECTRONIC SIGNATURE PLATFORM UTILIZING EMBEDDED PERSONALIZED MEDIA | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18899726 | Information Processing Method, Information Processing Apparatus, and Non-Transitory Computer-Readable Storage Medium | September 2024 | July 2025 | Allow | 9 | 2 | 0 | No | No |
| 18892215 | Data Obfuscation Using Encoder-Multi-Decoder Architecture | September 2024 | March 2025 | Allow | 5 | 1 | 0 | No | No |
| 18892295 | CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATION | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18892283 | CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATION | September 2024 | April 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18892131 | DISTRIBUTED TRAFFIC STEERING AND ENFORCEMENT FOR SECURITY SOLUTIONS | September 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18888947 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888955 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18888973 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | September 2024 | February 2025 | Allow | 5 | 1 | 0 | No | No |
| 18887706 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | September 2024 | March 2025 | Allow | 6 | 2 | 0 | No | No |
| 18887697 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | September 2024 | December 2024 | Allow | 2 | 1 | 0 | No | No |
| 18887807 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS | September 2024 | November 2024 | Allow | 2 | 1 | 0 | No | No |
| 18885207 | SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONS | September 2024 | April 2025 | Allow | 7 | 0 | 1 | Yes | No |
| 18885474 | CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATION | September 2024 | December 2024 | Allow | 3 | 1 | 0 | No | No |
| 18885510 | CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATION | September 2024 | December 2024 | Allow | 3 | 1 | 0 | No | No |
| 18882373 | METHODS AND SYSTEMS FOR VERIFYING A USER AGENT | September 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18830573 | LATENCY-, ACCURACY-, AND PRIVACY-SENSITIVE TUNING OF ARTIFICIAL INTELLIGENCE MODEL SELECTION PARAMETERS AND SYSTEMS AND METHODS OF THE SAME | September 2024 | March 2025 | Allow | 6 | 1 | 0 | No | No |
| 18829996 | THREAT CLASSIFICATION IN A STREAMING SYSTEM | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18830359 | IMPROVEMENTS TO SEARCHABLE SYMMETRIC ENCRYPTION | September 2024 | June 2025 | Allow | 9 | 1 | 0 | No | No |
| 18829109 | SYSTEM FOR CYBERSECURITY CAMPAIGN ARTIFACT DISCOVERY AND TASKING | September 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18824956 | Secure localization method for multi-mobile robots based on network communication | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18843974 | METHOD AND APPARATUS FOR DETECTING URL RELATED TO PHISHING SITE USING ARTIFICIAL INTELLIGENCE AND GENERATIVE AI ALGORITHM | September 2024 | March 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18823271 | DIGITAL ASSET MANAGEMENT | September 2024 | November 2024 | Allow | 3 | 0 | 0 | No | No |
| 18820347 | INTEGRATED SECURITY FOR CLOUD APPLICATIONS | August 2024 | December 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18843232 | CONTAINER OPERATION CONTROL METHOD AND APPARATUS | August 2024 | June 2025 | Allow | 9 | 0 | 0 | No | No |
| 18842723 | REQUESTING A CERTIFICATE IN A DOCUMENTED MANNER USING A REGISTRATION POINT | August 2024 | March 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18841847 | METHOD AND SYSTEM FOR DETECTING ANOMALY IN RADIO ACCESS NETWORK | August 2024 | May 2025 | Allow | 9 | 2 | 0 | No | No |
| 18815573 | COMPUTER-IMPLEMENTED AUTHENTICATION PLATFORM | August 2024 | December 2024 | Allow | 4 | 1 | 0 | No | No |
| 18841316 | SECURE AND PRIVACY PRESERVING MESSAGE ROUTING SYSTEM | August 2024 | February 2025 | Allow | 6 | 0 | 0 | No | No |
| 18808778 | SYSTEMS AND METHODS FOR END POINT INTEGRATION AND MAPPING | August 2024 | January 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18809098 | System for Cross-Domain Identity Management (SCIM) Proxy Service | August 2024 | October 2024 | Allow | 2 | 0 | 0 | No | No |
| 18807827 | METHOD, APPARATUS, DEVICE, AND MEDIUM FOR PERMISSION PROCESSING | August 2024 | March 2025 | Allow | 7 | 1 | 0 | No | No |
| 18806828 | REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMS | August 2024 | January 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18806047 | CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAME | August 2024 | March 2025 | Allow | 7 | 2 | 0 | No | No |
| 18806184 | METHOD AND SYSTEM FOR COLLECTING CONSUMPTION DATA MEASURED BY SMART METERS | August 2024 | June 2025 | Allow | 10 | 1 | 0 | No | No |
| 18806633 | METHOD FOR DATA PROCESSING, READABLE MEDIUM AND ELECTRONIC DEVICE | August 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18802673 | SYSTEMS AND METHODS FOR CANDIDACY DETERMINATIONS AND REQUEST PROCESSING WHILE MAINTAINING USER DATA ANONYMITY | August 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18800553 | COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON AUTOMATED KEY TERRAIN IDENTIFICATION AND METHODS OF USE THEREOF | August 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18797027 | PROXY AUTONOMOUS PROTOCOL FOR BLOCKCHAIN ACCESS CONTROL | August 2024 | October 2024 | Allow | 3 | 0 | 0 | No | No |
| 18790563 | METHOD AND SYSTEM FOR MANAGING GLOBAL CONTROL GROUP (GCG) | July 2024 | June 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18787250 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS | July 2024 | April 2025 | Allow | 8 | 2 | 0 | No | No |
| 18785419 | CLOUD DATA ATTACK SURFACE TRACKING USING GRAPH-BASED EXCESSIVE PRIVILEGE DETECTION | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18781121 | RISK EVENT DETECTION USING ACTIVITY AND GRAPH-BASED CONTEXT FOR CLOUD DATA SECURITY POSTURE MANAGEMENT | July 2024 | February 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18782019 | IDENTIFYING AND ANALYZING ACTIONS FROM VECTOR REPRESENTATIONS OF ALPHANUMERIC CHARACTERS USING A LARGE LANGUAGE MODEL | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18779552 | ACTIVE ACCESS AUTHENTICATION METHOD AND DEVICE USING THE SAME | July 2024 | September 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18776878 | TECHNIQUES TO SUPPORT TIERED SECURITY ZONES FOR WEB-BASED APPLICATIONS | July 2024 | October 2024 | Allow | 3 | 0 | 0 | No | No |
| 18774334 | RECEIVING INFORMATION THROUGH A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK | July 2024 | January 2025 | Allow | 6 | 0 | 1 | Yes | No |
| 18770937 | METHODS AND APPARATUS FOR WTRU-TO-WTRU RELAY DISCOVERY SECURITY AND PRIVACY | July 2024 | December 2024 | Allow | 5 | 1 | 0 | No | No |
| 18771876 | MAPPING IDENTIFIED GAPS IN CONTROLS TO OPERATIVE STANDARDS USING A GENERATIVE ARTIFICIAL INTELLIGENCE MODEL | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18770236 | PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERS | July 2024 | March 2025 | Allow | 8 | 1 | 0 | No | No |
| 18770575 | CRYPTOGRAPHIC KEY MANAGEMENT AND TRANSFER | July 2024 | February 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18770585 | CONSENT DATA PIPELINE ARCHITECTURE AND OPERATION | July 2024 | February 2025 | Allow | 8 | 0 | 0 | No | No |
| 18768151 | DEVICE PAIRING WITH OPTICAL CODES | July 2024 | April 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18769344 | BLOCKCHAIN FOR GENERAL COMPUTATION | July 2024 | June 2025 | Allow | 11 | 1 | 0 | No | No |
| 18767075 | REMOTE IDENTIFICATION AND MANAGEMENT OF MANNED AND UNMANNED SYSTEMS AND DEVICES | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18767953 | SECURITY ANALYSIS METHOD AND SYSTEM BASED ON PROTOCOL STATE | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18767960 | SECURITY PROTECTION METHOD AND DEVICE BASED ON INDUSTRIAL INTERNET | July 2024 | November 2024 | Allow | 4 | 1 | 0 | No | No |
| 18766474 | SECURING ATTESTATION USING A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK | July 2024 | November 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18764792 | METHODS, SYSTEMS, AND DEVICES FOR VERIFYING A LOCATION OF A COMMUNICATION DEVICE | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18757651 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM | June 2024 | May 2025 | Allow | 10 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for group 2490.
With a 26.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 35.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Group 2490 is part of Technology Center 2400. This group has examined 51,666 patent applications in our dataset, with an overall allowance rate of 82.2%. Applications typically reach final disposition in approximately 28 months.
Applications in Group 2490 receive an average of 1.92 office actions before reaching final disposition. The median prosecution time is 28 months.
This group-level data aggregates statistics across multiple art units. For more targeted prosecution strategies, review the individual art unit and examiner statistics within this group.
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.