USPTO Art Unit 2431 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19082761NEURAL NETWORK-BASED SECURITY DEFENSE METHOD FOR ENCRYPTED MULTIMEDIA DATA, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCTMarch 2025May 2025Allow200YesNo
19067972Secure and Scalable Model Splicing of Digital Engineering Models for Software-Code-Defined Digital ThreadsMarch 2025April 2025Allow100YesNo
19048457EVALUATING SECURITY POLICIES IN AGGREGATEFebruary 2025March 2025Allow200YesNo
19031211WAPI TRUSTED WIRELESS LOCAL AREA NETWORK DEVICEJanuary 2025March 2025Allow200NoNo
18988185COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON RISK SCORE ANALYSIS AND METHODS OF USE THEREOFDecember 2024March 2025Allow310NoNo
18981637SYSTEM AND METHOD FOR DISTRIBUTED EDGE-CLOUD HOMOMORPHIC COMPRESSION USING ADAPTIVE NEURAL NETWORKSDecember 2024March 2025Allow200YesNo
18962126SYSTEMS AND METHODS OF DIGITAL RIGHTS MANAGEMENTNovember 2024June 2025Allow710YesNo
18922798Directory Service Recommender Assessment & ScoringOctober 2024January 2025Allow200YesNo
18906462Cybersecurity Protection and Recovery Capability Measurement SystemOctober 2024April 2025Allow710YesNo
18903573RISK SCORING OF CLOUD PERMISSION ASSIGNMENTS USING SUPERVISED MACHINE LEARNINGOctober 2024January 2025Allow300NoNo
18893774Artificially Intelligent Systems and Methods for Managing Data SecuritySeptember 2024April 2025Allow610YesNo
18888941TECHNIQUE AND METHOD FOR DETECTION AND DISPLAY OF THE CYBERSECURITY RISK CONTEXT OF A CLOUD ENVIRONMENTSeptember 2024February 2025Allow510NoNo
18887627REMOTE COMPUTER NETWORK SECURITY TESTINGSeptember 2024February 2025Allow500YesNo
18827265POLICY SELECTION SYSTEMSeptember 2024April 2025Allow710YesNo
18812238ACCESS LIMITING METHOD, APPARATUS AND DEVICE FOR METADATA SERVERAugust 2024May 2025Allow920NoNo
18812503COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT AND METHODS OF USE THEREOFAugust 2024December 2024Allow300NoNo
18805871DOMAIN NAME ENCRYPTION METHOD, DECRYPTION METHOD, AND APPARATUS BASED ON CONTENT DELIVERY NETWORKAugust 2024October 2024Allow200YesNo
18800166MICROGRID SELF-TRIGGERING CONTROL METHOD AND SYSTEM FOR RESISTING FDI ATTACKSAugust 2024November 2024Allow300YesNo
18795592AUTOMATED DISCOVERY AND EVALUATION OF VULNERABILITY HOTSPOTS IN COMPUTER NETWORKSAugust 2024October 2024Allow200NoNo
18785813COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON RISK SCORE ANALYSIS AND METHODS OF USE THEREOFJuly 2024November 2024Allow300NoNo
18783154CELLULAR IoT SECURITY USING DYNAMIC POLICY-DRIVEN MECHANISMS FOR THREAT MITIGATIONJuly 2024September 2024Allow200YesNo
18778183SYSTEMS AND METHODS FOR ANALYZING SPEECH DATA TO REMOVE SENSITIVE DATAJuly 2024October 2024Allow300YesNo
18769693System, Method, and Apparatus for Initiating Outbound Communications From a User DeviceJuly 2024January 2025Allow710YesNo
18760297SYSTEMS, METHODS, AND DEVICES FOR MULTI-STAGE PROVISIONING AND MULTI-TENANT OPERATION FOR A SECURITY CREDENTIAL MANAGEMENT SYSTEMJuly 2024January 2025Allow700NoNo
18756812SYSTEM AND METHOD FOR SECURITY PROTECTION OF NAS MESSAGESJune 2024February 2025Allow700NoNo
18755777Cloud security control platform that enforces scope-based security controlsJune 2024December 2024Allow510YesNo
18755627CODEBOOK-BASED HOMOMORPHIC ENCRYPTION FOR EFFICIENT AND PRIVACY-PRESERVING DATA PROCESSINGJune 2024August 2024Allow200YesNo
18742234SECURITY MODEL UTILIZING MULTI-CHANNEL DATA WITH VULNERABILITY REMEDIATION CIRCUITRYJune 2024June 2025Allow1210NoNo
18742430CONFERENCE SECURITY FOR USER GROUPSJune 2024June 2025Allow1210NoNo
18741445NETWORK CONFIGURATION ANALYSIS AND MANAGEMENTJune 2024February 2025Allow800YesNo
18737090OBFUSCATIONJune 2024November 2024Allow610YesNo
18680722END-TO-END ENCRYPTION WITH DISTRIBUTED KEY MANAGEMENT IN A TRACKING DEVICE ENVIRONMENTMay 2024March 2025Allow1000YesNo
18673681MANAGING VERSION SHARING IN A DATA EXCHANGEMay 2024June 2025Allow1300NoNo
18672978INTRUSION DETECTION USING A HEARTBEATMay 2024February 2025Allow900YesNo
18672749SYSTEM AND METHOD FOR DETECTING CYBERSECURITY RISKS IN MANAGED ARTIFICIAL INTELLIGENCE MODELSMay 2024December 2024Allow710NoNo
18669528CYBERSECURITY ARCHITECTURES FOR MULTI-CONTEXTUAL RISK QUANTIFICATIONMay 2024September 2024Allow400NoNo
18667464SYSTEMS AND METHODS FOR SECURITY PROCESS ANALYSISMay 2024October 2024Allow510NoNo
18665954DISTRIBUTED PRIVACY-PRESERVING COMPUTING ON PROTECTED DATAMay 2024July 2025Allow1410NoNo
18651556AGGREGATED AUTHORIZATION TOKENApril 2024September 2024Allow410YesNo
18649846SYSTEMS AND METHODS FOR EFFICIENT AND SECURE PROCESSING, ACCESSING AND TRANSMISSION OF DATA VIA A BLOCKCHAIN NETWORKApril 2024February 2025Allow1010NoNo
18649529TECHNIQUES FOR CIRCUMVENTING PROVIDER-IMPOSED LIMITATIONS IN SNAPSHOT INSPECTION OF DISKS FOR CYBERSECURITYApril 2024September 2024Allow510NoNo
18649633UNIVERSAL AUTHENTICATOR APPARATUS FOR OBTAINING HOST SERVICESApril 2024September 2024Allow410YesNo
18643874MOBILE ENROLLMENT USING A KNOWN BIOMETRICApril 2024November 2024Allow700YesNo
18634199Non-Persistent Data Caching Web ServerApril 2024December 2024Allow800YesNo
18630430ALTERNATIVE APPROACH TO THE GENERATION OF A UNIQUE RESPONSE TO A CHALLENGEApril 2024August 2024Allow410NoNo
18629254SYSTEM AND METHOD FOR SECURE ACCESS CONTROLApril 2024April 2025Allow1210YesNo
18628343SYSTEMS AND METHODS FOR CONFIGURATION LOCKINGApril 2024January 2025Allow910YesNo
18627926SYSTEMS AND METHODS FOR POSTURE-BASED MODELINGApril 2024December 2024Allow800YesNo
18628314SYSTEMS AND METHODS FOR SECURITY INTELLIGENCE EXCHANGEApril 2024August 2024Allow400YesNo
18698636COHERENT IMAGE ENCRYPTIONApril 2024August 2024Allow500YesNo
18621751Generative Artificial Intelligence Model Personally Identifiable Information Detection and ProtectionMarch 2024September 2024Allow610YesNo
18622676SYSTEMS AND METHODS FOR AUTOMATED RISK-BASED NETWORK SECURITY FOCUSMarch 2024November 2024Allow800YesNo
18618684TECHNIQUE AND METHOD FOR DETECTION AND DISPLAY OF THE CYBERSECURITY RISK CONTEXT OF A CLOUD ENVIRONMENTMarch 2024October 2024Allow610NoNo
18612055STATED AGE FILTERMarch 2024March 2025Allow1210YesNo
18612921ADVANCED DEIDENTIFICATION OF INFORMATION, SUCH AS INFORMATION ABOUT A PERSONMarch 2024June 2024Allow300YesNo
18605359SYSTEM, METHOD, AND PROGRAM FOR PROVIDING VIRTUAL CODE, VIRTUAL CODE GENERATING DEVICE, AND VIRTUAL CODE VERIFYING DEVICEMarch 2024April 2025Allow1310YesNo
18600073SECURITY ARCHITECTURE FOR INTERCONNECTED DIGITAL ENGINEERING AND CERTIFICATION ECOSYSTEMMarch 2024May 2024Allow200YesNo
18600282System and Method for Outlier and Anomaly Detection in Identity Management Artificial Intelligence Systems Using Cluster Based Analysis of Network Identity GraphsMarch 2024April 2025Allow1400YesNo
18600442Attack Path and Graph Creation Based on User and System ProfilingMarch 2024May 2025Allow1410NoNo
18595625IDENTIFYING LEGITIMATE WEBSITES TO REMOVE FALSE POSITIVES FROM DOMAIN DISCOVERY ANALYSISMarch 2024February 2025Allow1210NoNo
18592137ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFICFebruary 2024May 2024Allow200YesNo
18587821TUNNELLING WITH SUPPORT FOR DYNAMIC NAMING RESOLUTIONFebruary 2024April 2024Allow200YesNo
18587346AI-Based Vehicle Cybersecurity with 5G/6G Sub-Network TopologyFebruary 2024November 2024Allow911NoNo
18584670SYSTEM AND METHOD FOR DETECTING CYBERSECURITY RISKS IN MANAGED ARTIFICIAL INTELLIGENCE MODELSFebruary 2024May 2024Allow210NoNo
18443896DETECTING RANSOMWARE IN MONITORED DATAFebruary 2024February 2025Allow1210NoNo
18435762TECHNIQUES FOR CYBERSECURITY RISK-BASED FIREWALL CONFIGURATIONFebruary 2024August 2024Allow610NoNo
18429175MIDDLE-WARE ARTIFICIAL INTELLIGENCE (AI) ENGINEJanuary 2024July 2024Allow610NoNo
18416122Method and System for Cheon Resistant Static Diffie-Hellman SecurityJanuary 2024March 2025Allow1410YesNo
18416439ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFICJanuary 2024March 2025Allow1410YesNo
18414137SERVICE ASSURANCE VIA FEDERATION-BASED NETWORK DURING ROAMINGJanuary 2024November 2024Allow1010YesNo
18410625SYSTEMS AND METHODS FOR MALWARE DETECTION IN PORTABLE EXECUTABLE FILESJanuary 2024June 2024Allow510NoNo
18408909AI-DRIVEN INTEGRATION PLATFORM AND USER-ADAPTIVE INTERFACE FOR BUSINESS RELATIONSHIP ORCHESTRATIONJanuary 2024October 2024Allow910NoNo
18408878AI-DRIVEN INTEGRATION PLATFORM AND USER-ADAPTIVE INTERFACE FOR BUSINESS RELATIONSHIP ORCHESTRATIONJanuary 2024October 2024Allow910NoNo
18409412DEVICE VISIBILITY AND SCANNING INCLUDING NETWORK SEGMENTSJanuary 2024April 2025Allow1520YesNo
18399225REAL-TIME MITIGATIVE SECURITY ARCHITECTUREDecember 2023May 2025Abandon1710NoNo
18395745SCAN CHAIN SECURITY CIRCUIT AND DRIVING METHOD THEREOFDecember 2023July 2025Allow1800NoNo
18395400BUSINESS EMAIL COMPROMISE DETECTION SYSTEMDecember 2023June 2025Allow1720YesNo
18392878SYSTEMS AND METHODS FOR FEDERATED SEARCHES OF ASSETS IN DISPARATE DAM REPOSITORIESDecember 2023July 2024Allow700NoNo
18389730Threat Disposition Analysis and Modeling Using Supervised Machine LearningDecember 2023February 2025Allow1410NoNo
18545960COMPLEX NETWORK ATTACK DETECTION METHOD BASED ON CROSS-HOST ABNORMAL BEHAVIOR RECOGNITIONDecember 2023April 2024Allow410NoNo
18572088COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR CHECKING DATA ANONYMIZATIONDecember 2023June 2024Allow600NoNo
18543497SYSTEM AND METHOD FOR GENERATING CYBERSECURITY REMEDIATION IN COMPUTING ENVIRONMENTSDecember 2023July 2024Allow710NoNo
18542848VALIDATED TELEMETRY IN A ZERO-TRUST COMPUTING ENVIRONMENTDecember 2023June 2025Allow1800YesNo
18539989ELLIPTIC CURVE RANDOM NUMBER GENERATIONDecember 2023February 2025Allow1410NoNo
18538955Method and Device for Spatially Designating Private ContentDecember 2023October 2024Allow1000YesNo
18532335NON-REPUDIABLE PROOF OF DIGITAL IDENTITY VERIFICATIONDecember 2023May 2024Allow510YesNo
18531600PUBLIC KEY INFRASTRUCTURE USING QUANTUM COMPUTERS (PKIQC)December 2023June 2025Allow1800YesNo
18528893SECURING NODE GROUPSDecember 2023April 2025Allow1710NoNo
18527258SOCIAL MEDIA PROFILE IDENTIFICATION CONNECTED TO CRYPTOGRAPHIC TOKENDecember 2023July 2024Allow800YesNo
18519076METHOD FOR AUTHENTICATING USER FOR eKYC AUTOMATIONNovember 2023June 2025Allow1800YesNo
18563447DEVICES, SYSTEMS, AND METHODS FOR STANDARDIZING AND STREAMLINING THE DEPLOYMENT OF SECURITY INFORMATION AND EVENT MANAGEMENT ARTIFACTS FOR MULTIPLE TENANTSNovember 2023May 2024Allow600YesNo
18516088RANDOM NUMBER GENERATION SYSTEMS AND METHODSNovember 2023August 2024Allow900NoNo
18516520HOMOMORPHIC ENCRYPTION FOR WEB APPLICATION FIREWALL PROCESSINGNovember 2023June 2025Allow1900YesNo
18515410ADAPTIVE ARTIFICIAL INTELLIGENCE SYSTEMS AND METHODS FOR TOKEN VERIFICATIONNovember 2023June 2024Allow700YesNo
18510913Cyber Vulnerability Assessment Tool Threat Assessment HeuristicNovember 2023February 2025Allow1510NoNo
18510310BLOCKCHAIN DATA PROCESSING METHOD, APPARATUS, AND DEVICE, COMPUTER-READABLE STORAGE MEDIUM, AND COMPUTER PROGRAM PRODUCTNovember 2023June 2025Allow1900YesNo
18507015CONVERSATION MERGING FOR ELECTRONIC DEVICESNovember 2023October 2024Allow1110NoNo
18506318SYSTEMS AND METHODS OF SECURE PIN CODE ENTRYNovember 2023September 2024Allow1110NoNo
18505391COMMUNICATION METHOD AND APPARATUSNovember 2023May 2025Allow1800NoNo
18387624METHOD AND SYSTEM FOR GENERATING CRYPTOGRAPHIC KEYS ASSOCIATED WITH BIOLOGICAL EXTRACTION DATANovember 2023May 2025Allow1800NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2431.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
183
Examiner Affirmed
123
(67.2%)
Examiner Reversed
60
(32.8%)
Reversal Percentile
52.1%
Higher than average

What This Means

With a 32.8% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
731
Allowed After Appeal Filing
255
(34.9%)
Not Allowed After Appeal Filing
476
(65.1%)
Filing Benefit Percentile
60.5%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 34.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Art Unit 2431 - Prosecution Statistics Summary

Executive Summary

Art Unit 2431 is part of Group 2430 in Technology Center 2400. This art unit has examined 10,053 patent applications in our dataset, with an overall allowance rate of 84.5%. Applications typically reach final disposition in approximately 29 months.

Comparative Analysis

Art Unit 2431's allowance rate of 84.5% places it in the 78% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.

Prosecution Patterns

Applications in Art Unit 2431 receive an average of 1.79 office actions before reaching final disposition (in the 47% percentile). The median prosecution time is 29 months (in the 49% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With fewer office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.