USPTO Art Unit 2432 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19370903SELECTING A MALWARE SCANNER FROM MULTIPLE MALWARE SCANNERSOctober 2025March 2026Allow400NoNo
19347347SYSTEM AND A METHOD FOR IDENTIFYING PRIVATE USER INFORMATIONOctober 2025February 2026Allow400YesNo
19315759GENERATING, USING ARTIFICIAL INTELLIGENCE, TEST DATA TO TEST MALWARE SCANNER(S)September 2025January 2026Allow400YesNo
19301013SALTED BLOOM FILTERS FOR PEER-TO-PEER DATA DISSEMINATIONAugust 2025December 2025Allow410YesNo
19286965Real Time Translation System and Method Involving Burdened and Unburdened ContentJuly 2025November 2025Allow301NoNo
19280803AI-DRIVEN COMPLIANCE MAPPING FOR REGULATORY STANDARDSJuly 2025January 2026Allow510YesNo
19261964REFLEX-REACTION SERVER LEAKAGE CONTAINMENT SYSTEMJuly 2025September 2025Allow200YesNo
19232164TOKENIZATION WITH FORMAT PRESERVATIONJune 2025November 2025Allow510NoNo
19227656SYSTEMS AND METHODS FOR MALWARE DETECTION IN PORTABLE EXECUTABLE FILESJune 2025October 2025Allow410NoNo
19228045STATEFUL API ATTACKS DETECTIONJune 2025December 2025Allow610YesNo
19180193SECURITY CALCULATION METHOD AND SYSTEM FOR SIDE CHANNEL RESISTANCE BASED ON DATA MARKINGApril 2025November 2025Allow710NoNo
19116990Secure Learning SystemMarch 2025October 2025Allow710NoNo
19084548Ransomware Behavioral Kernel ModelMarch 2025June 2025Allow310YesNo
19068128REAL TIME TRANSLATION SYSTEM AND METHOD INVOLVING BURDENED AND UNBURDENED CONTENTMarch 2025January 2026Abandon1020YesNo
19059945SYSTEMS AND METHODS FOR AUTOMATICALLY TUNING ONE OR MORE API POLLERS IN A CYBERSECURITY EVENT DETECTION AND RESPONSE SERVICEFebruary 2025September 2025Allow710YesNo
19057964SYSTEMS AND METHODS FOR A CONNECTED COMPUTING RESOURCE AND EVENT/ACTIVITY IDENTIFICATION INFORMATION INFRASTRUCTURE USING NEAR EXISTENTIAL OR EXISTENTIAL BIOMETRIC IDENTIFICATION OF HUMANSFebruary 2025July 2025Allow500YesNo
19029931SYSTEM AND METHOD FOR LOADING ENCLAVE-AWARE EXECUTABLESJanuary 2025February 2026Allow1311YesNo
19017057INFORMATION PROCESSING DEVICE AND METHOD FOR CONTROLLING INFORMATION PROCESSING DEVICEJanuary 2025January 2026Abandon1220YesNo
19014025CUSTOM LOSS FUNCTIONS FOR TRAINING MODELS FOR CYBERSECURITY APPLICATIONSJanuary 2025June 2025Allow510NoNo
19003927USER CALIBRATION OF A MACHINE LEARNING MODEL TO RECOGNIZE NEURAL ACTIVITIES, AND APPLICATIONS THEREOFDecember 2024May 2025Allow510YesNo
19000677SYSTEMS AND METHODS FOR EXECUTING AN ANALYTICAL OPERATION ACROSS A PLURALITY OF COMPUTER PROCESSESDecember 2024March 2025Allow200YesNo
18991584Systems and Methods for Updating and Distributing Information Associated with an IndividualDecember 2024October 2025Allow1020NoNo
18984909ALARM MESSAGE PROCESSING METHOD, SYSTEM, DEVICE, AND MEDIUMDecember 2024July 2025Allow710NoNo
18962559CYBERSECURITY THREAT DETECTION UTILIZING SENSOR-BASED AGGREGATED RUNTIME EXECUTION DATANovember 2024June 2025Allow710YesNo
18907977METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOFOctober 2024December 2024Allow220YesNo
18903977TECHNOLOGIES FOR TRUSTED I/O PROTECTION OF I/O DATA WITH HEADER INFORMATIONOctober 2024February 2026Allow1600YesNo
18887722ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPESeptember 2024March 2025Allow610YesNo
18885799System and Method for Efficient Malicious Code Detection and Malicious Open-Source Software Package Detection Using Large Language ModelsSeptember 2024January 2025Allow401YesNo
18885585DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT SELECTIONSSeptember 2024December 2024Allow300NoNo
18823336METHOD AND SYSTEM FOR PROVIDING A SECURE COMMUNICATIONSeptember 2024February 2026Allow1710NoNo
18817848METHOD AND SYSTEM FOR ENHANCING REAL-TIME GRID SECURITY OF POWER SYSTEMAugust 2024March 2026Allow1810NoNo
18811449METHOD FOR UNLOCKING AN ELECTRONIC DEVICEAugust 2024March 2026Allow1910NoNo
18809220SYSTEMS AND METHODS FOR PROVIDING CONTAINERIZED APPLICATIONS WITH UPDATED SECRET VALUESAugust 2024January 2026Allow1700NoNo
18795244Detecting Security Vulnerabilities Associated with Transient Radio Frequency DevicesAugust 2024January 2025Allow610NoNo
18793122SYSTEMS AND METHODS FOR GENERATING ACCOUNT PERMISSIONS BASED ON APPLICATION PROGRAMMING INTERFACE INTERACTIONSAugust 2024May 2025Allow1020YesNo
18792444Generative AI Model Protection using SidecarsAugust 2024December 2024Allow410YesNo
18787274PROVIDING RANDOM NUMBERS OVER AN INSECURE CHANNEL USING DISGUISED CYPHERTEXTSJuly 2024January 2026Allow1800NoNo
18780721SYSTEM FOR REAL-TIME AUTHENTICATED OBFUSCATION OF ELECTRONIC DATAJuly 2024February 2026Allow1810NoNo
18769102REFLEX-REACTION SERVER LEAKAGE CONTAINMENT SYSTEMJuly 2024June 2025Allow1220YesNo
18760945METHOD AND SYSTEM OF PROVIDING ACCESS TO DOCUMENTS STORED IN PERSONAL STORAGE MEDIUMSJuly 2024February 2025Allow700YesNo
18758874SYSTEM AND METHODS FOR DATA ENCRYPTION AND APPLICATION-AGNOSTIC QUERYING OF ENCRYPTED DATAJune 2024January 2026Allow1900NoNo
18757198INTELLIGENT AI RISK MANAGEMENT FRAMEWORKJune 2024December 2024Allow501YesNo
18751956Multiplexing Encrypted TunnelsJune 2024February 2026Allow1910YesNo
18750942SERVICE PROVIDING SYSTEM AND METHOD FOR SECURITY OF DATA BASED ON WEB BROWSERJune 2024September 2025Allow1500NoNo
18748596ADDING POLICY CODING TO PACKET HEADERS TO USE TO ACCESS RESOURCES IN A SECURE NETWORKJune 2024January 2026Allow1910YesNo
18744505SYSTEMS AND METHODS FOR AUTHENTICATION AND AUTHORIZATION FOR SOFTWARE LICENSE MANAGEMENTJune 2024December 2025Allow1820NoNo
18743399ITEM TRACKING WITH A WIRELESS COMMUNICATION SYSTEM BASED ON A FIFTH GENERATION IDENTIFIER (5GID) AND A GLOBAL TRACKING ITEM NUMBER (GTIN)June 2024June 2025Allow1210YesNo
18743002DOCUMENT CREATION AND MANAGEMENT SYSTEMJune 2024September 2025Allow1520YesNo
18741768PERFORMING A SECURITY ACTION BASED ON A SUSPICIOUS CROSS AUTHORIZATION EVENTJune 2024August 2025Allow1500NoNo
18718126ACCESS CONTROL APPARATUS, ACCESS CONTROL METHOD, AND PROGRAMJune 2024September 2025Allow1500NoNo
18735593METHODS AND SYSTEMS FOR DETECTING INADVERTENT UNAUTHORIZED ACCOUNT ACCESSJune 2024July 2025Allow1310NoNo
18733034JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTIONJune 2024February 2026Allow2010YesNo
18715965UNIVERSAL QUANTUM SECURE DEVICE, METHOD OF SENDING DATA AND METHOD OF RECEIVING DATAJune 2024March 2026Allow2110YesNo
18680718STRUCTURING IPV6 ADDRESSES INTO BIT FIELDS TO EMBED LANGUAGE LOCALIZATION AND SERVICESMay 2024March 2026Allow2110NoNo
18680289SYSTEMS AND METHODS OF PERFORMING MACHINE LEARNING OPERATIONS USING SECURE ENCLAVESMay 2024March 2026Allow2110NoNo
18678673CONTROLLED ENVIRONMENT SECURE MEDIA STREAMING SYSTEMMay 2024June 2025Abandon1310NoNo
18676304SYSTEMS AND METHODS FOR IMPROVING ACCURACY IN RECOGNIZING AND NEUTRALIZING INJECTION ATTACKS IN COMPUTER SERVICESMay 2024September 2025Allow1500YesNo
18672460ASYNCHRONOUS SUPERVISION FOR SOVEREIGN CLOUD PLATFORMSMay 2024March 2025Allow1010NoNo
18673183UPSTREAM APPROACH FOR SECURE CRYPTOGRAPHY KEY DISTRIBUTION AND MANAGEMENT FOR MULTI-SITE DATA CENTERSMay 2024October 2024Allow500NoNo
18670285RADIO ACCESS NODES AND TERMINAL DEVICES IN A COMMUNICATION NETWORKMay 2024September 2024Allow400NoNo
18669379Generative Artificial Intelligence Model Output ObfuscationMay 2024August 2024Allow300YesNo
18669491SYSTEMS AND METHODS FOR INCREASED SECURITY IN CLUSTER FORMATIONMay 2024October 2025Allow1700NoNo
18668741SYSTEMS AND METHODS FOR IDENTITY VERIFICATION AND AUTHENTICATIONMay 2024February 2025Allow910NoNo
18667367NETWORK SYSTEM, DEVICE, AND PROCESSING METHODMay 2024April 2025Allow1110NoNo
18666801Static Trusted Execution Environment for Inter-Architecture Processor Program CompatibilityMay 2024January 2026Allow2020YesNo
18659351HEADLESS NODE PROGRAMMING SYSTEMMay 2024October 2025Allow1700NoNo
18657011TRACTION POWER SIMULATIONMay 2024April 2025Abandon1110NoNo
18655439SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACKMay 2024September 2025Allow1700YesNo
18652268Secure Distributed Samplers for Cryptographic Reference StringsMay 2024November 2025Allow1800NoNo
18648987SYSTEMS AND METHODS FOR GENERATING SNAPSHOTS BASED ON FILE INPUTS AND OUTPUTSApril 2024February 2026Allow2110NoNo
18645395Context-Based Risk Assessment for an Identity Verification SystemApril 2024February 2025Allow900YesNo
18645125STORAGE ACCESS MONITORING METHOD AND STORAGE ACCESS MONITORING DEVICEApril 2024March 2026Allow2210YesNo
18639267SYSTEM AND METHOD FOR IMPLEMENTING DATA SOVEREIGNTY SAFEGUARDS IN A DISTRIBUTED SERVICES NETWORK ARCHITECTUREApril 2024February 2025Allow1010YesNo
18638789METHODS FOR FILTERING AND FOR QUALIFYING SECURITY EVENTS OF AN INTRUSION DETECTION SYSTEMApril 2024January 2026Allow2110YesNo
18636918SYSTEMS AND METHODS FOR PRIVACY-PRESERVING INVENTORY MATCHING WITH SECURITY AGAINST MALICIOUS ADVERSARIESApril 2024December 2024Allow810NoNo
18634092Program Execution Anomaly Detection for CyberSecurityApril 2024October 2025Allow1800NoNo
18700529THRESHOLD SIGNATURE SCHEMEApril 2024August 2025Allow1600NoNo
18631768LOAD BALANCING NETWORK FOR DYNAMICALLY ADAPTING AND COMMUNICATING DATAApril 2024July 2024Allow300YesNo
18630360SESSION RECOVERY MECHANISMApril 2024September 2025Allow1730YesNo
18630298SECURE MEDIA STREAMING COMMUNICATION VIA USER DATAGRAM PROTOCOLApril 2024February 2025Allow1010NoNo
18631006System and method for generating sandbox environments in a computing networkApril 2024September 2025Allow1700NoNo
18627200NUMBER-THEORETIC TRANSFORM ARCHITECTURE FOR LATTICE-BASED CRYPTOGRAPHIC ALGORITHMSApril 2024January 2026Allow2110YesNo
18626083SYSTEMS AND METHODS FOR ADDRESSING SECURITY-RELATED VULNERABILITIES ARISING IN RELATION TO OFF-BLOCKCHAIN CHANNELS IN THE EVENT OF FAILURES IN A NETWORKApril 2024October 2024Allow700YesNo
18624818SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODEApril 2024January 2025Allow1000YesNo
18622167ADVERSARIAL SCRIPT GENERATION USING ARTIFICIAL INTELLIGENCE MODELSMarch 2024September 2024Allow610YesNo
18618519ARTIFICIAL INTELLIGENCE BASED INTEGRATION FRAMEWORKSMarch 2024May 2025Allow1320NoNo
18617981GRANTING RESOURCE ACCESS USING INTEGRATION OF SENSITIVITY DATA TAGSMarch 2024September 2025Allow1800NoNo
18617424DETECTING RANSOMWAREMarch 2024July 2025Allow1620YesNo
18617219ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPEMarch 2024October 2025Allow1810YesNo
18615945Method and Apparatus for Utilization of Domain Name System for Efficient Certificate Data Retrieval in Plug and Charge EcosystemsMarch 2024February 2026Allow2310YesNo
18614589SYSTEMS AND METHODS FOR USE IN DATA COUPLING AMONG DATA STRUCTURESMarch 2024December 2025Allow2010NoNo
18694041AUTHENTICATION SYSTEM, USER DEVICE, AND KEY INFORMATION TRANSMISSION METHODMarch 2024December 2025Allow2110NoNo
18608444SECURE ARBITRATION MODE TO BUILD AND OPERATE WITHIN TRUST DOMAIN EXTENSIONSMarch 2024November 2025Allow2010NoNo
18602158FIRST FACTOR CONTACTLESS CARD AUTHENTICATION SYSTEM AND METHODMarch 2024September 2024Allow700YesNo
18602162CRYPTO RECOVERY SEED PHRASE STORAGE DEVICEMarch 2024February 2026Allow2320NoNo
18601747QUANTUM KEY DISTRIBUTION FOR SECURE AND PRIVATE TRANSACTIONSMarch 2024February 2025Allow1110YesNo
18601012Entity Profile Signatures for Improving Malware DetectionMarch 2024January 2026Allow2310NoNo
18600480UNIVERSAL PRIVILEGED ACCESS FOR WEB APPLICATIONS THROUGH REMOTE BROWSER ISOLATIONMarch 2024October 2025Allow1900YesNo
18600516BIT-LEVEL DATA EXTRACTION AND THREAT DETECTIONMarch 2024March 2025Allow1210YesNo
18689281ELECTRONIC DEVICE, TRUSTED APPLICATION CALLING METHOD AND APPARATUS, DEVICE, AND MEDIUMMarch 2024November 2024Allow800YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2432.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
204
Examiner Affirmed
153
(75.0%)
Examiner Reversed
51
(25.0%)
Reversal Percentile
15.5%
Lower than average

What This Means

With a 25.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
643
Allowed After Appeal Filing
184
(28.6%)
Not Allowed After Appeal Filing
459
(71.4%)
Filing Benefit Percentile
29.1%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 28.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2432 - Prosecution Statistics Summary

Executive Summary

Art Unit 2432 is part of Group 2430 in Technology Center 2400. This art unit has examined 6,528 patent applications in our dataset, with an overall allowance rate of 75.5%. Applications typically reach final disposition in approximately 38 months.

Comparative Analysis

Art Unit 2432's allowance rate of 75.5% places it in the 47% percentile among all USPTO art units. This art unit has a below-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2432 receive an average of 2.24 office actions before reaching final disposition (in the 75% percentile). The median prosecution time is 38 months (in the 20% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more challenging examination environment compared to the USPTO average.
  • With more office actions than average, plan for multiple rounds of prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.