USPTO Art Unit 2434 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19301719METHODS FOR NON-INVASIVE API DISCOVERY, MONITORING AND EXPLOITATION DETECTION IN THIRD-PARTY PROCESSESAugust 2025November 2025Allow300NoNo
19214704SECURITY PLATFORMS WITH INTEGRATED POLICY ENFORCEMENTMay 2025December 2025Allow710NoNo
19203103GENERATING PARAMETERS FOR MALICIOUS ACTIVITY DETECTION USING DECISION TREESMay 2025June 2025Allow200NoNo
19123076PROGRAMMABLE DEVICE, VERSION CONTROL SYSTEM, VERSION CONTROL METHOD, AND PROGRAMApril 2025January 2026Allow900NoNo
19169644Method and System for Request Identification for Security and Fairness in Serverless FunctionsApril 2025October 2025Allow610YesNo
19097466DIRECTIVE MIGRATION WITH EPHEMERAL TRIGGERSApril 2025October 2025Allow710NoNo
19041961Secure Environment Public Register (SEPR)January 2025January 2026Allow1220YesNo
19041958Secure Environment Public Register (SEPR)January 2025December 2025Allow1020YesNo
19029580METHOD FOR EMULATING AN ATTACK ON AN ASSET WITHIN A TARGET NETWORKJanuary 2025May 2025Allow410NoNo
19019501AUTHENTICATION USING SESSION-LESS LOGINJanuary 2025August 2025Allow710NoNo
19014413ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHODJanuary 2025February 2026Allow1310NoNo
18878264Communication System, Adapter for a Terminal and Method for Securely Transmitting Time-Critical Data within the Communication SystemDecember 2024March 2025Allow300NoNo
18999682UTILIZING MACHINE-LEARNING MODELS TO DETERMINE TAKE-OVER SCORES AND INTELLIGENTLY SECURE DIGITAL ACCOUNT FEATURESDecember 2024February 2026Allow1400NoNo
18999167CONSTRAINT-BASED RESOURCE PLANNING FOR SERVER CLUSTERSDecember 2024July 2025Allow1910YesNo
18990450SECURE TRANSLATOR FOR INSECURE COMPUTING DEVICEDecember 2024October 2025Allow1000YesNo
18978826BROADCAST SYNCHRONIZATION WITH FAN ENGAGEMENT PLATFORMDecember 2024January 2025Allow100YesNo
18976319SECURE MOBILE DEVICE MANAGEMENTDecember 2024February 2025Allow300NoNo
18966712WATERMARKING DIGITAL MEDIA FOR CONTENT VERIFICATION WITH DIFFERENTIAL DETECTIONDecember 2024October 2025Allow1100NoNo
18964338DYNAMIC PRIVILEGE ADJUSTMENT FOR DATA ACCESSIBLE TO ARTIFICIAL INTELLIGENCE AGENTSNovember 2024November 2025Allow1220YesNo
18959418CONSISTENT ACCESS CONTROL LISTS ACROSS FILE SERVERS FOR LOCAL USERS IN A DISTRIBUTED FILE SERVER ENVIRONMENTNovember 2024March 2026Allow1600NoNo
18952377DETERMINISTIC USER DEVICE IDENTIFICATIONNovember 2024June 2025Allow710YesNo
18948553Selective Online Content Removal Based on Activity HistoryNovember 2024March 2026Allow1600YesNo
18912441SECURE TAMPER RESISTANT DATA PROCESSING, STORAGE, AND TRANSMISSION GATEWAY AND CONTROLLER AND DATA ANOMALY DETECTION PROGRAMOctober 2024March 2026Allow1700YesNo
18907610SECURE COMMUNICATION BETWEEN INFORMATION TECHNOLOGY NETWORK AND OPERATIONAL TECHNOLOGY NETWORKOctober 2024March 2026Allow1700NoNo
18906943SYSTEM AND METHOD FOR IMPROVED USER AUTHENTICATION IN A MULTISYSTEM NETWORKOctober 2024October 2025Allow1300YesNo
18907308MULTI-FACTOR DIGITAL TRANSMISSION SCREENINGOctober 2024February 2026Allow1600YesNo
18902566SYSTEM FOR SURVEYING SECURITY ENVIRONMENTSSeptember 2024December 2024Allow200YesNo
18851393SINGLE REQUEST ARCHITECTURE FOR INCREASING EFFICIENCY OF SECURE MULTI-PARTY COMPUTATIONSSeptember 2024January 2026Allow1500NoNo
18897790Secure Modular Machine Learning PlatformSeptember 2024February 2026Allow1600YesNo
18847420SECURE DATA EXCHANGE MATCHING ACROSS IDENTITY PROVIDERSSeptember 2024February 2025Allow500NoNo
18885820DEVICE UPDATE TRANSMISSION USING A FILTERSeptember 2024January 2026Allow1600YesNo
18884765METHOD OF SECURE DATA STORAGE AND TRANSFERSeptember 2024January 2026Allow1600YesNo
18882398METHODS AND SYSTEMS FOR VERIFYING A WORKER AGENTSeptember 2024November 2024Allow300NoNo
18882096SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A RESOURCE BASED ON A COMPLIANCE SCORESeptember 2024December 2025Allow1500NoNo
18829648COMPUTER SYSTEM AND METHOD FOR SYSTEM MEMORY ENCRYPTION AND DECRYPTIONSeptember 2024March 2026Allow1810NoNo
18845824THRESHOLD SEARCHABLE SYMMETRIC ENCRYPTIONSeptember 2024February 2026Allow1700YesNo
18830499INTELLIGENT PHOTO ALBUM SORTING AND PRIVACY PROTECTION METHODSeptember 2024March 2025Allow610NoNo
18845203COMMUNICATION NETWORK DEVICES, COMMUNICATION NETWORK SYSTEM AND METHOD FOR MONITORING UNMANNED AERIAL SYSTEMS IN A COMMUNICATION NETWORKSeptember 2024January 2026Allow1600NoNo
18829034QUIC AND ANYCAST PROXY RESILIENCYSeptember 2024January 2026Allow1600YesNo
18845144TIME-BASED APPROACHES IN MALWARE SIMULATION FOR RESPONSIVE MEASURE DEPLOYMENTSeptember 2024January 2026Allow1610NoNo
18825028IDENTITY AUTHENTICATION SYSTEM FOR DISTRIBUTED INTERNET OF VEHICLESSeptember 2024November 2024Allow200NoNo
18823368SYSTEMS AND METHODS FOR DISTRIBUTED TRUST MODEL AND FRAMEWORKSeptember 2024December 2025Allow1500YesNo
18843024PROOF OF DATA RETENTION WITH BLOCKCHAINAugust 2024March 2026Allow1800YesNo
18820043SYSTEMS, METHODS, AND GRAPHICAL USER INTERFACES FOR CONFIGURING AND EXECUTING ONE OR MORE COMPUTER-EXECUTABLE THREAT HUNTING PROTOCOLS IN A CYBERSECURITY THREAT DETECTION AND MITIGATION PLATFORMAugust 2024March 2025Allow610YesNo
18820107SYSTEMS AND METHODS FOR ENFORCING CRYPTOGRAPHICALLY SECURE ACTIONS IN PUBLIC, NON-PERMISSIONED BLOCKCHAINS USING BIFURCATED SELF-EXECUTING PROGRAMS COMPRISING SHARED DIGITAL SIGNATURE REQUIREMENTSAugust 2024March 2026Allow1910YesNo
18812568SYSTEMS AND METHODS FOR APPLYING POLICIES IN A DATACENTER ENVIRONMENTAugust 2024February 2026Allow1800YesNo
18811060SECURE PACKET RECORD IN MULTI-SOURCE VR ENVIRONMENTAugust 2024March 2026Allow1910YesNo
18800982SYSTEMS AND METHODS FOR PROVIDING USER PREFERENCES FOR A CONNECTED DEVICEAugust 2024December 2025Allow1700NoNo
18799687MULTI-ROUTE VIRTUAL PRIVATE NETWORKINGAugust 2024December 2025Allow1600YesNo
18797912METHODS, COMPUTER DEVICES, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIA FOR LEARNING OF WATERMARKING MODEL USING COMPLEX ATTACKAugust 2024December 2025Allow1700YesNo
18795848REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSISAugust 2024February 2026Allow1810NoNo
18795033COMPUTER INVESTIGATION METHOD AND SYSTEMAugust 2024December 2024Allow500YesNo
18790505TRAINING AND USING MULTI-TASK PREDICTIVE RISK MODELS IN SOFTWARE APPLICATIONSJuly 2024December 2025Allow1600YesNo
18787690EFFICIENT AND SECURE KEY ROTATION FOR BACKUP STORAGEJuly 2024November 2025Allow1600NoNo
18787691SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICESJuly 2024February 2025Allow600YesNo
18781942REDUCING CYBERSECURITY RISK LEVEL OF A PORTFOLIO OF COMPANIES USING A CYBERSECURITY RISK MULTIPLIERJuly 2024December 2025Allow1700YesNo
18779858WATERMARKING DIGITAL MEDIA FOR AUTHENTICATED CONTENT VERIFICATIONJuly 2024October 2024Allow200YesNo
18778640USING EMBEDDINGS TO OBFUSCATE PRIVATE DATA IN RESOURCE ASSIGNMENTSJuly 2024January 2026Allow1800NoNo
18775854SYSTEM AND METHOD FOR DISK INSPECTION UTILIZING DISK CLONING TECHNIQUESJuly 2024January 2025Allow610NoNo
18772926PERIPHERAL DEVICE SANDBOXJuly 2024February 2026Allow1910NoNo
18773139COMPUTER-BASED SYSTEMS HAVING COMPONENTS CONFIGURED/PROGRAMMED FOR VIDEO PASSWORD BASED AUTHENTICATION AND METHODS OF USE THEREOFJuly 2024January 2026Allow1810NoNo
18773421METHODS FOR PROVIDING AN ALERT OR AN ALARM TO A USER OF A MOBILE COMMUNICATIONS DEVICEJuly 2024February 2025Allow710YesNo
18773210SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICESJuly 2024February 2025Allow700YesNo
18769455KEY STORAGE DEVICE AND METHOD FOR WRITING KEY VALUE INTO ONE-TIME-PROGRAMMABLE DEVICEJuly 2024November 2025Allow1600NoNo
18770173METHOD AND SYSTEM FOR IMPLEMENTING HIGH AVAILABILITY (HA) WEB APPLICATION FIREWALL (WAF) FUNCTIONALITYJuly 2024October 2025Allow1500YesNo
18770469AUTONOMOUS SERVER AGENTSJuly 2024January 2026Allow1910NoNo
18770596INFERRING TRUST IN COMPUTER NETWORKSJuly 2024March 2025Allow810YesNo
18769044APPARATUS AND METHOD FOR PERFORMING THREAT ANALYSIS AND RISK ASSESSMENT FOR VEHICLE CYBERSECURITYJuly 2024October 2025Allow1500YesNo
18761508SYSTEMS AND METHODS FOR VARIABLE-LENGTH ENCODING AND DECODING FOR ENHANCING COMPUTER SYSTEMSJuly 2024March 2025Allow910NoNo
18761517LLM POWERED SECURITY PRODUCT FACADEJuly 2024October 2025Allow1500NoNo
18761613SYSTEMS AND METHODS FOR ACCESS CONTROLJuly 2024February 2026Allow2020YesNo
18759426RECORD-LEVEL ENCRYPTION SCHEME FOR DATA OWNERSHIP PLATFORMJune 2024April 2025Allow920YesNo
18759530DATA AUGMENTATION FOR THREAT INVESTIGATION IN AN ENTERPRISE NETWORKJune 2024July 2025Allow1310YesNo
18759745ENTITY MALICIOUSNESS ANALYSIS USING AUTONOMOUS ARTIFICIAL INTELLIGENCE AGENTSJune 2024October 2025Allow1500NoNo
18759753NETWORK SECURITY SYSTEMS AND METHODSJune 2024March 2026Allow2010NoNo
18759286AUTOMATED THREAT MODEL GENERATIONJune 2024January 2026Allow1910YesNo
18756295SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATIONJune 2024December 2024Allow600YesNo
18756165SECURING SENSITIVE DATA IN EDGE DEVICES USING STEGANOGRAPHYJune 2024October 2025Allow1500YesNo
18755276SYSTEMS AND METHODS FOR PROVIDING ENHANCED SECURITY IN EDGE COMPUTING ENVIRONMENTSJune 2024June 2025Allow1110NoNo
18752893SEGMENTATION OF WEB DOCUMENTS BASED ON DETECTED SECURITY VULNERABILITIESJune 2024August 2025Allow1410YesNo
18754090MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATIONJune 2024April 2025Allow910YesNo
18753250ANONYMIZATION IN A LOW POWER PHYSICAL ASSET TRACKING SYSTEMJune 2024July 2025Allow1311NoNo
18751999Personal Data DiscoveryJune 2024January 2026Allow1910NoNo
18752000ROLLING ENCRYPTION AND AUTHENTICATION IN A LOW POWER PHYSICAL ASSET TRACKING SYSTEMJune 2024November 2024Allow410NoNo
18747324SECURE ONLINE ID VALIDATION AND REVIEWJune 2024December 2025Allow1810YesNo
18745043Managing and Routing Messages to Distributed User Devices in an Enterprise Computing EnvironmentJune 2024June 2025Allow1210NoNo
18744401INSPECTING REQUESTS AND RESPONSES TO IDENTIFY APPLICATION VULNERABILITIESJune 2024September 2025Allow1500YesNo
18742372SYSTEM AND METHOD FOR UTILIZATION OF THREAT DATA FOR NETWORK SECURITYJune 2024October 2025Allow1620NoNo
18740097ARTIFICIAL INTELLIGENCE ADVERSARY RED TEAMJune 2024September 2025Allow1520YesNo
18735120PRESERVING CONFIDENTIALITY OF TENANTSJune 2024February 2026Allow2010NoNo
18734887THIRD-PARTY SERVICE FOR SUGGESTING RESOURCES FOR A RECEIVED MESSAGEJune 2024September 2025Allow1600YesNo
18732277SYSTEM AND METHOD FOR MANAGING THREATS IN OPEN TRANSACTION NETWORKSJune 2024November 2025Allow1700YesNo
18731679METHOD AND SYSTEM FOR MODIFYING AND VALIDATING API REQUESTSJune 2024April 2025Allow1010NoNo
18732285SYSTEM AND METHOD FOR IDENTIFYING AND BLOCKING SYNTHETIC MEDIA BASED MISAPPROPRIATION ATTEMPTS ASSOCIATED WITH ELECTRONIC COMMUNICATIONSJune 2024January 2026Allow1900NoNo
18732095Secure Server Digital Signature Generation for Post-Quantum Cryptography Key EncapsulationsJune 2024January 2026Allow2000YesNo
18680079AUTHENTICATION FOR WIRELESS NETWORKSMay 2024February 2026Allow2010NoNo
18680098AUTHENTICATION FOR INTERMITTENTLY CONNECTED NETWORKSMay 2024September 2025Allow1600NoNo
18679355DYNAMIC RECONSTRUCTION OF CLOUD APPLICATION TRAFFIC FOR SECURITY MONITORINGMay 2024October 2025Allow1600NoNo
18676099MEDIATED TRAFFIC CONTROL THROUGH MID-LINK SERVERMay 2024August 2025Allow1400YesNo
18672970HYBRID PKI KEYLOADER METHODS AND SYSTEMSMay 2024October 2025Allow1700YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2434.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
335
Examiner Affirmed
239
(71.3%)
Examiner Reversed
96
(28.7%)
Reversal Percentile
30.0%
Lower than average

What This Means

With a 28.7% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
875
Allowed After Appeal Filing
273
(31.2%)
Not Allowed After Appeal Filing
602
(68.8%)
Filing Benefit Percentile
44.8%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 31.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2434 - Prosecution Statistics Summary

Executive Summary

Art Unit 2434 is part of Group 2430 in Technology Center 2400. This art unit has examined 9,281 patent applications in our dataset, with an overall allowance rate of 81.8%. Applications typically reach final disposition in approximately 31 months.

Comparative Analysis

Art Unit 2434's allowance rate of 81.8% places it in the 70% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2434 receive an average of 1.91 office actions before reaching final disposition (in the 52% percentile). The median prosecution time is 31 months (in the 50% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.