USPTO Art Unit 2434 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19029580METHOD FOR EMULATING AN ATTACK ON AN ASSET WITHIN A TARGET NETWORKJanuary 2025May 2025Allow410NoNo
18878264Communication System, Adapter for a Terminal and Method for Securely Transmitting Time-Critical Data within the Communication SystemDecember 2024March 2025Allow300NoNo
18978826BROADCAST SYNCHRONIZATION WITH FAN ENGAGEMENT PLATFORMDecember 2024January 2025Allow100YesNo
18902566SYSTEM FOR SURVEYING SECURITY ENVIRONMENTSSeptember 2024December 2024Allow200YesNo
18847420SECURE DATA EXCHANGE MATCHING ACROSS IDENTITY PROVIDERSSeptember 2024February 2025Allow500NoNo
18882398METHODS AND SYSTEMS FOR VERIFYING A WORKER AGENTSeptember 2024November 2024Allow300NoNo
18830499INTELLIGENT PHOTO ALBUM SORTING AND PRIVACY PROTECTION METHODSeptember 2024March 2025Allow610NoNo
18825028IDENTITY AUTHENTICATION SYSTEM FOR DISTRIBUTED INTERNET OF VEHICLESSeptember 2024November 2024Allow200NoNo
18820043SYSTEMS, METHODS, AND GRAPHICAL USER INTERFACES FOR CONFIGURING AND EXECUTING ONE OR MORE COMPUTER-EXECUTABLE THREAT HUNTING PROTOCOLS IN A CYBERSECURITY THREAT DETECTION AND MITIGATION PLATFORMAugust 2024March 2025Allow610YesNo
18795033COMPUTER INVESTIGATION METHOD AND SYSTEMAugust 2024December 2024Allow500YesNo
18787691SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICESJuly 2024February 2025Allow600YesNo
18779858WATERMARKING DIGITAL MEDIA FOR AUTHENTICATED CONTENT VERIFICATIONJuly 2024October 2024Allow200YesNo
18775854SYSTEM AND METHOD FOR DISK INSPECTION UTILIZING DISK CLONING TECHNIQUESJuly 2024January 2025Allow610NoNo
18773421METHODS FOR PROVIDING AN ALERT OR AN ALARM TO A USER OF A MOBILE COMMUNICATIONS DEVICEJuly 2024February 2025Allow710YesNo
18773210SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICESJuly 2024February 2025Allow700YesNo
18770596INFERRING TRUST IN COMPUTER NETWORKSJuly 2024March 2025Allow810YesNo
18761508SYSTEMS AND METHODS FOR VARIABLE-LENGTH ENCODING AND DECODING FOR ENHANCING COMPUTER SYSTEMSJuly 2024March 2025Allow910NoNo
18756295SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATIONJune 2024December 2024Allow600YesNo
18755276SYSTEMS AND METHODS FOR PROVIDING ENHANCED SECURITY IN EDGE COMPUTING ENVIRONMENTSJune 2024June 2025Allow1110NoNo
18754090MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATIONJune 2024April 2025Allow910YesNo
18752000ROLLING ENCRYPTION AND AUTHENTICATION IN A LOW POWER PHYSICAL ASSET TRACKING SYSTEMJune 2024November 2024Allow410NoNo
18745043Managing and Routing Messages to Distributed User Devices in an Enterprise Computing EnvironmentJune 2024June 2025Allow1210NoNo
18670151Scheme for Transferring and Authenticating DataMay 2024March 2025Allow1010YesNo
18670049FILE REPAIR METHOD AND FILE REPAIR DEVICE FOR USER EQUIPMENTMay 2024December 2024Allow600YesNo
18668209SECURE USER AUTHENTICATION LEVERAGING QUANTUM KEY AND STEGANOGRAPHYMay 2024April 2025Allow1110NoNo
18664119AUTOMATIC ASSESSMENT OF POTENTIALLY MALICIOUS WEB CONTENT VIA WEB PAGE INVESTIGATORMay 2024January 2025Allow810NoNo
18662646EGRESS PIPELINE WITH TAG MANIPULATION AND ESI LABEL PUSH CAPABILITYMay 2024December 2024Allow700YesNo
18661092CLOUD PACKET TAPMay 2024November 2024Allow610NoNo
18657613AUTHENTICATION USING SESSION-LESS LOGINMay 2024October 2024Allow520NoNo
18652087CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATESMay 2024July 2024Allow200NoNo
18652093SYSTEM FOR SURVEYING SECURITY ENVIRONMENTSMay 2024July 2024Allow300YesNo
18652747Gambling Service with Adaptive Location Checking FrequencyMay 2024August 2024Allow400YesNo
18704941BLOCKCHAIN NETWORK SECURITY COMMUNICATION METHOD BASED ON QUANTUM KEYApril 2024October 2024Allow600NoNo
18646225CONTENT PERMISSION PLATFORMApril 2024June 2025Abandon1410NoNo
18646319SYSTEMS AND METHODS FOR TOKEN METADATA MANAGEMENTApril 2024March 2025Allow1110NoNo
18637995SYSTEMS AND METHODS FOR USE IN APPENDING LOG ENTRIES TO DATA STRUCTURESApril 2024February 2025Allow1010NoNo
18630518DIGITAL FILE FORENSIC ACCOUNTING AND MANAGEMENT SYSTEMApril 2024March 2025Allow1110NoNo
18626087AUTOMATED CREATION OF TRUSTED NETWORK PERIMETERApril 2024September 2024Allow510YesNo
18625948SECURE CONNECTIONS BETWEEN SERVERS IN A VIRTUAL PRIVATE NETWORKApril 2024January 2025Allow1010YesNo
18623310DYNAMIC CREATION OF OVERLAY NETWORK SLICES USING BORDER GATEWAY PROTOCOL FLOW SPECIFICATIONSApril 2024October 2024Allow700YesNo
18621269ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHODMarch 2024October 2024Allow600YesNo
18622118PROGRESSIVE PREFETCHINGMarch 2024April 2025Allow1310NoNo
18620370A METHOD AND SYSTEM FOR SECURE DATA TRANSMISSIONMarch 2024March 2025Allow1120YesNo
18618039DIGITAL ACCESS CONTROL USING TIME-BASED BASELINE ACCESS DISTRIBUTIONSMarch 2024February 2025Allow1110NoNo
18618570BROADCAST SYNCHRONIZATION WITH FAN ENGAGEMENT PLATFORMMarch 2024October 2024Allow710NoNo
18618895DEVICE PROVISIONING USING PARTIAL PERSONALIZATION SCRIPTSMarch 2024January 2025Allow900YesNo
18616156SYSTEM AND METHOD FOR RESTRICTING COMMUNICATIONS BETWEEN VIRTUAL PRIVATE CLOUD NETWORKS THROUGH SECURITY DOMAINSMarch 2024March 2025Allow1210NoNo
18613728Detecting Data Exfiltration and Compromised User Accounts in a Computing NetworkMarch 2024January 2025Allow1010NoNo
18693563IMAGE ENCRYPTION METHOD AND APPARATUS, IMAGE PROCESSING METHOD AND APPARATUS, AND DEVICE AND MEDIUMMarch 2024February 2025Allow1100NoNo
18602593I/O CIRCUIT DESIGN FOR SRAM-BASED PUF GENERATORSMarch 2024June 2025Allow1520YesNo
18603103Techniques For Automatically Configuring Minimal Cloud Service Access Rights For Container ApplicationsMarch 2024March 2025Allow1220NoNo
18598621EFFICIENT AUTHENTIC COMMUNICATION SYSTEM AND METHODMarch 2024February 2025Allow1110YesNo
18597654PARALLEL NETWORK-BASED VULNERABILITY SCANNINGMarch 2024November 2024Allow900YesNo
18593566AUTHENTICATION USING SESSION-LESS LOGINMarch 2024August 2024Allow620YesNo
18591842Message Authenticated Communication SessionsFebruary 2024January 2025Allow1110YesNo
18589466Hardware-Agnostic Specification of Packet-Processing PipelinesFebruary 2024September 2024Allow700NoNo
18585120THREAT MITIGATION SYSTEM AND METHODFebruary 2024February 2025Allow1220YesNo
18585428THREAT MITIGATION SYSTEM AND METHODFebruary 2024April 2025Allow1420NoNo
18585186THREAT MITIGATION SYSTEM AND METHODFebruary 2024January 2025Allow1120YesNo
18585011SYSTEMS AND METHODS FOR AUTHENTICATION OF PHYSICAL ACCESS TOKENS AT ACCESS TERMINALSFebruary 2024August 2024Allow610YesNo
18443380AUTOMATIC PRIVACY-AWARE MACHINE LEARNING METHOD AND APPARATUSFebruary 2024September 2024Allow700YesNo
18440636System and Method for Controlling Access Based on Preconditioned ActivitiesFebruary 2024June 2025Abandon1620NoNo
18440942METHODS AND APPARATUS FOR OFFLOADING ENCRYPTIONFebruary 2024March 2025Allow1310NoNo
18438881SYSTEMS AND METHODS FOR ENHANCED AUTHORIZATION MESSAGESFebruary 2024January 2025Allow1110NoNo
18438625CROSS-DOMAIN DISCOVERY BETWEEN SERVICE LAYER SYSTEMS AND WEB OF THINGS SYSTEMSFebruary 2024January 2025Allow1110NoNo
18436242ONLINE SECURITY CENTERFebruary 2024January 2025Allow1110YesNo
18435546TECHNOLOGIES FOR PROVIDING SECURE UTILIZATION OF TENANT KEYSFebruary 2024September 2024Allow700YesNo
18433657CONTROL APPARATUS, IN-VEHICLE COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD AND PROGRAMFebruary 2024May 2025Abandon1510NoNo
18429681SYSTEM FOR DYNAMIC COMMUNICATION CHANNEL SWITCHING BASED ON PRECONFIGURED NETWORK SECURITY PROTOCOLSFebruary 2024February 2025Allow1210NoNo
18428890SECURE EXECUTION OF USER-DEFINED FUNCTIONSJanuary 2024March 2025Allow1310NoNo
18425433DECENTRALIZED IDENTITY-BASED ACCESS CONTROL SYSTEMS AND METHODSJanuary 2024November 2024Allow1010NoNo
18425906Methods and Systems for Indicating the Possibility of a Cyber-Attack on a Computer NetworkJanuary 2024July 2024Allow610NoNo
18425019SYSTEMS AND METHODS FOR PASSWORD MANAGERSJanuary 2024September 2024Allow800YesNo
18423012DATA PLATFORM WITH UNIFIED PRIVILEGESJanuary 2024March 2025Allow1410NoNo
18420652CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATESJanuary 2024March 2025Allow1410NoNo
18417253SECURE AUTHENTICATIONJanuary 2024July 2024Allow610NoNo
18413496Processing External Messages Using a Secure Email RelayJanuary 2024February 2025Allow1310YesNo
18411018PRE-AUTHORIZATION ACCESS REQUEST SCREENINGJanuary 2024September 2024Allow800YesNo
18407496SCAN ENGINE EXTENSION FOR CUSTOMIZING APPLICATION SECURITY TESTING BEHAVIORJanuary 2024September 2024Allow800YesNo
18406799NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONSJanuary 2024April 2024Allow310NoNo
18407223SECURE ELECTRONIC TRANSACTIONS USING TRANSPORT LAYER SECURITY (SETUTLS)January 2024March 2025Abandon1410NoNo
18399561COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR FAULT RESISTANT MULTI-NODE COMMUNICATIONDecember 2023March 2025Abandon1510NoNo
18396309SYSTEM AND METHOD FOR ENCRYPTED DISK INSPECTION UTILIZING DISK CLONING TECHNIQUESDecember 2023July 2024Allow610NoNo
18393335SYSTEMS AND METHODS FOR PRIORITIZING URL REVIEW FOR SANDBOXING BASED ON ACCELERATED VELOCITIES OF URL FEATURES IN NETWORK TRAFFICDecember 2023October 2024Allow1010YesNo
18392985Virtual Secure RoomsDecember 2023August 2024Allow810NoNo
18393174METHODS AND APPARATUS FOR INTERFERING WITH MALWARE USING DISPLACED DISPLAY ELEMENTSDecember 2023February 2025Allow1410NoNo
18389969SYSTEMS AND METHODS FOR AUTHENTICATING END USERS OF A WEB SERVICEDecember 2023January 2025Allow1200YesNo
18390091SENSITIVE DATA LEAKAGE PROTECTIONDecember 2023July 2025Allow1800YesNo
18545519SECURELY MANIPULATING AND UTILIZING USER CREDENTIALSDecember 2023May 2025Abandon1710NoNo
18543380Command and Control Steganographic Communications Detection EngineDecember 2023October 2024Allow1010NoNo
18543453METHOD AND SYSTEM FOR EXCHANGING WEB AUTHENTICATION PROTOCOLS FOR PUBLIC CLOUD MIGRATIONSDecember 2023June 2025Allow1800NoNo
18544419INSTRUCTIONS AND LOGIC TO PROVIDE SIMD SM4 CRYPTOGRAPHIC BLOCK CIPHER FUNCTIONALITYDecember 2023January 2025Allow1300YesNo
18542406POLICY-BASED SECURE CONTAINERS FOR MULTIPLE ENTERPRISE APPLICATIONSDecember 2023August 2024Allow800YesNo
18542551SECURE INSTALLATION OF APPLICATION KEYSDecember 2023October 2024Allow1110NoNo
18542094QUIC AND ANYCAST PROXY RESILIENCYDecember 2023July 2024Allow700YesNo
18539735NETWORK SECURITY ENFORCEMENT USING FLEXIBLE CLIENT GROUPING AT THE CONTROL PLANE AND DATA PLANEDecember 2023May 2025Allow1700NoNo
18538809SYNCHRONIZATION OF DIGITAL RIGHTS MANAGEMENT DATADecember 2023January 2025Allow1310NoNo
18535021AUTOMATIC RETRAINING OF MACHINE LEARNING MODELS TO DETECT DDOS ATTACKSDecember 2023October 2024Allow1010NoNo
18536028CONTROLLED TOKEN DISTRIBUTION TO PROTECT AGAINST MALICIOUS DATA AND RESOURCE ACCESSDecember 2023March 2025Allow6020NoNo
18535884PATTERNLESS OBFUSCATION OF DATA WITH LOW-COST DATA RECOVERYDecember 2023November 2024Allow1110NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2434.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
301
Examiner Affirmed
209
(69.4%)
Examiner Reversed
92
(30.6%)
Reversal Percentile
41.8%
Lower than average

What This Means

With a 30.6% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
778
Allowed After Appeal Filing
248
(31.9%)
Not Allowed After Appeal Filing
530
(68.1%)
Filing Benefit Percentile
45.2%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 31.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2434 - Prosecution Statistics Summary

Executive Summary

Art Unit 2434 is part of Group 2430 in Technology Center 2400. This art unit has examined 9,404 patent applications in our dataset, with an overall allowance rate of 83.6%. Applications typically reach final disposition in approximately 29 months.

Comparative Analysis

Art Unit 2434's allowance rate of 83.6% places it in the 74% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2434 receive an average of 1.81 office actions before reaching final disposition (in the 49% percentile). The median prosecution time is 29 months (in the 49% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With fewer office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.