USPTO Art Unit 2435 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19340698INTEGRATED AGENT-DRIVEN DATA FRAMEWORKSeptember 2025March 2026Allow510YesNo
19328030RESOURCE UTILIZATION ESTIMATION AND ALLOCATION FOR MULTI-AGENT COMPUTATIONAL SYSTEMSSeptember 2025November 2025Allow200NoNo
19305988TYPED SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) TRIAGE PROCESSING COMPONENTS SYSTEMAugust 2025November 2025Allow200NoNo
19301809ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTUREAugust 2025January 2026Allow510NoNo
19301893ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTUREAugust 2025January 2026Allow510NoNo
19300607METHODS AND SYSTEMS FOR DOMAIN-SPECIFIC INTERVIEW SIMULATIONSAugust 2025November 2025Allow300NoNo
19296653AUTOMATED THREAT HUNTINGAugust 2025October 2025Allow300NoNo
19283194AUTONOMOUS AGENT OBSERVATION AND CONTROLJuly 2025December 2025Allow500NoNo
19272328CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINSJuly 2025October 2025Allow300YesNo
19268956OPERATION METHOD OF ELECTRONIC APPARATUS FOR PERFORMING LARGE LANGUAGE MODEL BASED ANALYSIS INFERENCE FOR MALICIOUS SCRIPT ACTIONJuly 2025August 2025Allow100YesNo
19268166COLLUSION-RESISTANT IDENTITY-BASED AND QUANTUM-RESILIENT SECURE CORRELATION SCHEMESJuly 2025December 2025Allow500NoNo
19267471Insecure Model Context Protocol Server Remediation for Artificial Intelligence AgentsJuly 2025October 2025Allow300NoNo
19267475Streamlined Policy Administration of Model Context Protocol Servers for Artificial Intelligence AgentsJuly 2025December 2025Allow510NoNo
19264594SYSTEMS AND METHODS FOR AUTOMATIC VULNERABILITY ASSESSMENT OF MACHINE LEARNING MODELSJuly 2025December 2025Allow510NoNo
19264639SYSTEMS AND METHODS FOR MEDICAL IMAGING GATEWAYSJuly 2025November 2025Allow510NoNo
19263395Provenance for AI Twin of an ArtistJuly 2025January 2026Allow710NoNo
19261636SYSTEMS AND METHODS FOR REAL-TIME DETECTION AND MITIGATION OF MALICIOUS ELECTRONIC COMMUNICATIONSJuly 2025September 2025Allow200NoNo
19224127TECHNIQUES FOR CROSS ENTITY CORRELATION OF USER ACCOUNTS IN CLOUD COMPUTING ENVIRONMENTSMay 2025October 2025Allow500YesNo
18847213METHOD FOR DETECTING DATA STEALTHY ATTACK ON NETWORKED SYSTEM WITH DIFFERENTIAL PRIVACY PROTECTIONMay 2025July 2025Allow1000YesNo
19217385TECHNIQUES FOR ACTIVE INSPECTION DETECTION OF EFFECTIVE NETWORK EXPOSURE THROUGH A CLOUD-NATIVE PROXY APPLIANCEMay 2025July 2025Allow200YesNo
19217405SYSTEM AND METHOD FOR APPLYING CYBERSECURITY CONTROLS ON CLOUD NATIVE ROUTING SERVICESMay 2025July 2025Allow200YesNo
19217379TECHNIQUES FOR DETECTION OF CYBERSECURITY ISSUES ON THIRD PARTY SOFTWARE APPLIANCES UTILIZING CUSTOM CONFIGURATION LOGSMay 2025October 2025Allow510NoNo
19214799COMPUTERIZED SECURITY PLATFORMS INCLUDING A ROLE-BASED PERMISSIONS SYSTEMMay 2025November 2025Allow610NoNo
19204523Data Processing Orchestrator Utilizing Semantic Type Inference and Privacy PreservationMay 2025August 2025Allow400NoNo
19193127CYBERSECURITY ROOT CAUSE ANALYSIS USING COMPUTING RESOURCE NAME CORRELATIONApril 2025September 2025Allow410NoNo
19192958SYSTEMS AND METHODS FOR FACILITATING QUANTUM-RESISTANT ENCRYPTION OF DATAApril 2025September 2025Allow501NoNo
19188648TECHNIQUES FOR CONTROL PLANE LEVEL CONTAINMENTApril 2025July 2025Allow300YesNo
19183978SYSTEM AND METHOD FOR PRIVACY POLICY ENFORCEMENTApril 2025January 2026Allow910YesNo
19173428MACHINE LEARNING MODELING TO IDENTIFY SENSITIVE DATAApril 2025August 2025Allow410NoNo
19173767Computer-Implemented System That Enables Detection Of Fraudulent GPS Coordinates Provided During Media Collection For Inspections Performed Via Mobile DevicesApril 2025September 2025Allow500NoNo
19118772TRAINING A SUPERVISED MACHINE LEARNING MODEL FOR ANOMALY DETECTIONApril 2025June 2025Allow200YesNo
19118583CONTROLLED PRIVACY IN BIOMETRIC IDENTIFICATIONApril 2025November 2025Allow710NoNo
19094636DATA MANAGEMENT PLATFORMMarch 2025June 2025Allow310NoNo
19092750TECHNIQUES FOR API ENDPOINT MITIGATIONMarch 2025October 2025Allow610NoNo
19086583SECURE AND DYNAMIC PEER-BASED NETWORK CONNECTION CONFIGURATION, ROUTING, AND CONTROLMarch 2025October 2025Allow710NoNo
19114194Method, Device and System for Managing Carbon Data and Related ApparatusMarch 2025February 2026Allow1120NoNo
19112335DATA SHARING SYSTEM, METHOD AND APPARATUS, AND DEVICE AND MEDIUMMarch 2025January 2026Allow1000NoNo
19070154DETECTION OF STALE DATA OBJECTS AND ASSOCIATED CYBERSECURITY RISKMarch 2025June 2025Allow410NoNo
19070261System and Method for Performing Access Control Enforcement via Packet InspectionMarch 2025July 2025Allow510NoNo
19069949SYSTEMS AND METHODS FOR DIGITAL THREAT ASSESSMENT AND MITIGATION USING T-DIGEST SCORE DISTRIBUTION REPRESENTATIONS AND PERCENTILE-BASED THREAT SCORING IN A DIGITAL THREAT MITIGATION PLATFORMMarch 2025June 2025Allow410NoNo
19065161LIVE MASKINGFebruary 2025August 2025Allow510NoNo
19054256SYSTEMS AND METHODS FOR HIGH-CONFIDENCE SYMMETRIC-KEY DOCUMENT SIGNING AND ENCRYPTION USING A COMPUTING DEVICEFebruary 2025February 2026Allow1210YesNo
19045368Detection of Privacy Attacks on Machine Learning ModelsFebruary 2025May 2025Allow300YesNo
19040407ACTIVITY GRAPH FOR AUTOMATED INVESTIGATIONJanuary 2025August 2025Allow610NoNo
19035283NETWORK DATA DECODING AND ENCODINGJanuary 2025April 2025Allow300YesNo
19011802ARTIFICIAL INTELLIGENCE BASED (AI-BASED) SYSTEM AND METHOD POWERED BY LARGE LANGUAGE MODELS (LLMs) FOR MONITORING USERS DURING TASKS PERFORMED BY THE USERSJanuary 2025June 2025Allow510NoNo
19000872TECHNIQUES FOR RISK AND CONSTRAINT-BASED INSPECTIONDecember 2024April 2025Allow300YesNo
19000595SECURITY HARDENING OF A RENEWABLE ENERGY DEVICE SYSTEMDecember 2024June 2025Allow610YesNo
18986948DETECTION ENGINE WITH STATEFUL DETECTION WITH ENTITY STREAMDecember 2024October 2025Allow1020NoNo
18981911PERSONALLY IDENTIFIABLE INFORMATION SCRUBBER WITH LANGUAGE MODELSDecember 2024April 2025Allow400NoNo
18982355CYBERSECURITY ROOT CAUSE ANALYSIS USING COMPUTING RESOURCE NAME CORRELATIONDecember 2024April 2025Allow410YesNo
18975533FINE-GRAINED ACCESS TO SYSTEM COMMANDS RUN VIA AN INSTALLED AGENT APPLICATIONDecember 2024July 2025Allow710YesNo
18954015SYSTEM AND METHOD FOR TRACING CLOUD COMPUTING ENVIRONMENT DEPLOYMENTS TO CODE OBJECTSNovember 2024January 2025Allow200NoNo
18951209SYSTEM AND METHOD FOR APPLYING MULTI-SOURCE CYBERSECURITY POLICY ON COMPUTING ENVIRONMENTSNovember 2024January 2025Allow200YesNo
18947102DYNAMIC MULTI-MODEL MONITORING AND VALIDATION FOR ARTIFICIAL INTELLIGENCE MODELSNovember 2024January 2025Allow200YesNo
18945370Detection of Machine Learning Model Attacks Obfuscated in UnicodeNovember 2024March 2025Allow410NoNo
18938365SYSTEMS AND METHODS FOR DETECTING NON-PROVISIONED USAGE OF APPLICATIONS IN AN ORGANIZATIONNovember 2024March 2025Allow400NoNo
18937243SECURE MODEL AGGREGATION METHOD AND APPARATUSNovember 2024February 2026Allow1500NoNo
18933896METHODS AND SYSTEMS OF FACILITATING AUTHENTICATION FOR ACCESSING A SERVICEOctober 2024February 2026Allow1500NoNo
18932272SYNCHRONIZED TASK MANAGEMENT FOR A SECURITY SYSTEMOctober 2024June 2025Allow801YesNo
18928564MUTABLE ACCESS TOKENSOctober 2024December 2025Allow1310NoNo
18923930SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR DATA SECURITYOctober 2024February 2026Allow1500NoNo
18923655DETECTION AND MITIGATION OF MACHINE LEARNING MODEL ADVERSARIAL ATTACKSOctober 2024January 2025Allow300NoNo
18917317VARIFOCAL THREAT ANALYSIS SYSTEM AND METHODOctober 2024January 2026Allow1500YesNo
18853618METHOD AND APPARATUS FOR DISTRIBUTING ENCRYPTED DEVICE UNIQUE CREDENTIALSOctober 2024February 2026Allow1700NoNo
18901013DATA PROTECTION COMPONENT SCALING IN A CLOUD-BASED DATA STORAGE SYSTEMSeptember 2024February 2026Allow1600YesNo
18902627AUTHENTICATION OF COMMUNICATION SESSION PARTICIPANTS USING BLOCKCHAINSeptember 2024January 2026Allow1500YesNo
18902564Agent Message BusSeptember 2024November 2025Allow1310YesNo
18900430GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATIONSeptember 2024March 2025Allow600NoNo
18900216GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATIONSeptember 2024August 2025Allow1110NoNo
18890756METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS TO PRIVATIZE CONSUMER DATASeptember 2024February 2026Allow1700YesNo
18888967TECHNIQUES FOR DETECTING ARTIFICIAL INTELLIGENCE MODEL CYBERSECURITY RISK IN A COMPUTING ENVIRONMENTSeptember 2024February 2025Allow510NoNo
18848222MATCHING SYSTEM, MATCHING APPARATUS, MATCHING METHOD, AND PROGRAMSeptember 2024February 2026Allow1700NoNo
18888882Intelligent Querying Of Network-Connected DevicesSeptember 2024December 2025Allow1500YesNo
18887560VERIFIED PRESENTATION OF NON-FUNGIBLE TOKENSSeptember 2024January 2026Allow1600NoNo
18883288USING CACHED NETWORK DATA ON A DEVICE TO DISCOVER UNSCANNABLE DEVICESSeptember 2024January 2026Allow1600NoNo
18828919PREVENTION OF INFORMATION LEAKAGE THROUGH SIGNATURESeptember 2024March 2026Allow1810NoNo
18822570SYSTEMS AND METHODS FOR ASYNCHRONOUS EVENT-BASED API CALLBACKSeptember 2024November 2025Allow1410YesNo
18822497DISTRIBUTED DIGITAL WALLET SEED PHRASESeptember 2024March 2026Allow1810NoNo
18821107TEXT-TO-TRAFFIC SYNTHETIC NETWORK TRAFFIC DATA GENERATION SYSTEMAugust 2024January 2026Allow1600NoNo
18821924SYSTEMS AND METHODS TO MONITOR VERACITY OF PROFILES OF THIRD-PARTY, ONLINE PLATFORMSAugust 2024October 2025Allow1400NoNo
18819405WEB SERVICE-BASED MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE OF CALLING SERVICEAugust 2024December 2024Allow410NoNo
18819535DATA PROCESSING METHOD, DEVICE, AND STORAGE MEDIUMAugust 2024December 2024Allow400NoNo
18817890ACTIVE DATA DISPOSALAugust 2024February 2025Allow610NoNo
18812109PASSWORD RESET USING AN ASYMMETRIC ENCRYPTION KEY PAIRAugust 2024March 2026Allow1810NoNo
18811739SYSTEMS AND METHODS FOR PREVENTING CYBERSECURITY ATTACKS THROUGH DIGITAL IDENTITY VERIFICATIONAugust 2024February 2025Allow610NoNo
18811624Defense of Multimodal Machine Learning Models via Activation AnalysisAugust 2024January 2026Allow1710NoNo
18840223METHOD FOR SECURELY NEGOTIATING SYMMETRICAL KEYS BETWEEN TWO PARTICIPANTS IN A COMMUNICATIONAugust 2024January 2026Allow1700YesNo
18809750METHOD AND SYSTEM FOR A SECURE MULTILEVEL NESTED BLOCKCHAIN DATA STORAGEAugust 2024December 2024Allow410YesNo
18808231DYNAMIC DEFENSE SYSTEM AND METHOD OF NEW ENERGY CENTRALIZED CONTROL STATION NETWORK BASED ON DYNAMIC IPAugust 2024March 2025Allow610NoNo
18807000SYSTEMS AND METHODS FOR SIMULATING APPLICATION BREACHESAugust 2024October 2025Allow1400NoNo
18807245METHOD FOR IMPROVED BIOMETRIC AUTHENTICATIONAugust 2024March 2025Allow710NoNo
18805732WEBPAGE CATEGORIZATION BASED ON IMAGE CLASSIFICATION OF WEBPAGE SCREEN CAPTUREAugust 2024March 2025Allow710NoNo
18806036APPARATUS AND METHOD FOR ENHANCING SECURITY OF IN-VEHICLE COMMUNICATION NETWORKAugust 2024February 2026Allow1810NoNo
18806291SYSTEM AND METHOD FOR MONITORING SECURITY VULNERABILITIES IN SOFTWARE APPLICATIONS WITH THIRD-PARTY COMPONENTSAugust 2024January 2026Allow1810NoNo
18805460WATERMARK EMBEDDING METHOD BASED ON SERVICE INVOCATION DATAAugust 2024January 2025Allow510NoNo
18802307METHOD AND SYSTEM FOR SECURE PASSWORD MIGRATION BETWEEN AUTHENTICATION SERVERSAugust 2024October 2025Allow1400NoNo
18800427SUBSTITUTE USER INTERFACE FOR SENSITIVE DATAAugust 2024March 2026Allow1910NoNo
18798872AUTOMATED SECURE ACCESS TO ONLINE ACCOUNTSAugust 2024January 2025Allow520NoNo
18797676MESSAGING LAYER SECURITY (MLS) PROTOCOL-BASED SECURE CHANNELSAugust 2024October 2025Allow1500NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2435.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
223
Examiner Affirmed
169
(75.8%)
Examiner Reversed
54
(24.2%)
Reversal Percentile
13.3%
Lower than average

What This Means

With a 24.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
716
Allowed After Appeal Filing
173
(24.2%)
Not Allowed After Appeal Filing
543
(75.8%)
Filing Benefit Percentile
15.0%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 24.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2435 - Prosecution Statistics Summary

Executive Summary

Art Unit 2435 is part of Group 2430 in Technology Center 2400. This art unit has examined 10,392 patent applications in our dataset, with an overall allowance rate of 83.7%. Applications typically reach final disposition in approximately 29 months.

Comparative Analysis

Art Unit 2435's allowance rate of 83.7% places it in the 77% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.

Prosecution Patterns

Applications in Art Unit 2435 receive an average of 1.80 office actions before reaching final disposition (in the 42% percentile). The median prosecution time is 29 months (in the 59% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With fewer office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is shorter than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.