USPTO Art Unit 2491 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19307235RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTUREAugust 2025March 2026Allow710NoNo
19287749CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING OFFLINE STORAGEJuly 2025October 2025Allow200NoNo
19270726SYSTEM AND METHOD FOR DYNAMIC MULTI-PARTY VERIFICATION OF GENERATIVE ARITIFICIAL INTELLIGENCE SYSTEMSJuly 2025December 2025Allow510NoNo
19104658METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM FOR DATA PROCESSINGFebruary 2025November 2025Allow900NoNo
19027830RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTUREJanuary 2025June 2025Allow510NoNo
18922825Nested Permissions Policy GenerationOctober 2024January 2026Allow1500NoNo
18902633Penetration Testing in Zero Trust Network EnvironmentSeptember 2024March 2026Allow1700YesNo
18901801AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTIONSeptember 2024March 2025Allow510YesNo
18887282SYSTEM AND METHOD FOR CLASSIFICATION OF NORMAL ENCRYPTED NETWORK TRAFFIC AND TRANSPORT LAYER SECURITY (TLS)-BASED VIRTUAL PRIVATE NETWORK TRAFFICSeptember 2024December 2025Allow1500NoNo
18887372SESSION ANALYSIS FOR IDENTITY THREAT DETECTION AND IDENTITY SECURITY POSTURE MANAGEMENTSeptember 2024February 2026Allow1700NoNo
18826238SYSTEM AND INFORMATION PROCESSING METHODSeptember 2024March 2026Allow1810YesNo
18822686SYSTEMS AND METHODS FOR SECURE ONLINE CREDENTIAL AUTHENTICATIONSeptember 2024March 2026Allow1810NoNo
18816682METHOD BY WHICH DEVICE SHARES DIGITAL KEYAugust 2024March 2026Allow1800NoNo
18815246ANONYMOUS EVENT ATTESTATIONAugust 2024February 2026Allow1800NoNo
18808789Systems and Methods for Graph-Based Access ControlAugust 2024January 2026Allow1700NoNo
18807395DATA PROCESSING METHOD AND DEVICE BASED ON HOMOMORPHIC ENCRYPTIONAugust 2024January 2026Allow1700NoNo
18787403SYSTEMS AND METHODS FOR AUTOMATED REFERRAL WITH CONCURRENT INFORMATION TRANSMISSIONJuly 2024May 2025Allow1020YesNo
18767929METHODS FOR REVALIDATING FQDN RULESETS IN A FIREWALLJuly 2024March 2026Allow2010NoNo
18757651AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUMJune 2024May 2025Allow1010NoNo
18759353METHOD AND SYSTEM FOR WATERMARKING A USB PD PROTOCOL HARDWARE SUB-SYSTEMJune 2024March 2026Allow2010NoNo
18754170SYSTEM AND METHOD FOR PROVIDING FLEET CYBER-SECURITYJune 2024March 2026Allow2120NoNo
18752742BACK LIGHT CORRECTING DEVICE, METHOD OF OPERATING BACK LIGHT CORRECTING DEVICE, PROGRAM OF OPERATING BACK LIGHT CORRECTING DEVICE, AND IMAGING APPARATUSJune 2024March 2026Allow2110NoNo
18749199PRIVACY-PRESERVING DATA COLLECTINGJune 2024May 2025Allow1110NoNo
18745138SECURE VSAN CLUSTER USING DEVICE AUTHENTICATION AND INTEGRITY MEASUREMENTSJune 2024July 2025Allow1320NoNo
18741634SECURE AUTHENTICATION FOR ACCESSING REMOTE RESOURCESJune 2024March 2026Allow2110YesNo
18718764FILE SHARING METHOD AND SYSTEM, ELECTRONIC DEVICE AND READABLE STORAGE MEDIUMJune 2024October 2024Allow400NoNo
18738985SYSTEM AND METHOD FOR DECENTRALIZED DATA MANAGEMENT AND DYNAMIC VERIFICATION, VALUATION, AND MONETIZATION OF DATA QUERIESJune 2024August 2024Allow200NoNo
18716369AES CRYPTOGRAPHIC SYSTEM AND METHODJune 2024March 2026Abandon2110NoNo
18680087ELECTRONIC ACCESS CONTROL SYSTEMMay 2024March 2026Allow2110YesNo
18680373SYSTEMS AND METHOD OF CYBER-MONITORING WHICH UTILIZES A KNOWLEDGE DATABASEMay 2024September 2025Abandon1610NoNo
18713805SECURITY COUNTERMEASURE PLANNING SYSTEM, SECURITY COUNTERMEASURE PLANNING METHOD, AND PROGRAMMay 2024January 2026Allow2010YesNo
18671378THREAT ANALYSIS APPARATUS, THREAT ANALYSIS METHOD, AND RECORDING MEDIUMMay 2024November 2025Allow1810YesNo
18670221ENCRYPTION PROCESSING APPARATUS AND ENCRYPTION PROCESSING METHODMay 2024January 2026Allow2010NoNo
18668671METHOD AND SYSTEM FOR DETECTION OF PHISHING EMAILS AND SUSPECT MALICIOUS EXECUTABLE HYPERLINKSMay 2024March 2025Allow1010NoNo
18666236DIGITAL ASSET MANAGEMENTMay 2024December 2025Allow1910NoNo
18663192SYSTEMS AND METHODS FOR FIRMWARE PASSWORD MANAGEMENTMay 2024February 2026Allow2100NoNo
18664064LEDGER-BASED VALIDATION AND RE-ENCODING OF DIGITAL MEDIAMay 2024April 2025Allow1120NoNo
18661295Cyberanalysis Workflow AccelerationMay 2024March 2026Allow2210NoNo
18657862HIERARCHICALLY CONFIGURED INTERCONNECT-BASED ACCESS MECHANISMMay 2024November 2025Allow1801YesNo
18658512ENCRYPTION PROCESSING APPARATUS AND ENCRYPTION PROCESSING METHODMay 2024February 2026Allow2100NoNo
18706249METHOD FOR QUANTUM-SECURED COMMUNICATIONApril 2024January 2026Allow2110NoNo
18646690LIFECYCLE ADMINISTRATION OF DOMAIN NAME BLOCKCHAIN ADDRESSESApril 2024January 2026Allow2110NoNo
18644508System, Method, and Computer Program Product for Patient Authentication and Identity Risk AssessmentApril 2024December 2025Allow2000NoNo
18641585AUTHENTICATION OF A RADIO COMMUNICATION DEVICE TO A NETWORKApril 2024July 2025Allow1520YesNo
18639173IDENTITY EXPERIENCE FRAMEWORKApril 2024August 2025Allow1610YesNo
18639241RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTUREApril 2024November 2024Allow700NoNo
18638905Multi-Tiered Data Security and Auditing SystemApril 2024October 2025Allow1800NoNo
18702071APPARATUS AND METHOD FOR CIPHERTEXT COMPARISON CAPABLE OF PREVENTING SIDE CHANNEL ATTACKApril 2024November 2025Allow1910YesNo
18637855USER INTERFACE FOR MANAGING EFFECTIVE PERMISSIONS ON A GRAPH DATABASEApril 2024October 2025Allow1800NoNo
18636319INFORMATION PROCESSING APPARATUS, SERVICE PROVIDING SYSTEM, AND METHOD TO MODIFY A LICENSE BASED ON USAGEApril 2024March 2026Allow2310NoNo
18635433MANAGEMENT CONTROLLER RESOURCE USAGE BY A SECURITY PROCESSORApril 2024March 2026Allow2310NoNo
18631299AUXILIARY DEVICE AUTHENTICATION SYSTEM AND METHODApril 2024August 2025Allow1600YesNo
18627192PROVISIONING TRUSTED EXECUTION ENVIRONMENT(S) BASED ON CHAIN OF TRUST INCLUDING PLATFORMApril 2024July 2025Allow1601NoNo
18627148RETROSPECTIVE MEMORY ANALYSISApril 2024January 2026Allow2220NoNo
18623850METHOD AND SYSTEM FOR DETERMINING AND ACTING ON A STRUCTURED DOCUMENT CYBER THREAT RISKApril 2024February 2026Allow2320YesNo
18619659MANAGING KEY ROTATION FOR ENDPOINT DEVICES USING RE-KEYING RULESMarch 2024December 2025Allow2010NoNo
18620303ADAPTIVE DETECTION OF SECURITY THREATS THROUGH TRAINING OF COMPUTER-IMPLEMENTED MODELSMarch 2024August 2025Allow1620YesNo
18613112MULTI-STEP APPROACH FOR RANSOMWARE DETECTIONMarch 2024April 2025Allow1210YesNo
18612164SYSTEMS AND METHODS FOR IMAGE PREPROCESSING AND SEGMENTATION FOR VISUAL DATA PRIVACYMarch 2024September 2025Allow1810NoNo
18609904MULTI-LEVEL SECURITY ANALYSIS AND INTERMEDIATE DELIVERY OF AN ELECTRONIC MESSAGEMarch 2024January 2025Allow1010NoNo
18610045SECURE RE-USE OF PRIVATE KEY FOR DYNAMIC GROUP OF NODESMarch 2024November 2025Allow2000NoNo
18609298DOMAIN SQUATTING DETECTIONMarch 2024March 2025Allow1210NoNo
18608860SYSTEM AND METHOD FOR COST MANAGEMENT USING BLOCKCHAIN AND ENCRYPTIONMarch 2024November 2025Allow2000NoNo
18607838Quantum vault for protecting secrets against quantum computingMarch 2024March 2026Allow2410YesNo
18605680SCALABLE ASSURED DELETE WITH AONTMarch 2024August 2025Allow1700NoNo
18605239Physical Environment Based Account AuthenticationMarch 2024January 2025Allow1110NoNo
18601498Consumer Choice for Broadband Application and Content ServicesMarch 2024March 2025Allow1210NoNo
18600739ELECTRONIC SYSTEM FOR PREDICTING, DETECTING, AND PREVENTING UNAUTHORIZED ACCESS EVENTS ASSOCIATED WITH ELECTRONIC SYSTEMSMarch 2024January 2025Allow1110NoNo
18599430COMMUNICATION DEVICE, COMPUTER-READABLE STORAGE MEDIUM, AND METHOD FOR USING APPROPRIATE ACCESS CONTROL METHODMarch 2024March 2026Allow2411YesNo
18600377Information security system and method for denial-of-service detectionMarch 2024November 2024Allow910NoNo
18597512SYSTEMS AND METHODS FOR SUPPORT OF SECURITY FOR SIDELINK COMMUNICATION AND POSITIONINGMarch 2024February 2026Allow2410YesNo
18592679Systems and Methods for Passwordless LogonMarch 2024August 2025Allow1700NoNo
18688531METHOD AND SYSTEM FOR VALIDATING A DIGITAL CONTENTMarch 2024November 2025Allow2000NoNo
18591554DETERMINING A PHYSICALLY UNCLONABLE FUNCTION (PUF) SELECTION VECTORFebruary 2024October 2025Allow2000NoNo
18591669USER AND GROUP SPECIFIC THREAT PROTECTION SYSTEM AND METHODFebruary 2024June 2025Allow1520NoNo
18589792AUTOMATED BOT BLOCKINGFebruary 2024December 2024Allow1010NoNo
18590412EXTERNAL MULTI-CHANNEL COMMUNICATION MODULARIZATION, ROUTING, TRANSMISSION, AND ACCESS CONTROL IN A DATABASE SYSTEMFebruary 2024November 2025Allow2110YesNo
18588077PASSWORD SIMILARITY CHECKING USING HOMOMORPHIC ENCRYPTION OPERATIONSFebruary 2024January 2025Allow1000YesNo
18586778COMPUTER-BASED SYSTEMS CONFIGURED FOR DETECTING AND SANDBOXING EXTERNAL RESOURCES AND METHODS OF USE THEREOFFebruary 2024January 2025Allow1110NoNo
18581754SYNTHETIC AND VARIABLE DEVICE IDENTIFICATIONSFebruary 2024April 2025Allow1410NoNo
18443454SECURE COMPONENT VERIFICATION USING NFCFebruary 2024November 2025Allow2110YesNo
18444428VISUAL AND AUDIO OUTPUT AUTHENTICATION IN AVATAR SYSTEMSFebruary 2024January 2026Allow2310YesNo
18441218METHODS, DEVICES AND SYSTEMS FOR REPEATING SECURE WIRELESS CONNECTIONSFebruary 2024January 2026Allow2310NoNo
18441414ANALYZING ENCRYPTED TRAFFIC BEHAVIOR USING CONTEXTUAL TRAFFIC DATAFebruary 2024March 2026Allow2530YesNo
18440743SYSTEM AND METHOD FOR AN EGRESS WEB GATEWAY TO REGULATE AI APPLICATION QUERIESFebruary 2024March 2026Allow2511YesNo
18439782MEMBERSHIP INFERENCE ATTACKS USING MULTIPLE SPECIALIZED MACHINE LEARNING MODELSFebruary 2024January 2026Allow2300NoNo
18439860ELEVATED DEVICE AUTHENTICATION THROUGH MUTUAL IDENTIFICATIONFebruary 2024December 2025Allow2210NoNo
18440917DETECTION OF PERSONALLY IDENTIFIABLE INFORMATIONFebruary 2024April 2025Allow1410NoNo
18438962USER BASED THREAT RESPONSE RECOMMENDATIONSFebruary 2024September 2025Allow1910YesNo
18439655SYSTEM FOR SECURE CHANNEL SELECTION FOR MULTI-FACTOR AUTHENTICATION USING NON-FUNGIBLE ELECTRONIC RESOURCESFebruary 2024November 2024Allow910NoNo
18438197METHOD OF CONSORTIUM HASHINGFebruary 2024July 2024Allow610YesNo
18438053Blockchain Index TrackingFebruary 2024May 2025Abandon1510NoNo
18436471USER ACCESS GROUP DISCOVERYFebruary 2024January 2026Allow2310NoNo
18433869Cryptographic System Real-Time Test Vector Leakage AssessmentFebruary 2024July 2025Allow1800NoNo
18432879AUTOMORPHIC TRANSFORMATIONS OF SIGNAL SAMPLES WITHIN A TRANSMITTER OR RECEIVERFebruary 2024September 2024Allow700NoNo
18430950METHODS AND APPARATUS FOR AMBIENT COMPUTINGFebruary 2024October 2025Allow2101YesNo
18431059DISTINGUISHING BETWEEN FUNCTIONAL TRACKING DOMAINS AND NONFUNCTIONAL TRACKING DOMAINS ON A HOST WEB PAGEFebruary 2024August 2024Allow700NoNo
18424854DETERMINING A COMMON SECRET FOR THE SECURE EXCHANGE OF INFORMATION AND HIERARCHICAL, DETERMINISTIC CRYPTOGRAPHIC KEYSJanuary 2024July 2025Allow1710NoNo
18423905Data Center Monitoring And Management Operation Including Configuration For Customer Sensitive DataJanuary 2024November 2025Allow2220YesNo
18420897FULLY HOMOMORPHIC ENCRYPTION AND DECRYPTION APPARATUS AND METHOD FOR OPERATING THE SAMEJanuary 2024May 2024Allow400NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2491.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
287
Examiner Affirmed
211
(73.5%)
Examiner Reversed
76
(26.5%)
Reversal Percentile
19.8%
Lower than average

What This Means

With a 26.5% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
701
Allowed After Appeal Filing
204
(29.1%)
Not Allowed After Appeal Filing
497
(70.9%)
Filing Benefit Percentile
31.2%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 29.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2491 - Prosecution Statistics Summary

Executive Summary

Art Unit 2491 is part of Group 2490 in Technology Center 2400. This art unit has examined 6,598 patent applications in our dataset, with an overall allowance rate of 73.3%. Applications typically reach final disposition in approximately 33 months.

Comparative Analysis

Art Unit 2491's allowance rate of 73.3% places it in the 40% percentile among all USPTO art units. This art unit has a below-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2491 receive an average of 2.39 office actions before reaching final disposition (in the 83% percentile). The median prosecution time is 33 months (in the 38% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more challenging examination environment compared to the USPTO average.
  • With more office actions than average, plan for multiple rounds of prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.