USPTO Art Unit 2492 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19265257SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONSJuly 2025September 2025Allow200YesNo
19226046SYSTEM AND METHOD FOR SOFTWARE INTEGRATION INTO ENTERPRISE STANDARD CONTROL SYSTEMS USING STANDARDIZED APIsJune 2025October 2025Allow510NoNo
19205793COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON DEVICE CRITICALITY SCORE AND METHODS OF USE THEREOFMay 2025March 2026Allow1020YesNo
19122410CHAINING MESSAGE AUTHENTICATION CODESApril 2025January 2026Allow900YesNo
19089705DECENTRALIZED INTEGRATION SOLUTIONS FOR SECURELY CONDUCTING LEGAL TRANSACTIONS AND PROTECTING SENSITIVE DATAMarch 2025August 2025Allow510YesNo
18959552ATA SYSTEMS AND METHODS FOR ADVANCED DYNAMIC TRUST STORE MANAGEMENT SYSTEMSNovember 2024March 2026Allow1600YesNo
18942118MULTIMEDIA CONTAINER FOR PHYSICAL OBJECT AUTHENTICATION AND VERIFICATION OF ATTENDANCENovember 2024January 2026Abandon1530YesNo
18902634SYSTEMS AND METHODS TO PERFORM PHISHING DETECTION AND DEVICE ATTESTATION VIA BROWSER EXTENSIONSeptember 2024March 2025Allow501YesNo
18885207SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONSSeptember 2024April 2025Allow701YesNo
18843974METHOD AND APPARATUS FOR DETECTING URL RELATED TO PHISHING SITE USING ARTIFICIAL INTELLIGENCE AND GENERATIVE AI ALGORITHMSeptember 2024March 2025Allow700YesNo
18823604IMPLEMENTATION OF BIOMETRIC AUTHENTICATIONSeptember 2024January 2026Allow1700YesNo
18820347INTEGRATED SECURITY FOR CLOUD APPLICATIONSAugust 2024December 2024Allow400YesNo
18816291SECURITY DEVICE COMPUTATION MATCHINGAugust 2024January 2026Allow1600YesNo
18841847METHOD AND SYSTEM FOR DETECTING ANOMALY IN RADIO ACCESS NETWORKAugust 2024May 2025Allow920NoNo
18814720CIPHERTEXT CONVERSION SYSTEM, CIPHERTEXT CONVERSION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUMAugust 2024February 2026Allow1810NoNo
18814401COMMUNICATION METHOD AND COMMUNICATION SYSTEMAugust 2024November 2025Allow1500NoNo
18811402SCALABLE SEARCH AND RANKING OF BIOMETRIC SIGNATURESAugust 2024March 2026Allow1910YesNo
18808212CHECKOUT WITH MACAugust 2024December 2025Allow1600YesNo
18806047CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAMEAugust 2024March 2025Allow720NoNo
18802673SYSTEMS AND METHODS FOR CANDIDACY DETERMINATIONS AND REQUEST PROCESSING WHILE MAINTAINING USER DATA ANONYMITYAugust 2024February 2025Allow610YesNo
18800553COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON AUTOMATED KEY TERRAIN IDENTIFICATION AND METHODS OF USE THEREOFAugust 2024February 2025Allow610YesNo
18798314MULTI-PARTY COMPUTATION OF SPLIT PRIVATE DATA WITH ADDRESS GEO-CODED COMPONENTAugust 2024December 2025Allow1610YesNo
18791780PERSONAL AWARENESS SYSTEM AND METHOD FOR PERSONAL SAFETY AND DIGITAL CONTENT SAFETY OF A USERAugust 2024January 2026Allow1700YesNo
18787250SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSJuly 2024April 2025Allow820NoNo
18770236PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERSJuly 2024March 2025Allow810NoNo
18767037METHOD OF OPERATING SECURE PROGRAMMING SYSTEMJuly 2024January 2026Allow1810YesNo
18765860Advanced SIP-Based Caller Identification and Voicemail Analysis System for Fraud Prevention in TelecommunicationsJuly 2024January 2026Allow1800YesNo
18766305SYSTEM AND METHOD FOR COMPUTER SYSTEM SECURITY AUTHORIZATION INTERFACESJuly 2024October 2025Abandon1510NoNo
18726435METHOD FOR MANAGING A REMOTE SERVERJuly 2024October 2025Allow1500YesNo
18763525Intelligent Technical Protocol Based Approach Leveraging AI-ML to Block Vishing ScammersJuly 2024January 2026Allow1900YesNo
18761151METHOD FOR IDENTIFYING TRUSTED USERSJuly 2024December 2025Allow1810YesNo
18754308System and Method for Dynamically Encrypting and Ingesting Private Cloud Data into a Hybrid Cloud Based on Data SensitivityJune 2024February 2026Allow2010NoNo
18751017DIGITAL RIGHTS MANAGEMENT SYSTEMS AND METHODS USING EFFICIENT MESSAGING ARCHITECTURESJune 2024January 2025Allow700YesNo
18744095USER MANAGEMENT SYSTEM FOR COMPUTING SUPPORTJune 2024January 2025Allow700YesNo
18744248METHODS AND APPARATUSES FOR IMPLEMENTING HIGH-SPEED CRYPTOGRAPHIC COMPUTATION BASED ON SOFTWARE-HARDWARE COLLABORATION, AND ELECTRONIC DEVICESJune 2024January 2025Allow710NoNo
18718704A METHOD FOR MONITORING AN INTEGRITY OF A SYSTEM BY A MONITORING DEVICE, COMPUTER PROGRAM PRODUCT AS WELL AS MONITORING DEVICEJune 2024September 2025Allow1500YesNo
18736505INTELLIGENT ANTI-PHISHING MANAGEMENTJune 2024August 2024Allow200YesNo
18736499INTELLIGENT ANTI-PHISHING MANAGEMENTJune 2024August 2024Allow300YesNo
18674385ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTUREMay 2024November 2025Allow1810YesNo
18670919SIGNCRYPTED ENVELOPE MESSAGEMay 2024July 2025Abandon1410NoNo
18670367PHYSICALLY UNCLONABLE FUNCTION (PUF) GENERATIONMay 2024March 2026Allow2210NoNo
18668612SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS USING RISK FACTORSMay 2024November 2024Allow610NoNo
18657317Electronic Messaging System for Mobile Devices with Reduced Traceability of Electronic MessagesMay 2024June 2025Abandon1310NoNo
18654782TOKEN PROCESSING SYSTEM AND METHODMay 2024May 2025Allow1211YesNo
18652281Decentralized Techniques for Verification of Data in Transport Layer Security and other ContextsMay 2024May 2025Abandon1210NoNo
18651423Dynamic Detection for Mobile Device SecurityApril 2024March 2025Allow1110NoNo
18647427SYSTEM AND METHOD FOR CLASSIFYING A USER FOR DETECTING PHISHING ATTACKSApril 2024July 2024Allow300YesNo
18647943Systems and Methods for a Cryptographic File System LayerApril 2024November 2025Allow1910NoNo
18644669METHOD AND SYSTEM FOR DETECTING A CHANGE IN MEMORYApril 2024August 2025Allow1600YesNo
18643030SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR AUTHENTICATING DEVICES WITH DEVICE AUTHENTICATION IDENTIFIERSApril 2024February 2026Allow2240YesNo
18643631HOMOMORPHIC ENCRYPTION ARITHMETIC DEVICE AND OPERATING METHOD THEREOFApril 2024August 2025Allow1600YesNo
18640446END-POINT MEDIA WATERMARKINGApril 2024December 2024Allow800NoNo
18702684COMPUTER PROCESSING SYSTEM AND METHOD CONFIGURED TO EFFECTUATE LOWER-ORDER MASKING IN A HIGHER-ORDER MASKED DESIGNApril 2024August 2024Allow400NoNo
18632778SECRET SEARCH SYSTEM, SECRET SEARCH METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUMApril 2024September 2025Allow1700NoNo
18699648METHOD AND DEVICE FOR AUTHENTICATING A MOTOR VEHICLE AT A HYDROGEN FUEL PUMPApril 2024January 2026Allow2110NoNo
18630339HOME NETWORK SYSTEM BLOCKING UNAUTHORIZED DEVICE AND METHOD OF BLOCKING UNAUTHORIZED DEVICE IN HOME NETWORK SYSTEMApril 2024August 2025Allow1600NoNo
18629283NESTED BLOCKCHAIN SYSTEMApril 2024January 2026Allow2210NoNo
18627845FAST JOINS AND LOW MEMORY USAGE FOR END-TO-END (E2E)-SECURE APPLICATIONS USING LIGHT MLS CLIENTSApril 2024February 2026Allow2210YesNo
18626441CORE NETWORK ELEMENT, ACCESS-NETWORK DEVICE, AND TERMINAL DEVICEApril 2024March 2026Allow2300NoNo
18627243Method and System of Securing VPN CommunicationsApril 2024January 2025Allow900YesNo
18626304SYSTEMS AND METHODS FOR SELECTIVE DECRYPTION OF ENCRYPTED DATA PACKETSApril 2024August 2025Allow1600NoNo
18626174Secure Content Management Through AuthenticationApril 2024November 2025Allow2020NoNo
18625809METHOD AND SYSTEM FOR MANAGING PERIPHERAL DEVICE FUNCTIONS USING MANIFEST FILESApril 2024February 2026Allow2310NoNo
18625154PROVISION OF A LEASE FOR STREAMING CONTENTApril 2024March 2025Allow1110YesNo
18623916SYSTEMS AND METHODS FOR MANAGING DEVICE ASSOCIATIONApril 2024September 2025Allow1820YesNo
18621689COMMUNICATION DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE, AND METHOD EXECUTED BY COMMUNICATION DEVICE FOR AUTHENTICATIONMarch 2024November 2025Allow2010YesNo
18697423METHOD AND SYSTEM FOR PROCESSING FULL-STACK NETWORK CARD TASK BASED ON FPGAMarch 2024September 2024Allow610YesNo
18622516Methods And Systems For Memory Tracing In Asset Managing SystemsMarch 2024July 2025Allow1620YesNo
18621079TRAINING TRUSTED USERS OF AN ENTERPRISE NETWORK FOR PHISHING ATTACKS ON A PER-USER BASISMarch 2024November 2025Allow2000YesNo
18696628METHOD AND APPARATUS FOR PREVENTING PROCESSING BY SECURITY PROCESSOR FROM BEING INTERRUPTEDMarch 2024July 2025Allow1600NoNo
18696841ROUND OPTIMAL OBLIVIOUS TRANSFERS FROM ISOGENIESMarch 2024November 2025Allow2001NoNo
18696069CERTIFICATE SCHEMAS FOR PUBLIC KEY CERTIFICATESMarch 2024February 2026Allow2320NoNo
18617953DETECTION OF SUSPICIOUS OBJECTS IN CUSTOMER PREMISES EQUIPMENT (CPE)March 2024December 2025Abandon2020NoNo
18613700SYSTEM AND METHOD FOR PROVIDING SECURED CAN COMMUNICATIONSMarch 2024March 2026Allow2320YesNo
18694058BACKDOOR DETECTION DEVICE, BACKDOOR DETECTION METHOD, AND RECORDING MEDIUMMarch 2024February 2026Abandon2310NoNo
18607463SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONSMarch 2024June 2024Allow300YesNo
18607012Function Execution Device and Communication TerminalMarch 2024August 2025Allow1730YesNo
18605351SYSTEMS AND METHODS FOR RESTRICTED RESOURCE ACCESS MANAGEMENTMarch 2024October 2025Allow1900YesNo
18603564Fast Polynomial Evaluation Under Fully Homomorphic Encryption by Products of Differences from Roots Using RotationsMarch 2024December 2025Allow2110YesNo
18604174TECHNIQUES FOR SECURELY COMMUNICATING SENSITIVE DATA FOR DISPARATE DATA MESSAGESMarch 2024September 2025Allow1810YesNo
18600727COMPLEX IT PROCESS ANNOTATION, TRACING, ANALYSIS, AND SIMULATIONMarch 2024October 2025Allow1900NoNo
18599669Artificial Reality Encryption and DecryptionMarch 2024April 2025Allow1310YesNo
18598654METHOD,APPARATUS,STORAGE MEDIUM AND ELECTRONIC DEVICE FOR NETWORK AUTHENTICATIONMarch 2024November 2025Allow2010NoNo
18595462CREATING SIMULATION MODELS FOR COMPLEX ADAPTIVE SYSTEMS USING A MULTI-MODEL, GENERATIVE APPROACHMarch 2024October 2025Allow2010NoNo
18595449MODELING MULTI-PERIL CATASTROPHE USING A DISTRIBUTED SIMULATION ENGINEMarch 2024October 2025Allow1900NoNo
18594727System and Method for Multi-PHY based MACsec over Secure TunnelsMarch 2024July 2025Allow1600NoNo
18594374SELECTING BETWEEN RAY TRACING AND NON-RAY TRACING CHANNEL MODELS FOR POSITIONINGMarch 2024February 2026Allow2400NoNo
18592170METHODS AND SYSTEMS FOR PROVIDING NETWORK CONNECTIVITY TO A SECURE ACCESS SERVICE EDGE (SASE) DOMAIN VIA AN ISPFebruary 2024January 2026Allow2310YesNo
18592333SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTIONFebruary 2024May 2025Allow1510NoNo
18585880SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSFebruary 2024March 2026Allow2510NoNo
18585274MULTI-VENDOR WEB SECURITY CONTROL INTEGRATION AND MANAGEMENT PLATFORMFebruary 2024January 2026Allow2310NoNo
18585545Tying Access/Redaction to Authentication LevelsFebruary 2024January 2026Allow2320YesNo
18584839METHOD AND SYSTEM OF AUTOMATING AUTHENTICATION AND AUTHORIZATION IN INDUSTRIAL CONTROL SYSTEM OFFLINE ENVIRONMENTFebruary 2024February 2026Abandon2410NoNo
18585017SYSTEMS AND METHODS FOR REMOTE SERVER AUTHENTICATION OF PHYSICAL ACCESS TOKENSFebruary 2024April 2024Allow200NoNo
18582051Blocking of Exfiltration Events via Browser ExtensionsFebruary 2024October 2025Allow2010YesNo
18685212OPERATING METHOD FOR DATABASE AND FULLY ENCRYPTED DATABASEFebruary 2024September 2025Allow1800NoNo
18443591SYSTEMS AND METHODS FOR CANDIDACY DETERMINATIONS AND REQUEST PROCESSING WHILE MAINTAINING USER DATA ANONYMITYFebruary 2024May 2024Allow300NoNo
18443976SYNTHETIC REQUEST INJECTION FOR REAL-TIME CLOUD SECURITY POSTURE MANAGEMENTFebruary 2024June 2025Allow1610YesNo
18444005SIGNAL STRENGTH BASED POSITIONING WITH CARRIER FREQUENCY INFORMATIONFebruary 2024January 2026Allow2300NoNo
18442614MEDICAL IMPLANT SOFTWARE SYSTEMS AND METHODSFebruary 2024October 2024Allow800YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2492.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
283
Examiner Affirmed
207
(73.1%)
Examiner Reversed
76
(26.9%)
Reversal Percentile
20.7%
Lower than average

What This Means

With a 26.9% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
642
Allowed After Appeal Filing
200
(31.2%)
Not Allowed After Appeal Filing
442
(68.8%)
Filing Benefit Percentile
44.4%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 31.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Art Unit 2492 - Prosecution Statistics Summary

Executive Summary

Art Unit 2492 is part of Group 2490 in Technology Center 2400. This art unit has examined 6,892 patent applications in our dataset, with an overall allowance rate of 78.6%. Applications typically reach final disposition in approximately 32 months.

Comparative Analysis

Art Unit 2492's allowance rate of 78.6% places it in the 56% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2492 receive an average of 2.25 office actions before reaching final disposition (in the 76% percentile). The median prosecution time is 32 months (in the 43% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for multiple rounds of prosecution.
  • The median prosecution time is longer than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.