USPTO Art Unit 2493 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19368783METHODS AND SYSTEMS FOR MAINTAINING BEHAVIORAL INTEGRITY OF AUTONOMOUS ARTIFICIAL INTELLIGENCE AGENTSOctober 2025January 2026Allow300YesNo
19319685INFORMATION PROCESSING SYSTEM, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING PROGRAM STORED THEREIN, AND AUTHENTICATION METHODSeptember 2025December 2025Allow300YesNo
19232533METHOD AND ELECTRONIC DEVICE FOR MANAGING SENSITIVE DATA BASED ON SEMANTIC CATEGORIZATIONJune 2025August 2025Allow200NoNo
19136423CONSORTIUM BLOCKCHAIN ADMISSION MANAGEMENT METHOD AND APPARATUSJune 2025March 2026Allow900YesNo
19197948DIGITAL SIGNATUREMay 2025December 2025Allow710NoNo
19097774TRUSTWORTHINESS OF VIDEO DATA STREAMSApril 2025November 2025Allow810YesNo
19074401AUTHENTICATION SIGNATURE EMBEDDING IN DIGITAL MEDIAMarch 2025May 2025Allow300YesNo
19061897PLATFORM SYSTEM CREATING RELIABLE, TRUST SCORED, TRUSTWORTHY DATA, FROM HUMAN AND OTHER DATA SOURCES FOR TRUSTED USES BY INDIVIDUALS AND OTHER ENTITIESFebruary 2025March 2026Abandon1210NoNo
19041074SECURE CONTROLLED COMMUNICATIONSJanuary 2025August 2025Allow710YesNo
19025375Multi-Factor Authentication with Device and Carrier ValidationJanuary 2025August 2025Allow700NoNo
19017845MULTI-LAYERED VERIFICATION OF DIGITAL APPEARANCESJanuary 2025May 2025Allow410NoNo
18956421Server, Switch and Endpoints for Secure CommunicationsNovember 2024May 2025Allow610NoNo
18956015DI CHIP, COMMUNICATION DEVICE, SYSTEM, AND OPERATING METHODNovember 2024January 2026Allow1410NoNo
18858177NON-NATIVE BLOCKCHAIN SIGNATURESOctober 2024January 2026Allow1500NoNo
18914475SYSTEM AND METHOD FOR EVALUATING COMPUTER PROGRAM HALTSOctober 2024July 2025Allow900YesNo
18909109AUTHENTICATED CROSS-SUBNET COMMUNICATIONOctober 2024April 2025Allow610YesNo
18903315IMAGE PROCESSING DEVICE, ATTACK COUTERMEASURE METHOD, AND COMPUTER READABLE MEDIUMOctober 2024February 2026Allow1700NoNo
18900562INTERACTIVE ELECTRONIC SIGNATURE PLATFORM UTILIZING EMBEDDED PERSONALIZED MEDIASeptember 2024March 2025Allow610NoNo
18892806Preventing the disclosure of sensitive information in attempts to Utilize Generative Artificial Intelligence (AI) through a Chat-Style InterfaceSeptember 2024March 2026Allow1800NoNo
18826156METHOD FOR DETECTING NETWORK ATTACK BASED ON KERNEL OPERATING CHARACTERISTICS OF SOFTWARE SWITCHSeptember 2024February 2026Allow1800YesNo
18822595TAMPER RESPONSE AGAINST PHYSICAL AND LOGICAL ATTACKS ON AN HSMSeptember 2024December 2025Allow1500NoNo
18823610PROCESSING QUERY PREDICATES INVOLVING FINE-GRAINED PRIVACY-PRESERVING COLUMNSSeptember 2024January 2026Allow1600NoNo
18820694SYSTEMS AND METHODS FOR USE IN SECURING BACKUP DATA FILESAugust 2024November 2025Allow1500YesNo
18816983Masking Sensitive Data On Detecting Presence Of Non-Authorized UserAugust 2024March 2026Allow1910NoNo
18802706SYSTEM AND METHOD FOR SECURELY DELIVERING KEYS AND ENCRYPTING CONTENT IN CLOUD COMPUTING ENVIRONMENTSAugust 2024December 2025Allow1600YesNo
18799815DERIVED UNIQUE KEY FOR PRE-SHARED KEY (DUK-PSK)August 2024February 2026Allow1810YesNo
18794408TELEPHONE SERVICE DELAY AND CONNECTION SYSTEMAugust 2024March 2026Allow1900YesNo
18793094System and Method for Grip Gesture Authentication based on Pressure Gradient MappingAugust 2024November 2025Allow1600NoNo
18791249SELECTIVE AUTHORIZATION CONTROL IN MULTI-TENANT APPLICATIONSJuly 2024March 2026Allow2010YesNo
18833946QUANTUM-COMPUTING SECURE DIGITAL AND PHYSICAL PROOF OF WORKJuly 2024January 2026Allow1810YesNo
18784334GATHERING UNIVERSAL SERIAL BUS THREAT INTELLIGENCEJuly 2024March 2026Allow1910YesNo
18779960SYSTEMS AND METHODS FOR AUTOMATICALLY AND DYNAMICALLY GENERATING A CROSS-CHANNEL IDENTIFIER FOR DISPARATE DATA IN AN ELECTRONIC NETWORKJuly 2024September 2025Allow1400NoNo
18778925CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTUREJuly 2024January 2026Allow1810YesNo
18778532CONNECTION MANAGEMENT DEVICE AND COMMON APIJuly 2024January 2026Allow1810NoNo
18771583SYSTEMS, METHODS, AND APPARATUSES FOR NETWORK MANAGEMENTJuly 2024March 2026Allow2010YesNo
18769029INCREMENTAL VERIFICATION OF TAMPER-RESISTANT LEDGERJuly 2024March 2026Allow2000NoNo
18767725PRESERVING PRIVACY DURING SECURE TRANSACTIONS WITH AMBIENT POWER DEVICESJuly 2024December 2025Allow1700NoNo
18766605CREATING A TRUSTED ZONE SYSTEM TO SUPPORT AN ARTIFICIAL INTELLIGENCE INSTANCE BY CREATING A VIEWPOINT FROM WHICH TO VIEW AUTHENTICATED AND ATTRIBUTED DATA FROM A CURATED DATA REPOSITORY OF MORALS, CULTURE AND HISTORY AND A CURATED DATA REPOSITORY AND EVALUATION SYSTEM, WHICH INCORPORATE TRUST-SCORED FACTS AS STABLE REFERENCES TO SUPPORT AI SUPERINTELLIGENCE ALIGNMENT THROUGH WHICH SMART AI SYSTEMS WILL BE MORE LIKELY TO FOLLOW HUMAN INTENT AND LESS LIKELY TO DO WHAT HUMANS DO NOT WANT THEM TO DOJuly 2024September 2025Abandon1510NoNo
18759433ON DEMAND TOKENIZATION PROCESSINGJune 2024November 2025Allow1700NoNo
18756066Email Verification Using Injected Tokens for Message AuthenticationJune 2024March 2025Allow900YesNo
18755766SYSTEM FOR ASSURING CYBER SECURITY ACROSS SUPPLY CHAINSJune 2024November 2025Allow1700NoNo
18722799AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY RECORDING MEDIUMJune 2024January 2026Allow1910NoNo
18722813CRYPTOGRAPHIC KEY SHARING SYSTEMJune 2024January 2026Allow1910NoNo
18749880ADVANCED MULTI-LAYER ACCESS CONTROL POLICY ENFORCEMENT IN A MULTI-TENANT CLOUD ENVIRONMENTJune 2024January 2026Allow1910NoNo
18748591STREAMLINED INSTALLATION AND MANAGEMENT OF REMOTE COMPUTING APPLICATIONSJune 2024January 2026Allow1910NoNo
18747589SYSTEMS AND METHODS FOR TRACKING EXECUTION FLOWS FOR AUTOMATED MALWARE DETECTIONJune 2024February 2026Allow2010NoNo
18746270TECHNIQUES FOR ENRICHING DEVICE PROFILES AND MITIGATING CYBERSECURITY THREATS USING ENRICHED DEVICE PROFILESJune 2024November 2025Allow1710NoNo
18745796SYSTEMS AND METHODS FOR ACCESS PROVISIONING USING A DATA PROTECTION ARCHITECTUREJune 2024September 2025Allow1500NoNo
18744435TRUSTED PLATFORM MODULE CRYPTOCURRENCY MINER WITH SECURE ZERO TOUCH PROVISIONING CAPABILITYJune 2024August 2024Allow200YesNo
18744428HARDWARE SPECIFIC CRYPTOGRAPHIC KEYJune 2024March 2026Allow2110NoNo
18743220LEVERAGING QUANTUM ENTANGLEMENT FOR REPLICATING DATA IN MULTIPLE LOCATIONS AND TWIN TAGGING THE DATAJune 2024October 2025Allow1600YesNo
18742399SYSTEMS AND METHODS FOR INTELLIGENTLY CONSTRUCTING, TRANSMITTING, AND VALIDATING SPOOFING-CONSCIOUS DIGITALLY SIGNED WEB TOKENS USING MICROSERVICE COMPONENTS OF A CYBERSECURITY THREAT MITIGATION PLATFORMJune 2024July 2025Allow1310NoNo
18740973OPTIMIZED HEADER INFORMATION TO ENABLE ACCESS CONTROLJune 2024August 2025Allow1410NoNo
18735394EVIDENCE ORACLESJune 2024June 2025Allow1210NoNo
18734076ELECTRIC DEVICE AND KEY SWITCHING METHOD THEREOFJune 2024March 2026Allow2110NoNo
18733543SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONSJune 2024November 2025Allow1710YesNo
18733780AUTHENTICATION FRAMEWORKJune 2024March 2025Allow1010NoNo
18731619Machine learning techniques for automated document and organization validationJune 2024March 2026Allow2110NoNo
18680143INTERNET PACKET PROVENANCE TO VERIFY PACKET VALIDITY AND CONTROL PACKET USAGEMay 2024October 2025Allow1700YesNo
18679365RESTRICTED OPERATIONS DUE TO ATTACHMENT OF COMPUTE INSTANCES OWNED BY DIFFERENT TENANCIESMay 2024May 2025Allow1210NoNo
18679330METHOD OF MALWARE DETECTION AND SYSTEM THEREOFMay 2024July 2025Allow1400YesNo
18678350ENCRYPTED CONTEXT-BASED PROMPT SYSTEMMay 2024January 2026Allow2010YesNo
18679436Electronic Device for Accessing Data and Method ThereofMay 2024January 2026Allow2010YesNo
18677816CATEGORIZING POLICY-BASED CONTROL MAPPING FOR REAL-TIME SECURITY AND COMPLIANCE MONITORINGMay 2024October 2025Allow1600NoNo
18674855FULLY HOMOMORPHIC ENCRYPTED PROCESSING ACCELERATIONMay 2024October 2025Allow1600NoNo
18674804ATTRIBUTE-BASED CREDENTIALS FOR RESOURCE ACCESSMay 2024February 2026Allow2010YesNo
18713110CET MECHANISM-BASED METHOD FOR PROTECTING INTEGRITY OF GENERAL-PURPOSE MEMORYMay 2024January 2026Allow2000NoNo
18671646IMAGE PROCESSING DEVICE SECURITYMay 2024April 2025Allow1110NoNo
18671840SYSTEMS AND METHODS FOR COHORT DENIAL OF SERVICE ATTACK DETECTION AND MITIGATIONMay 2024October 2025Allow1600YesNo
18670205Role-Based Permission by a Data PlatformMay 2024July 2025Allow1300YesNo
18670201TECHNIQUES FOR TOKEN PROXIMITY TRANSACTIONSMay 2024April 2025Allow1110NoNo
18662429KMS DEDICATED HSM DESIGN (DIRECT ACCESS)May 2024August 2025Allow1500NoNo
18661842METHODS AND SYSTEMS FOR ADAPTING AN APPLICATION PROGRAMMING INTERFACEMay 2024May 2025Allow1210NoNo
18659597PINNING DEVICE IDENTIFIERS TO CRYPTOGRAPHIC KEY PAIRSMay 2024March 2026Allow2220YesNo
18658647METHOD AND DEVICE FOR CONNECTING MAP APPLICATION TO PROCESS FOR AFFILIATION AUTHENTICATION OF USER ACCOUNT`May 2024January 2026Allow2010YesNo
18655537INTELLIGENT DISPLAY OF CONTENTMay 2024February 2025Allow1010NoNo
18655740Continuous User Authentication Criteria for Access to Encrypted FilesMay 2024January 2025Abandon910NoNo
18652944MICROCONTROLLER HAVING WIRELESS COMMUNICATION MODULE FOR USE WITH A SYSTEMMay 2024November 2025Allow1900NoNo
18653656SECURE RANGING SECRET KEY COMPLIANCE FOR SHORT-RANGE COMMUNICATION DEVICESMay 2024September 2025Allow1600NoNo
18646607APPARATUS, SYSTEMS, AND METHODS RELYING ON NON-FLASHABLE CIRCUITRY FOR IMPROVING SECURITY ON PUBLIC OR PRIVATE NETWORKSApril 2024July 2024Allow310NoNo
18646554PROTECTION OF SECRET DATA USING UNPROTECTED DATA PATHApril 2024February 2026Allow2210NoNo
18646617KUBERNETES SECURITY ISOLATION BASED ON CLASSIFIED INFORMATION AND RISK LEVELSApril 2024March 2025Allow1110NoNo
18646095LIMITING DISCOVERY OF A PROTECTED RESOURCE IN A ZERO TRUST ACCESS MODELApril 2024June 2025Allow1410YesNo
18640903SECURING LEGACY ADAPTERS WITH A SECURE MICROCONTROLLER UNIT AND LEGACY ADAPTER RECOVERYApril 2024January 2026Allow2110NoNo
18639954DETECTING KERBEROS TICKET ATTACKS WITHIN A DOMAINApril 2024June 2025Allow1400YesNo
18702638SECURE ASSET MANAGEMENT INFRASTRUCTURE FOR ENFORCING ACCESS CONTROL POLICIESApril 2024February 2026Allow2210NoNo
18637848Blockchain Encoding SystemApril 2024February 2025Allow1010NoNo
18635080GENERATIVE ARTIFICIAL INTELLIGENCE FOR VALIDATION OF A HUMAN USERApril 2024December 2025Allow2010NoNo
18634128HASHING MESSAGES WITH CRYPTOGRAPHIC KEY COMPONENTSApril 2024April 2025Allow1221YesNo
18634857Recovering from Ransomware AttacksApril 2024August 2025Allow1700YesNo
18632751CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTUREApril 2024January 2026Allow2120NoNo
18699722Stateful Hash-Based Signing with a Single Public Key and Multiple Independent SignersApril 2024January 2026Allow2210YesNo
18627961RECURRENT NEURAL NETWORK-BASED USER IDENTITY MISAPPROPRIATION PREVENTION FROM PUBLIC DOMAINS AND CONNECTIONSApril 2024January 2026Allow2100NoNo
18628625AMPLIFICATION OF FORMAL METHOD AND FUZZ TESTING TO ENABLE SCALABLE ASSURANCE FOR COMMUNICATION SYSTEMApril 2024February 2026Allow2311NoNo
18627166METHOD FOR GENERATING AT LEAST ONE CRYPTOGRAPHIC KEY AS WELL AS A COMPUTER PROGRAM PRODUCT AND A DEVICE THEREFORApril 2024December 2025Allow2010NoNo
18623737COMPUTER SYSTEMS AND COMPUTER-IMPLEMENTED METHODS UTILIZING DIGITAL RESOURCE ACCESSING MECHANISM SCHEMA FOR DIGITAL TOKENSApril 2024July 2025Abandon1510NoNo
18621771IMMUTABLE WATERMARKING FOR AUTHENTICATING AND VERIFYING AI-GENERATED OUTPUTMarch 2024March 2025Allow1110NoNo
18697240MODEL PROTECTION METHOD AND APPARATUS, DATA PROCESSING METHOD AND APPARATUS, AND DEVICE AND MEDIUMMarch 2024February 2025Allow1010NoNo
18622022MALWARE DETECTION TECHNIQUESMarch 2024January 2026Allow2210YesNo
18696479METHOD FOR DETECTING MOBILE MALICIOUS APPLICATION BASED ON IMPLEMENTATION FEATURES, RECORDING MEDIUM, AND DEVICE FOR PERFORMING THE METHODMarch 2024January 2026Allow2110NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2493.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
165
Examiner Affirmed
120
(72.7%)
Examiner Reversed
45
(27.3%)
Reversal Percentile
22.5%
Lower than average

What This Means

With a 27.3% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
502
Allowed After Appeal Filing
166
(33.1%)
Not Allowed After Appeal Filing
336
(66.9%)
Filing Benefit Percentile
54.3%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 33.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Art Unit 2493 - Prosecution Statistics Summary

Executive Summary

Art Unit 2493 is part of Group 2490 in Technology Center 2400. This art unit has examined 6,997 patent applications in our dataset, with an overall allowance rate of 79.5%. Applications typically reach final disposition in approximately 29 months.

Comparative Analysis

Art Unit 2493's allowance rate of 79.5% places it in the 60% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2493 receive an average of 2.06 office actions before reaching final disposition (in the 64% percentile). The median prosecution time is 29 months (in the 60% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is shorter than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.