USPTO Art Unit 2494 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19287737CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING DOUBLE ENCRYPTIONJuly 2025October 2025Allow200NoNo
19270295Distributed Adversarial Attack DetectionJuly 2025November 2025Allow410NoNo
19258509TECHNIQUES FOR CYBERSECURITY INCIDENT INVESTIGATION UTILIZING TIMELINE GENERATION BASED ON ENTITY QUERIESJuly 2025October 2025Allow400YesNo
19254764SYSTEM AND METHODS FOR UNFORGEABLE TELEMETRY IN THE PRESENCE OF CYBERATTACKS ON A COMPUTER PLATFORMJune 2025September 2025Allow200NoNo
19250003NETWORK ACTIVITY DEVIATION DETECTION AND REMEDIATIONJune 2025August 2025Allow100YesNo
19249918INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODESJune 2025August 2025Allow200YesNo
19242417Detection of Image Injection Attacks in Mobile Document Capture Systems Using Accelerometer-Based Vibration AnalysisJune 2025December 2025Allow510NoNo
19236472SYSTEMS AND METHODS FOR COUNTER-RECONNAISSANCE IN CLOUD INFRASTRUCTURE TO DISRUPT ADVERSARIAL TARGETINGJune 2025August 2025Allow200YesNo
19217401TECHNIQUES FOR EFFECTIVE NETWORK EXPOSURE DETECTION OF PRIVATE ENDPOINTS THROUGH A CLOUD-NATIVE ROUTERMay 2025July 2025Allow200YesNo
19217383TECHNIQUES FOR DETECTING EFFECTIVE NETWORK EXPOSURE OF A CLOUD-NATIVE PROXY APPLIANCE UTILIZING AGENTLESS INSPECTIONMay 2025July 2025Allow200YesNo
19214041CYBERTHREAT HUNTING AND PROTECTION BASED ON CODIFIED INDICATORS OF BEHAVIORMay 2025October 2025Allow510YesNo
19196527INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODESMay 2025June 2025Allow200YesNo
19185322METHOD FOR CONSTRUCTING A VEHICLE NETWORKING INTRUSION DETECTION MODEL BASED ON FEDERATED LEARNINGApril 2025June 2025Allow200YesNo
19182219TECHNIQUES FOR ASSESSING EXPLOITATIONS IN A RUNTIME ENVIRONMENTApril 2025October 2025Allow510NoNo
19172364SECURE MULTI-PARTY EPHEMERAL FILE TRANSFERApril 2025May 2025Allow100NoNo
19093823Defanging Malicious Electronic Files Based on Trusted User ReportingMarch 2025October 2025Allow710YesNo
19116114COMMUNICATION APPARATUS, METHOD, SYSTEM, DEVICE, MEDIUM, ENCRYPTION SYSTEM, AND SERVERMarch 2025November 2025Allow810NoNo
19083748METHODS AND SYSTEMS FOR ENHANCING A CONTEXT FOR USE IN PROCESSING A USER REQUESTMarch 2025January 2026Allow1020NoNo
19061523METHOD AND SYSTEM FOR DETECTING ABNORMAL NODES IN INDUSTRIAL INTERNET, AND MEDIUM AND DEVICEFebruary 2025May 2025Allow300YesNo
19048504TECHNIQUES FOR CYBERSECURITY EVENT CLASSIFICATION IN DATAFLOW MANAGEMENTFebruary 2025April 2025Allow300YesNo
19041984CYBER RESILIENCE AGENTIC MESHJanuary 2025April 2025Allow200YesNo
19040705INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODESJanuary 2025April 2025Allow200YesNo
19033769SECURED TRANSFER MEDIUM MANAGEMENT AND GRADUATIONJanuary 2025November 2025Allow1020YesNo
19031089METHODS AND SYSTEMS FOR IDENTIFYING ANOMALOUS USERS EXHIBITING OVERREACHING ACCESS PERMISSIONS TO DATA OBJECTSJanuary 2025April 2025Allow200YesNo
19025047GRAPH MODELS OF RELATIONSHIPS BETWEEN DATA STORED IN BLOCKS ON DISTRIBUTED LEDGERS THAT ARE LEARNED THROUGH MACHINE LEARNING AND PLATFORMS FOR CREATING, CATALOGING, AND STORING THE SAMEJanuary 2025February 2026Allow1320NoNo
19021683NETWORK EDGE DIGITAL TWIN FOR IOT ATTACK DETECTIONJanuary 2025March 2025Allow200YesNo
19020851INFORMATION NOTIFICATION METHOD AND INFORMATION NOTIFICATION DEVICEJanuary 2025June 2025Allow510YesNo
19020133OPTIMIZED CYBERSECURITY SYSTEM AND METHODS OF USE THEREOFJanuary 2025July 2025Allow600YesNo
19013980MULTIMODAL DATA FUSION FOR CYBERSECURITY APPLICATIONSJanuary 2025July 2025Allow610YesNo
19006418Detection and Prevention Of Adversarial Attacks Against Large Language ModelsDecember 2024July 2025Allow700YesNo
19000479URL PARAMETER VALUE ANOMALY DETECTION METHOD AND SYSTEM FOR THE SAMEDecember 2024May 2025Allow400YesNo
18987001DETECTION ENGINE THREAT GROUPING BY CLOUD ENTITIESDecember 2024July 2025Allow610YesNo
18988175METHODS FOR GRINDING-RESISTANT CONSENSUS IN A PROOF-OF-SPACE-BASED BLOCKCHAINDecember 2024January 2026Allow1310YesNo
18964871SYSTEM AND METHOD FOR PASSIVE IDENTIFICATION AND DETECTION OF BOTNETSDecember 2024June 2025Allow710YesNo
18964330DERIVED ACCESS PERMISSIONS FOR INPUTS TO ARTIFICIAL INTELLIGENCE AGENTSNovember 2024February 2025Allow200NoNo
18963186PROBABILISTIC EVENT LINKINGNovember 2024February 2025Allow300YesNo
18961639SECURE DEVICE COMMUNICATION USING MULTI-KEY ENCAPSULATIONNovember 2024February 2025Allow200NoNo
18961324ALARM DATA PROCESSING METHOD, APPARATUS, MEDIUM AND ELECTRONIC DEVICENovember 2024February 2025Allow300YesNo
18947397SYSTEMS AND METHODS FOR CYBERSECURITY RISK ASSESSMENTNovember 2024March 2026Allow1600YesNo
18946217Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation PlatformNovember 2024January 2025Allow200YesNo
18945409Canonicalization of Unicode Prompt InjectionsNovember 2024February 2025Allow310YesNo
18943284TECHNIQUES FOR INCIDENT RESPONSE AND STATIC ANALYSIS REPRESENTATION IN COMPUTING ENVIRONMENTSNovember 2024March 2026Allow1600YesNo
18932967CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUSOctober 2024May 2025Allow610YesNo
18931982DATA MAINTENANCE SYSTEM, DATA MAINTENANCE METHOD, COMPUTER READABLE MEDIUM, AND DATA VERIFICATION APPARATUSOctober 2024February 2026Allow1500NoNo
18929284NESTED MODEL STRUCTURES FOR THE PERFORMANCE OF COMPLEX TASKSOctober 2024March 2026Allow1600YesNo
18927514SYSTEMS AND METHODS FOR CRYPTOGRAPHICALLY VERIFYING QUERIESOctober 2024April 2025Allow610NoNo
18923017LIGHTWEIGHT INTRUSION DETECTION METHOD AND SYSTEM OF INTERNET OF VEHICLES BASED ON KNOWLEDGE DISTILLATIONOctober 2024January 2025Allow300YesNo
18922019INFORMATION PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUMOctober 2024June 2025Allow820NoNo
18920106METHOD AND APPARATUS TO DYNAMICALLY CONTROL FACIAL ILLUMINATIONOctober 2024January 2026Allow1500YesNo
18919358METHODS AND SYSTEMS FOR FRAUD CONTAINMENTOctober 2024February 2026Allow1600YesNo
18918406SYSTEMS AND METHODS OF ADAPTIVELY IDENTIFYING ANOMALOUS NETWORK COMMUNICATION TRAFFICOctober 2024February 2026Allow1600YesNo
18914035DETECTING MALICIOUS ACTIVITY USING USER-SPECIFIC PARAMETERSOctober 2024December 2024Allow200YesNo
18906652SYSTEMS AND METHODS FOR IMPLEMENTING INTERIM SECURITY POLICIESOctober 2024December 2024Allow300YesNo
18901840SYSTEM AND METHOD OF INTEGRATED UNIQUE IDENTITY MANAGEMENTSeptember 2024January 2026Allow1600YesNo
18895998TECHNOLOGIES FOR AUDITING AND MAINTAINING ACCESS TO PROTECTED DATASeptember 2024January 2026Allow1600NoNo
18292830ENCRYPTED SEAL, AND SECONDARY ENCRYPTION METHOD FOR STRIP-SHAPED DATASeptember 2024August 2025Allow1920YesNo
18888955SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYSSeptember 2024February 2025Allow510NoNo
18888973LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYSSeptember 2024February 2025Allow510NoNo
18888947SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYSSeptember 2024February 2025Allow510NoNo
18887807SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYSSeptember 2024November 2024Allow210NoNo
18887697LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYSSeptember 2024December 2024Allow210NoNo
18887706SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYSSeptember 2024March 2025Allow620NoNo
18884552Email Processing for Improved Authentication Question AccuracySeptember 2024March 2026Allow1810NoNo
18882373METHODS AND SYSTEMS FOR VERIFYING A USER AGENTSeptember 2024December 2024Allow300NoNo
18829996THREAT CLASSIFICATION IN A STREAMING SYSTEMSeptember 2024November 2024Allow200YesNo
18829109SYSTEM FOR CYBERSECURITY CAMPAIGN ARTIFACT DISCOVERY AND TASKINGSeptember 2024March 2025Allow610YesNo
18824956Secure localization method for multi-mobile robots based on network communicationSeptember 2024November 2024Allow300YesNo
18825239SECURE RELAY DEVICE AND DATA TRANSMISSION RECEPTION SYSTEMSeptember 2024December 2025Allow1600NoNo
18820323ARTIFICIAL INTELLIGENCE (AI)-BASED SYSTEM FOR DETECTING MALWARE IN ENDPOINT DEVICES USING A MULTI-SOURCE DATA FUSION AND METHOD THEREOFAugust 2024January 2026Allow1600NoNo
18843232CONTAINER OPERATION CONTROL METHOD AND APPARATUSAugust 2024June 2025Allow900NoNo
18820959Methods and Systems for Efficient Adaptive Logging of Cyber Threat IncidentsAugust 2024December 2025Allow1600NoNo
18808084Key Diversification in a Tracking Device EnvironmentAugust 2024November 2025Allow1500NoNo
18809198NESTED ENCRYPTION PROTOCOL INDICATORS FOR WEB TOKENSAugust 2024November 2025Allow1500NoNo
18807853METHOD AND APPARATUS FOR DETECTING FALSE BASE STATIONAugust 2024January 2026Allow1700YesNo
18807827METHOD, APPARATUS, DEVICE, AND MEDIUM FOR PERMISSION PROCESSINGAugust 2024March 2025Allow710NoNo
18798689SYSTEM AND METHOD FOR CYBERSECURITY RISK MANAGEMENTAugust 2024March 2026Allow1910NoNo
18798703PRE-TASK ASSIGNMENT TRUST EVALUATION IN DISTRIBUTED COMPUTING AND COMMUNICATION SYSTEMSAugust 2024November 2025Allow1500NoNo
18794676MICROSERVICES ANOMALY DETECTIONAugust 2024January 2026Allow1800YesNo
18792476AUTOMATIC SEGMENTATION USING HIERARCHICAL TIMESERIES ANALYSISAugust 2024March 2026Allow2010NoNo
18785419CLOUD DATA ATTACK SURFACE TRACKING USING GRAPH-BASED EXCESSIVE PRIVILEGE DETECTIONJuly 2024October 2024Allow300YesNo
18786353MODULAR DATA CENTERJuly 2024March 2026Allow1900YesNo
18785397DATA PROCESSING SYSTEM PERIPHERAL DEVICE MANAGEMENT USING COMPONENT CERTIFICATESJuly 2024January 2026Allow1810NoNo
18781121RISK EVENT DETECTION USING ACTIVITY AND GRAPH-BASED CONTEXT FOR CLOUD DATA SECURITY POSTURE MANAGEMENTJuly 2024February 2025Allow610YesNo
18779156INFORMATION PROCESSING APPARATUS, METHOD FOR DISPLAYING PASSWORD STRENGTH, AND MEDIUMJuly 2024January 2026Allow1810NoNo
18778536SYSTEM AND METHOD FOR PROVIDING CONTRACT SUPPORT SERVICEJuly 2024October 2025Allow1500NoNo
18776556SYSTEM AND METHOD FOR FIREWALL POLICY RULE MANAGEMENTJuly 2024July 2025Allow1230YesNo
18770937METHODS AND APPARATUS FOR WTRU-TO-WTRU RELAY DISCOVERY SECURITY AND PRIVACYJuly 2024December 2024Allow510NoNo
18728535A CYBER-ATTACK DETECTION AND PREVENTION SYSTEMJuly 2024December 2025Allow1710NoNo
18769927Data Protection with Two Password Asymmetric EncryptionJuly 2024January 2026Allow1800YesNo
18768653SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT RESTJuly 2024December 2025Abandon1720NoNo
18767075REMOTE IDENTIFICATION AND MANAGEMENT OF MANNED AND UNMANNED SYSTEMS AND DEVICESJuly 2024February 2025Allow700YesNo
18765759HARDWARE-BASED CONTROL OF PERIPHERAL DEVICESJuly 2024March 2026Allow2010NoNo
18766355OPERATIONS AND MAINTENANCE TECHNIQUES SUBSYSTEM FOR SECURE CLASSIFIED REMOTE ACCESS AS A SERVICEJuly 2024March 2025Allow800YesNo
18765114Third-Party Analytic and Machine Learning Model ValidationJuly 2024March 2026Allow2100YesNo
18762260DYNAMIC ACCESS CONTROL TO ELECTRONIC PATIENT RECORDSJuly 2024January 2026Allow1900YesNo
18759421Systems and Methods for Automating Processes for Remote WorkJune 2024December 2025Allow1810NoNo
18757652AUTO-HEALING FOR BLOCKCHAIN CONFIGURATION DRIFTSJune 2024October 2025Allow1600NoNo
18758159ACCESS CONTROL POLICY FOR PROXY SERVICESJune 2024May 2025Allow1100NoNo
18756258SECURITY-ENHANCED STORAGE DEVICEJune 2024October 2025Allow1500YesNo
18752409METHODS AND APPARATUSES TO PROVIDE INFORMATION SECURITY TO AN ENTITY BY USING MULTIPLE CLOUD-BASED APPLICATION SERVICESJune 2024February 2025Allow810YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2494.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
132
Examiner Affirmed
100
(75.8%)
Examiner Reversed
32
(24.2%)
Reversal Percentile
13.5%
Lower than average

What This Means

With a 24.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
431
Allowed After Appeal Filing
173
(40.1%)
Not Allowed After Appeal Filing
258
(59.9%)
Filing Benefit Percentile
87.5%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 40.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Art Unit 2494 - Prosecution Statistics Summary

Executive Summary

Art Unit 2494 is part of Group 2490 in Technology Center 2400. This art unit has examined 5,947 patent applications in our dataset, with an overall allowance rate of 80.9%. Applications typically reach final disposition in approximately 30 months.

Comparative Analysis

Art Unit 2494's allowance rate of 80.9% places it in the 66% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2494 receive an average of 2.03 office actions before reaching final disposition (in the 62% percentile). The median prosecution time is 30 months (in the 56% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is shorter than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.