USPTO Art Unit 2495 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19304982SYSTEMS AND METHODS FOR REAL-TIME GENERATION AND EXECUTION OF COMPUTER-EXECUTABLE INVESTIGATIVE QUERIES IN A CYBERSECURITY EVENT DETECTION AND RESPONSE PLATFORMAugust 2025February 2026Allow500NoNo
19287102SYSTEM AND METHOD FOR UTILIZING AN AI BROWSER AGENT IN IDENTITY DISCOVERY AND MANAGEMENTJuly 2025November 2025Allow400NoNo
19181802SECURE CROSS-CHAIN ATOMIC SWAPSApril 2025January 2026Allow910NoNo
19076729ADVANCED ENCRYPTION STANDARD WITH FREQUENT S-BOX UPDATE AND FUSION FUNCTION APPLICATIONMarch 2025July 2025Allow410NoNo
18880027END TO END ENCRYPTION WITH ROAMING CAPABILITIESDecember 2024October 2025Allow920NoNo
18975690UNIFIED THREAT MANAGEMENT AND MITIGATIONDecember 2024April 2025Allow510YesNo
18957307ARTIFICIAL INTELLIGENCE CHATBOT FOR DATA PLATFORM SECURITY ANALYSISNovember 2024March 2026Allow1600YesNo
18957354Privacy-Preserving Biometric Authentication Using Asymmetrically Loaded ServersNovember 2024April 2025Allow510NoNo
18945631METHOD AND SYSTEM FOR PRESERVING PRIVACY OF TELEMATIC DATANovember 2024March 2026Allow1600YesNo
18943149Methods and Systems for Efficient Cybersecurity Policy Enforcement on Network CommunicationsNovember 2024February 2025Allow300NoNo
18940631TECHNOLOGIES FOR AUTHENTICATIONS VIA WEB COMPONENTSNovember 2024April 2025Allow610YesNo
18938151ASSOCIATING DECENTRALIZED IDENTIFIERS WITH ONE OR MORE DEVICESNovember 2024February 2026Allow1600YesNo
18934095SYSTEM AND METHOD FOR A TRUST EVALUATION AND SHARING SYSTEMOctober 2024March 2026Allow1600YesNo
18919222SECURITY GROUP RESOLUTION AT INGRESS ACROSS VIRTUAL NETWORKSOctober 2024March 2026Allow1700NoNo
18918795METHODS AND APPARATUS FOR VISUALIZATION OF MACHINE LEARNING MALWARE DETECTION MODELSOctober 2024March 2026Allow1600YesNo
18917690SYSTEM AND METHOD FOR DETERMINING CODE REACHABILITY IN A NETWORKED COMPUTING ENVIRONMENTOctober 2024January 2025Allow310NoNo
18912666SYSTEM AND METHOD FOR PROVIDING PEER-TO-PEER VIRTUAL PRIVATE NETWORK CONNECTIONS IN MULTI-GATEWAY ENTERPRISE NETWORKSOctober 2024February 2026Allow1600NoNo
18909465NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHODOctober 2024January 2026Allow1600YesNo
18890942SYSTEMS AND METHODS FOR ORCHESTRATING APPLICATION USE WHILE PREVENTING UNAUTHORIZED DATA SHARINGSeptember 2024February 2026Allow1700YesNo
18892215Data Obfuscation Using Encoder-Multi-Decoder ArchitectureSeptember 2024March 2025Allow510NoNo
18890223HOMOMORPHIC ENCRYPTION IN A HEALTHCARE NETWORK ENVIRONMENT, SYSTEM AND METHODSSeptember 2024December 2025Allow1540NoNo
18888599FACE IDENTIFICATION SYSTEM AND METHOD FOR IDENTIFYING FACE IMAGESeptember 2024April 2025Allow710YesNo
18886034CLASSIFYING A SOURCE OF A LOGIN ATTEMPT TO A USER ACCOUNT USING MACHINE LEARNINGSeptember 2024February 2026Allow1700YesNo
18885510CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATIONSeptember 2024December 2024Allow310NoNo
18885474CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATIONSeptember 2024December 2024Allow310NoNo
18827391METHODS AND SYSTEMS FOR ASSET RISK DETERMINATION AND UTILIZATION FOR THREAT MITIGATIONSeptember 2024January 2026Allow1600YesNo
18824228KEY MANAGEMENT METHOD AND RELATED DEVICESeptember 2024January 2026Allow1700YesNo
18823115INTEGRATED PRIVATE CLOUD AI PLATFORMSeptember 2024January 2026Allow1700NoNo
18821048QUERY INFORMATION PROCESSING METHOD USING FULLY HOMOMORPHIC ENCRYPTED DATABASE WITH FIELD EXPANSION AND COMPUTING DEVICE FOR PERFORMING THE SAMEAugust 2024January 2026Allow1700YesNo
18842723REQUESTING A CERTIFICATE IN A DOCUMENTED MANNER USING A REGISTRATION POINTAugust 2024March 2025Allow710YesNo
18816546DYNAMIC BYPASSAugust 2024February 2026Allow1800YesNo
18815573COMPUTER-IMPLEMENTED AUTHENTICATION PLATFORMAugust 2024December 2024Allow410NoNo
18841316SECURE AND PRIVACY PRESERVING MESSAGE ROUTING SYSTEMAugust 2024February 2025Allow600NoNo
18809959COMMUNICATION SYSTEM, SERVER, AND FUNCTION EXECUTING DEVICEAugust 2024October 2025Allow1400NoNo
18806918TECHNIQUES FOR JUST-IN-TIME CONTEXT BASED PERMISSION ACCESS OF COMPUTING RESOURCESAugust 2024January 2026Allow1720NoNo
18805624On-Demand Private Network Creation and ManagementAugust 2024October 2025Allow1400NoNo
18806184METHOD AND SYSTEM FOR COLLECTING CONSUMPTION DATA MEASURED BY SMART METERSAugust 2024June 2025Allow1010NoNo
18799237ENHANCEMENT OF MUD FILES BASED ON BEHAVIORAL ANALYSISAugust 2024February 2026Allow1810NoNo
18796117LOW LATENCY AND REDUNDANT PROOF OF POSSESSION FOR CONTENT SUBSCRIPTIONAugust 2024January 2026Allow1800NoNo
18794036Cyber Protection Automation with Secure Physical VaultAugust 2024October 2025Allow1500YesNo
18835737ROUTING-POLICY-BASED GLOBAL USER COMPLIANCE ACCESS METHOD AND APPARATUSAugust 2024November 2025Allow1600YesNo
18790563METHOD AND SYSTEM FOR MANAGING GLOBAL CONTROL GROUP (GCG)July 2024June 2025Allow1120YesNo
18788296SECURED ONBOARDING OF TEMPORARILY TRANSFERRED ENDPOINT DEVICESJuly 2024December 2025Allow1600YesNo
18833841PRECACHING-BASED AUTHENTICATION METHOD AND DEVICE IN WIRELESS POWER TRANSMISSION SYSTEMJuly 2024February 2026Allow1810NoNo
18778425MULTI-TIER TOKENIZATION WITH LONG TERM TOKENJuly 2024January 2026Allow1810NoNo
18775540ANOMALY DETECTION USING CHANGE BLOCKS AND DISK EXTENTSJuly 2024October 2025Allow1500NoNo
18774753SERVER AUTHENTICITY VERIFICATION USING A CHAIN OF NESTED PROOFSJuly 2024February 2026Allow1900NoNo
18773300ENFORCING GRANULAR ACCESS CONTROL POLICYJuly 2024January 2026Allow1810YesNo
18708806PROCESS FOR SEARCHING FOR SENSITIVE DATA IN AT LEAST ONE DATA PACKET, ASSOCIATED DEVICE AND SYSTEMJuly 2024March 2026Allow2220NoNo
18770575CRYPTOGRAPHIC KEY MANAGEMENT AND TRANSFERJuly 2024February 2025Allow810YesNo
18770199SYSTEM AND METHOD FOR SECURELY SHARING CRYPTOGRAPHIC MATERIALJuly 2024October 2025Allow1500NoNo
18769845TOKEN MANAGEMENT SYSTEM AND METHODJuly 2024January 2026Allow1810YesNo
18764409SYSTEM AND METHOD USING TRUSTED AUTHORIZATION MECHANISM BASED ON POLYNOMIAL COMMITMENT MULTIPLE ACCESS FOR DATA EXCHANGEJuly 2024October 2025Allow1600NoNo
18763615INTELLIGENT AND SECURE PACKET CAPTURES FOR CLOUD SOLUTIONSJuly 2024November 2025Allow1620YesNo
18763526SECURITY DEVICE AND OPERATION METHOD THEREOFJuly 2024September 2025Allow1500NoNo
18761268Policy-based Data Store Access AuthorizationJuly 2024October 2025Allow1600NoNo
18758510TECHNIQUES FOR DETECTING CLOUD IDENTITY MISUSE BASED ON RUNTIME CONTEXT AND STATIC ANALYSISJune 2024September 2024Allow200NoNo
18725455METHOD AND SYSTEM FOR GENERATING DIGITAL SIGNATURES USING UNIVERSAL COMPOSITIONJune 2024November 2025Allow1600NoNo
18753260SYSTEM AND METHOD FOR UPDATING ACCESS TOKENS IN AN INFORMATION PROCESSING APPARATUSJune 2024December 2025Allow1700YesNo
18749928PROTECTION OF CRYPTOGRAPHIC PARAMETERS USED IN CRYPTOGRAPHIC PROCESSINGJune 2024February 2026Allow2010YesNo
18749324RISK ASSESSMENT FOR NETWORK ACCESS CONTROL THROUGH DATA ANALYTICSJune 2024February 2026Allow1910NoNo
18720685METHOD SECURED AGAINST SIDE-CHANNEL ATTACKS PERFORMING A CRYPTOGRAPHIC ALGORITHM COMPRISING A POLYNOMIAL OPERATIONJune 2024October 2025Allow1600NoNo
18742305BLOCKCHAIN-BASED PLATFORM-INDEPENDENT PERSONAL PROFILESJune 2024February 2026Allow2020YesNo
18741748METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR USING SERVICE COMMUNICATION PROXY (SCP) TO OFFLOAD VERIFICATION OF CONSUMER NETWORK FUNCTION (NF) SECURITY CERTIFICATESJune 2024November 2025Allow1700NoNo
18740200SECURITY PROTOCOL FOR PAIRING COLLOCATED USERSJune 2024September 2025Allow1520NoNo
18740069SYSTEMS AND METHOD OF CONTEXTUAL DATA MASKING FOR PRIVATE AND SECURE DATA LINKAGEJune 2024October 2025Allow1600YesNo
18738356GARBLING SCHEME-BASED SECURE MULTI-PARTY COMPUTATION (MPC)June 2024January 2026Allow1900YesNo
18738179METHOD AND SYSTEM FOR AUTHENTICATING A SECURE CREDENTIAL TRANSFER TO A DEVICEJune 2024May 2025Allow1110YesNo
18735142SYSTEM AND METHOD FOR EXECUTING MACHINE LEARNING MODEL INFERENCEJune 2024October 2025Allow1600NoNo
18715748METHOD FOR GENERATING AN INDEPENDENT BIT SEQUENCEJune 2024January 2026Allow2010YesNo
18731017SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEMMay 2024April 2025Allow1110YesNo
18678569MANAGING INFERENCE MODELS IN VIEW OF RECONSTRUCTABILITY OF SENSITIVE INFORMATIONMay 2024December 2025Allow1900NoNo
18678718COMPUTER VIRUS INTERCEPTION METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCTMay 2024September 2025Allow1600YesNo
18679367SECURE DYNAMIC THRESHOLD SIGNATURE SCHEME EMPLOYING TRUSTED HARDWAREMay 2024September 2025Allow1510NoNo
18672353Methods and Systems for Efficient Cybersecurity Policy Enforcement on Network CommunicationsMay 2024August 2024Allow300NoNo
18671693SECURING AUTHENTICATION FLOWS USING A DECENTRALIZED IDENTIFIERMay 2024April 2025Allow1110YesNo
18670823AUTHENTICATED ENCRYPTION APPARATUS, AUTHENTICATED DECRYPTION APPARATUS, AUTHENTICATED ENCRYPTION SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUMMay 2024October 2025Allow1600NoNo
18670358RADIO AUTHENTICATION AS ROOT OF TRUST FOR TRANSPORT LAYER SECURITYMay 2024March 2026Allow2100NoNo
18668697AUTOMATICALLY DETECTING AUTHORIZED REMOTE ADMINISTRATION SESSIONS IN A NETWORK MONITORING SYSTEMMay 2024September 2025Allow1630YesNo
18667434METHOD AND DEVICE FOR PROVING ORIGINALITY OF CREATIVE DESIGN IN COMMUNICATION SYSTEMMay 2024July 2024Allow200NoNo
18664515INTERWORKING BETWEEN IOT SERVICE LAYER SYSTEMS AND DISTRIBUTED LEDGER SYSTEMSMay 2024May 2025Allow1210YesNo
18665246GENERATING KEYS USING CONTROLLED CORRUPTION IN COMPUTER NETWORKSMay 2024June 2025Abandon1301NoNo
18664216CONTENT ACTIVATION VIA INTERACTION-BASED AUTHENTICATION, SYSTEMS AND METHODMay 2024January 2026Allow2120YesNo
18710064COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, METHOD, AND PROGRAMMay 2024September 2025Allow1600NoNo
18662689DETECTING MATCHING CLIENT DEVICES BASED ON LOCATION DATAMay 2024August 2025Allow1500YesNo
18662297SUBSTANTIATING A COMPLIANCE STANDARD WITH SECONDARY EVIDENCEMay 2024September 2025Allow1600NoNo
18660250DETECTING APPARATUS OF AVOID TYPE MALICIOUS CODE FOR VIRTUALIZATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE USING INTEGRATED FEATURESMay 2024October 2025Allow1700NoNo
18661549SYSTEMS AND METHODS FOR ENCRYPTING DATAMay 2024August 2024Allow300NoNo
18660989Decision Engine Consistency Verification SystemMay 2024February 2026Allow2110NoNo
18658736METHOD AND SYSTEM FOR CONFIDENTIAL COMPUTINGMay 2024May 2025Allow1210NoNo
18657350System And Method For Managing Exception Request Blocks In A Blockchain NetworkMay 2024December 2025Allow1910NoNo
18655858ONLINE PURCHASE AUTOFILL PLUG-INMay 2024June 2025Allow1320YesNo
18654448SOVEREIGN DATA CENTER INCOMING DATA MANAGEMENTMay 2024December 2025Allow1900NoNo
18653362Hybrid Cryptography Virtual Private NetworksMay 2024December 2025Allow1920YesNo
18706457SELF-ORGANIZED MESH NETWORKMay 2024September 2025Allow1600NoNo
18648692METHOD AND SYSTEM FOR EVALUATING INDIVIDUAL AND GROUP CYBER THREAT AWARENESSApril 2024March 2026Allow2220NoNo
18649820SYSTEM SUPPORTING OPERATIONS ON SECURELY COMMINGLING SELF-GOVERNING DATA SETS FROM A PLURALITY OF PUBLISHERSApril 2024August 2025Allow1600NoNo
18647363SEAMLESS NETWORK CONFIDENTIALITY FOR A CONTAINERIZED APPLICATION ON EDGE INFRASTRUCTUREApril 2024September 2025Allow1700NoNo
18647565SYSTEM AND PROCESS FOR PROVIDING NETWORK INTRUSION DETECTIONApril 2024May 2025Allow1210NoNo
18647422RULES GENERATION TO PRIORITIZE COMPUTER NETWORK DEVICESApril 2024February 2025Allow1020YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2495.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
175
Examiner Affirmed
132
(75.4%)
Examiner Reversed
43
(24.6%)
Reversal Percentile
14.7%
Lower than average

What This Means

With a 24.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
437
Allowed After Appeal Filing
149
(34.1%)
Not Allowed After Appeal Filing
288
(65.9%)
Filing Benefit Percentile
59.0%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 34.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Art Unit 2495 - Prosecution Statistics Summary

Executive Summary

Art Unit 2495 is part of Group 2490 in Technology Center 2400. This art unit has examined 5,843 patent applications in our dataset, with an overall allowance rate of 82.3%. Applications typically reach final disposition in approximately 29 months.

Comparative Analysis

Art Unit 2495's allowance rate of 82.3% places it in the 72% percentile among all USPTO art units. This art unit has an above-average allowance rate compared to other art units.

Prosecution Patterns

Applications in Art Unit 2495 receive an average of 2.00 office actions before reaching final disposition (in the 59% percentile). The median prosecution time is 29 months (in the 61% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is shorter than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.