USPTO Art Unit 2498 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19238157ANALYSIS AND RIGHTS MANAGEMENT OF DISASSOCIATED SPLINTERED DATAJune 2025September 2025Allow300YesNo
18851672INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, SERVER, BLOCK CHAIN NODE, AND PROGRAMJune 2025March 2026Allow1800YesNo
19174560IDENTIFYING MATCHING VIRTUAL RESOURCESApril 2025June 2025Allow300NoNo
19096043DIGITAL ASSET MANAGEMENTMarch 2025September 2025Allow610YesNo
18974123SYSTEM AND METHOD FOR SCANNING PRIVATE CODE AND CI/CD REGISTRIESDecember 2024March 2025Allow300YesNo
18859887METHODS AND APPARATUSES FOR DETECTING AND LOCALIZING FAULTS USING MACHINE LEARNING MODELSOctober 2024January 2026Allow1500YesNo
18923095SYSTEMS AND METHODS FOR CONTEXTUAL ALERT ENRICHMENT IN COMPUTING INFRASTRUCTURE AND REMEDIATION THEREOFOctober 2024October 2025Allow1220NoNo
18910150Method and device for controlling the execution of at least one action of an object connected in a communication networkOctober 2024January 2026Allow1600YesNo
18909635EMBEDDED RESOURCE MANAGEMENT PLATFORMOctober 2024January 2026Allow1600YesNo
18895230BLOCKCHAIN TRANSACTIONS INCLUDING PORTIONS OF CODE IN DIFFERENT LANGUAGES FOR COMPLEX VALIDATIONSeptember 2024January 2026Allow1600YesNo
18893670Mutually Authenticated ECDHE Key Exchange for a Device and a Network Using Multiple PKI Key PairsSeptember 2024January 2026Allow1600YesNo
18888661PUF APPLICATIONS IN MEMORIESSeptember 2024February 2026Allow1610NoNo
18886833PUF-PROTECTED PSEUDO-HOMOMORPHIC METHODS TO GENERATE SESSION KEYSSeptember 2024January 2026Allow1600NoNo
18830111MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHODSeptember 2024March 2026Allow1810NoNo
18823271DIGITAL ASSET MANAGEMENTSeptember 2024November 2024Allow300NoNo
18813195METHODS AND SYSTEMS FOR DETECTING DENIAL OF SERVICE ATTACKS ON A NETWORKAugust 2024March 2026Allow1810NoNo
18811488INCREMENTAL ENRICHMENT OF THREAT DATAAugust 2024January 2026Allow1700YesNo
18808778SYSTEMS AND METHODS FOR END POINT INTEGRATION AND MAPPINGAugust 2024January 2025Allow510YesNo
18806828REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMSAugust 2024January 2025Allow510YesNo
18801261DYNAMIC TRAFFIC PRIORITIZATION ACROSS DATA CENTERSAugust 2024January 2026Allow1800YesNo
18789389Identifying Atypical Activity Involving an Entity in a Computer SystemJuly 2024October 2025Allow1500NoNo
18776050SYSTEM AND METHOD OF MULTI-ROUND TOKEN DISTRIBUTION USING A BLOCKCHAIN NETWORKJuly 2024December 2025Allow1700YesNo
18769267SECURITY INTEGRATION FOR CLOUD SERVICESJuly 2024November 2025Allow1600YesNo
18769344BLOCKCHAIN FOR GENERAL COMPUTATIONJuly 2024June 2025Allow1110NoNo
18767953SECURITY ANALYSIS METHOD AND SYSTEM BASED ON PROTOCOL STATEJuly 2024November 2024Allow410NoNo
18762403AUTHENTICATION OF USERS UTILIZING BIOMETRIC DATA IN A NON-CENTRALIZED COMPUTER SYSTEMJuly 2024October 2025Allow1500NoNo
18759366RANGE CONSTRAINED DEVICE CONFIGURATIONJune 2024January 2026Abandon1820YesNo
18724674METHOD, APPARATUS AND DEVICE FOR SECURE DATA TRANSMISSIONJune 2024October 2025Allow1600YesNo
18756159Executing Digital Signature Operations In A Secure Element Platform Runtime EnvironmentJune 2024January 2026Allow1900NoNo
18753432DYNAMICALLY ENFORCING SECURITY POLICIES ON CLIENT DEVICES USING A DEVICE IDENTITY ENTITY AND A SECURITY POLICY ENFORCEMENT ENTITYJune 2024May 2025Allow1010YesNo
18752011SYSTEM AND METHOD FOR SECURE CLOUD FPGA DEPLOYMENTJune 2024September 2025Allow1500YesNo
18750179HEALTH CARE INFORMATION SYSTEM PROVIDING ADDITIONAL DATA FIELDS IN PATIENT DATAJune 2024May 2025Allow1110NoNo
18749865INSTRUCTION TO ACCELERATE CRYPTOGRAPHIC PROCESSINGJune 2024January 2026Allow1910YesNo
18742570SOFTWARE RELEASE TRACKING AND LOGGINGJune 2024June 2025Allow1210NoNo
18740389METHOD OF ENABLING DIGITAL MUSIC CONTENT TO BE DOWNLOADED TO AND USED ON A PORTABLE WIRELESS COMPUTING DEVICEJune 2024October 2025Allow1620NoNo
18740080DECENTRALIZED CONSENSUS NETWORKJune 2024February 2025Allow810NoNo
18738422SECURE CREDENTIALING SYSTEMS AND METHODSJune 2024September 2025Allow1510NoNo
18732987SYSTEM AND METHOD FOR SECURE ELECTRONIC DATA TRANSFERJune 2024February 2025Allow800YesNo
18732294SYNTHESIZING USER TRANSACTIONAL DATA FOR DE-IDENTIFYING SENSITIVE INFORMATIONJune 2024March 2025Allow910NoNo
18679611PRIVACY PARAMETER RECYCLING DIFFERENTIAL PRIVACYMay 2024October 2025Allow1600NoNo
18679186DNS AUTOMATED INTELLIGENCEMay 2024January 2026Allow2010YesNo
18678988COMMUNICATION METHOD FOR QUANTUM SECURITY AND COMMUNICATION DEVICE SUPPORTING THE SAMEMay 2024October 2025Allow1600YesNo
18675754SECURE DOCUMENT STORAGE SYSTEMMay 2024April 2025Allow1110NoNo
18712800INFORMATION PROCESSING DEVICE AND KEY MANAGEMENT DEVICEMay 2024January 2026Allow2010NoNo
18710567CORRELATING REMOTE ATTESTATION QUOTES WITH A VIRTUALIZED NETWORK FUNCTION (VNF) RESOURCE ALLOCATION EVENTMay 2024February 2026Allow2110YesNo
18665419THIRD-PARTY PRIVATE SET DIFFERENCEMay 2024September 2025Allow1600NoNo
18663842BLOCKCHAIN-BASED AUTHENTICATION SYSTEM AND METHODMay 2024September 2025Allow1600NoNo
18662434KMS DEDICATED HSM DESIGN (CLAIMING OWNERSHIP)May 2024September 2025Allow1600NoNo
18661021Secure Intrusive and Non-Intrusive Real-Time Diagnostics Across Secure PerimetersMay 2024September 2025Allow1600NoNo
18660978COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR HIGHLY SECURE, HIGH SPEED ENCRYPTION AND TRANSMISSION OF DATAMay 2024May 2025Abandon1310NoNo
18709089COMMUNICATION SYSTEM, TRANSMISSION APPARATUS, RECEPTION APPARATUS, AND METHOD AND PROGRAM THEREOFMay 2024March 2026Abandon2210NoNo
18660104PHISHING URL DETECTION USING TRANSFORMERSMay 2024June 2025Allow1310YesNo
18659987LOW LATENCY METADATA DECRYPTION USING HASH AND PSEUDORANDOM FUNCTIONSMay 2024January 2026Allow2100NoNo
18656000Internal Storage In Cloud Disk To Support Encrypted Hard Drive And Other Stateful FeaturesMay 2024June 2025Allow1310YesNo
18651810METHOD FOR PAIRING A CONTENT PROVIDER SYSTEM AND A RECEIVING DEVICE, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICESMay 2024February 2026Allow2210YesNo
18651671DATA COMPRESSION WITH INTRUSION DETECTIONApril 2024April 2025Allow1110YesNo
18648504SPLIT KEY ARCHITECTURE FOR FACILITATING AUTHENTICATION BETWEEN AN IMPLANTED MEDICAL DEVICE AND AN EXTERNAL DEVICEApril 2024August 2025Allow1620NoNo
18648813SYSTEMS AND METHODS FOR PROCESSING REQUESTS FOR ACCESSApril 2024December 2024Allow800YesNo
18645055EFFICIENT TOKEN PROVISIONING SYSTEM AND METHODApril 2024December 2024Allow800YesNo
18645206Monitoring The Usage Of An Application At An Edge DeviceApril 2024October 2025Allow1820NoNo
18642244AUGMENTED-REALITY EXPERIENCE CONTROL THROUGH NON-FUNGIBLE TOKENApril 2024October 2025Allow1830NoNo
18640510NETWORK DEVICE AND DATA DECRYPTION METHODApril 2024December 2025Allow2010NoNo
18638603DCF-DRIVEN ADAPTIVE SECURITY POLICIESApril 2024September 2025Allow1700YesNo
18638412BIOMETRY WITH CHALLENGE RESPONSE PAIR MECHANISMApril 2024February 2026Allow2211NoNo
18637168ATM INTEGRITY MONITOR (AIM) SYSTEM AND METHOD FOR DETECTING CYBER ATTACKS ON ATMS NETWORKSApril 2024February 2026Allow2210YesNo
18635801REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMSApril 2024September 2024Allow510YesNo
18636001REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMSApril 2024June 2025Allow1420NoNo
18632837MULTIPLE-FACTOR AUTHENTICATIONApril 2024March 2025Allow1110NoNo
18633023MEDIA DATA ENCRYPTION, AND MEDIA DATA PLAYBACKApril 2024August 2025Allow1600YesNo
18631792TECHNIQUES TO CONTROL APPLETS FOR CONTACTLESS CARDSApril 2024September 2025Allow1720NoNo
18631208SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION INTEGRATION ACROSS DISPARATE INFORMATION SYSTEMSApril 2024March 2025Allow1110NoNo
18626323SYSTEMS AND METHODS FOR IN-PROCESS URL CONDEMNATIONApril 2024March 2025Allow1100NoNo
18626215QUICK ACCESS CONTENT SEARCH IN A WORKSPACEApril 2024August 2025Allow1700YesNo
18625414DATA INTEGRITY VALIDATION VIA DEGENERATE KEYSApril 2024July 2025Allow1510NoNo
18624664SYSTEMS AND METHODS FOR AUTO-ESTABLISHING SECURE CONNECTIONS FOR INTERRUPTED DATA TRANSMISSIONSApril 2024July 2025Allow1600NoNo
18623679SECURE TRANSMISSION OF ELECTRONIC HEALTH RECORDS VIA BLOCKCHAINApril 2024December 2024Allow800YesNo
18620364PROTECTION OF DATA KEYS USED IN CRYPTOGRAPHIC PROCESSINGMarch 2024January 2026Allow2210NoNo
18620485INTERNET OF THINGS SECURITY WITH MULTI-PARTY COMPUTATION (MPC)March 2024April 2025Allow1310NoNo
18618479PRIVACY CONTROL GEOFENCINGMarch 2024December 2025Allow2010YesNo
18696264AUTHENTICATION OF LOGIC CIRCUITRY PACKAGESMarch 2024December 2025Allow2020NoNo
18617288AUTHENTICATION OF DEVICE CONFIGURATIONS FOR AUTHENTICATED DEVICESMarch 2024December 2025Allow2010NoNo
18609114PERIMETER OFFLINE SECURE EXCHANGE OF ACCESS CONTROL TOKENMarch 2024January 2025Allow1010NoNo
18609752METHOD AND SYSTEM FOR ONLINE THIRD-PARTY AUTHENTICATION OF IDENTITY ATTRIBUTESMarch 2024June 2025Allow1520NoNo
18604001DETECTION AND PREVENTION OF LOGIN ATTACKSMarch 2024February 2026Allow2310YesNo
18603700Virtual Environment Type Validation For Policy EnforcementMarch 2024July 2025Allow1610YesNo
18600767ENCRYPTED CACHE PROTECTIONMarch 2024March 2025Allow1200YesNo
18598104Image Sensor, Method and HostMarch 2024November 2025Allow2010YesNo
18598105Computer-Implemented System for Comprehensive Cybersecurity Threat Modeling and AnalysisMarch 2024July 2025Allow1700NoNo
18597093SYSTEMS, METHODS, AND MEDIA FOR GENERATING AND USING A MULTI-SIGNATURE TOKEN FOR ELECTRONIC COMMUNICATION VALIDATIONMarch 2024March 2025Allow1210YesNo
18595850SYMMETRIC ENCRYPTION FOR PRIVATE SMART CONTRACTS AMONG MULTIPLE PARTIES IN A PRIVATE PEER-TO-PEER NETWORKMarch 2024April 2025Allow1310YesNo
18596253CENTRALIZED AND DECENTRALIZED INDIVIDUALIZED MEDICINE PLATFORMMarch 2024November 2025Allow2000NoNo
18689259SECURITY IN RELATION TO A MALICIOUSLY CONTROLLED RECEIVERMarch 2024July 2025Allow1700NoNo
18595299SYSTEMS AND METHODS FOR USE IN SECURING DIGITAL IDENTITIES FOR USER AUTHENTICATIONMarch 2024November 2025Allow2010NoNo
18593243Authentication and Control of Encryption KeysMarch 2024February 2025Allow1100YesNo
18592723SECURITY SYSTEM, DEVICE, AND METHOD FOR PROTECTING CONTROL SYSTEMSMarch 2024December 2025Allow2110NoNo
18590920TECHNIQUES FOR SINGLE ROUND MULTI-PARTY COMPUTATION FOR DIGITAL SIGNATURESFebruary 2024April 2025Allow1310YesNo
18589125APPARATUSES, METHODS, AND SYSTEMS FOR INSTRUCTIONS FOR USAGE RESTRICTIONS CRYPTOGRAPHICALLY TIED WITH DATAFebruary 2024October 2024Allow800YesNo
18588059BIOMETRIC ACCESS SENSITIVITYFebruary 2024July 2025Allow1720NoNo
18588859ELECTRONIC DEVICE AND METHOD FOR PREVENTING NON-FUNGIBLE TOKEN PLAGIARISM IN ELECTRONIC DEVICEFebruary 2024September 2025Allow1900NoNo
18587250SYSTEMS AND METHODS FOR ENSURING DATA SECURITY IN THE TREATMENT OF DISEASES AND DISORDERS USING DIGITAL THERAPEUTICSFebruary 2024November 2025Allow2100YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for art-unit 2498.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
98
Examiner Affirmed
66
(67.3%)
Examiner Reversed
32
(32.7%)
Reversal Percentile
50.9%
Higher than average

What This Means

With a 32.7% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
274
Allowed After Appeal Filing
100
(36.5%)
Not Allowed After Appeal Filing
174
(63.5%)
Filing Benefit Percentile
73.8%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 36.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Art Unit 2498 - Prosecution Statistics Summary

Executive Summary

Art Unit 2498 is part of Group 2490 in Technology Center 2400. This art unit has examined 4,251 patent applications in our dataset, with an overall allowance rate of 85.1%. Applications typically reach final disposition in approximately 28 months.

Comparative Analysis

Art Unit 2498's allowance rate of 85.1% places it in the 79% percentile among all USPTO art units. This art unit has a significantly higher allowance rate than most art units at the USPTO.

Prosecution Patterns

Applications in Art Unit 2498 receive an average of 1.91 office actions before reaching final disposition (in the 51% percentile). The median prosecution time is 28 months (in the 66% percentile).

Strategic Considerations

When prosecuting applications in this art unit, consider the following:

  • The art unit's allowance rate suggests a more favorable examination environment compared to the USPTO average.
  • With more office actions than average, plan for relatively streamlined prosecution.
  • The median prosecution time is shorter than average and should be factored into your continuation and client communication strategies.
  • Review individual examiner statistics within this art unit to identify examiners with particularly favorable or challenging prosecution patterns.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.