USPTO Group 2430 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19118772TRAINING A SUPERVISED MACHINE LEARNING MODEL FOR ANOMALY DETECTIONApril 2025June 2025Allow200YesNo
19082761NEURAL NETWORK-BASED SECURITY DEFENSE METHOD FOR ENCRYPTED MULTIMEDIA DATA, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCTMarch 2025May 2025Allow200YesNo
19080748SECURE BEACON IDENTITYMarch 2025June 2025Allow310YesNo
19067972Secure and Scalable Model Splicing of Digital Engineering Models for Software-Code-Defined Digital ThreadsMarch 2025April 2025Allow100YesNo
19048457EVALUATING SECURITY POLICIES IN AGGREGATEFebruary 2025March 2025Allow200YesNo
19045368Detection of Privacy Attacks on Machine Learning ModelsFebruary 2025May 2025Allow300YesNo
19044591SECURE MULTI-AGENT SYSTEM FOR PRIVACY-PRESERVING DISTRIBUTED COMPUTATIONFebruary 2025April 2025Allow200YesNo
19042955MEDICAL DEVICE AND HEALTH INFORMATION TRACKING SYSTEMS AND METHODSJanuary 2025May 2025Allow300YesNo
19035283NETWORK DATA DECODING AND ENCODINGJanuary 2025April 2025Allow300YesNo
19031211WAPI TRUSTED WIRELESS LOCAL AREA NETWORK DEVICEJanuary 2025March 2025Allow200NoNo
19029580METHOD FOR EMULATING AN ATTACK ON AN ASSET WITHIN A TARGET NETWORKJanuary 2025May 2025Allow410NoNo
19028234PRIVACY-PRESERVING TRANSFORMER MODEL WITH ENCRYPTED DIMENSIONALITY REDUCTIONJanuary 2025May 2025Allow300YesNo
19025713INFORMATION OUTPUT DEVICE, INFORMATION OUTPUT METHOD, AND RECORDING MEDIUMJanuary 2025April 2025Allow300YesNo
18880251SYSTEM AND METHOD FOR REAL-TIME APPLICATIONS OVER WIRELESS NETWORKSDecember 2024March 2025Allow300YesNo
19003927USER CALIBRATION OF A MACHINE LEARNING MODEL TO RECOGNIZE NEURAL ACTIVITIES, AND APPLICATIONS THEREOFDecember 2024May 2025Allow510YesNo
19003945AUTHENTICATION USING A BIOMETRIC TEMPLATE RELATED TO NEURAL ACTIVITY, AND APPLICATIONS THEREOFDecember 2024June 2025Allow510NoNo
19000677SYSTEMS AND METHODS FOR EXECUTING AN ANALYTICAL OPERATION ACROSS A PLURALITY OF COMPUTER PROCESSESDecember 2024March 2025Allow200YesNo
18878264Communication System, Adapter for a Terminal and Method for Securely Transmitting Time-Critical Data within the Communication SystemDecember 2024March 2025Allow300NoNo
18988185COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON RISK SCORE ANALYSIS AND METHODS OF USE THEREOFDecember 2024March 2025Allow310NoNo
18981911PERSONALLY IDENTIFIABLE INFORMATION SCRUBBER WITH LANGUAGE MODELSDecember 2024April 2025Allow400NoNo
18982812REAL-TIME ANOMALY DETECTION AND MITIGATION FOR STREAMING FUNCTIONAL DATADecember 2024March 2025Allow300YesNo
18981637SYSTEM AND METHOD FOR DISTRIBUTED EDGE-CLOUD HOMOMORPHIC COMPRESSION USING ADAPTIVE NEURAL NETWORKSDecember 2024March 2025Allow200YesNo
18978819SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEYDecember 2024March 2025Allow300YesNo
18978826BROADCAST SYNCHRONIZATION WITH FAN ENGAGEMENT PLATFORMDecember 2024January 2025Allow100YesNo
18975491ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCEDecember 2024February 2025Allow200YesNo
18969536Cyber Detection Analytics EngineDecember 2024March 2025Allow300YesNo
18962126SYSTEMS AND METHODS OF DIGITAL RIGHTS MANAGEMENTNovember 2024June 2025Allow710YesNo
18955799Talking Head Digital Identity Authentication On A Distributed NetworkNovember 2024March 2025Allow300YesNo
18954015SYSTEM AND METHOD FOR TRACING CLOUD COMPUTING ENVIRONMENT DEPLOYMENTS TO CODE OBJECTSNovember 2024January 2025Allow200NoNo
18951209SYSTEM AND METHOD FOR APPLYING MULTI-SOURCE CYBERSECURITY POLICY ON COMPUTING ENVIRONMENTSNovember 2024January 2025Allow200YesNo
18951202SECURE COMMUNICATIONS IN INTERACTIVE COMPUTING ENVIRONMENTNovember 2024January 2025Allow200NoNo
18949882Hidden Compartments in Data Encrypted Using Machine LearningNovember 2024January 2025Allow210NoNo
18948343Agent Functionality Extensions Using SurveyorsNovember 2024March 2025Allow410YesNo
18947102DYNAMIC MULTI-MODEL MONITORING AND VALIDATION FOR ARTIFICIAL INTELLIGENCE MODELSNovember 2024January 2025Allow200YesNo
18946848AUTHENTICATION SERVER FOR PROVIDING SERVICE RELATED TO AUTHENTICATION OF COMPANION ANIMAL AND OPERATION METHOD THEREOFNovember 2024June 2025Allow710NoNo
18946352ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENTNovember 2024March 2025Allow400NoNo
18946325SYSTEMS AND METHODS FOR SECURE USER AUTHENTICATION WITH PASSKEYS ON SHARED COMPUTING DEVICESNovember 2024April 2025Allow610NoNo
18945370Detection of Machine Learning Model Attacks Obfuscated in UnicodeNovember 2024March 2025Allow410NoNo
18940845SAFETY MANAGEMENT AND CONTROL SYSTEM FOR FULL LIFECYCLE OF INDUSTRIAL CONTROL DATANovember 2024February 2025Allow310NoNo
18940914SYSTEM AND METHOD TO ANALYZE SECURITY ACROSS DIGITAL ENVIRONMENTSNovember 2024January 2025Allow200NoNo
18940371MULTI-PERIMETER FIREWALL IN THE CLOUDNovember 2024March 2025Allow510NoNo
18938365SYSTEMS AND METHODS FOR DETECTING NON-PROVISIONED USAGE OF APPLICATIONS IN AN ORGANIZATIONNovember 2024March 2025Allow400NoNo
18927703Cryptography Bill of Materials (CBOM) Generation from Binary ExecutablesOctober 2024January 2025Allow200NoNo
18922798Directory Service Recommender Assessment & ScoringOctober 2024January 2025Allow200YesNo
18923655DETECTION AND MITIGATION OF MACHINE LEARNING MODEL ADVERSARIAL ATTACKSOctober 2024January 2025Allow300NoNo
18923219ACCESS CONTROL MANAGEMENTOctober 2024March 2025Allow510YesNo
18913331SYSTEM AND METHOD FOR SOFTWARE SERVICE CYBERSECURITY REMEDIATIONOctober 2024January 2025Allow400YesNo
18907977METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOFOctober 2024December 2024Allow210YesNo
18906462Cybersecurity Protection and Recovery Capability Measurement SystemOctober 2024April 2025Allow710YesNo
18903573RISK SCORING OF CLOUD PERMISSION ASSIGNMENTS USING SUPERVISED MACHINE LEARNINGOctober 2024January 2025Allow300NoNo
18902566SYSTEM FOR SURVEYING SECURITY ENVIRONMENTSSeptember 2024December 2024Allow200YesNo
18900430GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATIONSeptember 2024March 2025Allow600NoNo
18899772TOKEN MANAGEMENT IN A DIGITAL ENGINEERING PLATFORMSeptember 2024April 2025Allow610YesNo
18900142METHOD FOR TRANSMITTING MESSAGE APPLIED TO PRESET SERVER AND TERMINAL, AND ELECTRONIC DEVICESeptember 2024July 2025Allow911YesNo
18893774Artificially Intelligent Systems and Methods for Managing Data SecuritySeptember 2024April 2025Allow610YesNo
18849353A SECURE AUTHENTICATION TOKENSeptember 2024May 2025Allow810YesNo
18892232Machine Learning Model Parameter Based EncryptionSeptember 2024April 2025Allow720YesNo
18892113Hidden Compartments in Data Encrypted Using Machine LearningSeptember 2024November 2024Allow200YesNo
18888941TECHNIQUE AND METHOD FOR DETECTION AND DISPLAY OF THE CYBERSECURITY RISK CONTEXT OF A CLOUD ENVIRONMENTSeptember 2024February 2025Allow510NoNo
18888967TECHNIQUES FOR DETECTING ARTIFICIAL INTELLIGENCE MODEL CYBERSECURITY RISK IN A COMPUTING ENVIRONMENTSeptember 2024February 2025Allow510NoNo
18889216RADIO EXPOSURE FUNCTION FOR TELECOMMUNICATIONS NETWORKSSeptember 2024May 2025Allow820YesNo
18887627REMOTE COMPUTER NETWORK SECURITY TESTINGSeptember 2024February 2025Allow500YesNo
18887722ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPESeptember 2024March 2025Allow610YesNo
18847840DEVICES, SYSTEMS, AND METHODS FOR SUMMARIZING ANALYTIC OBSERVATIONSSeptember 2024February 2025Allow500YesNo
18885799System and Method for Efficient Malicious Code Detection and Malicious Open-Source Software Package Detection Using Large Language ModelsSeptember 2024January 2025Allow401YesNo
18847420SECURE DATA EXCHANGE MATCHING ACROSS IDENTITY PROVIDERSSeptember 2024February 2025Allow500NoNo
18885585DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT SELECTIONSSeptember 2024December 2024Allow300NoNo
18885584DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT PROVIDERSSeptember 2024February 2025Allow510NoNo
18882398METHODS AND SYSTEMS FOR VERIFYING A WORKER AGENTSeptember 2024November 2024Allow300NoNo
18882699Host Deduplication for Vulnerability Detection and Management in IT SystemsSeptember 2024November 2024Allow300YesNo
18830499INTELLIGENT PHOTO ALBUM SORTING AND PRIVACY PROTECTION METHODSeptember 2024March 2025Allow610NoNo
18827265POLICY SELECTION SYSTEMSeptember 2024April 2025Allow710YesNo
18825028IDENTITY AUTHENTICATION SYSTEM FOR DISTRIBUTED INTERNET OF VEHICLESSeptember 2024November 2024Allow200NoNo
18823435MULTI-FACTOR AUTHENTICATION WORKFLOW MANAGEMENT WITH DISTRIBUTED ACCESSSeptember 2024November 2024Allow300YesNo
18823035SECURITY IN A FLEXIBLE SOFTWARE-DEFINED RADIO ACCESS NETWORK ARCHITECTURE AND METHODS FOR USE THEREWITHSeptember 2024March 2025Allow700YesNo
18823485Management System for Networked EndpointsSeptember 2024November 2024Allow200YesNo
18820411WEIGHTED TIMES SERIES FREQUENCY - INVERSE DOCUMENT FREQUENCY SCORING FOR CYBERSECURITY ALERTSAugust 2024December 2024Allow410NoNo
18820043SYSTEMS, METHODS, AND GRAPHICAL USER INTERFACES FOR CONFIGURING AND EXECUTING ONE OR MORE COMPUTER-EXECUTABLE THREAT HUNTING PROTOCOLS IN A CYBERSECURITY THREAT DETECTION AND MITIGATION PLATFORMAugust 2024March 2025Allow610YesNo
18819405WEB SERVICE-BASED MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE OF CALLING SERVICEAugust 2024December 2024Allow410NoNo
18819535DATA PROCESSING METHOD, DEVICE, AND STORAGE MEDIUMAugust 2024December 2024Allow400NoNo
18817890ACTIVE DATA DISPOSALAugust 2024February 2025Allow610NoNo
18818320SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORKAugust 2024March 2025Allow710YesNo
18818560DYNAMIC, CONTROL-SENSITIVE DATA MANAGEMENT PLATFORMAugust 2024March 2025Allow710YesNo
18812238ACCESS LIMITING METHOD, APPARATUS AND DEVICE FOR METADATA SERVERAugust 2024May 2025Allow920NoNo
18812503COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT AND METHODS OF USE THEREOFAugust 2024December 2024Allow300NoNo
18840363A CRYPTOGRAPHIC PROCESSING SYSTEM AND METHOD FOR IMPLEMENTING CRYSTALS-KYBER CRYPTOGRAPHIC ALGORITHMS AND CRYSTALS-DILITHIUM CRYPTOGRAPHIC ALGORITHMS USING TABLE-BASED ARITHMETIC-TO-BOOLEAN (A2B) MASKED SHARE CONVERSIONAugust 2024March 2025Allow700NoNo
18811739SYSTEMS AND METHODS FOR PREVENTING CYBERSECURITY ATTACKS THROUGH DIGITAL IDENTITY VERIFICATIONAugust 2024February 2025Allow610NoNo
18811662Systems and Methods for Assessing Security in a Computing Device EnvironmentAugust 2024June 2025Abandon1010NoNo
18809806SYSTEM AND METHOD FOR SEARCHING FOR AND IDENTIFYING UNAUTHORIZED WEBSITESAugust 2024March 2025Allow610YesNo
18809750METHOD AND SYSTEM FOR A SECURE MULTILEVEL NESTED BLOCKCHAIN DATA STORAGEAugust 2024December 2024Allow410YesNo
18808231DYNAMIC DEFENSE SYSTEM AND METHOD OF NEW ENERGY CENTRALIZED CONTROL STATION NETWORK BASED ON DYNAMIC IPAugust 2024March 2025Allow610NoNo
18807245METHOD FOR IMPROVED BIOMETRIC AUTHENTICATIONAugust 2024March 2025Allow710NoNo
18807438System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js ApplicationsAugust 2024November 2024Allow310NoNo
18805871DOMAIN NAME ENCRYPTION METHOD, DECRYPTION METHOD, AND APPARATUS BASED ON CONTENT DELIVERY NETWORKAugust 2024October 2024Allow200YesNo
18805460WATERMARK EMBEDDING METHOD BASED ON SERVICE INVOCATION DATAAugust 2024January 2025Allow510NoNo
18800166MICROGRID SELF-TRIGGERING CONTROL METHOD AND SYSTEM FOR RESISTING FDI ATTACKSAugust 2024November 2024Allow300YesNo
18798872AUTOMATED SECURE ACCESS TO ONLINE ACCOUNTSAugust 2024January 2025Allow520NoNo
18798404METHOD FOR DATA ACQUISITION, DEVICE AND STORAGE MEDIUMAugust 2024February 2025Allow610NoNo
18798510METHOD AND APPARATUS FOR USING A PICTURE AND SHARED SECRET TO CREATE REPLICABLE HIGH QUALITY POOLS OF ENTROPY FOR KEYS FOR ENCRYPTION, AUTHENTICATION AND ONE TIME PADS FOR IMAGES, DATA AND MESSAGE ENCODINGAugust 2024October 2024Allow200YesNo
18796334ABNORMAL BEHAVIOR DETECTION METHOD, ELECTRONIC DEVICE AND NON-TRANSIENT COMPUTER-READABLE STORAGE MEDIUMAugust 2024April 2025Allow820YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for group 2430.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
1974
Examiner Affirmed
1380
(69.9%)
Examiner Reversed
594
(30.1%)
Reversal Percentile
28.6%
Lower than average

What This Means

With a 30.1% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
6183
Allowed After Appeal Filing
1993
(32.2%)
Not Allowed After Appeal Filing
4190
(67.8%)
Filing Benefit Percentile
40.5%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 32.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Group 2430 - Prosecution Statistics Summary

Executive Summary

Group 2430 is part of Technology Center 2400. This group has examined 79,569 patent applications in our dataset, with an overall allowance rate of 82.1%. Applications typically reach final disposition in approximately 30 months.

Prosecution Patterns

Applications in Group 2430 receive an average of 1.93 office actions before reaching final disposition. The median prosecution time is 30 months.

Strategic Overview

This group-level data aggregates statistics across multiple art units. For more targeted prosecution strategies, review the individual art unit and examiner statistics within this group.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.