USPTO Group 2430 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19370903SELECTING A MALWARE SCANNER FROM MULTIPLE MALWARE SCANNERSOctober 2025March 2026Allow400NoNo
19347347SYSTEM AND A METHOD FOR IDENTIFYING PRIVATE USER INFORMATIONOctober 2025February 2026Allow400YesNo
19340698INTEGRATED AGENT-DRIVEN DATA FRAMEWORKSeptember 2025March 2026Allow510YesNo
19340363FLEXIBLE SOFTWARE-DEFINED RADIO ACCESS NETWORK ARCHITECTURE WITH SLICING SUPPORT AND METHODS FOR USE THEREWITHSeptember 2025December 2025Allow300YesNo
19335440Method and System for Securing SCADA and Industrial Control Software through Secure-Write OperationsSeptember 2025March 2026Allow510YesNo
19328030RESOURCE UTILIZATION ESTIMATION AND ALLOCATION FOR MULTI-AGENT COMPUTATIONAL SYSTEMSSeptember 2025November 2025Allow200NoNo
19315759GENERATING, USING ARTIFICIAL INTELLIGENCE, TEST DATA TO TEST MALWARE SCANNER(S)September 2025January 2026Allow400YesNo
19315444System and Method for Enforcing PII Segregation in a Distributed Data Processing System for Privacy-Preserving AI Corpus GenerationAugust 2025October 2025Allow200YesNo
19306182AUTHENTICATION WITH DYNAMIC USER IDENTIFICATIONAugust 2025December 2025Allow400YesNo
19305988TYPED SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) TRIAGE PROCESSING COMPONENTS SYSTEMAugust 2025November 2025Allow200NoNo
19301754TRUSTWORTHINESS OF A VIDEO DATA STREAMAugust 2025February 2026Allow610NoNo
19301013SALTED BLOOM FILTERS FOR PEER-TO-PEER DATA DISSEMINATIONAugust 2025December 2025Allow410YesNo
19301719METHODS FOR NON-INVASIVE API DISCOVERY, MONITORING AND EXPLOITATION DETECTION IN THIRD-PARTY PROCESSESAugust 2025November 2025Allow300NoNo
19301809ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTUREAugust 2025January 2026Allow510NoNo
19301893ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTUREAugust 2025January 2026Allow510NoNo
19300607METHODS AND SYSTEMS FOR DOMAIN-SPECIFIC INTERVIEW SIMULATIONSAugust 2025November 2025Allow300NoNo
19300512Methods for Internet Communication SecurityAugust 2025January 2026Allow500YesNo
19296400SYSTEM AND METHOD FOR DELAYED LOG INGESTION UTILIZING AGENTLESS COLLECTIONAugust 2025October 2025Allow200YesNo
19296653AUTOMATED THREAT HUNTINGAugust 2025October 2025Allow300NoNo
19294714CONTEXTUAL TRUST ASSESSMENT OF ELECTRONIC MESSAGES USING LARGE LANGUAGE MODELS IN COMPUTERIZED ORGANIZATIONAL NETWORKSAugust 2025January 2026Allow610NoNo
19288526NETWORK-LEVEL, KEY-BASED PLATFORM LINKINGAugust 2025September 2025Allow200YesNo
19286965Real Time Translation System and Method Involving Burdened and Unburdened ContentJuly 2025November 2025Allow301NoNo
19283194AUTONOMOUS AGENT OBSERVATION AND CONTROLJuly 2025December 2025Allow500NoNo
19280803AI-DRIVEN COMPLIANCE MAPPING FOR REGULATORY STANDARDSJuly 2025January 2026Allow510YesNo
19278692SYSTEM FOR FEDERATED COMPLIANCE-TOKEN INHERITANCE, DIGITAL ARTIFACT REGISTRY, AND MONETIZATION IN REGULATED ENVIRONMENTS USING LARGE LANGUAGE MODELSJuly 2025October 2025Allow300YesNo
19276173SYSTEM AND METHOD FOR DECENTRALIZED PERSONA AGENT GOVERNANCE IN REGULATED ENVIRONMENTS USING LARGE LANGUAGE MODELSJuly 2025January 2026Allow500YesNo
19272328CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINSJuly 2025October 2025Allow300YesNo
19272214CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINSJuly 2025September 2025Allow200YesNo
19271586METHOD FOR EXTENDING A PROOF OF SPACE BLOCKCHAINJuly 2025January 2026Allow610NoNo
19270384ITERATIVELY TRAINED MACHINE LEARNING MODELS FOR CONFIGURATIONS OF APPLICATION PROTECTIONJuly 2025January 2026Allow610NoNo
19269404Deriving Input Restrictions for Artificial Intelligence AgentsJuly 2025October 2025Allow300YesNo
19269354Deriving Input Restrictions for Artificial Intelligence AgentsJuly 2025October 2025Allow310YesNo
19269462Deriving Input Restrictions for Artificial Intelligence AgentsJuly 2025March 2026Allow800YesNo
19269215Management of Connector Services and Connected Artificial Intelligence Agents for Message SendersJuly 2025September 2025Allow200YesNo
19270337Adversarial Attack Detection Based on SimilarityJuly 2025February 2026Allow720NoNo
19268594Privacy-Preserving Fuzzy Query System and MethodJuly 2025September 2025Allow200NoNo
19268956OPERATION METHOD OF ELECTRONIC APPARATUS FOR PERFORMING LARGE LANGUAGE MODEL BASED ANALYSIS INFERENCE FOR MALICIOUS SCRIPT ACTIONJuly 2025August 2025Allow100YesNo
19268166COLLUSION-RESISTANT IDENTITY-BASED AND QUANTUM-RESILIENT SECURE CORRELATION SCHEMESJuly 2025December 2025Allow500NoNo
19268121ELECTRONIC APPARATUS FOR PERFORMING LOG LIGHTWEIGHTING USING EXTENDED BLOOM FILTER, AND OPERATION METHOD THEREOFJuly 2025December 2025Allow510YesNo
19267471Insecure Model Context Protocol Server Remediation for Artificial Intelligence AgentsJuly 2025October 2025Allow300NoNo
19267475Streamlined Policy Administration of Model Context Protocol Servers for Artificial Intelligence AgentsJuly 2025December 2025Allow510NoNo
19264635SYSTEMS AND METHODS FOR DETECTING MALICIOUS WEBASSEMBLY MODULES UNDER SOURCE CODE OBFUSCATIONJuly 2025November 2025Allow410NoNo
19264594SYSTEMS AND METHODS FOR AUTOMATIC VULNERABILITY ASSESSMENT OF MACHINE LEARNING MODELSJuly 2025December 2025Allow510NoNo
19264639SYSTEMS AND METHODS FOR MEDICAL IMAGING GATEWAYSJuly 2025November 2025Allow510NoNo
19263395Provenance for AI Twin of an ArtistJuly 2025January 2026Allow710NoNo
19261964REFLEX-REACTION SERVER LEAKAGE CONTAINMENT SYSTEMJuly 2025September 2025Allow200YesNo
19261636SYSTEMS AND METHODS FOR REAL-TIME DETECTION AND MITIGATION OF MALICIOUS ELECTRONIC COMMUNICATIONSJuly 2025September 2025Allow200NoNo
19259636ADAPTIVE SELECTION OF SECURITY SCANNING IN SOFTWARE DEPLOYMENTSJuly 2025January 2026Allow610YesNo
19254267SYSTEMS AND METHODS FOR DYNAMIC DE-IDENTIFICATION AND ANONYMITY FOR USER INPUT TO ARTIFICIAL INTELLIGENCE (AI)-BASED MODELSJune 2025August 2025Allow100NoNo
19255270METHOD AND SYSTEM FOR CONSTRUCTING VECTOR DATABASES USED FOR CONVERTING FREE TEXT QUERIES TO CYBER LANGUAGE QUERIESJune 2025August 2025Allow200YesNo
19254093METHODS AND SYSTEMS FOR FACILITATING AUTHENTICATING OF USERSJune 2025March 2026Allow920NoNo
19247384AUTHENTICATION WITH DYNAMIC USER IDENTIFICATIONJune 2025August 2025Allow200YesNo
19245204METHODS AND SYSTEMS FOR MAINTAINING FIDELITY OF A BOND BETWEEN A PERSON AND AN ARTIFICIAL INTELLIGENCE AGENTJune 2025September 2025Allow310NoNo
19242263ATTACK DETECTION AND SOURCE TRACING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUMJune 2025December 2025Allow610NoNo
19241508SECURE AND TRUSTED USE METHOD AND SYSTEM FOR LARGE MODEL BASED ON CONFIDENTIAL COMPUTINGJune 2025March 2026Allow900YesNo
19236071AUTOMATED LEAST PRIVILEGE USING RISK AND USAGEJune 2025February 2026Allow810YesNo
19234232Automated Tool Discovery and Ingestion for Artificial Intelligence AgentsJune 2025August 2025Allow200YesNo
19233602TECHNIQUES FOR SECURING SOFTWARE COMPONENTS THROUGH SECURITY PACKAGES DEFINED IN SOFTWARE IMAGE RECIPESJune 2025November 2025Allow610YesNo
19232164TOKENIZATION WITH FORMAT PRESERVATIONJune 2025November 2025Allow510NoNo
19231175BLOCKCHAIN-BASED ARTIFICIAL INTELLIGENCE AGENT LIFE CYCLE MANAGEMENT AND AUTHENTICATION SYSTEMS AND METHODSJune 2025October 2025Allow410YesNo
19229801METHOD FOR EVALUATING SECURITY OF IN-VEHICLE NETWORKJune 2025October 2025Allow410NoNo
19227656SYSTEMS AND METHODS FOR MALWARE DETECTION IN PORTABLE EXECUTABLE FILESJune 2025October 2025Allow410NoNo
19228045STATEFUL API ATTACKS DETECTIONJune 2025December 2025Allow610YesNo
19227264IDENTITY PROVIDER (IDP) AGNOSTIC AUTHENTICATION ENFORCEMENTJune 2025October 2025Allow510NoNo
19224661GENOMIC CRYPTOGRAPHYMay 2025February 2026Abandon910NoNo
19224345MITIGATING DDOS ATTACKS ON INTERNET PROTOCOL NETWORKSMay 2025August 2025Allow300YesNo
19224202SMART JUST-IN-TIME PRIVILEGE MANAGEMENTMay 2025November 2025Allow610NoNo
19223465SIGNED BI-DIRECTIONAL ANOMALY NEIGHBORHOOD ALGORITHMMay 2025November 2025Allow610YesNo
19223292MULTITIERED INTERFACING ARCHITECTUREMay 2025August 2025Allow210NoNo
19224127TECHNIQUES FOR CROSS ENTITY CORRELATION OF USER ACCOUNTS IN CLOUD COMPUTING ENVIRONMENTSMay 2025October 2025Allow500YesNo
19222997BEHAVIORAL AUTHORSHIP VERIFICATION SYSTEM AND METHODMay 2025August 2025Allow200YesNo
18847213METHOD FOR DETECTING DATA STEALTHY ATTACK ON NETWORKED SYSTEM WITH DIFFERENTIAL PRIVACY PROTECTIONMay 2025July 2025Allow1000YesNo
19217385TECHNIQUES FOR ACTIVE INSPECTION DETECTION OF EFFECTIVE NETWORK EXPOSURE THROUGH A CLOUD-NATIVE PROXY APPLIANCEMay 2025July 2025Allow200YesNo
19217405SYSTEM AND METHOD FOR APPLYING CYBERSECURITY CONTROLS ON CLOUD NATIVE ROUTING SERVICESMay 2025July 2025Allow200YesNo
19217379TECHNIQUES FOR DETECTION OF CYBERSECURITY ISSUES ON THIRD PARTY SOFTWARE APPLIANCES UTILIZING CUSTOM CONFIGURATION LOGSMay 2025October 2025Allow510NoNo
19216285TECHNIQUES FOR CODE INTENT DISCOVERYMay 2025November 2025Allow610NoNo
19216072MULTI-PERIMETER FIREWALL IN THE CLOUDMay 2025August 2025Allow310NoNo
19214704SECURITY PLATFORMS WITH INTEGRATED POLICY ENFORCEMENTMay 2025December 2025Allow710NoNo
19214799COMPUTERIZED SECURITY PLATFORMS INCLUDING A ROLE-BASED PERMISSIONS SYSTEMMay 2025November 2025Allow610NoNo
19214617MULTIMODAL FINGERPRINTING OF DIGITAL ASSETSMay 2025November 2025Allow510YesNo
19211129Anticipatory Authentication for Account-specific Artificial Intelligence AgentsMay 2025November 2025Allow610NoNo
19209249SYSTEM AND METHOD FOR SEARCHING FOR AND IDENTIFYING UNAUTHORIZED WEBSITESMay 2025October 2025Allow610NoNo
19208115SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORKMay 2025June 2025Allow100YesNo
19208461QUANTUM SECURE COMMUNICATION PROTOCOL AND DEVICE BASED ON DOUBLE-HELIX STRUCTURE COMPOSITE MULTI-LAYER ENCODINGMay 2025September 2025Allow410NoNo
19206573LIVENESS IN CONSENSUS PROTOCOLMay 2025October 2025Allow510YesNo
19204523Data Processing Orchestrator Utilizing Semantic Type Inference and Privacy PreservationMay 2025August 2025Allow400NoNo
19203661SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY ASSIGNING A UNIQUE IDENTIFIER TO A DETECTED DEVICEMay 2025August 2025Allow300NoNo
19201966SYSTEM AND METHOD FOR REPOSITORY MANAGEMENTMay 2025September 2025Allow410NoNo
19203103GENERATING PARAMETERS FOR MALICIOUS ACTIVITY DETECTION USING DECISION TREESMay 2025June 2025Allow200NoNo
19200398DYNAMIC, CONTROL-SENSITIVE DATA MANAGEMENT PLATFORMMay 2025June 2025Allow200YesNo
19196987System, Method, and Apparatus for Initiating Outbound Communications From a User DeviceMay 2025December 2025Allow810YesNo
19197952DIGITAL SIGNATUREMay 2025August 2025Allow400NoNo
19197933DIGITAL SIGNATUREMay 2025October 2025Allow510NoNo
19195323CONNECTIONLESS-VIRTUAL PRIVATE NETWORK FOR SECURE CLOUD TO USER COMMUNICATION OVER THE INTERNET USING A PLURALITY OF SERVERSApril 2025November 2025Allow710YesNo
19193127CYBERSECURITY ROOT CAUSE ANALYSIS USING COMPUTING RESOURCE NAME CORRELATIONApril 2025September 2025Allow410NoNo
19192958SYSTEMS AND METHODS FOR FACILITATING QUANTUM-RESISTANT ENCRYPTION OF DATAApril 2025September 2025Allow501NoNo
19193315SYSTEMS, METHODS, AND STORAGE MEDIA FOR API DETECTION AND MANAGEMENT IN A SOURCE-CODE REPOSITORY USING A COMPUTING PLATFORMApril 2025August 2025Allow300YesNo
19191033REMEDIATING VULNERABILITIES USING SOFTWARE UPDATE MANAGEMENT PLATFORM WITH INTEGRATED THREAT INTELLIGENCEApril 2025September 2025Allow420NoNo
19190115CENTRALIZED TECHNOLOGY ACCESS CONTROLApril 2025September 2025Allow500YesNo
19189337METHODS, SYSTEMS, APPARATUSES, AND DEVICES FOR FACILITATING ACCURATE USER AUTHENTICATIONApril 2025September 2025Allow510NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for group 2430.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
2181
Examiner Affirmed
1536
(70.4%)
Examiner Reversed
645
(29.6%)
Reversal Percentile
27.3%
Lower than average

What This Means

With a 29.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
6886
Allowed After Appeal Filing
2193
(31.8%)
Not Allowed After Appeal Filing
4693
(68.2%)
Filing Benefit Percentile
43.2%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 31.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Group 2430 - Prosecution Statistics Summary

Executive Summary

Group 2430 is part of Technology Center 2400. This group has examined 77,957 patent applications in our dataset, with an overall allowance rate of 80.3%. Applications typically reach final disposition in approximately 32 months.

Prosecution Patterns

Applications in Group 2430 receive an average of 2.05 office actions before reaching final disposition. The median prosecution time is 32 months.

Strategic Overview

This group-level data aggregates statistics across multiple art units. For more targeted prosecution strategies, review the individual art unit and examiner statistics within this group.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.