USPTO Group 2490 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19377532STITCHING PARTIAL CALL GRAPHS TO CREATE A COMPLETE CALL GRAPH TO DETERMINE WHEN TO UPGRADE TO A NEWER VERSIONNovember 2025March 2026Allow400YesNo
19368783METHODS AND SYSTEMS FOR MAINTAINING BEHAVIORAL INTEGRITY OF AUTONOMOUS ARTIFICIAL INTELLIGENCE AGENTSOctober 2025January 2026Allow300YesNo
19348050METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION USING DIFFERENT POLICY CLASSESOctober 2025January 2026Allow300YesNo
19336798SYSTEMS AND METHODS FOR DATA ENCRYPTION AND DECRYPTION BASED ON RANDOMIZED MATRIX AND ORDERED TRANSFORMATIONSSeptember 2025December 2025Allow300YesNo
19331890SYSTEMS AND METHODS FOR SECURE VOTING WITH ZERO-KNOWLEDGE PROOFS AND TOKENSSeptember 2025December 2025Allow300YesNo
19322866METHODS AND SYSTEM FOR SECURE TRANSMISSION AND STORAGE OF SIGNATURE DATASeptember 2025December 2025Allow310NoNo
19319685INFORMATION PROCESSING SYSTEM, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING PROGRAM STORED THEREIN, AND AUTHENTICATION METHODSeptember 2025December 2025Allow300YesNo
19307235RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTUREAugust 2025March 2026Allow710NoNo
19304982SYSTEMS AND METHODS FOR REAL-TIME GENERATION AND EXECUTION OF COMPUTER-EXECUTABLE INVESTIGATIVE QUERIES IN A CYBERSECURITY EVENT DETECTION AND RESPONSE PLATFORMAugust 2025February 2026Allow500NoNo
19303307SYSTEM FOR BI-DIRECTIONAL MESSAGE SCORING USING FEATURE EXTRACTION, CONTEXTUAL REFINEMENT, AND SYNTHESISAugust 2025October 2025Allow200NoNo
19301768SYSTEMS AND METHODS FOR DATA ENCRYPTION AND DECRYPTION BASED ON UNIQUE ENCRYPTION VALUE SETSAugust 2025January 2026Allow500YesNo
19287749CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING OFFLINE STORAGEJuly 2025October 2025Allow200NoNo
19287737CONTROLLING ACCESS TO CRYPTOGRAPHIC RESOURCES USING DOUBLE ENCRYPTIONJuly 2025October 2025Allow200NoNo
19287102SYSTEM AND METHOD FOR UTILIZING AN AI BROWSER AGENT IN IDENTITY DISCOVERY AND MANAGEMENTJuly 2025November 2025Allow400NoNo
19286976SYSTEMS AND METHODS FOR HIERARCHICAL MULTITENANCY DATA ACCESSJuly 2025October 2025Allow300NoNo
19270726SYSTEM AND METHOD FOR DYNAMIC MULTI-PARTY VERIFICATION OF GENERATIVE ARITIFICIAL INTELLIGENCE SYSTEMSJuly 2025December 2025Allow510NoNo
19270295Distributed Adversarial Attack DetectionJuly 2025November 2025Allow410NoNo
19270079AUTOMATED BACK-PROPAGATION OF A FIX USING A REPRODUCIBLE BUILD, TEST, AND VALIDATION PROCESS TO CREATE A PATCHED ARTIFACTJuly 2025December 2025Allow500YesNo
19265257SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONSJuly 2025September 2025Allow200YesNo
19261765DECRYPTING MESSAGES ADDRESSED TO A GROUP OF USERS USING WEB BROWSER STORAGEJuly 2025January 2026Allow710NoNo
19261587SECURING GROUP MESSAGES OVER HYPERTEXT TRANSFER PROTOCOL WITH KEY MANAGEMENT AND ROTATION FOR MULTI-PARTY GROUPSJuly 2025October 2025Allow310NoNo
19258509TECHNIQUES FOR CYBERSECURITY INCIDENT INVESTIGATION UTILIZING TIMELINE GENERATION BASED ON ENTITY QUERIESJuly 2025October 2025Allow400YesNo
19256384Stateless Account Authentication Provable by Cryptographic Biometric KeyJuly 2025August 2025Allow200NoNo
19254764SYSTEM AND METHODS FOR UNFORGEABLE TELEMETRY IN THE PRESENCE OF CYBERATTACKS ON A COMPUTER PLATFORMJune 2025September 2025Allow200NoNo
19255903PRIVACY-PRESERVING AUTHENTICATED KEY ROTATIONJune 2025August 2025Allow200YesNo
19252415METHOD FOR IRREFUTABLY IDENTIFYING PHYSICAL ITEMSJune 2025January 2026Allow710YesNo
19250003NETWORK ACTIVITY DEVIATION DETECTION AND REMEDIATIONJune 2025August 2025Allow100YesNo
19249918INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODESJune 2025August 2025Allow200YesNo
19242417Detection of Image Injection Attacks in Mobile Document Capture Systems Using Accelerometer-Based Vibration AnalysisJune 2025December 2025Allow510NoNo
19238157ANALYSIS AND RIGHTS MANAGEMENT OF DISASSOCIATED SPLINTERED DATAJune 2025September 2025Allow300YesNo
19236472SYSTEMS AND METHODS FOR COUNTER-RECONNAISSANCE IN CLOUD INFRASTRUCTURE TO DISRUPT ADVERSARIAL TARGETINGJune 2025August 2025Allow200YesNo
19235482TRANSCEIVER DECODING METHOD AND SYSTEM BASED ON PROTOGRAPH DIFFERENTIAL CHAOS SHIFT KEYINGJune 2025August 2025Allow200NoNo
19232533METHOD AND ELECTRONIC DEVICE FOR MANAGING SENSITIVE DATA BASED ON SEMANTIC CATEGORIZATIONJune 2025August 2025Allow200NoNo
19136423CONSORTIUM BLOCKCHAIN ADMISSION MANAGEMENT METHOD AND APPARATUSJune 2025March 2026Allow900YesNo
18851672INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, SERVER, BLOCK CHAIN NODE, AND PROGRAMJune 2025March 2026Allow1800YesNo
19226046SYSTEM AND METHOD FOR SOFTWARE INTEGRATION INTO ENTERPRISE STANDARD CONTROL SYSTEMS USING STANDARDIZED APIsJune 2025October 2025Allow510NoNo
19222615SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONMay 2025July 2025Allow200YesNo
19221409INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING INFORMATION PROCESSING PROGRAM STORED THEREINMay 2025November 2025Allow610YesNo
19221400INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, ONE OR MORE NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA HAVING INFORMATION PROCESSING PROGRAM STORED THEREINMay 2025November 2025Allow610YesNo
19220825SYSTEMS AND METHODS FOR DIGITALLY CONNECTING PATIENTS TO DE-IDENTIFIED RESEARCH SPECIMENS AND DATA USING COMPOSABLE PROTOCOLS AND TOKENIZED IDENTIFIERSMay 2025October 2025Allow510NoNo
19220025Payment management system using asymmetric cryptography to ensure information accuracyMay 2025September 2025Allow400YesNo
19217401TECHNIQUES FOR EFFECTIVE NETWORK EXPOSURE DETECTION OF PRIVATE ENDPOINTS THROUGH A CLOUD-NATIVE ROUTERMay 2025July 2025Allow200YesNo
19217383TECHNIQUES FOR DETECTING EFFECTIVE NETWORK EXPOSURE OF A CLOUD-NATIVE PROXY APPLIANCE UTILIZING AGENTLESS INSPECTIONMay 2025July 2025Allow200YesNo
19214041CYBERTHREAT HUNTING AND PROTECTION BASED ON CODIFIED INDICATORS OF BEHAVIORMay 2025October 2025Allow510YesNo
19211464IMPLEMENTING A PRIVACY INFRASTRUCTURE FOR THE INTERNET OF THINGSMay 2025October 2025Allow510YesNo
19205793COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON DEVICE CRITICALITY SCORE AND METHODS OF USE THEREOFMay 2025March 2026Allow1020YesNo
19204280CRYPTOGRAPHIC METHOD FOR VERIFYING DATAMay 2025March 2026Allow1020YesNo
19197948DIGITAL SIGNATUREMay 2025December 2025Allow710NoNo
19196527INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODESMay 2025June 2025Allow200YesNo
19196463USING A TREE STRUCTURE TO SEGMENT AND DISTRIBUTE RECORDS ACROSS ONE OR MORE DECENTRALIZED, ACYCLIC GRAPHS OF CRYPTOGRAPHIC HASH POINTERSMay 2025September 2025Allow510NoNo
19191857CREATING AND USING CALL GRAPHS TO SELECT AN UPDATEApril 2025July 2025Allow200YesNo
19191907USING CALL GRAPHS TO IDENTIFY AN UPDATE WHEN UPGRADING TO A NEWER VERSIONApril 2025June 2025Allow100YesNo
19191252Secure Media DeliveryApril 2025September 2025Allow510NoNo
19191981SYSTEMS AND METHODS FOR LINKING AN AUTHENTICATION ACCOUNT TO A DEVICEApril 2025February 2026Allow910NoNo
19191580MAINTENANCE AND ADJUSTMENT OF ENCRYPTED TRAFFIC BY EXTRACTING ANCHORS OF TRUSTApril 2025June 2025Allow200YesNo
19188116PROMPT REFINEMENT TO IMPROVE ACCURACY OF OUTPUTS FROM MACHINE LEARNING MODELSApril 2025September 2025Allow410NoNo
19187708ONE-TIME KEY DERIVATIONApril 2025October 2025Allow610YesNo
19185322METHOD FOR CONSTRUCTING A VEHICLE NETWORKING INTRUSION DETECTION MODEL BASED ON FEDERATED LEARNINGApril 2025June 2025Allow200YesNo
19122410CHAINING MESSAGE AUTHENTICATION CODESApril 2025January 2026Allow900YesNo
19182219TECHNIQUES FOR ASSESSING EXPLOITATIONS IN A RUNTIME ENVIRONMENTApril 2025October 2025Allow510NoNo
19181802SECURE CROSS-CHAIN ATOMIC SWAPSApril 2025January 2026Allow910NoNo
19181210RESYNCHRONIZING ENCRYPTED NETWORK TRAFFICApril 2025October 2025Allow610NoNo
19174560IDENTIFYING MATCHING VIRTUAL RESOURCESApril 2025June 2025Allow300NoNo
19172364SECURE MULTI-PARTY EPHEMERAL FILE TRANSFERApril 2025May 2025Allow100NoNo
19097774TRUSTWORTHINESS OF VIDEO DATA STREAMSApril 2025November 2025Allow810YesNo
19096043DIGITAL ASSET MANAGEMENTMarch 2025September 2025Allow610YesNo
19096557DATA PROTECTION ON DISTRIBUTED DATA STORAGE (DDS) PROTECTION NETWORKSMarch 2025September 2025Allow610NoNo
19093823Defanging Malicious Electronic Files Based on Trusted User ReportingMarch 2025October 2025Allow710YesNo
19116114COMMUNICATION APPARATUS, METHOD, SYSTEM, DEVICE, MEDIUM, ENCRYPTION SYSTEM, AND SERVERMarch 2025November 2025Allow810NoNo
19115721DATA ENCRYPTION METHOD AND RELATED COMPONENTMarch 2025June 2025Allow200NoNo
19089705DECENTRALIZED INTEGRATION SOLUTIONS FOR SECURELY CONDUCTING LEGAL TRANSACTIONS AND PROTECTING SENSITIVE DATAMarch 2025August 2025Allow510YesNo
19088334PORTABLE COMMUNICATION DEVICE PROFILE MANAGEMENT USING TOKENMarch 2025June 2025Allow210YesNo
19086702NEURAL PROCESSING DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM AND METHOD FOR TRANSFERRING OWNERSHIP OF THE NEURAL PROCESSING DEVICE THEREOFMarch 2025May 2025Allow200YesNo
19083748METHODS AND SYSTEMS FOR ENHANCING A CONTEXT FOR USE IN PROCESSING A USER REQUESTMarch 2025January 2026Allow1020NoNo
19080179SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONMarch 2025October 2025Allow710YesNo
19078119Electronic Document Presentation Management SystemMarch 2025May 2025Allow200YesNo
19076729ADVANCED ENCRYPTION STANDARD WITH FREQUENT S-BOX UPDATE AND FUSION FUNCTION APPLICATIONMarch 2025July 2025Allow410NoNo
19074401AUTHENTICATION SIGNATURE EMBEDDING IN DIGITAL MEDIAMarch 2025May 2025Allow300YesNo
19108933METHOD OF UTILIZING PHYSICAL OBJECTS IN A BLOCKCHAINMarch 2025January 2026Allow1010YesNo
19069793IDENTIFYING AN UPDATE OF A CODE DEPENDENCY TO USE BASED ON RISK AND BENEFIT TRADE-OFFSMarch 2025April 2025Allow100YesNo
19069724Verification and Authentication of RobotsMarch 2025July 2025Allow410NoNo
19064080METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUM FOR CDN SERVICE ORCHESTRATION IN MULTI-CLOUD ENVIRONMENTFebruary 2025May 2025Allow200NoNo
19061897PLATFORM SYSTEM CREATING RELIABLE, TRUST SCORED, TRUSTWORTHY DATA, FROM HUMAN AND OTHER DATA SOURCES FOR TRUSTED USES BY INDIVIDUALS AND OTHER ENTITIESFebruary 2025March 2026Abandon1210NoNo
19061523METHOD AND SYSTEM FOR DETECTING ABNORMAL NODES IN INDUSTRIAL INTERNET, AND MEDIUM AND DEVICEFebruary 2025May 2025Allow300YesNo
19058833TECHNIQUES FOR SEMANTIC ANALYSIS OF CYBERSECURITY EVENT DATA AND REMEDIATION OF CYBERSECURITY EVENT ROOT CAUSESFebruary 2025April 2025Allow200NoNo
19104658METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM FOR DATA PROCESSINGFebruary 2025November 2025Allow900NoNo
19048504TECHNIQUES FOR CYBERSECURITY EVENT CLASSIFICATION IN DATAFLOW MANAGEMENTFebruary 2025April 2025Allow300YesNo
19041074SECURE CONTROLLED COMMUNICATIONSJanuary 2025August 2025Allow710YesNo
19041984CYBER RESILIENCE AGENTIC MESHJanuary 2025April 2025Allow200YesNo
19040705INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODESJanuary 2025April 2025Allow200YesNo
19038599Systems and Methods for Performing Secure Transactions on BlockchainJanuary 2025August 2025Allow710NoNo
19038434SYSTEMS AND METHODS FOR RESPONSIBLE AIJanuary 2025July 2025Allow610YesNo
19033769SECURED TRANSFER MEDIUM MANAGEMENT AND GRADUATIONJanuary 2025November 2025Allow1020YesNo
19034297SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONJanuary 2025March 2025Allow100YesNo
19033077MANAGING SECURITY OF CRYPTOMINING DEVICESJanuary 2025August 2025Allow710YesNo
19027830RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTUREJanuary 2025June 2025Allow510NoNo
19031089METHODS AND SYSTEMS FOR IDENTIFYING ANOMALOUS USERS EXHIBITING OVERREACHING ACCESS PERMISSIONS TO DATA OBJECTSJanuary 2025April 2025Allow200YesNo
19030734RUNTIME ENVIRONMENT FOR EXECUTION OF AUTONOMOUS AGENTSJanuary 2025October 2025Allow910NoNo
19025375Multi-Factor Authentication with Device and Carrier ValidationJanuary 2025August 2025Allow700NoNo
19025047GRAPH MODELS OF RELATIONSHIPS BETWEEN DATA STORED IN BLOCKS ON DISTRIBUTED LEDGERS THAT ARE LEARNED THROUGH MACHINE LEARNING AND PLATFORMS FOR CREATING, CATALOGING, AND STORING THE SAMEJanuary 2025February 2026Allow1320NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for group 2490.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
1332
Examiner Affirmed
973
(73.0%)
Examiner Reversed
359
(27.0%)
Reversal Percentile
15.6%
Lower than average

What This Means

With a 27.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
3610
Allowed After Appeal Filing
1259
(34.9%)
Not Allowed After Appeal Filing
2351
(65.1%)
Filing Benefit Percentile
67.9%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 34.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Group 2490 - Prosecution Statistics Summary

Executive Summary

Group 2490 is part of Technology Center 2400. This group has examined 47,205 patent applications in our dataset, with an overall allowance rate of 81.0%. Applications typically reach final disposition in approximately 30 months.

Prosecution Patterns

Applications in Group 2490 receive an average of 2.05 office actions before reaching final disposition. The median prosecution time is 30 months.

Strategic Overview

This group-level data aggregates statistics across multiple art units. For more targeted prosecution strategies, review the individual art unit and examiner statistics within this group.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.