USPTO Group 2490 Prosecution Statistics

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19115721DATA ENCRYPTION METHOD AND RELATED COMPONENTMarch 2025June 2025Allow200NoNo
19078119Electronic Document Presentation Management SystemMarch 2025May 2025Allow200YesNo
19074401AUTHENTICATION SIGNATURE EMBEDDING IN DIGITAL MEDIAMarch 2025May 2025Allow300YesNo
19058833TECHNIQUES FOR SEMANTIC ANALYSIS OF CYBERSECURITY EVENT DATA AND REMEDIATION OF CYBERSECURITY EVENT ROOT CAUSESFebruary 2025April 2025Allow200NoNo
19041984CYBER RESILIENCE AGENTIC MESHJanuary 2025April 2025Allow200YesNo
19040705INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODESJanuary 2025April 2025Allow200YesNo
19034297SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONJanuary 2025March 2025Allow100YesNo
19027830RESOURCE PROTECTION AND VERIFICATION WITH BIDIRECTIONAL NOTIFICATION ARCHITECTUREJanuary 2025June 2025Allow510NoNo
19021683NETWORK EDGE DIGITAL TWIN FOR IOT ATTACK DETECTIONJanuary 2025March 2025Allow200YesNo
19020851INFORMATION NOTIFICATION METHOD AND INFORMATION NOTIFICATION DEVICEJanuary 2025June 2025Allow510YesNo
19006065METHOD FOR PROTECTING DATA IN A WIRELESS BODY AREA NETWORK (WBAN) SYSTEMDecember 2024April 2025Allow400NoNo
18985870DYNAMIC ORCHESTRATION-BASED AUDIO-VIDEO SECURITY PROTECTION METHOD, DEVICE AND SYSTEMDecember 2024April 2025Allow300YesNo
18983922METHOD AND APPARATUS FOR SUPPORTING NETWORK ASSISTANCE SECURITY ESTABLISHMENT IN UE-TO-UE RELAY IN A WIRELESS COMMUNICATION SYSTEMDecember 2024March 2025Allow300NoNo
18974123SYSTEM AND METHOD FOR SCANNING PRIVATE CODE AND CI/CD REGISTRIESDecember 2024March 2025Allow300YesNo
18964330DERIVED ACCESS PERMISSIONS FOR INPUTS TO ARTIFICIAL INTELLIGENCE AGENTSNovember 2024February 2025Allow200NoNo
18964322DERIVED PERMISSIONS FOR STORED OUTPUTS FROM ARTIFICIAL INTELLIGENCE AGENTSNovember 2024February 2025Allow300NoNo
18963186PROBABILISTIC EVENT LINKINGNovember 2024February 2025Allow300YesNo
18961639SECURE DEVICE COMMUNICATION USING MULTI-KEY ENCAPSULATIONNovember 2024February 2025Allow200NoNo
18961324ALARM DATA PROCESSING METHOD, APPARATUS, MEDIUM AND ELECTRONIC DEVICENovember 2024February 2025Allow300YesNo
18956421Server, Switch and Endpoints for Secure CommunicationsNovember 2024May 2025Allow610NoNo
18954389DYNAMIC SYSTEM RESOURCE-SENSITIVE MODEL SOFTWARE AND HARDWARE SELECTIONNovember 2024March 2025Allow410NoNo
18949425ENCRYPTOR, DECRYPTOR, COMMUNICATIONS SYSTEM, METHODS, COMMUNICATIONS METHODNovember 2024May 2025Allow610YesNo
18946217Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation PlatformNovember 2024January 2025Allow200YesNo
18945409Canonicalization of Unicode Prompt InjectionsNovember 2024February 2025Allow310YesNo
18943149Methods and Systems for Efficient Cybersecurity Policy Enforcement on Network CommunicationsNovember 2024February 2025Allow300NoNo
18940631TECHNOLOGIES FOR AUTHENTICATIONS VIA WEB COMPONENTSNovember 2024April 2025Allow610YesNo
18863577METHOD FOR REMOTE GENERATION OF TWO ARBITRARY-LENGTH IDENTICAL RANDOM CRYPTOGRAPHIC KEYS WITH THE DEVICE-INDEPENDENT SECURITY USING ENTANGLED MULTI-PHOTON SOURCES OF QUANTUM LIGHTNovember 2024February 2025Allow300YesNo
18938972GRANULAR SECURITY SEGMENTATION FOR COMPUTING ASSETSNovember 2024January 2025Allow200NoNo
18932967CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUSOctober 2024May 2025Allow610YesNo
18930882TRAFFIC TRANSMISSION CONTROL METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUMOctober 2024February 2025Allow300YesNo
18923017LIGHTWEIGHT INTRUSION DETECTION METHOD AND SYSTEM OF INTERNET OF VEHICLES BASED ON KNOWLEDGE DISTILLATIONOctober 2024January 2025Allow300YesNo
18922019INFORMATION PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUMOctober 2024June 2025Allow820NoNo
18917690SYSTEM AND METHOD FOR DETERMINING CODE REACHABILITY IN A NETWORKED COMPUTING ENVIRONMENTOctober 2024January 2025Allow310NoNo
18914035DETECTING MALICIOUS ACTIVITY USING USER-SPECIFIC PARAMETERSOctober 2024December 2024Allow200YesNo
18910161SYSTEMS AND METHODS FOR USER AUTHENTICATION ON SHARED MOBILE DEVICESOctober 2024January 2025Allow400YesNo
18909109AUTHENTICATED CROSS-SUBNET COMMUNICATIONOctober 2024April 2025Allow610YesNo
18906652SYSTEMS AND METHODS FOR IMPLEMENTING INTERIM SECURITY POLICIESOctober 2024December 2024Allow300YesNo
18901801AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTIONSeptember 2024March 2025Allow510YesNo
18902634SYSTEMS AND METHODS TO PERFORM PHISHING DETECTION AND DEVICE ATTESTATION VIA BROWSER EXTENSIONSeptember 2024March 2025Allow501YesNo
18902822METHOD FOR AUTHENTICATING THE QURAN IN DIGITAL FORMAT AND CERTIFYING THE AUTHENTICITY OF THE DIGITAL QURANSeptember 2024March 2025Allow610NoNo
18900562INTERACTIVE ELECTRONIC SIGNATURE PLATFORM UTILIZING EMBEDDED PERSONALIZED MEDIASeptember 2024March 2025Allow610NoNo
18899726Information Processing Method, Information Processing Apparatus, and Non-Transitory Computer-Readable Storage MediumSeptember 2024July 2025Allow920NoNo
18892215Data Obfuscation Using Encoder-Multi-Decoder ArchitectureSeptember 2024March 2025Allow510NoNo
18892295CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATIONSeptember 2024April 2025Allow610YesNo
18892283CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATIONSeptember 2024April 2025Allow610YesNo
18892131DISTRIBUTED TRAFFIC STEERING AND ENFORCEMENT FOR SECURITY SOLUTIONSSeptember 2024December 2024Allow200YesNo
18888947SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYSSeptember 2024February 2025Allow510NoNo
18888955SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYSSeptember 2024February 2025Allow510NoNo
18888973LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYSSeptember 2024February 2025Allow510NoNo
18887706SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYSSeptember 2024March 2025Allow620NoNo
18887697LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYSSeptember 2024December 2024Allow210NoNo
18887807SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYSSeptember 2024November 2024Allow210NoNo
18885207SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONSSeptember 2024April 2025Allow701YesNo
18885474CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATIONSeptember 2024December 2024Allow310NoNo
18885510CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATIONSeptember 2024December 2024Allow310NoNo
18882373METHODS AND SYSTEMS FOR VERIFYING A USER AGENTSeptember 2024December 2024Allow300NoNo
18830573LATENCY-, ACCURACY-, AND PRIVACY-SENSITIVE TUNING OF ARTIFICIAL INTELLIGENCE MODEL SELECTION PARAMETERS AND SYSTEMS AND METHODS OF THE SAMESeptember 2024March 2025Allow610NoNo
18829996THREAT CLASSIFICATION IN A STREAMING SYSTEMSeptember 2024November 2024Allow200YesNo
18830359IMPROVEMENTS TO SEARCHABLE SYMMETRIC ENCRYPTIONSeptember 2024June 2025Allow910NoNo
18829109SYSTEM FOR CYBERSECURITY CAMPAIGN ARTIFACT DISCOVERY AND TASKINGSeptember 2024March 2025Allow610YesNo
18824956Secure localization method for multi-mobile robots based on network communicationSeptember 2024November 2024Allow300YesNo
18843974METHOD AND APPARATUS FOR DETECTING URL RELATED TO PHISHING SITE USING ARTIFICIAL INTELLIGENCE AND GENERATIVE AI ALGORITHMSeptember 2024March 2025Allow700YesNo
18823271DIGITAL ASSET MANAGEMENTSeptember 2024November 2024Allow300NoNo
18820347INTEGRATED SECURITY FOR CLOUD APPLICATIONSAugust 2024December 2024Allow400YesNo
18843232CONTAINER OPERATION CONTROL METHOD AND APPARATUSAugust 2024June 2025Allow900NoNo
18842723REQUESTING A CERTIFICATE IN A DOCUMENTED MANNER USING A REGISTRATION POINTAugust 2024March 2025Allow710YesNo
18841847METHOD AND SYSTEM FOR DETECTING ANOMALY IN RADIO ACCESS NETWORKAugust 2024May 2025Allow920NoNo
18815573COMPUTER-IMPLEMENTED AUTHENTICATION PLATFORMAugust 2024December 2024Allow410NoNo
18841316SECURE AND PRIVACY PRESERVING MESSAGE ROUTING SYSTEMAugust 2024February 2025Allow600NoNo
18808778SYSTEMS AND METHODS FOR END POINT INTEGRATION AND MAPPINGAugust 2024January 2025Allow510YesNo
18809098System for Cross-Domain Identity Management (SCIM) Proxy ServiceAugust 2024October 2024Allow200NoNo
18807827METHOD, APPARATUS, DEVICE, AND MEDIUM FOR PERMISSION PROCESSINGAugust 2024March 2025Allow710NoNo
18806828REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMSAugust 2024January 2025Allow510YesNo
18806047CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAMEAugust 2024March 2025Allow720NoNo
18806184METHOD AND SYSTEM FOR COLLECTING CONSUMPTION DATA MEASURED BY SMART METERSAugust 2024June 2025Allow1010NoNo
18806633METHOD FOR DATA PROCESSING, READABLE MEDIUM AND ELECTRONIC DEVICEAugust 2024January 2025Allow610NoNo
18802673SYSTEMS AND METHODS FOR CANDIDACY DETERMINATIONS AND REQUEST PROCESSING WHILE MAINTAINING USER DATA ANONYMITYAugust 2024February 2025Allow610YesNo
18800553COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON AUTOMATED KEY TERRAIN IDENTIFICATION AND METHODS OF USE THEREOFAugust 2024February 2025Allow610YesNo
18797027PROXY AUTONOMOUS PROTOCOL FOR BLOCKCHAIN ACCESS CONTROLAugust 2024October 2024Allow300NoNo
18790563METHOD AND SYSTEM FOR MANAGING GLOBAL CONTROL GROUP (GCG)July 2024June 2025Allow1120YesNo
18787250SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSJuly 2024April 2025Allow820NoNo
18785419CLOUD DATA ATTACK SURFACE TRACKING USING GRAPH-BASED EXCESSIVE PRIVILEGE DETECTIONJuly 2024October 2024Allow300YesNo
18781121RISK EVENT DETECTION USING ACTIVITY AND GRAPH-BASED CONTEXT FOR CLOUD DATA SECURITY POSTURE MANAGEMENTJuly 2024February 2025Allow610YesNo
18782019IDENTIFYING AND ANALYZING ACTIONS FROM VECTOR REPRESENTATIONS OF ALPHANUMERIC CHARACTERS USING A LARGE LANGUAGE MODELJuly 2024November 2024Allow410NoNo
18779552ACTIVE ACCESS AUTHENTICATION METHOD AND DEVICE USING THE SAMEJuly 2024September 2024Allow200YesNo
18776878TECHNIQUES TO SUPPORT TIERED SECURITY ZONES FOR WEB-BASED APPLICATIONSJuly 2024October 2024Allow300NoNo
18774334RECEIVING INFORMATION THROUGH A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORKJuly 2024January 2025Allow601YesNo
18770937METHODS AND APPARATUS FOR WTRU-TO-WTRU RELAY DISCOVERY SECURITY AND PRIVACYJuly 2024December 2024Allow510NoNo
18771876MAPPING IDENTIFIED GAPS IN CONTROLS TO OPERATIVE STANDARDS USING A GENERATIVE ARTIFICIAL INTELLIGENCE MODELJuly 2024November 2024Allow410NoNo
18770236PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERSJuly 2024March 2025Allow810NoNo
18770575CRYPTOGRAPHIC KEY MANAGEMENT AND TRANSFERJuly 2024February 2025Allow810YesNo
18770585CONSENT DATA PIPELINE ARCHITECTURE AND OPERATIONJuly 2024February 2025Allow800NoNo
18768151DEVICE PAIRING WITH OPTICAL CODESJuly 2024April 2025Allow910YesNo
18769344BLOCKCHAIN FOR GENERAL COMPUTATIONJuly 2024June 2025Allow1110NoNo
18767075REMOTE IDENTIFICATION AND MANAGEMENT OF MANNED AND UNMANNED SYSTEMS AND DEVICESJuly 2024February 2025Allow700YesNo
18767953SECURITY ANALYSIS METHOD AND SYSTEM BASED ON PROTOCOL STATEJuly 2024November 2024Allow410NoNo
18767960SECURITY PROTECTION METHOD AND DEVICE BASED ON INDUSTRIAL INTERNETJuly 2024November 2024Allow410NoNo
18766474SECURING ATTESTATION USING A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORKJuly 2024November 2024Allow400YesNo
18764792METHODS, SYSTEMS, AND DEVICES FOR VERIFYING A LOCATION OF A COMMUNICATION DEVICEJuly 2024February 2025Allow700YesNo
18757651AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUMJune 2024May 2025Allow1010NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for group 2490.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
1243
Examiner Affirmed
912
(73.4%)
Examiner Reversed
331
(26.6%)
Reversal Percentile
11.7%
Lower than average

What This Means

With a 26.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
3451
Allowed After Appeal Filing
1231
(35.7%)
Not Allowed After Appeal Filing
2220
(64.3%)
Filing Benefit Percentile
65.8%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 35.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Group 2490 - Prosecution Statistics Summary

Executive Summary

Group 2490 is part of Technology Center 2400. This group has examined 51,666 patent applications in our dataset, with an overall allowance rate of 82.2%. Applications typically reach final disposition in approximately 28 months.

Prosecution Patterns

Applications in Group 2490 receive an average of 1.92 office actions before reaching final disposition. The median prosecution time is 28 months.

Strategic Overview

This group-level data aggregates statistics across multiple art units. For more targeted prosecution strategies, review the individual art unit and examiner statistics within this group.

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.