Prosecution Insights
Last updated: April 19, 2026
Application No. 15/209,709

Point-to-Point Transaction Guidance Apparatuses, Methods and Systems

Final Rejection §101§103§112
Filed
Jul 13, 2016
Examiner
KWONG, CHO YIU
Art Unit
3693
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Fmr LLC
OA Round
10 (Final)
32%
Grant Probability
At Risk
11-12
OA Rounds
3y 5m
To Grant
38%
With Interview

Examiner Intelligence

Grants only 32% of cases
32%
Career Allow Rate
104 granted / 324 resolved
-19.9% vs TC avg
Moderate +6% lift
Without
With
+5.9%
Interview Lift
resolved cases with interview
Typical timeline
3y 5m
Avg Prosecution
48 currently pending
Career history
372
Total Applications
across all art units

Statute-Specific Performance

§101
37.0%
-3.0% vs TC avg
§103
26.9%
-13.1% vs TC avg
§102
7.2%
-32.8% vs TC avg
§112
25.9%
-14.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 324 resolved cases

Office Action

§101 §103 §112
DETAILED ACTION This Final Office Action is in response to the application filed on 07/13/2016 and the Amendment & Remark filed on 10/10/2025. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Interpretation The following is a quotation of 35 U.S.C. 112(f): (f) Element in Claim for a Combination. – An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. The following is a quotation of pre-AIA 35 U.S.C. 112, sixth paragraph: An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. Use of the word “means” (or “step”) in a claim with functional language creates a rebuttable presumption that the claim limitation is to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites sufficient structure, material, or acts to entirely perform the recited function. Absence of the word “means” (or “step”) in a claim creates a rebuttable presumption that the claim limitation is not to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is not interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites function without reciting sufficient structure, material or acts to entirely perform the recited function. Claim limitations in this application that use the word “means” (or “step”) are being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. Conversely, claim limitations in this application that do not use the word “means” (or “step”) are not being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. Claim Rejections - 35 USC § 112 The following is a quotation of the first paragraph of 35 U.S.C. 112(a): (a) IN GENERAL.—The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor or joint inventor of carrying out the invention. The following is a quotation of the first paragraph of pre-AIA 35 U.S.C. 112: The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor of carrying out his invention. Claims 1-29, 57 and 85 are rejected under 35 U.S.C. 112(a) or 35 U.S.C. 112 (pre-AIA ), first paragraph, as failing to comply with the written description requirement. The claim(s) contains subject matter which was not described in the specification in such a way as to reasonably convey to one skilled in the relevant art that the inventor or a joint inventor, or for applications subject to pre-AIA 35 U.S.C. 112, the inventor(s), at the time the application was filed, had possession of the claimed invention. Claims 1, 29, 57 and 85 recites “in which the beacon and obtainment of the unique wallet identifier is triggered by the user's proximity to the beacon without the user's active scanning at the beacon”. However, the Original Disclosure did not provide explicit written description support that excludes “the user’s active scanning at the beacon” as a form of the user triggering the proximity condition. The Original Disclosure is silent on whether the proximity is triggered actively or passively. It should be noted that the mere absence of a positive recitation is not basis for an exclusion. (See MPEP 2173.05(i)) Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-29, 57 and 85 are rejected under 35 U.S.C. 101 because the claimed invention is directed to a judicial exception (i.e., a law of nature, a natural phenomenon, or an abstract idea) without significantly more. As an initial matter, the claims as a whole are to an apparatus, a manufacture and a process, which falls within one or more statutory categories. (Step 1: YES) The ordered combination of the recited limitations is a process that, under its broadest reasonable interpretation, covers facilitating financial transaction but for the recitation of generic computer components. That is, other than reciting “memory”, “any of at least one processor disposed in communication with the at least one memory, the any of at least one processor executing processor-executable instructions from the component collection, storage of the component collection structured with processor-executable instruction comprising: …”, “at a beacon” and blockchain server”, nothing in the claim elements that precludes the steps from that of a financial transaction. For example, but for the “processor” and “beacon” language, “obtain a target wallet identifier registration at beacon passively, in which the beacon is structured registering variable target wallet identifier, and in which the beacon is structured having non-RFID wireless communications” in the context of the claimed invention encompasses one or more person manually obtaining registration requests via wireless communication; but for the “processor” and “beacon” language, “register the target wallet identifier with the beacon, in which the beacon is structured registering variable target wallet identifiers” in the context of the claimed invention encompasses one or more person manually register the identifier; but for the “processor”, “beacon” and “…in which the beacon and obtainment of the unique wallet identifier is triggered by the user’s proximity to the beacon without the user's active scanning at the beacon” language, “obtain a unique wallet identifier from a wallet source associated with a user at the beacon” in the context of the claimed invention encompasses one or more person manually obtaining the unique wallet identifier; but for the “processor” and “beacon” language, “obtain a target transaction request at the beacon from the wallet source” in the context of the claimed invention encompasses one or more person manually obtaining the transaction request; but for the “processor” and “blockchain database network” language, “commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon.” in the context of the claimed invention encompasses one or more person manually committing that request to a blockchain database network; but for the “apparatus” language, “verify the target wallet identifier is associated with the organization” in the context of the claimed invention encompasses one or more person manually conducting the verification; but for the “apparatus” language, “identifying the target wallet identifier exist in the organization’s database” in the context of the claimed invention encompasses one or more person manually identifying existing identifier; If a claim, under its broadest reasonable interpretation, covers commercial activity, such as the facilitating of a transaction, but for the recitation of certain generic computing components, then it falls within the “Certain Method of Organized Human Activity” grouping of abstract ideas. As such, the claim recites an abstract idea. (Step 2A prong one: Yes) This judicial exception is not integrated into a practical application. In particular, the claim only recite the additional element of processor to perform the obtaining, registering, and committing steps. The involvement of the processor in the above steps is recited at a high-level of generality (i.e., as a generic computer components performing steps of the recited abstract idea) such that it amounts no more than mere instruction to apply the exception using a generic computer component. The additional elements “beacon” and ““…in which the beacon and obtainment of the unique wallet identifier is triggered by the user’s proximity to the beacon” are considered to be an insignificant extra solution to obtaining the identifier because proximity based communication, such as Bluetooth and NFC is a well-known solution to obtain data within certain proximity. Paragraph 0091 and other paragraphs of the Specification describe the proximity triggering of data obtainment at high generality of using known technology such as Bluetooth and NFC, the exact technological steps detailing how beacon is triggered by proximity is not discussed other than invoking the use of the known technology. Thus, it is apparent that feature of proximity triggered data obtainment is a result of using the known technology and would be nominal or tangential to the obtainment of data in the claims. Furthermore, the means plus functions in claim 85 are generically described in Specification paragraph 0406 that it amounts no more than mere instruction to apply the exception using a generic computer component. Accordingly, this additional element does not integrate the abstract idea into a practical application because it does not impose any meaningful limits on practicing the abstract idea. Thus, the claims is directed to an abstract idea. The claims, when considered both individually and as an ordered combination, do not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea into a practical application, the additional element of using a processor to conduct financial transaction amounts to no more than mere instructions to apply the exception using generic computer component. Mere instruction to apply an exception using a generic computer cannot provide an inventive concept. Such additional elements are determined to not contain an inventive concept according to MPEP 2106.05(f). It should be noted that (1) the “recitation of claim limitations that attempt to cover any solution to an identified problem with no restriction on how the result is accomplished and no description of the mechanism for accomplishing the result, does not provide significantly more because this type of recitation is equivalent to the words “apply it””, and (2) “Use of a computer or other machinery in its ordinary capacity for economic or other tasks (e.g., to receive, store, or transmit data) or simply adding a general purpose computer or computer components after the fact to an abstract idea (e.g., a fundamental economic practice or mathematical equation) does not integrate a judicial exception into a practical application or provide significantly more”. (Step 2A prong two: No) Additional elements that require no more than a generic computer to perform generic computer functions includes obtaining data and transmitting data (Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec,). These generic computer functions are factually determined to be well-understood, routine and conventional activities previously known to the industry as referenced by MPEP 2106.05(d) II according the USPTO Memorandum on Changes in Examination Procedure Pertaining to Subject Matter Eligibility, Recent Subject Matter Eligibility Decision (Berkheimer v. HP, Inc.) dated April 19 2018. The recited ordered combination of additional elements includes no more than a generic computing component performing steps of an abstract idea. Dependent claims 2-3, 6-28 merely limit the abstract idea but do not recite any additional element beyond the cited abstract idea, thus, do not amount to significantly more. No additional element currently recited in the claims amount the claims to be significantly more than the cited abstract idea. (Step 2B: No) Therefore, claims 1-29, 57 and 85 are rejected under 35 U.S.C. 101 as being directed to non-statutory subject matter. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-9, 15, 16, 19-21, 29, 57 and 85 are is/are rejected under 35 U.S.C. 103 as being unpatentable over Elston et al (US 2003/0191709) in view of Yang et al (US 2015/0287026) further in view of Hymes (US 2008/0064333). As per claim 1, Elston teaches a system comprising: a memory; (See Elston Paragraph 0061-0071) a point-to-point guidance component; (See Elston Paragraph 0061-0071, the “point-to-point guidance component” is interpreted as software or computer program under the Broadest Reasonable Interpretation in light of the Specification.) any of at least one processor disposed in communication with the at least one memory, the any of at least one processor executing processor-executable instructions from the component collection, storage of the component collection structured with processor-executable instruction (See Elston Paragraph 0061-0071) comprising obtain a target account identifier registration at a beacon passively, in which the beacon is structured registering variable target account identifier; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) register the target account identifier with the beacon; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) obtain a unique account identifier from a migrant account source associated with a user at the beacon; (See Elston Paragraph 0131-134, 0168 and 0191-0192) obtain a target transaction request at the beacon from the migrant account source; (See Elston Paragraph 0071, 0120 and 0231-0244) commit the target transaction request for the amount specified in the target transaction request to database. (See Elston Paragraph 0071, 0120 and 0231-0244) Elston does not teaches the account identifier are wallet identifier; commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed blockchain database network for payment targeted to the target wallet identifier registered at the beacon. However, Yang teaches using payment source wallet identifier as payment source identifier; using target wallet identifier as payment target identifier and processing payment by transmitting a destination address of a payee to receive a payment from the payment source wallet identifier to a distributed blockchain database structured propagating the transaction request to a distributed blockchain database network for payment targeted to the destination address provided. (See Yang Paragraph 0018, 0033-0034 and 0058-0059) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston with teaching from Yang to execute the payment transaction using cryptocurrency protocol. One of ordinary skill in the art would have been motivated as cryptocurrency payment enable higher anonymity of financial transactions, more flexibility in types of financial transactions, and better protection of user privacy (See Yang 0003), adapting such form of payment increases the usability of the system. Elston in view of Yang does not teach in which the beacon and obtainment of the unique wallet identifier is triggered by the user’s proximity to the beacon without the user's active scanning at the beacon and in which the beacon is structured having non-RFID wireless communication. However, Hymes teaches a terminal obtaining identifier triggered by the user’s proximity to the beacon without the user's active scanning at the beacon and in which the terminal is structured having non-RFID wireless communication. (See Hymes Paragraph 0075. Bluetooth or WiFi) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of non-RFID technology. One of ordinary skill in the art would have been motivated as non-RFID, such as wifi and bluetooth, is a known form of effective communication. As per claims 2, Elston in view of Yang in view of Hymes teaches: in which the beacon is registered to an organization. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 3, Elston in view of Yang in view of Hymes teaches: in which the target wallet identifier is of an employee of the organization. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 4, Elston in view of Yang in view of Hymes teaches: verify the target wallet identifier is associated with the organization. (See Elston Paragraph 0090-0101 and 0232-0236 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 5, Elston in view of Yang in view of Hymes teaches: in which the verification includes identifying the target wallet identifier exists in the organization’s database. (See Elston Paragraph 0090-0101 and 0232-0236 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 6, Elston in view of Yang in view of Hymes teaches: in which the verification includes authentication credentials. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 7, Elston in view of Yang in view of Hymes teaches: in which the authentication credentials are digitally signed. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 8, Elston in view of Yang in view of Hymes teaches: in which the authentication credentials are encrypted. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 9, Elston in view of Yang in view of Hymes teaches: in which the registration of the target wallet occurs upon the verification. (See Elston Paragraph 0090-0101 and 0232-0236 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 15, Elston in view of Yang in view of Hymes teaches: in which the beacon is a target mobile user device with access to a target user’s target wallet associated with the target wallet identifier. (See Elston Paragraph 0071-0073 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 16, Elston in view of Yang in view of Hymes teaches: in which the unique wallet identifier’s source is a source mobile user device with access to a user’s source wallet associated with the unique wallet identifier. (See Elston Paragraph 0071-0073 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 19, Elston in view of Yang in view of Hymes teaches: in which the beacon may be integral to a device. As per claims 20, Elston in view of Yang in view of Hymes teaches: in which the integration may be through a smart device having a processor and wireless communication. (See Elston Paragraph 0060-0071) As per claims 21, Elston in view of Yang in view of Hymes teaches: in which the integration may be by affixing a beacon to the device. (See Elston Paragraph 0060-0071) As per claim 29, Elston teaches a non-transient medium storing processor- executable components, the components, comprising: a component collection stored in the medium, including: a point-to-point guidance component; (See Elston Paragraph 0061-0071, the “point-to-point guidance component” is interpreted as software or computer program under the Broadest Reasonable Interpretation in light of the Specification.) in which the component collection, stored in the medium, includes processor-issuable instructions to: obtain a target account identifier registration at a beacon passively, in which the beacon is structured registering variable target account identifier; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) register the target account identifier with the beacon; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) obtain a unique account identifier from a migrant account source associated with a user at the beacon; (See Elston Paragraph 0131-134, 0168 and 0191-0192) obtain a target transaction request at the beacon from the migrant account source; (See Elston Paragraph 0071, 0120 and 0231-0244) commit the target transaction request for the amount specified in the target transaction request to database. (See Elston Paragraph 0071, 0120 and 0231-0244) Elston does not teaches the account identifier are wallet identifier; commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon. However, Yang teaches using payment source wallet identifier as payment source identifier; using target wallet identifier as payment target identifier and processing payment by transmitting a destination address of a payee to receive a payment from the payment source wallet identifier to a distributed blockchain database structured propagating the transaction request to a distributed blockchain database network for payment targeted to the destination address provided. (See Yang Paragraph 0018, 0033-0034 and 0058-0059) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston with teaching from Yang to execute the payment transaction using cryptocurrency protocol. One of ordinary skill in the art would have been motivated as cryptocurrency payment enable higher anonymity of financial transactions, more flexibility in types of financial transactions, and better protection of user privacy (See Yang 0003), adapting such form of payment increases the usability of the system. Elston in view of Yang does not teach in which the beacon and obtainment of the unique wallet identifier is triggered by the user’s proximity to the beacon without the user's active scanning at the beacon and in which the beacon is structured having non-RFID wireless communication. However, Hymes teaches a terminal obtaining identifier triggered by the user’s proximity to the beacon without the user's active scanning at the beacon and in which the terminal is structured having non-RFID wireless communication. (See Hymes Paragraph 0075. Bluetooth or WiFi) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of non-RFID technology. One of ordinary skill in the art would have been motivated as non-RFID, such as wifi and bluetooth, is a known form of effective communication. As per claim 57, Elston teaches a method comprising: executing processor-implemented point-to-point guidance component instructions to: obtain a target account identifier registration at a beacon passively, in which the beacon is structured registering variable target account identifier; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) register the target account identifier with the beacon; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) obtain a unique account identifier from a migrant account source associated with a user at the beacon; (See Elston Paragraph 0131-134, 0168 and 0191-0192) obtain a target transaction request at the beacon from the migrant account source; (See Elston Paragraph 0071, 0120 and 0231-0244) commit the target transaction request for the amount specified in the target transaction request to database. (See Elston Paragraph 0071, 0120 and 0231-0244) Elston does not teaches the account identifier are wallet identifier; commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon. However, Yang teaches using payment source wallet identifier as payment source identifier; using target wallet identifier as payment target identifier and processing payment by transmitting a destination address of a payee to receive a payment from the payment source wallet identifier to a distributed blockchain database structured propagating the transaction request to a distributed blockchain database network for payment targeted to the destination address provided. (See Yang Paragraph 0018, 0033-0034 and 0058-0059) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston with teaching from Yang to execute the payment transaction using cryptocurrency protocol. One of ordinary skill in the art would have been motivated as cryptocurrency payment enable higher anonymity of financial transactions, more flexibility in types of financial transactions, and better protection of user privacy (See Yang 0003), adapting such form of payment increases the usability of the system. Elston in view of Yang does not teach in which the beacon and obtainment of the unique wallet identifier is triggered by the user’s proximity to the beacon without the user's active scanning at the beacon and in which the beacon is structured having non-RFID wireless communication. However, Hymes teaches a terminal obtaining identifier triggered by the user’s proximity to the beacon without the user's active scanning at the beacon and in which the terminal is structured having non-RFID wireless communication. (See Hymes Paragraph 0075. Bluetooth or WiFi) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of non-RFID technology. One of ordinary skill in the art would have been motivated as non-RFID, such as wifi and bluetooth, is a known form of effective communication. As per claim 85, Elston teaches a system comprising: means to process processor-executable instructions from the component collection, the component collection storage structured with processor executable instruction including: obtain a target account identifier registration at a beacon, in which the beacon is structured registering variable target account identifier; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) register the target account identifier with the beacon; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) obtain a unique account identifier from a migrant account source associated with a user at the beacon; (See Elston Paragraph 0131-134, 0168 and 0191-0192) obtain a target transaction request at the beacon from the migrant account source; (See Elston Paragraph 0071, 0120 and 0231-0244) commit the target transaction request for the amount specified in the target transaction request to database. (See Elston Paragraph 0071, 0120 and 0231-0244) Elston does not teaches the account identifier are wallet identifier; commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon. However, Yang teaches using payment source wallet identifier as payment source identifier; using target wallet identifier as payment target identifier and processing payment by transmitting a destination address of a payee to receive a payment from the payment source wallet identifier to a distributed blockchain database structured propagating the transaction request to a distributed blockchain database network for payment targeted to the destination address provided. (See Yang Paragraph 0018, 0033-0034 and 0058-0059) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston with teaching from Yang to execute the payment transaction using cryptocurrency protocol. One of ordinary skill in the art would have been motivated as cryptocurrency payment enable higher anonymity of financial transactions, more flexibility in types of financial transactions, and better protection of user privacy (See Yang 0003), adapting such form of payment increases the usability of the system. Elston in view of Yang does not teach in which the beacon and obtainment of the unique wallet identifier is triggered by the user’s proximity to the beacon without the user's active scanning at the beacon and in which the beacon is structured having non-RFID wireless communication. However, Hymes teaches a terminal obtaining identifier triggered by the user’s proximity to the beacon without the user's active scanning at the beacon and in which the terminal is structured having non-RFID wireless communication. (See Hymes Paragraph 0075. Bluetooth or WiFi) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of non-RFID technology. One of ordinary skill in the art would have been motivated as non-RFID, such as wifi and bluetooth, is a known form of effective communication. Claims 10-14, 17, 18, are is/are rejected under 35 U.S.C. 103 as being unpatentable over Elston et al (US 2003/0191709) in view of Yang et al (US 2015/0287026) in view of Hymes (US 2008/0064333), as applied to claims 1-9, 15, 16, 19-21, 29, 57 and 85, further in view of Griffin et al (US 2014/0074497). As per claims 10, Elston in view of Yang in view of Hymes teaches: in which the transaction request includes a number of additional fields specified in a transaction payload. (See Elston Paragraph 0071, 0120 and 0231-0244) but not that the transaction payload is 80 byte. However, Griffin teaches containing transaction information within an 80-byte transaction message. (See Griffin Paragraph 0022 and 0039) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang in view of Hymes with teaching from Griffin to convey transaction request in an 80-byte transaction record. One of ordinary skill in the art would have been motivated as low volume message reduces data usage. As per claims 11, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include a tip amount. (See Elston Paragraph 0071, 0127 and 0236) As per claims 12, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include the beacon’s unique identifier. (See Elston Paragraph 0092) As per claims 13, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include the target wallet identifier. (See Elston Paragraph 0071-0073 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 14, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include the user’s identification information. (See Elston Paragraph 0192) As per claims 17, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include a transaction amount. (See Elston Paragraph 0236) As per claims 18, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include a transaction item. (See Elston Paragraph 0236) Claims 22-28 are is/are rejected under 35 U.S.C. 103 as being unpatentable over Elston et al (US 2003/0191709) in view of Yang et al (US 2015/0287026) in view of in view of Hymes (US 2008/0064333), as applied to claims 1-9, 15, 16, 19-21, 29, 57 and 85, further in view of Imes et al (US 2015/0195099). As per claim 22, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon may be affixed to a utility meter. However, Imes teaches a network connect to utility meter recording usage. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang in view of Hymes with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 23, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter may be read by a user. However, Imes teaches a network connect to utility meter recording usage. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang in view of Hymes with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 24, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter may be read by a user and outstanding usage may be paid by the user. However, Imes teaches a network connect to utility meter recording usage. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang in view of Hymes with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 25, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter is a refrigerator at a hotel, and usage metrics include items consumed by the user. However, Imes teaches a network connect to utility meter recording usage of a refirgerator. (See Imes Paragraph 0003, 0018, 0032, 0035, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 26, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter is a thermostat at a hotel, and usage metrics include items consumed by the user. However, Imes teaches a network connect to utility meter recording usage of thermostat. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 27, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter is a television at a hotel, and usage metrics include items viewed by the user. However, Imes teaches a network connect to utility meter recording usage of television. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 28, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter is a button affixed to consumables at a hotel, and usage metrics include items consumed by the user. However, Imes teaches a network connect to utility meter recording usage. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. Response to Arguments Applicant's arguments filed 10/10/2025 have been fully considered but they are not persuasive. Regarding the applicant’s arguments on the rejection under 35 USC 101, the examiner respectfully disagrees. As to the argument that the Office Action ignored the limitations, the examiner respectfully disagrees. The applicant contend that “if a patent applicant were to claim a teleportation device, and the Office took that position that ‘but for the teleporter’, the claim is somehow directed to a manual process”. However, that is a mischaracterization of the Office Action. For instance, a claim to a teleportation device should include technological specifics of the teleportation device. Using this example, the applicant’s claims would not be claiming the teleportation device, but to claim forth a transaction process using the teleportation device. The applicant clearly did not invent distributed blockchain, nor the processor, nor the beacon. Otherwise, the instant claims or disclosure should recite the technological details of these components. The distributed blockchain, the processor and the beacon are existing generic computing elements in which the cited Judicial Exception is applied on. The examiner maintains that other than invoking a generic computing elements of a proximity triggered beacon, the two limitations argued by the applicant encompasses no more than one or more person manually obtaining the unique wallet identifier and obtain a target transaction request. As to the applicant’s request for “legal support …that a method claim is patent eligible only if it recites new structure”, the applicant appeared to misunderstand the nature of the rejection. It should be noted that the claims are rejected upon reciting a Judicial Exception (Step 2A prong one: YES), failing to include additional elements that integrate the recited Judicial Exception into practical application as the claims merely apply the Judicial Exception to generically recited computing elements (Step 2A prong two: NO), and failing to include additional elements that amount the claims to be significantly more than the Judicial Exception. (Step 2B: No). As to the argument citing DDR and Enfish, the examiner maintains that the applicant’s argument did not adequately demonstrate how the claimed invention provide improvement to computer functionality, which is the crux of the eligibility rationale in DDR and Enfish. As discussed in Paged 29 of the Non-Final Office Action, the alleged improvement of “improve processing/bandwidth are reduced and security is enhanced” is “directed to the transaction, such as making the transaction faster, more compact and more secured. The role of the technology involved remains to be tool for conducting the now improved transaction, while the technology used remains unaltered, let alone improved.” As to the argument citing Amdoc and Berheimer, the examiner maintains that the applicant’s argument did not adequately demonstrate how the claims include additional elements or a combination of additional elements that are unconventional. Based on the claim language, the recited additional elements include a generically recited processor invoked to perform the obtaining, registering and committing steps; a beacon for which the claimed processor obtain data at; and a distributed block chain database as a recipient the claimed processor committing transaction requests. As noted in the rejection, the claims merely invoke the generically recited processor to “apply” the steps of the cited Organized Human Activity. MPEP 2106.05 (f) indicated that the “apply it” format of drafting effort would not amount to significantly more. As to the beacon and the blockchain database, the two additional elements are not actively claimed as component of the invention, only where the claimed invention take place and what the claimed processor commits transaction request to. As to the argument the claimed invention provide specific machines and transformation of matter from one for to another, the examiner respectfully disagrees. The examiner maintains that specification Paragraph 00402 and 00404 generally defined the processor, server and client without any technical specificity, indicating the recited machines are generic. MPEP 2106.05 (b) indicates that “[i]t is important to note that a general purpose computer that applies a judicial exception, such as an abstract idea, by use of conventional computer functions does not qualify as a particular machine.” Moreover, the cited paragraph 00461 discussing the transforming of smart contract request is not a transformation of matter from one state to another. MPEP 2106.05 (c) explicitly indicates that “[a]n "article" includes a physical object or substance. The physical object or substance must be particular, meaning it can be specifically identified. "Transformation" of an article means that the "article" has changed to a different state or thing. Changing to a different state or thing usually means more than simply using an article or changing the location of an article. A new or different function or use can be evidence that an article has been transformed. Purely mental processes in which thoughts or human based actions are "changed" are not considered an eligible transformation. For data, mere "manipulation of basic mathematical constructs [i.e.,] the paradigmatic ‘abstract idea,’" has not been deemed a transformation”. Since the smart contract request is obviously a non-physical “request”, the transformation of such request is considered to be a transformation according the Particular Transformation analysis. As to the argument that claimed mechanism could not be carried out by human, the examiner maintains that the ineligible claim in Content Extraction & Transmission LLC v. Wells Fargo Bank also processes data in a way not performable by human. CET attempted to distinguish the claim from those found to be abstract in Alice and other case by pointing out the element – scanner and that human minds are unable to process and recognize bit output by scanner. The Court responded that "the claims in Alice also required a computer that processed streams of bit, but nonetheless were found to be abstract". Thus, the requirement of having a computer element to implement an abstract idea, such as a commercial interaction, does not render such abstract idea eligible. As discussed in the rejection, the claimed beacon merely act as to an insignificant extra solution to obtain information pertaining the Judicial Exception, in which the claimed beacon performs only its conventional function of obtaining data. As to the argument “no human in a retail establishment is asking for everyone’s mobile phone as they enter the store, and then proceed to somehow obtain a target wallet identifier from the person’s phone and register it with a beacon, and then somehow commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database, and then somehow propagate the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon”, the examiner maintains that while a new form of transaction maybe claimed, “even newly discovered judicial exceptions are still exceptions, despite their novelty. For example, the mathematical formula in Flook, the laws of nature in Mayo, and the isolated DNA in Myriad were all novel, but nonetheless were considered by the Supreme Court to be judicial exceptions because they were “‘basic tools of scientific and technological work’ that lie beyond the domain of patent protection.” (See July 2015 Update of IGPSME Page 3) Therefore, the applicant’s arguments regarding the rejection under 35 USC 101 are not persuasive. Regarding the applicant’s argument that the cited prior arts do not teach “obtain a target wallet identifier registration at a beacon … commit the target transaction request to a distributed block chain database”, the examiner respectfully disagrees. The applicant argued that Hymes is silent on beacons. However, it should be noted that while Hymes does not use the word beacon in a verbatim fashion, Hymes explicitly discloses the obtaining of identifier triggered by user’s proximity to a terminal having non-RFID wireless communication, rendering the terminal functionality equivalent to the claimed beacon. (See Hymes Paragraph 0075, “broadcasting a request via bluetooth, WiFi, or UltraWideBand (or other digital or analog signal) to the communications terminals of proximal people to transmit back to the requestor (or to transmit directly to the server along with the requestor's ID/address) their ID's or address”) In combination with Elston in view of Yang under the cited motivation, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of NFC technology. It should be noted that terminal in Hymes is functionally equivalent to the claimed beacon in terms of communication function as it also contain non-RFID functionality such as wifi and bluetooth, while the obtaining of the identifier is proximity based. As to the applicant’s argument that popularity of technology does not provide a suggestion to combine, the examiner contends that the modification of a known method/apparatus with another known method/apparatus to produce predictable result, such as obtaining identifier via NFC to obtaining identifier via non-RFID, is at least supported by the Exemplary Rationale (A), (B), (C), (D) and (G) in MPEP 2143 to obvious. Thus, the applicant’s argument is not persuasive. Conclusion Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to CHO KWONG whose telephone number is (571)270-7955. The examiner can normally be reached 9am - 5pm EST M-F. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, MICHAEL W ANDERSON can be reached at 571-270-0508. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /CHO YIU KWONG/Primary Examiner, Art Unit 3693
Read full office action

Prosecution Timeline

Jul 13, 2016
Application Filed
Mar 18, 2019
Non-Final Rejection — §101, §103, §112
Sep 23, 2019
Response Filed
Nov 12, 2019
Final Rejection — §101, §103, §112
May 15, 2020
Request for Continued Examination
May 18, 2020
Response after Non-Final Action
Jan 02, 2021
Non-Final Rejection — §101, §103, §112
Jun 07, 2021
Response Filed
Oct 02, 2021
Final Rejection — §101, §103, §112
Apr 07, 2022
Request for Continued Examination
Apr 15, 2022
Response after Non-Final Action
Jun 17, 2022
Non-Final Rejection — §101, §103, §112
Dec 22, 2022
Response Filed
Feb 21, 2023
Final Rejection — §101, §103, §112
Aug 24, 2023
Request for Continued Examination
Aug 27, 2023
Response after Non-Final Action
Sep 23, 2023
Non-Final Rejection — §101, §103, §112
Mar 28, 2024
Response Filed
Jun 28, 2024
Final Rejection — §101, §103, §112
Jan 02, 2025
Request for Continued Examination
Jan 12, 2025
Response after Non-Final Action
Apr 05, 2025
Non-Final Rejection — §101, §103, §112
Oct 10, 2025
Response Filed
Feb 02, 2026
Final Rejection — §101, §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12561747
PROCESSING INSURED ITEMS HOLISTICALLY WITH MOBILE DAMAGE ASSESSMENT AND CLAIMS PROCESSING
2y 5m to grant Granted Feb 24, 2026
Patent 12530718
SYSTEMS AND METHODS FOR LOAN REWARDS PROVISIONING
2y 5m to grant Granted Jan 20, 2026
Patent 12530720
TRANSACTION PROCESSING SYSTEM PERFORMANCE EVALUATION
2y 5m to grant Granted Jan 20, 2026
Patent 12488340
Address Verification, Seed Splitting and Firmware Extension for Secure Cryptocurrency Key Backup, Restore, and Transaction Signing Platform Apparatuses, Methods and Systems
2y 5m to grant Granted Dec 02, 2025
Patent 12488398
SYSTEMS AND METHODS FOR CUSTOM AND REAL-TIME VISUALIZATION, COMPARISON AND ANALYSIS OF INSURANCE AND REINSURANCE STRUCTURES
2y 5m to grant Granted Dec 02, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

11-12
Expected OA Rounds
32%
Grant Probability
38%
With Interview (+5.9%)
3y 5m
Median Time to Grant
High
PTA Risk
Based on 324 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month