Prosecution Insights
Last updated: April 19, 2026
Application No. 15/441,417

Geometrical Rarity Correlation, Venttinization and Protection System and Toolkit

Non-Final OA §101
Filed
Feb 24, 2017
Examiner
BORISSOV, IGOR N
Art Unit
3685
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Liquid Rarity Exchange LLC (Puerto Rico Llc)
OA Round
9 (Non-Final)
27%
Grant Probability
At Risk
9-10
OA Rounds
4y 2m
To Grant
69%
With Interview

Examiner Intelligence

Grants only 27% of cases
27%
Career Allow Rate
246 granted / 897 resolved
-24.6% vs TC avg
Strong +42% interview lift
Without
With
+41.6%
Interview Lift
resolved cases with interview
Typical timeline
4y 2m
Avg Prosecution
60 currently pending
Career history
957
Total Applications
across all art units

Statute-Specific Performance

§101
31.7%
-8.3% vs TC avg
§103
38.1%
-1.9% vs TC avg
§102
8.4%
-31.6% vs TC avg
§112
18.0%
-22.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 897 resolved cases

Office Action

§101
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 01/27/2026 has been entered. Response to Amendment Amendment received on 01/27/2026 is acknowledged and entered. Claims 1-30, 32-34, 36, 38-39, 41-42 and 49 have been canceled. Claim 46 has been amended. The Examiner notes that claim 62 is dependent upon the cancelled claim 49, and essentially repeat the limitations of dependent method claim 61. Thus, for the purposes of examination, the Examiner considers claim 62 canceled as well. Therefore, claims 31, 35, 37, 40, 43-48, 50-61 and 63-65 are currently pending in the application. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 31, 35, 37, 40, 43-48, 50-61 and 63-65 are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-statutory subject matter. In determining whether a claim falls within an excluded category, the Examiner is guided by the Court’s two-part framework, described in Mayo and Alice. Id. at 217-18 (citing Mayo Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 75-77 (2012)); Bilski v. Kappos, 561 U.S. 593, 611 (2010); 2019 Revised Patent Subject Matter Eligibility Guidance, 84 Fed. Reg. 50 (Jan. 7, 2019); the October 2019 Update of the 2019 Revised Guidance (Oct. 17, 2019); 2024 Guidance Update on Patent Subject Matter Eligibility, Including on Artificial Intelligence (July 17, 2024), and the USPTO’s Paten Subject Matter Eligibility Memorandum of August 4, 2025. Step 1 Claims are eligible for patent protection under § 101 if they are in one of the four statutory categories and not directed to a judicial exception to patentability (i.e., laws of nature, natural phenomena, and abstract ideas). Alice Corp. v. CLS Bank Int'l, 573 U. S. ____ (2014). Claim 43 is directed to a statutory category, because a non-transitory computer-readable medium comprising computer-readable instructions satisfies the requirements of a product. Claim 46 is directed to a statutory category, because a series of steps for secure online trading satisfies the requirements of a process (a series of acts). (Step 1: Yes). Next, the claim is analyzed to determine whether it is directed to a judicial exception. Step 2A – Prong 1 Claim 46 is rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea without significantly more of asset authentication. The claim recites: 46. A method for authentication of an asset, comprising: embedding biological material of a creator of the asset at a first location; retaining the first location in an encryption form; determining a set of particle properties from the asset, wherein each property of the set of particle properties includes a measurable or ascertainable property of the asset; correlating the set of particle properties with a set of locations on the asset to generate a particle asset map for the asset, wherein the set of locations respectively correspond to a location on the asset where a respective particle property is determined; retaining the particle asset map for the asset; receiving input indicative of the one or more properties determined based on the asset and indicative of a biomarker of the creator of the asset; comparing the particle asset map for the asset to the input received and comparing the input indicative of the biomarker of the creator to the biological material embedded at the location encrypted, and authenticating the asset based on the comparison. The limitations of embedding biological material; encrypting location information; determining particle properties; correlating said properties with their locations; retaining a correlative particle asset map; receiving input; comparing the particle asset map to the input; comparing the input to the embedded biomarker; and authenticating the asset, as drafted, is a process that, under its broadest reasonable interpretation, covers performance of the limitation in the mind and/or certain methods of organizing human activity but for the recitation of generic computer components. (Note: the Examiner’s language (e.g. “embedding biological material”, “encrypting location information”; etc.) is an abbreviated reference to the detailed claim steps and is not an oversimplification of the claim language; the Examiner employing such shortcuts (that refer to more specific steps) when attempting to explain the rejection). That is, nothing in the claim element precludes the step from practically being performed in the mind, and/or performed as organized human activity. Aside from the general technological environment (addressed below), it covers purely mental concepts and/or certain methods of organizing human activity processes, and the mere nominal recitation of a generic network appliance (e.g. an interface for inputting or outputting data, or generic network-based storage devices and displays) does not take the claim limitation out of the mental processes and/or certain methods of organizing human activity grouping. Specifically, the step of “embedding biological material;” could be understood, in view of the Specification, as applying to an item a print representation of a DNA obtained from a saliva sample of a creator. As per encrypting, determining, retaining, receiving, comparing, and authenticating steps, - said functions could be performed by a human using mental steps or basic critical thinking, which are types of activities that have been found by the courts to represent abstract ideas (e.g., mental comparison regarding a sample or test subject to a control or target data in Ambry, Myriad CAFC, or the diagnosing an abnormal condition by performing clinical tests and thinking about the results in In re Grams, 888 F.2d 835 (Fed. Cir. 1989) (Grams)). In Grams, the recited functions require obtaining data or patient information (from sensors), and analyze that data to ascertain the existence and identity of an abnormality or estimated responses, and possible causes thereof. While said functions are performed by a computer, they are in essence a mathematical algorithm, in that they represent "[a] procedure for solving a given type of mathematical problem." Gottschalk v. Benson, 409 U.S. 63, 65, 93 S.Ct. 253, 254, 34 L.Ed.2d 273 (1972). Moreover, the Federal Circuit has held, “without additional limitations, a process that employs mathematical algorithms to manipulate existing information to generate additional information is not patent eligible.” Digitech Image Techs., LLC v. Elecs. for Imaging, Inc., 758 F.3d 1344, 1351 (Fed. Cir. 2014). Further, “analyzing information by steps people go through in their minds, or by mathematical algorithms, without more, [are] essentially mental processes within the abstract-idea category.” Elec. Power, 830 F.3d at 1354; see also Synopsys, Inc. v. Mentor Graphics Corp., 839 F.3d 1138, 1146 (Fed. Cir. 2016). “[T]he fact that the required calculations could be performed more efficiently via a computer does not materially alter the patent eligibility of the claimed subject matter.” Bancorp Servs., L.L.C. v. Sun Life Assurance Co. of Can. (U.S.), 687 F.3d 1266, 1278 (Fed. Cir. 2012). Further, regarding parsing and extracting the data, as well as encrypting and de-encrypting data - in Content Extraction & Transmission LLC v. Wells Fargo Bank, National Ass’n, Nos. 13-1588,-1589, 14-1112, -1687 (Fed. Cir. Dec. 23, 2014) the Federal Circuit affirmed that such limitations were generally directed to “the abstract idea of 1) collecting data, 2) recognizing certain data within the collected data set, and 3) storing that recognized data in a memory.” The Court explained that ”[t]he concept of data collection, recognition, and storage is undisputedly well-known,” and noted that “humans have always performed these functions.” Id. The Court then rejected CET’s argument that the claims were patent eligible because they required hardware to perform functions that humans cannot, such as processing and recognizing the stream of bits output by the scanner. Comparing the asserted claims to “the computer-implemented claims in Alice,” the Court concluded that the claims were “drawn to the basic concept of data recognition and storage,” even though they recited a scanner. Id. at 8. Mental processes, e.g., parsing and extracting, as well as securing data, as recited in claim 1, remain unpatentable even when automated to reduce the burden on the user of what once could have been done with pen and paper. CyberSource Corp. at 1375 (“That purely mental processes can be unpatentable, even when performed by a computer, was precisely the holding of the Supreme Court in Gottschalk v. Benson, [409 U.S. 63 (1972)].”). Also, the claim does not require a processor for performing the recited steps, which can be understood as making notes where the biomarker was applied to an article, hiding said notes to protect from an unauthorized access, making a list of characteristics of the article particles and their location on said article, discussing possible locations of said particles with a third party, compare the locations to the notes, and authenticating the article based on the comparison. As per receiving, storing and outputting data limitations, it has been held that “As many cases make clear, even if a process of collecting and analyzing information is ‘limited to particular content’ or a particular ‘source,’ that limitation does not make the collection and analysis other than abstract.” SAP Am., Inc. v. InvestPic, LLC, 898 F.3d 1161, 1168 (Fed. Cir. 2018) (citation omitted); see also In re Jobin, 811 F. App’x 633, 637 (Fed. Cir. 2020) (claims to collecting, organizing, grouping, and storing data using techniques such as conducting a survey or crowdsourcing recited a method of organizing human activity, which is a hallmark of abstract ideas). It is similar to other abstract ideas held to be non-statutory by the courts (see: Intellectual Ventures I LLC v. Capital One Bank (USA), 792 F.3d 1363 (Fed. Cir. 2015)—tailoring sales information presented to a user based on, e.g., user data and time data; buySAFE, Inc. v. Google, Inc., 765 F.3d 1350 (Fed. Cir. 2014)—creating a contractual relationship; Parker v. Flook, - a mathematical formula for computing “alarm limits” in a catalytic conversion process; Bilski v. Kappos - a concept of hedging, or protecting against risk. See, also, Intellectual Ventures I LLC v. Capital One Bank (USA), 792 F.3d 1363 (Fed. Cir. 2015)—tailoring sales information presented to a user based on, e.g., user data and time data; TLI Communications LLC v. AV Automotive LLC 823 F.3d 607, 118 U.S.P.Q.2d 1744 (Fed. Cir. 2016) - recording, transmitting and administering digital images; DataTreasury Corp. v. Fidelity National Information Services 669 Fed. Appx. 572 (Fed. Cir. 2016) - remote image capture with centralized processing and storage; RecogniCorp LLC v. Nintendo Co. 855 F.3d 1322, 122 U.S.P.Q.2d 1377 (Fed Cir. 2017) - encoding and decoding image data; Intellectual Ventures I LLC v. Erie Indemnity Co. 850 F.3d 1315, 121 U.S.P.Q.2d 1928 (Fed Cir. 2017) - mobile interface for accessing remotely stored documents, and retrieving data from a database using an index of XML tags and metafiles. All these cases describe the significant aspects of the claimed invention, albeit at another level of abstraction. See Apple, Inc. v. Ameranth, Inc., 842 F.3d 1229, 1240-41 (Fed. Cir. 2016) ("An abstract idea can generally be described at different levels of abstraction. As the Board has done, the claimed abstract idea could be described as generating menus on a computer, or generating a second menu from a first menu and sending the second menu to another location. It could be described in other ways, including, as indicated in the specification, taking orders from restaurant customers on a computer."). Therefore, if a claim limitation, under its broadest reasonable interpretation, covers performance of the limitation in the mind but for the recitation of generic computer components, then it falls within the “Mental Processes” and/or “Certain Methods of Organizing Human Activity” grouping of abstract ideas. Accordingly, the claim recites an abstract idea. (Step 2A – Prong 1: Yes). Step 2A – Prong 2 In Prong Two, the Examiner determines whether claim 46, as a whole, recites additional elements that integrate the judicial exception into a practical application of the exception, i.e., whether the additional elements apply, rely on, or use the judicial exception in a manner that imposes a meaningful limit on the judicial exception, such that the claim is no more than a drafting effort designed to monopolize the judicial exception. See Guidance, 84 Fed. Reg. at 54-55. If the additional elements do not integrate the judicial exception into a practical application, then the claim is directed to the judicial exception. See id., 84 Fed. Reg. at 54. “An additional element [that] reflects an improvement in the functioning of a computer, or an improvement to other technology or technical field” is indicative of integrating a judicial exception into a practical application. See Guidance, 84 Fed. Reg. at 55. The Examiner determined that this judicial exception is not integrated into a practical application, because there are no meaningful limitations that transform the exception into a patent eligible application. The claim implies the use of a processor for performing the recited limitations. If so, the additional elements – using the processor to perform the steps of embedding biological material; encrypting location information; determining particle properties; correlating said properties with their locations; retaining a correlative particle asset map; receiving input; comparing the particle asset map to the input; comparing the input to the embedded biomarker; and authenticating the asset. However, the processor in each step is implied at a high level of generality, i.e., as a generic processor performing a generic computer functions of processing data, including receiving, storing, comparing, and outputting data. This generic processor limitation is nothing more than mere instructions to apply the exception using a generic computer component. The processor that performs the recited steps merely automates these steps which can be done mentally or manually. Thus, while the additional elements have and execute instructions to perform the abstract idea itself, this also does not serve to integrate the abstract idea into a practical application as it merely amounts to instructions to "apply it." The claims only manipulate abstract data elements into another form, and do not set forth improvements to another technological field or the functioning of the computer itself and instead use computer elements as tools in a conventional way to improve the functioning of the abstract idea identified above. Further, looking at the limitations as an ordered combination adds nothing that is not already present when looking at the elements taken individually; there is no indication that the combination of elements improves the functioning of a computer or improves any other technology. Their collective functions merely provide conventional computer implementation. None of the additional elements "offers a meaningful limitation beyond generally linking 'the use of the [method] to a particular technological environment,' that is, implementation via computers." Alice Corp., slip op. at 16 (citing Bilski v. Kappos, 561 U.S. 610, 611 (U.S. 2010)). The recited steps do not control or improve operation of a machine (MPEP 2106.05(a)), do not effect a transformation or reduction of a particular article to a different state or thing (MPEP 2106.05(c)), and do not apply the judicial exception with, or by use a particular machine (MPEP 2106.05(b)), but, instead, require receiving, comparing, storing and outputting data. As per receiving, storing and/or outputting data limitations, these recitations amount to mere data gathering and/or outputting, is insignificant post-solution or extra-solution component and represents nominal recitation of technology. Insignificant "post-solution” or “extra-solution" activity means activity that is not central to the purpose of the method invented by the applicant. However, “(c) Whether its involvement is extra-solution activity or a field-of-use, i.e., the extent to which (or how) the machine or apparatus imposes meaningful limits on the execution of the claimed method steps. Use of a machine or apparatus that contributes only nominally or insignificantly to the execution of the claimed method (e.g., in a data gathering step or in a field-of-use limitation) would weigh against eligibility”. See Bilski, 138 S. Ct. at 3230 (citing Parker v. Flook, 437 U.S. 584, 590, 198 USPQ 193, ___ (1978)). Thus, claim drafting strategies that attempt to circumvent the basic exceptions to § 101 using, for example, highly stylized language, hollow field-of-use limitations, or the recitation of token post-solution activity should not be credited. See Bilski, 130 S. Ct. at 3230. Thus, the method as a whole, outputs only data structure, - everything remains in the form of a code stored in the computer memory. Accordingly, even in combination, these additional elements do not integrate the abstract idea into a practical application because they do not impose any meaningful limits on practicing the abstract idea. Therefore, the claim is directed to an abstract idea. (Step 2A – Prong 2: No). Step 2B If a claim has been determined to be directed to a judicial exception under revised Step 2A, examiners should then evaluate the additional elements individually and in combination under Step 2B to determine whether the provide an inventive concept (i.e., whether the additional elements amount to significantly more than the exception itself). The Examiner determined that the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea into a practical application, the additional element of using a processor to perform the steps of embedding biological material; encrypting location information; determining particle properties; correlating said properties with their locations; retaining a correlative particle asset map; receiving input; comparing the particle asset map to the input; comparing the input to the embedded biomarker; and authenticating the asset amount to no more than mere instructions to apply the exception using a generic computer component. The claims are now re-evaluated in Step 2B to determine if it is more than what is well-understood, routine, conventional activity in the field. The claimed method would require a processor and memory in order to perform basic computer functions of receiving data, storing data in a database, comparing data; retrieving information from a database, and outputting said information. These components are not explicitly recited and therefore must be construed at the highest level of generality. Based on the Specification, the invention utilizes existing, conventional communication networks, generic processors which can be found in mobile devices or desktop computers, conventional memory and display devices. And the functions performed by said generic computer elements are basic functions of a computer - performing a mathematical operation, receiving, storing, comparing and outputting data - have recognized by the courts as routine and conventional activity. Specifically, regarding the steps, MPEP 2106.05(d)(II) defines said functions as routine and conventional, or as insignificant extra-solution activity: i. Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec, 838 F.3d at 1321, 120 USPQ2d at 1362 (utilizing an intermediary computer to forward information); TLI Communications LLC v. AV Auto. LLC, 823 F.3d 607, 610, 118 USPQ2d 1744, 1745 (Fed. Cir. 2016) (using a telephone for image transmission); OIP Techs., Inc., v. Amazon.com, Inc., 788 F.3d 1359, 1363, 115 USPQ2d 1090, 1093 (Fed. Cir. 2015) (sending messages over a network); buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355, 112 USPQ2d 1093, 1096 (Fed. Cir. 2014) (computer receives and sends information over a network); but see DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1258, 113 USPQ2d 1097, 1106 (Fed. Cir. 2014) (“Unlike the claims in Ultramercial, the claims at issue here specify how interactions with the Internet are manipulated to yield a desired result‐‐a result that overrides the routine and conventional sequence of events ordinarily triggered by the click of a hyperlink.” (emphasis added)); ii. Performing repetitive calculations, Flook, 437 U.S. at 594, 198 USPQ2d at 199 (recomputing or readjusting alarm limit values); Bancorp Services v. Sun Life, 687 F.3d 1266, 1278, 103 USPQ2d 1425, 1433 (Fed. Cir. 2012) (“The computer required by some of Bancorp’s claims is employed only for its most basic function, the performance of repetitive calculations, and as such does not impose meaningful limits on the scope of those claims.”); collecting and comparing known information in Classen 659 F.3d 1057, 100 U.S.P.Q.2d 1492 (Fed. Cir. 2011) iii. Electronic recordkeeping, Alice Corp., 134 S. Ct. at 2359, 110 USPQ2d at 1984 (creating and maintaining “shadow accounts”); Ultramercial, 772 F.3d at 716, 112 USPQ2d at 1755 (updating an activity log); iv. Storing and retrieving information in memory, Versata Dev. Group, Inc. v. SAP Am., Inc., 793 F.3d 1306, 1334, 115 USPQ2d 1681, 1701 (Fed. Cir. 2015); OIP Techs., 788 F.3d at 1363, 115 USPQ2d at 1092-93; v. Electronically scanning or extracting data from a physical document, Content Extraction and Transmission, LLC v. Wells Fargo Bank, 776 F.3d 1343, 1348, 113 USPQ2d 1354, 1358 (Fed. Cir. 2014) (optical character recognition); and vi. A web browser’s back and forward button functionality, Internet Patent Corp. v. Active Network, Inc., 790 F.3d 1343, 1348, 115 USPQ2d 1414, 1418 (Fed. Cir. 2015). Below are examples of other types of activity that the courts have found to be well-understood, routine, conventional activity when they are claimed in a merely generic manner (e.g., at a high level of generality) or as insignificant extra-solution activity: i. Recording a customer’s order, Apple, Inc. v. Ameranth, Inc., 842 F.3d 1229, 1244, 120 USPQ2d 1844, 1856 (Fed. Cir. 2016); iii. Restricting public access to media by requiring a consumer to view an advertisement, Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 716-17, 112 USPQ2d 1750, 1755-56 (Fed. Cir. 2014); iv. Presenting offers and gathering statistics, OIP Techs., 788 F.3d at 1362-63, 115 USPQ2d at 1092-93; v. Determining an estimated outcome and setting a price, OIP Techs., 788 F.3d at 1362-63, 115 USPQ2d at 1092-93; and vi. Arranging a hierarchy of groups, sorting information, eliminating less restrictive pricing information and determining the price, Versata Dev. Group, Inc. v. SAP Am., Inc., 793 F.3d 1306, 1331, 115 USPQ2d 1681, 1699 (Fed. Cir. 2015). Thus, the background of the current application does not provide any indication that the processor is anything other than a generic, off-the-shelf computer component, and the Symantec, TLI, and OIP Techs. court decisions cited in MPEP 2106.05(d)(II) indicate that mere collection or receipt of data over a network is a well‐understood, routine, and conventional function when it is claimed in a merely generic manner (as it is here). Also, the claim does not involve a non-conventional and non-generic arrangement of known, conventional pieces, as asserted, by receiving information from an external source of data. The receiving of data from an external source over a network, such as via the Internet, can fairly be characterized as insignificant extra-solution activity that does not receive patentable weight. See Bilski, 545 F.3d 943, 963 (Fed. Cir. 2008) (en banc), aff’d sub nom Bilski v. Kappos, 561 U.S. 593 (2010) (characterizing data gathering steps as insignificant extra-solution activity). Similar to Content Extraction, 776 F.3d at 1347; Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 715 (Fed. Cir. 2014): “And we have recognized that merely presenting the results of abstract processes of collecting and analyzing information, without more (such as identifying a particular tool for presentation), is abstract as an ancillary part of such collection and analysis.” Here, the claims are clearly focused on the combination of those abstract-idea processes. The advance they purport to make is a process of gathering and analyzing information of a specified content, then displaying the results, and not any particular asserted inventive technology for performing those functions. They are therefore directed to an abstract idea. As such, the additional elements, considered individually and in combination with the other claim elements, do not make the claim as a whole significantly more than the abstract idea itself. Accordingly, a conclusion that the recited steps are well-understood, routine, conventional activity is supported under Berkheimer Option 2. Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. Similar to Electric Power Group v Alstom S.A. (Fed Cir, 2015-1778, 8/1/2016) (Power Group), claim’ invocation of computers, networks, and displays does not transform the claimed subject matter into patent-eligible applications. Claims 46 does not require any nonconventional computer, network, or display components, or even a “non-conventional and non-generic arrangement of known, conventional pieces,” but merely call for performance of the claimed information collection, analysis, and display functions on a set of generic computer components and display devices. Nothing in the claim, understood in light of the specification, requires anything other than off-the-shelf, conventional computer, network, and display technology for gathering, comparing and presenting the desired information. Analogous to Power Group, claim 46 does not even require a new source or type of information, or new techniques for analyzing it. As a result, the claims do not require an arguably inventive set of components or methods, such as measurement devices or techniques that would generate new data. The claims do not invoke any assertedly inventive programming. Merely requiring the selection and manipulation of information - to provide a “humanly comprehensible” amount of information useful for users - by itself does not transform the otherwise-abstract processes of information collection and analysis into patent eligible subject matter. Merely obtaining and selecting information, by content or source, for collection, analysis, and display does nothing significant to differentiate a process from ordinary mental processes, whose implicit exclusion from § 101 undergirds the information-based category of abstract ideas. Therefore, the recited steps represent implementing the abstract idea on a generic computer, or “reciting a commonplace business method aimed at processing business information despite being applied on a general purpose computer” Versata, p. 53; Ultramerical, pp. 11-12. Further, the recited functions do not improve the functioning of computers itself, including of the processor(s) or the network elements. There are no physical improvements in the claim, like a faster processor or more efficient memory, and there is no operational improvement, like mathematical computation that improve the functioning of the computer. Applicant did not invent a new type of computer; Applicant like everyone else programs their computer to perform functions. The Supreme Court in Alice indicated that an abstract claim might be statutory if it improved another technology or the computer processing itself. Using a (programmed) computer to implement a common business practice does neither. The Federal Circuit has recognized that "an invocation of already-available computers that are not themselves plausibly asserted to be an advance, for use in carrying out improved mathematical calculations, amounts to a recitation of what is 'well-understood, routine, [and] conventional.'" SAP Am., Inc. v. InvestPic, LLC, 890 F.3d 1016, 1023 (Fed. Cir. 2018) (alteration in original) (citing Mayo v. Prometheus, 566 U.S. 66, 73 (2012)). Apart from the instructions to implement the abstract idea, they only serve to perform well-understood functions (e.g., receiving, storing, retrieving, comparing and transmitting data—see the Specification as well as Alice Corp.; Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307 (Fed. Cir. 2016); and Versata Dev. Group, Inc. v. SAP Am., Inc., 793 F.3d 1306, 1334 (Fed. Cir. 2015) covering the well-known nature of these computer functions). Looking at the limitations as an ordered combination adds nothing that is not already present when looking at the elements taken individually. There is no indication that the combination of elements improves the functioning of a computer or improves any other technology. Their collective functions merely provide conventional computer implementation. “However, it is not apparent how appellant’s programmed digital computer can produce any synergistic result. Instead, the computer will simply do the job it is instructed to do. Where is there any surprising or unexpected result? The unlikelihood of any such result is merely one more reason why patents should not be granted in situations where the only novelty is in the programming of general purpose digital computers”. See Sakraida v. Ag. Pro, Inc., 425 U.S. 273 [ 96 S.Ct. 1532, 47 L.Ed.2d 784], 189 USPQ 449 (1976) and A P Tea Co. V. Supermarket Corp., 340 U.S. 147 [ 71 S.Ct. 127, 95 L.Ed. 162], 87 USPQ 303 (1950). For example, in comparison to the decision in Enfish, LLC v. Microsoft Corporation, et al. (Enfish), claim 46 of the current application do not provide specific improvements in computer capabilities. In Enfish, Court found that claims are directed to a specific improvement to the way computers operate, - a particular database technique - in how computers could carry out one of their basic functions of storage and retrieval of data. The present case is different: the focus of the claim is not on such an improvement in computers as tools, but on certain independently abstract ideas that use computers as tools. There is no technological improvement described in the current application; the recited steps do not improve the functioning of computers itself, including of the processor(s) or the network elements; do not recite physical improvements in the claim, like a faster processor or more efficient memory, and do not provide operational improvement, like mathematical computation that improve the functioning of the computer. The claimed invention merely utilizes conventional computing and network elements for transmitting and storing data. Thus, the current application’ solution to the problem of verification of authenticity of the listed assets is not technological, but “business solution”, or “entrepreneurial.” Therefore, claim 46 does not provide a specific means or method that improves the relevant technology, but, instead, is directed to a result or effect that itself is the abstract idea and merely invoke generic processes and machinery. Furthermore, there is no transformation recited in the claim as understood in view of 35 USC 101. The recited steps merely represent abstract ideas which cannot meet the transformation test because they are not physical objects or substances. Bilski, 545 F.3d at 963. Said steps are nothing more than mere manipulation or reorganization of data, which does not satisfy the transformation prong. It is further noted that the underlying idea of the recited steps could be performed via pen and paper or in a person's mind. Moreover, “We agree with the district court that the claimed process manipulates data to organize it in a logical way such that additional fraud tests may be performed. The mere manipulation or reorganization of data, however, does not satisfy the transformation prong.” and “Abele made clear that the basic character of a process claim drawn to an abstract idea is not changed by claiming only its performance by computers, or by claiming the process embodied in program instructions on a computer readable medium. Thus, merely claiming a software implementation of a purely mental process that could otherwise be performed without the use of a computer does not satisfy the machine prong of the machine-or-transformation test”. CyberSource, 659 F.3d 1057, 100 U.S.P.Q.2d 1492 (Fed. Cir. 2011) Therefore, the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception, because, when considered separately and in combination, the claim elements do not add significantly more to the exception. Considered separately and as an ordered combination, the claim elements do not provide an improvement to another technology or technical field; do not provide an improvement to the functioning of the computer itself; do not apply the judicial exception by use of a particular machine; do not effect a transformation or reduce a particular article to a different state or thing; and do not add a specific limitation other than what is well-understood, routine and conventional in the operation of a generic computer. None of the hardware recited "offers a meaningful limitation beyond generally linking 'the use of the [method] to a particular technological environment,' that is, implementation via computers." Id., slip op. at 16 (citing Bilski v. Kappos, 561 U.S. 610, 611 (U.S. 2010)). As per “A method for authentication of a first one or more assets for secure online trading” recitation, these limitations do not add significantly more because they are simply an attempt to limit the abstract idea to a particular technological environment, that is, implementation via computers." Id., slip op. at 16 (citing Bilski v. Kappos, 561 U.S. 610, 611 (U.S. 2010)). Limiting the claims to the particular technological environment of electronic commerce is, without more, insufficient to transform the claim into patent-eligible applications of the abstract idea at their core. Accordingly, claim 46 is not directed to significantly more than the exception itself, and is not eligible subject matter under § 101. (Step 2B: No). Further, although the Examiner takes the steps recited in the independent claim as exemplary, the Examiner points out that limitations recited in dependent claims 31, 35, 47-48, 50-61 and 63-65 further narrow the abstract idea but do not make the claims any less abstract. For example, regarding recitation of: ”wherein the asset authentication is assisted at least in part by implementation of an artificial intelligence (AI) program” in claims 61 and 62, said recitation does not make the claims patent eligible, because said tools are utilized merely for data gathering, thereby emulating basic mental or human activity, and are not utilized in express manipulation and control of functional aspects and/or hardware components/equipment of real-world processes and systems using output of AI models (e.g., manufacturing processes and equipment, medical treatments, communications processes and systems, logistics systems and hardware, interactive smart phone apps, etc.). Further, said recitation is nothing more than an attempt to recycle preexisting AI technologies to apply for gathering and analyzing data. There are no improvements in said AI techniques, such as advances in the field of computer science itself, or designing a new neural network, and there is no controlling of a technological process using the outcome of said AI operations. Further, dependent claims 64 and 65 recite: 64. The method of Claim 46 further comprising embedding the biomarker of said respective creator, which step comprises: obtaining the biomarker; preparing the biomarker for being embedded in the asset; and, embedding the biomarker into the asset. 65. The method in Claim 64, wherein the asset is a painting and the biomarker comprises the asset creator's DNA. The Specification explains: “[0130] FIG. 7. In one embodiment of the present invention, creators of rarity assets (works of art) can embed they're biological footprint material 702 including; blood, semen, saliva, urine, feces, hair, teeth, bone, tissue and cells can be used to extract DNA according to the standard procedure known to the people familiar with the art.” Thus, in view of standard molecular biology techniques, and under the broadest reasonable interpretation, the recited steps of claims 64 and 65 can be understood as collecting a saliva sample; extracting DNA out of the sample, which involves standard molecular biology techniques; and, for example, printing the DNA representation on a surface of an article, which involves routine operations. Therefore, dependent claims 31, 35, 47-48, 50-61 and 63-65 each merely add further details of the abstract steps recited in claim 46 without including an improvement to another technology or technical field, an improvement to the functioning of the computer itself, or meaningful limitations beyond generally linking the use of an abstract idea to a particular technological environment. These claims "add nothing of practical significance to the underlying idea," and thus do not transform the claimed abstract idea into patentable subject matter. Ultramercial, 772 F.3d at 716. Therefore, dependent claims 31, 35, 47-48, 50-61 and 63-65 are also directed to non-statutory subject matter. Because Applicant’s computer-readable medium claims 43-45 adds nothing of substance to the underlying abstract idea, they too are patent ineligi-ble under §101. Response to Arguments Applicant's arguments filed 01/27/2026 have been fully considered but they are not persuasive. Applicant argues that Claim 46 provides a transformation: "embedding biological material of a creator of the asset at a first location". By embedding the biological material of the creator, the asset is transformed to a different state - namely, a state that enables the asset to be authenticated according to the claimed method. Further, claim 46 provides comparing received input indicative of the biomarker of the creator to the embedded biological material. The Examiner respectfully disagrees and notes that the Specification does not describe transformation as understood in view of 35 USC 101. The Specification discloses: “[0130] FIG. 7. In one embodiment of the present invention, creators of rarity assets (works of art) can embed they're biological footprint material 702 including; blood, semen, saliva, urine, feces, hair, teeth, bone, tissue and cells can be used to extract DNA according to the standard procedure known to the people familiar with the art.” Thus, the Specification relies on known techniques of obtaining data. In view of standard molecular biology techniques, and under the broadest reasonable interpretation, the recited “embedding” can be understood as collecting a saliva sample; extracting DNA out of the sample, which involves standard molecular biology techniques; and printing the DNA representation on a surface of an article, which involves routine operations. Therefore, printing DNA representation on an article does not represent a “transformation” within meaning of 35 USC 101. Accordingly, the claims at issue are not patent-eligible. Conclusion The prior art search has been conducted, with no significant prior art found. Any inquiry concerning this communication or earlier communications from the examiner should be directed to Igor Borissov whose telephone number is 571-272-6801. If attempts to reach the examiner by telephone are unsuccessful, the examiner's supervisor Kambiz Abdi can be reached on 571-272-6702. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). /IGOR N BORISSOV/Primary Examiner, Art Unit 3685 2/6/2026
Read full office action

Prosecution Timeline

Feb 24, 2017
Application Filed
Sep 03, 2019
Response after Non-Final Action
Mar 24, 2022
Non-Final Rejection — §101
Sep 28, 2022
Response Filed
Oct 18, 2022
Final Rejection — §101
Dec 09, 2022
Response after Non-Final Action
Dec 14, 2022
Response after Non-Final Action
Dec 22, 2022
Request for Continued Examination
Dec 27, 2022
Response after Non-Final Action
Dec 30, 2022
Non-Final Rejection — §101
Jan 19, 2023
Applicant Interview (Telephonic)
Jan 19, 2023
Examiner Interview Summary
Jul 05, 2023
Response Filed
Jul 21, 2023
Final Rejection — §101
Dec 27, 2023
Request for Continued Examination
Dec 29, 2023
Response after Non-Final Action
Mar 21, 2024
Non-Final Rejection — §101
Sep 27, 2024
Response Filed
Nov 14, 2024
Examiner Interview (Telephonic)
Nov 14, 2024
Examiner Interview Summary
Nov 26, 2024
Final Rejection — §101
Jun 03, 2025
Request for Continued Examination
Jun 05, 2025
Response after Non-Final Action
Jul 02, 2025
Non-Final Rejection — §101
Oct 07, 2025
Response Filed
Oct 23, 2025
Final Rejection — §101
Jan 27, 2026
Request for Continued Examination
Jan 28, 2026
Response after Non-Final Action
Feb 06, 2026
Non-Final Rejection — §101 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12599320
MICRO ANALYTE SENSOR AND CONTINUOUS ANALYTE MONITORING DEVICE
2y 5m to grant Granted Apr 14, 2026
Patent 12586677
MANAGEMENT METHOD, MANAGEMENT SYSTEM, AND ELECTRONIC MEDICAL RECORD SYSTEM
2y 5m to grant Granted Mar 24, 2026
Patent 12573495
SURGICAL COMPUTING SYSTEM WITH SUPPORT FOR INTERRELATED MACHINE LEARNING MODELS
2y 5m to grant Granted Mar 10, 2026
Patent 12567093
Automated negotiation agent with opponent’s behavior prediction
2y 5m to grant Granted Mar 03, 2026
Patent 12567486
MULTI-MODEL MACHINE LEARNING ARCHITECTURE FOR FILTERING ENTITY PROFILES
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

9-10
Expected OA Rounds
27%
Grant Probability
69%
With Interview (+41.6%)
4y 2m
Median Time to Grant
High
PTA Risk
Based on 897 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month