Prosecution Insights
Last updated: April 19, 2026
Application No. 17/335,118

CERTIFICATE-BASED MULTI-FACTOR AUTHENTICATION

Non-Final OA §103§112
Filed
Jun 01, 2021
Examiner
ZARRINEH, SHAHRIAR
Art Unit
2496
Tech Center
2400 — Computer Networks
Assignee
International Business Machines Corporation
OA Round
3 (Non-Final)
79%
Grant Probability
Favorable
3-4
OA Rounds
2y 8m
To Grant
87%
With Interview

Examiner Intelligence

Grants 79% — above average
79%
Career Allow Rate
341 granted / 433 resolved
+20.8% vs TC avg
Moderate +8% lift
Without
With
+7.8%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
59 currently pending
Career history
492
Total Applications
across all art units

Statute-Specific Performance

§101
7.4%
-32.6% vs TC avg
§103
52.2%
+12.2% vs TC avg
§102
11.9%
-28.1% vs TC avg
§112
16.2%
-23.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 433 resolved cases

Office Action

§103 §112
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . In communications filed on 12/08/2025. Claims 1, 3, 7-8, 14-15, 17, and 20.Claims 1-20 are pending in this examination. In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. This examination is in response to US Patent Application No. 17/335,118. Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission has been entered. Examiner Note Applicant’s amendment to claims 1, 3, 8, 10, 15, and 17 obviates previously raised claims objections. Claim Objections Claims 7, 14, and 20 are objected to because of the following informalities: the independent claims , 1, 8, and 15 contain the same/similar content as these claims. Appropriate correction is required. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 1-20 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor, or for pre-AIA the applicant regards as the invention. Claims 1, 8, and 15 are rejected for the following reason: these claims recite the word” being” which does not indicates performing definite action. Examiner suggest replacing the word “being with “is “or “are” or any other proper wording. In regard to Claims 1, 8, and 15, the limitation “Root key” renders the claim indefinite, because this term is not defined by the claim and the specification does not provide and explanation of what this terms, the specification in paragraph 24 describes it as: [… certificate authority system using a root key that is known to the authenticating entity 140…], and in paragraph 33 describes it as: […sends the request to the CA CO-0 system 402, which is in possession of a root key 420 for the CA CO-0 system 402…]. Claims 2-7, 9-14,and 16-20 do not cure the deficiency of claims 1, 8, and 15 and are rejected under 35 USC 112, 2nd paragraph, for their dependency upon claims 1, 8, and 15. Claim Rejections - 35 USC § 112 The following is a quotation of the first paragraph of 35 U.S.C. 112(a): (a) IN GENERAL. —The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor or joint inventor of carrying out the invention. The following is a quotation of the first paragraph of pre-AIA 35 U.S.C. 112: The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor of carrying out his invention. Claims 1-20 are rejected under 35 U.S.C. 112(a) or 35 U.S.C. 112 (pre-AIA ), first paragraph, as failing to comply with the written description requirement. The independent claims 1,8 , and 15 contain “receiving, using a processor of an authenticating entity, an SYH certificate from a to-be-authenticated (TBA) entity, the SYH certificate being presented unaltered by the to-be- authenticated entity and not signed by the to-be-authenticated entity; and determining, using the processor, that the SYH-MFA factor is satisfied by determining that the SYH certificate possessed by the TBA entity is valid by evaluating key data included in the SYH certificate, the key data comprising a public key of an authorized entity, including comparing the public key in the SYH certificate to a stored public key of the authorized entity and verifying that the SYH certificate has been digitally signed by a certificate authority using a root key known to the authenticating entity.” which was not described in the specification in such a way as to reasonably convey to one skilled in the relevant art that the inventor or a joint inventor, or for pre-AIA the inventor(s), at the time the application was filed, had possession of the claimed invention. Applicant specification in paragraph 33 contradicts what is claimed in independent claims, paragraph 33 describes […The CO-1120C generates a request for certificate (not shown) containing CO-1public key 404 and the CO-1 identification 408 and sends the request to the CA CO-0 system 402, which is in possession of a root key 420 for the CA CO-0 system 402. CA CO-0 system 402 verifies the identity of the CO-1120C in some manner and generates the SYH digital certificate 174A containing CO-1public key 404 that was signed with the CA CO-0 root key 420. The SYH digital certificate 174A is then returned to CO-1120C. An entity (e.g., ES 140A) that receives SYH digital certificate 174A can verify the validity of the root key signature by using CO-1public key 404, which is published and available to the verifying entity. In operation, the CA CO-0 system 402 can create a SYH digital certificate for each of the other COs 120A(i.e., CO-2 120D and CO-3 120E) using their sets of public keys. The appropriate CO's SYH digital certificate (e.g., SYH digital certificate 174A) can be incorporated in any signed command submitted to the ES 140A by the actors 302 (shown in FIG. 3), and the ES 140A will check the root key signature in order to validate that the entity submitting the SYH digital certificate is in possession of a valid SYH digital certificate. An adversary will not be able to forge a SYH digital certificate 174, 174A because the SYH digital certificates will be signed the CA CO-0 root key 420. Although the SYH digital certificate 174, 174A will, in principle, be public knowledge, an adversary cannot use the SYH digital certificate as its own because the public key in the SYH digital certificate 174, 174A matches the public key of the authorized entity for which the SYH certificate 174, 174A was generated, and because the public key is known independently by the authorizing entity when it is time to validate the SYH certificate 174, 174A.] . In regard to Claims 1, 8, and 15 the limitation “Root key” which was not described in the specification in such a way as to reasonably convey to one skilled in the relevant art that the inventor or a joint inventor, or for pre-AIA the inventor(s), at the time the application was filed, had possession of the claimed invention. Applicant is kindly requested to show the examiner support in the original disclosure for the new or amended claims. See MPEP 714.02 and 2163.06 (“Applicant should specifically point out the support for any amendments made to the disclosure"). Claims 2-7, 9-14,and 16-20 do not cure the deficiency of claims 1, 8, and 15 and are rejected under 35 USC 112, 1st paragraph, for their dependency upon claims 1, 8, and 15. Claim Comment on 35 USC § 101 There is no need for a rejection of Claims 15-20 under 35 U.S.C. 101. Although Claims 15-20 are drawn towards a " computer program product comprising a computer readable program stored on a computer readable storage medium" which could include a non-statutory digital signal, the specification clearly states that propagating signals are excluded [paragraph 066, The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination… A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire]. Response to Arguments Applicant's arguments filed 12/08/2025 have been fully considered but they are not persuasive: Applicant submits on pages 10-13 of remarks filed on 12/08/2025 regarding claim 1 that the claim requirements for possession token behavior, unaltered presentation, absence of holder signing, and validation via public key matching against a stored authorized entity key and certificate authority root signature verification define a focused and technically coherent MFA approach. The cited references do not disclose or suggest these claim specific features. Examiner respectfully disagrees with applicant argument for claim 1 filed on 12/08/2025 on pages 10-13 of remarks. Examiner maintain the rejection. receiving, using a processor of an authenticating entity, an SYH certificate from a to-be-authenticated (TBA) entity, the SYH certificate being presented unaltered by the to-be- authenticated entity and not signed by the to-be-authenticated entity [Abstract, A key fob device (equated to SYH authentication factor, to-be-authenticated (TBA) entity), in one embodiment, includes a transceiver that receives and sends signals, a memory that stores a public key and a certificate of authenticity associated with the key fob device( equated to the certificate unaltered and not signed), and a processor coupled to the transceiver and memory. The processor is configured to execute instructions causing the key fob device to transmit the public key and the certificate of authenticity, execute a public key agreement protocol to generate a common secret encryption key. and determining, using the processor, that the SYH-MFA factor is satisfied by determining that the SYH certificate possessed by the TBA entity is valid by evaluating key data included in the SYH certificate, the key data comprising a public key of an authorized entity, including comparing the public key in the SYH certificate to a stored public key of the authorized entity [Abstract, A key fob device (equated to SYH authentication factor, to-be-authenticated (TBA) entity), in one embodiment, includes a transceiver that receives and sends signals, a memory that stores a public key and a certificate of authenticity associated with the key fob device( equated to the certificate unaltered and not signed), and a processor coupled to the transceiver and memory. The processor is configured to execute instructions causing the key fob device to transmit the public key and the certificate of authenticity, execute a public key agreement protocol to generate a common secret encryption key], and [Claim 10. The key fob device of claim 9, wherein the certificate authority is a vehicle manufacturer], and [¶5, Another solution to the above problem may be a method to pair a key fob and a control unit of a vehicle that includes reading, by a pairing device, a public encryption key (PKKF) and a certificate of authenticity (CertKF) from a key fob, verifying, by the pairing device, the CertKF using a public encryption key of a vehicle manufacturer (PKVM), transmitting, by the pairing device, a certificate of authenticity (CertVD) to a control unit, verifying, by the control unit, the CertVD using the PKVM], and [¶21, The certificate-based approach to pairing a key fob to a control unit may involve all actors (manufacturers, assemblers, dealerships, etc.) to obtain a public and secret (private) encryption key, which may be used to authenticate one another in the pairing process. That may mean that each vehicle dealership (or dealer/pairing device), the vehicle manufacturer, each key fob manufactured and assembled and each control unit manufactured and installed in a vehicle to have their own associated public/secret key pairs. Once the components involved have acquired their key pairs, the public keys may be certified by a trusted third party or a certificate authority (CA). The CA may receive the public key and identification from the associated component to prove their identity. After their identity is proven, the CA may then sign the party's public key with the trusted third party's secret key. The signed public key becomes the certificate of authenticity for the requesting party. To verify the identity of a certificate, another party needs to unlock the certificate using the trusted third party's public key. The CA, for example, may be the vehicle manufacturer or a third party designated by the car manufacturer], and [¶¶24-25, Each key fob may have a public key (PK.sub.KF) and a secret key (SK.sub.KF) pair assigned to it and internally stored. The PK.sub.KF/SK.sub.KF pair may be generated for and installed in each key fob by the key fob manufacturer 102, the key fob assembly 104 or the vehicle manufacturer 110. The vehicle manufacturer 110 may choose the most trusted entity for the generation and installation of the PK.sub.KF/SK.sub.KF pairs to ensure secrecy and security. The same goes for each control unit that is manufactured and installed in a vehicle—each will have a key pair (PK.sub.CU/SK.sub.CU) generated and installed into an associated CU by a trusted party—the CU manufacturer 106, the CU assembly 108 or the vehicle manufacturer 110. In addition to the key fobs and CUs including their respective PK/SK pairs, each unit may also include a certificate of authenticity (Cert) that authenticates the component's identity. Conventionally, a Cert is a verified and signed public key where the Cert is signed by a CA. The CA may sign a Cert with its secret key. For security reasons, the vehicle manufacturer 110 may be the trusted third party so they can control the flow and validity of Certs in the manufacturing and key fob-auto pairing process. As such, the vehicle manufacturer 110 may sign all public keys with its secret key (SK.sub.VM) to generate a corresponding certificate. For example, a Cert.sub.KF will be inserted into an associated key fob. A Cert.sub.CU may correspond to a CU], and [¶34, The initial pairing process 300 may begin by the pairing device 302 receiving from the key fob 204 the PK.sub.KF and the Cert.sub.KF associated with the key fob, step 1a. The information may be sent to the pairing device 302 from the key fob 204 as a result of a request sent by the pairing device 302. Alternatively, the key fob 204 may be periodically broadcasting its PK.sub.KF and Cert.sub.KF. The pairing device 302 may then verify the identity of the key fob 204 by verifying the authenticity of the Cert.sub.KF, step 1b. The Cert.sub.KF may be verified by the pairing device using the stored PK.sub.VM. The verification of the Cert.sub.KF may be performed by hashing the Cert.sub.KF with the PK.sub.VM]. Examiner Note: The public keys of all the devices are publicly available for all device and can be shared among all the devices for the purpose of identification , comparison and for other purposes. and verifying that the SYH certificate has been digitally signed by a certificate authority using a root key known to the authenticating entity [Claim 9. The key fob device of claim 1, wherein the certificate of authenticity is signed by a certificate authority (validating the SYH-MFA (key fob device) certificate)], and [Claim 10. The key fob device of claim 9, wherein the certificate authority is a vehicle manufacturer], and [¶5, Another solution to the above problem may be a method to pair a key fob and a control unit of a vehicle that includes reading, by a pairing device, a public encryption key (PKKF) and a certificate of authenticity (CertKF) from a key fob, verifying, by the pairing device, the CertKF using a public encryption key of a vehicle manufacturer (PKVM), transmitting, by the pairing device, a certificate of authenticity (CertVD) to a control unit, verifying, by the control unit, the CertVD using the PKVM], and[¶21, The certificate-based approach to pairing a key fob to a control unit may involve all actors (manufacturers, assemblers, dealerships, etc.) to obtain a public and secret (private) encryption key, which may be used to authenticate one another in the pairing process. That may mean that each vehicle dealership (or dealer/pairing device), the vehicle manufacturer, each key fob manufactured and assembled, and each control unit manufactured and installed in a vehicle to have their own associated public/secret key pairs. Once the components involved have acquired their key pairs, the public keys may be certified by a trusted third party or a certificate authority (CA). The CA may receive the public key and identification from the associated component to prove their identity. After their identity is proven, the CA may then sign the party's public key with the trusted third party's secret key. The signed public key becomes the certificate of authenticity for the requesting party. To verify the identity of a certificate, another party needs to unlock the certificate using the trusted third party's public key. The CA, for example, may be the vehicle manufacturer or a third party designated by the car manufacturer], and [¶¶24-25, Each key fob may have a public key (PK.sub.KF) and a secret key (SK.sub.KF) pair assigned to it and internally stored. The PK.sub.KF/SK.sub.KF pair may be generated for and installed in each key fob by the key fob manufacturer 102, the key fob assembly 104 or the vehicle manufacturer 110. The vehicle manufacturer 110 may choose the most trusted entity for the generation and installation of the PK.sub.KF/SK.sub.KF pairs to ensure secrecy and security. The same goes for each control unit that is manufactured and installed in a vehicle—each will have a key pair (PK.sub.CU/SK.sub.CU) generated and installed into an associated CU by a trusted party—the CU manufacturer 106, the CU assembly 108 or the vehicle manufacturer 110. In addition to the key fobs and CUs including their respective PK/SK pairs, each unit may also include a certificate of authenticity (Cert) that authenticates the component's identity. Conventionally, a Cert is a verified and signed public key where the Cert is signed by a CA. The CA may sign a Cert with its secret key. For security reasons, the vehicle manufacturer 110 may be the trusted third party so they can control the flow and validity of Certs in the manufacturing and key fob-auto pairing process. As such, the vehicle manufacturer 110 may sign all public keys with its secret key (SK.sub.VM) to generate a corresponding certificate. For example, a Cert.sub.KF will be inserted into an associated key fob. A Cert.sub.CU may correspond to a CU], and [¶34, The initial pairing process 300 may begin by the pairing device 302 receiving from the key fob 204 the PK.sub.KF and the Cert.sub.KF associated with the key fob, step 1a. The information may be sent to the pairing device 302 from the key fob 204 as a result of a request sent by the pairing device 302. Alternatively, the key fob 204 may be periodically broadcasting its PK.sub.KF and Cert.sub.KF. The pairing device 302 may then verify the identity of the key fob 204 by verifying the authenticity of the Cert.sub.KF, step 1b. The Cert.sub.KF may be verified by the pairing device using the stored PK.sub.VM. The verification of the Cert.sub.KF may be performed by hashing the Cert.sub.KF with the PK.sub.VM]. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1-2, 4-9, 11-16, and 18-20 are rejected under 35 U.S.C. 103 as being unpatentable over US Patent No. (US2017/0203720) issued to Peeters and in view of US Patent No. (US8578454) issued to Grim (filed in IDS 06/01/2021). Regarding claims 1, 8, and 15, Peeters discloses wherein analyzing the SYH-MFA factor comprises: receiving, using a processor of an authenticating entity, an SYH certificate from a to-be-authenticated (TBA) entity, the SYH certificate being presented unaltered by the to-be- authenticated entity and not signed by the to-be-authenticated entity [Abstract, A key fob device (equated to SYH authentication factor, to-be-authenticated (TBA) entity), in one embodiment, includes a transceiver that receives and sends signals, a memory that stores a public key and a certificate of authenticity associated with the key fob device( equated to the certificate unaltered and not signed), and a processor coupled to the transceiver and memory. The processor is configured to execute instructions causing the key fob device to transmit the public key and the certificate of authenticity, execute a public key agreement protocol to generate a common secret encryption key]; and and determining, using the processor, that the SYH-MFA factor is satisfied by determining that the SYH certificate possessed by the TBA entity is valid by evaluating key data included in the SYH certificate, the key data comprising a public key of an authorized entity, including comparing the public key in the SYH certificate to a stored public key of the authorized entity [Abstract, A key fob device (equated to SYH authentication factor, to-be-authenticated (TBA) entity), in one embodiment, includes a transceiver that receives and sends signals, a memory that stores a public key and a certificate of authenticity associated with the key fob device( equated to the certificate unaltered and not signed), and a processor coupled to the transceiver and memory. The processor is configured to execute instructions causing the key fob device to transmit the public key and the certificate of authenticity, execute a public key agreement protocol to generate a common secret encryption key], and [Claim 10. The key fob device of claim 9, wherein the certificate authority is a vehicle manufacturer], and [¶5, Another solution to the above problem may be a method to pair a key fob and a control unit of a vehicle that includes reading, by a pairing device, a public encryption key (PKKF) and a certificate of authenticity (CertKF) from a key fob, verifying, by the pairing device, the CertKF using a public encryption key of a vehicle manufacturer (PKVM), transmitting, by the pairing device, a certificate of authenticity (CertVD) to a control unit, verifying, by the control unit, the CertVD using the PKVM], and [ ¶25, In addition to the key fobs and CUs including their respective PK/SK pairs, each unit may also include a certificate of authenticity (Cert) that authenticates the component's identity. Conventionally, a Cert is a verified and signed public key where the Cert is signed by a CA. The CA may sign a Cert with its secret key. For security reasons, the vehicle manufacturer 110 may be the trusted third party so they can control the flow and validity of Certs in the manufacturing and key fob-auto pairing process. As such, the vehicle manufacturer 110 may sign all public keys with its secret key (SK.sub.VM) to generate a corresponding certificate. For example, a Cert.sub.KF will be inserted into an associated key fob. A Cert.sub.CU may correspond to a C]. Examiner Note: The public keys of all the devices are publicly available for all device and can be shared among all the devices for the purpose of identification , comparison and for other purposes. and verifying that the SYH certificate has been digitally signed by a certificate authority using a root key known to the authenticating entity [Claim 9. The key fob device of claim 1, wherein the certificate of authenticity is signed by a certificate authority (validating the SYH-MFA (key fob device) certificate)], and [Claim 10. The key fob device of claim 9, wherein the certificate authority is a vehicle manufacturer], and [¶5, Another solution to the above problem may be a method to pair a key fob and a control unit of a vehicle that includes reading, by a pairing device, a public encryption key (PKKF) and a certificate of authenticity (CertKF) from a key fob, verifying, by the pairing device, the CertKF using a public encryption key of a vehicle manufacturer (PKVM), transmitting, by the pairing device, a certificate of authenticity (CertVD) to a control unit, verifying, by the control unit, the CertVD using the PKVM], and [¶¶24-25, Each key fob may have a public key (PK.sub.KF) and a secret key (SK.sub.KF) pair assigned to it and internally stored. The PK.sub.KF/SK.sub.KF pair may be generated for and installed in each key fob by the key fob manufacturer 102, the key fob assembly 104 or the vehicle manufacturer 110. The vehicle manufacturer 110 may choose the most trusted entity for the generation and installation of the PK.sub.KF/SK.sub.KF pairs to ensure secrecy and security. The same goes for each control unit that is manufactured and installed in a vehicle—each will have a key pair (PK.sub.CU/SK.sub.CU) generated and installed into an associated CU by a trusted party—the CU manufacturer 106, the CU assembly 108 or the vehicle manufacturer 110. In addition to the key fobs and CUs including their respective PK/SK pairs, each unit may also include a certificate of authenticity (Cert) that authenticates the component's identity. Conventionally, a Cert is a verified and signed public key where the Cert is signed by a CA. The CA may sign a Cert with its secret key. For security reasons, the vehicle manufacturer 110 may be the trusted third party so they can control the flow and validity of Certs in the manufacturing and key fob-auto pairing process. As such, the vehicle manufacturer 110 may sign all public keys with its secret key (SK.sub.VM) to generate a corresponding certificate. For example, a Cert.sub.KF will be inserted into an associated key fob. A Cert.sub.CU may correspond to a CU], and [¶34, The initial pairing process 300 may begin by the pairing device 302 receiving from the key fob 204 the PK.sub.KF and the Cert.sub.KF associated with the key fob, step 1a. The information may be sent to the pairing device 302 from the key fob 204 as a result of a request sent by the pairing device 302. Alternatively, the key fob 204 may be periodically broadcasting its PK.sub.KF and Cert.sub.KF. The pairing device 302 may then verify the identity of the key fob 204 by verifying the authenticity of the Cert.sub.KF, step 1b. The Cert.sub.KF may be verified by the pairing device using the stored PK.sub.VM. The verification of the Cert.sub.KF may be performed by hashing the Cert.sub.KF with the PK.sub.VM]. Peeters does not explicitly disclose, however, Grim discloses a computer-implemented method of executing multi-factor authentication (MFA), the computer-implemented method comprising [ Col. 1 lines 44-53, Recently, some two-factor authentication (TFA) mechanisms have been used; however, none of these known solutions are ideal. Many TFA mechanisms in current use center around the use of a security token. In this scheme, users are issued a token, often a small hardware device with a screen which displays a seemingly random number that changes periodically. Users that have paired a token with a network resource must supply the number currently on the screen at any given moment as part of the login procedure (in addition to a static password, the first authentication factor)]. analyzing one or more categories of MFA factors; wherein a first category of the one or more categories of MFA factors comprises a something-you-have MFA (SYH-MFA) factor [Col. 1 lines 44-61, Many TFA mechanisms in current use center around the use of a security token. In this scheme, users are issued a token, often a small hardware device with a screen which displays a seemingly random number that changes periodically. Users that have paired a token with a network resource must supply the number currently on the screen at any given moment as part of the login procedure (in addition to a static password, the first authentication factor). If the provided code matches an expected value at a token-aware backend for a given instance, then the system grants the authentication request -- feeling confident that a request that can provide a password (something known) and a valid code from the token screen (something possessed) is reasonably likely to be an authentic request. Security schemes using hardware tokens have been relatively successful as a two-factor authentication mechanism]. It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the teaching of Peeters: a memory that stores a public key and a certificate of authenticity associated with the key fob device for a certificate-based authentication process, may involve the use of authenticated certificates and public/private key pairs associated with the various components and actors involved in the pairing process, by incorporating “Two-factor authentication (TFA)”, as taught by Grim. One could have been motivated to do so in order to use a issued a token (hardware token) to users, often a small hardware device with a screen which displays a seemingly random number that changes periodically. Users that have paired a token with a network resource must supply the number currently on the screen at any given moment as part of the login procedure (in addition to a static password, the first authentication factor), which, the security community has long sought a viable second factor to supplement and fortify passwords as a means for user authentication [ Grim, Col.1 lines 19-21; Col. 1 lines 48-53]. Regarding claims 2, 9, and 16, Peeters discloses wherein: the SYH certificate includes key data; and determining that SYH certificate possessed by the TBA entity is valid comprises determining that the key data of the SYH certificate comprises valid key data [¶30, The conditioning process 200 may also include the vehicle manufacturer 110 inserting its public key, PK.sub.VM, into each vehicle's CU(s) 202 and also into each key fob 204. The PK.sub.VM inserted into the key fob 204 and the CU 202 may be used at a later time to verify the authenticity/identity of another device since all certificates of authenticity should be signed by the vehicle manufacturer 110, which can be verified using the PK.sub.VM], and [Claim 9. The key fob device of claim 1, wherein the certificate of authenticity is signed by a certificate authority. Claim 10. The key fob device of claim 9, wherein the certificate authority is a vehicle manufacture]. Regarding claims 4, 11, and 18, Peeters discloses wherein the authenticating entity is selected from the group consisting of an embedded system, a coprocessor, and a hardware security module [¶41, server at the vehicle manufacturer 110] Regarding claims 5, 12, and 19, Peeters discloses wherein: the key data of the SYH certificate comprises a public key; and the SYH certificate is generated using a certificate-authority cryptographic-officer (CA-CO) system configured to verify credentials of an authorized entity [¶21, The certificate-based approach to pairing a key fob to a control unit may involve all actors (manufacturers, assemblers, dealerships, etc.) to obtain a public and secret (private) encryption key, which may be used to authenticate one another in the pairing process. That may mean that each vehicle dealership (or dealer/pairing device), the vehicle manufacturer, each key fob manufactured and assembled and each control unit manufactured and installed in a vehicle to have their own associated public/secret key pairs. Once the components involved have acquired their key pairs, the public keys may be certified by a trusted third party or a certificate authority (CA). The CA may receive the public key and identification from the associated component to prove their identity. After their identity is proven, the CA may then sign the party's public key with the trusted third party's secret key. The signed public key becomes the certificate of authenticity for the requesting party. To verify the identity of a certificate, another party needs to unlock the certificate using the trusted third party's public key. The CA, for example, may be the vehicle manufacturer or a third party designated by the car manufacturer]. Regarding claims 6, and 13, Peeters discloses, wherein the authorized entity is authorized to make changes to resources of the authenticating entity [¶21, The certificate-based approach to pairing a key fob to a control unit may involve all actors (manufacturers, assemblers, dealerships, etc.) to obtain a public and secret (private) encryption key, which may be used to authenticate one another in the pairing process. That may mean that each vehicle dealership (or dealer/pairing device), the vehicle manufacturer, each key fob manufactured and assembled, and each control unit manufactured and installed in a vehicle to have their own associated public/secret key pairs. Once the components involved have acquired their key pairs, the public keys may be certified by a trusted third party or a certificate authority (CA). The CA may receive the public key and identification from the associated component to prove their identity. After their identity is proven, the CA may then sign the party's public key with the trusted third party's secret key. The signed public key becomes the certificate of authenticity for the requesting party. To verify the identity of a certificate, another party needs to unlock the certificate using the trusted third party's public key. The CA, for example, may be the vehicle manufacturer or a third party designated by the car manufacturer]. Regarding claims 7, 14, and 20, Peeters discloses wherein the authenticating entity determines that the public key of the SYH certificate is the public key of the authorized entity by: comparing the public key of the SYH certificate to the public key of the authorized entity; and determining that the public key of the SYH certificate has been digitally signed by the CA-CO system using a root key that is known to the authenticating entity and associated with a CA-CO [¶21, The certificate-based approach to pairing a key fob to a control unit may involve all actors (manufacturers, assemblers, dealerships, etc.) to obtain a public and secret (private) encryption key, which may be used to authenticate one another in the pairing process. That may mean that each vehicle dealership (or dealer/pairing device), the vehicle manufacturer, each key fob manufactured and assembled, and each control unit manufactured and installed in a vehicle to have their own associated public/secret key pairs. Once the components involved have acquired their key pairs, the public keys may be certified by a trusted third party or a certificate authority (CA). The CA may receive the public key and identification from the associated component to prove their identity. After their identity is proven, the CA may then sign the party's public key with the trusted third party's secret key. The signed public key becomes the certificate of authenticity for the requesting party. To verify the identity of a certificate, another party needs to unlock the certificate using the trusted third party's public key. The CA, for example, may be the vehicle manufacturer or a third party designated by the car manufacturer], and [ Abstract, claim 10, ¶¶5, 24-25, 34]. Claims 3, 10, and 17 are rejected under 35 U.S.C. 103 as being unpatentable over US Patent No. (US2017/0203720) issued to Peeters and in view of US Patent No. (US8578454) issued to Grim (filed in IDS 06/01/2021) and in view of US Patent No. (US2009/0031131) issued to Qin. Regarding claims 3, 10, and 17, Peeters does not explicitly disclose, however, Grim discloses wherein: a second category of the one or more categories of MFA factors comprises a something-you-know MFA (SYK-MFA) factor [Col. Lines 53-62, a first authentication factor (e.g., a password) is communicated from an authenticating terminal 202 to the authenticating service 204. The authenticating service 204 communicates with the authentication service 206 to verify a user action. This is done by sending a permission request to a mobile authentication device 208 associated with the user. The user uses the mobile device 208 to send a permission response to the authentication service 206 which is passed along to the authenticating service 204, providing the second factor of authentication Peeters and Grim do not explicitly disclose, however, Qin discloses and analyzing the SYK-MFA factor comprises: receiving, using the processor, an SYK-MFA certificate from the TBA entity [¶30, Hardware tokens used as part of a multifactor authentication scheme within a PKI security system can provide significantly higher levels of authentication and trust, which is very much needed in an unsecure and untrusted factory/repair service environment. Possession or control of the hardware token can be required in addition to other authentication means, such as the entry of a user identification and/or password. The hardware token can provide strong evidence of the origin of a PKI request and prevent undue reliance on a user generated and user supplied secrets for security.], and [¶32, The hardware token may take many embodiments including an RJ45 jack that plugs into an Ethernet adaptor, smart cards, parallel port dongles, or a USB flash drives. The hardware tokens may incorporate a variety of techniques for more secure authentication. According to one exemplary embodiment, the hardware token contains the private key in a PKI system. The private key cannot be extracted from the hardware token. In another embodiment, tokens may use one-time passwords or time synchronized passwords that change constantly at a set time interval, e.g., once per minute], and [¶41, Information that identifies the operator, such as a username and password can be signed with the key/certificate of the hardware token (122) that is bound to the workstation (114)]; and wherein the SYK-MFA certificate includes an SYK-MFA digital signature created by the TBA entity; and determining, using the processor, that the SYK-MFA factor is satisfied by determining that the SYK-MFA digital signature created by the TBA entity comprises a valid SYK digital signature [¶41, In addition, each hardware token (122) is exclusively bound to a particular workstation (114) or other machine. When the operator of a workstation (114) desires to obtain PKI data from the PKI server (110), a request is made through the two-way TLS connection to the PKI server (110). Information that identifies the operator, such as a username and password can be signed with the key/certificate of the hardware token (122) that is bound to the workstation (114). The PKI server (110) receives the information and verifies it], and [¶¶45-46, According to one exemplary embodiment, the service center workstations (206) are paired with hardware tokens (122) that enable the workstation (206) to communicate with a centralized PKI server (208) via a web services portal (200). The web services portal (200) may communicate with an LDAP server (202) to authenticate user names, passwords, or other data associated with each service center], andAfter the basic authentication is completed, the web service portal (200) initializes a two-way TLS communication with the centralized PKI server (208) and forwards the PKI data request message signed by a station's token (122) to the PKI server (208). The PKI server (208) first validates the Web Service Portal (200) TLS client request, and then validates the PKI data download request message generated by the station (206). The PKI server (208) then generates a response message with the requested PKI data included], and [¶78, FIG. 9 is a diagram illustrating one exemplary message and certificate validation between tokens (710, 740, 770) and the PKI servers (722, 752, 782) using the keys/CA certificates. The tokens (710, 740, 770) are paired with one or more matching PKI servers (722, 752, 782) during the personalization process. When token m (710) requests information from a PKI server (722), token m (710) sends a message (818) signed with token m's private key along with token m's certificate (822, FIG. 8). The PKI server (722) authenticates token m's certificate (822, FIG. 8) using the certificates of token m's sub-certificate authority and root certificate authority which are embedded inside the hardware security module (HSM) (724) within the PKI server (722) …]. It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teaching of Peeters, Grim with the teaching Qin in order to implement multifactor authentication scheme within a PKI security system which uses Hardware tokens as part of a multifactor authentication which can provide significantly higher levels of authentication and trust, which is very much needed in an unsecure and untrusted factory/repair service environment. Possession or control of the hardware token can be required in addition to other authentication means, such as the entry of a user identification and/or password. The hardware token can provide strong evidence of the origin of a PKI request and prevent undue reliance on a user generated and user supplied secrets for security [ Qin, ¶30]. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Ben-Shalom (US2013/0339740) [MULTI-FACTOR CERTIFICATE AUTHORITY, disclosed herein is a certificate authority server configured to provide multi-factor digital certificates. A processor readable medium may include a plurality of instructions configured to enable a certificate authority server of a certificate authority, in response to execution of the instructions by a processor, to receive a request to provide a multi-factor digital security certificate by digitally signing a certificate request having a plurality of factors and a cryptographic key, wherein a first of the plurality of factors is an identifier of a device and a second of the plurality of factors is an identifier of a user of the device. The instructions are also configured to enable the certificate authority server to associate the cryptographic key with the plurality of factors and issue the digital security certificate based on the certificate request. Also disclosed is a method of using a multi-factor digital certificate as part of the authorization process to implicitly bind the plurality of factors]. Buer (US2007/0118745) [ Multi-factor Authentication Using a Smartcard]. Thirumalai (US2019/0394189) [ TWO-FACTOR DEVICE AUTHENTICATION]. Soriente (US2021/0167958) [ PASSWORD-AUTHENTICATED PUBLIC KEY ESTABLISHMENT]. Any inquiry concerning this communication or earlier communications from the examiner should be directed to SHAHRIAR ZARRINEH whose telephone number is (571)272-1207. The examiner can normally be reached Monday-Friday, 8:30am-5:30pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jorge Ortiz-Criado can be reached at 571-272-7624. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SHAHRIAR ZARRINEH/Primary Examiner, Art Unit 2496
Read full office action

Prosecution Timeline

Jun 01, 2021
Application Filed
Sep 18, 2023
Non-Final Rejection — §103, §112
Dec 14, 2023
Response Filed
Apr 10, 2024
Final Rejection — §103, §112
May 31, 2024
Interview Requested
Jun 17, 2024
Response after Non-Final Action
Jun 17, 2024
Interview Requested
Jul 16, 2024
Response after Non-Final Action
Jul 16, 2024
Notice of Allowance
Aug 12, 2024
Response after Non-Final Action
Sep 16, 2024
Response after Non-Final Action
Sep 24, 2024
Response after Non-Final Action
Dec 05, 2024
Response after Non-Final Action
Feb 10, 2025
Response after Non-Final Action
Feb 10, 2025
Response after Non-Final Action
Feb 11, 2025
Response after Non-Final Action
Feb 11, 2025
Response after Non-Final Action
Oct 14, 2025
Response after Non-Final Action
Dec 08, 2025
Request for Continued Examination
Dec 29, 2025
Response after Non-Final Action
Jan 24, 2026
Non-Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12587392
SECURE COMMUNICATION METHOD AND APPARATUS IN PASSIVE OPTICAL NETWORK
2y 5m to grant Granted Mar 24, 2026
Patent 12549527
MULTI-FACTOR AUTHENTICATION OF CLOUD-MANAGED SERVICES
2y 5m to grant Granted Feb 10, 2026
Patent 12547755
TECHNIQUES FOR SECURELY EXECUTING ATTESTED CODE IN A COLLABORATIVE ENVIRONMENT
2y 5m to grant Granted Feb 10, 2026
Patent 12543044
SYSTEMS AND METHODS OF AUTOMATIC OUT-OF-BAND (OOB) RESTRICTED CELLULAR CONNECTIVITY FOR SET UP PROVISIONING OF MANAGED CLIENT INFORMATION HANDLING SYSTEMS
2y 5m to grant Granted Feb 03, 2026
Patent 12511435
DEVICE AND METHOD FOR ENFORCING A DATA POLICY
2y 5m to grant Granted Dec 30, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
79%
Grant Probability
87%
With Interview (+7.8%)
2y 8m
Median Time to Grant
High
PTA Risk
Based on 433 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month