Prosecution Insights
Last updated: April 19, 2026
Application No. 17/432,989

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR GENERATING ENHANCED N-GRAM MODELS

Non-Final OA §101
Filed
Aug 23, 2021
Examiner
LIU, CHIA-YI
Art Unit
3692
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
VISA INTERNATIONAL SERVICE ASSOCIATION
OA Round
5 (Non-Final)
27%
Grant Probability
At Risk
5-6
OA Rounds
4y 8m
To Grant
48%
With Interview

Examiner Intelligence

Grants only 27% of cases
27%
Career Allow Rate
85 granted / 315 resolved
-25.0% vs TC avg
Strong +21% interview lift
Without
With
+21.1%
Interview Lift
resolved cases with interview
Typical timeline
4y 8m
Avg Prosecution
24 currently pending
Career history
339
Total Applications
across all art units

Statute-Specific Performance

§101
35.5%
-4.5% vs TC avg
§103
33.7%
-6.3% vs TC avg
§102
1.4%
-38.6% vs TC avg
§112
27.8%
-12.2% vs TC avg
Black line = Tech Center average estimate • Based on career data from 315 resolved cases

Office Action

§101
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION This action is in response to the Request for Continued Examination (RCE) filed 10/10/2025. Applicant has amended claims 1-2, 4, 6-8, 13-16, 18 and 20 and cancelled claims 5, 12 and 19. Accordingly, claims 1-4, 6-11, 13-18 and 20 are pending for examination. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-4, 6-11, 13-18 and 20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to a judicial exception (i.e., a law of nature, a natural phenomenon, or an abstract idea) without significantly more. Claim 1 recites the abstract idea of “performing transaction risk assessment comprising generating score using mathematical model”, which is grouped under “Certain Methods of Organizing Human Activity” such as “fundamental economic principles or practices” (managing financial information or transactions; mitigating risk) and “Mathematical Concepts (mathematical calculations; mathematical relationships). (MPEP 2016.04(a)). Specifically, claim 1 recites “receiving … of a scoring…a first data string in a first transaction request and a second data string from a second transaction request, the first transaction request and the second transaction request being associated with a first user and the first data string and the second data string received via a ….from a transaction processing… during processing of at least one of the first transaction request or the second transaction request at the transaction processing…”, “during processing of at least one of the first transaction request or the second transaction request at the transaction processing … for at least one payment by the first user”, “determining …. Of the scoring…that a leading pair of characters of the first data string does not match a leading pair of characters of the second data string”, “in response to determining that the leading pair of characters of the first data string does not match the leading pair of characters of the second data string, inserting … of the scoring…a placeholder character at a first-index position in the first data string and at a first-index position in the second data string, wherein placeholder characters are not present elsewhere in the first data string or the second data string”, “determine…of the scoring… at least one character pair of the first data string in which a first character of the at least one data pair matches a character of the second data string at a same index position as the first character and in which ha second character of the at least one character pair matches a character of the second data string at an index position immediately following a same index position of the second character”, “inserting … of the scoring… a placeholder character between each character pair of the at least one character pair”, “determining …of the scoring… whether a length of the first data string or a length of the second data string is less than a predetermined n-gram length”,” and “in response to determining that the length of the first data string or the length of the second data string is less than the predetermined n-gram length, generating … of the scoring…a similarity score based on a number of matching character pairs at same indexes in the first data string and the second data string in relation to the total number of character pairs or in response to determining that the length of the first data string and the length of the second data string are greater than or equal to the predetermined n-gram length, generating …of the scoring… the similarity score based on an n-gram distance scoring model to compare the first data string and the second data string”, “in response to the similarity score exceeding a predetermined threshold: identifying … of the scoring…a fraudulent transaction comprising at ones one of the first transaction request or the second transaction request”, “…. of the fraudulent transaction during processing of the fraudulent transaction at the transaction processing ….” and “updating …of the monitoring system… a backlist of users to include the first user to produce an updated blacklist, wherein the transaction processing …to deny authorization of future transaction requests of users on the updated blacklist”, “subsequent to the processing of at least one of the first transaction request or the second transaction request….: receiving…. of the transaction processing… third transaction request associated with the first user and denying…of the transaction processing…and based on the updated blacklist…. processing...authorization of the third transaction request during processing of the third transaction request….”. Accordingly, the claim recites an abstract idea. This judicial exception is not integrated into a practical application because, when analyzed under prong two of step 2A (MPEP 2106.04II), the additional elements of claim 1 such as “with at least one processor…of a… server”, “via communication interface”, “at the transaction processing server” and “preventing, with at least one processor, authorization …” represent the use of a computer as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular technological environment or field of use. With respect to “preventing…”, the claim lacks detail regarding what “preventing” comprise (MPEP 2106.05(f)(1)) and do not provide a practical application. Therefore, as Applicant has neither placed a restriction on how “preventing” is performed nor describe how the functions are accomplished the limitations do not integrate the abstract idea into a practical application as they are no more than “apply it” (MPEP 2106.05(f)(1)). When analyzed under step 2B (MPEP 2106.04II), because the additional elements do no more than represent the use of a computer as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular field of use, they do not provide an improvement to computer functionality, or an improvement to another technology or technical field and, therefore, do not amount to significantly more than the judicial exception itself (MPEP 2106.05(I)(A)(f)&(h)). Hence, claim 1 is not patent eligible. Claim 8 is also directed to the abstract idea of ““performing transaction risk assessment comprising generating score using mathematical model”, which is grouped under “Certain Methods of Organizing Human Activity” such as “fundamental economic principles or practices” (managing financial information or transactions; mitigating risk) and “Mathematical Concepts (mathematical calculations; mathematical relationships). (MPEP 2016.04(a)). As in the case of claim 1, the exception is not integrated into a practical application. Claim 8 includes the additional elements such as “system comprising… server including at least one processor and a monitoring system in communication with the …server programmed or configured to…”, “at the transaction processing server” and “preventing…authorization …” represent the use of a computer as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular technological environment or field of use. With respect to “preventing…”, the claim lacks detail regarding what “preventing” comprise (MPEP 2106.05(f)(1)) and do not provide a practical application. Therefore, as Applicant has neither placed a restriction on how “preventing” is performed nor describe how the functions are accomplished the limitations do not integrate the abstract idea into a practical application as they are no more than “apply it” (MPEP 2106.05(f)(1)). When analyzed under step 2B (MPEP 2106.04II), because the additional elements do no more than represent the use of a computer as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular field of use, they do not provide an improvement to computer functionality, or an improvement to another technology or technical field and, therefore, do not amount to significantly more than the judicial exception itself (MPEP 2106.05(I)(A)(f)&(h)). Hence, claim 8 is not patent eligible. Claim 15 is also directed to the abstract idea of ““performing transaction risk assessment comprising generating score using mathematical model”, which is grouped under “Certain Methods of Organizing Human Activity” such as “fundamental economic principles or practices” (managing financial information or transactions; mitigating risk) and “Mathematical Concepts (mathematical calculations; mathematical relationships). (MPEP 2016.04(a)). As in the case of claim 1, the exception is not integrated into a practical application. Claim 15 includes the additional elements such as “computer program product comprising at least one non-transitory computer readable medium including program instructions that, when executed by at least one processor, cause the at least one processor to…”,”server”, “at the transaction processing server”, and “preventing…authorization …” represent the use of a computer as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular technological environment or field of use. With respect to “preventing…”, the claim lacks detail regarding what “preventing” comprise (MPEP 2106.05(f)(1)) and do not provide a practical application. Therefore, as Applicant has neither placed a restriction on how “preventing” is performed nor describe how the functions are accomplished the limitations do not integrate the abstract idea into a practical application as they are no more than “apply it” (MPEP 2106.05(f)(1)). When analyzed under step 2B (MPEP 2106.04II), because the additional elements do no more than represent the use of a computer as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular field of use, they do not provide an improvement to computer functionality, or an improvement to another technology or technical field and, therefore, do not amount to significantly more than the judicial exception itself (MPEP 2106.05(I)(A)(f)&(h)). Hence, claim 15 is not patent eligible. Depending claims 2-4, 6-7, 9-11, 13-14, 16-18 and 20 further recite “modifying…. at least one of the first transaction request or the second transaction request so that the first data string and the second data string are a same data string (claims 2, 9, 16), “updating... a whitelist of users, wherein…to authorize future transaction requests of users on the whitelist (claims 3, 10, 17), “monitoring (system)… (claims 4, 11, 16, 17,18), “wherein first data string comprises a set of character sequences and the second data string comprises a second set of character sequences…generating…a combined similarity score of the first set of character sequences compared to the second set of character sequences, the combined similarity score based on: a weighted probability score comprising a summed plurality of probability score divided by a number of character sequences in the first set of character sequences, wherein each of the plurality of probability scores represents a probability that a character sequence in the first set of character sequences exists in the second set of character sequences and a penalty value assessed for each character sequence in the second set of character sequences that does not exist in the first set of character sequences; wherein each probability score of the plurality of probability scores is based on an n-gram distance model (claims 6, 13, 20)” and “…a remedial process for at least one of the transaction request or the second transaction request in response to the combined similarity score exceeding a predetermined threshold (claims 7, 14)”, which is grouped under “Certain Methods of Organizing Human Activity” such as “fundamental economic principles or practices” (managing financial information or transactions; mitigating risk) and “Mathematical Concepts (mathematical calculations; mathematical relationships). (MPEP 2016.04(a)). This judicial exception is not integrated into a practical application because, when analyzed under prong two of step 2A (MPEP 2106.04II), the additional elements of claims 2-4, 6-7, 9-11, 13-14, 16-18 and 20, such as “monitoring system” (claims 2, 3, 8, 14, 18), “compliance system” (claims 2, 3, 8, 10), “server” (claims 2, 3, 8, 10, 11), “fraud system” (claims 3, 11, 18), “at least one processor” (claims 6, 7, 13, 14, 17, 20) and “triggering, by a monitoring system, a remedial process…” (claims 7, 14) and “trigger…compliance system to update..” (claim 17) represent the use of a computer as a tool to perform an abstract idea and /or does no more than generally link the abstract idea to a particular field of use. With respect to “triggering”, the claims lack detail regarding what “triggering” comprise (MPEP 2106.05(f)(1)) and do not provide a practical application. Therefore, as Applicant has neither placed a restriction on how “triggering” is performed nor describe how the functions are accomplished the limitations do not integrate the abstract idea into a practical application as they are no more than “apply it” (MPEP 2106.05(f)(1)). When analyzed under step 2B (MPEP 2106.04II), because the additional elements do no more than represent the use of a computer as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular field of use, they do not provide an improvement to computer functionality, or an improvement to another technology or technical field and, therefore, do not amount to significantly more than the judicial exception itself (MPEP 2106.05(I)(A)(f)&(h)). Hence, depending claims 2-4, 6-7, 9-11, 13-14, 16-18 and 20 are not patent eligible. Claims 1-4, 6-11, 13-18 and 20 have been searched and reviewed. No prior art has been found that discloses, either expressly or inherently, all of the limitations of the claimed invention. Even though Singh et al. (US 2018/0308003 A1 discloses string matching and generating similarity score, it is not directed to preventing fraudulent transaction based on n-gram distance scoring model. There is no teaching, suggesting, or motivation that would have led one or ordinary skill in the art to modify or combine the references in the manner claimed to include all the limitations in the independent claims. Therefore, no rejection under 102/103 is made. Related But Not Relied Upon Relevant prior art cited but not applied: Cao et al. US 10,460,320 B1, directed to fraud detection. Response to Arguments Applicant's arguments filed 9/23/2025 have been fully considered but they are not persuasive. Applicant argued that the claims are statutory under 35 U.S.C. 101 because 1) similar to Enfish, the amended claims improve a field of technology 2) the claims improves upon conventional string comparison methods by introducing placeholder insertions 3) according to paragraphs 0097 and 0090 of the specification, false negatives are reduced, which reduces subsequent processing time and memory and reduces overall computer processing demand the system 4) the claims elements are not routine, conventional or well-understood 5) the interaction of the threshold-triggered steps with preceding timing based language has not been fully considered in examination. 6) the claims are similar to claim 3 of Example 47 where “detecting”, “dropping” and “blocking” were identified as practically applying the abstract idea. The Examiner disagrees. In response to applicant’s argument that the claims are similar to Enfish, it is noted that in Enfish, the distinction to reject the § 101 challenge at stage one was applied because the claims focused not on asserted advances in uses to which existing computer capabilities could be put, but on a specific improvement—a particular database technique—in how computers could carry out one of their basic functions of storage and retrieval of data. Enfish, 822 F.3d at 1335–36; see Bascom, 2016 WL 3514158, at *5; cf. Alice, 134 S. Ct. at 2360 (noting basic storage function of computer). The present case is different: the focus of the claims is not on such an improvement in how computers could carry out one of their basic functions of storage and retrieval of data, but merely use computers as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular technological environment of field of use. In response to applicant’s argument that the claims introduce placeholder insertions, it is noted that inserting “with at least one processor” represent the use of a computer as a tool to perform an abstract idea and/or does no more than generally link the abstract idea to a particular technological environment or field of use. In response to applicant’s argument that false negatives are reduced which reduces subsequent processing time and memory, it is noted that this limitation is not recited in the claims. The claims lack detail regarding how it is done (MPEP 2106.05(f)(1)) and do not provide a practical application. In response to applicant’s argument the claims are not well-understood, routine or conventional, applicant is reminded that if an examiner had previously concluded under Step 2A that an additional element was insignificant extra-solution activity they should reevaluate such conclusion in Step B (please see at least MPEP 2106.05 (g)) and if such reevaluation indicates that the element is unconventional or otherwise more than what is well-understood, routine, conventional activity in the field, this finding may indicate that an inventive concept is present. In this case, since the examiner has not concluded under Step 2A that any element is “insignificant extra-solution activity”, no reevaluation of whether the elements are “routine and conventional” is needed. In response to applicant’s argument that the interaction of the threshold-triggered steps with preceding timing-based language has not been fully considered in examination, the examiner disagrees. All the limitations recited in the claims have been fully considered, please see detailed 101 rejections above. In response to applicant’s argument that the claims are similar to claim 3 of Example 47, it is noted that unlike claim 3 of Example 47 applicant’s claims do not integrate the judicial exception into a practical application by improving network security. Claim 3 of Example 47 details the application of an artificial neural network to detect malicious network packets, which includes steps such as detecting source addresses of malicious packets, dropping these packets in real-time and blocking future traffic from these addresses. Therefore, applicant’s arguments are not persuasive. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to CHIA-YI LIU whose telephone number is (571)270-1573. The examiner can normally be reached Mon-Thurs 9-8 pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, RYAN DONLON can be reached at (571) 270-3602. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /CHIA-YI LIU/Primary Examiner, Art Unit 3692
Read full office action

Prosecution Timeline

Aug 23, 2021
Application Filed
May 17, 2024
Non-Final Rejection — §101
Jul 18, 2024
Interview Requested
Jul 26, 2024
Examiner Interview Summary
Jul 26, 2024
Applicant Interview (Telephonic)
Aug 19, 2024
Response Filed
Aug 28, 2024
Final Rejection — §101
Oct 17, 2024
Interview Requested
Oct 25, 2024
Examiner Interview Summary
Nov 04, 2024
Response after Non-Final Action
Nov 18, 2024
Response after Non-Final Action
Dec 03, 2024
Request for Continued Examination
Dec 04, 2024
Response after Non-Final Action
Mar 24, 2025
Non-Final Rejection — §101
Jun 06, 2025
Interview Requested
Jun 23, 2025
Examiner Interview Summary
Jun 23, 2025
Applicant Interview (Telephonic)
Jun 26, 2025
Response Filed
Jul 23, 2025
Final Rejection — §101
Aug 28, 2025
Interview Requested
Sep 15, 2025
Examiner Interview Summary
Sep 15, 2025
Applicant Interview (Telephonic)
Sep 23, 2025
Response after Non-Final Action
Oct 10, 2025
Request for Continued Examination
Oct 15, 2025
Response after Non-Final Action
Feb 02, 2026
Non-Final Rejection — §101
Mar 27, 2026
Interview Requested

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12450579
AUTOMATED TELLER MACHINES (ATMs) HAVING OFFLINE FUNCTIONALITY
2y 5m to grant Granted Oct 21, 2025
Patent 12340353
PAYMENT LINK
2y 5m to grant Granted Jun 24, 2025
Patent 12243043
CARDLESS ATM AUTHENTICATION
2y 5m to grant Granted Mar 04, 2025
Patent 12073380
METHOD AND SYSTEM FOR ACTIVATING A PORTABLE CONTACTLESS-PAYMENT OBJECT
2y 5m to grant Granted Aug 27, 2024
Patent 12014424
AUTONOMOUS VEHICLE PREMIUM COMPUTATION USING PREDICTIVE MODELS
2y 5m to grant Granted Jun 18, 2024
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

5-6
Expected OA Rounds
27%
Grant Probability
48%
With Interview (+21.1%)
4y 8m
Median Time to Grant
High
PTA Risk
Based on 315 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month