Prosecution Insights
Last updated: April 19, 2026
Application No. 17/959,121

ORDER PRESERVING DATASET OBFUSCATION

Final Rejection §101§103
Filed
Oct 03, 2022
Examiner
FARROW, FELICIA
Art Unit
2437
Tech Center
2400 — Computer Networks
Assignee
Servicenow Inc.
OA Round
4 (Final)
60%
Grant Probability
Moderate
5-6
OA Rounds
3y 1m
To Grant
95%
With Interview

Examiner Intelligence

Grants 60% of resolved cases
60%
Career Allow Rate
156 granted / 259 resolved
+2.2% vs TC avg
Strong +35% interview lift
Without
With
+34.8%
Interview Lift
resolved cases with interview
Typical timeline
3y 1m
Avg Prosecution
37 currently pending
Career history
296
Total Applications
across all art units

Statute-Specific Performance

§101
8.1%
-31.9% vs TC avg
§103
58.0%
+18.0% vs TC avg
§102
10.1%
-29.9% vs TC avg
§112
17.5%
-22.5% vs TC avg
Black line = Tech Center average estimate • Based on career data from 259 resolved cases

Office Action

§101 §103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Amendment The amendment filed 05 November 2025 has been entered. Applicant amended claims 1-2, 14, and 20. Accordingly, claims 1-20 remain pending. Response to Arguments Regarding the 35 USC 112 rejections: Applicant’s arguments, filed 05 November 2025, with respect to the 35 USC 112(a) and 112(b) rejections have been fully considered and are persuasive. The 35 USC 112(a) and 112(b) rejections of 06 August 2025 have been withdrawn. Regarding the 35 USC 101 rejection: Applicant’s arguments, filed 05 November 2025, with respect to the 35 USC 101 rejection have been fully considered but are not persuasive. Applicant’s remarks: [A] Applicant submits, as described in paragraph [0012], that a person cannot practically obfuscate elements of a protected dataset while maintaining a linear order that allows for comparisons of different data elements without knowing the actual values of the elements…. Accordingly, Applicant respectfully maintains that the claimed method for obfuscation cannot be practically performed as discussed in MPEP 2106.04(a)(2)(III)(A) and is therefore not simply a mental process or method for organizing human behavior under Prong One of Revised Step 2A. [B] Applicant further maintains that, under Prong Two of Revised Step 2A of the criteria for subject matter eligibility discussion in MPEP 2106, any alleged abstract idea purported to be found in the claims, when considered as a whole, is integrated into a practical application of the abstract idea by applying, relying on, and/or using it in a manner that imposes a meaningful limit on it. Applicant submits that the recitation of determining, by the obfuscation service utilizing a key associated with the protected dataset, one or more coefficients for the monotonic one-way function based at least in part on the key, wherein a length of the key is selected based on a size of the protected dataset, reflects an improvement over known methods and mechanisms for obfuscation. Accordingly, Applicant maintains that under Prong Two of Revised Step 2A discussed in MPEP 2106.04, any abstract idea alleged in the Office Action is integrated into a practical application of that abstract idea by applying, relying on, and/or using it in a manner that imposes a meaningful limit upon it. Examiner’s remarks: [A] The claims do not prevent the function from being a basic linear function ax+b, where a is greater than zero, to preserve the order. This function is a basic function that performs obfuscation (a simple substitution cipher) that is achievable in the human mind with pencil and paper. The examiner suggests for Applicant to provide further details regarding the coefficients in the monotonic function to potential overcome the function being achieve in the human mind. The abstract idea is a mental process and mathematical calculation/concepts. [B] The judicial exception alone cannot provide the technological improvement. The improvement can be provided by one or more additional elements. See the discussion of Diamond v. Diehr, 450 U.S. 175, 187 and 191-92, 209 USPQ 1, 10 (1981)). In addition, the improvement can be provided by the additional element(s) in combination with the recited judicial exception (MPEP 2106.05(a)). The examiner recommends amending the claims to include an additional element showing the improvement (see the 101 rejection for claims 4-5 and claim 16 below). Currently, the judicial exception is not integrated into a practical application and the claims do not provide additional elements to amount to significantly more than the abstract idea. Regarding the 35 USC 103 rejection: Applicant's arguments filed 05 November 2025 have been fully considered but they are not persuasive. Applicant’s remarks: Applicant respectfully submits that, as discussed in the Interview, the relied upon references do not teach or suggest determining, by the obfuscation service utilizing a key associated with the protected dataset, one or more coefficients for the monotonic one-way function based at least in part on the key, wherein a length of the key is selected based on a size of the protected dataset, as recited by amended independent claim 1. Because no combination of the relied upon references teaches or suggests each and every element recited by the claims, these references cannot provide the basis upon which a prima facie case of obviousness may be established. Accordingly, Applicant submits that the claims 2- 20 are patentable over the relied upon references for at least the reasons discussed in connection with amended independent claim 1. Reconsideration and withdrawal of the pending rejections is hereby respectfully requested. Examiner’s remarks: Paragraph 74 of Trepetin teaches the limitation of the obfuscation service utilizing a key associated with the protected dataset and wherein a length of the key is selected based on the size of the protected dataset. A string length of 10000 would result in the creation of a premutation matrix mapping each length 1-10000 to a 3 position lower case character value. The permutation matrix becomes part of the A1 table private key. Paragraph 933 also reveals One way to address longer strings would be to expand the size of our private encryption key. The claims recite determining the one or more coefficient for the monotonic one-way function based at least in part on the key. The limitation “at least in part on the key” does not claim the entire key is used in the determination of the coefficient. Therefore, the examiner has interpreted the claims as best understood and maintain the combination prior art references as shown below. Note: Trepetin is used in combination with the prior art Pieniazek and Moon. Examiner’s further remarks: As indicated in the examiner’s remarks above and in the current office action, the argued limitations in the independent claims do not overcome the prior art applied in the 35 USC 103 rejection. Thus, the independent claims are not allowable over the prior art of record and their dependent claims are not allowed based on their dependencies. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea of a mental process and mathematical calculations without significantly more. The claim(s) recite(s) “accessing, at an application platform, a protected dataset to obfuscate including numerical values arranged in a linear order that are to remain comparable with one another after obfuscation; selecting, by an obfuscation service…, an obfuscation function for the protected dataset, wherein the obfuscation function is a monotonic one-way function…; determining, by the obfuscation service utilizing a key…, one or more coefficients for the monotonic one-way function based at least in part on the key; generating, by the obfuscation service, an obfuscated version of the protected dataset using the monotonic one-way function …”. The limitations of “accessing, at an application platform, a protected dataset to obfuscate including numerical values arranged in a linear order that are to remain comparable with one another after obfuscation; selecting, by an obfuscation service…, an obfuscation function for the protected dataset, wherein the obfuscation function is a monotonic one-way function…; determining, by the obfuscation service utilizing a key…, one or more coefficients for the monotonic one-way function based at least in part on the key; generating, by the obfuscation service, an obfuscated version of the protected dataset using the monotonic one-way function …” pertain to the method of organizing information and manipulating information through mathematical calculation/correlations, wherein the method involves generating first/second data by taking existing data and manipulating/organizing the first/second data using mathematical functions (one-way function) into a new data form. Furthermore, the limitations also pertain to a process of obfuscating information which is a process that under its broadest reasonable interpretation covers performance of the limitations being an abstract idea of a mental process. The method can be performed mentally by a human with the aid of pencil and paper but for the recitation of generic computing components such as a processor and/or memory and application platform. Therefore, nothing in the claimed elements preclude the steps from being practically performed manually by a human via a mental process using pencil and paper. If a claim under its broadest reasonable interpretation covers performance in the human mind or by a human using pencil and paper, but for the recitation of generic computer components, then it fall within the mental process grouping of abstract ideas. Accordingly, claims 1, 14, and 20 recite an abstract idea. This judicial exception is not integrated into a practical application. Claims 1, 14, and 20 recite additional elements of application platform and/or generic computer components of a processor and/or memory which amount to no more than mere instructions to apply the exception using generic computer components. Mere instructions to apply the judicial exception using generic computer components cannot provide an inventive concept. The additional elements of “providing computer access to the obfuscated version of the protected dataset as a comparable alternative for the protected dataset” is considered outputting of the data which is insignificant extra solution activity. Therefore, the additional elements do not provide a technological improvement. Thus, the claims do not include additional elements that are sufficient to amount to significantly more than the judicial exception. Accordingly, claims 1, 14, and 20 are not eligible under 35 USC 101. The limitations recited in claim 2, under the broadest reasonable interpretation, further narrow the dataset using the method recited in the independent claims. Claim 2 does not provide additional elements that integrate the abstract idea into a practical application. Thus claim 2 is not eligible under 35 USC 101. The limitations recited in claims 3 and 15, under the broadest reasonable interpretation, are well known insignificant extra solution activity that is well-understood, routine, convention activity. Thus, the additional elements recited claims 3 and 15 do not integrate the abstract idea into a practical application. Thus, claims 3 and 15 are not eligible under 35 USC 101. The limitations recited in claims 4 and 16, Applicant’s remarks pertaining to the comparison query appears to be persuasive in providing an additional elements for overcoming the 101 rejection. It is recommended for Applicant to amend the independent claims with such additional elements recited in claims 4-5 and 16. The limitations recited in claim 5, Applicant’s remarks pertaining to the comparison query appears to be persuasive in providing an additional elements for overcoming the 101 rejection. It is recommended for Applicant to amend the independent claims with such additional elements recited in claims 4-5. The limitations recited in claims 6 and 17, under the broadest reasonable interpretation, further narrow the additional element and the method, which can be performed mentally in the human mind with the aid of pencil and paper. Thus, the additional elements do not integrate the abstract idea into a practical application. Thus, claims 6 and 17 are not eligible under 35 USC 101. The limitations recited in claim 7, under the broadest reasonable interpretation, provide additional steps, which can be performed mentally in the human mind with the aid of pencil and paper, except for the automation which is done by a processor. If a claim under its broadest reasonable interpretation covers performance in the human mind or by a human using pencil and paper, but for the recitation of generic computer components, then it fall within the mental process grouping of abstract ideas. Thus, the additional elements (automation by a processor) do not integrate the abstract idea into a practical application. Thus, claim 7 is not eligible under 35 USC 101. The limitations recited in claim 8, under the broadest reasonable interpretation, are well known insignificant extra solution activity that is well-understood, routine, convention activity. Thus, the additional elements recited claim 8 do not integrate the abstract idea into a practical application. Thus, claim 8 is are not eligible under 35 USC 101. The limitations recited in claims 9 , 11, and 18, under the broadest reasonable interpretation, further narrow the mathematical function recited in the independent claims (see above) which are directed to abstract idea. Thus, claims 9, 11, and 18 are not eligible under 35 USC 101. The limitations recited in claims 10, 12-13, and 19, under the broadest reasonable interpretation, provide additional steps, which can be performed mentally in the human mind with the aid of pencil and paper, except for the automation which is done by a processor. If a claim under its broadest reasonable interpretation covers performance in the human mind or by a human using pencil and paper, but for the recitation of generic computer components, then it fall within the mental process grouping of abstract ideas. Thus, the additional elements (automation by a processor) do not integrate the abstract idea into a practical application. Thus, claims 10, 12-13, and 19 are not eligible under 35 USC 101. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1-4, 8-10, 13-16, 18-20 is/are rejected under 35 U.S.C. 103 as being unpatentable over Pieniazek et al US 20200074109 (hereinafter Pieniazek), in view of Trepetin et al US 20210357521 (hereinafter Trepetin), in further view of Moon US 20130091357 (hereinafter Moon), As to claim 1, Pieniazek teaches a method (Figure 3 and paragraph 9 disclose an example of a process for obfuscating sensitive information and processing the sensitive information as obfuscated sensitive information), comprising: accessing, at an application platform (paragraph 16-17 discloses the obfuscated-data processing system/application platform), a protected dataset to obfuscate including numerical values (paragraph 39 discloses generating obfuscated data from the received data having sensitive information. A processing device can obfuscate the data by performing an operation; paragraph 42 discloses determining the symbols/characters of the dataset to remain the same and the symbols/characters of the dataset to be masked/obfuscated. Paragraphs 3 and 23 disclose the data can include personal information that includes numerical values such as address, credit score, account number, and social security number. Paragraph 62 discloses obfuscated-data processing system/application platform can involves program code/obfuscation service may include machine-executable instructions that may represent a procedure, a function) that are to remain comparable with one another after the obfuscation (paragraph 13 discloses various sets of sensitive information can be obfuscated using a common obfuscation key to generate sets of obfuscated data in a form by which the obfuscated data can be processed/matched/compared without revealing the underlying sensitive information. For example, the sets of obfuscated data can be processed to identify records in each set that are likely to refer to the same entity or that include the same type of information. Paragraph 14 provides an example such as an obfuscated dataset includes obfuscated data items, such as a first record with the string “Tcvaxvi Uvmcivs,” which is an obfuscated version of the string “Stephen Leitner,” and a second record with the string “Tcvqv Uvmcivs,” which is an obfuscated version of the string “Steve Leitner.” The obfuscated strings in the first and second records have a relationship (i.e., the presence of “Tcv . . . Uvmcivs) that corresponds to a relationship between the non-obfuscated strings (i.e., the presence of “Ste . . . Leitner” in both “Steve Leitner” and “Stephen Leitner”). Therefore, data element “Tcv” in the obfuscated data remains in the two obfuscated data elements that are comparable with each other. Paragraph 44 also discloses linking a single symbol with a single other symbol can maintain relationships both between the symbols within the data string and between data having similar data strings); selecting, by an obfuscation service accessible to the application platform, an obfuscation function for the protected dataset (paragraphs 40-43 reveal applying permutation cycles to a set of symbols. A permutation is a function. The function is x[i]->L[x[i]], wherein L is the coefficient. Paragraph 39 discloses generating obfuscated data from the received data having sensitive information. A processing device can obfuscate the data by performing an operation. Paragraph 62 discloses obfuscated-data processing system/application platform can involves program code/obfuscation service may include machine-executable instructions that may represent a procedure, a function); determining, by the obfuscation service (paragraph 62 discloses obfuscated-data processing system/application platform can involves program code/obfuscation service may include machine-executable instructions that may represent a procedure, a function) utilizing a key associated with the protected dataset, one or more coefficients for the [obfuscation function] based at least in part on the key (paragraph 34 reveals each type of sensitive data can be obfuscated using a different obfuscation key. Paragraph 40 reveals the obfuscation key can include a lookup table, wherein the obfuscation function is x[i]->L[x[i]], wherein L is the coefficient/ and values in the look-up table. Paragraphs 41-43 disclose a look-up table can be generated by applying permutations. A base permutation is formed from a natural number sequency key. A permutation S∈S.sub.n can be generated with a specified cycle structure based on the base permutation. The number of symbols n can be partitioned into k.sub.i different cycles. The maximum size and minimum size for k.sub.i can be configured); generating, by the obfuscation service, (paragraph 62 discloses obfuscated-data processing system/application platform can involves program code/obfuscation service may include machine-executable instructions that may represent a procedure, a function) an obfuscated version of the protected dataset using the [obfuscation function] with the determined one or more coefficients (paragraph 39 discloses using the obfuscated data processing system, wherein the system uses an obfuscation key and permutation (wherein the obfuscation key and permutation are discussed in paragraphs 40-43) to generate obfuscated data from the received sensitive dataset); and providing, to the application platform (paragraph 16-17 discloses the obfuscated-data processing system/application platform includes a trusted middle subsystem), access to the obfuscated version of the protected dataset as a comparable alternative for the protected dataset (paragraph 17 discloses providing the trusted middle subsystem with obfuscated versions of data associated with each user of the attribute provider. Paragraph 13 discloses various sets of sensitive information can be obfuscated using a common obfuscation key to generate sets of obfuscated data in a form by which the obfuscated data can be processed/matched/compared without revealing the underlying sensitive information). Pieniazek does not teach the protected dataset including numerical values arranged in a linear order; wherein the obfuscation function is a monotonic one-way function; determining one or more coefficients for the monotonic one-way function based at least in part on a key, wherein a length of the key is selected based on a size of the protected dataset; generating an obfuscated version of the dataset using the monotonic one-way function that maintains the linear order of the protected dataset, wherein the monotonic one-way function operates with the determined one or more coefficient. Trepetin teaches wherein the obfuscation function is a monotonic one-way function (paragraph 68 discloses anonymization/obfuscation the data through the use of mathematical function with specially chosen randomized parameters/coefficients, the values are transformed using a monotonic mathematical function. Anonymization is a form of obfuscation); determining one or more coefficients for the monotonic one-way function based at least in part on a key (paragraph 355 discloses a monotonic mathematical function with coefficients of α and β. Paragraph 426 refers to the coefficients as random constants. Paragraph 510 reveals the random numbers/coefficients are generated using Gaussian random number generator. This random number generator uses a seed value/key), wherein a length of the key is selected based on a size of the protected dataset (paragraph 74 discloses the limitation of the obfuscation service utilizing a key associated with the protected dataset and wherein a length of the key is selected based on the size of the protected dataset. A string length of 10000 would result in the creation of a premutation matrix mapping each length 1-10000to a 3 position lower case character value. The permutation matrix becomes part of the A1 table private key. Paragraph 933 also reveals that one way to address longer strings would be to expand the size of our private encryption key); generating an obfuscated version of the protected dataset using the monotonic one-way function, wherein the monotonic one-way function operates with the determined one or more coefficient (paragraphs 355, 583-589 disclose public key equation and D x = α * x + β * r _ x for obfuscation/anonymization/ Ratio Less Encryption which uses the monotonic one-way function and the determined coefficients/random numbers). It would have been obvious to one having ordinary skill in the art before the effective filing date of the claimed invention to modify the coefficients and obfuscation functions in Pieniazek’s method of obfuscating protected data set with Trepetin’s generated obfuscated dataset using the monotonic one-way function and coefficients to provide an obfuscation system capable of querying obfuscated databases and obtaining the same results as if performing the queries against the original, unencrypted data all while being done with little actual impact to query speed (paragraph 6 of Trepetin). The combination of Pieniazek in view of Trepetin does not teach, but Moon teaches the protected dataset [includes] numerical values arranged in a linear order (paragraph 49 discloses the protected data set wherein plain text 1 is less than a plain text 2); wherein the obfuscation function is a monotonic one-way function (paragraph 46-49 disclose an encryption comparison code generated using an order preserving hash function. If a plain text 1 is less than a plain text 2, then the function(plaint text 1) is less than function(plain text 2). Hash functions that preserves the order of the input data such that the output hash values will be ordered are monotone hash functions. Therefore, the linear order is maintain); generating an obfuscated version of the dataset using the monotonic one-way function that maintains the linear order of the protected dataset (paragraph 46-49 disclose an encryption comparison code generated using an order preserving hash function. If a plain text 1 is less than a plain text 2, then the function(plaint text 1) is less than function(plain text 2). Hash functions that preserves the order of the input data such that the output hash values will be ordered are monotone hash functions. Therefore, the linear order is maintain). It would have been obvious to one having ordinary skill in the art before the effective filing date of the claimed invention to modify the coefficients and obfuscation functions in Pieniazek’s method of obfuscating protected data set in view of Trepetin’s generated obfuscated dataset using the monotonic one-way function and coefficients with Moon’s teachings of monotonic ordered preserving functions to provide an improved encryption system and method capable of querying anonymized electronic databases and obtaining the same ordered results as if performing the queries against the original, unencrypted data all while being done with little actual impact to query speed (paragraph 6 of Moon). As to claim 2, the combination of Pieniazek in view of Trepetin and Moon teaches wherein the numerical values include one or more of the following: is currency values, birthdates, ages, medical metrics, health metrics, rankings, ratings, or confidential business information values (Pieniazek: paragraph 23 discloses the sensitive information can include account number, identification number, and credit score associated with a user). As to claim 3, the combination of Pieniazek in view of Trepetin and Moon teaches further comprising creating a new column in a database table for storing the obfuscated version of the protected dataset (Trepetin: paragraph 44 discloses anonymizing the first database table by copying it into a temporary table is performed. Besides the original table's columns, the temporary table introduces special columns so that client workstations can properly query the anonymized data after anonymization. Paragraphs 845-846 disclose the temporary table dataset such as salary and bonus is sent to the cloud for storage). The motivation is similar to the motivation presented in claim 1. As to claim 4, the combination of Pieniazek in view of Trepetin and Moon teaches wherein providing the access to the obfuscated version of the protected dataset as the comparable alternative for the protected dataset includes performing a comparison query (Pieniazek: paragraph 49 discloses receiving a query to perform a processing operation and the query is to data structures that store obfuscated datasets; paragraph 49 discloses the request is to obtain access/receive data for certain types of information. Paragraphs 50- 52 and 59 disclose matching the query parameter to one or more sets of obfuscated data. The query parameter can identify or otherwise indicate the entity or information type using obfuscated data. For instance, the computing device that sends the request or query can access the obfuscation key and generate an obfuscated version of an identifier for the entity or information type. Paragraph 59 discloses upon a match from the query parameter, the system can transmit the obfuscated data to the user/requestor), wherein the comparison query references a first argument, and wherein the first argument includes an obfuscated value included in the obfuscated version of the protected dataset (Pieniazek: paragraphs 50- 52 and 59 disclose matching the query parameter to one or more sets of obfuscated data. The query parameter can identify or otherwise indicate the entity or information type using obfuscated data. For instance, the computing device that sends the request or query can access the obfuscation key and generate an obfuscated version of an identifier for the entity or information type. The obfuscated version of the identifier can then become the query parameter, which is the first argument, wherein the obfuscated value of the identifier is the obfuscated value). As to claim 8, the combination of Pieniazek in view of Trepetin and Moon teaches further comprising removing access to the protected dataset, wherein the protected dataset is stored as plain text values (Pieniazek: paragraph 13 discloses obfuscating the sensitive data and processing the obfuscated data reduce unauthorized access to the electrically stored sensitive data. Paragraphs 56-57 disclose the client data is stored in a database). As to claim 9, the combination of Pieniazek in view of Trepetin and Moon teaches wherein the obfuscation function includes a polynomial with one or more positive coefficients (Trepetin: paragraph 68 discloses anonymization/obfuscation the data through the use of mathematical function with specially chosen randomized parameters/coefficient, the values are transformed using monotonic mathematical function. Anonymization is a form of obfuscation); paragraph 355 discloses a monotonic mathematical function/polynomial with coefficients of α and β. Paragraph 426 refers to the coefficients as random constants. Paragraph 510 reveals the random numbers/coefficients are generated using Gaussian random number generator. This random number generator uses a seed value/key, generating positive coefficients). The motivation is similar to the motivation presented in claim 1. As to claim 10, the combination of Pieniazek in view of Trepetin and Moon teaches wherein determining the one or more coefficients for the obfuscation function based at least in part on the key includes setting each of the one or more positive coefficients of the obfuscation function using at least a portion of the key (Trepetin: paragraph 68 discloses anonymization/obfuscation the data through the use of mathematical function with specially chosen randomized parameter/coefficient, the values are transformed using monotonic mathematical function. Anonymization is a form of obfuscation); paragraph 355 discloses a monotonic mathematical function with coefficients of α and β. Paragraph 426 refers to the coefficients as random constants. Paragraph 510 reveals the random numbers/coefficients are generated using Gaussian random number generator. This random number generator uses a seed value/key; paragraphs 355, 583-589 disclose public key equation and D x = α * x + β * r _ x for obfuscation/anonymization/ Ratio Less Encryption which uses the monotonic one-way function and the determined coefficients/random numbers). The motivation is similar to the motivation presented in claim 1. As to claim 13, the combination of Pieniazek in view of Trepetin and Moon teaches wherein the key is a secret value is selected using a cryptographic random number generator (Trepetin: Paragraph 510 reveals the random numbers/coefficients are generated using Gaussian random number generator. This random number generator uses a seed value/key; paragraphs 355, 583-589 disclose public key equation and D x = α * x + β * r _ x for obfuscation/anonymization/ Ratio Less Encryption which uses the monotonic one-way function and the determined coefficients/random numbers). The motivation is similar to the motivation presented in claim 1. As to claim 14, Pieniazek teaches a system (Figure 6 discloses Obfuscated-Data Processing System), comprising: one or more processors (Figure 6, reference number 602 “Processor”); and a memory (Figure 6, reference number 604 “Memory”) coupled to the one or more processors (Figure 6, reference number 602 “Processor”), wherein the memory is configured to provide the one or more processors with instructions which when executed cause the one or more processors (paragraph 62 disclose the processor is communicatively coupled to a memory. The processor executes computer-executable program code stored in the memory, accesses information stored in the memory, or both) to: access, at an application platform (paragraph 16-17 discloses the obfuscated-data processing system/application platform), a protected dataset to obfuscate including numerical values (paragraph 39 discloses generating obfuscated data from the received data having sensitive information; paragraph 42 discloses determining the symbols/characters of the dataset to remain the same and the symbols/characters of the dataset to be masked/obfuscated. Paragraphs 3 and 23 disclose the data can include personal information that includes numerical values such as address, credit score, account number, and social security number. Paragraph 62 discloses obfuscated-data processing system/application platform can involves program code/obfuscation service may include machine-executable instructions that may represent a procedure, a function) including data elements that are to remain comparable with one another after the obfuscation (paragraph 13 discloses various sets of sensitive information can be obfuscated using a common obfuscation key to generate sets of obfuscated data in a form by which the obfuscated data can be processed/matched/compared without revealing the underlying sensitive information. For example, the sets of obfuscated data can be processed to identify records in each set that are likely to refer to the same entity or that include the same type of information. Paragraph 14 provides an example such as an obfuscated dataset includes obfuscated data items, such as a first record with the string “Tcvaxvi Uvmcivs,” which is an obfuscated version of the string “Stephen Leitner,” and a second record with the string “Tcvqv Uvmcivs,” which is an obfuscated version of the string “Steve Leitner.” The obfuscated strings in the first and second records have a relationship (i.e., the presence of “Tcv . . . Uvmcivs) that corresponds to a relationship between the non-obfuscated strings (i.e., the presence of “Ste . . . Leitner” in both “Steve Leitner” and “Stephen Leitner”). Therefore, data element “Tcv” in the obfuscated data remains in the two obfuscated data elements that are comparable with each other. Paragraph 44 also disclose linking a single symbol with a single other symbol can maintain relationships both between the symbols within the data string and between data having similar data strings); select, by an obfuscation service accessible to the application platform, an obfuscation function for the protected dataset (paragraphs 40-43 reveal applying permutation cycles to a set of symbols. A permutation is a function. The function is x[i]->L[x[i]], wherein L is the coefficient. Paragraph 39 discloses generating obfuscated data from the received data having sensitive information. A processing device can obfuscate the data by performing an operation. Paragraph 62 discloses obfuscated-data processing system/application platform can involves program code/obfuscation service may include machine-executable instructions that may represent a procedure, a function); determine, by the obfuscation service (paragraph 62 discloses obfuscated-data processing system/application platform can involves program code/obfuscation service may include machine-executable instructions that may represent a procedure, a function), utilizing a key associated with the protected dataset, one or more coefficients for the [obfuscation function] based at least in part on the key (paragraph 34 reveals each type of sensitive data can be obfuscated using a different obfuscation key. Paragraph 40 reveals the obfuscation key can include a lookup table, wherein the obfuscation function is x[i]->L[x[i]], wherein L is the coefficient/ and values in the look-up table. Paragraphs 41-43 disclose a look-up table can be generated by applying permutations. A base permutation is formed from a natural number sequency key. A permutation S∈S.sub.n can be generated with a specified cycle structure based on the base permutation. The number of symbols n can be partitioned into k.sub.i different cycles. The maximum size and minimum size for k.sub.i can be configured); generate, by the obfuscation service, (paragraph 62 discloses obfuscated-data processing system/application platform can involves program code/obfuscation service may include machine-executable instructions that may represent a procedure, a function) an obfuscated version of the protected dataset using the [obfuscation function] with the determined one or more coefficients (paragraph 39 discloses using the obfuscated data processing system, wherein the system uses an obfuscation key and permutation (wherein the obfuscation key and permutation are discussed in paragraphs 40-43) to generate obfuscated data from the received sensitive dataset); and provide, to the application platform (paragraph 16-17 discloses the obfuscated-data processing system/application platform includes a trusted middle subsystem), access to the obfuscated version of the protected dataset as a comparable alternative for the protected dataset (paragraph 17 discloses providing the trusted middle subsystem with obfuscated versions of data associated with each user of the attribute provider. Paragraph 13 discloses various sets of sensitive information can be obfuscated using a common obfuscation key to generate sets of obfuscated data in a form by which the obfuscated data can be processed/matched/compared without revealing the underlying sensitive information). Pieniazek does not teach the protected dataset including numerical values arranged in a linear order; wherein the obfuscation function is a monotonic one-way function; determine one or more coefficients for the monotonic one-way function based at least in part on a key, wherein a length of the key is selected based on a size of the protected dataset; generate an obfuscated version of the dataset using the monotonic one-way function that maintains the linear order of the protected dataset, wherein the monotonic one-way function operates with the determined one or more coefficients. Trepetin teaches wherein the obfuscation function is a monotonic one-way function (paragraph 68 discloses anonymization/obfuscation the data through the use of mathematical function with specially chosen randomized parameters/coefficient, the values are transformed using monotonic mathematical function. Anonymization is a form of obfuscation); determining one or more coefficients for the monotonic one-way function based at least in part on a key (paragraph 355 discloses a monotonic mathematical function with coefficients of α and β. Paragraph 426 refers to the coefficients as random constants. Paragraph 510 reveals the random numbers/coefficients are generated using Gaussian random number generator. This random number generator uses a seed value/key), wherein a length of the key is selected based on a size of the protected dataset (paragraph 74 discloses the limitation of the obfuscation service utilizing a key associated with the protected dataset and wherein a length of the key is selected based on the size of the protected dataset. A string length of 10000 would result in the creation of a premutation matrix mapping each length 1-10000to a 3 position lower case character value. The permutation matrix becomes part of the A1 table private key. Paragraph 933 also reveals that one way to address longer strings would be to expand the size of our private encryption key); generating an obfuscated version of the protected dataset using the monotonic one-way function with the determined one or more coefficients (paragraphs 355, 583-589 disclose public key equation and D x = α * x + β * r _ x for obfuscation/anonymization/ Ratio Less Encryption which uses the monotonic one-way function and the determined coefficients/random numbers). It would have been obvious to one having ordinary skill in the art before the effective filing date of the claimed invention to modify the coefficients and obfuscation functions in Pieniazek’s method of obfuscating protected data set with Trepetin’s generated obfuscated dataset using the monotonic one-way function and coefficients to provide an obfuscation system capable of querying obfuscated databases and obtaining the same results as if performing the queries against the original, unencrypted data all while being done with little actual impact to query speed (paragraph 6 of Trepetin). The combination of Pieniazek in view of Trepetin does not teach, but Moon teaches the protected dataset [includes] numerical values arranged in a linear order (paragraph 49 discloses the protected data set wherein plain text 1 is less than a plain text 2); wherein the obfuscation function is a monotonic one-way function (paragraph 46-49 disclose an encryption comparison code generated using an order preserving hash function. If a plain text 1 is less than a plain text 2, then the function(plaint text 1) is less than function(plain text 2). Hash functions that preserves the order of the input data such that the output hash values will be ordered are monotone hash functions. Therefore, the linear order is maintain); generating an obfuscated version of the dataset using the monotonic one-way function that maintains the linear order of the protected dataset (paragraph 46-49 disclose an encryption comparison code generated using an order preserving hash function. If a plain text 1 is less than a plain text 2, then the function(plaint text 1) is less than function(plain text 2). Hash functions that preserves the order of the input data such that the output hash values will be ordered are monotone hash functions. Therefore, the linear order is maintain). It would have been obvious to one having ordinary skill in the art before the effective filing date of the claimed invention to modify the coefficients and obfuscation functions in Pieniazek’s method of obfuscating protected data set in view of Trepetin’s generated obfuscated dataset using the monotonic one-way function and coefficients with Moon’s teachings of monotonic ordered preserving functions to provide an improved encryption system and method capable of querying anonymized electronic databases and obtaining the same ordered results as if performing the queries against the original, unencrypted data all while being done with little actual impact to query speed (paragraph 6 of Moon). As to claim 15, the combination of Pieniazek in view of Trepetin and Moon teaches wherein the memory is further configured to provide the one or more processors with the instructions which when executed cause the one or more processors (Pieniazek: paragraph 62 discloses the processor is communicatively coupled to a memory. The processor executes computer-executable program code stored in the memory, accesses information stored in the memory, or both) to create a new column in a database table for storing the obfuscated version of the protected dataset (Trepetin: paragraph 44 discloses anonymizing the first database table by copying it into a temporary table is performed. Besides the original table's columns, the temporary table introduces special columns so that client workstations can properly query the anonymized data after anonymization. Paragraphs 845-846 disclose the temporary table dataset such as salary and bonus is sent to the cloud for storage). The motivation is similar to the motivation presented in claim 14. As to claim 16, the combination of Pieniazek in view of Trepetin and Moon teaches wherein causing the one or more processors to ( Pieniazek: paragraph 62 ) provide the access to the obfuscated version of the protected dataset as the comparable alternative for the protected dataset includes performing a comparison query (Pieniazek: paragraph 49 discloses receiving a query to perform a processing operation and the query is to data structures that store obfuscated datasets; paragraph 49 discloses the request is to obtain access/receive data for certain types of information. Paragraphs 50- 52 and 59 disclose matching the query parameter to one or more sets of obfuscated data. The query parameter can identify or otherwise indicate the entity or information type using obfuscated data. For instance, the computing device that sends the request or query can access the obfuscation key and generate an obfuscated version of an identifier for the entity or information type. Paragraph 59 discloses upon a match from the query parameter, the system can transmit the obfuscated data to the user/requestor), wherein the comparison query references a first argument, and wherein the first argument includes an obfuscated value included in the obfuscated version of the protected dataset (Pieniazek: paragraphs 50- 52 and 59 disclose matching the query parameter to one or more sets of obfuscated data. The query parameter can identify or otherwise indicate the entity or information type using obfuscated data. For instance, the computing device that sends the request or query can access the obfuscation key and generate an obfuscated version of an identifier for the entity or information type. The obfuscated version of the identifier can then become the query parameter, which is the first argument, wherein the obfuscated value of the identifier is the obfuscated value). As to claim 18, the combination of Pieniazek in view of Trepetin and Moon teaches wherein the obfuscation function includes a polynomial with one or more positive coefficients (Trepetin: paragraph 68 discloses anonymization/obfuscation the data through the use of mathematical function with specially chosen randomized parameters/coefficient, the values are transformed using monotonic mathematical function. Anonymization is a form of obfuscation); paragraph 355 discloses a monotonic mathematical function/polynomial with coefficients of α and β. Paragraph 426 refers to the coefficients as random constants. Paragraph 510 reveals the random numbers/coefficients are generated using Gaussian random number generator. This random number generator uses a seed value/key, generating positive coefficients). The motivation is similar to the motivation presented in claim 14. As to claim 19, the combination of Pieniazek in view of Trepetin and Moon teaches wherein causing the one or more processors (Pieniazek: paragraph 62 discloses the processor is communicatively coupled to a memory. The processor executes computer-executable program code stored in the memory, accesses information stored in the memory, or both) to automatically determine the one or more coefficients for the obfuscation function based at least in part on the key includes causing the one or more processors to set each of the one or more positive coefficients of the obfuscation function using at least a portion of the key (Trepetin: paragraph 68 discloses anonymization/obfuscation the data through the use of mathematical function with specially chosen randomized parameters/coefficient, the values are transformed using monotonic mathematical function. Anonymization is a form of obfuscation); paragraph 355 discloses a monotonic mathematical function with
Read full office action

Prosecution Timeline

Oct 03, 2022
Application Filed
Oct 07, 2024
Non-Final Rejection — §101, §103
Feb 11, 2025
Response Filed
Mar 10, 2025
Final Rejection — §101, §103
May 06, 2025
Applicant Interview (Telephonic)
May 06, 2025
Examiner Interview Summary
May 19, 2025
Response after Non-Final Action
Jul 15, 2025
Response after Non-Final Action
Jul 21, 2025
Request for Continued Examination
Jul 28, 2025
Response after Non-Final Action
Aug 04, 2025
Non-Final Rejection — §101, §103
Oct 21, 2025
Interview Requested
Oct 29, 2025
Applicant Interview (Telephonic)
Oct 29, 2025
Examiner Interview Summary
Nov 05, 2025
Response Filed
Nov 20, 2025
Final Rejection — §101, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12598186
INTELLIGENT RESOURCE ALLOCATION BASED ON SECURITY PROFILE OF EDGE DEVICE NETWORK
2y 5m to grant Granted Apr 07, 2026
Patent 12579299
USING VENDOR-INDEPENDENT PROTOCOLS TO PERFORM IDENTITY AND ACCESS MANAGEMENT FOR ELECTRONIC MEDICAL RECORD INSTANCES
2y 5m to grant Granted Mar 17, 2026
Patent 12572694
DATA PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
2y 5m to grant Granted Mar 10, 2026
Patent 12561421
DIAGNOSE INSTRUCTION TO EXECUTE VERIFICATION CERTIFICATE RELATED FUNCTIONS
2y 5m to grant Granted Feb 24, 2026
Patent 12549630
System And Method for Managing Data Stored in A Remote Computing Environment
2y 5m to grant Granted Feb 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

5-6
Expected OA Rounds
60%
Grant Probability
95%
With Interview (+34.8%)
3y 1m
Median Time to Grant
High
PTA Risk
Based on 259 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month