Prosecution Insights
Last updated: April 19, 2026
Application No. 18/033,177

SMART DEVICE FOR AUTHORIZING MERCHANDISE SECURITY KEYS

Non-Final OA §102§103
Filed
Apr 21, 2023
Examiner
HAILE, BENYAM
Art Unit
2688
Tech Center
2600 — Communications
Assignee
Invue Security Products Inc.
OA Round
3 (Non-Final)
62%
Grant Probability
Moderate
3-4
OA Rounds
2y 5m
To Grant
87%
With Interview

Examiner Intelligence

Grants 62% of resolved cases
62%
Career Allow Rate
428 granted / 691 resolved
At TC average
Strong +25% interview lift
Without
With
+25.1%
Interview Lift
resolved cases with interview
Typical timeline
2y 5m
Avg Prosecution
55 currently pending
Career history
746
Total Applications
across all art units

Statute-Specific Performance

§101
2.5%
-37.5% vs TC avg
§103
54.7%
+14.7% vs TC avg
§102
16.0%
-24.0% vs TC avg
§112
20.9%
-19.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 691 resolved cases

Office Action

§102 §103
DETAILED ACTION The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Status of Claims Claims 1-8, 10-14, 16-19, 21-25 are pending. Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. Claim(s) 1-8, 10-14, 16, 19, 21-25 is/are rejected under 35 U.S.C. 102(a)(1) as being anticipated by Grant et al. [US 20160222699]. As to claim 1. Grant discloses A merchandise security system comprising: a merchandise security key, [figs. 1, 7, 0022, 0039] electronic key 10, 20, comprising wireless communication circuitry, [fig. 7, 0041] wireless communication system 34; and a smartphone or a mobile phone, [fig. 1, 0023] smart device 12 is a smart phone, comprising wireless communication circuitry, [fig. 3, 0028] communication system 58, [0029] electronic key 10 communicate with the smart device 12 wirelessly, the merchandise security key initially not authorized by the smartphone or the mobile device to operate a merchandise security device, [0027] smart device 10 activates the electronic key after the user enters a password into the smart device 12; wherein the smartphone or the mobile phone is configured to communicate with the merchandise security key to exchange data, [0030] security disarm code SDC programmed to the key 10 using the smart device 12; [0040] wherein the key 20 receives the SDC, via respective wireless communication circuitry, [0029, 0041], to subsequently determine whether to authorize the merchandise security key to operate the merchandise security device at least partially based on the data, [0027] wherein the smart device 12 controls the electronic key 10 and enable the use of the electronic key after a password is entered; [0037] wherein the smart device deactivates the key based on a predetermined condition set by the transferred data, and wherein the merchandise security key that has been authorized is configured to operate the merchandise security device, independent of the smartphone or mobile device, [0024] the key 10 may include battery and be an active device, for communicating with the merchandise security device 16, [0024] as opposed to being passive and not operating unless coupled to the smart device 12. As to claim 2. Grant discloses The merchandise security system of Claim 1, wherein the merchandise security key comprises a housing, [fig. 2A, 4], and a source of electrical power disposed within the housing, [0024, 0040]. As to claim 3. Grant discloses The merchandise security system of Claim 2, wherein the merchandise security key is operable for transferring electrical power to the merchandise security device from the source of electrical power, [0022, 0024], if the merchandise security key is authorized by the smartphone or the mobile phone to operate the merchandise security device, [0024, 0027]. As to claim 4. Grant discloses The merchandise security system of Claim 1, wherein the merchandise security key comprises an Infrared (IR) transceiver for transmitting an IR transmission to the merchandise security device and for receiving an IR transmission from the merchandise security device, [0041, 0044]. As to claim 5. Grant discloses The merchandise security system of Claim 4, wherein the IR transmission of the merchandise security key comprises a security code, [0041, 0044] communicate data and power using IR; [0030] wherein the data includes a security disarm code SDC. As to claim 6. Grant discloses The merchandise security system of Claim 1, wherein the wireless communication circuitry of each of the merchandise security key and the smartphone or the mobile phone comprises NFC communication circuitry, [0023, 0029]. As to claim 7. Grant discloses The merchandise security system of Claim 6, wherein each of the merchandise security key and the smartphone or the mobile phone comprises a NFC tag for communicating via NFC, [0029]. As to claim 8. Grant discloses The merchandise security system of Claim 7, wherein the NFC tag of the smartphone or the mobile phone is configured to read information from the NFC tag of the merchandise security key, [0029]. As to claim 10. Grant discloses The merchandise security system of Claim 1, further comprising a programming station configured to generate a security code, [0030], each of the merchandise security key and the merchandise security device configured to store the security code, [0030] key programmed with SDC, and [0034] device 16 includes SDC, and wherein the merchandise security key is configured to operate the merchandise security device only if the security codes match one another, [0035]. As to claim 11. Grant discloses The merchandise security system of Claim 1, wherein the merchandise security key is configured to be inactivated after a predetermined period of time, [0037], and wherein the smartphone or the mobile phone is configured to communicate with the merchandise security key to reactivate the merchandise security key, [0037] refreshed using the key. As to claim 12. Grant discloses The merchandise security system of Claim 1, wherein the merchandise security key is not programmed or authorized using a programming or authorization station, [0030] self-programming key. As to claim 13. Grant discloses The merchandise security system of Claim 1, wherein the smartphone or the mobile phone is not a programming station or an authorization station, [0030] programming station, that is not the smart device, further included in the system. As to claim 14. Grant discloses The merchandise security system of Claim 1, wherein the merchandise security key is configured to be inactivated based on a proximity of the merchandise security key relative to the smartphone or the mobile phone, [0044] key only transfers power to the security device when the key is sufficiently proximate to the device. As to claim 16. Grant discloses The merchandise security system of Claim 1, wherein the smartphone or the mobile phone is configured to operate the merchandise security device, [0022, 0028]. As to claim 19. Grant discloses The merchandise security system of Claim 1, wherein the merchandise security key is configured to automatically communicate with the smartphone or the mobile phone when within a predetermined distance of one another, [0029] the key 10 and the smart device 12 communicate using an NFC tag, NFC tags only communicate when the tags are within a predetermined distance of one another. As to claim 21. Grant discloses A system comprising: a programmable key, [figs. 1, 7, 0022, 0039] electronic key 10, 20, comprising wireless communication circuitry, [0029] electronic key 10 communicate with a security device 16 wirelessly, the programmable key configured to communicate with and operate a wireless device, [0022] electronic key 10 operates the security device 16; and a smartphone or a mobile phone, [fig. 1, 0022] smart device 12 that is a smart phone, comprising wireless communication circuitry, [fig. 3, 0028] communication system 58, [0029] electronic key 10 communicate with the smart device 12 wirelessly; wherein the smartphone or the mobile phone is configured to communicate with the programmable key via respective wireless communication circuitry, [0029, 0030, 0040], to determine whether to authorize the programmable key to operate the wireless device, [0027] wherein the smart device 12 controls the electronic key 10 and enable the use of the electronic key after a password is entered; [0037] wherein the smart device deactivates the key based on a predetermined condition, wherein the programmable key is configured to be inactivated after a predetermined period of time such that the programmable key is incapable of operating the wireless device, [0037], and wherein the smartphone or the mobile phone is configured to communicate with the programmable key to reactivate the programmable key to allow the programmable key to operate the wireless device, [0037] the key needs to be refreshed by a programming station to be used to control the device 16; [0030] wherein the smart device 12 can be used as the programming station, and wherein the programmable key that has been reactivated is configured to operate the wireless device, independent of the smartphone or mobile device, [0024] the key 10 may include battery and be an active device, for communicating with the merchandise security device 16, [0024] as opposed to being passive and not operating unless coupled to the smart device 12. As to claim 22. Grant discloses A method comprising: wirelessly communicating between a merchandise security key, [fig. 1, 4, 0022, 0039] electronic key 10, and a smartphone or the mobile phone, [fig. 1, 0022] smart device 12, via respective wireless communication circuitry, [0029, 0030, 0040] electronic key 10 communicate with the smart device 12 wirelessly, the merchandise security key initially not authorized by the smartphone or the mobile phone to operate a merchandise security device, [0024] the electronic key 10 may not be operatable unless coupled to a smart device 12; receiving an input of user credentials at the smartphone or the mobile phone or the merchandise security key, [0027] receive user credentials; exchanging data between the smartphone or the mobile phone and the merchandise security key via the respective wireless communication circuitry, [0029, 0030, 0040] the smart device 12 and the key 10 communicate with each other; determining with the smartphone or the mobile phone whether to authorize the merchandise security key to operate the merchandise security device based on the user credentials and the data, [0027, 0028] authorized users can operate the device 16 using the key 10; and operating the merchandise security device with the merchandise security key, independent of the smartphone or the mobile phone, [0024] the key 10 may include battery and be an active device, for communicating with the merchandise security device 16, [0024] as opposed to being passive and not operating unless coupled to the smart device 12, after the merchandise security key is authorized, [0027] user credential required before the device 16 can be operated. As to claim 23. Grant discloses The merchandise security system of Claim 1, wherein the data comprises a user ID, [0027, 0030]. As to claim 24. Grant discloses The merchandise security system of Claim 1, wherein the data comprises a security code or identifier, [0030]. As to claim 25. Grant discloses The merchandise security system of Claim 1, wherein the merchandise security key is not coupled to the smartphone or mobile device via a wired connection, [0029] key 10 communicates with smart device 12 wirelessly. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claim(s) 17, 18 is/are rejected under 35 U.S.C. 103 as being unpatentable over Grant in view of Fuerstner [US 20190349201]. As to claim 17. Grant fails to disclose The merchandise security system of Claim 1, wherein the merchandise security key is a card having a memory, and processor and an antenna. Fuerstner teaches a protection device 2, a dongle 6 and a smart phone 10; wherein the protection device is operated when the dongle is authorized using the smart phone, [0054]; wherein the dongle 6 is implemented as a smart card, [0057], comprising a controller, a wireless communicator, [fig. 3, 0055], with an antenna, [0053], and an internal memory, [0054]. It would have been obvious for one of ordinary skill in the art at the time of the filing of the claimed invention to combine the teachings of Grant with that of Fuerstner so that the key of Grant can be implemented to be carried inside a card wallet of the user for easy storage. As to claim 18. Grant discloses The merchandise security system of Claim 17, wherein the card is configured to transfer power to the merchandise security device for operating the merchandise security device, [0022, 0024]. Response to Arguments Applicant's arguments fail to comply with 37 CFR 1.111(b) because they amount to a general allegation that the claims define a patentable invention without specifically pointing out how the language of the claims patentably distinguishes them from the references. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to BENYAM HAILE whose telephone number is (571)272-2080. The examiner can normally be reached 7:00 AM - 5:30 PM Mon. - Thur.. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Steven Lim can be reached at (571)270-1210. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /Benyam Haile/Primary Examiner, Art Unit 2688
Read full office action

Prosecution Timeline

Apr 21, 2023
Application Filed
Sep 07, 2024
Non-Final Rejection — §102, §103
Mar 10, 2025
Response Filed
Mar 18, 2025
Final Rejection — §102, §103
Sep 19, 2025
Request for Continued Examination
Oct 08, 2025
Response after Non-Final Action
Oct 19, 2025
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12592108
System and Method for Authenticating User of Robotaxi
2y 5m to grant Granted Mar 31, 2026
Patent 12592713
SYSTEM AND METHOD FOR CONVERTING DIRECT ANALOG SAMPLES TO COMPRESSED DIGITIZED SAMPLES
2y 5m to grant Granted Mar 31, 2026
Patent 12582578
COMPLIANCE KIT AND SYSTEM
2y 5m to grant Granted Mar 24, 2026
Patent 12580576
SUCCESSIVE APROXIMATION REGISTER ANALOG TO DIGITAL CONVERTERS INCLUDING BUILT-IN SELF-TEST
2y 5m to grant Granted Mar 17, 2026
Patent 12567322
Discovery Of And Connection To Remote Devices
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
62%
Grant Probability
87%
With Interview (+25.1%)
2y 5m
Median Time to Grant
High
PTA Risk
Based on 691 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month