Prosecution Insights
Last updated: April 19, 2026
Application No. 18/067,690

PROVISIONING CREDENTIALS ON MULTIPLE ELECTRONIC DEVICES

Final Rejection §103§112
Filed
Dec 16, 2022
Examiner
RAK, TAYLOR SIMON DUANE
Art Unit
3697
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Apple Inc.
OA Round
2 (Final)
46%
Grant Probability
Moderate
3-4
OA Rounds
3y 8m
To Grant
99%
With Interview

Examiner Intelligence

Grants 46% of resolved cases
46%
Career Allow Rate
59 granted / 128 resolved
-5.9% vs TC avg
Strong +54% interview lift
Without
With
+54.4%
Interview Lift
resolved cases with interview
Typical timeline
3y 8m
Avg Prosecution
16 currently pending
Career history
144
Total Applications
across all art units

Statute-Specific Performance

§101
25.6%
-14.4% vs TC avg
§103
31.2%
-8.8% vs TC avg
§102
9.5%
-30.5% vs TC avg
§112
27.7%
-12.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 128 resolved cases

Office Action

§103 §112
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Arguments/Amendments Regarding rejection of the claims under 35 USC 101, the amendments overcome the prior rejection by integrating the abstract idea into a practical application for reprovisioning credentials to a new device using external storage means. The rejection is hereby withdrawn. Regarding rejection of the claims under 35 USC 112(a) and 112(b), the amendments overcome the prior rejections. However, the amendments introduce new issues under 35 USC 112(b). Please see the new rejections below. Regarding rejection of the claims under 35 USC 102 over Holtmanns, Applicant submits that the prior art does not disclose: “storing the at least a portion of the provisioned credential that includes at least the unique credential value in an external storage device.” The Examiner respectfully disagrees. Fig. 2 and paragraphs 0024 and 0071 of Holtmanns disclose the old device sending the credentials for reprovisioning to the server 205 which then stores said credentials until a provisioning request is received from the new device. Therefore, Holtmanns discloses: “storing the at least a portion of the provisioned credential that includes at least the unique credential value in an external storage device.” The rejection is maintained. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 1-20 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Claims 1, 8, and 15 recite, “cause the at least a portion of the provisioned credential to be provided from the external storage device to a second computing device.” It is unclear who is “causing” the provisioned credential to be provided from the external storage device to the second computing device. The preambles of claims 8 and 15 appear to indicate that the first computing device is the entity performing the “causing” step, however, the scope of the claim is broad enough to allow any device to feasibly perform the “causing” step (e.g. the external storage device itself or the second computing device). Therefore, the scope of the claims is unclear. Claims 2-7, 9-14, and 16-20 are also rejected due to their dependence on at least claim 1, 8, or 15. Claims 8 and 15 further recite, “wherein generating the reprovisioned credential comprises the second secure element executing a personalization script and encrypting the reprovisioned credential to provision the reprovisioned credential such that the the second computing device is enabled to perform a transaction using the reprovisioned credential.” However, claims 8 and 15 are both clearly directed to a first computing device and its associated operations. Therefore, as the second computing device is not a part of the first computing device, it is unclear whether the second computing device and its associated operations are included within the scope of the claims. Claims 9-14 and 16-20 are also rejected due to their dependence on at least claim 8 or 15. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. This application currently names joint inventors. In considering patentability of the claims the examiner presumes that the subject matter of the various claims was commonly owned as of the effective filing date of the claimed invention(s) absent any evidence to the contrary. Applicant is advised of the obligation under 37 CFR 1.56 to point out the inventor and effective filing dates of each claim that was not commonly owned as of the effective filing date of the later invention in order for the examiner to consider the applicability of 35 U.S.C. 102(b)(2)(C) for any potential 35 U.S.C. 102(a)(2) prior art against the later invention. Claims 1-3, 8-10, and 15-17 are rejected under 35 U.S.C. 103 as being unpatentable over Holtmanns et al. (2012/0239936 "Holtmanns"). Regarding claims 1, 8, and 15, Holtmanns discloses: A method, non-transitory computer readable storage medium, and a first computing device, for provisioning credentials on computing devices, comprising: receiving, at a first computing device, a request to provide at least a portion of a provisioned credential on the first computing device, wherein the provisioned credential is based at least in part on a first value that is unique to: a first secure element of the first computing device, and a unique credential value (Fig. 1b, Fig. 2, 0036, 0046-0047, 0050, 0066); storing the at least a portion of the provisioned credential that includes at least the unique credential value in an external storage device (Fig. 2, 0024, 0071); cause the at least a portion of the provisioned credential to be provided from the external storage device to a second computing device to cause the second computing device to generate a reprovisioned credential based on: the at least a portion of the provisioned credential, and a second value that is unique to a second secure element of the second computing device (Fig. 1b, Fig. 2, 0024, 0046-0047, 0060-0061, 0071, 0078-0083). Holtmanns does not disclose: and wherein generating the reprovisioned credential comprises the second secure element executing a personalization script and encrypting the reprovisioned credential to provision the reprovisioned credential such that the the second computing device is enabled to perform a transaction using the reprovisioned credential. However, the above limitations merely recite the intended result(s) of causing the at least a portion of the provisioned credential to be provided from the external device to the second computing device. As such, the above limitations will not differentiate the claims from the prior art. Applicant(s) are reminded that intended result language does not have patentable weight. See Texas Instruments Inc. v. International Trade Commission, 26 USPQ2d 1010 (Fed. Cir. 1993); Amazon.com Inc. v. Barnesandnoble.com Inc., 57 USPQ2d 1747 (CAFC 2001). ("A (whereby/wherein) clause that merely states the result of the limitations in the claim adds nothing to the patentability or substance of the claim"); Griffin v. Bertina, 62 USPQ2d 1431 (Fed. Cir. 2002). Regarding claims 2, 9, and 16, Holtmanns discloses all limitations of claims 1, 8, and 15. Holtmanns further discloses: wherein the external storage device is a Card on File (CoF) storage device (Fig. 2, 0024, 0071-0083). Regarding claims 3, 10, and 17, Holtmanns discloses all limitations of claims 1, 8, and 15. Holtmanns further discloses: wherein the reprovisioned credential is further generated based on an identifier associated with the unique credential value (Fig. 1b, Fig. 2, 0060-0061, 0081-0082). Claims 4, 6-7, 11, 13-14, and 20 is/are rejected under 35 U.S.C. 103 as being unpatentable over Holtmanns in view of Vasu et al. (US 2017/0270517 "Vasu"). Regarding claims 4, 11, and 18, Holtmanns discloses all limitations of claims 3, 10, and 17. Holtmanns does not disclose: wherein the identifier is a card verification value (CVV) that is received as an input at the second computing device prior to generating the reprovisioned credential. However, in the same field of endeavor, Vasu discloses: wherein the identifier is a card verification value (CVV) that is received as an input at the second computing device prior to generating the reprovisioned credential (Fig. 3, 0092-0094). It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention to modify claims 4, 11, and 18 disclosed by Holtmanns by including a CVV received as an input at the provisioning device prior to provisioning/reprovisioning as disclosed by Vasu. One of ordinary skill in the art would have been motivated to make this modification as a simple substitution of one known element for another to obtain predictable results (KSR International Co. v. Teleflex Inc., 550 U.S. 398, 82 USPQ2d 1385 (2007)). Regarding claims 6, 13, and 20, Holtmanns discloses all limitations of claims 1, 8, and 15. Holtmanns does not disclose: wherein the unique credential value comprises a credit card number. However, in the same field of endeavor, Vasu discloses: wherein the unique credential value comprises a credit card number (0035-0040). It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention to modify claims 6, 13, and 20 disclosed by Holtmanns by including a credit card number as disclosed by Vasu. One of ordinary skill in the art would have been motivated to make this modification as a simple substitution of one known element for another to obtain predictable results (KSR International Co. v. Teleflex Inc., 550 U.S. 398, 82 USPQ2d 1385 (2007)). Regarding claims 7 and 14, Holtmanns discloses all limitations of claims 1, 8, and 15. Holtmanns does not disclose: wherein the provisioned credential and the reprovisioned credential enable the first and second computing devices, respectively, to perform financial transactions. However, in the same field of endeavor, Vasu discloses: wherein the provisioned credential and the reprovisioned credential enable the first and second computing devices, respectively, to perform financial transactions. It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention to modify claims 7 and 14 disclosed by Holtmanns by including provisioned credentials enabling financial transactions as disclosed by Vasu. One of ordinary skill in the art would have been motivated to make this modification as a simple substitution of one known element for another to obtain predictable results (KSR International Co. v. Teleflex Inc., 550 U.S. 398, 82 USPQ2d 1385 (2007)). Claims 5, 12, and 19 are rejected under 35 U.S.C. 103 as being unpatentable over Holtmanns in view of Sheets et al. (US 2015/0195133 "Sheets"). Regarding claims 5, 12, and 19, Holtmanns discloses all limitations of claims 1, 8, and 15. Holtmanns does not disclose: wherein the request is issued in response to the second computing device being associated with a user account with which the first computing device is also associated. However in the same field of endeavor, Sheets discloses: wherein the request is issued in response to the second computing device being associated with a user account with which the first computing device is also associated (Fig. 4, 0066-0074). It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention to modify claims 5, 12, and 19 disclosed by Holtmanns by including issuing the request for providing credentials in response to account verification as disclosed by Sheets. One of ordinary skill in the art would have been motivated to make this modification as a simple substitution of one known element for another to obtain predictable results (KSR International Co. v. Teleflex Inc., 550 U.S. 398, 82 USPQ2d 1385 (2007)). Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Mcalear (US 20130110729) generally discloses a method for securely retrieving stored credentials from a removable external storage device (e.g. USB or SD card). Le Saint et al. (US 20160218875) generally discloses methods for securely provisioning credential data from an external storage provider. Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to TAYLOR RAK whose telephone number is (571)270-1575. The examiner can normally be reached Monday-Friday 11:00-7:00 EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, John W Hayes can be reached on 572-272-6708. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /T.R./Examiner, Art Unit 3697 /JOHN W HAYES/Supervisory Patent Examiner, Art Unit 3697
Read full office action

Prosecution Timeline

Dec 16, 2022
Application Filed
Mar 22, 2025
Non-Final Rejection — §103, §112
Jun 05, 2025
Interview Requested
Jun 16, 2025
Applicant Interview (Telephonic)
Jun 16, 2025
Examiner Interview Summary
Aug 22, 2025
Response Filed
Dec 23, 2025
Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12591866
SYSTEM FOR OFF-CHAIN MANAGEMENT, DISTRIBUTION AND AUDITING OF DECENTRALIZED CRYPTOCURRENCY
2y 5m to grant Granted Mar 31, 2026
Patent 12548009
TAPPING A CONTACTLESS CARD TO A COMPUTING DEVICE TO PROVISION A VIRTUAL NUMBER
2y 5m to grant Granted Feb 10, 2026
Patent 12524759
SYSTEMS AND METHODS FOR TRANSACTING OVER A NETWORK
2y 5m to grant Granted Jan 13, 2026
Patent 12483422
SYSTEMS AND METHODS FOR CREDENTIAL-BASED TRANSACTIONS OVER A NETWORK
2y 5m to grant Granted Nov 25, 2025
Patent 12475464
UNIFIED LOGIN BIOMETRIC AUTHENTICATION SUPPORT
2y 5m to grant Granted Nov 18, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
46%
Grant Probability
99%
With Interview (+54.4%)
3y 8m
Median Time to Grant
Moderate
PTA Risk
Based on 128 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month