DETAILED ACTION
Acknowledgements
This action is in response to Applicant’s filing on Jan. 15, 2026, and is made Non-Final. This action is being examined by James H. Miller, who is in the eastern time zone (EST), and who can be reached by email at James.Miller1@uspto.gov or by telephone at (469) 295-9082.
Interviews
Examiner interviews are available by telephone or, preferably, by video conferencing using the USPTO’s web-based collaboration platform. Applicants are strongly encouraged to schedule via the USPTO Automated Interview Request (AIR) portal at http://www.uspto.gov/interviewpractice. Interviews conducted solely for the purpose of “sounding out” the examiner, including by local counsel acting only as a conduit for another practitioner, are not permitted under MPEP § 713.03. The Office is strictly enforcing established interview practice, and applicants should ensure that every interview request is directed toward advancing prosecution on the merits in compliance with MPEP §§ 713 and 713.03.
For after-final Interview requests, supervisory approval is required before an interview may be granted. Each AIR should specifically explain how the After-Final Interview request will advance prosecution—for example, by identifying targeted arguments responsive to the rejection of record, alleged defects in the examiner’s analysis, proposed claim amendments, or another concrete basis for discussion. See MPEP § 713. If the AIR form’s character limits prevent inclusion of all pertinent details, Applicants may send a contemporaneous email to the examiner at James.Miller1@uspto.gov.
The examiner is generally available Monday through Friday, 10:00 a.m. to 4:00 p.m. EST.
For any GRANTED Interview Request, Applicant can expect an email within 24 hours confirming an interview slot from the dates/times proposed and providing collaboration tool access instructions. For any DENIED Interview Request, the record will include a communication explaining the reason for the denial.
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Continued Examination Under 37 CFR 1.114
A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on Jan. 15, 2026, has been entered.
Claim Status
The status of claims is as follows:
Claims 1–20 remain pending and examined with Claims 1 and 11 in independent form.
Claims 1 and 11 are presently amended.
No Claims are presently cancelled or added.
Response to Amendment
Applicant's Amendment has been reviewed against Applicant’s Specification filed Jan. 13, 2023, [“Applicant’s Specification”] and accepted for examination.
Response to Arguments
35 U.S.C. § 101 Argument
Applicant argues that the amended claims recite “a specific computer-implemented transaction-processing mechanism in which a payment intermediary computer system ‘generat[es] ... anomaly-related metric data associated with the financial transaction,’ ‘stor[es] the anomaly-related metric data for use by the payment intermediary computer system during transaction processing operations,’ and then, ‘based, at least in part, on the anomaly-related metric data, classify[ies] the anomaly transaction ... and select[s] the first financial account to fund the anomaly transaction.’” Applicant’s Reply at 9. Applicant contends these limitations require “generation, persistence, and reuse of system-generated metric data to control downstream transaction execution, not mere observation, evaluation, or judgment” so the § 101 rejection should be withdrawn. Id.
Examiner respectfully disagrees.
As described in the specification, Claim 11 describes operations that are directed to “selecting an optimal financial account for a financial transaction” using a “transaction-dependent financial account selection system” that “automatically selects a financial account from one of the linked financial accounts in an optimum manner e.g. to maximize reward points and/or minimize interest payments.” Spec. Abstract, ¶¶ 14, 15. The additional elements in claim 11—such as the “unsupervised machine learning model implemented within the payment intermediary computer system,” “anomaly-related metric data,” and “a first financial account designated for use with anomaly transactions”—are implemented on generic computer components, including “one or more server computers or other computing devices that execute programmatic instructions” and a conventional “computer system 300” with standard processor, memory, storage, and network interface. Spec. ¶¶ 19, 20, 21, 25, 60, 61, 62, 63, 64, 65, 66. The specification explains that an “unsupervised machine learning model may be used to detect transaction anomalies” and that “[i]n some cases, detection of a transaction anomaly will result in a selection of a particular financial account that is identified as being designated for anomaly transactions,” Spec. ¶ 44, which reflects automated application of financial decision rules rather than an improvement in computer technology itself. Accordingly, even though the recited operations may not be practically performed by a human at the same scale or speed, they amount to using generic computer technology to carry out the abstract idea of collecting, analyzing, and classifying financial transaction and account information to select a funding account, and they do not integrate the judicial exception into a practical application or provide an inventive concept under Step 2B.
Claim Rejections - 35 USC § 101
35 U.S.C. 101 reads as follows:
Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.
Claims 1–20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to a judicial exception (i.e., an abstract idea) without significantly more.
Analysis
Step 1: Claims 1–20 are directed to a statutory category. Claim 1 recites “a computer-implemented method” and is therefore, directed to the statutory category of “a process.” Claim 11 recites “one or more non-transitory computer-readable media” and is therefore, directed to the statutory category of “an article of manufacture.”
Representative Claim
Claim 11 is representative [“Rep. Claim 11”] of the subject matter under examination and recites, in part, emphasis added by Examiner to identify limitations with normal font indicating the abstract idea exception, bold limitations indicating additional elements. Each limitation is identified by a letter for later use as a shorthand notation in referencing/describing each limitation. Portions of the claim use italics to identify intended use limitations1 and underline, as needed, in further describing the abstract idea exception:
[A] 11. One or more non-transitory computer-readable media storing instructions for selecting a financial account transaction of a consumer which, when executed by one or more processors, cause:
[B] receiving, by a payment intermediary computer system, transaction information of a financial transaction involving a multi-account payment card associated with a unique multi-account payment card identification (ID);
[C] accessing financial account information of a plurality of financial accounts linked to the multi-account payment card ID, wherein each financial account is associated with distinct transaction-based criteria; wherein each financial account of the plurality of financial accounts is associated with a distinct payment source; wherein the plurality of financial accounts includes a first financial account designated for use with anomaly transactions;
[D] inputting, into an unsupervised machine learning model implemented within the payment intermediary computer system, (i) one or more financial transactions associated with each of the plurality of financial accounts, including for each transaction a transaction amount, merchant identifier, and transaction category; and (ii) transaction information for the financial transaction;
[E] determining, by the unsupervised machine learning model, that the financial transaction is an anomaly transaction by detecting that the financial transaction differs from the one or more financial transactions associated with the plurality of financial accounts based on a comparison between the transaction amount of the financial transaction and a threshold value derived from a mean amount for the one or more financial transactions, or based on a deviation in transaction category patterns; wherein an anomaly transaction is a financial transaction of the consumer that is determined by the unsupervised machine learning model to be unlike the previous financial transactions performed by the consumer using the plurality of financial accounts;
[F] generating, by the payment intermediary computer system, anomaly-related metric data associated with the financial transaction based on the determination that the financial transaction is an anomaly transaction;
[G] storing the anomaly-related metric data for use by the payment intermediary computer system during transaction processing operations;
[H] based, at least in part, on the anomaly-related metric data, classifying the anomaly transaction into an anomaly category that is associated with the anomaly-related metric data and selecting the first financial account to fund the anomaly transaction; and
[I] causing the payment intermediary computer system to initiate completion of the financial transaction using the first financial account.
Claims are directed to an abstract idea exception.
Step 2A, Prong One: Rep. Claim 11 recites “selecting a financial account transaction of a consumer” in the preamble (Limitation A), and “causing … to initiate completion of the financial transaction using the first financial account [of a consumer]” in Limitation I, which recites commercial or legal interactions under the organizing human activity exception because “selecting a financial account transaction of a consumer” and “causing … to initiate completion of the financial transaction [of a consumer]” recites “sales activities or behaviors, and business relations” between two people. MPEP § 2106.04(a)(2)(II)(B). Limitations B–I are the required steps and received data inputs required to “complete the financial transaction” and therefore, recites the same exception. Id.
Alternatively2, Limitations B–I, as drafted, recite the abstract idea exception of mental processes that under the broadest reasonable interpretation, cover performance in the human mind or with pen and paper, but for the recitation of the generic computer components indicated in bold. MPEP § 2106.04(a)(2)(III).
Claims recite a mental process when they contain limitations that can practically be performed in the human mind, including for example, observations, evaluations, judgments, and opinions. Examples of claims that recite mental processes include:
• a claim to "collecting information, analyzing it, and displaying certain results of the collection and analysis," where the data analysis steps are recited at a high level of generality such that they could practically be performed in the human mind, Electric Power Group v. Alstom, S.A., 830 F.3d 1350, 1353-54, 119 USPQ2d 1739, 1741-42 (Fed. Cir. 2016);
. . .
• a claim to collecting and comparing known information (claim 1), which are steps that can be practically performed in the human mind, Classen Immunotherapies, Inc. v. Biogen IDEC, 659 F.3d 1057, 1067, 100 USPQ2d 1492, 1500 (Fed. Cir. 2011).
MPEP § 2106.04(a)(2)(III)(A). For example, but for the generic computer components claim language, here, Limitations B–I, recite collecting information (Limitations B, C, D, G) and analyzing it (Limitations E, F, H, I), where the data analysis steps are recited at a high level of generality such that they could practically be performed in the human mind. For example, Limitations E is mental processes that is practically performed in the human mind or with pen and paper because it requires mere “observation, evaluation, judgment, and/or opinion” to determine that the financial transaction is an anomaly transaction unlike the previous financial transactions performed by the consumer, by detecting that the financial transaction differs from the one or more financial transactions associated with the plurality of financial accounts [1] based on a comparison between the transaction amount of the financial transaction and a threshold value derived from a mean amount for the one or more financial transactions, or [2] based on a deviation in transaction category patterns. Collecting and comparing known information (i.e., the transaction amount of the financial transaction and a threshold value derived from a mean amount for the one or more financial transactions) are steps that can be practically performed in the human mind under Classen. Deriving the threshold value from a mean amount for comparison covers any solution with no restriction on how the result is accomplished and no description of the mechanism for accomplishing the result, which is so broad as to encompass mental processes. Alternatively, the “or” permits either [1] or [2] to detect the difference (or determine an anomaly transaction). The “based on a deviation in transaction category patterns” is also very broad and is also a mental process. A deviation in transaction category patterns covers any solution with no restriction on how the result is accomplished and no description of the mechanism for accomplishing the result, which is so broad as to encompass mental processes. Limitation F is a mental process that is practically performed in the human mind or with pen and paper because it requires mere “observation, evaluation, judgment, and/or opinion” to “generat[e] … anomaly-related metric data associated with the financial transaction based on the determination that the financial transaction is an anomaly transaction. Limitation F covers any solution to anomaly-related metric data based on the determination that the financial transaction is an anomaly transaction with no restriction on how the result is accomplished and no description of the mechanism for accomplishing the result but for a generic computer, which is so broad as to encompass mental processes. Limitation H is a mental process that is practically performed in the human mind or with pen and paper because it requires mere “observation, evaluation, judgment, and/or opinion” to, in response to Limitation E, classifying the anomaly transaction into an anomaly category and selecting the first financial account to fund the anomaly transaction. Classifying the anomaly transaction into an anomaly category and selecting the first financial account to fund the anomaly transaction covers any solution with no restriction on how the result is accomplished and no description of the mechanism for accomplishing the result, which is so broad as to encompass mental processes. Last, Limitations I is mental processes that is practically performed in the human mind or with pen and paper because it requires mere “observation, evaluation, judgment, and/or opinion” to initiate completion of the financial transaction using the first financial account. Regarding the unsupervised machine learning model, Applicant’s Specification teaches it may be a “k-means clustering” algorithm. Spec. ¶ 44. Leskovec, Jure, Anand Rajaraman, and Jeffrey David Ullman. "Mining of Massive Datasets." (2019) (“NPL Leskovec”) (cited herein on PTO-892) is prior art and additional evidence of a human’s ability to perform an unsupervised machine learning model (k-means clustering) without the aid of a computer. NPL Leskovec, p. 268 (Example 7.8), p. 463 (explaining equivalency of unsupervised learning and clustering), p. 464 (Example 12.1). Applicant’s Specification additionally teaches the unsupervised model may be a “neural networks” algorithm. Spec. ¶ 44. The “neural networks” characterization of the machine learning model is merely a technique “where the outputs of one rank (or layer of nodes) becomes the inputs to nodes at the next layer. The last layer of nodes produces the outputs of the entire neural net.” NPL Leskovec, p. 523, and can also be performed by hand. NPL Leskovec, p. 524 (Example 13.1). “The use of a physical aid (e.g., pencil and paper or a slide rule) to help perform a mental step (e.g., a mathematical calculation) does not negate the mental nature of the limitation, but simply accounts for variations in memory capacity from one person to another” or a multi-step mental process. MPEP § 2106.04(a)(2)(III)(B).
If a claim limitation under BRI, covers performance of the limitation in the mind but for the recitation of generic computer components, then it falls within the “Mental Processes” grouping of abstract idea exception. MPEP § 2106.04(a)(2)(III). Accordingly, the pending claims recite the combination of these abstract idea exceptions.
Step 2A, Prong Two: Rep. Claim 11 does not contain additional elements that integrate the abstract idea exception into a practical application because the additional elements are mere instructions to apply the abstract idea exception. MPEP § 2106.05(f). The additional elements are limited to the computer components and indicated in bold, supra. The additional elements are: one or more non-transitory computer-readable media storing instructions, one or more processors, an unsupervised machine learning model, and a payment intermediary computer system.
Regarding the one or more non-transitory computer-readable media storing instructions, one or more processors, an unsupervised machine learning model, and a payment intermediary computer system, Applicant’s Specification does not otherwise describe them or describes them using exemplary language as a general-purpose computer, as a part of a general-purpose computer, or as any known and exemplary (generic) computer component known in the prior art. Thus, Applicant takes the position that such hardware/software is so well known to those of ordinary skill in the art that no explanation is needed under 35 U.S.C. § 112(a). Lindemann Maschinenfabrik GMBH v. Am. Hoist & Derrick Co., 730 F.2d 1452, 1463 (Fed. Cir. 1984) (citing In re Meyers, 410 F.2d 420, 424 (CCPA 1969) (“[T]he specification need not disclose what is well known in the art”). E.g., Spec. ¶¶ 60, 66 (known and generic (exemplary) media), ¶¶ 60, 68 (known and generic (exemplary) instructions), ¶ 60, 61 (“general purpose microprocessor”), ¶¶ 62, 63, 64 (known and generic (exemplary) payment intermediary computer system); ¶ 60 (“any other device that incorporates hardwired and/or program logic to implement the techniques”); ¶ 66 (“any non-transitory media that store data and/or instructions that cause a machine to operate in a specific fashion”); ¶ 17 (“Financial account information may include any information relating to a financial account.”); ¶ 18 (“The term "transaction information", as used herein, refers to any information about the specific transaction for which the TDFAS system is selectin a financial account.”); ¶¶ 21, 32 (“Transaction information may include any information obtained from the POS 104”); ¶ 24 (“Payment information may include any information obtained from a multi-account payment card that was used to initiate a transaction”); ¶ 66 (“any other magnetic data storage medium … any other optical data storage medium, any physical medium with patterns of holes, … any other memory chip or cartridge.”); ¶ 44 (any known and generic (exemplary) unsupervised machine learning model). The generic processor, here, appears to perform calculations (functions) that are programmed by software. Spec. ¶ 60. This is a computer doing what it is designed to do—performing directions it is given to follow.
Regarding the unsupervised machine learning model, Applicant’s Specification discloses it is a generic, off-the-shelf, algorithm known in the prior art to a PHOSITA at the time of filing. Spec. ¶¶ 43, 44, 45, 46. The claims merely recite using the model to receive input and to produce an output, a function of any model, without disclosing any details for how the model produces the output. The model itself is created outside of the claimed invention and can be created in known way. Id. The improvement as argued by Applicant is in the ability to detect an anomaly with the unsupervised ML model but again, any model may be used. Id. (identifying nine exemplary and known unsupervised ML models). This describes a solution merely at the level of a “generic black box” for determining an “anomaly transaction” and reads neatly on “use a computer” to do it. MPEP § 2106.05(f). Thus, using any known model in its ordinary way is not a practical application.
Limitation A describes the generic computer/computer components performing the steps of the claimed invention, Limitations B–G, which represents the abstract idea exception itself. Performing the steps of the abstract idea itself simply adds a generic computer after the fact to an abstract idea exception, MPEP 2106.05(f)(2), or generically recites an effect of the judicial exception. MPEP 2106.05(f)(3).
Therefore, the claim as a whole, looking at the additional elements individually and in combination, are no more than mere instructions to apply the exception using generic computer components and is not a practical application. MPEP § 2106.05(f). The additional elements do not integrate the abstract idea exception into a practical application because they do not impose any meaningful limits on the abstract idea exception. Accordingly, Rep. Claim 11 is directed to an abstract idea.
Rep. Claim 11 is not substantially different than Independent Claim 1 and includes all the limitations of Rep. Claim 13. Independent Claim 1 contains no additional elements. Therefore, Independent Claim 1 is also directed to the same abstract idea.
The claims do not provide an inventive concept.
Step 2B: Rep. Claim 11 fails Step 2B because the claim as whole, looking at the additional elements individually and in combination, are not sufficient to amount to significantly more than the recited judicial exception. As discussed with respect to Step 2A, Prong Two, the additional elements in the claim amount to no more than mere instructions to apply the exception using a generic computer and/or generic computer components. MPEP § 2106.05(f). The same analysis applies here in Step 2B. Mere instructions to apply an exception using a generic computer and/or generic computer components cannot provide an inventive concept. MPEP § 2106.05(I).
The additional elements, taken individually and in combination, do not result in the claim, as a whole, amounting to significantly more than the identified judicial exception.
The pending claims in their combination of additional elements is not inventive. First, the claims are directed to an abstract idea. Second, each additional element represents a currently available generic computer technology, used in the way in which it is commonly used (individually generic). Last, Applicant’s Specification discloses that the combination of additional elements is not inventive. Spec., ¶ 72 (steps/functions may be performed in any order); ¶¶ 17, 18, 21, 24, 32, 44, 60, 61, 62, 63, 64, 66, 68 (known and generic (exemplary) computer equipment as explained and cited supra.)
Thus, Examiner finds the additional elements of Rep. Claim 11 are elements that have been recognized as well-understood, routine, and conventional (“WURC”) activity in the particular field of this invention based on Applicant’s own disclosure3. Spec. ¶¶ 17, 18, 21, 24, 32, 43, 44, 45, 60, 61, 62, 63, 64, 66, 68, 72; MPEP § 2106.05(d). Specifically, Applicant’s Specification discloses the recited additional elements (i.e., one or more non-transitory computer-readable media storing instructions, one or more processors, an unsupervised machine learning model, and a payment intermediary computer system) are limited to generic computer components. These elements do no more than “apply” the recited abstract idea(s) on a known computer (e.g., processor) and computer-related components (e.g., media). Further, Leskovec, Jure, Anand Rajaraman, and Jeffrey David Ullman. "Mining of Massive Datasets." (2019) (“NPL Leskovec”) (cited on PTO-892) is prior art and additional evidence that unsupervised machine learning algorithms were well-known and merely operate on the generic components. The Examiner also finds the functions of receiving, storing, transmitting, and processing (e.g., performing mathematical operations on) data, described in Limitations A–G are all normal functions of a generic computer.
There is no indication that the combination of elements improves the functioning of a computer or improves any other technology. Thus, taken alone, the additional elements do not amount to significantly more than the above-identified judicial exception (the abstract idea). Looking at the additional elements in combination adds nothing that is not already present when looking at the elements individually. Their collective functions merely provide conventional computer implementation of the abstract idea at a high level of generality. Thus, Rep. Claim 11 does not provide an inventive concept.
Rep. Claim 11 is not substantially different than Independent Claim 1 and includes all the limitations of Rep. Claim 11. Independent Claim 1 contains no additional limitations. Therefore, Independent Claim 1 also do not recite an inventive concept.
Dependent Claims Not Significantly More
The dependent claims have been given the full two-part analysis including analyzing the additional limitations both individually and in combination. The dependent claim(s) when analyzed both individually and in combination are also held to be patent ineligible under 35 U.S.C. § 101. Dependent claims are dependent on Independent Claims and include all the limitations of the Independent Claims. Therefore, all dependent claims recite the same Abstract Idea. Dependent claims do not contain additional elements that integrate the abstract idea exception into a practical application or recite an inventive concept because the additional elements: (1) are mere instructions to apply the abstract idea exception; and/or (2) further limit the abstract idea exception of the Independent Claims. The abstract idea itself cannot provide the inventive concept or practical application. MPEP §§ 2106.05(I), 2106.04(d)(III).
Dependent Claims 2, 3, 6, 12, 13, and 16 all recite “wherein” clauses that further limits the abstract idea of the Independent Claims but contains the additional elements of: a first financial computing device/computing device (Claims 2, 3, 12, 13); a second financial computing device (Claims 2 and 12), a banking computing device/computing device (Claims 3 and 13), a database (Claims 6 and 16). For the same reasoning as explained for the “payment intermediary computer system” in Step 2A, Prong Two, supra, these additional elements do not provide a practical application or inventive concept because it is amounts to mere instructions to apply the exception with a computer. MPEP § 2106.05(f). Spec. ¶¶ 17, 18, 21, 24, 32, 44, 60, 61, 62, 63, 64, 66, 68, 72; ¶¶ 24, 30, Fig. 1 (recitation of “database” by name only). An inventive concept or practical application cannot be furnished by an abstract idea exception itself. MPEP §§ 2106.05(I), 2106.04(d)(III).
Dependent Claims 4, 5, 9, 10, 14, 15, 19, and 20 all recite “wherein” clauses or limitations that further limit the abstract idea of the Independent Claims and contain no additional elements. An inventive concept or practical application cannot be furnished by an abstract idea exception itself. MPEP §§ 2106.05(I), 2106.04(d)(III).
Dependent Claims 7, 8, 17, and 18 recite additional limitations that form part of the same abstract idea exception as recited in Independent Claims and contain the additional element of: an interface (Claims 7 and 17) and a digital receipt (Claims 8 and 18). For the same reason as analyzed for the “payment intermediary computer system” in Step 2A, Prong Two, supra, these additional elements do not provide a practical application or inventive concept because it is amounts to mere instructions to apply the exception with a computer. MPEP § 2106.05(f). The interface is part of a generic computer. Spec. ¶ 69. An inventive concept or practical application cannot be furnished by an abstract idea exception itself. MPEP §§ 2106.05(I), 2106.04(d)(III).
Conclusion
Claims1–20 are therefore drawn to ineligible subject matter as they are directed to an abstract idea without significantly more. The analysis above applies to all statutory categories of invention. As such, the presentment of Rep. Claim 11 otherwise styled as another statutory category is subject to the same analysis.
Examiner Statement of Prior Art—No Prior Art Rejections
Based on the prior art search results, the prior art of record fails to anticipate or render obvious the claimed subject matter of the instant application. While some individual features of Claims 1–20 may be shown in the prior art of record—no known reference, alone or in combination, would provide the invention of Claims 1–20.
The prior art most closely resembling the applicant’s claimed invention are:
Novis (U.S. Pat. Pub. No. 2020/0202330) is pertinent because it discloses systems and methods for optimizing financial transactions of a user by using a multi-use account system associated with a plurality of financial accounts belonging to a user and an optimization model 130 configured to detect transaction patterns. Novis does not disclose “determining, by the unsupervised machine learning model, that the financial transaction is an anomaly transaction by detecting that the financial transaction differs from the one or more financial transactions associated with the plurality of financial accounts based on a comparison between the transaction amount of the financial transaction and a threshold value derived from a mean amount for the one or more financial transactions, or based on a deviation in transaction category patterns; wherein an anomaly transaction is a financial transaction of the consumer that is determined by the unsupervised machine learning model to be unlike the previous financial transactions performed by the consumer using the plurality of financial accounts.”
Dietrich et al. (U.S. Pat. No. 10,482,464) is pertinent because it discloses Identification of anomalous transaction attributes in realtime with adaptive threshold tuning is provided by determining a financial transaction is unlike the previous financial transaction; identifying a transaction that diverges from historical spending patterns based on one or more thresholds derived from prior financial transaction data; and identifying the financial transaction as an anomaly and selecting the account based on account selection criteria specific to anomalous activity. Dietrich does not disclose “determining, by the unsupervised machine learning model, that the financial transaction is an anomaly transaction by detecting that the financial transaction differs from the one or more financial transactions associated with the plurality of financial accounts based on a comparison between the transaction amount of the financial transaction and a threshold value derived from a mean amount for the one or more financial transactions, or based on a deviation in transaction category patterns; wherein an anomaly transaction is a financial transaction of the consumer that is determined by the unsupervised machine learning model to be unlike the previous financial transactions performed by the consumer using the plurality of financial accounts.”
FOR: Int. Pat. Pub. No. WO 2013/019995 A1 is pertinent because it discloses a fraud analytic system and method applied to a financial transaction device, such as a card or a mobile communication device (hereafter, simply "mobile device"), that is used as access to one or more funding accounts to execute a financial transaction. Fraud detection can benefit within a specific scenario, i.e. use of a specific funding account, if usage patterns are within normal variances associated with the other funding accounts, and if the selection of the specific funding account is normal for this specific type of transaction. FOR does not disclose “determining, by the unsupervised machine learning model, that the financial transaction is an anomaly transaction by detecting that the financial transaction differs from the one or more financial transactions associated with the plurality of financial accounts based on a comparison between the transaction amount of the financial transaction and a threshold value derived from a mean amount for the one or more financial transactions, or based on a deviation in transaction category patterns; wherein an anomaly transaction is a financial transaction of the consumer that is determined by the unsupervised machine learning model to be unlike the previous financial transactions performed by the consumer using the plurality of financial accounts.”
NPL: Federated Optimization for Financial Transaction Management, 2019 is pertinent because it discloses systems and methods for reviewing all an individual’s expenses, payment options, and all the associated implications, and then presents the individual with the optimal payment method for a single or group of expense(s). Thus, the system automates the dynamic selection of an optimal payment mode without human intervention via a virtual brokerage layer and inspection mechanism. NPL does not disclose “determining, by the unsupervised machine learning model, that the financial transaction is an anomaly transaction by detecting that the financial transaction differs from the one or more financial transactions associated with the plurality of financial accounts based on a comparison between the transaction amount of the financial transaction and a threshold value derived from a mean amount for the one or more financial transactions, or based on a deviation in transaction category patterns; wherein an anomaly transaction is a financial transaction of the consumer that is determined by the unsupervised machine learning model to be unlike the previous financial transactions performed by the consumer using the plurality of financial accounts.”
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to JAMES H MILLER whose telephone number is (469)295-9082. The examiner can normally be reached M-F: 10- 4 PM (EST).
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Bennett M Sigmond can be reached at (303) 297-4411. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/JAMES H MILLER/Primary Examiner, Art Unit 3694
1 Statements of intended use fail to limit the scope of the claim under BRI. MPEP § 2103(I)(C).
2 “It should be noted that these groupings are not mutually exclusive, i.e., some claims recite limitations that fall within more than one grouping or sub-grouping. … Accordingly, examiners should identify at least one abstract idea grouping, but preferably identify all groupings to the extent possible, if a claim limitation(s) is determined to fall within multiple groupings and proceed with the analysis in Step 2A Prong Two.” MPEP § 2106.04(a).
3 See Changes in Examination Procedure Pertaining to Subject Matter Eligibility, Recent Subject Matter Eligibility Decision (Berkheimer v. HP, Inc.), 3-4, https://www.uspto.gov/sites/default/files/documents/memo-berkheimer-20180419.PDF (April, 18, 2018) (That additional elements are well-understood, routine, or conventional may be supported by various forms of evidence, including "[a] citation to an express statement in the specification or to a statement made by an applicant during prosecution that demonstrates the well-understood, routine, conventional nature of the additional element(s).").