Prosecution Insights
Last updated: April 17, 2026
Application No. 18/119,698

SYSTEM AND METHOD FOR PROMOTING SALES AND INCREASING BRAND NAME RECOGNITION

Non-Final OA §101
Filed
Mar 09, 2023
Examiner
BORISSOV, IGOR N
Art Unit
3685
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
unknown
OA Round
3 (Non-Final)
27%
Grant Probability
At Risk
3-4
OA Rounds
4y 2m
To Grant
69%
With Interview

Examiner Intelligence

Grants only 27% of cases
27%
Career Allow Rate
246 granted / 897 resolved
-24.6% vs TC avg
Strong +42% interview lift
Without
With
+41.6%
Interview Lift
resolved cases with interview
Typical timeline
4y 2m
Avg Prosecution
60 currently pending
Career history
957
Total Applications
across all art units

Statute-Specific Performance

§101
31.7%
-8.3% vs TC avg
§103
38.1%
-1.9% vs TC avg
§102
8.4%
-31.6% vs TC avg
§112
18.0%
-22.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 897 resolved cases

Office Action

§101
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application is being examined under the pre-AIA first to invent provisions. Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 11/21/2025 has been entered. Response to Amendment Amendment received on 11/21/2025 is acknowledged and entered. Claims 1-20 have been canceled. New claims 21-28 have been added. Claims 21-28 are currently pending in the application. Drawings New corrected drawings in compliance with 37 CFR 1.121 (d) are required in this application because the drawings submitted 3/9/2023, though technically compliant are of poorer quality. Specifically, Figures 2A, 2B, 11, 14 and 16-19 are not legible. Applicant is advised to employ the services of a competent patent draftsperson outside the Office, as the U.S. Patent and Trademark Office no longer prepares new drawings. The corrected drawings are required in reply to the Office action to avoid abandonment of the application. The requirement for corrected drawings will not be held in abeyance. Claim Objections Claims 21 is objected to because the claim recites the following limitation: “specific physical device”. The term "specific" in the claim is a relative term which renders the claim indefinite. The term "specific" is not defined by the claim, the specification does not provide a standard for ascertaining the requisite degree, and one of ordinary skill in the art would not be reasonably apprised of the scope of the invention. Specifically, it is not clear how specific said physical device would need to be in order to infringe the claimed invention. Further, claim 21 recites: “to provide a technical solution that improves the security, integrity, and real-time redeemability of receipt-based promotional vouchers”, which is confusing. The terms “improving” and “integrity” are relative, and not clearly defined in the claim, and the claim does not specify which functional aspect is intended to represent the alleged effect or how said effect is achieved. Further, the following limitations are not supported by the Specification, and appear to be a new matter: a first and a second data structure; tracks puzzle state; atomically update; transaction metadata; code-to-voucher lookup data structure; application programming interface (API); API-level authentication; cryptographic binding. For the purposes of examination, the Examiner interprets the claims in the Office Action below as though the necessary changes have been made. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 21-28 are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-statutory subject matter. In determining whether a claim falls within an excluded category, the Examiner is guided by the Court’s two-part framework, described in Mayo and Alice. Id. at 217-18 (citing Mayo Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 75-77 (2012)); Bilski v. Kappos, 561 U.S. 593, 611 (2010); 2019 Revised Patent Subject Matter Eligibility Guidance, 84 Fed. Reg. 50 (Jan. 7, 2019); the October 2019 Update of the 2019 Revised Guidance (Oct. 17, 2019); 2024 Guidance Update on Patent Subject Matter Eligibility, Including on Artificial Intelligence (July 17, 2024), and the USPTO’s Paten Subject Matter Eligibility Memorandums of August 4, 2025 and December 5, 2025. Step 1 Claims are eligible for patent protection under § 101 if they are in one of the four statutory categories and not directed to a judicial exception to patentability (i.e., laws of nature, natural phenomena, and abstract ideas). Alice Corp. v. CLS Bank Int'l, 573 U. S. ____ (2014). The broadest reasonable interpretation of claim 21 encompasses a computer system (e.g., hardware such as a processor and memory) that implements the recited functions. If assuming that the system comprises a device or set of devices, then the system is directed to a machine, which is a statutory category of invention. (Step 1: Yes). Next, the claim is analyzed to determine whether it is directed to a judicial exception. Step 2A – Prong 1 Claim 1 is rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea without significantly more of promoting sales. The claim recites: 21. A system for promoting sales and increasing brand recognition, the system comprising: a point-of-sale (POS) terminal that, during a completed purchase transaction, generates a transaction receipt having an alphanumeric redemption code cryptographically connected to transaction data and a partially obfuscated brand-name puzzle printed on the receipt; a secure communications interface coupling the POS terminal to a remote campaign controller over a network; the remote campaign controller comprising at least one specially programmed computer configured to: receive the redemption code and associated transaction metadata from the POS terminal via the secure communications interface and store the received code and metadata in a first data structure that indexes codes by POS terminal identifier, time stamp, and anonymized transaction identifier; generate, for each received redemption code, an entry in a second data structure that tracks puzzle state and assigned voucher tokens, wherein the second data structure is organized to permit constant-time lookup of a code-to-voucher mapping by redemption code; provide a web or application programming interface (API) that authenticates a remote client device request to redeem the redemption code, the authentication requiring proof of possession of the redemption code and verification of cryptographic binding with the transaction metadata stored in the first data structure; upon successful authentication, atomically update the second data structure to mark the code as redeemed and, if the code corresponds to a winning puzzle state, generate a signed voucher record containing a voucher identifier, discount parameters, and an expiration time, and store the signed voucher record in the second data structure; a non-custodial wallet application executing on a specific physical device comprising a hardware-backed secure element, the wallet application configured to: securely store user wallet credentials and a private key in the hardware-backed secure element; receive the signed voucher record via the API and validate voucher signature using a campaign controller public key; convert the validated voucher record into one or more digital tokens by creating a device-signed redemption transaction that references the voucher identifier and the device-resident private key and transmitting the signed redemption transaction to the remote campaign controller for verification and settlement; wherein the redemption code with the transaction metadata, the code-to-voucher lookup data structure, the update of the voucher record upon redemption, an API-level authentication that validates possession and the cryptographic binding, and the use of a device-resident private key in a hardware-backed secure element to create a signed redemption transaction together are adapted to provide a technical solution that improves the security, integrity, and real-time redeemability of receipt-based promotional vouchers. The limitations of receiving and storing the redemption code and metadata; tracking code-to-voucher mapping; authenticating a request; matching the code to a winning puzzle state; generating a signed voucher; storing user wallet credentials; validating voucher signature; and converting the validated record into a digital token, as drafted, is a process that, under its broadest reasonable interpretation, covers performance of the limitation in the mind, which may be practically performed in the human mind using observation, evaluation, judgment, and opinion (MPEP 2106.04(a)(2) subsection III), and/or certain methods of organizing human activity, such as commercial interactions, but for the recitation of generic computer components (e.g. See the Specification [0127] “The consumer then plays the game on a paper receipt 468, as shown in FIG. 2A”). (Note: the Examiner’s language (e.g. “receiving and storing the redemption code and metadata”; “tracking code-to-voucher mapping;” etc.) is an abbreviated reference to the detailed claim steps and is not an oversimplification of the claim language; the Examiner employing such shortcuts (that refer to more specific steps) when attempting to explain the rejection). That is, other than reciting “by a processor,” nothing in the claim element precludes the step from practically being performed in the mind, and/or performed as organized human activity. Aside from the general technological environment (addressed below), it covers purely mental concepts and/or certain methods of organizing human activity processes, and the mere nominal recitation of a generic network appliance (e.g. an interface for inputting or outputting data, or generic network-based storage devices and displays) does not take the claim limitation out of the mental processes and/or certain methods of organizing human activity grouping. Specifically, utilizing mathematical tools to process the data and to output the estimated values - said functions could be performed by a human using mental steps or basic critical thinking, which are types of activities that have been found by the courts to represent abstract ideas (e.g., mental comparison regarding a sample or test subject to a control or target data in Ambry, Myriad CAFC, or the diagnosing an abnormal condition by performing clinical tests and thinking about the results in In re Grams, 888 F.2d 835 (Fed. Cir. 1989) (Grams)). In Grams, the recited functions require obtaining data or patient information (from sensors), and analyze that data to ascertain the existence and identity of an abnormality or estimated responses, and possible causes thereof. While said functions are performed by a computer, they are in essence a mathematical algorithm, in that they represent "[a] procedure for solving a given type of mathematical problem." Gottschalk v. Benson, 409 U.S. 63, 65, 93 S.Ct. 253, 254, 34 L.Ed.2d 273 (1972). Moreover, the Federal Circuit has held, “without additional limitations, a process that employs mathematical algorithms to manipulate existing information to generate additional information is not patent eligible.” Digitech Image Techs., LLC v. Elecs. for Imaging, Inc., 758 F.3d 1344, 1351 (Fed. Cir. 2014). Further, “analyzing information by steps people go through in their minds, or by mathematical algorithms, without more, [are] essentially mental processes within the abstract-idea category.” Elec. Power, 830 F.3d at 1354; see also Synopsys, Inc. v. Mentor Graphics Corp., 839 F.3d 1138, 1146 (Fed. Cir. 2016). “[T]he fact that the required calculations could be performed more efficiently via a computer does not materially alter the patent eligibility of the claimed subject matter.” Bancorp Servs., L.L.C. v. Sun Life Assurance Co. of Can. (U.S.), 687 F.3d 1266, 1278 (Fed. Cir. 2012). It is similar to other abstract ideas held to be non-statutory by the courts (see: Intellectual Ventures I LLC v. Capital One Bank (USA), 792 F.3d 1363 (Fed. Cir. 2015)—tailoring sales information presented to a user based on, e.g., user data and time data; Electric Power Grp., LLC v. Alstom S.A., 830 F.3d 1350 (Fed. Cir. 2016) - collecting information, analyzing it, and displaying certain results of the collection and analysis,” where the data analysis steps are recited at a high level of generality such that they could practically be performed in the human mind; Gottschalk v. Benson, - an algorithm for converting binary-coded decimal numerals into pure binary form; Parker v. Flook, - a mathematical formula for computing “alarm limits” in a catalytic conversion process; Bilski v. Kappos - a concept of hedging, or protecting against risk. Further, in Content Extraction & Transmission LLC v. Wells Fargo Bank, National Ass’n, Nos. 13-1588,-1589, 14-1112, -1687 (Fed. Cir. Dec. 23, 2014) the Federal Circuit explained that ”[t]he concept of data collection, recognition, and storage is undisputedly well-known,” and noted that “humans have always performed these functions.” Id. The Court then rejected CET’s argument that the claims were patent eligible because they required hardware to perform functions that humans cannot, such as processing and recognizing the stream of bits output by the scanner. Comparing the asserted claims to “the computer-implemented claims in Alice,” the Court concluded that the claims were “drawn to the basic concept of data recognition and storage,” even though they recited a scanner. Id. at 8. Mental processes, e.g., receiving, storing, generating data, parsing and extracting, as well as encrypting or de-encrypting data remain unpatentable even when automated to reduce the burden on the user of what once could have been done with pen and paper. CyberSource Corp. at 1375 (“That purely mental processes can be unpatentable, even when performed by a computer, was precisely the holding of the Supreme Court in Gottschalk v. Benson, [409 U.S. 63 (1972)].”). Furthermore, as per receiving, storing and outputting limitations, it has been held that “As many cases make clear, even if a process of collecting and analyzing information is ‘limited to particular content’ or a particular ‘source,’ that limitation does not make the collection and analysis other than abstract.” SAP Am., Inc. v. InvestPic, LLC, 898 F.3d 1161, 1168 (Fed. Cir. 2018) (citation omitted); see also In re Jobin, 811 F. App’x 633, 637 (Fed. Cir. 2020) (claims to collecting, organizing, grouping, and storing data using techniques such as conducting a survey or crowdsourcing recited a method of organizing human activity, which is a hallmark of abstract ideas). All these cases describe the significant aspects of the claimed invention, albeit at another level of abstraction. See Apple, Inc. v. Ameranth, Inc., 842 F.3d 1229, 1240-41 (Fed. Cir. 2016) ("An abstract idea can generally be described at different levels of abstraction. As the Board has done, the claimed abstract idea could be described as generating menus on a computer, or generating a second menu from a first menu and sending the second menu to another location. It could be described in other ways, including, as indicated in the specification, taking orders from restaurant customers on a computer."). Therefore, if a claim limitation, under its broadest reasonable interpretation, covers performance of the limitation in the mind but for the recitation of generic computer components, then it falls within the “Mental Processes” and/or “Certain Methods of Organizing Human Activity” grouping of abstract ideas. Accordingly, the claim recites an abstract idea. (Step 2A – Prong 1: Yes). Step 2A – Prong 2 In Prong Two, the Examiner determines whether claim 21, as a whole, recites additional elements that integrate the judicial exception into a practical application of the exception, i.e., whether the additional elements apply, rely on, or use the judicial exception in a manner that imposes a meaningful limit on the judicial exception, such that the claim is no more than a drafting effort designed to monopolize the judicial exception. See Guidance, 84 Fed. Reg. at 54-55. If the additional elements do not integrate the judicial exception into a practical application, then the claim is directed to the judicial exception. See id., 84 Fed. Reg. at 54. “An additional element [that] reflects an improvement in the functioning of a computer, or an improvement to other technology or technical field” is indicative of integrating a judicial exception into a practical application. See Guidance, 84 Fed. Reg. at 55. The Examiner determined that this judicial exception is not integrated into a practical application, because there are no meaningful limitations that transform the exception into a patent eligible application. In particular, the claim recites additional elements – using a processor to perform the steps of receiving and storing the redemption code and metadata; tracking code-to-voucher mapping; authenticating a request; matching the code to a winning puzzle state; generating a signed voucher; storing user wallet credentials; validating voucher signature; and converting the validated record into a digital token. However, the processor in each step is recited (or implied) at a high level of generality, i.e., as a generic processor performing a generic computer functions of processing data, including receiving, storing, comparing, and outputting data. This generic processor limitation is nor more than mere instructions to apply the exception using a generic computer component. See MPEP 2106.05(f). The processor that performs the recited steps merely automates these steps which can be done mentally or manually. Thus, while the additional elements have and execute instructions to perform the abstract idea itself, this also does not serve to integrate the abstract idea into a practical application as it merely amounts to instructions to "apply it." The claim only manipulates abstract data elements into another form, and does not set forth improvements to another technological field or the functioning of the computer itself and, instead, uses computer elements as tools in a conventional way to improve the functioning of the abstract idea identified above. Further, looking at the limitations as an ordered combination adds nothing that is not already present when looking at the elements taken individually; there is no indication that the combination of elements improves the functioning of a computer or improves any other technology, - their collective functions merely provide conventional computer implementation. None of the additional elements "offers a meaningful limitation beyond generally linking 'the use of the [method] to a particular technological environment,' that is, implementation via computers." Alice Corp., slip op. at 16 (citing Bilski v. Kappos, 561 U.S. 610, 611 (U.S. 2010)). The recited steps do not control or improve operation of a machine (MPEP 2106.05(a)), do not effect a transformation or reduction of a particular article to a different state or thing (MPEP 2106.05(c)), and do not apply the judicial exception with, or by use a particular machine (MPEP 2106.05(b)), but, instead, require receiving, storing, comparing, and outputting data. As per receiving, storing and outputting data limitations, these recitations amount to mere data gathering and/or outputting, is insignificant post-solution or extra-solution component and represents nominal recitation of technology. Insignificant "post-solution” or “extra-solution" activity means activity that is not central to the purpose of the method invented by the applicant. However, “(c) Whether its involvement is extra-solution activity or a field-of-use, i.e., the extent to which (or how) the machine or apparatus imposes meaningful limits on the execution of the claimed method steps. Use of a machine or apparatus that contributes only nominally or insignificantly to the execution of the claimed method (e.g., in a data gathering step or in a field-of-use limitation) would weigh against eligibility”. See Bilski, 138 S. Ct. at 3230 (citing Parker v. Flook, 437 U.S. 584, 590, 198 USPQ 193, ___ (1978)). Thus, claim drafting strategies that attempt to circumvent the basic exceptions to § 101 using, for example, highly stylized language, hollow field-of-use limitations, or the recitation of token post-solution activity should not be credited. See Bilski, 130 S. Ct. at 3230. Therefore, the method as a whole, outputs only data structure, - everything remains in the form of a code stored in the computer memory. Accordingly, even in combination, these additional elements do not integrate the abstract idea into a practical application because they do not impose any meaningful limits on practicing the abstract idea. Therefore, the claim is directed to an abstract idea. (Step 2A – Prong 2: No). Step 2B If a claim has been determined to be directed to a judicial exception under revised Step 2A, examiners should then evaluate the additional elements individually and in combination under Step 2B to determine whether the provide an inventive concept (i.e., whether the additional elements amount to significantly more than the exception itself). The Examiner determined that the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea into a practical application, the additional element of using a processor to perform the steps of receiving and storing the redemption code and metadata; tracking code-to-voucher mapping; authenticating a request; matching the code to a winning puzzle state; generating a signed voucher; storing user wallet credentials; validating voucher signature; and converting the validated record into a digital token amount to no more than mere instructions to apply the exception using a generic computer component. The claim is now re-evaluated in Step 2B to determine if it is more than what is well-understood, routine, conventional activity in the field. The system would require a processor and memory in order to perform basic computer functions of receiving information, storing the information in a database, retrieving information from the database, comparing data, and outputting said information. These components are not explicitly recited and therefore must be construed at the highest level of generality. Based on the Specification, the invention utilizes existing, conventional sensors, communication networks, and generic processors, which can be found in mobile devices or desktop computers, conventional memory and display devices, and the functions performed by said generic computer elements are basic functions of a computer - performing a mathematical operation, receiving, storing, comparing and outputting data - have recognized by the courts as routine and conventional activity. Specifically, regarding the recited functions, MPEP 2106.05(d)(II) defines said functions as routine and conventional, or as insignificant extra-solution activity: i. Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec, 838 F.3d at 1321, 120 USPQ2d at 1362 (utilizing an intermediary computer to forward information); TLI Communications LLC v. AV Auto. LLC, 823 F.3d 607, 610, 118 USPQ2d 1744, 1745 (Fed. Cir. 2016) (using a telephone for image transmission); OIP Techs., Inc., v. Amazon.com, Inc., 788 F.3d 1359, 1363, 115 USPQ2d 1090, 1093 (Fed. Cir. 2015) (sending messages over a network); buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355, 112 USPQ2d 1093, 1096 (Fed. Cir. 2014) (computer receives and sends information over a network); but see DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1258, 113 USPQ2d 1097, 1106 (Fed. Cir. 2014) (“Unlike the claims in Ultramercial, the claims at issue here specify how interactions with the Internet are manipulated to yield a desired result‐‐a result that overrides the routine and conventional sequence of events ordinarily triggered by the click of a hyperlink.” (emphasis added)); ii. Performing repetitive calculations, Flook, 437 U.S. at 594, 198 USPQ2d at 199 (recomputing or readjusting alarm limit values); Bancorp Services v. Sun Life, 687 F.3d 1266, 1278, 103 USPQ2d 1425, 1433 (Fed. Cir. 2012) (“The computer required by some of Bancorp’s claims is employed only for its most basic function, the performance of repetitive calculations, and as such does not impose meaningful limits on the scope of those claims.”); collecting and comparing known information in Classen 659 F.3d 1057, 100 U.S.P.Q.2d 1492 (Fed. Cir. 2011) iii. Electronic recordkeeping, Alice Corp., 134 S. Ct. at 2359, 110 USPQ2d at 1984 (creating and maintaining “shadow accounts”); Ultramercial, 772 F.3d at 716, 112 USPQ2d at 1755 (updating an activity log); iv. Storing and retrieving information in memory, Versata Dev. Group, Inc. v. SAP Am., Inc., 793 F.3d 1306, 1334, 115 USPQ2d 1681, 1701 (Fed. Cir. 2015); OIP Techs., 788 F.3d at 1363, 115 USPQ2d at 1092-93; v. Electronically scanning or extracting data from a physical document, Content Extraction and Transmission, LLC v. Wells Fargo Bank, 776 F.3d 1343, 1348, 113 USPQ2d 1354, 1358 (Fed. Cir. 2014) (optical character recognition); and vi. A web browser’s back and forward button functionality, Internet Patent Corp. v. Active Network, Inc., 790 F.3d 1343, 1348, 115 USPQ2d 1414, 1418 (Fed. Cir. 2015). Thus, the background of the application does not provide any indication that the processor is anything other than a generic, off-the-shelf computer component, and the Symantec, TLI, and OIP Techs. court decisions cited in MPEP 2106.05(d)(II) indicate that mere collection or receipt of data over a network is a well‐understood, routine, and conventional function when it is claimed in a merely generic manner (as it is here). Accordingly, a conclusion that the collecting step is well-understood, routine, conventional activity is supported under Berkheimer Option 2. Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. Furthermore, the recited functions do not improve the functioning of computers itself, including of the processor(s) or the network elements. There are no physical improvements in the claim, like a faster processor or more efficient memory, and there is no operational improvement, like mathematical computation that improve the functioning of the computer. Applicant did not invent a new type of computer; Applicant like everyone else programs their computer to perform functions. The Supreme Court in Alice indicated that an abstract claim might be statutory if it improved another technology or the computer processing itself. Using a (programmed) computer to implement a common business practice does neither. The Federal Circuit has recognized that "an invocation of already-available computers that are not themselves plausibly asserted to be an advance, for use in carrying out improved mathematical calculations, amounts to a recitation of what is 'well-understood, routine, [and] conventional.'" SAP Am., Inc. v. InvestPic, LLC, 890 F.3d 1016, 1023 (Fed. Cir. 2018) (alteration in original) (citing Mayo v. Prometheus, 566 U.S. 66, 73 (2012)). Apart from the instructions to implement the abstract idea, they only serve to perform well-understood functions (e.g., receiving, storing, comparing and transmitting data—see the Specification as well as Alice Corp.; Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307 (Fed. Cir. 2016); and Versata Dev. Group, Inc. v. SAP Am., Inc., 793 F.3d 1306, 1334 (Fed. Cir. 2015) covering the well-known nature of these computer functions). Looking at the limitations as an ordered combination adds nothing that is not already present when looking at the elements taken individually; there is no indication that the combination of elements improves the functioning of a computer or improves any other technology. Their collective functions merely provide conventional computer implementation. “However, it is not apparent how appellant’s programmed digital computer can produce any synergistic result. Instead, the computer will simply do the job it is instructed to do. Where is there any surprising or unexpected result? The unlikelihood of any such result is merely one more reason why patents should not be granted in situations where the only novelty is in the programming of general purpose digital computers”. See Sakraida v. Ag. Pro, Inc., 425 U.S. 273 [ 96 S.Ct. 1532, 47 L.Ed.2d 784], 189 USPQ 449 (1976) and A P Tea Co. V. Supermarket Corp., 340 U.S. 147 [ 71 S.Ct. 127, 95 L.Ed. 162], 87 USPQ 303 (1950). For example, in comparison to the decision in Enfish, LLC v. Microsoft Corporation, et al. (Enfish), claim 21 of the current application does not provide specific improvements in computer capabilities. In Enfish, Court found that claims are directed to a specific improvement to the way computers operate, - a particular database technique - in how computers could carry out one of their basic functions of storage and retrieval of data. The present case is different: the focus of the claims is not on such an improvement in computers as tools, but on certain independently abstract ideas that use computers as tools. There is no technological improvement described in the current application; the recited steps do not improve the functioning of computers itself, including of the processor(s) or the network elements; do not recite physical improvements in the claim, like a faster processor or more efficient memory, and do not provide operational improvement, like mathematical computation that improve the functioning of the computer. The claimed invention merely utilizes conventional computing and network elements for transmitting and storing data. Thus, the current application’ solution to the problem of promoting sales and brand recognition is not technological, but “business solution”, or “entrepreneurial.” Therefore, claim 11 does not provide a specific means or method that improves the relevant technology, but, instead, is directed to a result or effect that itself is the abstract idea and merely invoke generic processes and machinery. Furthermore, there is no transformation recited in the claim as understood in view of 35 USC 101. The recited steps merely represent abstract ideas which cannot meet the transformation test because they are not physical objects or substances. Bilski, 545 F.3d at 963. Said steps is nothing more than mere manipulation or reorganization of data, which does not satisfy the transformation prong. It is further noted that the underlying idea of the recited steps could be performed via pen and paper or in a person's mind. Moreover, “We agree with the district court that the claimed process manipulates data to organize it in a logical way such that additional fraud tests may be performed. The mere manipulation or reorganization of data, however, does not satisfy the transformation prong.” and “Abele made clear that the basic character of a process claim drawn to an abstract idea is not changed by claiming only its performance by computers, or by claiming the process embodied in program instructions on a computer readable medium. Thus, merely claiming a software implementation of a purely mental process that could otherwise be performed without the use of a computer does not satisfy the machine prong of the machine-or-transformation test”. CyberSource, 659 F.3d 1057, 100 U.S.P.Q.2d 1492 (Fed. Cir. 2011) Therefore, the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception, because, when considered separately and in combination, the claim elements do not add significantly more to the exception. Considered separately and as an ordered combination, the claim elements do not provide an improvement to another technology or technical field; do not provide an improvement to the functioning of the computer itself; do not apply the judicial exception by use of a particular machine; do not effect a transformation or reduce a particular article to a different state or thing; and do not add a specific limitation other than what is well-understood, routine and conventional in the operation of a generic computer. None of the hardware recited "offers a meaningful limitation beyond generally linking 'the use of the [method] to a particular technological environment,' that is, implementation via computers." Id., slip op. at 16 (citing Bilski v. Kappos, 561 U.S. 610, 611 (U.S. 2010)). As per the use of a processor for implementing certain steps, these limitations do not add significantly more because they are simply an attempt to limit the abstract idea to a particular technological environment, that is, implementation via computers." Id., slip op. at 16 (citing Bilski v. Kappos, 561 U.S. 610, 611 (U.S. 2010)). Limiting the claims to the particular technological environment is, without more, insufficient to transform the claim into patent-eligible applications of the abstract idea at their core. Accordingly, claim 21 is not directed to significantly more than the exception itself, and is not eligible subject matter under § 101. (Step 2B: No). Further, although the Examiner takes the steps recited in the independent claim as exemplary, the Examiner points out that limitations recited in dependent claims 22-28 further narrow the abstract idea but do not make the claims any less abstract. Dependent claims 22-28 each merely add further details of the abstract steps recited in claim 21 without including an improvement to another technology or technical field, an improvement to the functioning of the computer itself, or meaningful limitations beyond generally linking the use of an abstract idea to a particular technological environment. These claims "add nothing of practical significance to the underlying idea," and thus do not transform the sales transaction into patentable subject matter. Ultramercial, 772 F.3d at 716. Therefore, dependent claims 22-28 are also directed to non-statutory subject matter. Conclusion The prior art search has been conducted, with no significant prior art found. Any inquiry concerning this communication or earlier communications from the examiner should be directed to Igor Borissov whose telephone number is 571-272-6801. If attempts to reach the examiner by telephone are unsuccessful, the examiner's supervisor Kambiz Abdi can be reached on 571-272-6702. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). /IGOR N BORISSOV/Primary Examiner, Art Unit 3685 2/10/202026
Read full office action

Prosecution Timeline

Mar 09, 2023
Application Filed
Jan 11, 2025
Non-Final Rejection — §101
May 14, 2025
Response Filed
May 27, 2025
Final Rejection — §101
Nov 21, 2025
Request for Continued Examination
Dec 11, 2025
Response after Non-Final Action
Feb 10, 2026
Non-Final Rejection — §101 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12599320
MICRO ANALYTE SENSOR AND CONTINUOUS ANALYTE MONITORING DEVICE
2y 5m to grant Granted Apr 14, 2026
Patent 12586677
MANAGEMENT METHOD, MANAGEMENT SYSTEM, AND ELECTRONIC MEDICAL RECORD SYSTEM
2y 5m to grant Granted Mar 24, 2026
Patent 12573495
SURGICAL COMPUTING SYSTEM WITH SUPPORT FOR INTERRELATED MACHINE LEARNING MODELS
2y 5m to grant Granted Mar 10, 2026
Patent 12567093
Automated negotiation agent with opponent’s behavior prediction
2y 5m to grant Granted Mar 03, 2026
Patent 12567486
MULTI-MODEL MACHINE LEARNING ARCHITECTURE FOR FILTERING ENTITY PROFILES
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
27%
Grant Probability
69%
With Interview (+41.6%)
4y 2m
Median Time to Grant
High
PTA Risk
Based on 897 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in for Full Analysis

Enter your email to receive a magic link. No password needed.

Free tier: 3 strategy analyses per month