Prosecution Insights
Last updated: April 19, 2026
Application No. 18/124,516

SYSTEM AND METHOD FOR WEB ACCESS WITH CONTACTLESS CARD

Non-Final OA §102
Filed
Mar 21, 2023
Examiner
BAYOU, YONAS A
Art Unit
2499
Tech Center
2400 — Computer Networks
Assignee
Capital One Services LLC
OA Round
3 (Non-Final)
84%
Grant Probability
Favorable
3-4
OA Rounds
2y 11m
To Grant
99%
With Interview

Examiner Intelligence

Grants 84% — above average
84%
Career Allow Rate
711 granted / 845 resolved
+26.1% vs TC avg
Strong +15% interview lift
Without
With
+15.1%
Interview Lift
resolved cases with interview
Typical timeline
2y 11m
Avg Prosecution
28 currently pending
Career history
873
Total Applications
across all art units

Statute-Specific Performance

§101
12.2%
-27.8% vs TC avg
§103
38.2%
-1.8% vs TC avg
§102
25.3%
-14.7% vs TC avg
§112
8.3%
-31.7% vs TC avg
Black line = Tech Center average estimate • Based on career data from 845 resolved cases

Office Action

§102
DETAILED ACTION This Office Action is in response to Applicant’s Arguments /Remarks and RCE filed on 03/04/2026. As per instant Amendment, claims 1, 9 and 15 are independent and amended claims; claims 3, 5-8, 11, 13-14, 17, and 19-20 have been cancelled. Claims 1-2, 4, 9-10, 12, 15-16 and 18 have been examined and are pending. This Action is made non-FINAL. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 03/04/2026 has been entered. Response to Arguments Applicant’s arguments in the instant Amendment, filed on 03/04/2026, with respect to limitations listed below, have been fully considered but they are not persuasive. Applicant’s arguments: “Applicant submits that the description by Hart of the event counter does not teach or suggest "a personal identity code generated based on a transaction history of an owner of a user device associated with the user device application," as recited by claim 1. Moreover, Applicant submits that Hart does not teach or suggest to "determine whether the personal identity code matches at least one of one or more stored personal identity codes" and "upon a successful match, identify a URL associated with the personal identity code, wherein the URL is associated with the URL after a predetermined number of visits by the user device application to the URL," as further recited by claim 1.” The Examiner disagrees with the Applicants. The Examiner respectfully submits that: a personal identity code generated based on a transaction history of an owner of a user device associated with the user device application (para. 0064, step 502, the user touches their smartcard on the mobile device; para. 0065, step 504; para. 0067, step 508; para. 0068, step 510; para. 0069, step 512; para. 0070-0077, step 516 and figs. 5-6); determine whether the personal identity code matches at least one of one or more stored personal identity codes (para. 0064, fig. 5, step 502, the user touches their smartcard on the mobile device/ personal identity codes stored in the mobile device); upon a successful match, identify a URL associated with the personal identity code, wherein the URL is associated with the URL after a predetermined number of visits by the user device application to the URl does disclose (paras. 0057-0060 and fig. 2, the OTP is associated with the username, and linked with a URL which is fed to the browser on the smartphone. The username and OTP is embedded within the URL and the whole URL is passed to transmitter 212). Examiner, however, in light of the above submission maintains the previous rejections while considering the amendments to the claims as follows: Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. Claims 1-11, 13-20 and 22 are rejected under 35 U.S.C. 102 (a) (1) as being anticipated by Hart et al. (hereinafter Hart), Pub. No.: US 2013/0318575. Referring to claim 1, Hart teaches a system for dynamic direction of a user device to a Uniform resource locator (URL) (paras. 0001, 0057, URL is received and figs. 1-4), the system comprising: a card (para. 0043 and figs. 1-4, smartcard); and a server (para. 0045 and figs. 1-4, remote server 108), the server further comprising: a memory (para. 0045 and figs. 1-4), and a processor (para. 0045 and figs. 1-4) configured to: open a communication field (para. 0065, step 504, and figs. 5-6, 503 smart cards presented…), receive, from the card via the communication field, a request to direct a user device application to the server, the request comprising a personal identity code generated based on a transaction history of an owner of a user device associated with the user device application (para. 0064, step 502; para. 0065, step 504; para. 0067, step 508; para. 0068, step 510; para. 0069, step 512; para. 0070-0077, step 516 and figs. 5-6), determine whether the personal identity code matches at least one of one or more stored personal identity codes (para. 0064, fig. 5, step 502, the user touches their smartcard on the mobile device/ personal identity codes stored in the mobile device), upon a successful match, identify a URL associated with the personal identity code, wherein the URL is associated with the URL after a predetermined number of visits by the user device application to the URL (paras. 0057-0060 and fig. 2, the OTP is associated with the username, and linked with a URL which is fed to the browser on the smartphone. The username and OTP is embedded within the URL and the whole URL is passed to transmitter 212). receive, from the server, an authentication request (para. 0075), transmit, to the server, an authentication credential (para. 0076), validate the authentication credential (para. 0077), and direct the user device application to the website associated with the URL (para. 0057 and fig. 5-6, “When the smartphone is energized by the NFC field generated by chip inside the smartphone, the URL is received and passed to the browser, which opens up the secure website for the user.). Referring to claim 2, Hart further teaches wherein the processor is further configured to: open, upon receiving an authentication request from the server, a second communication field (para. 0074), and perform a diversified key exchange between the card and the server, the card further configured with a private key and the server further configured with a public key (paras. 0054-0055 and figs. 5-6, PKI Public Key Infrastructure). Referring to claim 3, Hart further teaches wherein the user device associated with the user device application is at least one selected from the group of a smart phone, tablet, smart watch or computer (para. 0046 and figs. 1-4). Referring to claim 4, Hart further teaches wherein the authentication credential is a password or personal identification number (PIN) number (paras. 0074-0075 and fig. 6, security data. i.e., password, PIN). Referring to claim 5, Hart further teaches wherein the authentication credential is a biometric fingerprint scan, facial scan, or voice recognition (para. 0074-0075 and figs. 5-6, biometric info.). Referring to claim 6, Hart further teaches wherein the predetermined URL can be changed manually by the user on the user device (para. 0016). Referring to claim 7, Hart further teaches wherein the personal identity code is associated with an email, phone number, or card information (para. 0069-0071 and figs. 6-7, mobile device). Referring to claim 8, Hart further teaches wherein the card is further configured with a private key and the server is further configured with a public key (paras. 0054-0055 and figs. 5-6). Referring to claim 9, Hart further teaches wherein the card is a contactless card associated with an account holder at a banking institution (para. 0043, 0080 and figs. 1-4). Referring to claim 10, This claim is similar in scope to claim 1, and is therefore rejected under similar rationale. Referring to claim 11, This claim is similar in scope to claim 2, and is therefore rejected under similar rationale. Referring to claim 13, Hart further teaches wherein the personal identity code is a driver's license number, passport number, or birth date (paras. 0018, 0052, additional authentication info.). Referring to claim 14, Hart further teaches wherein the communication field is Bluetooth, a near field communication (NFC) field, or a Radio Frequency Identification (RFID)-compatible field (para. 0063 and figs. 5-6). Referring to claim 15, This claim is similar in scope to claim 9, and is therefore rejected under similar rationale. Referring to claim 16, Hart further teaches wherein the steps further comprise transmitting the authentication request by a short message service (SMS) or a multimedia message service (MS) (paras. 0062, 0069, transmitted to the mobile device, i.e., SMS, MS). Referring to claim 17, Hart further teaches wherein the steps further comprise directing the user device to a mobile application associated with the URL (paras. 0057-0058). Referring to claim 18, Hart further teaches wherein the authentication credential is a digital signature from the card (para. 0059, PKI certificate). Referring to claim 19, This claim is similar in scope to claim 1, and is therefore rejected under similar rationale. Referring to claim 20, Hart further teaches wherein a copy of the personal identity code is stored in a memory associated with the server (paras. 0003, 0052). Referring to claim 22, Hart further teaches wherein the personal identity code is associated with the URL after the user device application has visited the URL for a predetermined time period (paras. 0057-0060 and fig. 2, The username and OTP is embedded within the URL and the whole URL is passed to transmitter 212). Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Please see the attached PTO-892. Any inquiry concerning this communication or earlier communications from the examiner should be directed to YONAS A BAYOU whose telephone number is (571)272-7610. The examiner can normally be reached Monday-Friday 7AM-4PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Philip Chea can be reached at 571-272-3951. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /YONAS A BAYOU/Primary Examiner, Art Unit 2499 03/17/2026
Read full office action

Prosecution Timeline

Mar 21, 2023
Application Filed
Mar 10, 2025
Non-Final Rejection — §102
Jul 15, 2025
Response Filed
Sep 01, 2025
Final Rejection — §102
Mar 04, 2026
Request for Continued Examination
Mar 16, 2026
Response after Non-Final Action
Mar 20, 2026
Non-Final Rejection — §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603776
METHOD FOR DISTRIBUTING AUTHENTICATABLE SATELLITE DATA BETWEEN ENTITIES
2y 5m to grant Granted Apr 14, 2026
Patent 12592838
CRYPTOGRAPHIC ALGORITHM IDENTITY (CAI) CERTIFICATE SELECTION SYSTEM AND METHOD
2y 5m to grant Granted Mar 31, 2026
Patent 12592916
METHODS AND APPARATUS TO AUTHENTICATE COMPUTING DEVICES
2y 5m to grant Granted Mar 31, 2026
Patent 12592822
CODE CONVERSION APPARATUS, CODE CONVERSION METHOD, AND COMPUTER READABLE RECORDING MEDIUM
2y 5m to grant Granted Mar 31, 2026
Patent 12587530
CLOUD ARCHITECTURE FOR ENFORCING MULTI-DIMENSIONAL DATA SECURITY USING SECURITY ASSIGNMENTS BEYOND ROLE-BASED ACCESS CONTROLS
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
84%
Grant Probability
99%
With Interview (+15.1%)
2y 11m
Median Time to Grant
High
PTA Risk
Based on 845 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month