Prosecution Insights
Last updated: April 19, 2026
Application No. 18/207,920

Identifying Constraints on Media Content Usage using Watermarks

Non-Final OA §103
Filed
Jun 09, 2023
Examiner
WORKU, SARON MATTHEWOS
Art Unit
2408
Tech Center
2400 — Computer Networks
Assignee
Disney Enterprises Inc.
OA Round
3 (Non-Final)
67%
Grant Probability
Favorable
3-4
OA Rounds
2y 7m
To Grant
99%
With Interview

Examiner Intelligence

Grants 67% — above average
67%
Career Allow Rate
12 granted / 18 resolved
+8.7% vs TC avg
Strong +54% interview lift
Without
With
+53.6%
Interview Lift
resolved cases with interview
Typical timeline
2y 7m
Avg Prosecution
30 currently pending
Career history
48
Total Applications
across all art units

Statute-Specific Performance

§101
2.8%
-37.2% vs TC avg
§103
46.6%
+6.6% vs TC avg
§102
37.0%
-3.0% vs TC avg
§112
10.5%
-29.5% vs TC avg
Black line = Tech Center average estimate • Based on career data from 18 resolved cases

Office Action

§103
DETAILED ACTION This office action is in response to applicant’s submission filed on December 30, 2025. Claims 4 and 14 are canceled. Claims 1-3, 5-13, and 15-20 are pending and rejected. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on January 29, 2026 has been entered. Response to Amendment This communication is in response to the amendment filed on December 30, 2025. The Examiner has acknowledged the amended claims 1 and 11. Claims 4 and 14 are canceled. Claims 1-3, 5-13, and 15-20 are pending and are rejected. Response to Arguments Applicant’s Arguments (Remarks) filed December 30, 2025 have been fully considered, but are not persuasive. Applicant argues that the prior art does not teach the newly added limitation. Examiner respectfully disagrees. With the support of paragraphs 0060 and 0073, Examiner notes that these texts disclose generating and specifying multiple predetermined embedding locations in the AV content and embedding different categories of usage-related information (ownership rules vs. user-identifying fingerprints). The combination of these texts is consistent with the claimed limitation between different predetermined locations and different types of usage constraints since it shows embedding different types of usage-related information at multiple different specified locations. Examiner also brought it a new reference to teach the linkage brought forth in this amendment. See also 103 rejection below. Examiner notes that the cancelation of claims 4 and 14 has issued a new claim objection. See also Claim Objections below. Claim Objections Claims 5 and 15 objected to because of the following informalities: In claim 5, “The media player of claim 4” should read “The media player of claim 1” as claim 4 is canceled. In claim 15, “The method of claim 14” should read “The method of claim 11” as claim 14 is canceled. Appropriate correction is required. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-3, 5-13, and 15-20 are rejected under 35 U.S.C. 103 as being unpatentable by US 2017/0242988 A1 to MacKay et al. (hereinafter, “MacKay”) in view of US 2022/0287069 A1 to Sengupta et al. (hereinafter, “Sengupta”). Regarding claim 1, MacKay discloses: A media player comprising: a hardware processor (“processor (or a machine that emulates a processor)” [0038]); and a system memory storing a software code (“Firmware 202, comprising basic input-output software or BIOS, often implemented in read-only, persistent memory such as ROM, PROM, EPROM, or flash memory” [0031]); the hardware processor configured to execute the software code to (“The decision as to whether the system software, drivers, and/or hardware may process the content, or whether certain modifications should be applied to the content as it is processed, is based on a qualification or inspection technique implemented by a separate process that is operable to check the signature or cryptographically-derived identity of the system software, drivers, and/or hardware. In one embodiment, the determination of whether content may be processed or modified is independent of mechanisms or services such as file names of program files which implement system software or software driver code, and is also independent of cryptographically signed code and native operating system access control mechanisms or services provided by the operating system or system software itself” [0011]): receive audio-video (AV) content (“Once these files are accessed, the user can instruct computer 101 to process the files and/or send them to other devices in system 100. For example, a user might download an audio file from networked computer 130 and store the file on hard disk 110” [0030]; “For example, without limitation, the present invention could be readily applied in the context of video, image, text, audio-visual, or other content types” [0024]); receive a command to perform an action using the AV content (“Thus, the inspector module is able to determine the identity of the drivers that are actually used to process the content, and can then locate the drivers' corresponding registry entries and/or compute the cryptographic hash of the drivers and compare each hash value with a list of known good (or known bad) drivers, or perform other analysis, as described in more detail elsewhere herein” [0082]; “Referring to FIG. 4A, in one embodiment each inspector module 230 is operable, upon receipt of an appropriate command from inspection manager software 232, to locate drivers in the appropriate driver chain (410), to inspect those drivers using predefined criteria (such as those set forth above) (420), and to send the results of the inspection to inspection manager 232 (430)” [0084]); inspect the AV content for a presence of a watermark (“Watermark screening is provided by invoking a filter module to examine content before it is delivered to the output hardware. The filter module is operable to prevent delivery of the content if it detects a predefined protection mark” [0028] [Examiner notes that inspecting here demonstrates how absence and presence of a watermark is mapped]) embedded in the AV content at one or more predetermined locations, wherein different predetermined locations within the AV content correspond (“During the first phase, the unwatermarked content is processed to identify and/or generate a variety of locations at which watermarks or fingerprints can subsequently be inserted. During the second phase, the watermarks or fingerprints are actually inserted at the specified locations” [0073] [Examiner notes that the system can inspect if the media content is watermarked or not since after analyzing it and categorizing it as unwatermarked it identifies a location within the content to insert a watermark. These locations are the ones used to see if the media has the watermark in the first place during inspection]; “As described below, in some embodiments a content watermarking or fingerprinting solution may be implemented in the system and/or client library. For convenience, “watermarking” will be used to refer to the mechanism that embeds information in content, whereas a “watermark” will refer to information that is embedded statically within the content to provide, for example, an indication of ownership and/or rules for content use. A “fingerprint” will generally refer to information that is embedded dynamically, as part of content release, and that (typically) identifies the user who performed the transaction, thus enabling content to be traced back to the user if, e.g., the content is subsequently used or distributed in an unauthorized manner. Note that a “watermarking” mechanism can be used to embed either a watermark or a fingerprint, depending on the nature of the information that is embedded” [0060] [Examiner notes that the first text discloses generating and specifying multiple predetermined embedding locations in the AV content. This second text was brought in because it discloses embedding different categories of usage-related information (ownership rules vs. user-identifying fingerprints). The combination of these texts is consistent with the claimed limitation between different predetermined locations and different types of usage constraints since it shows embedding different types of usage-related information at multiple different specified locations]); identify, when inspecting reveals the presence of the watermark, a business rule corresponding to the presence of the watermark (“The present invention relates generally to computer processing of protected digital content by applications and supporting operating system services implemented by kernel mode or user mode modules, also known as drivers or filters, respectively. The invention provides a set of services for inspecting, classifying, controlling, and modifying the functionality of the operating system modules according to the security policies of an application and/or a digital rights management (DRM) system linked with the application and responsible for ensuring the secure processing of digital content. The invention provides an extensible set of functions for protecting against the unauthorized use of digital content by enabling the application and/or its associated DRM system to restrict processing of, or to impose modifications to, the content depending on whether system modules are present which do not conform to the security policies of the application or DRM system. Such non-conformance can be determined by a variety of techniques, including without limitation, inspection, classification, and/or control of a module's dynamic behavior, static structure, and/or other identifying characteristics” [0026] [Examiner notes that this text shows inspecting, analyzing the behavior/structure, classifying, determining where it fits in the defined categories (trusted, non-trusted, etc.), and security policy accordance (critical link to business rule as the security policies are formal rules that can define what is/is not acceptable). The system analyzes the module (e.g. for a watermark presence), then classifies it based on defined rules (policies) -- meaning it must reference and match against those rules]); permit or prevent execution of the command to perform the action based on the business rule (“Upon receiving inspection data 602, policy enforcement manager 234 is operable to determine whether the appropriate policy criteria 604 have been satisfied, and permit the release of the content and/or take appropriate defensive action accordingly” [0112]); and in response to permitting execution of the command to perform the action, insert an additional watermark into the AV content or modify the watermark of the AV content (“The content producer pre-processes the content in order to obtain the information needed to enable transaction-time watermarking or fingerprinting at the consumer system (as described in more detail below)” [0027]; “As described in more detail below, the present invention employs a combination of techniques, including transaction-time watermarking (or fingerprinting), transaction-time screening, driver software validation, and/or content transfer protection to deter and/or prevent attempts to circumvent the protection of electronic content. The goal of these mechanisms is to protect content as much as possible from the time it is packaged until it is experienced by the consumer. 1. Content Fingerprinting As described below, in some embodiments a content watermarking or fingerprinting solution may be implemented in the system and/or client library. For convenience, “watermarking” will be used to refer to the mechanism that embeds information in content, whereas a “watermark” will refer to information that is embedded statically within the content to provide, for example, an indication of ownership and/or rules for content use. A “fingerprint” will generally refer to information that is embedded dynamically, as part of content release, and that (typically) identifies the user who performed the transaction, thus enabling content to be traced back to the user if, e.g., the content is subsequently used or distributed in an unauthorized manner. Note that a “watermarking” mechanism can be used to embed either a watermark or a fingerprint, depending on the nature of the information that is embedded. In one embodiment, a credentialed watermarking engine is used to implement a predefined interface. Fingerprint attributes are associated with content to define the type of technology used to insert the fingerprint and the information to be included therein. An audio fingerprint can be applied at the time content is released, e.g., to a consumer using a music player application” [0059-0061] [Examiner notes that this text shows how a watermark is inserted by a creator or a distributor when the transaction-time watermarking happens in response to executing a command to perform the action whether it is playing a song or watching a video. Examiner also notes that this text describes adding a watermark dynamically when a transaction or release event occurs. The modifying occurs by turning a static ownership mark into one that includes user-specific of transaction-specific data. The command is a triggering event which includes being released, playback, downloaded, distribution, etc. and initiates watermark insertion or modification. This text illustrates a system that describes a transaction-time watermarking/fingerprinting system (watermarks being dynamically embedded or updated at the moment the content is released, accessed, or transferred, which aligns clearly with the claim limitation as it shows the exact dynamic operation (when an action, such as playback, transfer, or release is executed, the system adds or modifies a watermark)]). MacKay does not disclose: embedded in the AV content at one or more predetermined locations, wherein different predetermined locations within the AV content correspond respectively to different types of constraints on usage of the AV content. However, Sengupta discloses: embedded in the AV content at one or more predetermined locations, wherein different predetermined locations within the AV content correspond respectively to different types of constraints on usage of the AV content (“…determining a first starting location… where the first starting location may be based on a first constraint type, and determining a second starting location… where the second starting location may be based on a second constraint type” [0040] [Examiner notes that this secondary reference text establishes correspondence between location and constraint type, which is what is required by the term “respectively”. It shows that direct pairing of each location with a distinct type of constraint. Since the determination of each location is tied to a specific constraint type, the text makes it clear that different locations are governed by different constraint types, providing that specific linkage between location and type of constraint and showing that that linkage is not novel]). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify MacKay with the added structure of Sengupta in order for the system to be able to go determine what rules apply just by checking the location. Claim 11 recites substantially the same limitation as claim 1, in the form of a method for implementing the corresponding system, therefore it is rejected under the same rationale. Regarding claims 2 and 12, a combination of MacKay-Sengupta disclose the system of claim 1/11. MacKay further discloses: wherein modifying the watermark comprises replacing the watermark with another watermark (“The content producer pre-processes the content in order to obtain the information needed to enable transaction-time watermarking or fingerprinting at the consumer system (as described in more detail below)” [0027] [Examiner notes that transaction-time watermarking can include inserting an additional watermark (when adding the dynamic watermark at the time of transaction) or replacing a watermark (distributor can overwrite or replace a dynamic watermark with another one that is customized per user's transaction)]). Regarding claims 3 and 13, a combination of MacKay-Sengupta disclose the system of claim 1/11. MacKay further discloses: wherein the watermark comprises: (i) at least one visual watermark imperceptible to a human viewer of the AV content; (ii) at least one audio watermark imperceptible to the human viewer of the AV content; or (iii) at least one visual watermark and at least one audio watermark each imperceptible to the human viewer of the AV content (“A watermarking technology is used to embed imperceptible codes into the content as it is being released to the consumer” [0027]). Regarding claim 5 and 15, a combination of MacKay-Sengupta disclose the system of claim 1/11. MacKay further discloses: wherein the one or more predetermined locations comprise predetermined regions within one or more video frames of the AV content or a predetermined timestamp of an audio track of the AV content (“a “watermark” will refer to information that is embedded statically within the content to provide, for example, an indication of ownership and/or rules for content use” [0060] [Examiner notes that if a watermark is embedded statically within an AV content, then it is implied that this includes in a video frame and/or a timestamp of the AV content]). Regarding claim 6 and 16, a combination of MacKay-Sengupta disclose the system of claim 1/11. MacKay further discloses: wherein prior to receiving the AV content by the media player, the watermark is inserted into the AV content by a creator or a distributor of the AV content (“The present invention provides systems and methods for protecting digital content from the time it is packaged until it is experienced by the consumer. In one embodiment, a combination of watermarking and fingerprinting is used. The content producer pre-processes the content in order to obtain the information needed to enable transaction-time watermarking or fingerprinting at the consumer system (as described in more detail below)” [0027] [Examiner notes that this text shows how a watermark is inserted by a creator or a distributor when the transaction-time watermarking happens in response to executing a command to perform the action whether it is playing a song or watching a video. Examiner notes that this text explicitly states that protection starts before playback (before the media player “experiences” or plays/renders the content. The producer gathers data in advance so that the content is released). Regarding claim 7 and 17, a combination of MacKay-Sengupta disclose the system of claim 1/11. MacKay further discloses: wherein the additional watermark is inserted at a predetermined location within the AV content (“The content producer pre-processes the content in order to obtain the information needed to enable transaction-time watermarking or fingerprinting at the consumer system (as described in more detail below)” [0027] [Examiner notes that transaction-time watermarking can include inserting an additional watermark (when adding the dynamic watermark at the time of transaction) or replacing a watermark (distributor can overwrite or replace a dynamic watermark with another one that is customized per user's transaction)]). Regarding claim 8 and 18, a combination of MacKay-Sengupta disclose the system of claim 1/11. MacKay further discloses: wherein the action comprises playout of the AV content, and wherein inserting the additional watermark into the AV content or modifying the watermark of the AV content occurs: (i) after playout of a predetermined first segment of the AV content; (ii) during or after playout of a predetermined last segment of the AV content; or (iii) at a plurality of predetermined intervals during playout of the AV content (“The content producer pre-processes the content in order to obtain the information needed to enable transaction-time watermarking or fingerprinting at the consumer system (as described in more detail below)” [0027] [Examiner notes that the watermark is inserted at time of playout by the specific user]). Regarding claim 9 and 19, a combination of MacKay-Sengupta disclose the system of claim 1/11. MacKay further discloses: wherein the business rule permits or prevents at least one of playout of the AV content, transmission of the AV content to another system, or copying the AV content (“Upon receiving inspection data 602, policy enforcement manager 234 is operable to determine whether the appropriate policy criteria 604 have been satisfied, and permit the release of the content and/or take appropriate defensive action accordingly” [0112]). Regarding claim 10 and 20, a combination of MacKay-Sengupta disclose the system of claim 1/11. MacKay further discloses: wherein the business rule specifies one or more types of media players by which playout of the AV content is permitted (“Upon receiving inspection data 602, policy enforcement manager 234 is operable to determine whether the appropriate policy criteria 604 have been satisfied, and permit the release of the content and/or take appropriate defensive action accordingly” [0112]; “When an unacceptable module is detected during processing of protected content, the system is operable to respond in an appropriate manner. For example, in one embodiment three response options are provided: (1) return an error and deny the operation; (2) remove or disable the offending module and deny the operation; and (3) damage the content, but permit the operation to continue” [0119] [Examiner notes that the security policies enforced by the policy enforcement manager helps the system to see if that specific content can be released or played out by that corresponding system]). Conclusion The prior art made of record and not relied upon is considered pertinent to applicant’s disclosure: Craft (US 2023/0083893 A1) teaches techniques for a computer-implemented method of object linking from captured media records media (audio or video) from a scene of a program (e.g., TV show, movie or other similar audio visual content), identifies the program and the program scene from a watermark embedded in the captured media or by fingerprinting the captured media and matching the fingerprint to determined fingerprints in a database that relates determined fingerprints to programs and program scenes, determines participants in scene from a participant database that relates participants to programs and program scenes, generates links to objects and online commerce sites offering the linked objects. Records for the objects are contained in a virtual repository, a database that relates users (e.g., participants) to object records. Any inquiry concerning this communication or earlier communications from the examiner should be directed to SARON MATTHEWOS WORKU whose telephone number is (703)756-1761. The examiner can normally be reached Monday - Friday, 9:30 am - 6:30pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Linglan Edwards can be reached on 571-270-5440. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SARON MATTHEWOS WORKU/Examiner, Art Unit 2408 /LINGLAN EDWARDS/Supervisory Patent Examiner, Art Unit 2408
Read full office action

Prosecution Timeline

Jun 09, 2023
Application Filed
Jun 25, 2025
Non-Final Rejection — §103
Sep 03, 2025
Response Filed
Oct 30, 2025
Final Rejection — §103
Dec 30, 2025
Response after Non-Final Action
Jan 29, 2026
Request for Continued Examination
Feb 01, 2026
Response after Non-Final Action
Feb 19, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12547939
SYSTEM AND A METHOD FOR PERFORMING A PRIVACY-PRESERVING DISTRIBUTION SIMILARITY TESTS BETWEEN A PLURALITY OF DATASETS
2y 5m to grant Granted Feb 10, 2026
Patent 12524579
SRAM PHYSICALLY UNCLONABLE FUNCTION (PUF) MEMORY FOR GENERATING KEYS BASED ON DEVICE OWNER
2y 5m to grant Granted Jan 13, 2026
Patent 12513013
Dynamic Cross-Node Multidimensional Hashchain Network-Based Meta-Content Enabler for Real-Time Content Based Anomaly Detection
2y 5m to grant Granted Dec 30, 2025
Patent 12475240
PROTECTED CONTENT CONTAMINATION PREVENTION
2y 5m to grant Granted Nov 18, 2025
Patent 12470519
INTRA-VLAN TRAFFIC FILTERING IN A DISTRIBUTED WIRELESS NETWORK
2y 5m to grant Granted Nov 11, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
67%
Grant Probability
99%
With Interview (+53.6%)
2y 7m
Median Time to Grant
High
PTA Risk
Based on 18 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month