Prosecution Insights
Last updated: April 19, 2026
Application No. 18/237,929

IMPAIRED MODE FOR A MOBILE DEVICE

Final Rejection §103
Filed
Aug 25, 2023
Examiner
PARK, YONG S
Art Unit
3694
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Motorola Mobility LLC
OA Round
4 (Final)
24%
Grant Probability
At Risk
5-6
OA Rounds
3y 4m
To Grant
36%
With Interview

Examiner Intelligence

Grants only 24% of cases
24%
Career Allow Rate
54 granted / 220 resolved
-27.5% vs TC avg
Moderate +11% lift
Without
With
+11.4%
Interview Lift
resolved cases with interview
Typical timeline
3y 4m
Avg Prosecution
39 currently pending
Career history
259
Total Applications
across all art units

Statute-Specific Performance

§101
47.3%
+7.3% vs TC avg
§103
35.5%
-4.5% vs TC avg
§102
5.1%
-34.9% vs TC avg
§112
10.7%
-29.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 220 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Status of Claims This action is in reply to the amendment filed 11/25/2025. Claims 1, 13, 14, 16, 20, and 21 have been amended and new claim 22 is added. Claims 1-9, 11-17, and 19-22 are pending and have been examined on the merits (claims 1, 14, and 16 being independent). The amendment filed 11/25/2025 to the claims has been entered. Response to Arguments Applicant’s arguments and amendments filed 11/25/2025 have been fully considered. With regard to the rejections of claims 1-9, 11-17, and 19-22 under 35 U.S.C. 103, Applicant’s arguments and amendments have been considered but are moot as a new ground of rejection has been added and Examiner respectfully disagrees. Examiner notes that Applicant is arguing newly amended claim language. As noted in the citation above the prior art and it is addressed by the rejections under 35 USC 103. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. In the rejections below, where claims are currently amended, this is indicated by underlining. Claims 1, 7, 11-14, 16, and 21-22 are rejected under 35 U.S.C. 103 as being unpatentable over Xie Zhen, CN 109064182 A in view of Benkreira et al. (hereinafter Benkreira), US Publication Number 2022/0067741 A1. Regarding claim 1: Xie Zhen discloses the following: A mobile device comprising: (Xie Zhen: See paragraph [0044] “the mobile terminal may include: a processor 1001, such as a CPU, a communication bus 1002 , a user interface 1003, a network interface 1004, and a memory 1005.”, and see also [0128]) one or more sensors to capture biometric data describing a condition of a user of the mobile device; (Xie Zhen: See paragraph [0090] “the mobile terminal receives the pulse information and body temperature information sent by the pulse sensing device, and determines whether the human body is in a sleep state based on the pulse information and the body temperature information.”) at least one processor; and computer-readable storage media storing instructions that are executable by the at least one processor to: (Xie Zhen: See paragraph [0034] “The present invention also provides a computer-readable storage medium, on which a payment verification program is stored, and when the payment verification program is executed by a processor”) trigger an impaired mode for the mobile device based on a determination that the user of the mobile device is in an impaired state based on the biometric data; (Xie Zhen: See paragraph [0090] “determines whether the human body is in a sleep state based on the pulse information and the body temperature information. If it is determined that the human body is in a sleep state, the activation instruction of the dangerous payment mode is triggered.”) receive (reads on “a payment verification interface is displayed, and voice verification data is collected through the payment verification interface”) a request to perform a data transfer related to an action on the mobile device; (Xie Zhen: See paragraph [0100] “When a payment instruction is detected and the current payment mode of the mobile terminal is a dangerous payment mode, a payment verification interface is displayed, and voice verification data is collected through the payment verification interface.”) Xie Zhen does not explicitly disclose the following, however Benkreira further teaches: generate (reads on “At procedure 720, current biological information can be received from the customer. At procedure 725, an impairment can be determined by comparing the baseline biological function to the current biological information”) instructions to present a challenge to the user on the mobile device, based at least in part on the impaired mode to determine whether the user remains in the impaired state; and (Benkreira: see paragraph [0046], and notes: the recited claim a “challenge” reads on “current biological information”) determine (reads on “the transaction can be approved or denied based on the impairment.”) whether to perform the data transfer (read on “the transaction”) based on a result of the challenge. (Benkreira: see paragraph [0046] “an impairment can be determined by comparing the baseline biological function to the current biological information. At procedure 730, the transaction can be approved or denied based on the impairment.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include an impairment that can be determined by comparing the baseline biological function to the current biological information and the transaction can be approved or denied based on the impairment, as taught by Benkreira, in order to provide a spending protection. (Benkreira, paragraphs [0002-0003]) Regarding claim 7: Xie Zhen discloses the following: The mobile device of claim 1, wherein to trigger the impaired mode, the instructions are executable by the at least one processor to: present (reads on “the sliding gesture triggering is to obtain the user's sliding gesture and determine whether the sliding gesture is a preset sliding gesture”) a query via the mobile device requesting whether to activate the impaired mode; and (Xie Zhen: See paragraph [0090] “the triggering methods of the activation instruction of the dangerous payment mode include sliding gesture triggering, physical button triggering and sleep sensing triggering. Specifically, the sliding gesture triggering is to obtain the user's sliding gesture and determine whether the sliding gesture is a preset sliding gesture. If the sliding gesture is a preset sliding gesture, the activation instruction of the dangerous payment mode is triggered”) activate (reads on “If the sliding gesture is a preset sliding gesture, the activation instruction of the dangerous payment mode is triggered”) the impaired mode in response to input to the query. (Xie Zhen: See paragraph [0090] “the triggering methods of the activation instruction of the dangerous payment mode include sliding gesture triggering, physical button triggering and sleep sensing triggering. Specifically, the sliding gesture triggering is to obtain the user's sliding gesture and determine whether the sliding gesture is a preset sliding gesture. If the sliding gesture is a preset sliding gesture, the activation instruction of the dangerous payment mode is triggered”) Regarding claim 11: Xie Zhen discloses the following: The mobile device of claim 1, wherein in response to a trigger of the impaired mode and prior to the request to perform the action, the instructions are executable by the at least one processor to present, on the mobile device, an option to provide a proactive action. (Xie Zhen: See paragraph [0098] “when it is necessary to close the dangerous payment mode, identity authentication is required, that is, the current payment mode of the mobile terminal is set to the normal payment mode only after the collected voice data is verified, to prevent others from closing the dangerous payment mode and improve security.”) Regarding claim 12: Xie Zhen discloses the following: The mobile device of claim 1, wherein the instructions are executable by the at least one processor to: receive further sensor data from the one or more sensors to determine one or more further state conditions associated with the mobile device; and (Xie Zhen: See paragraph [0095] “when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface,… The mobile terminal collects voice data during the process of the user reading aloud the verification content, wherein the voice data is voice containing the verification content”) deactivate the impaired mode by correlating the one or more further state conditions to one or more impaired mode settings. (Xie Zhen: See paragraph [0096] “verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode.”) Regarding claim 13: Xie Zhen discloses the following: The mobile device of claim 1, wherein the instructions are executable by the at least one processor to: receive a request to deactivate the impaired mode; (Xie Zhen: See paragraph [0095] “when a closing instruction of a triggered dangerous payment mode is monitored”) present, on the mobile device, the challenge; and (Xie Zhen: See paragraph [0095] “a verification interface is displayed, and voice data is collected based on the verification interface… The mobile terminal collects voice data during the process of the user reading aloud the verification content, wherein the voice data is voice containing the verification content”) determine whether to deactivate the impaired mode based at least in part on the result of the challenge. (Xie Zhen: See paragraph [0096] “verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode.”) Regarding claim 14: Xie Zhen discloses the following: A method comprising: obtaining biometric data describing a condition of a user of a mobile device using one or more sensors of the mobile device; (Xie Zhen: See paragraph [0090] “the mobile terminal receives the pulse information and body temperature information sent by the pulse sensing device, and determines whether the human body is in a sleep state based on the pulse information and the body temperature information.”) triggering an impaired mode for a user account based on determining that the user of the mobile device is in an impaired state based on the biometric data; (Xie Zhen: See paragraph [0090] “determines whether the human body is in a sleep state based on the pulse information and the body temperature information. If it is determined that the human body is in a sleep state, the activation instruction of the dangerous payment mode is triggered.”) receiving a request to perform (reads on “a payment verification interface is displayed, and voice verification data is collected through the payment verification interface”) a data transfer related to an action on the mobile device; (Xie Zhen: See paragraph [0100] “When a payment instruction is detected and the current payment mode of the mobile terminal is a dangerous payment mode, a payment verification interface is displayed, and voice verification data is collected through the payment verification interface.”) Xie Zhen does not explicitly disclose the following, however Benkreira further teaches: generating (reads on “At procedure 720, current biological information can be received from the customer. At procedure 725, an impairment can be determined by comparing the baseline biological function to the current biological information”) instructions to present a challenge to the user on the mobile device to determine whether the user remains in the impaired state and (Benkreira: see paragraph [0046], and notes: the recited claim a “challenge” reads on “current biological information”) applying one or more constraints to the data transfer based at least in part on the impaired mode; and (Benkreira: see paragraph [0023] “The user can activate impaired mode spending restrictions, and set a particular time period for the restrictions. As discussed above, a start time and end time can be provided, or a start time and duration can be provided. The user can also set different time periods based on different days.”, see also [0021-0022]) determining (reads on “the transaction can be approved or denied based on the impairment.”) whether to perform the data transfer based on a result of the challenge. (Benkreira: see paragraph [0046] “an impairment can be determined by comparing the baseline biological function to the current biological information. At procedure 730, the transaction can be approved or denied based on the impairment.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include an impairment that can be determined by comparing the baseline biological function to the current biological information and the transaction can be approved or denied based on the impairment, as taught by Benkreira, in order to provide a spending protection. (Benkreira, paragraphs [0002-0003]) Regarding claim 16: Xie Zhen discloses the following: A system comprising: at least one memory; and at least one processor coupled to the at least one memory and configured to cause the system to: receive, at a network device, a notification from a mobile device indicating that an impaired mode is active on the mobile device and that an action involving a data transfer is requested via a user account associated with a user of the mobile device, (Xie Zhen: See paragraph [0100] “When a payment instruction is detected and the current payment mode of the mobile terminal is a dangerous payment mode, a payment verification interface is displayed, and voice verification data is collected through the payment verification interface.”) the impaired mode based on biometric data obtained by one or more sensors of the mobile device describing a condition of a user of the mobile device and a determination that the user of the mobile device is in an impaired state; (Xie Zhen: See paragraph [0090] “the mobile terminal receives the pulse information and body temperature information sent by the pulse sensing device, and determines whether the human body is in a sleep state based on the pulse information and the body temperature information. If it is determines whether the human body is in a sleep state based on the pulse information and the body temperature information. If it is determined that the human body is in a sleep state, the activation instruction of the dangerous payment mode is triggered.”) Xie Zhen does not explicitly disclose the following, however Benkreira further teaches: generate (reads on “At procedure 720, current biological information can be received from the customer. At procedure 725, an impairment can be determined by comparing the baseline biological function to the current biological information”) instructions to present a challenge to the user on the mobile device to determine whether the user remains in the impaired state, via the user account based at least in part on one or more impaired mode settings (reads on “At procedure 730, the transaction can be approved or denied based on the impairment. At procedure 735, the transaction can be automatically denied if it is initiated within a particular time period, which can be set by the customer. At procedure 740, the transaction can be automatically denied if it is over a particular amount. At procedure 745, information related to the financial transaction can be provided to the customer after the transaction impairment has ended.”) including applying one or more constraints to the action; (Benkreira: see paragraph [0046], and notes: the recited claim a “challenge” reads on “current biological information”, and see also [0021-0022]) determine (reads on “the transaction can be approved or denied based on the impairment.”) whether to perform the data transfer based on a result of the challenge; and (Benkreira: see paragraph [0046] “an impairment can be determined by comparing the baseline biological function to the current biological information. At procedure 730, the transaction can be approved or denied based on the impairment.”) transmit, to the mobile device, a notification indicating a result of the action in response to the challenge. (Benkreira: see paragraph [0048] “at procedure 905, eye tracking information can be received from an infrared camera. At procedure 910, a baseline eye information can be determined based on the eye tracking information. At procedure 915, the baseline eye information can be compared to a predetermined eye information stored in a database. At procedure 920, a financial transaction can be denied if the baseline eye information does not substantially match the predetermined eye information.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include an impairment that can be determined by comparing the baseline biological function to the current biological information and the transaction can be approved or denied based on the impairment, as taught by Benkreira, in order to provide a spending protection. (Benkreira, paragraphs [0002-0003]) Regarding claim 21: Xie Zhen discloses the following: The mobile device of claim 1, wherein the instructions are executable by the at least one processor to perform (reads on “a corresponding payment operation is executed”) the data transfer related to the action in response to determining (reads on “When the payment verification passes, password verification information is received and verified, and when the password verification information passes the verification”) that the user of the mobile device is no longer impaired. (Xie Zhen: See paragraph [0035] “When a payment instruction is monitored and the current payment mode of a mobile terminal is a dangerous payment mode, the present invention displays a payment verification interface, and performs voiceprint feature recognition and emotion recognition on voice verification data received based on the payment verification interface to determine a target voiceprint feature and a target emotion category, and executes a payment verification operation based on the target voiceprint feature and the target emotion category. When the payment verification passes, password verification information is received and verified, and when the password verification information passes the verification, a corresponding payment operation is executed.”) Regarding claim 22: Xie Zhen does not explicitly disclose the following, however Benkreira further teaches: The mobile device of claim 1, wherein the challenge involves capturing additional biometric data using the one or more sensors to determine whether the user remains in the impaired state. (Benkreira: see paragraph [0041] “Data from various sleep sensors that can detect sleep patterns of the particular user, and other users, can be analyzed in order to determine sleep patterns, which can be applied to the specific user. Additionally information regarding the impairment of other users, as described above, can be analyzed and applied to a particular user. For example, eye tracking information, cognitive information, and other suitable parameters can be tracked and analyzed in order to determine if a particular user is impaired.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include an impairment that can be determined by comparing the baseline biological function to the current biological information and the transaction can be approved or denied based on the impairment, as taught by Benkreira, in order to provide a spending protection. (Benkreira, paragraphs [0002-0003]) Claims 2-6, 8-9, 15, 17, and 19-20 are rejected under 35 U.S.C. 103 as being unpatentable over Xie Zhen in view of Benkreira in further view of Dayan et al. (hereinafter Dayan), US Publication Number 2016/0232516 A1. Regarding claim 2: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The mobile device of claim 1, wherein the determination that the user of the mobile device is in the impaired state is based on a location of the mobile device and one or more impaired mode settings that identify the location as a high risk location for impairment. (Dayan: See paragraphs [0058] “Device location module 116 may receive location information from one of sensors 92 (e.g., a GPS sensor) and determine the location of computing device 80 at the time analysis module 104 is generating the risk level,…. device location module 116 may determine whether the current location of computing device 80 is a location frequented by an authorized user of computing device 80. if computing device 80 is at a location corresponding to a bar not frequented by an authorized user, device location module 116 may determine that he location does not correspond to a location frequented by an authorized user. Based on this determination, analysis module 104 may increase the current risk level.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 3: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The mobile device of claim 1, wherein the determination that the user of the mobile device is in the impaired state is based on a time value and one or more impaired mode settings identify the time value as a high risk time value for impairment. (Dayan: See paragraph [0059] “When determining the risk level, analysis module 104 may compare the application usage pattern for a recent time window (e.g., within the last 5 minutes, 30 minutes, hour, 2 hours, etc.) to prior application usage patterns for a corresponding time, day, location, etc. If the current application usage pattern is sufficiently similar (i.e., within a threshold amount different) of the corresponding prior application usage pattern, analysis module 104 may reduce the current risk level, and vice versa.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 4: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The mobile device of claim 1, wherein the determination that the user of the mobile device is in the impaired state is based on a person detected in proximity to the mobile device and one or more impaired mode settings that identify the person as a high risk person for impairment. (Dayan: See paragraphs [0032] “a user that desires to minimize the potential for abuse by unauthorized persons may select a low risk level and the resolution module 44 and/or a resolution module of secondary device 32 may authorize only transactions where the determined risk metric is below the selected low risk level.” And [0049] “Sensors 92 may be configured to detect one or more objects in proximity to computing device 80, measure the movement of computing device 80, and may collect other information associated with computing device 80. Examples of sensors 92 that detect and/or measure movement of computing device 80 may include, but are not limited to, accelerometers and gyroscopes.”, and see also [0016]) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 5: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The mobile device of claim 1, wherein the determination that the user of the mobile device is in the impaired state is based on a detected motion pattern of the mobile device and one or more impaired mode settings that identify the detected motion pattern as a high risk motion pattern for impairment. (Dayan: See paragraph [0057] “motion module 116 may compare accelerometer data collected while the current user of computing device 80 is walking and compare it to stored accelerometer data of an authorized user of computing device 80 to see if the gait of the current user matches or is within a threshold margin of error of the gate of the authorized user.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 6: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The mobile device of claim 1, wherein the determination that the user of the mobile device is in the impaired state is based on a combination of two or more of a location (reads on “global positioning system sensors”) of the mobile device, a time value, a person detected in proximity (reads on “proximity sensors”) to the mobile device, or a detected motion pattern (reads on “motion sensors”) of the mobile device. (Dayan: See paragraph [0015] “Analysis module 20 may receive information from one or more sensors 16 and store at least an indication of the information received from sensors 16 in user data 26. Sensors 16 may include motion sensors e.g., accelerometer, gyroscope, compass, etc.), audio and/or visual sensors (e.g., microphones, still and/or video cameras, etc.), or other types of sensors (e.g., pressure sensors, light sensors, proximity sensors, ultrasonic sensors, global positioning system sensors, etc.).”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 8: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The mobile device of claim 1, wherein to generate (reads on “cause UI module 102 to output instructions for the current user of computing device 80 to complete a security challenge and how to complete the security challenge.”) the instructions to change the action via a user account based at least in part on one or more impaired mode settings, the instructions are executable by the at least one processor to apply one or more constraints to the action. (Dayan: See paragraph [0064] “In examples where resolution module 106 determining that reauthorization is required, resolution module 106 may cause UI module 102 to output instructions for the current user of computing device 80 to complete a security challenge and how to complete the security challenge. Depending on the security challenge, the user may be required to submit to a facial recognition process, provide a fingerprint for fingerprint authentication, enter a passcode, perform an input pattern, provide a voice sample for voice authentication, move computing device 80 in a particular pattern, etc.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 9: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The mobile device of claim 8, wherein the one or more constraints comprises one or more of: a maximum spend threshold (reads on “determine that the transaction is a purchase and that the transaction amount is greater than $1,000”); a location constraint; a change in authentication mode; one or more action types; or a change to authentication-related information. (Dayan: See paragraph [0018] “Resolution module 24 may determine whether or not the transaction is authorized based on the risk metric as well as the transaction information. For example, resolution module 24 may determine that the transaction is a purchase and that the transaction amount is greater than $1,000.”, and Notes: the recited claim requires at least one from the listed elements.) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 15: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The method of claim 14, wherein: determining (reads on “determining that reauthorization is required”) that the user of the mobile device is in the impaired state is based on one or more of a location (reads on “global positioning system sensors”) of the mobile device, a time value, a person detected in proximity (reads on “proximity sensors”) to the mobile device, or a detected motion pattern (reads on “motion sensors ) of the mobile device; and Dayan: See paragraph [0015] “Analysis module 20 may receive information from one or more sensors 16 and store at least an indication of the information received from sensors 16 in user data 26. Sensors 16 may include motion sensors e.g., accelerometer, gyroscope, compass, etc.), audio and/or visual sensors (e.g., microphones, still and/or video cameras, etc.), or other types of sensors (e.g., pressure sensors, light sensors, proximity sensors, ultrasonic sensors, global positioning system sensors, etc.).”, and Notes: the recited claim requires at least one from the listed elements.”, and see also [0064]) the one or more constraints (reads on “determine that the transaction is a purchase and that the transaction amount is greater than $1,000”) comprise one or more of a maximum spend threshold , a location constraint, a change in authentication mode, one or more action types, or a change to authentication-related information. (Dayan: See paragraph [0018] “Resolution module 24 may determine whether or not the transaction is authorized based on the risk metric as well as the transaction information. For example, resolution module 24 may determine that the transaction is a purchase and that the transaction amount is greater than $1,000.”, and Notes: the recited claim requires at least one from the listed elements.) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 19: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The system of claim 17, wherein the result of the action comprises one or more of: whether the action was allowed based on the maximum spend threshold (reads on “determine that the transaction is a purchase and that the transaction amount is greater than $1,000”); whether the action was allowed based on the location constraint (reads on “device location module 116 may determine that he location does not correspond to a location frequented by an authorized user”); whether the action was allowed based on the change in the authentication mode (reads on “perform an authentication challenge (e.g., to input security information, such as a password, a personal identification number (PIN), a pattern or biometric data (e.g., fingerprint, voice, image, or the like))”); whether the action was allowed based on the one or more action types; or whether the action was allowed based on the change to the authentication-related information. (Dayan: See paragraph [0021] “If the transaction was not authorized, payment module 22 may cause user interface device 14 to output an indication as to why the transaction was not approved and may include a request for a user of mobile computing device 10 to perform an authentication challenge (e.g., to input security information, such as a password, a personal identification number (PIN), a pattern or biometric data (e.g., fingerprint, voice, image, or the like)). If the user successfully performs the authentication challenge, payment module 22 may transmit the payment information to payment system 12 and complete the transaction.”, and Notes: the recited claim requires at least one from the listed elements. the claim “the change to authentication-related information” reads on [0021], and see also [0018] and [0058]) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 20: Xie Zhen and Benkreira do not explicitly disclose the following, however Dayan further teaches: The system of claim 16, wherein to generate the instructions, the at least one processor is configured to cause the system to: receive, from the mobile device, an indication of the result of the challenge for the action; and determine whether to allow the action to proceed based at least in part on the result of the challenge for the action. (Dayan: See paragraph [0021] “If the user successfully performs the authentication challenge, payment module 22 may transmit the payment information to payment system 12 and complete the transaction.”) It would have been obvious to one of ordinary skill in the art as of the effective filing date of the claimed invention to modify, when a closing instruction of a triggered dangerous payment mode is monitored, a verification interface is displayed, and voice data is collected based on the verification interface and verifying the voice data, and after the voice data passes the verification, setting the current payment mode of the mobile terminal to the normal payment mode of Xie Zhen to include performing a risk assessment (e.g., based on the likelihood that an authorized user is the one attempting to make the mobile payment and the relative cost of error if the mobile payment is incorrectly authorized) to determine whether or not the mobile payment should be authorized, as taught by Dayan, in order to reduce a risk of abuse by unauthorized persons and financial loss. (Dayan, paragraph [0009]) Regarding claim 17: it is similar scope to claim 9, and thus it is rejected under similar rationale. Conclusion The prior art made of record but not relied upon herein but pertinent to Applicant’s disclosure is listed in the enclosed PTO-892. THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any extension fee pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to YONG S PARK whose telephone number is (571)272-8349. The examiner can normally be reached on M-F 9:00-5:00 PM, EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Bennett M. Sigmond can be reached on (303)297-4411. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /YONGSIK PARK/Examiner, Art Unit 3694 January 29, 2026 /BENNETT M SIGMOND/Supervisory Patent Examiner, Art Unit 3694
Read full office action

Prosecution Timeline

Aug 25, 2023
Application Filed
Apr 04, 2025
Non-Final Rejection — §103
May 22, 2025
Applicant Interview (Telephonic)
May 22, 2025
Examiner Interview Summary
May 29, 2025
Response Filed
Jul 29, 2025
Final Rejection — §103
Aug 22, 2025
Examiner Interview Summary
Aug 22, 2025
Applicant Interview (Telephonic)
Aug 28, 2025
Request for Continued Examination
Sep 09, 2025
Response after Non-Final Action
Sep 25, 2025
Non-Final Rejection — §103
Nov 20, 2025
Applicant Interview (Telephonic)
Nov 20, 2025
Examiner Interview Summary
Nov 25, 2025
Response Filed
Jan 30, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12597043
SYSTEMS AND METHODS FOR MERGING NETWORKS OF HETEROGENEOUS DATA
2y 5m to grant Granted Apr 07, 2026
Patent 12511686
REAL-TIME ONLINE TRANSACTIONAL PROCESSING SYSTEMS AND METHODS
2y 5m to grant Granted Dec 30, 2025
Patent 12475465
SYSTEMS AND METHODS FOR GENERATION AND USE OF BIOMETRIC-BASED ACCOUNT NUMBERS
2y 5m to grant Granted Nov 18, 2025
Patent 12387571
AUTOMATED TELLER MACHINE DIGITAL TWIN WITH AN ANTI NFC/RFID SKIMMING THREAT DEVICE THROUGH MIST COMPUTATION
2y 5m to grant Granted Aug 12, 2025
Patent 12380457
OPTIMAL ROUTING OF PAYMENTS
2y 5m to grant Granted Aug 05, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

5-6
Expected OA Rounds
24%
Grant Probability
36%
With Interview (+11.4%)
3y 4m
Median Time to Grant
High
PTA Risk
Based on 220 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month