Prosecution Insights
Last updated: April 19, 2026
Application No. 18/254,706

Method, device and system for generating passwords

Final Rejection §102
Filed
May 26, 2023
Examiner
TURCHEN, JAMES R
Art Unit
2439
Tech Center
2400 — Computer Networks
Assignee
Orange
OA Round
2 (Final)
82%
Grant Probability
Favorable
3-4
OA Rounds
3y 1m
To Grant
99%
With Interview

Examiner Intelligence

Grants 82% — above average
82%
Career Allow Rate
523 granted / 637 resolved
+24.1% vs TC avg
Strong +34% interview lift
Without
With
+33.7%
Interview Lift
resolved cases with interview
Typical timeline
3y 1m
Avg Prosecution
24 currently pending
Career history
661
Total Applications
across all art units

Statute-Specific Performance

§101
10.0%
-30.0% vs TC avg
§103
48.2%
+8.2% vs TC avg
§102
25.1%
-14.9% vs TC avg
§112
10.2%
-29.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 637 resolved cases

Office Action

§102
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Arguments Applicant's arguments filed 10/03/2025 have been fully considered but they are not persuasive. Applicant argues that “the password generated is always the same for a given device”. The examiner agrees that a password is hardcoded once generated. However, the examiner contends that Venigalla discloses the new limitation “wherein the obtaining said at least one second datum and the generating the third datum are performed such that, for the first datum, at least two different passwords can be generated” based on several teachings. 1.) Venigalla discloses a first datum being representative of symbol (character/number/special character/etc) in paragraphs 30-31 where the user enters an alphanumeric symbol 2.) Venigalla discloses obtaining a second datum as a function of the first datum in paragraph 31 where the password generation system generates at least three variables for each alphanumeric symbol 3.) The claim states “at least two different passwords can be generated” and Venigalla discloses the character string generator is a random character alphanumeric/keyboard character string generator (paragraph 20). It is shown that the password “1$dG&89%kl6TrU#$15Gr897” is generated from the string “ABCD” according to paragraph 28. Given that the variables are generated randomly, one could assert that at a different time, the keyboard can generate a different password for the same input at the generation stage or before being hardcoded. 4.) In addition, even if Venigalla were to use the same variables for the same alphanumeric character which would assume no randomness. An input string of “DCBA” would generate a different password than “ABCD”. As the arguments above have made clear, Venigalla discloses “wherein the obtaining said at least one second datum and the generating the third datum are performed such that, for the first datum, at least two different passwords can be generated” both when considering that each alphanumeric character has variables that are generated randomly or when taking into account that the first datum can be in a different position thereby generating a different password. Claim Objections Claim 13 is objected to because of the following informalities: The claim recites: “dependent upon and order” when it is believed to be “an order”. Appropriate correction is required. Claim 14 is objected to because of the following informalities: The claim recites: “with the at symbol” when it is believed to be “with the at least one symbol”. Appropriate correction is required. Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. Claim(s) 1-10, 12-14 is/are rejected under 35 U.S.C. 102(a)(1) as being anticipated by Venigalla (US 20170155635) hereafter Venigalla. 1. Venigalla discloses a method for generating a password for accessing a service, said method being performed on a password generating device connected to a terminal of a user and comprising: obtaining a first datum representative of at least one symbol (para 30-31, prompts the user to input the simple input identifier for the password); as a function of the first datum obtained, obtaining at least one second datum comprising at least two symbols for one symbol of the first datum (para 31, password generation system generates at least three variables for each digit of the simple input identifier. The variables generated must contain at least two capital letters and at least two special characters [the 3 variable for each digit]); generating a third datum, called the password, from said at least one second datum, wherein the obtaining said at least one second datum and the generating the third datum are performed such that, for the first datum, at least two different passwords can be generated (para 31; see further para 20, 28); and transmitting said password to the terminal (para 32). 2. Venigalla disclose the method as claimed in claim 1, further comprising, prior to the transmitting, verifying the first datum obtained (para 31, password generation system then sees if the user has entered the requirements for the simple input identifier). 3. Venigalla discloses the method as claimed in claim 1, further comprising, prior to the transmitting, verifying the password generated (para 29, modify the parameters of the password being generated [verifying that the password generated will match the scheme required]). 4. Venigalla discloses the method as claimed in claim 1, further comprising performing an unlocking step prior to obtaining a first symbol of the first datum (para 26). 5. Venigalla discloses the method as claimed in claim 1, furthermore comprising initializing the device, comprising recording a series of at least two symbols of the second datum in association with at least one symbol of the first datum (para 28). Claims 6 and 12 are similar in scope to claim 1 and are rejected under similar rationale. 7. Venigalla discloses the device for generating a password as claimed in claim 6, furthermore comprising a human-machine interface for obtaining said at least one first datum (para 20). 8. Venigalla discloses the device for generating a password as claimed in claim 7, in which the human-machine interface is a keyboard (para 20). 9. Venigalla discloses the device for generating a password as claimed in claim 6, in which the transmitter comprises a serial interface (para 26). 10. Venigalla discloses the device for generating a password as claimed in claim 6, in which the transmitter comprises a radio interface (para 26). 13. Venigalla discloses the method as claimed in claim 1, wherein: the first datum is representative of a plurality of symbols entered into the password generating device by the user (para 30-31); the obtaining the at least one second datum comprises, generating a respective second datum for each of the plurality of symbols, and at least one of the second datums is dependent upon and order of the plurality of symbols or a recurrence of a symbol of the plurality of symbols (para 31). 14. Venigalla discloses the method as claimed in claim 1, further comprising: storing in a database, for each of a plurality of symbols that can be entered by the user, an association of the symbol with at least one respective second datum, each respective second datum comprising at least two symbols (para 31; see further fig. 5 and corresponding text), wherein the first datum is obtained from the at least one symbol, which is entered into the password generating device by the user (para 30-31; see further fig. 5 and corresponding text); wherein obtaining the at least one second datum comprises, for each of the at least one symbol entered by the user, obtaining one of the at least one respective second datum that is associated with the at symbol entered by the user (fig. 5 and corresponding text). Conclusion Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to JAMES R TURCHEN whose telephone number is (571)270-1378. The examiner can normally be reached Monday-Friday: 7-3. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Luu Pham can be reached at 571-270-5002. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /JAMES R TURCHEN/Primary Examiner, Art Unit 2439
Read full office action

Prosecution Timeline

May 26, 2023
Application Filed
Jun 02, 2025
Non-Final Rejection — §102
Oct 03, 2025
Response Filed
Nov 20, 2025
Final Rejection — §102
Mar 31, 2026
Applicant Interview (Telephonic)
Mar 31, 2026
Examiner Interview Summary
Apr 01, 2026
Request for Continued Examination
Apr 08, 2026
Response after Non-Final Action
Apr 15, 2026
Examiner Interview (Telephonic)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602494
METHOD FOR SWITCHING EXECUTION ENVIRONMENT AND RELATED DEVICE THEREOF
2y 5m to grant Granted Apr 14, 2026
Patent 12598163
SYSTEMS, METHODS, AND MEDIA FOR A CLOUD BASED SOCIAL MEDIA NETWORK
2y 5m to grant Granted Apr 07, 2026
Patent 12592931
NETWORKING TECHNIQUES FOR ENABLING COMMUNICATION BETWEEN MULTIPLE CLOUD ENVIRONMENTS
2y 5m to grant Granted Mar 31, 2026
Patent 12585740
ON-CHAIN PUSH-MODE MULTI-FACTOR AUTHENTICATION METHOD AND SYSTEM FOR BLOCKCHAIN SERVICES
2y 5m to grant Granted Mar 24, 2026
Patent 12579289
MULTIMEDIA SHARING METHOD AND APPARATUS, AND DEVICE AND MEDIUM
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
82%
Grant Probability
99%
With Interview (+33.7%)
3y 1m
Median Time to Grant
Moderate
PTA Risk
Based on 637 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month