Prosecution Insights
Last updated: April 19, 2026
Application No. 18/299,471

DATA PROCESSING METHODS, APPARATUSES, AND COMPUTER DEVICES FOR PRIVACY PROTECTION

Non-Final OA §103
Filed
Apr 12, 2023
Examiner
MAAZOUZ, GHIZLANE
Art Unit
2499
Tech Center
2400 — Computer Networks
Assignee
Alipay (Hangzhou) Information Technology Co., Ltd.
OA Round
3 (Non-Final)
60%
Grant Probability
Moderate
3-4
OA Rounds
3y 6m
To Grant
99%
With Interview

Examiner Intelligence

Grants 60% of resolved cases
60%
Career Allow Rate
21 granted / 35 resolved
+2.0% vs TC avg
Strong +51% interview lift
Without
With
+50.9%
Interview Lift
resolved cases with interview
Typical timeline
3y 6m
Avg Prosecution
25 currently pending
Career history
60
Total Applications
across all art units

Statute-Specific Performance

§101
3.8%
-36.2% vs TC avg
§103
60.7%
+20.7% vs TC avg
§102
19.9%
-20.1% vs TC avg
§112
12.7%
-27.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 35 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on January 7, 2026 has been entered. Response to Amendment The amendments filed on December 17, 2025 have been entered. Claims 1, 5, 7-8, 12, 14-15 and 19 have been amended. Response to Arguments Applicant's arguments filed on December 4, 2025, have been fully considered, but they are moot in view of the new grounds of rejections. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1-4, 7-11, 14-18 are rejected under 35 U.S.C. 103 as being unpatentable over Wang et al. (Pub. No. US 2023/0327860), hereinafter Wang, in view of Huang et al. (CN 110971405 A), hereinafter Huang. Claim 1. Wang discloses a computer-implemented method for privacy protection in secure multi-party computation, comprising: encoding private data to a coefficient of a first polynomial function (See Parag. [0061]; to obtain a mapping parameter ciphertext, and transferring the mapping parameter ciphertext to a second node in the node group includes: performing homomorphic encryption on a polynomial coefficient of the target polynomial, to obtain a polynomial coefficient ciphertext); and obtaining a plurality of function values of the first polynomial function as a plurality of fragments obtained after the private data is split (See Parag. [0155]; the main participant converts private data to roots of a unary polynomial of high degree for hiding and provides an encrypted hash function and protection of homomorphic encryption. The guest participant performs a polynomial evaluation through homomorphic encryption in a ciphertext space, hides a non-zero result by using artificial noise, randomly splits private data, and respectively transmits fragment information and a result of the polynomial evaluation to a corresponding main participant. The main participant decrypts the result of the polynomial evaluation and performs root verification, and transmits the fragment information that is successfully verified to one main participant). Wang doesn’t explicitly disclose wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data. However, Huang discloses wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data (See Page 6/26 Parag. 5 lines 1-2; a private key fragment may be a threshold fragment based on threshold secret sharing algorithm. See Page 3/26 Parag. 7 lines 4-9; threshold secret sharing algorithm is present in some t-1 order polynomial. randomly generating t-1 times a first polynomial, respectively the identification value of each synergy party into the first polynomial, calculating to obtain N first polynomial fragment; N-1 of the first polynomial fragments corresponding to other N-1 of synergy party, accumulating its own identification value corresponding to the first polynomial segment and first polynomial segment from other N-1 synergy of the party, obtain the fragmentation threshold, the threshold determined as the private key fragment. See Page 4/26 Parag. 5 lines 1-4; multi-party synergy of the private key fragment update device, wherein, comprising at least one processor and at least one storage device, the storage device is used for storing instruction, when at least one processor executes the instruction to realize the multi-synergy private key fragment update method). It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang, to include splitting the private data using the polynomial function and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data, as taught by Huang. This would be convenient to prove the initiator of the transaction that is the owner of the account private key and the digital signature can also guarantee transaction is not modified in the transmission process, so as to realize the cryptographic identity authentication and data integrity functions (Huang, Page 2/26 Parag. 1 lines 2-4). Claim 2. Wang in view of Huang discloses the computer-implemented method of claim 1, Wang further discloses wherein a coefficient of one or more terms in the first polynomial function is the private data (See Parag. [0069]; performs homomorphic encryption on the polynomial coefficient to obtain a polynomial coefficient ciphertext, and transfers the polynomial coefficient ciphertext to the second node in the node group). Claim 3. Wang in view of Huang discloses the computer-implemented method of claim 1, Wang further discloses wherein encoding private data to the coefficient of the first polynomial function (See Parag. [0061]) comprises: determining the private data as a constant term in the first polynomial function (See Parag. [0073]; the shares 124 to 136 can be calculated from a respective polynomial ƒ(x) of degree (t−1) with a constant term corresponding to the secret 104 ...). Claim 4. Wang in view of Huang discloses the computer-implemented method of claim 3, Wang further discloses the computer-implemented method further comprising: generating a random number as a coefficient of a term other than the constant term in the first polynomial function (See Parag. [0140]; for the polynomial coefficient ciphertext, a data pair is formed by using the result of the evaluation and one of the random numbers obtained through splitting in (b), and the data pair is transmitted to the main participant from which the polynomial coefficient ciphertext originates). Claim 7. Wang in view of Huang discloses the computer-implemented method of claim 1, Huang further discloses the computer-implemented method further comprising: sending the plurality of fragments of the private data to the plurality of participant-party devices (See Page 9/26 Parag. 12 lines 1-2; the private key fragment public system parameter to the first parameter SM2 in operation to obtain private key sharing slice, and sends the sharing private key fragment to the other cooperative party. See Page 3/26 Parag. 4 lines 3-7; obtaining private key fragment; the private key fragment public system parameter to the first parameter SM2 in operation to obtain private key sharing fragment, and the fragment sending private key sharing to the other participants, according to the private key of its own sharing segment and from other M-1 synergy share of the private key fragment, generating a public key. See Page 4/26 Parag. 5 lines 1-4). It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang, to include sending the plurality of fragments of the private data to the plurality of participant-party devices, as taught by Huang. This would be convenient to prove the initiator of the transaction that is the owner of the account private key and the digital signature can also guarantee transaction is not modified in the transmission process, so as to realize the cryptographic identity authentication and data integrity functions (Huang, Page 2/26 Parag. 1 line 2-4). Claim 8. Wang discloses a non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations (See Parag, [0009] and Fig. 11), comprising: encoding private data to a coefficient of a first polynomial function (See Parag. [0061]; to obtain a mapping parameter ciphertext, and transferring the mapping parameter ciphertext to a second node in the node group includes: performing homomorphic encryption on a polynomial coefficient of the target polynomial, to obtain a polynomial coefficient ciphertext); and obtaining a plurality of function values of the first polynomial function as a plurality of fragments obtained after the private data is split (See Parag. [0155]; the main participant converts private data to roots of a unary polynomial of high degree for hiding and provides an encrypted hash function and protection of homomorphic encryption. The guest participant performs a polynomial evaluation through homomorphic encryption in a ciphertext space, hides a non-zero result by using artificial noise, randomly splits private data, and respectively transmits fragment information and a result of the polynomial evaluation to a corresponding main participant. The main participant decrypts the result of the polynomial evaluation and performs root verification, and transmits the fragment information that is successfully verified to one main participant). Wang doesn’t explicitly disclose wherein the private data is split using the first polynomial function; secret sharing algorithm. However, Ornelas discloses wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data (See Page 6/26 Parag. 5 lines 1-2; a private key fragment may be a threshold fragment based on threshold secret sharing algorithm. See Page 3/26 Parag. 7 lines 4-9; threshold secret sharing algorithm is present in some t-1 order polynomial. randomly generating t-1 times a first polynomial, respectively the identification value of each synergy party into the first polynomial, calculating to obtain N first polynomial fragment; N-1 of the first polynomial fragments corresponding to other N-1 of synergy party, accumulating its own identification value corresponding to the first polynomial segment and first polynomial segment from other N-1 synergy of the party, obtain the fragmentation threshold, the threshold determined as the private key fragment. See Page 4/26 Parag. 5 lines 1-4; multi-party synergy of the private key fragment update device, wherein, comprising at least one processor and at least one storage device, the storage device is used for storing instruction, when at least one processor executes the instruction to realize the multi-synergy private key fragment update method). It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang, to include splitting the private data using the polynomial function and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data, as taught by Huang. This would be convenient to prove the initiator of the transaction that is the owner of the account private key and the digital signature can also guarantee transaction is not modified in the transmission process, so as to realize the cryptographic identity authentication and data integrity functions (Huang, Page 2/26 Parag. 1 lines 2-4). Claim 9. The applicant is directed to the rejections to claim 2 set forth above, as it is rejected based on the same rationale. Claim 10. The applicant is directed to the rejections to claim 3 set forth above, as it is rejected based on the same rationale. Claim 11. The applicant is directed to the rejections to claim 4 set forth above, as it is rejected based on the same rationale. Claim 14. The applicant is directed to the rejections to claim 7 set forth above, as it is rejected based on the same rationale. Claim 15. Wang discloses a computer-implemented system, comprising: one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations (See Para. [0009] and Fig. 11), comprising: encoding private data to a coefficient of a first polynomial function (See Parag. [0061]; to obtain a mapping parameter ciphertext, and transferring the mapping parameter ciphertext to a second node in the node group includes: performing homomorphic encryption on a polynomial coefficient of the target polynomial, to obtain a polynomial coefficient ciphertext); and obtaining a plurality of function values of the first polynomial function as a plurality of fragments obtained after the private data is split (See Parag. [0155]; the main participant converts private data to roots of a unary polynomial of high degree for hiding and provides an encrypted hash function and protection of homomorphic encryption. The guest participant performs a polynomial evaluation through homomorphic encryption in a ciphertext space, hides a non-zero result by using artificial noise, randomly splits private data, and respectively transmits fragment information and a result of the polynomial evaluation to a corresponding main participant. The main participant decrypts the result of the polynomial evaluation and performs root verification, and transmits the fragment information that is successfully verified to one main participant). Wang doesn’t explicitly disclose wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data. However, Huang discloses wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data (See Page 6/26 Parag. 5 lines 1-2; a private key fragment may be a threshold fragment based on threshold secret sharing algorithm. See Page 3/26 Parag. 7 lines 4-9; threshold secret sharing algorithm is present in some t-1 order polynomial. randomly generating t-1 times a first polynomial, respectively the identification value of each synergy party into the first polynomial, calculating to obtain N first polynomial fragment; N-1 of the first polynomial fragments corresponding to other N-1 of synergy party, accumulating its own identification value corresponding to the first polynomial segment and first polynomial segment from other N-1 synergy of the party, obtain the fragmentation threshold, the threshold determined as the private key fragment. See Page 4/26 Parag. 5 lines 1-4; multi-party synergy of the private key fragment update device, wherein, comprising at least one processor and at least one storage device, the storage device is used for storing instruction, when at least one processor executes the instruction to realize the multi-synergy private key fragment update method). It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang, to include splitting the private data using the polynomial function and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data, as taught by Huang. This would be convenient to prove the initiator of the transaction that is the owner of the account private key and the digital signature can also guarantee transaction is not modified in the transmission process, so as to realize the cryptographic identity authentication and data integrity functions (Huang, Page 2/26 Parag. 1 lines 2-4). Claim 16. The applicant is directed to the rejections to claim 2 set forth above, as it is rejected based on the same rationale. Claim 17. The applicant is directed to the rejections to claim 3 set forth above, as it is rejected based on the same rationale. Claim 18. The applicant is directed to the rejections to claim 4 set forth above, as it is rejected based on the same rationale. Claims 5-6, 12-13, and 19-20 are rejected under 35 U.S.C. 103 as being unpatentable over Wang et al. (Pub. No. US 2023/0109352), hereinafter Wang, in view of Huang et al. (CN 110971405 A), hereinafter Huang; in further view of Li-Chun et al. (CN 111460514 A), hereinafter Li-Chun. Claim 5. Wang in view of Huang discloses the computer-implemented method of claim 1, Wang further discloses wherein obtaining the plurality of function values of the first polynomial function (See Parag. [0155]), Wang in view of Huang doesn’t explicitly disclose the computer-implemented method further comprises: obtaining a plurality of values corresponding to the plurality of participant-party devices as a plurality of values of an independent variable. However, Li-Chun discloses obtaining a plurality of values corresponding to a plurality of participant-party devices as a plurality of values of an independent variable (Page 2 Parag. 8; the first party obtains the times of polynomial function; taking the specific data as the value of the independent variable in the polynomial function; according to the value of the independent variable and the number of times of the polynomial function, determining the value of the power factor of the single-term formula in the polynomial function; taking value of the power factor of the first party as input, taking value of the coefficient factor of the second party as input, executing multi-party security calculation to determine value of the polynomial function, value of the polynomial function is used for representing whether the specific data is matched with one data in the data set). It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang in view of Huang, to include a plurality of values corresponding to a plurality of participant-party devices as a plurality of values of an independent variable, as taught by Li-Chun . This would be convenient for protecting data privacy security (Li-Chun, Page 5 Parag. 6). Claim 6. Wang in view of Huang and Li-Chun discloses the computer-implemented method of claim 5, Li-Chun further discloses the computer-implemented method further comprising: computing, based on the plurality of values of the independent variable, the plurality of function values of the first polynomial function (Page 2 Parag. 8; the first party obtains the times of polynomial function; taking the specific data as the value of the independent variable in the polynomial function; according to the value of the independent variable and the number of times of the polynomial function, determining the value of the power factor of the single-term formula in the polynomial function; taking value of the power factor of the first party as input, taking value of the coefficient factor of the second party as input, executing multi-party security calculation to determine value of the polynomial function, value of the polynomial function is used for representing whether the specific data is matched with one data in the data set). It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang in view of Huang, to include a plurality of values corresponding to a plurality of participant-party devices as a plurality of values of an independent variable, as taught by Li-Chun . This would be convenient for protecting data privacy security (Li-Chun, Page 5 Parag. 6). Claim 12. The applicant is directed to the rejections to claim 5 set forth above, as it is rejected based on the same rationale. Claim 13. The applicant is directed to the rejections to claim 6 set forth above, as it is rejected based on the same rationale. Claim 19. The applicant is directed to the rejections to claim 5 set forth above, as it is rejected based on the same rationale. Claim 20. The applicant is directed to the rejections to claim 6 set forth above, as it is rejected based on the same rationale. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure (see PTO-form 892). Wright (Pub. No. US 2023/0013158) – “Computer-Implemented Method of Generating a threshold Vault;” teaches a method and devices for securely and privately generating a threshold vault address and distributed individual key shares reliant upon individually selected polynomial functions, without revealing the key shares and without ever reconstructing the private key. A digital asset stored at the threshold vault address may be used as an input to a transaction through generating a digital signature corresponding to the threshold vault address. Methods and devices are described for collaboratively generating the digital signature without reconstructing the private key or revealing individual key shares. Methods and devices are described for refreshing the distributed private key shares. (See Abstract). Any inquiry concerning this communication or earlier communications from the examiner should be directed to GHIZLANE MAAZOUZ whose telephone number is (571)272-8118. The examiner can normally be reached Telework M-F 7:30-5 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Philip J Chea can be reached on 571-272-3951. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /GHIZLANE MAAZOUZ/Examiner, Art Unit 2499 /PHILIP J CHEA/Supervisory Patent Examiner, Art Unit 2499
Read full office action

Prosecution Timeline

Apr 12, 2023
Application Filed
Apr 16, 2025
Non-Final Rejection — §103
Jul 22, 2025
Response Filed
Oct 06, 2025
Final Rejection — §103
Dec 04, 2025
Response after Non-Final Action
Jan 07, 2026
Request for Continued Examination
Jan 25, 2026
Response after Non-Final Action
Feb 18, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12574407
GENERATING A CONTENT SIGNATURE OF A TEXTUAL COMMUNICATION USING OPTICAL CHARACTER RECOGNITION AND TEXT PROCESSING
2y 5m to grant Granted Mar 10, 2026
Patent 12537680
SECURE CACHING OF NAMESPACE KEYS
2y 5m to grant Granted Jan 27, 2026
Patent 12499212
APPARATUS AND METHOD FOR KERNEL RUNTIME RANDOMIZATION
2y 5m to grant Granted Dec 16, 2025
Patent 12494900
PUBLIC KEY INFRASTRUCTURE BASED SESSION AUTHENTICATION
2y 5m to grant Granted Dec 09, 2025
Patent 12481599
Monitor Integrity of Endpoints having Secure Memory Devices for Identity Authentication
2y 5m to grant Granted Nov 25, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
60%
Grant Probability
99%
With Interview (+50.9%)
3y 6m
Median Time to Grant
High
PTA Risk
Based on 35 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month