DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Continued Examination Under 37 CFR 1.114
A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on January 7, 2026 has been entered.
Response to Amendment
The amendments filed on December 17, 2025 have been entered.
Claims 1, 5, 7-8, 12, 14-15 and 19 have been amended.
Response to Arguments
Applicant's arguments filed on December 4, 2025, have been fully considered, but they are moot in view of the new grounds of rejections.
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows:
1. Determining the scope and contents of the prior art.
2. Ascertaining the differences between the prior art and the claims at issue.
3. Resolving the level of ordinary skill in the pertinent art.
4. Considering objective evidence present in the application indicating obviousness or nonobviousness.
Claims 1-4, 7-11, 14-18 are rejected under 35 U.S.C. 103 as being unpatentable over Wang et al. (Pub. No. US 2023/0327860), hereinafter Wang, in view of Huang et al. (CN 110971405 A), hereinafter Huang.
Claim 1. Wang discloses a computer-implemented method for privacy protection in secure multi-party computation, comprising:
encoding private data to a coefficient of a first polynomial function (See Parag. [0061]; to obtain a mapping parameter ciphertext, and transferring the mapping parameter ciphertext to a second node in the node group includes: performing homomorphic encryption on a polynomial coefficient of the target polynomial, to obtain a polynomial coefficient ciphertext); and
obtaining a plurality of function values of the first polynomial function as a plurality of fragments obtained after the private data is split (See Parag. [0155]; the main participant converts private data to roots of a unary polynomial of high degree for hiding and provides an encrypted hash function and protection of homomorphic encryption. The guest participant performs a polynomial evaluation through homomorphic encryption in a ciphertext space, hides a non-zero result by using artificial noise, randomly splits private data, and respectively transmits fragment information and a result of the polynomial evaluation to a corresponding main participant. The main participant decrypts the result of the polynomial evaluation and performs root verification, and transmits the fragment information that is successfully verified to one main participant).
Wang doesn’t explicitly disclose wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data.
However, Huang discloses wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data (See Page 6/26 Parag. 5 lines 1-2; a private key fragment may be a threshold fragment based on threshold secret sharing algorithm. See Page 3/26 Parag. 7 lines 4-9; threshold secret sharing algorithm is present in some t-1 order polynomial. randomly generating t-1 times a first polynomial, respectively the identification value of each synergy party into the first polynomial, calculating to obtain N first polynomial fragment; N-1 of the first polynomial fragments corresponding to other N-1 of synergy party, accumulating its own identification value corresponding to the first polynomial segment and first polynomial segment from other N-1 synergy of the party, obtain the fragmentation threshold, the threshold determined as the private key fragment. See Page 4/26 Parag. 5 lines 1-4; multi-party synergy of the private key fragment update device, wherein, comprising at least one processor and at least one storage device, the storage device is used for storing instruction, when at least one processor executes the instruction to realize the multi-synergy private key fragment update method).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang, to include splitting the private data using the polynomial function and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data, as taught by Huang. This would be convenient to prove the initiator of the transaction that is the owner of the account private key and the digital signature can also guarantee transaction is not modified in the transmission process, so as to realize the cryptographic identity authentication and data integrity functions (Huang, Page 2/26 Parag. 1 lines 2-4).
Claim 2. Wang in view of Huang discloses the computer-implemented method of claim 1,
Wang further discloses wherein a coefficient of one or more terms in the first polynomial function is the private data (See Parag. [0069]; performs homomorphic encryption on the polynomial coefficient to obtain a polynomial coefficient ciphertext, and transfers the polynomial coefficient ciphertext to the second node in the node group).
Claim 3. Wang in view of Huang discloses the computer-implemented method of claim 1,
Wang further discloses wherein encoding private data to the coefficient of the first polynomial function (See Parag. [0061]) comprises: determining the private data as a constant term in the first polynomial function (See Parag. [0073]; the shares 124 to 136 can be calculated from a respective polynomial ƒ(x) of degree (t−1) with a constant term corresponding to the secret 104 ...).
Claim 4. Wang in view of Huang discloses the computer-implemented method
of claim 3,
Wang further discloses the computer-implemented method further comprising: generating a random number as a coefficient of a term other than the constant term in the first polynomial function (See Parag. [0140]; for the polynomial coefficient ciphertext, a data pair is formed by using the result of the evaluation and one of the random numbers obtained through splitting in (b), and the data pair is transmitted to the main participant from which the polynomial coefficient ciphertext originates).
Claim 7. Wang in view of Huang discloses the computer-implemented method of claim 1,
Huang further discloses the computer-implemented method further comprising: sending the plurality of fragments of the private data to the plurality of participant-party devices (See Page 9/26 Parag. 12 lines 1-2; the private key fragment public system parameter to the first parameter SM2 in operation to obtain private key sharing slice, and sends the sharing private key fragment to the other cooperative party. See Page 3/26 Parag. 4 lines 3-7; obtaining private key fragment; the private key fragment public system parameter to the first parameter SM2 in operation to obtain private key sharing fragment, and the fragment sending private key sharing to the other participants, according to the private key of its own sharing segment and from other M-1 synergy share of the private key fragment, generating a public key. See Page 4/26 Parag. 5 lines 1-4).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang, to include sending the plurality of fragments of the private data to the plurality of participant-party devices, as taught by Huang. This would be convenient to prove the initiator of the transaction that is the owner of the account private key and the digital signature can also guarantee transaction is not modified in the transmission process, so as to realize the cryptographic identity authentication and data integrity functions (Huang, Page 2/26 Parag. 1 line 2-4).
Claim 8. Wang discloses a non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations (See Parag, [0009] and Fig. 11), comprising:
encoding private data to a coefficient of a first polynomial function (See Parag. [0061]; to obtain a mapping parameter ciphertext, and transferring the mapping parameter ciphertext to a second node in the node group includes: performing homomorphic encryption on a polynomial coefficient of the target polynomial, to obtain a polynomial coefficient ciphertext); and
obtaining a plurality of function values of the first polynomial function as a plurality of fragments obtained after the private data is split (See Parag. [0155]; the main participant converts private data to roots of a unary polynomial of high degree for hiding and provides an encrypted hash function and protection of homomorphic encryption. The guest participant performs a polynomial evaluation through homomorphic encryption in a ciphertext space, hides a non-zero result by using artificial noise, randomly splits private data, and respectively transmits fragment information and a result of the polynomial evaluation to a corresponding main participant. The main participant decrypts the result of the polynomial evaluation and performs root verification, and transmits the fragment information that is successfully verified to one main participant).
Wang doesn’t explicitly disclose wherein the private data is split using the first polynomial function; secret sharing algorithm.
However, Ornelas discloses wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data (See Page 6/26 Parag. 5 lines 1-2; a private key fragment may be a threshold fragment based on threshold secret sharing algorithm. See Page 3/26 Parag. 7 lines 4-9; threshold secret sharing algorithm is present in some t-1 order polynomial. randomly generating t-1 times a first polynomial, respectively the identification value of each synergy party into the first polynomial, calculating to obtain N first polynomial fragment; N-1 of the first polynomial fragments corresponding to other N-1 of synergy party, accumulating its own identification value corresponding to the first polynomial segment and first polynomial segment from other N-1 synergy of the party, obtain the fragmentation threshold, the threshold determined as the private key fragment. See Page 4/26 Parag. 5 lines 1-4; multi-party synergy of the private key fragment update device, wherein, comprising at least one processor and at least one storage device, the storage device is used for storing instruction, when at least one processor executes the instruction to realize the multi-synergy private key fragment update method).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang, to include splitting the private data using the polynomial function and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data, as taught by Huang. This would be convenient to prove the initiator of the transaction that is the owner of the account private key and the digital signature can also guarantee transaction is not modified in the transmission process, so as to realize the cryptographic identity authentication and data integrity functions (Huang, Page 2/26 Parag. 1 lines 2-4).
Claim 9. The applicant is directed to the rejections to claim 2 set forth above, as it is rejected based on the same rationale.
Claim 10. The applicant is directed to the rejections to claim 3 set forth above, as it is rejected based on the same rationale.
Claim 11. The applicant is directed to the rejections to claim 4 set forth above, as it is rejected based on the same rationale.
Claim 14. The applicant is directed to the rejections to claim 7 set forth above, as it is rejected based on the same rationale.
Claim 15. Wang discloses a computer-implemented system, comprising:
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations (See Para. [0009] and Fig. 11), comprising:
encoding private data to a coefficient of a first polynomial function (See Parag. [0061]; to obtain a mapping parameter ciphertext, and transferring the mapping parameter ciphertext to a second node in the node group includes: performing homomorphic encryption on a polynomial coefficient of the target polynomial, to obtain a polynomial coefficient ciphertext); and
obtaining a plurality of function values of the first polynomial function as a plurality of fragments obtained after the private data is split (See Parag. [0155]; the main participant converts private data to roots of a unary polynomial of high degree for hiding and provides an encrypted hash function and protection of homomorphic encryption. The guest participant performs a polynomial evaluation through homomorphic encryption in a ciphertext space, hides a non-zero result by using artificial noise, randomly splits private data, and respectively transmits fragment information and a result of the polynomial evaluation to a corresponding main participant. The main participant decrypts the result of the polynomial evaluation and performs root verification, and transmits the fragment information that is successfully verified to one main participant).
Wang doesn’t explicitly disclose wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data.
However, Huang discloses wherein the private data is split using the first polynomial function, and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data (See Page 6/26 Parag. 5 lines 1-2; a private key fragment may be a threshold fragment based on threshold secret sharing algorithm. See Page 3/26 Parag. 7 lines 4-9; threshold secret sharing algorithm is present in some t-1 order polynomial. randomly generating t-1 times a first polynomial, respectively the identification value of each synergy party into the first polynomial, calculating to obtain N first polynomial fragment; N-1 of the first polynomial fragments corresponding to other N-1 of synergy party, accumulating its own identification value corresponding to the first polynomial segment and first polynomial segment from other N-1 synergy of the party, obtain the fragmentation threshold, the threshold determined as the private key fragment. See Page 4/26 Parag. 5 lines 1-4; multi-party synergy of the private key fragment update device, wherein, comprising at least one processor and at least one storage device, the storage device is used for storing instruction, when at least one processor executes the instruction to realize the multi-synergy private key fragment update method).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang, to include splitting the private data using the polynomial function and wherein the fragments of the private data are used for computation by a plurality of participant-party devices using a secret sharing algorithm to obtain fragments of target data, as taught by Huang. This would be convenient to prove the initiator of the transaction that is the owner of the account private key and the digital signature can also guarantee transaction is not modified in the transmission process, so as to realize the cryptographic identity authentication and data integrity functions (Huang, Page 2/26 Parag. 1 lines 2-4).
Claim 16. The applicant is directed to the rejections to claim 2 set forth above, as it is rejected based on the same rationale.
Claim 17. The applicant is directed to the rejections to claim 3 set forth above, as it is rejected based on the same rationale.
Claim 18. The applicant is directed to the rejections to claim 4 set forth above, as it is rejected based on the same rationale.
Claims 5-6, 12-13, and 19-20 are rejected under 35 U.S.C. 103 as being unpatentable over Wang et al. (Pub. No. US 2023/0109352), hereinafter Wang, in view of Huang et al. (CN 110971405 A), hereinafter Huang; in further view of Li-Chun et al. (CN 111460514 A), hereinafter Li-Chun.
Claim 5. Wang in view of Huang discloses the computer-implemented method of claim 1,
Wang further discloses wherein obtaining the plurality of function values of the first polynomial function (See Parag. [0155]),
Wang in view of Huang doesn’t explicitly disclose the computer-implemented method further comprises: obtaining a plurality of values corresponding to the plurality of participant-party devices as a plurality of values of an independent variable.
However, Li-Chun discloses obtaining a plurality of values corresponding to a plurality of participant-party devices as a plurality of values of an independent variable (Page 2 Parag. 8; the first party obtains the times of polynomial function; taking the specific data as the value of the independent variable in the polynomial function; according to the value of the independent variable and the number of times of the polynomial function, determining the value of the power factor of the single-term formula in the polynomial function; taking value of the power factor of the first party as input, taking value of the coefficient factor of the second party as input, executing multi-party security calculation to determine value of the polynomial function, value of the polynomial function is used for representing whether the specific data is matched with one data in the data set).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang in view of Huang, to include a plurality of values corresponding to a plurality of participant-party devices as a plurality of values of an independent variable, as taught by Li-Chun . This would be convenient for protecting data privacy security (Li-Chun, Page 5 Parag. 6).
Claim 6. Wang in view of Huang and Li-Chun discloses the computer-implemented method of claim 5,
Li-Chun further discloses the computer-implemented method further comprising: computing, based on the plurality of values of the independent variable, the plurality of function values of the first polynomial function (Page 2 Parag. 8; the first party obtains the times of polynomial function; taking the specific data as the value of the independent variable in the polynomial function; according to the value of the independent variable and the number of times of the polynomial function, determining the value of the power factor of the single-term formula in the polynomial function; taking value of the power factor of the first party as input, taking value of the coefficient factor of the second party as input, executing multi-party security calculation to determine value of the polynomial function, value of the polynomial function is used for representing whether the specific data is matched with one data in the data set).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Wang in view of Huang, to include a plurality of values corresponding to a plurality of participant-party devices as a plurality of values of an independent variable, as taught by Li-Chun . This would be convenient for protecting data privacy security (Li-Chun, Page 5 Parag. 6).
Claim 12. The applicant is directed to the rejections to claim 5 set forth above, as it is rejected based on the same rationale.
Claim 13. The applicant is directed to the rejections to claim 6 set forth above, as it is rejected based on the same rationale.
Claim 19. The applicant is directed to the rejections to claim 5 set forth above, as it is rejected based on the same rationale.
Claim 20. The applicant is directed to the rejections to claim 6 set forth above, as it is rejected based on the same rationale.
Conclusion
The prior art made of record and not relied upon is considered pertinent to applicant's disclosure (see PTO-form 892).
Wright (Pub. No. US 2023/0013158) – “Computer-Implemented Method of Generating a threshold Vault;” teaches a method and devices for securely and privately generating a threshold vault address and distributed individual key shares reliant upon individually selected polynomial functions, without revealing the key shares and without ever reconstructing the private key. A digital asset stored at the threshold vault address may be used as an input to a transaction through generating a digital signature corresponding to the threshold vault address. Methods and devices are described for collaboratively generating the digital signature without reconstructing the private key or revealing individual key shares. Methods and devices are described for refreshing the distributed private key shares. (See Abstract).
Any inquiry concerning this communication or earlier communications from the examiner should be directed to GHIZLANE MAAZOUZ whose telephone number is (571)272-8118. The examiner can normally be reached Telework M-F 7:30-5 PM.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Philip J Chea can be reached on 571-272-3951. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/GHIZLANE MAAZOUZ/Examiner, Art Unit 2499
/PHILIP J CHEA/Supervisory Patent Examiner, Art Unit 2499