DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Response to Amendment
2. The Amendment filed on February 27th 2026 has been entered. Claims 1 – 3, 5, 8, 14, 15 and 18 have been amended and claims 13 - 20 have been cancelled. Claims 1 – 12, 14 – 19, 21 and 22 are currently pending.
Response to Arguments
35 U.S.C. §103
3. Applicant's arguments, see Remarks pp. 11 -15, filed February 27th 2026, with
respect to the rejections of claims 1 – 12, 14 – 19 and 21 under 35 U.S.C. §103 have been fully considered and they are persuasive.
Applicant argues that
Examiner respectfully submits
Upon further consideration new grounds of rejection have been necessitated due
to Applicant's amendments and are made in view of Pogrebezky et al., (United States Patent Publication Number 2020/0242633) hereinafter Pogrebezky
New Claims
4. Applicant mentions on page 16 that claims 21 – 24 are new claims, however, claims 21 and 22 were previously presented in July 3rd 2025 in an amendment. Secondly, claims 23 and 24 are not part of the submitted claim structure as new claims. Applicant’s attention is drawn to these facts.
Claim Rejections – 35 U.S.C. §103
5. The following is a quotation of 35 U.S.C. 103 which forms the basis for all
obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
6. The factual inquiries set forth in Graham v John Deere Co., 383 U.S. 1, 148 USPQ
459 (1966), that are applied for establishing a background for determining obviousness
under 35 U.S.C. 103 are summarized as follows:
a. Determining the scope and contents of the prior art
b. Ascertaining the differences between the prior art and the claims at issue
c. Resolving the level of ordinary skill in the pertinent art
d. Considering objective evidence present in the application indicating
obviousness or nonobviousness
Claims 1 – 12 and 14 - 19 are rejected under 35 U.S.C. 103 as being unpatentable over Izenson et al. (United States Patent Publication Number 20190236601 ), hereinafter Izenson, in view of Avetisov et al., (United States Patent Publication Number 2021/0377254) hereinafter Avetisov and in further view of Call et al., (United States Patent Publication Number 20180026943) hereinafter Call and in further view of Pogrebezky et al., (United States Patent Publication Number 2020/0242633) hereinafter Pogrebezky
Regarding claim 1 Izenson teaches a system for data enrichment, (Fig. 1A transaction processing system [0014]) see also merchant system [0031] the system , (Fig. 1A transaction processing system [0014]) see also merchant system [0031] comprising: one or more memories; (memory [0061], [0083]) and one or more processors, (processor [0061]) communicatively coupled to the one or more memories, (memory [0061], [0083]) configured to: receive, (receives [0063]) from the user device (a user computing device [0062] such as any one of portable consumer devices include cellular or wireless phones, personal digital assistants (PD As), pagers, portable computers, smart cards, and the like [0061] and at the secure endpoint (serial port 1012) [0182]) extract, (retrieve [0101]) from an entry, (transaction data [0062]) of the plurality of entries (entries for "Raw Merchant Name" 302, "Descriptor Merchant Name" 304, "Parsed Merchant Name" 306, "Normalized Merchant Name" 308, "Doing
Business As (DBA)" 310, and "Merchant Corporate Name" 312. [0086]) a partial string (retrieve a string of characters of a merchant name [0101]) from a corresponding description string (merchant name [0101]) included in the entry; (transaction data [0062]) determine, using a fuzzy search for the partial string, (For example, in order to generate a rule for "ABC's Cafe", a search query may be run for the text string, "ABC", in order to capture possible variations (e.g., "ABC's Cafe", "ABCs' Cafe", "ABCs Cafe") [0095]) a corresponding data structure (the raw data [0126]) in a database; (transaction database [0095])
Izenson does not full disclose and provided to the user device to use in API calls including the API call, generate, a standardized name and a location indicator based on the corresponding data structure; perform a lookup process on an image database, based on using the generated standardized name; obtain, based on performing the lookup using the generated standardized name, a corresponding image for the set of structured data; generate an enriched set of structured data by modifying the set of structured data to include the standardized name, the location indicator, and the corresponding image obtained from the image database; and transmit, to the user device and in response to the API call received from the user device, the enriched set of structured data; an API call that includes a set of structured data including a plurality of entries, wherein the API call further includes a set of credentials that authorize the user device to request enrichment of data, wherein a subset of the set of credentials was generated by the system, and wherein the subset of the set of credentials includes a signature that is based on a private key associated with the user device; provision, to a user device, a secure endpoint of an application programming interface (API), wherein the secure endpoint is configured to accept a set of structured data
Avetisov teaches an API call (API call (i.e., a request) [0133], [0260]) that includes a set of structured data (the unified schema specifies a translation between XML or JSON code and a vector such that a vector may represent a compact version of the XML or JSON code [0140] such as “structured data including plurality of entries” including a plurality of entries, (including request parameters such as the address and one or more values for arguments defined in the schema of the smart contract.) [0133]) wherein the API call (API call (i.e., a request) [0133]) further includes a set of credentials (include representations of credentials [0137]) that authorize the user device (authorized user or device [0142]) to request enrichment of data, (modify a secured asset [0079] ) such as “request enrichment of data” wherein a subset of the set of credentials (a representation of a credential, and a signature of the credential [0138]) was generated by the system, (Supplied credential values, or a cryptographic hash value based thereon, may be obtained within the trusted execution environment. Representations of those credentials may be generated within the trusted execution environment and may be passed through the secure channel to the authentication application. [0042], [0044]) and wherein the subset of the set of credentials (a representation of a credential, and a signature of the credential [0138]) includes a signature (a signature [0138]) that is based on a private key (with a private key [0138]) associated with (associated with [0138]) the user device; (user device [0138])
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson to incorporate the teachings of Avetisov wherein an API call that includes a set of structured data including a plurality of entries, wherein the API call further includes a set of credentials that authorize the user device to request enrichment of data, wherein a subset of the set of credentials was generated by the system, and wherein the subset of the set of credentials includes a signature that is based on a private key associated with the user device. By doing so a request to establish a user identity, the request comprising representations of credentials, first signed data, and a public key. Avetisov [0010]
Call teaches provision, (provision [0032]) to a user device, (Electronic user devices might include computers, tablets, wearable computer devices, smartphones, embedded computer systems, or other devices. [0027]) a secure endpoint (a more secure authentication ( e.g., the use of a digital certificate issued/verified by a Certificate Authority as part of a public key infrastructure). For example, an API could be modified to accept OAuth, an open standard for authorization, rather than raw HTTP or basic HTTP authentication or others. Example embodiments of the API wall and the enterprise system encompassing the API wall may be configured [0061]) of an application programming interface (API), (Fig. 4 endpoint application running on an endpoint computer system, a server servicing API calls for that endpoint, and an API wall for monitoring the interaction [0017]) wherein the secure endpoint (a more secure authentication ( e.g., the use of a digital certificate issued/verified by a Certificate Authority as part of a public key infrastructure). For example, an API could be modified to accept OAuth, an open standard for authorization, rather than raw HTTP or basic HTTP authentication or others. Example embodiments of the API wall and the enterprise system encompassing the API wall may be configured [0061]) is configured to accept a set of structured data (to modify the output of APIs from XML data to JSON data, [0061])
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson in view of Avetisov to incorporate the teachings of Call whereby provision, to a user device, a secure endpoint of an application programming interface (API), wherein the secure endpoint is configured to accept a set of structured data. By doing so the API wall further provides a report for a security team of an enterprise or other system user such that the security team can change access permissions for the API, wherein the access permission changes include modifying the access to the API, limiting access to the API, or blocking access to the API based on many factors, including the performance indicators. Call [0010]
Pogrebezky teaches and provided to the user device (user system 1240 [0241]) to use in API calls (via web service callouts [0270]) including the API call, (using a search engine API [0058]) generate, a standardized name and a location indicator (Fig. 3 The method 300 can be used to discover a company name from a website ( e.g., find the correct company name based on HTML from the company's home webpage). The method 300 can determine the correct company name even when a given webpage might contain different company names [0107] … Identifiers and other support indicators can include pieces of information fetched from the website that can be used as support for determining the company name. Examples of identifiers and other support indicators can include information extracted from one or more Uniform Resource Locators (URLs) (e.g., microsoft.com->microsoft,aa.com->aa), from one or more social handles ("http://www.
facebook.corn/walmart" ->walmart ), from different HTML attributes ( <img="logo.html" alt="Vmware">->vmware ), etc. [0110]) based on the corresponding data structure; (Fig. 5A company seeds comprising original attributes, website(s) and extracted attributes from website(s) []) such as “corresponding data structure” perform a lookup process on an image database, based on using the generated standardized name; (The method 600 begins at 602, when the company logo module 144 executes a query via a search engine to search a web-based data source, such as Wikipedia, for webpages that reference a company. For example, in one non-limiting implementation, the company's wiki pages can be searched via search engine 134 (e.g., Bing) by a query that has been developed [0161]; At 604, the company logo module 144 scrapes search results to extract a company name and a company website from one or more of the webpages that reference a company. At 606 the company logo module 144 compares the extracted company name in the extracted company website to corresponding fields within the company profile for this particular company [0162]) obtain, based on performing the lookup using the generated standardized name, a corresponding image for the set of structured data; (FIGS. 6A and 6B are collectively a flowchart of a method 600 performed by the company logo module 144 of the company enricher module 140 for extracting a plurality of images and then selecting one of the images from the plurality of images as a company logo in accordance with the disclosed embodiments. The company logo that is selected can then be added to the company profile for that company to supplement other information such as the company name, company website, address, phone number, etc. [0159]) SEE [0164] generate an enriched set of structured data by modifying the set of structured data to include the standardized name, the location indicator, and the corresponding image obtained from the image database; (Seed Enrichment Processing [0118]; In some cases, a company seed can have missing information or invalid information. For example, even once the company's website or home webpage is found, it may be missing information, or have invalid information that is outdated or incorrect. For instance, the Coca-Cola company seed might contain a valid phone number, but could be missing a valid address. To address this issue, the seed enricher module 130 can enrich each company seed by finding attributes and other enhancing information for enriching data that is part of a company seed. [0119]) and transmit, to the user device (presented to the end user [0030]) and in response to the API call (search engine API [0058]) received from the user device, (in response to input received from the user systems 1240. [0252]) the enriched set of structured data (Fig. 2A, (225) the enriched company seed []) such as “enriched set of structured data”
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson in view of Avetisov and Call to incorporate the teachings of Pogrebezky wherein and provided to the user device to use in API calls including the API call, generate, a standardized name and a location indicator based on the corresponding data structure; perform a lookup process on an image database, based on using the generated standardized name; obtain, based on performing the lookup using the generated standardized name, a corresponding image for the set of structured data; generate an enriched set of structured data by modifying the set of structured data to include the standardized name, the location indicator, and the corresponding image obtained from the image database; and transmit, to the user device and in response to the API call received from the user device, the enriched set of structured data. By doing so some of additional company information for each collected seed can be fetched using one or more search engines. Each collected seed can then be enriched by adding additional company information to the original seed data for each collected seed to generate an enriched company seed. Pogrebezky [0046]
Regarding claim 2 Izenson in view of Avetisov, Call and Pogrebezky teaches the system of claim 1,
Izenson as modified further teaches wherein the partial string comprises a name (possible variations (e.g., "ABC's Cafe", "ABCs' Cafe", "ABCs Cafe") [0095]))or a numerical identifier (merchant identifier [0081])
Regarding claim 3 Izenson in view of Avetisov, Call and Pogrebezky teaches the system of claim 1,
Izenson as modified further teaches wherein each data structure (the raw data [0126]) includes at least the standardized name (Fig., 8, (806) normalize merchant name [0139]) and the location indicator (Fig., 8, (808) normalize merchant geographic location [0139])
Regarding claim 4 Izenson in view of Avetisov, Call and Pogrebezky teaches the system of claim 1,
Izenson as modified further teaches wherein the one or more processors, (processor [0061]) to extract(retrieve [0101]) the partial string, (possible variations (e.g., "ABC's Cafe", "ABCs' Cafe", "ABCs Cafe") [0095])) are configured to: apply a machine learning model to parse (generated by the rule generation module 108c-5 and the processor 108b based on pre-existing rules and/or via machine learning. [0097]) see parsed Merchant name in Fig 3B the entries (transaction data [0062])
Regarding claim 5 Izenson in view of Avetisov, Call and Pogrebezky teaches the system of claim 1,
Izenson as modified further teaches wherein each corresponding image comprises a logo, a capital letter image, or a category image (one or more graphics [0034])
Regarding claim 6 Izenson in view of Avetisov, Call and Pogrebezky teaches the system of claim 1,
Izenson as modified further teaches wherein the one or more processors (processor [0061]) are configured to: generate, (The rules may indicate how the raw merchant name may be modified or transformed to generate a normalized merchant name 372 [0102]) for at least one of the plurality entries, (entries for "Raw Merchant Name" 302, "Descriptor Merchant Name" 304, "Parsed Merchant Name" 306, "Normalized Merchant Name" 308, "Doing Business As (DBA)" 310, and "Merchant Corporate Name" 312. [0086]) a counterparty (Fig. 3B (362) ABCs Café and Lounge [0103]) based on the partial string, (possible variations (e.g., "ABC's Cafe", "ABCs' Cafe", "ABCs Cafe") [0095])) wherein the modified set of structured data (Fig. 8 (818) enriched transaction message [0147]) further includes a name (doing business as (DBA) ABCs Café and Lounge [0103]) associated with the counterparty. (Fig. 3B (362) ABCs Café and Lounge [0103])
Regarding claim 7 Izenson in view of Avetisov, Call and Pogrebezky teaches the system of claim 6,
Izenson as modified further teaches wherein the one or more processors (processor [0061]) are configured to: determine, (determine [0103]) for the counterparty, (Fig. 3B (362) ABCs Café and Lounge [0103]) a corresponding image (one or more graphics, a token a bar code a QR code [0033]) using the name of the counterparty (doing business as (DBA) ABCs Café and Lounge [0103]) and the image database, (merchant attributes database [0035]) wherein the modified set of structured data (Fig. 8 (818) enriched transaction message [0147]) further includes the corresponding image(one or more graphics, a token a bar code a QR code [0033]) for the counterparty. (doing business as (DBA) ABCs Café and Lounge [0103])
Regarding claim 8 Izenson a method of data enrichment, (Fig. 7 method [0022]) comprising: receiving, (receives [0063]) from the user device (a user computing device [0062] such as any one of portable consumer devices include cellular or wireless phones, personal digital assistants (PD As), pagers, portable computers, smart cards, and the like [0061] and at the secure endpoint (serial port 1012 [0182]) a set of structured data including a plurality of entries; (transaction data [0062]) extracting, (retrieve [0101]) by the device (a user computing device 102 (e.g., a mobile device) [0113]) and from each entry, (transaction data [0062]) of the plurality of entries (entries for "Raw Merchant Name" 302, "Descriptor Merchant Name" 304, "Parsed Merchant Name" 306, "Normalized Merchant Name" 308, "Doing Business As (DBA)" 310, and "Merchant Corporate Name" 312. [0086]) a partial string(retrieve a string of characters of a merchant name [0101]) from a description string (merchant name [0101]) included in each entry; (transaction data [0062]) determining, by the device (a user computing device 102 (e.g., a mobile device) [0113]) for the partial string, (retrieve a string of characters of a merchant name [0101]) a corresponding data structure(the raw data [0126]) in a database; (transaction database [0095])
Izenson does not full disclose and provided to the user device to use in API calls including the API call, generating, by the device, a standardized name and a location indicator based on the corresponding data structure; extracting, by the device, based on performing a lookup process on an image database using the generated standardized name, and for the corresponding data structure for the partial string, an image associated with the corresponding data structure; obtaining, by the device and based on performing the lookup using the generated standardized name, a corresponding image for the corresponding data structure; generating, by the device, an enriched data structure by modifying the corresponding data structure to include the standardized name, the location indicator, and the obtained image; and transmitting, by the device, in response to the API call received from the user device, and to the user device, the enriched data structure.an API call that includes the set of structured data including a plurality of entries, wherein the API call further includes a set of credentials that authorize the user device to request enrichment of data, wherein a subset of the set of credentials was generated by the device, and wherein the subset of the set of credentials includes a signature that is based on a private key associated with the user device; provision, to a user device, a secure endpoint of an application programming interface (API), wherein the secure endpoint is configured to accept a set of structured data and wherein the secure endpoint is associated with the device;
Avetisov teaches an API call (API call (i.e., a request) [0133], [0260]) that includes a set of structured data (the unified schema specifies a translation between XML or JSON code and a vector such that a vector may represent a compact version of the XML or JSON code [0140] such as “structured data including plurality of entries” including a plurality of entries, (including request parameters such as the address and one or more values for arguments defined in the schema of the smart contract.) [0133]) wherein the API call (API call (i.e., a request) [0133]) further includes a set of credentials (include representations of credentials [0137]) that authorize the user device (authorized user or device [0142]) to request enrichment of data, (modify a secured asset [0079] ) such as “request enrichment of data” wherein a subset of the set of credentials (a representation of a credential, and a signature of the credential [0138]) was generated by the system, (Supplied credential values, or a cryptographic hash value based thereon, may be obtained within the trusted execution environment. Representations of those credentials may be generated within the trusted execution environment and may be passed through the secure channel to the authentication application. [0042], [0044]) and wherein the subset of the set of credentials (a representation of a credential, and a signature of the credential [0138]) includes a signature (a signature [0138]) that is based on a private key (with a private key [0138]) associated with (associated with [0138]) the user device; (user device [0138])
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson to incorporate the teachings of Avetisov wherein an API call that includes a set of structured data including a plurality of entries, wherein the API call further includes a set of credentials that authorize the user device to request enrichment of data, wherein a subset of the set of credentials was generated by the system, and wherein the subset of the set of credentials includes a signature that is based on a private key associated with the user device. By doing so a request to establish a user identity, the request comprising representations of credentials, first signed data, and a public key. Avetisov [0010]
Call teaches provision, (provision [0032]) by a device (virtual machine [0032]) and to a user device, (user’s network [0032]) a secure endpoint (a more secure authentication ( e.g., the use of a digital certificate issued/verified by a Certificate Authority as part of a public key infrastructure). For example, an API could be modified to accept OAuth, an open standard for authorization, rather than raw HTTP or basic HTTP authentication or others. Example embodiments of the API wall and the enterprise system encompassing the API wall may be configured [0061]) of an application programming interface (API), (Fig. 4 endpoint application running on an endpoint computer system, a server servicing API calls for that endpoint, and an API wall for monitoring the interaction [0017]) wherein the secure endpoint (a more secure authentication ( e.g., the use of a digital certificate issued/verified by a Certificate Authority as part of a public key infrastructure). For example, an API could be modified to accept OAuth, an open standard for authorization, rather than raw HTTP or basic HTTP authentication or others. Example embodiments of the API wall and the enterprise system encompassing the API wall may be configured [0061]) is configured to accept a set of structured data (to modify the output of APIs from XML data to JSON data, [0061]) and wherein the secure endpoint(a more secure authentication ( e.g., the use of a digital certificate issued/verified by a Certificate Authority as part of a public key infrastructure). For example, an API could be modified to accept OAuth, an open standard for authorization, rather than raw HTTP or basic HTTP authentication or others. Example embodiments of the API wall and the enterprise system encompassing the API wall may be configured [0061]) is associated with the device; (Electronic user devices might include computers, tablets, wearable computer devices, smartphones, embedded computer systems, or other devices. [0027])
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson in view of Avetisov to incorporate the teachings of Call whereby and wherein the secure endpoint is associated with the device; provision, to a user device, a secure endpoint of an application programming interface (API), wherein the secure endpoint is configured to accept a set of structured data. By doing so the API wall further provides a report for a security team of an enterprise or other system user such that the security team can change access permissions for the API, wherein the access permission changes include modifying the access to the API, limiting access to the API, or blocking access to the API based on many factors, including the performance indicators. Call [0010]
Pogrebezky teaches and provided to the user device (user system 1240 [0241]) to use in API calls (via web service callouts [0270]) including the API call, (using a search engine API [0058])generating, by the device, a standardized name and a location indicator (Fig. 3 The method 300 can be used to discover a company name from a website ( e.g., find the correct company name based on HTML from the company's home webpage). The method 300 can determine the correct company name even when a given webpage might contain different company names [0107] … Identifiers and other support indicators can include pieces of information fetched from the website that can be used as support for determining the company name. Examples of identifiers and other support indicators can include information extracted from one or more Uniform Resource Locators (URLs) (e.g., microsoft.com->microsoft,aa.com->aa), from one or more social handles ("http://www.
facebook.corn/walmart" ->walmart ), from different HTML attributes ( <img="logo.html" alt="Vmware">->vmware ), etc. [0110]) based on the corresponding data structure; (Fig. 5A company seeds comprising original attributes, website(s) and extracted attributes from website(s) []) such as “corresponding data structure”extracting, by the device, based on performing a lookup process on an image database using the generated standardized name, (The method 600 begins at 602, when the company logo module 144 executes a query via a search engine to search a web-based data source, such as Wikipedia, for webpages that reference a company. For example, in one non-limiting implementation, the company's wiki pages can be searched via search engine 134 (e.g., Bing) by a query that has been developed [0161]; At 604, the company logo module 144 scrapes search results to extract a company name and a company website from one or more of the webpages that reference a company. At 606 the company logo module 144 compares the extracted company name in the extracted company website to corresponding fields within the company profile for this particular company [0162]) and for the corresponding data structure for the partial string, an image associated with the corresponding data structure; (FIGS. 6A and 6B are collectively a flowchart of a method 600 performed by the company logo module 144 of the company enricher module 140 for extracting a plurality of images and then selecting one of the images from the plurality of images as a company logo in accordance with the disclosed embodiments. The company logo that is selected can then be added to the company profile for that company to supplement other information such as the company name, company website, address, phone number, etc. [0159]) SEE [0164] obtaining, by the device and based on performing the lookup using the generated standardized name, a corresponding image for the corresponding data structure; (FIGS. 6A and 6B are collectively a flowchart of a method 600 performed by the company logo module 144 of the company enricher module 140 for extracting a plurality of images and then selecting one of the images from the plurality of images as a company logo in accordance with the disclosed embodiments. The company logo that is selected can then be added to the company profile for that company to supplement other information such as the company name, company website, address, phone number, etc. [0159]) SEE [0164] generating, by the device, an enriched data structure by modifying the corresponding data structure to include the standardized name, the location indicator, and the obtained image; (Seed Enrichment Processing [0118]; In some cases, a company seed can have missing information or invalid information. For example, even once the company's website or home webpage is found, it may be missing information, or have invalid information that is outdated or incorrect. For instance, the Coca-Cola company seed might contain a valid phone number, but could be missing a valid address. To address this issue, the seed enricher module 130 can enrich each company seed by finding attributes and other enhancing information for enriching data that is part of a company seed. [0119]) and transmitting, by the device, (presented to the end user [0030]) in response to the API call (search engine API [0058]) received from the user device, and to the user device, (in response to input received from the user systems 1240. [0252])the enriched data structure. (Fig. 2A, (225) the enriched company seed []) such as “enriched set of structured data”
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson in view of Avetisov and Call to incorporate the teachings of Pogrebezky whereby and provided to the user device to use in API calls including the API call, generating, by the device, a standardized name and a location indicator based on the corresponding data structure; extracting, by the device, based on performing a lookup process on an image database using the generated standardized name, and for the corresponding data structure for the partial string, an image associated with the corresponding data structure; obtaining, by the device and based on performing the lookup using the generated standardized name, a corresponding image for the corresponding data structure; generating, by the device, an enriched data structure by modifying the corresponding data structure to include the standardized name, the location indicator, and the obtained image; and transmitting, by the device, in response to the API call received from the user device, and to the user device, the enriched data structure. By doing so some of additional company information for each collected seed can be
fetched using one or more search engines. Each collected seed can then be enriched by adding additional company information to the original seed data for each collected seed to generate an enriched company seed. Pogrebezky [0046]
Regarding claim 9 Izenson in view of Avetisov, Call and Pogrebezky teaches the method of claim 8,
Izenson as modified further teaches wherein the location indicator (Fig., 8, (808) normalize merchant geographic location [0139]) comprises an address, a city name, a set of coordinates, or a combination thereof (Fig. 6 (604) Merchant Address; Merchant Corporate Address [0125])
Regarding claim 10 Izenson in view of Avetisov, Call and Pogrebezky teaches the method of claim 8,
Izenson as modified further teaches wherein extracting(retrieve [0101]) the partial string (retrieve a string of characters of a merchant name [0101]) comprises: extracting (retrieve [0101]) a plurality of words (Fig. 3A parsed merchant name [0089]) from the corresponding description string; (merchant name [0101]) and generating a normalized plurality of words (normalized merchant names [0090]) from the plurality of words, (Fig. 3A parsed merchant name [0089]) wherein the partial string(retrieve a string of characters of a merchant name [0101]) is based on the normalized plurality of words (normalized merchant names [0090])
Regarding claim 11 Izenson in view of Avetisov, Call and Pogrebezky teaches the method of claim 10,
Izenson as modified further teaches wherein extracting the partial string (retrieve a string of characters of a merchant name [0101]) further comprises: tokenizing the normalized plurality of words(normalized merchant names [0090]) to generate a plurality of word tokens, (the merchant identifier may also be a series of alphanumeric characters, one or more graphics, a token [0034]) wherein the partial string (retrieve a string of characters of a merchant name [0101]) is based on the plurality of word tokens (merchant identifier may be a token [0033])
Regarding claim 12 Izenson in view of Avetisov, Call and Pogrebezky teaches the method of claim 8,
Izenson as modified further teaches further comprising: estimating whether at least one entry in the plurality of entries is recurring, (a pattern of fraud may be determined (e.g., large number of chargebacks, repetitive orders). [0052]) wherein the modified set of structured data (Fig. 8 (818) enriched transaction message sent to data analyzer computer [0147]) further includes an indication of whether the at least one entry is recurring. (a pattern of fraud may be determined (e.g., large number of chargebacks, repetitive orders). [0052])
Regarding claim 14 Izenson in view of Avetisov, Call and Pogrebezky teaches the method of claim 8,
Izenson as modified further teaches further comprising: extracting, (retrieve [0101]) for each data structure, (the raw data [0126]) a corresponding uniform resource location (URL) (internet website [0091]) corresponding (corresponding [0169]) to the data structure, (the raw data [0126]) wherein the modified set of structured data (Fig. 8 (818) enriched transaction message sent to data analyzer computer [0147]) further includes, for each entry, (transaction data [0062]) the corresponding URL. (internet website [0091])
Regarding claim 15 Izenson teaches a non-transitory computer-readable medium(Fig. 1B computer readable medium [0062]) storing a set of instructions (code [0062]) for data enrichment, (Fig. 1B computer readable medium [0062]) the set of instructions (code [0062]) comprising: one or more instructions that, (code [0062]) when executed by one or more processors (processor [0061]) of a device, (computing device / payment device [0059]) cause the device (computing device / payment device [0059]) to: receive, (receives [0063]) from the user device (a user computing device [0062] such as any one of portable consumer devices include cellular or wireless phones, personal digital assistants (PD As), pagers, portable computers, smart cards, and the like [0061] and at the secure endpoint (serial port 1012 [0182]) a set of structured data including a plurality of entries; (transaction data [0062]) extract, (retrieve [0101]) from an entry, (transaction data [0062]) of the plurality of entries , (Transaction data may include data for a specific transaction, including items purchased, item prices, total cost, consumer data (e.g., shipping address, email address), payment methods, authentication data, merchant data (e.g., merchant name, merchant location/address), etc … In some embodiments, transaction data may include information for a non-financial transaction (e.g., alert data, incentive data, product data, etc.). [0031]) one or more candidate strings (retrieve a string of characters of a merchant name [0101]) from a corresponding description string (merchant name [0101]) included in the entry; (transaction data [0062]) of the plurality of entries (entries for "Raw Merchant Name" 302, "Descriptor Merchant Name" 304, "Parsed Merchant Name" 306, "Normalized Merchant Name" 308, "Doing Business As (DBA)" 310, and "Merchant Corporate Name" 312. [0086]) determine, for each entry, (transaction data [0062]) of the plurality of entries , (Transaction data may include data for a specific transaction, including items purchased, item prices, total cost, consumer data (e.g., shipping address, email address), payment methods, authentication data, merchant data (e.g., merchant name, merchant location/address), etc … In some embodiments, transaction data may include information for a non-financial transaction (e.g., alert data, incentive data, product data, etc.). [0031]) one or more candidate data structures in a database mapping to the one or more candidate strings; (include a plurality of matching results and a plurality of non-matching results. For example, "ABCD Cafe", "ABCz Cafe" and "ABC Books" may all be returned as a result of the search query for the text string: "ABC" [0096])
Izenson does not full disclose and provided to the user device to use in API calls including the API call, generate, a standardized name and a location indicator based on a selected data structure from the one or more candidate data structures; perform a lookup process on an image database, based on using the generated standardized name
Avetisov teaches an API call (API call (i.e., a request) [0133], [0260]) that includes a set of structured data (the unified schema specifies a translation between XML or JSON code and a vector such that a vector may represent a compact version of the XML or JSON code [0140] such as “structured data including plurality of entries” including a plurality of entries, (including request parameters such as the address and one or more values for arguments defined in the schema of the smart contract.) [0133]) wherein the API call (API call (i.e., a request) [0133]) further includes a set of credentials (include representations of credentials [0137]) that authorize the user device (authorized user or device [0142]) to request enrichment of data, (modify a secured asset [0079] ) such as “request enrichment of data” wherein a subset of the set of credentials (a representation of a credential, and a signature of the credential [0138]) was generated by the system, (Supplied credential values, or a cryptographic hash value based thereon, may be obtained within the trusted execution environment. Representations of those credentials may be generated within the trusted execution environment and may be passed through the secure channel to the authentication application. [0042], [0044]) and wherein the subset of the set of credentials (a representation of a credential, and a signature of the credential [0138]) includes a signature (a signature [0138]) that is based on a private key (with a private key [0138]) associated with (associated with [0138]) the user device; (user device [0138])
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson to incorporate the teachings of Avetisov wherein an API call that includes a set of structured data including a plurality of entries, wherein the API call further includes a set of credentials that authorize the user device to request enrichment of data, wherein a subset of the set of credentials was generated by the system, and wherein the subset of the set of credentials includes a signature that is based on a private key associated with the user device. By doing so a request to establish a user identity, the request comprising representations of credentials, first signed data, and a public key. Avetisov [0010]
Call teaches provision, (provision [0032]) to a user device, (Electronic user devices might include computers, tablets, wearable computer devices, smartphones, embedded computer systems, or other devices. [0027]) a secure endpoint (a more secure authentication ( e.g., the use of a digital certificate issued/verified by a Certificate Authority as part of a public key infrastructure). For example, an API could be modified to accept OAuth, an open standard for authorization, rather than raw HTTP or basic HTTP authentication or others. Example embodiments of the API wall and the enterprise system encompassing the API wall may be configured [0061]) of an application programming interface (API), (Fig. 4 endpoint application running on an endpoint computer system, a server servicing API calls for that endpoint, and an API wall for monitoring the interaction [0017]) wherein the secure endpoint (a more secure authentication ( e.g., the use of a digital certificate issued/verified by a Certificate Authority as part of a public key infrastructure). For example, an API could be modified to accept OAuth, an open standard for authorization, rather than raw HTTP or basic HTTP authentication or others. Example embodiments of the API wall and the enterprise system encompassing the API wall may be configured [0061]) is configured to accept a set of structured data (to modify the output of APIs from XML data to JSON data, [0061])
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson in view of Avetisov, to incorporate the teachings of Call whereby provision, to a user device, a secure endpoint of an application programming interface (API), wherein the secure endpoint is configured to accept a set of structured data. By doing so the API wall further provides a report for a security team of an enterprise or other system user such that the security team can change access permissions for the API, wherein the access permission changes include modifying the access to the API, limiting access to the API, or blocking access to the API based on many factors, including the performance indicators. Call [0010]
Pogrebezky teaches and provided to the user device (user system 1240 [0241]) to use in API calls (via web service callouts [0270]) including the API call, (using a search engine API [0058])generate, a standardized name and a location indicator (Fig. 3 The method 300 can be used to discover a company name from a website ( e.g., find the correct company name based on HTML from the company's home webpage). The method 300 can determine the correct company name even when a given webpage might contain different company names [0107] … Identifiers and other support indicators can include pieces of information fetched from the website that can be used as support for determining the company name. Examples of identifiers and other support indicators can include information extracted from one or more Uniform Resource Locators (URLs) (e.g., microsoft.com->microsoft,aa.com->aa), from one or more social handles ("http://www.
facebook.corn/walmart" ->walmart ), from different HTML attributes ( <img="logo.html" alt="Vmware">->vmware ), etc. [0110]) based on a selected data structure from the one or more candidate data structures; (Fig. 5A company seeds comprising original attributes, website(s) and extracted attributes from website(s) []) such as “selected data structure” perform a lookup process on an image database, based on using the generated standardized name (The method 600 begins at 602, when the company logo module 144 executes a query via a search engine to search a web-based data source, such as Wikipedia, for webpages that reference a company. For example, in one non-limiting implementation, the company's wiki pages can be searched via search engine 134 (e.g., Bing) by a query that has been developed [0161]; At 604, the company logo module 144 scrapes search results to extract a company name and a company website from one or more of the webpages that reference a company. At 606 the company logo module 144 compares the extracted company name in the extracted company website to corresponding fields within the company profile for this particular company [0162]) a corresponding image for the selected data structure; (FIGS. 6A and 6B are collectively a flowchart of a method 600 performed by the company logo module 144 of the company enricher module 140 for extracting a plurality of images and then selecting one of the images from the plurality of images as a company logo in accordance with the disclosed embodiments. The company logo that is selected can then be added to the company profile for that company to supplement other information such as the company name, company website, address, phone number, etc. [0159]) SEE [0164] generate an enriched set of structured data by modifying the selected structured data to include the standardized name, the location indicator, and the corresponding image obtained from the image database; (Seed Enrichment Processing [0118]; In some cases, a company seed can have missing information or invalid information. For example, even once the company's website or home webpage is found, it may be missing information, or have invalid information that is outdated or incorrect. For instance, the Coca-Cola company seed might contain a valid phone number, but could be missing a valid address. To address this issue, the seed enricher module 130 can enrich each company seed by finding attributes and other enhancing information for enriching data that is part of a company seed. [0119]) and transmit, (presented to the end user [0030]) in response to the API call (search engine API [0058])received from the user device, and to the user device, (in response to input received from the user systems 1240. [0252]) the enriched set of structured data. (Fig. 2A, (225) the enriched company seed []) such as “enriched set of structured data”
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson in view of Avetisov and Call to incorporate the teachings of Pogrebezky whereby and provided to the user device to use in API calls including the API call, generate, a standardized name and a location indicator based on a selected data structure from the one or more candidate data structures; perform a lookup process on an image database, based on using the generated standardized name, a corresponding image for the selected data structure; generate an enriched set of structured data by modifying the selected structured data to include the standardized name, the location indicator, and the corresponding image obtained from the image database; and transmit, in response to the API call received from the user device, and to the user device, the enriched set of structured data. By doing so some of additional company information for each collected seed can be fetched using one or more search engines. Each collected seed can then be enriched by adding additional company information to the original seed data for each collected seed to generate an enriched company seed. Pogrebezky [0046]
Regarding claim 16 Izenson in view of Avetisov, Call and Pogrebezky teaches the non-transitory computer-readable medium of claim 15,
Izenson as modified further teaches wherein the one or more instructions that, (code [0062]) cause the device(computing device / payment device [0059]) to extract (retrieve [0101]) the one or more candidate strings, (retrieve a string of characters of a merchant name [0101]) are executed by the one or more processors (processor [0061]) to cause the device(computing device / payment device [0059]) to: apply one or more rules (based on a series of rules stored in the rules database [0093])to a corresponding description string (merchant name [0101])
Regarding claim 17 Izenson in view of Avetisov, Call and Pogrebezky teaches the non-transitory computer-readable medium of claim 15,
Izenson as modified further teaches wherein the one or more instructions(code [0062]) that, cause the device(computing device / payment device [0059]) to determine the one or more candidate data structures, (include a plurality of matching results and a plurality of non-matching results. [0096]) are executed by the one or more processors (processor [0061]) to cause the device (computing device / payment device [0059]) to: apply a machine learning model(generated by the rule generation module 108c-5 and the processor 108b based on pre-existing rules and/or via machine learning. [0097]) see parsed Merchant name in Fig 3B to map the one or more candidate strings to the one or more candidate data structures. (include a plurality of matching results and a plurality of non-matching results. For example, "ABCD Cafe", "ABCz Cafe" and "ABC Books" may all be returned as a result of the search query for the text string: "ABC" [0096])
Regarding claim 18 Izenson in view of Avetisov, Call and Pogrebezky teaches the non-transitory computer-readable medium of claim 15,
Izenson as modified further teaches wherein the one or more instructions(code [0062]) that, cause the device(computing device / payment device [0059]) to determine, for each entry, (transaction data [0062]) a corresponding category, (For example, the merchant identifier may be one or more of a merchant name, a merchant address, a merchant location, a merchant category code (MCC), [0034]) wherein the modified set of structured data(Fig. 8 (818) enriched transaction message sent to data analyzer computer [0147]) further includes, for each entry, (transaction data [0062]) the corresponding category (For example, the merchant identifier may be one or more of a merchant name, a merchant address, a merchant location, a merchant category code (MCC), [0034])
Regarding claim 19 Izenson in view of Avetisov, Call and Pogrebezky teaches the non-transitory computer-readable medium of claim 15,
Izenson as modified further teaches wherein the one or more instructions(code [0062]) when executed, cause the device(computing device / payment device [0059]) to: authenticate the user device (the merchant computer 120 [0062]) based on a secret (authentication request/response messages [0062]) received with the set of structured data, wherein the modified set of structured data(Fig. 8 (818) enriched transaction message sent to data analyzer computer [0147]) is returned (include authentication request/response messages and transaction authorization request/response message. [0076]) based on authenticating the user device (the merchant computer 120 receives transaction data from a user computing device 102 and transmits the transaction data to the acquirer computer 106 for fraud transaction-related processes ( e.g., authentication, authorization). [0062])
Claims 21 and 22 are rejected under 35 U.S.C. 103 as being unpatentable over Izenson et al. (United States Patent Publication Number 20190236601 ), hereinafter Izenson, in view of Avetisov et al., (United States Patent Publication Number 2021/0377254) hereinafter Avetisov in view of Call et al., (United States Patent Publication Number 20180026943) hereinafter Call, Pogrebezky et al., (United States Patent Publication Number 2020/0242633) hereinafter Pogrebezky and in further view Kamal Jain (United States Patent Publication Number 20070179845) hereinafter Jain
Regarding claim 21 Izenson in view of Avetisov, Call and Pogrebezky teaches the system of claim 1,
Izenson does not fully disclose wherein the one or more processors are further configured to: receive feedback regarding at least one of the transmitted standardized name, the transmitted location indicator, or the transmitted corresponding image.
Jain teaches wherein the one or more processors (processor [0034]) are further configured to: receive feedback (Fig. 6, (604) receive feedback [0079]) regarding at least one of the transmitted standardized name, (advertiser [0079]) such as “standardized name” the transmitted location indicator, or the transmitted corresponding image.
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson in view of Avetisov, Call and Pogrebezky to incorporate the teachings of Jain wherein one or more processors are further configured to: receive feedback regarding at least one of the transmitted standardized name, the transmitted location indicator, or the transmitted corresponding image. By doing so feedback can, for example, verify that a transaction occurred as well as provide other information, such as the size and type of transaction, the consumer's level of satisfaction, etc. Jain [0079]
Regarding claim 22 Izenson in view of Avetisov, Call, Pogrebezky and Jain the system of claim 21,
Izenson does not teach wherein the feedback includes at least one of: a ranking, an indication of whether the standardized name, the location indicator, or the corresponding image is correct, and wherein the one or more processors are further configured to update the database based on the feedback.
Jain teaches wherein the feedback (Fig. 6, (604) receive feedback [0079]) includes at least one of: a ranking, (Fig. 6, (606) At 606, an advertiser ranking can be computed and/or updated based, e.g., upon the feedback received at 604. [0079]) an indication of whether the standardized name, the location indicator, or the corresponding image is correct, and wherein the one or more processors are further configured to update the database based on the feedback.
It would have been prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified Izenson in view of Avetisov, Call and Pogrebezky to incorporate the teachings of Jain wherein the feedback includes at least one of: a ranking, an indication of whether the standardized name, the location indicator, or the corresponding image is correct, and wherein the one or more processors are further configured to update the database based on the feedback. By doing so enhancing the significance of the advertiser ranking. Jain [0086]
Conclusion
7. The prior art made of record and not relied upon is considered pertinent to
applicant's disclosure.
Miska et al., (United States Patent Publication Number 20130226850 ) teaches, “means for receiving feedback on the relevance of the context from the user; and means for adapting the context model based on the feedback. [0023] [0024]”
8. Any inquiry concerning this communication or earlier communications from the
examiner should be directed to Kweku Halm whose telephone number is (469) 295-
9144. The examiner can normally be reached on 7:30AM - 5:30PM Mon - Thur. If
attempts to reach the examiner by telephone are unsuccessful, the examiner's
supervisor, Sanjiv Shah can be reached on (571) 272-4098. The fax phone
number for the organization where this application or proceeding is assigned is 571-273-
8300.
Information regarding the status of an application may be obtained from the
Patent Application Information Retrieval (PAIR) system. Status information for published
applications may be obtained from either Private PAIR or Public PAIR. Status information
for unpublished applications is available through Private PAIR only. For more
information about the PAIR system, see http://pair-direct.uspto.gov. Should you have
questions on access to the Private PAIR system, contact the Electronic Business Center
(EBC) at 866-217-9197 (toll-free).
/KWEKU WILLIAM HALM/Examiner, Art Unit 2166
/SANJIV SHAH/Supervisory Patent Examiner, Art Unit 2166