Prosecution Insights
Last updated: April 19, 2026
Application No. 18/391,973

AUTHENTICATION BASED ON MODULATED AUDITORY INPUT

Final Rejection §103
Filed
Dec 21, 2023
Examiner
MCFARLAND-BARNES, KELAH JANAE
Art Unit
2431
Tech Center
2400 — Computer Networks
Assignee
Motorola Mobility LLC
OA Round
2 (Final)
100%
Grant Probability
Favorable
3-4
OA Rounds
2y 6m
To Grant
99%
With Interview

Examiner Intelligence

Grants 100% — above average
100%
Career Allow Rate
2 granted / 2 resolved
+42.0% vs TC avg
Minimal +0% lift
Without
With
+0.0%
Interview Lift
resolved cases with interview
Typical timeline
2y 6m
Avg Prosecution
18 currently pending
Career history
20
Total Applications
across all art units

Statute-Specific Performance

§101
12.8%
-27.2% vs TC avg
§103
54.7%
+14.7% vs TC avg
§102
14.0%
-26.0% vs TC avg
§112
15.1%
-24.9% vs TC avg
Black line = Tech Center average estimate • Based on career data from 2 resolved cases

Office Action

§103
DETAILED ACTION In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. This Office Action is in response to the communication filed on 12/21/2023. Claims 1, 5, 6, 8, 11, 12, and 14 have been amended. Claims 1-20 are pending for consideration. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Arguments Applicant's arguments filed 01/19/2026 have been fully considered but they are not persuasive. Applicant argues that Nalluri and/or Neuneker do not disclose amended claim 8, in particular the features of “modulating the auditory input to generate a modulated auditory input, the auditory input modulated with a unique key used to authenticate the auditory input of the access request”, and comparison of a modulated audio input and stored audio input. Examiner disagrees. Regarding claim 8, Neuneker uses the specified code to insert a pattern of a plurality of gaps into an unmodulated voice of the user (Neuneker: see Col 3 lines 1-3). The specified code modulates the voice input of the user in the same way that the unique key in the present application modulates the user’s voice input. The application of gaps and pauses based on the specified code to the voice input changes the cadence. Furthermore, Nalluri teaches the enrollment voice associated with the user account being compared with the voice being transformed or modulated at the access attempt (Nalluri: see Page 9 paragraph 0069 lines 1-20). Applicant argues that Neuneker does not teach claims 5 and 6, in particular the features of “the modulated voice data is assigned a unique key” and “generate the unique key” because Neuneker’s “authentication code” or “specified code” are not a “unique key”. Examiner disagrees. Regarding claim 5, the unique key is assigned to the modulated voice data. The unique key usable to authenticate the auditory input. Neuneker teaches the assignment of an authentication code for a specified amount of time to an attempt access and must correspond to the specified code for the specified amount of time (Neuneker: see Col 1 lines 46-67 - Col 2 lines 1-5). Applicant specification (0038) describes the assignment of the unique key to the modulated voice data. Broadly interpreted, claim 5 does not require that the unique key be applied to the input, but the unique key is assigned to the modulated voice data and usable to authenticate the auditory input. Both the authentication code and specified code of Neuneker are usable to authenticate the voice input of the user. Regarding claim 6, Neuneker teaches the generation of the specified code (Neuneker see Col 2 lines 60-67). The specified code is represented by a pattern of a plurality of gaps inserted into the audio input. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-6, 8-12, and 14-19 are rejected under 35 U.S.C. 103 as being unpatentable over Nalluri et al. (US 2025/0030685) (hereinafter Nalluri) in view of Neuneker et al. (U.S. 11,475,113)(hereinafter Neuneker. Regarding claims 1 and 8, Nalluri teaches a memory to store modulated voice data (Nalluri: see Fig. 3 item 340; Page 9 paragraph 0067 lines 18-22, “In some examples, the voice transformation circuitry 240 stores the enrollment voice for the account in the user authentication database 340 with other information associated with the account (e.g., a username, a password, etc.) for later retrieval during account access attempts”); an auditory authentication manager implemented at least partially in hardware and configured to cause the computing device to: modulate an auditory input received as an account access request to generate a modulated auditory input (Nalluri: see Page 2 paragraph 0028 lines 1-5, During account enrollment/service registration, a user provides a voice input to be utilized as a baseline for user authentication. Examples disclosed herein adjust the voice input to generate an enrollment voice to associate with the account/service; Page 4 paragraph 0038 lines 6-10, “In this example, the user interface circuitry 210 receives inputs from the user indicative of the user requesting to sign up for an account and/or service”); compare the modulated auditory input to the stored modulated voice data; and authenticate the auditory input for the account access request based at least in part on comparison of the modulated auditory input to the modulated voice data (Nalluri: see Page 9 paragraph 0069 lines 1-20, The service provider circuitry 300 of FIG. 3 includes the voice authentication circuitry 320 to determine whether a user is authorized to access the user-specific account based on the enrollment voice associated with the account and the transformed voice generated by the voice transformation circuitry 240 for the account access attempt. For example, the voice authentication circuitry 320 can determine whether the transformed voice matches the enrollment voice for the account to which the user device 110 requests access. The voice authentication circuitry 320 can identify the enrollment voice associated with the account via the user authentication database 340 based on other account information provided in association with the access attempt. Further, the voice authentication circuitry 320 can compare voice-specific features of the transformed voice to voice-specific features of the enrollment voice associated with the account/service subscription to determine whether the transformed voice is a product of a voice input from the same user that enrolled the account and a voice transformer that produced the enrollment voice). However, Nalluri does not teach the auditory input modulated with a unique key used to authenticate the auditory input of the account access request. Nevertheless, Neuneker-which is in the same field of endeavor- teaches the auditory input modulated with a unique key used to authenticate the auditory input of the account access request (Neuneker: see Col 3 lines 1-5, “The specified code 112 may represent a pattern that includes a plurality of gaps inserted in another signal of an unmodulated voice of the user 106. The another signal may represent a signal between the phrase 110 spoken by the user 106 and the modulating device 108”). Nalluri and Neuneker are analogous art because they are from the same field of endeavor. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art to use Nalluri’s authentication method with Neuneker’s use of a specified code to determine the modulation of voice input. The suggestion/motivation for doing so would be to prevent replay attacks in a voice authentication system. Regarding claim 2, Nalluri teaches the auditory authentication manager is a voice biometrics authentication system configured to authenticate a user who provides the auditory input as the account access request; and the modulated voice data is based on an initial auditory input previously received as provided by the user the auditory authentication manager is a voice biometrics authentication system configured to authenticate a user who provides the auditory input as the account access request (Nalluri: see Page 9 paragraph 0069 lines 7-10; Page 16 paragraph 0106 lines 1-6). Regarding claim 3, Nalluri teaches the memory is configured to store personally identifiable information associated with the user and the modulated voice data (Nalluri: see Page 16 paragraph 0099 lines 11-21). Regarding claim 4, Nalluri teaches an enrollment feature of the voice biometrics authentication system includes recording, via a user interface on a mobile device, the initial auditory input that is stored as the modulated voice data (Nalluri: see Page 2 paragraph 0028 lines 1-3; Page 15 paragraph 0095 lines 11-13; Page 3 paragraph 0032 lines 1-4). Regarding claims 5, 11, and 18 Nalluri and Neuneker teach the modulated voice data is assigned the unique key usable by the auditory authentication manager to authenticate the auditory input for the account access request (Neuneker: see Col 3 lines 17-33, “The signal analysis module 102 is to analyze the signal 104 to ascertain the specified code 112 for a specified time period 114…The specified time period 114 may also represent a time duration during which the specified code 112 is valid for authenticating the user 106. Thus, outside of the specified time period 114, the specified code 114 would be invalid for authenticating the user 106”). Motivation to combine Nalluri and Neuneker in the instant claim, is the same as that in claim 1. Regarding claims 6, 12, and 19 Nalluri and Neuneker teach generate the unique key; and modulate voice characteristics of the auditory input according to the unique key (see Col 2 lines 60-67, Col 3 lines 1-13, “Referring to FIGS. 1 and 2, the modulating device 108 may include any type of modulating device that adds, for example, a gap, or a plurality of gaps to a phrase 110 spoken by the user. For example, assuming that the phrase 110 spoken by the user 106 is “hello”, the modulating device 108 may add gaps of 1 ms, 10 ms, 15 ms, and 50 ms at different predetermined points during the phrase “hello”. The location and/or duration of the gaps may represent a specified code 112 as disclosed herein. The specified code 112 may represent a pattern that includes a plurality of gaps inserted in another signal of an unmodulated voice of the user 106. The another signal may represent a signal between the phrase 110 spoken by the user 106 and the modulating device 108. According to another example, the modulating device 108 may add a number of digits that correspond to the specified code 112. For example, the specified code 112 may include eight digits such as “12573678”. Thus, the specified code 112 may represent a pattern that includes a plurality of digits inserted in another signal of an unmodulated voice of the user 106. According to an example, the digits may be generated by an open authentication (OATH) token”) . Motivation to combine Nalluri and Neuneker in the instant claim, is the same as that in claim 1. Regarding claim 9, Nalluri teaches recording an initial auditory input as provided by a user prior to the access request; and modulating the initial auditory input that is stored as the modulated voice data for subsequent comparison (Nalluri: see Page 2 paragraph 0028 lines 1-15) Regarding claim 10, Nalluri teaches the authenticating the auditory input for the access request includes authenticating the user who provides the auditory input of the access request (Nalluri: see Page 9 paragraph 0069 lines 7-10). Regarding claim 14, Nalluri and Neuneker teach a processor coupled with a memory that stores modulated voice data and a unique key applied to generate the modulated voice data (Neuneker: see Col 6 lines 6-10, “The hardware may include a processor 302, and a memory 304 (i.e., a non-transitory computer readable medium) storing machine readable instructions that when executed by the processor cause the processor to perform the instructions of the block diagram 300”) an auditory authentication manager implemented at least partially by the processor and configured to: receive an access request as an auditory input to access a user account that includes at least one of personally identifiable information or confidential user information (Nalluri: see Page 4 paragraph 0038 lines 3-10; Page 16 paragraph 0099 lines 11-21); modulate the auditory input of the access request to generate a modulated auditory input (Nalluri: see Page 2 paragraph 0028 lines 1-5); and authenticate the auditory input for the access request based at least in part on comparison of the modulated voice data (Nalluri: see Page 3 paragraph 0029; Page 9 paragraph 0069 lines 1-20) and the modulated auditory input that is modulated with the unique key (Neuneker: see Col 3 lines 1-5, “The specified code 112 may represent a pattern that includes a plurality of gaps inserted in another signal of an unmodulated voice of the user 106. The another signal may represent a signal between the phrase 110 spoken by the user 106 and the modulating device 108”). Motivation to combine Nalluri and Neuneker in the instant claim, is the same as that in claim 1. Regarding claim 15, Nalluri teaches the auditory authentication manager is configured to authenticate a user who provides the auditory input as the access request; and the modulated voice data is based on an initial auditory input previously received as provided by the user (Nalluri: see Page 9 paragraph 0069 lines 7-10; Page 16 paragraph 0106 lines 1-6). Regarding claim 16, Nalluri teaches the access request is received via a user interface on a mobile device of the user (Nalluri: see Page 3 paragraph 0032 lines 1-4). Regarding claim 17, Nalluri teaches an enrollment feature of the auditory authentication manager includes recording, via the user interface on the mobile device, the initial auditory input that is the stored modulated voice data (Nalluri: see Page 2 paragraph 0028 lines 1-3, Page 15 paragraph 0095 lines 11-13, Page 3 paragraph 0032 lines 1-4). Claims 7, 13, and 20 are rejected under 35 U.S.C. 103 as being unpatentable over Nalluri in view of Neuneker, as applied to claims 1-6, 8-12, and 14-19 above, and further in view of Fiedler et al. (US 11,341,573) (hereinafter Fiedler). Regarding claims 7, 13, and 20, Nalluri and Neuneker teach the invention detailed above. However, Nalluri and Neuneker fail to teach authenticate the auditory input for the account access request based at least in part on a context of the auditory input as associated with personally identifiable information associated with a user who provides the auditory input, the context of the auditory input being at least one of a financial context, a banking context, or a healthcare context. Nevertheless, Fiedler-which is in the same field of endeavor- teaches authenticate the auditory input for the account access request based at least in part on a context of the auditory input as associated with personally identifiable information associated with a user who provides the auditory input, the context of the auditory input being at least one of a financial context, a banking context, or a healthcare context (Fiedler: see Col 6 lines 42-50, “In some implementations, a behavior pattern of the user can be developed based on user interactions with the service provider. In some examples, user behavior (a dynamic factor) can be used to profile the user in view of the behavior pattern. In some implementations, the behavior pattern can be used to identify anomalous behavior (e.g., customer normally trades particular type of stock from home from 2-4 PM; current trade request is different type of stock, not from home, at 9 AM”). Nalluri, Neuneker, and Fiedler are analogous art because they are from the same field of endeavor, speaking identification and verification techniques for multimodal and expert systems. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art to combine Nalluri and Neuneker inventions with Fiedler to use the context of an authentication request as an authentication factor. The suggestion/motivation for doing so would be to differentiate the level of access in an authentication request which would make the improve the security of the system. Conclusion THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to KELAH JANAE MCFARLAND-BARNES whose telephone number is (571)272-5953. The examiner can normally be reached Monday through Friday 8:00am until 4:00pm Central Time. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Lynn D Feild can be reached at 571-272-2092. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /KELAH JANAE MCFARLAND-BARNES/ Examiner, Art Unit 2431 /SHIN-HON (ERIC) CHEN/Primary Examiner, Art Unit 2431
Read full office action

Prosecution Timeline

Dec 21, 2023
Application Filed
Aug 05, 2025
Non-Final Rejection — §103
Jan 19, 2026
Response Filed
Mar 09, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12579256
LARGE LANGUAGE MODEL (LLM) SUPPLY CHAIN SECURITY
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 1 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
100%
Grant Probability
99%
With Interview (+0.0%)
2y 6m
Median Time to Grant
Moderate
PTA Risk
Based on 2 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month