Prosecution Insights
Last updated: April 19, 2026
Application No. 18/424,229

MULTIMODAL SEMANTIC SENSOR DATA FINGERPRINTING

Non-Final OA §103
Filed
Jan 26, 2024
Examiner
MAYE, AYUB A
Art Unit
2436
Tech Center
2400 — Computer Networks
Assignee
DELL PRODUCTS, L.P.
OA Round
1 (Non-Final)
58%
Grant Probability
Moderate
1-2
OA Rounds
5y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 58% of resolved cases
58%
Career Allow Rate
377 granted / 652 resolved
At TC average
Strong +42% interview lift
Without
With
+41.6%
Interview Lift
resolved cases with interview
Typical timeline
5y 2m
Avg Prosecution
32 currently pending
Career history
684
Total Applications
across all art units

Statute-Specific Performance

§101
3.0%
-37.0% vs TC avg
§103
57.5%
+17.5% vs TC avg
§102
18.6%
-21.4% vs TC avg
§112
13.2%
-26.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 652 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1-20 are rejected under 35 U.S.C. 103 as being unpatentable over King et al (2011/0043652) in views of Miller et al (2020/0162236). For claim 1, King teaches that A method (abstract) comprising: receiving, from a first sensor of a first information handling system, content to be associated with a fingerprint (King teaches of capturing or scanning is the process of systematic examination to obtain information from a rendered document, capturing information and presenting content associated with the captured information or other supplemental information (speech patterns, fingerprints, etc.) as King teaches in par.19, 43 and 95); determining, by the first information handling system, the fingerprint of the content (King teaches that system uploads the text to an index of content associated with the newspaper, and identifies and retrieves an electronic counterpart for the article. The capture device then displays the electronic counterpart via an associated touch screen along with one or more actions to perform as King teaches in par.54 and 55); receiving, by the first information handling system, a system context of the first information handling system (King teaches that n order from capture device 216. As an example, an order can include an identifier (such as a serial number of the capture device 216 or an identifier that partially or uniquely identifies the user of the capture device), capture context information (e.g., time of capture, location of capture, etc.) and/or captured information (such as a text string) that is used to uniquely identify the source from which data is being captured as King teaches in par.64); and sending, by the first information handling system to a second information handling system (King teaches that system may use resources external to a rendered document to recognize text within the rendered document, such as knowledge pertaining to the approximate number of glyphs within a word, dictionaries (e.g., word frequency dictionaries), grammar and punctuation rules, probabilities of finding particular word-grams and character-grams within a corpus, regular expressions for matching various strings, such as email addresses, URL, and so on. Furthermore, the system may use resources such as DNS servers, address books, and phone books to verify recognized text, such as URLS, emails addresses, and telephone numbers as King teaches in par.280). King fails to teach that semantic cryptographic fingerprint, determining, by the first information handling system, a hash of the semantic cryptographic fingerprint and the system context; and the hash with an indicator associating the content from which the hash was determined from. Miller teaches that semantic cryptographic fingerprint (Miller teaches the fingerprinting function may be a cryptographic fingerprinting function which may employ pixel semantic data as Miller teaches in par.27 and 78), determining, by the first information handling system, a hash of the semantic cryptographic fingerprint and the system context (Miller teaches that he fingerprint of the document may be generated via a tamper resistant image hashing function or algorithm, such as but not limited to a perceptual hashing function, or “p-hash” of the document's contents. A tamper resistant image hashing function, such as a perceptual hash, may include a hashing algorithm or hash function that is relatively insensitive to certain types of edits or updates to particular features of a document, while being significantly sensitive to other types of edits or alterations to the features of the document. For example, in embodiments where the document is a digital image, a p-hash value of at least a portion of the image (e.g., a portion that includes a visualization of a subject, such as a model) may be generated as Miller teaches in par.29 and 72); and the hash with an indicator associating the content from which the hash was determined from (Miller teaches that each time a document is accessed, modified, and/or saved, among other things that could change a document or metadata associated therewith, a fingerprint indicating the state of the document (e.g., a cryptographic hash of at least a portion of the document's contents) and/or an edit history of the document can be generated and stored within a block (or record) written to a distributed ledger, such as a blockchain as Miller teaches in par.3, 22, 30 and 39). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include semantic cryptographic fingerprint as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claims 2, and 11, King, as modified by Miller, further teaches wherein the first sensor may comprise a camera, a microphone, or another measuring device (King teaches in par.43). For claims 3, and 12, King, as modified by Miller, fails to teach wherein the content is signed with a private key of the first sensor. Millter further teaches that wherein the content is signed with a private key of the first sensor (Miller teaches transaction may be signed via a private key of the computing device as Miller teaches in par.110). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include a private key of the first sensor as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claims 4, and 13, King, as modified by Miller, fails to teach wherein the semantic cryptographic fingerprint is nonreversible. Millter further teaches that wherein the semantic cryptographic fingerprint is nonreversible (Miller teaches cryptographic fingerprint is , a cryptographic hash and/or hash value) and cryptographic fingerprint hashes (such as SHA-256 or SHA-3) are designed to be one-way functions and are not reversible as Miller teaches in par.22). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include cryptographic fingerprint is nonreversible as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claims 5, 14 and 20, King, as modified by Miller, further teaches wherein the first information handling system create the fingerprint before storing the fingerprint with the content in a user-accessible region of memory (King, par.55). King fails to teach that semantic cryptographic fingerprint. Miller teaches that semantic cryptographic fingerprint (Miller teaches the fingerprinting function may be a cryptographic fingerprinting function which may employ pixel semantic data as Miller teaches in par.27 and 78). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include semantic cryptographic fingerprint as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claims 6, and 15, King, as modified by Miller, fails to teach wherein a fingerprint algorithm comprises applying a series of statistical modeling processes to create the semantic cryptographic fingerprint. Miller further teaches that wherein a fingerprint algorithm comprises applying a series of statistical modeling processes to create the semantic cryptographic fingerprint (Miller par.22, 27 and 78). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include semantic cryptographic fingerprint as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claims 7, and 16, King, as modified by Miller, further teaches wherein the system context comprises a sensor measurement date, timing, a geolocation coordinate, metadata (King, par.33 and 93). However, King fails to teaches private key of the first sensor. Miller further teaches that system context comprises a sensor measurement date, timing, a geolocation coordinate, metadata (Miller par.42 and 72). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include private key as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claims 8, and 17, King, as modified by Miller, fails to teach wherein the hash, associated with a private key, is uploaded to a public database with an associated public key. Miller further teaches that wherein the hash, associated with a private key, is uploaded to a public database with an associated public key (Miller, par.41). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include private key as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claims 9, and 18, King, as modified by Miller, fails to teach wherein the first or a third information handling system, sends an instruction to an application present on the first or third information handling system that limits access to the content to a set of users based on the hash of the content. Miller further teaches that wherein the first or a third information handling system, sends an instruction to an application present on the first or third information handling system that limits access to the content to a set of users based on the hash of the content (Miller, par.41). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include the hash of the content as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claim 10, King teaches that An information handling system (abstract) comprising: a processor; a memory; wherein the processor is configured to perform (King, par.77) steps comprising: receiving, from a first sensor of a first information handling system, content to be associated with a fingerprint (King teaches of capturing or scanning is the process of systematic examination to obtain information from a rendered document, capturing information and presenting content associated with the captured information or other supplemental information (speech patterns, fingerprints, etc.) as King teaches in par.19, 43 and 95); determining, by the first information handling system, the fingerprint of the content (King teaches that system uploads the text to an index of content associated with the newspaper, and identifies and retrieves an electronic counterpart for the article. The capture device then displays the electronic counterpart via an associated touch screen along with one or more actions to perform as King teaches in par.54 and 55); receiving, by the first information handling system, a system context of the first information handling system (King teaches that n order from capture device 216. As an example, an order can include an identifier (such as a serial number of the capture device 216 or an identifier that partially or uniquely identifies the user of the capture device), capture context information (e.g., time of capture, location of capture, etc.) and/or captured information (such as a text string) that is used to uniquely identify the source from which data is being captured as King teaches in par.64); and sending, by the first information handling system to a second information handling system (King teaches that system may use resources external to a rendered document to recognize text within the rendered document, such as knowledge pertaining to the approximate number of glyphs within a word, dictionaries (e.g., word frequency dictionaries), grammar and punctuation rules, probabilities of finding particular word-grams and character-grams within a corpus, regular expressions for matching various strings, such as email addresses, URL, and so on. Furthermore, the system may use resources such as DNS servers, address books, and phone books to verify recognized text, such as URLS, emails addresses, and telephone numbers as King teaches in par.280). King fails to teach that semantic cryptographic fingerprint, determining, by the first information handling system, a hash of the semantic cryptographic fingerprint and the system context; and the hash with an indicator associating the content from which the hash was determined from. Miller teaches that semantic cryptographic fingerprint (Miller teaches the fingerprinting function may be a cryptographic fingerprinting function which may employ pixel semantic data as Miller teaches in par.27 and 78), determining, by the first information handling system, a hash of the semantic cryptographic fingerprint and the system context (Miller teaches that he fingerprint of the document may be generated via a tamper resistant image hashing function or algorithm, such as but not limited to a perceptual hashing function, or “p-hash” of the document's contents. A tamper resistant image hashing function, such as a perceptual hash, may include a hashing algorithm or hash function that is relatively insensitive to certain types of edits or updates to particular features of a document, while being significantly sensitive to other types of edits or alterations to the features of the document. For example, in embodiments where the document is a digital image, a p-hash value of at least a portion of the image (e.g., a portion that includes a visualization of a subject, such as a model) may be generated as Miller teaches in par.29 and 72); and the hash with an indicator associating the content from which the hash was determined from (Miller teaches that each time a document is accessed, modified, and/or saved, among other things that could change a document or metadata associated therewith, a fingerprint indicating the state of the document (e.g., a cryptographic hash of at least a portion of the document's contents) and/or an edit history of the document can be generated and stored within a block (or record) written to a distributed ledger, such as a blockchain as Miller teaches in par.3, 22, 30 and 39). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include semantic cryptographic fingerprint as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). For claim 19, King teaches that computer program product (par.62) comprising: a non-transitory computer readable medium comprising instructions for causing an information handling system to perform steps (par.62) comprising: receiving, from a first sensor of a first information handling system, content to be associated with a fingerprint (King teaches of capturing or scanning is the process of systematic examination to obtain information from a rendered document, capturing information and presenting content associated with the captured information or other supplemental information (speech patterns, fingerprints, etc.) as King teaches in par.19, 43 and 95); determining, by the first information handling system, the fingerprint of the content (King teaches that system uploads the text to an index of content associated with the newspaper, and identifies and retrieves an electronic counterpart for the article. The capture device then displays the electronic counterpart via an associated touch screen along with one or more actions to perform as King teaches in par.54 and 55); receiving, by the first information handling system, a system context of the first information handling system (King teaches that n order from capture device 216. As an example, an order can include an identifier (such as a serial number of the capture device 216 or an identifier that partially or uniquely identifies the user of the capture device), capture context information (e.g., time of capture, location of capture, etc.) and/or captured information (such as a text string) that is used to uniquely identify the source from which data is being captured as King teaches in par.64); and sending, by the first information handling system to a second information handling system (King teaches that system may use resources external to a rendered document to recognize text within the rendered document, such as knowledge pertaining to the approximate number of glyphs within a word, dictionaries (e.g., word frequency dictionaries), grammar and punctuation rules, probabilities of finding particular word-grams and character-grams within a corpus, regular expressions for matching various strings, such as email addresses, URL, and so on. Furthermore, the system may use resources such as DNS servers, address books, and phone books to verify recognized text, such as URLS, emails addresses, and telephone numbers as King teaches in par.280). King fails to teach that semantic cryptographic fingerprint, determining, by the first information handling system, a hash of the semantic cryptographic fingerprint and the system context; and the hash with an indicator associating the content from which the hash was determined from. Miller teaches that semantic cryptographic fingerprint (Miller teaches the fingerprinting function may be a cryptographic fingerprinting function which may employ pixel semantic data as Miller teaches in par.27 and 78), determining, by the first information handling system, a hash of the semantic cryptographic fingerprint and the system context (Miller teaches that he fingerprint of the document may be generated via a tamper resistant image hashing function or algorithm, such as but not limited to a perceptual hashing function, or “p-hash” of the document's contents. A tamper resistant image hashing function, such as a perceptual hash, may include a hashing algorithm or hash function that is relatively insensitive to certain types of edits or updates to particular features of a document, while being significantly sensitive to other types of edits or alterations to the features of the document. For example, in embodiments where the document is a digital image, a p-hash value of at least a portion of the image (e.g., a portion that includes a visualization of a subject, such as a model) may be generated as Miller teaches in par.29 and 72); and the hash with an indicator associating the content from which the hash was determined from (Miller teaches that each time a document is accessed, modified, and/or saved, among other things that could change a document or metadata associated therewith, a fingerprint indicating the state of the document (e.g., a cryptographic hash of at least a portion of the document's contents) and/or an edit history of the document can be generated and stored within a block (or record) written to a distributed ledger, such as a blockchain as Miller teaches in par.3, 22, 30 and 39). It would have been obvious to one ordinary skill in the art before effective filling date to modify King to include semantic cryptographic fingerprint as taught and suggested by Miller for the purpose of providing assurances that any particular copy and/or version of the document has either maintained its original state, or has been modified within acceptable boundaries, among other things (Miller, par.4). Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Any inquiry concerning this communication or earlier communications from the examiner should be directed to AYUB A MAYE whose telephone number is (571)270-5037. The examiner can normally be reached Monday-Friday 9AM-5PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, SHEWAYE GELAGAY can be reached at 571-272-4219. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /AYUB A MAYE/Examiner, Art Unit 2436 /SHEWAYE GELAGAY/Supervisory Patent Examiner, Art Unit 2436
Read full office action

Prosecution Timeline

Jan 26, 2024
Application Filed
Mar 16, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12574211
PERSONAL PRIVATE KEY ENCRYPTION DEVICE
2y 5m to grant Granted Mar 10, 2026
Patent 12574247
DEVICE FOR COMPUTING SOLUTIONS OF LINEAR SYSTEMS AND ITS APPLICATION TO DIGITAL SIGNATURE GENERATIONS
2y 5m to grant Granted Mar 10, 2026
Patent 12547740
INFORMATION PROCESSING DEVICES AND INFORMATION PROCESSING METHODS
2y 5m to grant Granted Feb 10, 2026
Patent 12526274
Geolocated Portable Authenticator for Transparent and Enhanced Information-Security Authentication of Users
2y 5m to grant Granted Jan 13, 2026
Patent 12373573
Vulnerability Processing Method, Apparatus and Device, and Computer-readable Storage Medium
2y 5m to grant Granted Jul 29, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
58%
Grant Probability
99%
With Interview (+41.6%)
5y 2m
Median Time to Grant
Low
PTA Risk
Based on 652 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month