Prosecution Insights
Last updated: April 19, 2026
Application No. 18/481,024

DOUBLE BLIND SECRET

Non-Final OA §103
Filed
Oct 04, 2023
Examiner
MACILWINEN, JOHN MOORE JAIN
Art Unit
2454
Tech Center
2400 — Computer Networks
Assignee
Wells Fargo Bank N A
OA Round
3 (Non-Final)
68%
Grant Probability
Favorable
3-4
OA Rounds
3y 9m
To Grant
95%
With Interview

Examiner Intelligence

Grants 68% — above average
68%
Career Allow Rate
457 granted / 676 resolved
+9.6% vs TC avg
Strong +28% interview lift
Without
With
+27.6%
Interview Lift
resolved cases with interview
Typical timeline
3y 9m
Avg Prosecution
33 currently pending
Career history
709
Total Applications
across all art units

Statute-Specific Performance

§101
8.7%
-31.3% vs TC avg
§103
53.0%
+13.0% vs TC avg
§102
11.6%
-28.4% vs TC avg
§112
18.8%
-21.2% vs TC avg
Black line = Tech Center average estimate • Based on career data from 676 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION Response to Arguments Applicant's arguments filed 12/2/2025 have been fully considered, and are persuasive. However, after further search and consideration, a new grounds of rejection has been made in view of Vandanapu (US-11550949-B2). Vandanapu suggests transmission of a string to a repository to request data that matches or partially matches the string, where the requested data is utilized in a comparison (e.g., a determination to check if an archive of compromised password data contains a match or partial match to a particular user password, as discussed in Vandanapu’s col. 2 line 27 – col. 3 lines 25). Vandanapu suggest this process in order to help prevent further exposure of potentially sensitive user data while also ensuring exposed authentication/password data is flagged and alerts are provided to the appropriate parties (Vandanapu; col. 1 lines 37-47 and col. 3 lines 10 –25 and 22-25). Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1, 4, 8, 9, 11, 14, 18, and 19 are rejected under 35 U.S.C. 103 as being unpatentable over brassbound (brassbound. "Trying to use regex to match a string that has a substring1 but not substring 2". https://www.reddit.com/r/PowerShell/comments/9bm5vb/ trying_to_use_regex_to_match_a_string_that_has_a/?rdt=36818. (Year: 2018)) in view of Vandanapu (US-11550949-B2) and Khasanova (US-20220294757-A1). Regarding claim 1, brassbound shows a method comprising: receiving, at a processor (implicit in the execution of the text processing / regex utilization discussed), text data including a string (pg. 1 lines 9-13 and 28); determining whether the text data includes potentially hashed information (pg. 1 lines 11-16, line 28, and lines 44-46, see the discussion regarding to “pull out all the MD5 patterns”); in response to determining, that the string includes potentially hashed information, comparing the string (pg. 1 lines 11-28 and lines 44-63 discussing comparisons to check for a particular type of hash) outputting from the processor, in response to determining that the string corresponds, an indication (pg. 1 lines 44-62). brassbound does not show: sending the string to a repository to request data that matches or partially matches the string; comparing the string to hashed strings in the requested data; determining, from the comparison, whether the string corresponds to a stored hashed string of the repository; and outputting from the processor, in response from having determined that the string corresponds to the stored hashed string, an indication that the stored hashed string is in the text data. Vandanapu shows: sending the string to a repository to request data that matches or partially matches the string (col. 2 lines 49-65); comparing the string to hashed strings in the requested data (col. 2 lines 52-53 and 57-60); determining, from the comparison, whether the string corresponds to a stored hashed string of the repository (col. 2 lines 60-63); and outputting from the processor, in response from having determined that the string corresponds to the stored hashed string, an indication that the stored hashed string is in the text data (col. 2 lines 62-63, col. 3 lines 7-14). It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the text comparison and hash-aware matching of brassbound with the data analysis and comparison techniques of Vandanapu in order to avoid exposing the processed and compared information, thus better protecting potentially sensitive details. The above combination does not show: determination using a machine learning trained model, the model trained using training data including labels indicating whether respective portions of the training data include hashed strings or non-hashed strings. Khasanova suggests determination using a machine learning trained model ([35, 46]), the model trained using training data including labels indicating whether respective portions of the training data include hashed strings or non-hashed strings ([42], which suggests training using labelled known hashed and labelled known non-hashed tokens in order to create a model that can itself label tokens as hashed or non-hashed). It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the text comparison and matching of the above combination with the input labeling of Khasanova in order to automate the process of detecting particular types of data, and how it is detected, via utilizing ML (and thus further improve the efficiency of the resultant disclosure, as well as the types of data is can detect) via use of Khasanova’s prior art ML techniques ([42,63-68]). Regarding claim 4, the above combination shows wherein comparing the string to the repository of hashed strings (Vandanapu, Figs. 1, 2, and 4), includes using an edit distance, a hamming distance, a Locality Sensitive Hash, or a Bloom Filter (Vandanapu, Figs. 3 and 4) Regarding claim 8, the above combination further shows wherein the text data includes at least one of an API key, a password, a PIN, a passphase, a credit card number, a bank account number, or personal health information (Vandanapu, col. 2 lines 27-32 and Fig. 2). Regarding claim 9, the above combination further shows wherein the repository is an active directory, a hashed password database, or an internet password repository (Vandanapu, Fig. 1 item 110, col. 1 lines 20-32, col. 2 lines 27-37). Regarding claim 11, the limitations of said claim are addressed in the analysis of claim 1. Regarding claim 14, the limitations of said claim are addressed in the analysis of claim 4. Regarding claim 18, the limitations of said claim are addressed in the analysis of claim 8. Regarding claim 19, the limitations of said claim are addressed in the analysis of claim 9. Claims 2 and 12 are rejected under 35 U.S.C. 103 as being unpatentable over brassbound in view of Vandanapu and Khasanova, as applied to claim 1 above, further in view of Thomas (Thomas, Kurt, et al. "Data breaches, phishing, or malware? Understanding the risks of stolen credentials." Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. (Year: 2017)). Regarding claim 2, the above combination shows wherein receiving the text data includes extracting the text data (brassbound, pg. 1 lines 44-62). The above combination does not show: from monitored emails or traffic over a network. Thomas shows: from monitored emails or traffic over a network (pg. 5 L48-L50, R26-R60, pg. 6 L43-L45). It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the above combination in order to improve the detection capabilities of the resultant disclosure and the types of data sets that can be analyzed. Regarding claim 12, the limitations of said claim are addressed in the analysis of claim 2. Claims 3 and 13 are rejected under 35 U.S.C. 103 as being unpatentable over brassbound in view of Vandanapu, Khasanova, and Thomas, as applied to claim 2 above, further in view of Jakobsson (US-20210234870-A1). Regarding claim 3, the above combination shows detecting an email corresponding to the extracted text data based on an identified hashed password corresponding to the string (Thomas, Sections 3.2 and 3.3). The above combination does not show blocking the email. Jakobsson shows blocking ([28]) It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the above combination with the blocking action of Jakobsson in order to prevent the dissemination of shared passwords, further improving the overall security posture of the monitored system. Regarding claim 13, the limitations of said claim are addressed in the analysis of claim 3. Claims 5 and 15 are rejected under 35 U.S.C. 103 as being unpatentable over brassbound in view of Vandanapu and Khasanova, as applied to claim 1 above, further in view of Krylov (Krylov et al. English translation of CN 109583201 B. August (Year: 2023)). Regarding claim 5, the above combination shows comparing the string to the repository of hashed strings (Vandanapu, Figs. 1, 2, and 4). The above combination does not show using a bit-wise comparison. Krylov shows using a bit-wise comparison (pg. 6 lines 1 – 10). It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the above combination with the comparison techniques of Krylov in order to utilize prior art mechanisms for detecting the differences between data items for the intended purpose, and thus better understand the data compared in the above combination. Regarding claim 15, the limitations of said claim are addressed in the analysis of claim 5. Claims 6 and 16 are rejected under 35 U.S.C. 103 as being unpatentable over brassbound in view of Vandanapu and Khasanova, as applied to claim 1 above, further in view of Mahone (US-20050243984-A1). Regarding claim 6, the above combination shows claim 1. The above combination does not show disabling a password corresponding to the string. Mahone shows disabling a password corresponding to the string ([42]). It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the above combination with the password management of Mahone in order to prevent use of compromised passwords, improving the security posture of the monitored network. Regarding claim 16, the limitations of said claim are addressed in the analysis of claim 6. Claims 7 and 17 are rejected under 35 U.S.C. 103 as being unpatentable over brassbound in view of Vandanapu and Khasanova, as applied to claim 1 above, further in view of Laine (US-20180198601-A1). Regarding claim 7, the above combination shows the string and the stored hash string (Vandanapu, Fig. 1, item 110 and Figs. 2, and 4). The above combination does not show where the string is encrypted. Laine shows where the string is encrypted (Abstract). It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the above combination with the encrypted data management of Laine in order to facilitate additional comparisons and thus a broader range of managed and monitored data. Regarding claim 17, the limitations of said claim are addressed in the analysis of claim 7. Claims 10 and 20 are rejected under 35 U.S.C. 103 as being unpatentable over brassbound in view of Vandanapu and Khasanova, as applied to claim 1 above, further in view of Low (US-8966645-B2). Regarding claim 10, the above combination shows claim 1, including the string and the stored hash string (Vandanapu, Fig. 1, item 110 and Figs. 2, and 4). The above combination does not show before comparing, filtering the text data based on a set of password requirements. Low shows before comparing, filtering the text data based on a set of password requirements (col. 14 lines 10-20). It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the above combination with the comparison pre-processing of Low in order to improve the operational efficiency of the resultant invention. Regarding claim 20, the limitations of said claim are addressed in the analysis of claim 10. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. This includes: Yedidi (US-9961053-B2). Any inquiry concerning this communication or earlier communications from the examiner should be directed to JOHN M MACILWINEN whose telephone number is (571)272-9686. The examiner can normally be reached Monday - Friday, 9:00 - 5:00. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Glenton B Burgess can be reached at (571) 272 - 3949. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. JOHN MACILWINEN Primary Examiner Art Unit 2442 /JOHN M MACILWINEN/Primary Examiner, Art Unit 2454
Read full office action

Prosecution Timeline

Oct 04, 2023
Application Filed
May 09, 2025
Non-Final Rejection — §103
Aug 19, 2025
Response Filed
Sep 11, 2025
Final Rejection — §103
Oct 30, 2025
Interview Requested
Nov 05, 2025
Applicant Interview (Telephonic)
Nov 05, 2025
Examiner Interview Summary
Dec 02, 2025
Request for Continued Examination
Dec 16, 2025
Response after Non-Final Action
Jan 06, 2026
Non-Final Rejection — §103
Apr 08, 2026
Applicant Interview (Telephonic)
Apr 08, 2026
Examiner Interview Summary

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603840
Secure Virtual Private Mobile and IP Network in Cloud
2y 5m to grant Granted Apr 14, 2026
Patent 12598183
CREATING GRAPHICAL MODELS OF NETWORK SECURITY POLICIES AND DISPLAYING ON A NETWORK TOPOLOGY GRAPH
2y 5m to grant Granted Apr 07, 2026
Patent 12596851
INFORMATION PROCESSING DEVICE
2y 5m to grant Granted Apr 07, 2026
Patent 12587578
SYSTEMS AND METHODS FOR PROVIDING REAL-TIME STREAMING DATA PROCESSING AT EDGE SERVERS
2y 5m to grant Granted Mar 24, 2026
Patent 12580882
ELECTRONIC MESSAGING COMMUNICATION DELIVERY METHOD
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
68%
Grant Probability
95%
With Interview (+27.6%)
3y 9m
Median Time to Grant
High
PTA Risk
Based on 676 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month