Prosecution Insights
Last updated: April 19, 2026
Application No. 18/496,158

SYSTEMS AND METHODS FOR AUTONOMOUSLY GENERATING AND MAINTAINING NON-FUNGIBLE TOKENS FOR REAL-TIME SUBJECT ASSESSMENT

Non-Final OA §101§103
Filed
Oct 27, 2023
Examiner
TRAN, HAI
Art Unit
3695
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
State Farm Mutual Automobile Insurance Company
OA Round
3 (Non-Final)
62%
Grant Probability
Moderate
3-4
OA Rounds
3y 9m
To Grant
94%
With Interview

Examiner Intelligence

Grants 62% of resolved cases
62%
Career Allow Rate
444 granted / 721 resolved
+9.6% vs TC avg
Strong +32% interview lift
Without
With
+32.4%
Interview Lift
resolved cases with interview
Typical timeline
3y 9m
Avg Prosecution
29 currently pending
Career history
750
Total Applications
across all art units

Statute-Specific Performance

§101
35.0%
-5.0% vs TC avg
§103
24.2%
-15.8% vs TC avg
§102
12.6%
-27.4% vs TC avg
§112
17.2%
-22.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 721 resolved cases

Office Action

§101 §103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on November 19, 2025 has been entered. This is the Non-Final Office Action in response to the Amendment filed on November 19, 2025 for Application No. 18/496,158 filed on October 27, 2023 title: “Systems And Methods For Autonomous Generating And Maintaining Non-Fungible Token For Real-Time Subject Assessment”. Status of the Claims Claims 1-3 and 5-21 were pending. By the 11/19/2025 Response, claims 1, 3, 16, and 17 have been amended, no claim has been cancelled, and no new claim has been added. Accordingly, claims 1-3 and 5-21 are pending in this application and have been examined. Priority This Application was filed on 10/27/2023 and has US Provisional Applications No. 63/589,785 filed on 10/12/2023 and 63/421,723 filed on 11/02/2022. For the purpose of examination, the 11/02/2022 is considered to be the effective filing date. Information Disclosure Statement The information disclosure statement (IDS) submitted on 11/19/2025 is in compliance with the provisions of 37 CFR 1.97. Accordingly, the IDS is being considered by the examiner. A copy of the USPTO-1449 form with the examiner’s initials is enclosed to this Office Action. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-3 and 5-21 are rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea without significantly more. Step 1: Under the Step 1 analysis, the claims are reviewed to determine whether they fall within the four statutory categories of patentable subject matter (i.e., process, machine, manufacture, or combination of matter). Claims 1-3 and 5-15 recite a computer system for autonomously generating and maintaining secure storage for real-time subject assessment comprising processors and memory devices. Claims 16-20 recite a computer-implemented method for autonomously generating and maintaining secure storage for real-time subject assessment comprising a series of steps. Therefore, the claims are directed to a machine and process which fall within the four statutory categories of invention (Step 1-Yes, the claims are statutory). Step 2A, Prong 1: Under the Step 2A, Prong 1 analysis, the claims are reviewed to determine whether they recite a judicial exception by identifying if the claim limitations fall in one of the enumerated abstract idea groupings (i.e., organizing human activity, mathematical concepts, and mental processes) that amount to a judicial exception to patentability. Claim 16, A computer-implemented method for autonomously generating and maintaining secure storage for real-time subject assessment, the method implemented by a computer system including one or more processors and/or associated transceivers and at least one memory device, the method comprising: (a) accessing, from one or more source locations via one or more processors and/or associated transceivers, a plurality of data associated with a subject history of a subject; (b) inputting, via the one or more processors, the plurality of data to a trained model to receive an initial subject assessment as output from the trained model; (c) generating, via the one or more processors, a container file to include a plurality to the one or more source of the plurality of data; (d) generating, via the one or more processors, a non-fungible token (NFT) for the subject, the NFT including the initial subject assessment, to secure the initial subject assessment; (e) securely storing, via the one or more processors, the NFT via the container file to restrict access to the NFT and the container file to authorized entities; (f) retrieving, in response to an assessment control and via the one or more processors, the NFT and the container file; (g) parsing, via the one or more processors, the container file to retrieve the pointer to the one or more source locations of the plurality of data to access the plurality of data; (h) using the pointer, accessing, from at least the one or more source locations and via the one or more processors, updated data associated with the subject; (i) re-executing, via the one or more processors, the trained model with the updated data; (j) receiving, via the one or more processors, an updated subject assessment as output from the trained model; (k) detecting, via the one or more processors, the updated subject assessment is different from the initial subject assessment; and (l) in response to the detecting, via the one or more processors, updating the NFT to include the updated subject assessment. The limitations (a), (e), (f), (g), (h), (j), and (l) are merely data accessing, gathering, storing, parsing, and updating at a high level of generality, and thus they are insignificant extra-solution activity See MPEP 2106.05(g). These limitations do not impose any meaningful limits on the claim. These limitations are necessary to data accessing, gathering, storing, parsing, and updating. Also, the additional elements, such as a computer system including processors and memory devices to perform the limitations, the recited computer elements are recited at a high level of generality (see claims 1-3 and 5-15). The additional elements merely limit and confine the abstract idea to a particular technological environment (a computer system comprising processors, memory devices, and transceivers) and does not integrate the abstract idea into a practical application or add an inventive concept to the claim. See MPEP 2106.05(h). The limitations (b), (c), (d), (i), and (k) are the steps for processing the received data and inputting the data to a trained model to receive an initial subject assessment as output from the trained model to generate a container file and a non-fungible token (NFT) for the subject, re-executing the trained model with the updated data to receive an updated subject assessment as output from the trained model, and detecting the updated subject assessment is different from the initial subject assessment. These limitations correspond to concepts of methods of organizing human activity, related to fundamental economic practice (i.e., hedging, insurance, mitigating risk - see the method Claims 16-21: “accessing data associated with a subject history of a subject” (claim 16), “accessing object assessments for objects associated with the subject” (claim 17), “the subject is an object to be insured” (claim 18), “updated object data indicating ownership change of the object from a previous owner to a new owner” (claim 19), “the subject is an individual person” (claim 20), and “the updated data indicating acquisition of a new object by the person”) and commercial interaction (i.e., agreements in the form of contract; legal obligations; advertising, marketing or sales activities or behaviors; business relations) The above limitations, as drafted, is a process that, under its broadest reasonable interpretation, covers a method of organizing human activity but for the recitation of generic computer components (e.g., a computer system comprising processors, memory devices, NFT, and transceivers). More specifically, the claim recites fundamental economic principles or practices and/or commercial or legal interactions including generating and maintaining secure storage for real-time subject assessment by inputting the received/generated data to a trained model to receive an initial subject assessment, re-executing the trained model with the received updated data to receive an updated subject assessment, detecting the difference between the initial subject assessment and updated subject assessment, and updating the NFT to include the updated subject assessment accordingly. Thus, the claim recites a method for generating and maintaining secure storage for real-time subject assessment (inputting the received/generated data to a trained model to receive an initial subject assessment, re-executing the trained model with the received updated data to receive an updated subject assessment, detecting difference between the assessments, and updating the container file), which is a fundamental economic practice (i.e., hedging, insurance, mitigating risk) and commercial interaction (i.e., agreements in the form of contracts; legal obligations; advertising, marketing or sales activities or behaviors; business relations) and falls under the abstract idea of “Certain Methods of Organizing Human Activity” grouping. See MPEP 2106.04(a)(2)III.C.2. If a claim limitation, under its broadest reasonable interpretation, covers performance of a fundamental economic practice or commercial interaction, then it falls within the “Certain Methods of Organizing Human Activity” grouping of abstract ideas. Accordingly, Claim 16 recites an abstract idea. Claim 1 recites a computer system comprising processors and memory devices with the same elements and limitations as discussed in Claim 16. The computer system, memories, and transceivers all are recited at a high level of generality. The mere nominal recitation of computer components (such as a computer system comprising processors, memory devices, and transceivers) limits the abstract idea to a particular technological environment but does not take the claim out of the methods of organizing human activity grouping. Therefore, Claim 1 also recites the abstract idea (Step 2A, Prong 1-Yes, the claims recite an abstract idea). Step 2A, Prong 2: Under the Step 2A, Prong 2 analysis, the claims are reviewed to determine whether the judicial exception (i.e., abstract idea) is integrated into a practical application. In order to make this determination, the additional element(s), or combination of elements, are analyzed to determine if the claim as a whole integrates the recited judicial exception into a practical application of that exception. A claim that integrates a judicial exception into a practical application will apply, rely on, or use the judicial exception in a manner that imposes a meaningful limit on the judicial exception, such that the claim is more than a drafting effort designed to monopolize the judicial exception. The claims (1 and 16) recite the additional computer elements including the processors, memory, and transceivers with stored instructions to perform the accessing, inputting, inputting, generating, generating, storing, retrieving, parsing, accessing, re-executing, receiving, detecting, and updating steps. The recited additional elements in all steps are recited at a high level of generality and the limitations are done by the generically recited computer system (see Application Publication No. 2024/0146532, paragraphs 97-107 and Figures 4-5). The additional elements limit and confine the abstract idea to a particular technological environment and do not integrate the abstract idea into a practical application or add an inventive concept to the claims. The limitations are merely instructions to implement the abstract idea on a computer and require no than a generic computer to perform the generic computer functions including the steps of accessing, inputting, inputting, generating, generating, storing, retrieving, parsing, accessing, re-executing, receiving, detecting, and updating. The judicial exception is not integrated into a practical application. In particular, the claims do not include additional elements that are sufficient to amount to significantly more than the judicial exception. The additional elements or combination of elements in the claims other than the abstract idea per se amounts to no more than: (i) mere instructions to implement the idea on a computer, and/or (ii) recitation of generic computer structure that serves to perform generic computer functions that are well-understood, routine, and conventional activities previously known to the pertinent industry. Viewed as a whole, these additional claim elements do not provide meaningful limitations to transform the abstract idea into a patent eligible application of the abstract idea such that the claims amount to significantly more than the abstract idea itself. Mere instructions to apply an exception “i.e. apply it” using a generic computer component cannot provide an inventive concept. Accordingly, the claims do not include additional elements that integrate the judicial exception into a practical application because they do not impose any meaningful limits on practicing the abstract idea. Therefore, the claims are directed to an abstract idea (Step 2A, Prong 2-No, the claims are not integrated into a practical application). Step 2B: Under the Step 2B analysis, the claims are reviewed to determine whether the claims provide an inventive concept (i.e., whether the claim(s) include additional elements, or combinations of elements, that are sufficient to amount to significantly more than the judicial exception (i.e., abstract idea)). As noted in above, the claims as a whole merely describe how to generally “apply” the concept of generating and maintaining secure storage for real-time subject assessment by inputting the received/generated data to a trained model to receive an initial subject assessment, re-executing the trained model with the received updated data to receive an updated subject assessment, detecting difference between the initial subject assessment and the updated subject assessment, and updating the NFT to include the updated subject assessment. All these generic computer functions are well-understood, routine, and conventional activities previously known to the industry similar to those referenced by MPEP 2106.05(d) II. Independent Claims 1 and 16 do not include additional elements, considered both individually and as an ordered combination, that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea into a practical application, the additional elements of using a computer (a computer system comprising processors, memory devices, and transceivers) to perform the receiving, generating, generating, storing, retrieving, inputting, receiving, re-executing, receiving, detecting, and updating functions as claimed amounts to no more than mere instructions to apply the exception using a generic computer component. Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. Therefore, the independent claims are not patent eligible. Dependent Claims 2-3, 5-15, and 17-21 depend on Claims 1 and 16 and thus include all of the limitations and features of their independent Claims 1 and 16. Therefore, the dependent claims also recite the same abstract idea as discussed in Claims 1 and 16. Claim 2 includes additional elements “wherein the plurality of data includes historical reference data associated with the subject and sensor data captured by one or more sensors associated with the subject.” (Additional details for the plurality of data. This claim individually or in combination with others do not integrate the claims into a practical application and does not provide an inventive concept). Claims 3 and 17 include additional elements “wherein the at least one processor is further programmed to: access a plurality of object assessments for a respective plurality of objects associated with the subject; aggregate the plurality of object assessments to generate a supertoken associated with the subject; and update the NFT to include the supertoken.” (Additional instructions for accessing and aggregating the object assessments to generate a supertoken and updating the NFT. These claims individually or in combination with others do not integrate the claims into a practical application and do not provide an inventive concept). Moreover, although the preamble of claim 17 recites “The computer-implemented method …”, the steps of “accessing …”, “aggregating …”, ang “updating …” in the body are devoid of any reference to any computer or machine. The method steps in the claim are not clearly recited as being performed by a computer or device and per the claim scope can be performed by a person with paper and pencil. Thus, under the broadest reasonable interpretation, the claim also recites a Mental Process (i.e., concepts performed in the human mind including an observation, evaluation, judgement, opinion). Claim 5 includes additional elements “wherein the subject is an object to be insured, and wherein the at least one processor is further programmed to apply the subject assessment to an insurance underwriting process to generate an insurance policy associated with the object.” (Additional details for the subject and the processor is programmed to apply the subject assessment to an insurance to generate an insurance policy. This claim individually or in combination with others do not integrate the claims into a practical application and do not provide an inventive concept). Claims 6-7 and 18 include additional elements “wherein the subject is an object to be insured, and wherein the subject assessment includes a reliability score related to a value of the object based upon previous usage of the object.” and “wherein the at least one processor is further programmed to receive the plurality of data corresponding to usage of the object by a plurality of persons.” (Additional details for the subject assessment includes a reliability score and the processor is programed receive the data corresponding to usage of the object by persons. These claims individually or in combination with others does not integrate the claims into a practical application and does not provide an inventive concept). Claims 8-9 and 19 include additional elements “wherein the at least one processor is further programmed to: receive updated object data associated with the object, the updated data indicating an ownership change of the object from a previous owner to a new owner; update the container file with at least one of the updated object data; and update the NFT based upon the updated container file.” and “wherein the at least one processor is further programmed to cause the trained model to apply a decay factor to data associated with the previous owner of the object in generating subsequent subject assessments of the object.” (Additional instructions and details for receiving updated data and update the container file and the NFT, the processor is programmed to cause the trained model to apply a decay factor. These claims individually or in combination with others do not integrate the claims into a practical application and do not provide an inventive concept). Moreover, although the preamble of claim 19 recites “The computer-implemented method …”, the steps of “receiving ...”, “updating …”, “updating …”, and “causing …” in the body are devoid of any reference to any computer or machine. The method steps in the claim are not clearly recited as being performed by a computer or device and per the claim scope can be performed by a person with paper and pencil. Thus, under the broadest reasonable interpretation, the claim also recites a Mental Process (i.e., concepts performed in the human mind including an observation, evaluation, judgement, opinion). Claim 10 includes additional elements “wherein the plurality of data includes sensor data received from sensors disposed within a user computing device operated by the subject.” (Additional details for the data includes sensor data. This claim individually or in combination with others does not integrate the claims into a practical application and does not provide an inventive concept). Claims 11-12 and 20 include additional elements “wherein the subject is an individual person, and wherein the subject assessment includes a quantitative assessment of one or more behaviors of the person.” and “wherein the at least one processor is further programmed to receive the plurality of data corresponding to the one or more behaviors of the person during usage of multiple objects by the person.” (Additional details for the subject assessment and the processor is programmed to receive the data corresponds to behaviors of the person during the usage of multiple objects by the person. These claims individually or in combination with others do not integrate the claims into a practical application and do not provide an inventive concept). Claim 13 includes additional elements “wherein the at least one processor is further programmed to: receive updated object data associated with the subject, the updated data indicating an acquisition of a new object by the person; update the container file with at least one of the updated data; and update the NFT based upon the updated container file.” (Additional instructions for the processor is programmed to receive updated data and update the container file and the NFT. This claim individually or in combination with others do not integrate the claims into a practical application and do not provide an inventive concept). Claim 14 includes additional elements “wherein the at least one processor is further programmed to input the updated object data into the trained model to generate a further updated subject assessment that incorporates data associated with the new object and usage thereof by the person.” (Additional instructions for the processor is programmed to input the updated data into the trained model to generate an updated subject assessment. This claim individually or in combination with others do not integrate the claims into a practical application and do not provide an inventive concept). Claim 15 includes additional elements “wherein the subject includes an object, and the plurality of data includes sensor data received from sensors disposed within the object.” (Additional details for the subject that includes an object and the data that includes sensor data. This claim individually or in combination with others do not integrate the claims into a practical application and do not provide an inventive concept). Claim 21 includes additional elements “further comprising: receiving updated object data associated with the subject, the updated data indicating an acquisition of a new object by the person; updating the container file with at least one of the updated object data; updating the NFT based upon the updated container file; and inputting the updated object data into the trained model to generate a further updated subject assessment that incorporates data associated with the new object and usage thereof by the person.” (Additional instructions for receiving updated object data, updating the container file and the NFT, and inputting the updated object data into the trained model to generate a further updated subject assessment. This claim individually or in combination with others do not integrate the claims into a practical application and do not provide an inventive concept). Moreover, although the preamble of claim 21 recites “The computer-implemented method …”, the steps of “receiving ...”, “updating …”, “updating …”, and “inputting …” in the body are devoid of any reference to any computer or machine. The method steps in the claim are not clearly recited as being performed by a computer or device and per the claim scope can be performed by a person with paper and pencil. Thus, under the broadest reasonable interpretation, the claim also recites a Mental Process (i.e., concepts performed in the human mind including an observation, evaluation, judgement, opinion). The dependent claims do no more than providing additional instructions and administrative requirements for the functional steps already recited in the independent claims. These additional recited limitations further narrow the scope of the abstract idea and are merely insignificant solution activities which only refine the abstract idea further and do not include additional elements that integrate the abstract idea into a practical application or provide significantly more than the abstract idea. Therefore, The dependent claims also are not patent eligible. The focus of the claims is on a method for generating and maintaining secure storage for real-time subject assessment. There is no improvement to the computer hardware, the functioning of the computer itself, or the technical process. The claims are not directed to a new type of processor, network, or system memory, nor do they provide a method of processing data that improves the existing technological processes. The focus of the claims is not on improving computer-related technology, but on an independently abstract idea that uses computers as tools. Accordingly, when viewed as a whole, the claims do no more than generally linking the use of the judicial exception to a particular technological environment or field of use. No inventive concept is found in the claims. Therefore, the claims do not add significantly more (i.e., an inventive concept) to the abstract idea (Step 2B-No, the claims are not significantly more). Response to Arguments Claim Rejections - 35 USC § 101 Applicant's arguments filed 11/19/2025 have been fully considered but they are not persuasive. Applicant’s Claims are not Directed to an Abstract Idea Prong One Per page 10 of the Remarks, Applicant cites the 08-04-2025 USPTO Memo (from Charles Kim, Deputy Commissioner for Patents) and argues that: “While certain dependent claims may relate to an object "to be insured," for example, there is no limitation of the pending claims that actually recites any aspect of "insurance" itself, nor of any "business relations." Although the present Specification may provide "insurance" as one example of the application of the claimed subject assessments, limitations from the Specification are not to be imported into the claims. Moreover, providing an example of "insurance" as a use case does not suggest that any claim limitations actually recite "insurance." Response: The Examiner respectfully disagrees. The Examiner has re-evaluated the current amended claims and still concluded that the pending claims recite an abstract idea. Applicant’s claims are directed to “a business solution” for “a business problem” for “insurance”, which is an abstract idea (a method of organizing human activity) and is supported by the Applicant’s claims (see the analysis in at least claims 16-21 in paragraphs 12-14 above) and the Specification in the Background section in paragraphs 3-4: [0003] There are many situations in which assessing and evaluating an object's history or a subject's history is useful or necessary. For example, when selling, purchasing, leasing, or insuring an object, it may be beneficial to have an accurate and complete history of the object, to improve any assessment or evaluation of that object. However, in many instances, an object's known history may be limited, and frequently out of date. In further instances, certain aspects of an object's history may be difficult to discern and/or monitor. As another example, when evaluating a subject's recorded vehicle usage history, such a history may not accurately reflect the subject's driving behavior. [0004] Accordingly, it would be useful to have a system for securely collecting, storing, and updating information relating to objects and subjects and providing access to that information as needed. The systems and methods disclosed herein may also provide solutions to the ineffectiveness, insecurities, difficulties, inefficiencies, encumbrances, and/or other drawbacks of conventional techniques. Therefore, Applicant’s arguments are not persuasive. Prong Two Per pages 11-12 of the Remarks, Applicant argues that the claims recite a specific improvement to the technical field of subject and/or object assessment that leverages NFT and blockchain technology to maintain up-to-date and secure (e.g., immutable) assessments. Response: The Examiner respectfully disagrees. Applicant’s claimed invention is merely using the existing technology (in this case, the NFT and blockchain technology) as a tool to implement the abstract idea and used in its ordinary capacity. The alleged improvement in the claimed process for generating and maintaining secure storage for real-time subject assessment does not concern an improvement to computer capabilities but instead relates to an alleged improvement in a business practice - generating and maintaining secure storage for real-time subject assessment in which a computer is used as a tool in its ordinary capacity. The claims do not identify any improvement to the functioning of a computer or any other technology. The claims recite steps (a), (e), (f), (g), (h), (j), and (l) are merely for data accessing, gathering, storing, parsing, updating, and are recited at a high level of generality, and thus are insignificant extra-solution activity See MPEP 2106.05(g). These limitations do not impose any meaningful limits on the claim. The claims further recite the steps (b), (c), (d), (i), and (k) are for processing the received data and inputting the data to a trained model to receive an initial subject assessment as output from the trained model to generate a container file and a non-fungible token (NFT) for the subject, re-executing the trained model with the updated data to receive an updated subject assessment as output from the trained model, and detecting the updated subject assessment is different from the initial subject assessment. The additional elements limit and confine the abstract idea to a particular technological environment but do not integrate the abstract idea into a practical application or add an inventive concept to the claims. The additional claim elements do not provide meaningful limitations to transform the abstract idea into a patent eligible application of the abstract idea such that the claims amount to significantly more than the abstract idea itself. Mere instructions to apply an exception “i.e. apply it” using a generic computer component cannot provide an inventive concept. Therefore, Applicant’s arguments are not persuasive. Applicant’s Claims are Directed to “Significantly More” than any Purported Abstract Idea Per pages 12-13 of the Remarks, Applicant argues that the pending claims are unconventional to generate objective subject assessments using subject histories, store such assessment securely in NFT-based container files, and perform conditional updates to reflect changes in subject assessments. Thus, the claims as a whole recite far more than well-understood, routine, and conventional activities. Response: The Examiner respectfully disagrees. As explained in the 101 analysis above, the claims as a whole merely describe how to generally “apply” the concept of generating and maintaining secure storage for real-time subject assessment by inputting the accessed data to a trained model to generate a container file and a NFT which include an initial subject assessment, storing to restrict access to the NFT and the container file, retrieving and parsing the NFT and container file to retrieve the pointer to the source locations, accessing and re-executing the trained model with the accessed updated data to receive an updated subject assessment, detecting the updated subject assessment is different from the initial subject assessment, and updating the NFT to include the updated subject assessment accordingly. All these generic computer functions are well-understood, routine, and conventional activities previously known to the industry similar to those referenced by MPEP 2106.05(d) II. The dependent claims further describe the business relations of the certain method of organizing human activity (abstract idea) and do not include additional elements other than those of claims 1 and 16 to provide a practical application or significantly more than the judicial exception. The focus of the claims is on a method for generating and maintaining secure storage for real-time subject assessment, which is “a business solution” to “a business problem” and is supported in paragraphs 3-4 of the Specification. The claims do not identify an improvement to the functioning of a computer or any other technology. Therefore, Applicant’s arguments are not persuasive and the rejection of the claims under 35 USC § 101 is MAINTAINED. Claim Rejections - 35 USC § 103 An updated prior art search did not identify any art(s), individually or in combination with others, that teaches each and every element of the claims at this time. Conclusion Claims 1-3 and 5-21 are rejected. Any inquiry concerning this communication or earlier communications from the examiner should be directed to HAI TRAN whose telephone number is (571)272-7364. The examiner can normally be reached Monday-Friday, 9-5. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Christine M. Behncke can be reached at 571-272-8103. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. HAI TRAN Primary Examiner Art Unit 3695 /HAI TRAN/Primary Examiner, Art Unit 3695
Read full office action

Prosecution Timeline

Oct 27, 2023
Application Filed
Mar 14, 2025
Non-Final Rejection — §101, §103
Jun 24, 2025
Response Filed
Aug 16, 2025
Final Rejection — §101, §103
Nov 19, 2025
Request for Continued Examination
Dec 04, 2025
Response after Non-Final Action
Jan 04, 2026
Non-Final Rejection — §101, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12586075
GENERATION OF INTEGRATION CONTENT FOR TRANSACTION NETWORKS
2y 5m to grant Granted Mar 24, 2026
Patent 12586068
SYSTEMS AND METHODS FOR DETECTING EMAIL MANIPULATION USING MACHINE LEARNING
2y 5m to grant Granted Mar 24, 2026
Patent 12548017
SYSTEMS AND METHODS FOR USER AUTHENTICATION BY A THIRD-PARTY SERVER
2y 5m to grant Granted Feb 10, 2026
Patent 12536032
PIPELINE FOR PROCESSING TRANSACTIONS
2y 5m to grant Granted Jan 27, 2026
Patent 12524822
VEHICLE RATING SYSTEM
2y 5m to grant Granted Jan 13, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
62%
Grant Probability
94%
With Interview (+32.4%)
3y 9m
Median Time to Grant
High
PTA Risk
Based on 721 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month