Prosecution Insights
Last updated: April 19, 2026
Application No. 18/511,647

CORRELATION USING DETERMINISTIC DATA

Non-Final OA §101§103
Filed
Nov 16, 2023
Examiner
ANDREI, RADU
Art Unit
3698
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Rotomaire Inc.
OA Round
3 (Non-Final)
36%
Grant Probability
At Risk
3-4
OA Rounds
3y 6m
To Grant
58%
With Interview

Examiner Intelligence

Grants only 36% of cases
36%
Career Allow Rate
201 granted / 564 resolved
-16.4% vs TC avg
Strong +22% interview lift
Without
With
+21.9%
Interview Lift
resolved cases with interview
Typical timeline
3y 6m
Avg Prosecution
65 currently pending
Career history
629
Total Applications
across all art units

Statute-Specific Performance

§101
41.9%
+1.9% vs TC avg
§103
37.8%
-2.2% vs TC avg
§102
2.1%
-37.9% vs TC avg
§112
14.5%
-25.5% vs TC avg
Black line = Tech Center average estimate • Based on career data from 564 resolved cases

Office Action

§101 §103
DETAILED ACTION The present application, filed on 11/16/2023 is being examined under the AIA first inventor to file provisions. Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 11/12/2025 has been entered. The following is a non-final Office Action on the Merits in response to Applicant’s submission. a. Claims 1, 16, 19 are amended b. Claims 6 are cancelled Overall, Claims 1-5, 7-21 are pending and have been considered below. Claim Rejections - 35 USC § 101 35 USC 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-5, 7-21 are rejected under 35 USC 101 because the claimed invention is not directed to patent eligible subject matter. The claimed matter is directed to a judicial exception, i.e. an abstract idea, not integrated into a practical application, and without significantly more. Per Step 1 of the multi-step eligibility analysis, claims 1-5, 7-15 are directed to a computer implemented method, claims 16-18 are directed to a system computer, and claims 19-20 are directed to executable instructions stored on a non-transitory storage medium. Thus, on its face, each independent claim and the associated dependent claims are directed to a statutory category of invention. [INDEPENDENT CLAIMS] Per Step 2A.1. Independent claim 1, (which is representative of independent claims 16, 19) is rejected under 35 USC 101 because the independent claim is directed to an abstract idea, a judicial exception, without reciting additional elements that integrate the judicial exception into a practical application. The limitations of the independent claim 1, (which is representative of independent claims 16, 19) recite an abstract idea, shown in bold below: [A] A system comprising one or more computers and one or more storage devices on which are stored instructions [B] receiving first data representing a first digital transaction, the first data including: a first token associated with a first originator and a first user; and a first character string associated with the first user; [C] generating a first container represented by a second token, the first container being associated with the first originator and the first user; [D] storing the first data in the first container; [E] receiving second data representing a second digital transaction; [F] determining whether the second digital transaction is associated with the first originator or the first user; and [G] in response to determining that the second digital transaction is associated with the first originator or the first user, storing the second data in the first container. [I] processing, by parsing both (i) the stored first data and (ii) the stored second data from the first container, the first and second digital transaction. Independent claim 1 (which is representative of independent claims 16, 19) recites: generating a transaction container (e.g. digital wallet, digital account) ([C]); determining the nature of the transaction ([F]); storing the received data ([G]); and parsing the data from the first and the second containers [(I)], which, based on the claim language and in view of the application disclosure, represents a process aimed at: “storing and analyzing information on commercial digital transactions”. This is a combination that, under its broadest reasonable interpretation, covers agreements in the form of sales activities or behaviors, business relationships (e-commerce), which falls under Certain Methods of Organizing Human Activity, i.e., Commercial or Legal Interactions grouping of abstract ideas (see MPEP 2106.04(a)(2)). Accordingly, it is reasonable to conclude that independent claim 1 (which is representative of independent claims 16, 19) recites an abstract idea that corresponds to a judicial exception. [INDEPENDENT CLAIMS – QUALIFIERS] Per Step 2A.2. The identified abstract idea is not integrated into a practical application because the additional elements in the independent claims only amount to instructions to apply the judicial exception to a computer, or are a general link to a technological environment (see MPEP 2106.05(f); MPEP 2106.05(h)). For example, the added elements “computer,” and “storage devices” recite computing elements at a high level of generality, generally linking the use of a judicial exception to a particular technological environment (see MPEP 2106.05(h)), or merely using a computer as a tool to perform an abstract idea (MPEP 2106.05(f)). These qualifiers of the independent claims do not preclude from carrying out the identified abstract idea “storing and analyzing information on commercial digital transactions”, and do not serve to integrate the identified abstract idea into a practical application. [INDEPENDENT CLAIMS – ADDITIONAL STEPS] The additional steps in the independent claims, shown not bolded above, recite: receiving transaction data ([B]), storing transaction data ([D]), Receiving second transaction data ([E]). When considered individually, they amount to nothing more than receiving data, processing data, storing results or transmitting data that serves merely to implement the abstract idea using computing components for performing computer functions (corresponding to the words “apply it” or an equivalent), or merely uses a computer as a tool to perform the identified abstract idea. Thus, it is reasonable to conclude that these claim elements do not integrate the identified abstract idea (“storing and analyzing information on commercial digital transactions”) into a practical application (see MPEP 2106.05(f)(2)). Therefore, the additional steps of independent claim 1, (which is representative of independent claims 16, 19) do not integrate the identified abstract idea into a practical application and the claims remain a judicial exception. Per Step 2B. Independent claim 1, (which is representative of independent claims 16, 19) does not include additional elements that are sufficient to amount to significantly more than the judicial exception because, when the independent claim is reevaluated as a whole, as an ordered combination under the considerations of Step 2B, the outcome is the same like under Step 2A.2. Overall, it is concluded that independent claims 1, 16, 19 are deemed ineligible. [DEPENDENT CLAIMS] Dependent claim 2 recites: [A] determining that the second data includes the first token. When considered individually, these added claim elements further elaborate on the abstract idea identified in the independent claims, because the dependent claim continues to recite the identified abstract idea: “storing and analyzing information on commercial digital transactions”. The elements in this dependent claim are comparable to “sorting information” i.e. comparing data, which has been recognized by a controlling court as "well-understood, routine and conventional computing functions" when claimed generically as they are in these dependent claims. Thus, it is reasonable to conclude that these claim elements do not integrate the identified abstract idea (“storing and analyzing information on commercial digital transactions”) into a practical application (see MPEP 2106.05(d) II)). The dependent claim elements have the same relationship to the underlying abstract idea (“storing and analyzing information on commercial digital transactions”) as outlined in the independent claims analysis above. Thus, it is readily apparent that the dependent claim elements are not directed to any specific improvements of the independent claims and do not practically or significantly alter how the identified abstract idea would be performed. When considered as a whole, as an ordered combination, the dependent claim further elaborates on the previously identified abstract idea (“storing and analyzing information on commercial digital transactions”). Therefore, dependent claim 2 is deemed ineligible. Dependent claim 3 recites: [A] determining that the second data includes the first character string. When considered individually, these added claim elements further elaborate on the abstract idea identified in the independent claims, because the dependent claim continues to recite the identified abstract idea: “storing and analyzing information on commercial digital transactions”. The elements in this dependent claim are comparable to “sorting information” i.e. comparing data, which has been recognized by a controlling court as "well-understood, routine and conventional computing functions" when claimed generically as they are in these dependent claims. Thus, it is reasonable to conclude that these claim elements do not integrate the identified abstract idea (“storing and analyzing information on commercial digital transactions”) into a practical application (see MPEP 2106.05(d) II)). The dependent claim elements have the same relationship to the underlying abstract idea (“storing and analyzing information on commercial digital transactions”) as outlined in the independent claims analysis above. Thus, it is readily apparent that the dependent claim elements are not directed to any specific improvements of the independent claims and do not practically or significantly alter how the identified abstract idea would be performed. When considered as a whole, as an ordered combination, the dependent claim further elaborates on the previously identified abstract idea (“storing and analyzing information on commercial digital transactions”). Therefore, dependent claim 3 is deemed ineligible. Dependent claim 7, which is representative of dependent claims 17, 20, recites: [A] receiving third data representing a third digital transaction, the third data including: a third token associated with a second originator of the third digital transaction and a user; and a second character string associated with the user; [B] determining that no containers of a set of containers are associated with the third token and the second character string; and [C] generating a second container represented by a fourth token, the second container being associated with the second originator and the user. When considered individually, these added claim elements further elaborate on the abstract idea identified in the independent claims, because the dependent claim continues to recite the identified abstract idea: “storing and analyzing information on commercial digital transactions”. The elements in this dependent claim are comparable to receiving data, processing data, storing results or transmitting data that serves merely to implement the abstract idea using computing components for performing computer functions (corresponding to the words “apply it” or an equivalent), or merely uses a computer as a tool to perform the identified abstract idea. Thus, it is reasonable to conclude that these claim elements do not integrate the identified abstract idea (“storing and analyzing information on commercial digital transactions”) into a practical application (see MPEP 2106.05(f)(2)). The dependent claim elements have the same relationship to the underlying abstract idea (“storing and analyzing information on commercial digital transactions”) as outlined in the independent claims analysis above. Thus, it is readily apparent that the dependent claim elements are not directed to any specific improvements of the independent claims and do not practically or significantly alter how the identified abstract idea would be performed. When considered as a whole, as an ordered combination, the dependent claim further elaborates on the previously identified abstract idea (“storing and analyzing information on commercial digital transactions”). Therefore, dependent claim 7 (which is representative of dependent claims 17, 20) is deemed ineligible. Dependent claim 21 recites: [A] generating the second token by computing a digital hash or a random string of characters. When considered individually, these added claim elements further elaborate on the abstract idea identified in the independent claims, because the dependent claim continues to recite the identified abstract idea: “storing and analyzing information on commercial digital transactions”. The elements in this dependent claim are comparable to receiving data, processing data, storing results or transmitting data that serves merely to implement the abstract idea using computing components for performing computer functions (corresponding to the words “apply it” or an equivalent), or merely uses a computer as a tool to perform the identified abstract idea. Thus, it is reasonable to conclude that these claim elements do not integrate the identified abstract idea (“storing and analyzing information on commercial digital transactions”) into a practical application (see MPEP 2106.05(f)(2)). The dependent claim elements have the same relationship to the underlying abstract idea (“storing and analyzing information on commercial digital transactions”) as outlined in the independent claims analysis above. Thus, it is readily apparent that the dependent claim elements are not directed to any specific improvements of the independent claims and do not practically or significantly alter how the identified abstract idea would be performed. When considered as a whole, as an ordered combination, the dependent claim further elaborates on the previously identified abstract idea (“storing and analyzing information on commercial digital transactions”). Therefore, dependent claim 21 is deemed ineligible. Dependent claims 8-10, 13-15 recite: wherein the user is the first user. wherein the first data and the second data are received from a same entity. wherein the first data and the second data are received from different entities. wherein the first container comprises an electronic storage container. wherein the first data includes at least one of the group consisting of: a date of the first digital transaction; a time of the first digital transaction; an amount of the first digital transaction; a location of the first digital transaction. wherein the first digital transaction comprises a digital transaction of tender. These further elements in the dependent claims do not perform any claimed method steps. They describe the nature, structure and/or content of other claim elements – the user; the first and second data; container; digital transaction – and as such, cannot change the nature of the identified abstract idea (“storing and analyzing information on commercial digital transactions”), from a judicial exception into eligible subject matter, because they do not represent significantly more (see MPEP 2106.07). The nature, form or structure of the other claim elements themselves do not practically or significantly alter how the identified abstract idea would be performed and do not provide more than a general link to a technological environment. Therefore, dependent claims 8-10, 13-15 are deemed ineligible. When the dependent claims are considered as a whole, as an ordered combination, the claim elements noted above appear to merely apply the abstract concept to a technical environment in a very general sense. The most significant elements, which form the abstract concept, are set forth in the independent claims. The fact that the computing devices and the dependent claims are facilitating the abstract concept is not enough to confer statutory subject matter eligibility, since their individual and combined significance do not transform the identified abstract concept at the core of the claimed invention into eligible subject matter. Therefore, it is concluded that the dependent claims of the instant application, considered individually, or as a as a whole, as an ordered combination, do not amount to significantly more (see MPEP 2106.07(a)II). In sum, Claims 1-5, 7-21 are rejected under 35 USC 101 as being directed to non-statutory subject matter. Claim Rejections - 35 USC § 103 The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the difference between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103(a) are summarized as follows: i. Determining the scope and contents of the prior art. ii. Ascertaining the differences between the prior art and the claims at issue. iii. Resolving the level of ordinary skill in the pertinent art. iv. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1-4, 8-9, 11-16, 18-19 are rejected under 35 U.S.C. 103 as being unpatentable over Wall (US 2014/0244376), in view of Lennert et al (US 2018/0189871), in further view of Xing (US 2017/0076262). Regarding Claims 1, 16, 19; 4, 18; 11; 12: Wall: A system comprising one or more computers and one or more storage devices on which are stored instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising: {see at least fig1, rc102, rc104, rc106, rc108, [0027]-[0033]} receiving first data representing a first digital transaction, the first data including: a first generating a first container storing the first data in the first container; {see at least fig1, rc106, rc112, [0029] consumer database, offer database (based on BRI (MPEP 2111 (reads on container, i.e., storage, associated with a user); fig3, rc106, [0044]-[0045] offer database; fig4A, rc108, rc408, [0053] … list with available off-peak offers (based on the BRI (MPEP 2111), reads on storage container (e.g. wallet) used to store offers)} receiving second data representing a second digital transaction; {see at least [0053] list of offers to consumer (reads on second data and second transaction)} determining whether the second digital transaction is associated with the first originator or the first user; {see at least fig4A, rc402-rc404, [0050]-[0052] multiple offers from the same merchant (fig, rc102) to consumer} in response to determining that the second digital transaction is associated with the first originator or the first user, based on a association between the second data and the first data. {Wall fails to explicitly disclose the conditional claim limitation; however, it is reasonable to assume that one of ordinary skills in the art will realize that storing steps can occur only if the conditions (i.e. same merchant offering to same customer) are met – see MPEP 2123 and MPEP 2144.01} storing the second data in the first container, and {see at least fig4A, rc408, [0053] … list with available off-peak offers} Wall does not disclose, however, Lennert discloses: processing, by parsing both (i) the stored first data and (ii) the stored second data from the first container, the first and second digital transaction. {see at least [0062] parse data (reads on first data and second data, because “data” is the plural from “datum”); parse transaction in parallel or one b one (reads on first transaction and second transaction)} It would have been obvious to one of ordinary skill in the art, at the time of filing, to modify Wall to include the elements of Lennert. One would have been motivated to do so, in order to analyze the transactions. In the instant case, Wall evidently discloses creating an electronic wallet with offers. Lennert is merely relied upon to illustrate the functionality of parsing data and transactions in the same or similar context. As best understood by Examiner, since both creating an electronic wallet with offers, as well as parsing data and transactions are implemented through well-known computer technologies in the same or similar context, combining their features as outlined above using such well-known computer technologies (i.e., conventional software/hardware configurations), would be reasonable, according to one of ordinary skill in the art. Moreover, since the elements disclosed by Wall, as well as Lennert would function in the same manner in combination as they do in their separate embodiments, it would be reasonable to conclude that their resulting combination would be predictable. Accordingly, the claimed subject matter is obvious over Wall / Lennert. Wall, Lennert does not disclose, however, Xing discloses: … container represented by a token … {see at least [0022] storage represented by token) It would have been obvious to one of ordinary skill in the art, at the time of filing, to modify Wall, Lennert to include the elements of Xing. One would have been motivated to do so, in order to create means to access the token. In the instant case, Wall, Lennert evidently discloses parsing data and transactions in the same or similar context. Xing is merely relied upon to illustrate the functionality of storage represented by token in the same or similar context. Since both parsing data and transactions in the same or similar context, as well as storage represented by token are implemented through well-known computer technologies in the same or similar context, combining their features as outlined above using such well-known computer technologies (i.e., conventional software/hardware configurations), would be reasonable, according to one of ordinary skill in the art. Moreover, since the elements disclosed by Wall, Lennert, as well as Xing would function in the same manner in combination as they do in their separate embodiments, it would be reasonable to conclude that their resulting combination would be predictable. Accordingly, the claimed subject matter is obvious over Wall, Lennert / Xing. Regarding Claim 2: Wall, Lennert, Xing discloses the limitations of Claim 1. Wall further discloses: wherein determining that the second digital transaction is associated with the first originator comprises determining that the second data includes the first token. {see at least fig4A, rc408, rc410, [0053] all offers form the same merchant (reads on first token)} Regarding Claim 3: Wall, Lennert, Xing discloses the limitations of Claim 1. Wall further discloses: wherein determining that the second digital transaction is associated with the first user comprises determining that the second data includes the first character string. {see at least fig7, rc702, rc704, [0075]-[0076] each offer includes merchant identification, transaction identification (reads on character string)} Regarding Claim 8: Wall, Lennert, Xing discloses the limitations of Claim 7. Wall further discloses: wherein the user is the first user. {see at least fig1, rc108, [0030] a consumer (reads on first user)} Regarding Claim 9: Wall, Lennert, Xing discloses the limitations of Claim 1. Wall further discloses: wherein the first data and the second data are received from a same entity. {see at least fig4A, rc402, [0051] merchant … multiple offers (reads on same entity)} Regarding Claim 13: Wall, Lennert, Xing discloses the limitations of Claim 1. Wall further discloses: wherein the first container comprises an electronic storage container. {see at least fig1, rc106, [0035] offer database (reads on electronic storage)} Regarding Claim 14: Wall, Lennert, Xing discloses the limitations of Claim 1. Wall further discloses: wherein the first data includes at least one of the group consisting of: a date of the first digital transaction; a time of the first digital transaction; an amount of the first digital transaction; and a location of the first digital transaction. {see at least [0075] time, transaction modifier} Regarding Claim 15: Wall, Lennert, Xing discloses the limitations of Claim 1. Wall further discloses: wherein the first digital transaction comprises a digital transaction of tender. {see at least [0008] off-peak offer reads on digital tender)} Claims 5, 7, 10, 17, 20 are rejected under 35 U.S.C. 103 as being unpatentable over Wall (US 2014/0244376), in view of Lennert et al (US 2018/0189871)), in further view of Xing (US 2017/0076262), in further view of Kantor et al (US 2006/0224454). Regarding Claim 5: Wall, Lennert, Xing discloses the limitations of Claim 1. Xing further discloses: … token … {see at least [0022] storage represented by token) It would have been obvious to one of ordinary skill in the art, at the time of filing, to modify Wall, Lennert, Xing to include additional elements of Xing. One would have been motivated to do so, in order to creating an addressing mechanism for the container. In the instant case, Wall, Lennert, Xing evidently discloses creating an electronic wallet with offers. Xing is merely relied upon to illustrate the additional functionality of a token in the same or similar context. Since the subject matter is merely a combination of old elements, and in the combination each element would have performed the same function it performed separately, one having ordinary skill in the art before the effective filing date would have recognized that the results of the combination were predictable. Wall, Lennert, Xing does not disclose, however Kantor discloses: generating the first container in response to determining, based on the first data, that no containers of a set of containers are associated with at least one of the first It would have been obvious to one of ordinary skill in the art, at the time of filing, to modify Wall, Lennert, Xing to include the elements of Kantor. One would have been motivated to do so, in order to easily recognize where the offers come from. In the instant case, Wall, Lennert, Xing evidently discloses creating an electronic wallet with offers. Kantor is merely relied upon to illustrate the functionality of creating an individual wallet for each originator in the same or similar context. Since both creating an electronic wallet with offers, as well as creating an individual wallet for each originator are implemented through well-known computer technologies in the same or similar context, combining their features as outlined above using such well-known computer technologies (i.e., conventional software/hardware configurations), would be reasonable, according to one of ordinary skill in the art. Moreover, since the elements disclosed by Wall, Lennert, Xing, as well as Kantor would function in the same manner in combination as they do in their separate embodiments, it would be reasonable to conclude that their resulting combination would be predictable. Accordingly, the claimed subject matter is obvious over Wall, Lennert, Xing / Kantor. Regarding Claims 7, 17, 20: Wall, Lennert, Xing discloses the limitations of Claims 1, 16, 19. Wall further discloses: receiving third data representing a third digital transaction, the third data including: in response, generating a second container represented by a fourth token, the second container being associated with the second originator and the user. {see at least [0048] individual files (reads on container) for each individual merchant (reds on originator)} Xing further discloses: … token … {see at least [0022] storage represented by token) It would have been obvious to one of ordinary skill in the art, at the time of filing, to modify Wall, Lennert, Xing to include additional elements of Xing. One would have been motivated to do so, in order to creating an addressing mechanism for the container. In the instant case, Wall, Lennert, Xing evidently discloses creating an electronic wallet with offers. Xing is merely relied upon to illustrate the additional functionality of a token in the same or similar context. Since the subject matter is merely a combination of old elements, and in the combination each element would have performed the same function it performed separately, one having ordinary skill in the art before the effective filing date would have recognized that the results of the combination were predictable. Wall, Lennert, Xing does not disclose, however Kantor discloses: … a third token associated with a second originator of the third digital transaction and a user; and a second character string associated with the user {see at least [0048] individual files (reads on container) for each individual merchant (reds on originator) (reads on separate entities)} determining that no containers of a set of containers are associated with the third token and the second character string; and {see at least [0048] individual files (reads on container) for each individual merchant (reds on originator) (reads on separate entities)} It would have been obvious to one of ordinary skill in the art, at the time of filing, to modify Wall, Lennert, Xing to include the elements of Kantor. One would have been motivated to do so, in order to easily recognize where the offers come from. In the instant case, Wall, Lennert, Xing evidently discloses creating an electronic wallet with offers. Kantor is merely relied upon to illustrate the functionality of creating an individual wallet for each originator in the same or similar context. Since both creating an electronic wallet with offers, as well as creating an individual wallet for each originator are implemented through well-known computer technologies in the same or similar context, combining their features as outlined above using such well-known computer technologies (i.e., conventional software/hardware configurations), would be reasonable, according to one of ordinary skill in the art. Moreover, since the elements disclosed by Wall, Lennert, Xing, as well as Kantor would function in the same manner in combination as they do in their separate embodiments, it would be reasonable to conclude that their resulting combination would be predictable. Accordingly, the claimed subject matter is obvious over Wall, Lennert, Xing / Kantor. Regarding Claim 10: Wall, Lennert, Xing discloses the limitations of Claim 1. Wall, Lennert, Xing does not disclose, however Kantor discloses: wherein the first data and the second data are received from different entities. {see at least [0048] individual files (reads on container) for each individual merchant (reds on originator) (reads on separate entities)} It would have been obvious to one of ordinary skill in the art, at the time of filing, to modify Wall, Lennert, Xing to include the elements of Kantor. One would have been motivated to do so, in order to easily recognize where the offers come from. Kantor is merely relied upon to illustrate the functionality of creating an individual wallet for each originator in the same or similar context. Since both creating an electronic wallet with offers, as well as creating an individual wallet for each originator are implemented through well-known computer technologies in the same or similar context, combining their features as outlined above using such well-known computer technologies (i.e., conventional software/hardware configurations), would be reasonable, according to one of ordinary skill in the art. Moreover, since the elements disclosed by Wall, Lennert, Xing, as well as Kantor would function in the same manner in combination as they do in their separate embodiments, it would be reasonable to conclude that their resulting combination would be predictable. Accordingly, the claimed subject matter is obvious over Wall, Lennert, Xing / Kantor. Claim 21 is rejected under 35 U.S.C. 103 as being unpatentable over Wall (US 2014/0244376), in view of Lennert et al (US 2018/0189871)), in further view of Xing (US 2017/0076262), in further view of Carbou et al (US 2014/0123266). Regarding Claim 21: Wall, Lennert, Xing discloses the limitations of Claim 1. Wall, Lennert, Xing does not disclose, however, Carbou discloses: wherein generating the first container represented by the second token comprises: generating the second token by computing a digital hash or a random string of characters. {see at least [0129] The authentication token is generated by a digital hash function} It would have been obvious to one of ordinary skill in the art, at the time of filing, to modify Wall, Lennert, Xing to include the elements of Carbou. One would have been motivated to do so, in order to diversify the token offer. In the instant case, Wall, Lennert, Xing evidently discloses creating an electronic wallet with offers. Carbou is merely relied upon to illustrate the functionality of generating a second token in the same or similar context. Since both creating an electronic wallet with offers, as well as generating a second token are implemented through well-known computer technologies in the same or similar context, combining their features as outlined above using such well-known computer technologies (i.e., conventional software/hardware configurations), would be reasonable, according to one of ordinary skill in the art. Moreover, since the elements disclosed by Wall, Lennert, Xing, as well as Carbou would function in the same manner in combination as they do in their separate embodiments, it would be reasonable to conclude that their resulting combination would be predictable. Accordingly, the claimed subject matter is obvious over Wall, Lennert, Xing / Carbou. The prior art made of record and not relied upon which, however, is considered pertinent to applicant's disclosure: US 20160292783 A1 Nair; Rahul ONLINE MARKETPLACE INTERFACE HAVING A NETWORK OF QUALIFIED USER OFFERS - There are provided systems and methods for an online marketplace having a network of qualified user offers. A service provider may offer an online marketplace to connect lenders and borrowers. A lender may establish a financial offer with the online marketplace by entering at least an amount that the lender wishes to provide to a borrower to the online marketplace. The lender may also establish terms for acceptance of the financial offer, including required collateral, which may take the form of a virtual asset of the borrower. The borrower may access the online marketplace to search and browse financial offers. Once the borrower finds and/or negotiates an acceptable offer, the borrower may receive the amount for the offer after completing the terms of acceptance, including providing the virtual asset to the lender. The lender may then prevent access and/or use of the virtual asset in the event of default. US 20150120411 A1 Kneen; Ben MERCHANT OFFER RECOMMENDATION SYSTEM - Systems and methods for recommending offers to merchants for provision to their customers include a database storing customer offer data for a plurality of customers and a plurality of offers and that details the results of providing one or more of the plurality of offers to each of the plurality of customers. Identifying information about a first merchant is received and used to retrieve a first subset of the plurality of customers that are associated with the first merchant. The first subset of the plurality of customers is used to review the customer offer data to determine the results of providing the one or more of the plurality of offers to each of the first subset of customers. A first offer that is associated with a higher amount of participation results by the first subset of the plurality of customers relative to the others of the plurality of offers is then determined and provided for display to the first merchant. US 20200034813 A1 Calinog; Millicent et al. SYSTEMS AND METHODS FOR SCHEDULING BUSINESS-TO-INDIVIDUAL PAYMENTS - Systems and methods for facilitating transactions include determining an amount of funds that a payer owes a payee, determining a first payment offer that is for the amount of funds that the payer owes the payee and a first target payment date, providing the first payment offer to the payee, receiving a user input from a payee device, generating a second payment offer of an offered amount of funds and a second target payment date where the offered amount of funds is lower than the amount of funds that the payer owes the payee and the second target payment date is prior to the first target payment date, providing a notification to the payee, receiving a user input from the payee device, and initiating an electronic funds transfer from a source account of the payer to a target account of the payee. US 20180232693 A1 Gillen; Robert J. et al. Autonomous services selection system and distributed transportation database(s) - Systems and methods are provided for the automated determination and facilitation of a transportation plan for transporting a shipment unit containing at least one shipment unit through one or more transportation networks corresponding to one or more carriers. An exemplary method comprises receiving and storing in a distributed ledger service offers for transporting a shipment unit; receiving and storing in a distributed ledger shipment unit data comprising an origin, a destination, and transportation parameters; matching service offers stored in the distributed ledger to the shipment unit data to generate a transportation plan for transporting the shipment unit in accordance with the shipment unit data, each service offer corresponding to a leg of the transportation plan, receiving and storing in the distributed ledger an indication of completion of a particular leg of the transportation plan, and causing payment of an entity for transporting the shipment unit along the particular leg. US 20170068984 A1 Joshi; Sunil Pradeep et al. CUSTOMER REWARD SYSTEMS AND METHODS - Offers are provided to consumers by a service on behalf of merchants in response to purchases by the consumer at the merchant, a collaborating merchant, or self-issued from a web site. Offers may be cloned by a consumer and provided to another user. Points may be assigned to consumers and used to purchase offers. Offers are generated with custom parameters for each customer. Offer parameters (e.g., duration, price, benefit) may be varied over time to determine successful parameters that are likely to result in offer redemption. Merchants may collaborate such that issuance of an offer for a first merchant results in issuance by the service of an offer for a second merchant. A fee may be charged by the service to the first merchant with at least a portion of the fee being paid to the second merchant. US 9195984 B1 Spector; Howard et al. Systems and methods for processing transactions using a wallet - The invention provides a wallet vault, in the form of a tangibly embodied processing machine, disposed in communication with a financial payment network, the wallet vault comprising a communication portion that inputs and outputs information and a processing portion. The processing portion may perform processing including storing token information of a customer and real credentials of the customer, the token information associated with the real credentials of the customer, the real credentials constituted by an account number of the customer; inputting the token information with transaction ID information from a processing entity in the financial network, the token information with transaction ID information generated by a merchant processing a transaction for the customer; associating the token information of the customer with the real credentials of the customer; and outputting the associated real credentials with the transaction ID information to the processing entity in the financial network. The wallet vault may be associated with a wallet from which the transaction is initiated, and the wallet associated with the merchant. Response to Amendments/Arguments Applicant’s submitted remarks and arguments have been fully considered. Applicant disagrees with the Office Action conclusions and asserts that the presented claims fully comply with the requirements of 35 U.S.C. § 101 regrading judicial exceptions. Further, Applicant is of the opinion that the prior art fails to teach Applicant’s invention. Examiner respectfully disagrees in both regards. With respect to Applicant’s Remarks as to the claims being rejected under 35 USC § 101. Applicant submits: a. The pending claims are not directed to an abstract idea. b. The identified abstract idea is integrated into a practical application. c. The pending claims amount to significantly more. Furthermore, Applicant asserts that the Office has failed to meet its burden to identify the abstract idea and to establish that the identified abstract idea is not integrated into a practical application and that the pending claims do not amount to significantly more. Examiner responds – The arguments have been considered in light of Applicants’ amendments to the claims. The arguments ARE NOT PERSUASIVE. Therefore, the rejection is maintained. The pending claims, as a whole, are directed to an abstract idea not integrated into a practical application. This is because (1) they do not effect improvements to the functioning of a computer, or to any other technology or technical field (see MPEP 2106.05 (a)); (2) they do not apply or use the abstract idea to effect a particular treatment or prophylaxis for a disease or a medical condition (see the Vanda memo); (3) they do not apply the abstract idea with, or by use of, a particular machine (see MPEP 2106.05 (b)); (4) they do not effect a transformation or reduction of a particular article to a different state or thing (see MPEP 2106.05 (c)); (5) they do not apply or use the abstract idea in some other meaningful way beyond generally linking the use of the identified abstract idea to a particular technological environment, such that the claim as a whole is more than a drafting effort designated to monopolize the exception (see MPEP 2106.05 (e) and the Vanda memo). In addition, the pending claims do not amount to significantly more than the abstract idea itself. As such, the pending claims, when considered as a whole, are directed to an abstract idea not integrated into a practical application and not amounting to significantly more. More specific: Applicant submits “Just as Example 35 relies on the non-conventional generation and handling of random, encrypted codes and confirmation signals to verify identity, the subject claims rely on the unique steps of: …” Examiner has carefully considered, but doesn’t find Applicant’s arguments persuasive. The steps of the instant application – receiving first data, generating container, storing data into the generated container, receiving second data, analyzing second data, storing second data and parsing the first and second data – are routine, rather than unique, conventional steps that are executed in a logical sequence. Therefore, it is determined that the additional elements of the independent claims do not integrate the identified abstract idea into a practical application, nor do they represent “significantly more.” It follows that the status of the identified judicial exception remains unchanged. Should Applicant disagree with this conclusion, he/she is requested to argue why the named steps are NOT conventional. Just stating that they are jot conventional is not enough. Thus, the rejection is proper and has been maintained. It follows from the above that there are no meaningful limitations in the claims that transform the judicial exception into a patent eligible application such that the claims amount to significantly more than the judicial exception itself. Therefore, the rejection under 35 U.S.C. § 101 is maintained. With respect to Applicant’s Remarks as to the claims being rejected under 35 USC § 103. Applicant submits that Wall does not disclose: “… container represented by a token …;” Examiner agrees. However, Xing discloses: … container represented by a token … {see at least [0022] storage represented by token) Thus, the rejection is proper and has been maintained. The other arguments presented by Applicant continually point back to the above arguments as being the basis for the arguments against the other 103 rejections, as the other arguments are presented only because those claims depend from the independent claims, and the main argument above is presented against the independent claims. Therefore, it is believed that all arguments put forth have been addressed by the points above. Examiner has reviewed and considered all of Applicant’s remarks. The changes of the grounds for rejection, if any, have been necessitated by Applicant’s extensive amendments to the claims. Therefore, the rejection is maintained, necessitated by the extensive amendments and by the fact that the rejection of the claims under 35 USC § 101 has not been overcome. Inquiries Any inquiry concerning this communication or earlier communications from the examiner should be directed to Radu Andrei whose telephone number is 313.446.4948. The examiner can normally be reached on Monday – Friday 8:30am – 5pm EST. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Patrick McAtee can be reached at 571.272.7575. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http:/www.uspto.gov/interviewpractice. As disclosed in MPEP 502.03, communications via Internet e-mail are at the discretion of the applicant. Without a written authorization by applicant in place, the USPTO will not respond via Internet e-mail to any Internet correspondence which contains information subject to the confidentiality requirement as set forth in 35 U.S.C. 122. A paper copy of such correspondence will be placed in the appropriate patent application. The following is a sample authorization form which may be used by applicant: “Recognizing that Internet communications are not secure, I hereby authorize the USPTO to communicate with me concerning any subject matter of this application by electronic mail. I understand that a copy of these communications will be made of record in the application file.” Information regarding the status of published or unpublished applications may be obtained from Patent Center. Status information for published applications may be obtained from Patent Center information webpage. Status information for unpublished applications is available to registered users through Patent Center information webpage only. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (in USA or CANADA) or 571-272-1000. Any response to this action should be mailed to: Commissioner of Patents and Trademarks P.O. Box 1450 Alexandria, VA 22313-1450 or faxed to 571-273-8300 /Radu Andrei/ Primary Examiner, AU 3698
Read full office action

Prosecution Timeline

Nov 16, 2023
Application Filed
Apr 28, 2025
Non-Final Rejection — §101, §103
Jul 21, 2025
Interview Requested
Jul 28, 2025
Examiner Interview Summary
Jul 28, 2025
Applicant Interview (Telephonic)
Aug 01, 2025
Response Filed
Aug 10, 2025
Final Rejection — §101, §103
Nov 12, 2025
Request for Continued Examination
Nov 13, 2025
Response after Non-Final Action
Jan 30, 2026
Non-Final Rejection — §101, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602685
SYSTEMS AND METHODS FOR TOKEN-BASED DEVICE BINDING DURING MERCHANT CHECKOUT
2y 5m to grant Granted Apr 14, 2026
Patent 12579542
SYSTEMS AND METHODS FOR MANAGING CRYPTOCURRENCY
2y 5m to grant Granted Mar 17, 2026
Patent 12579434
TRAINING A NEURAL NETWORK USING AN ACCELERATED GRADIENT WITH SHUFFLING
2y 5m to grant Granted Mar 17, 2026
Patent 12579226
Platform for Digitally Twinning Subjects into AI Agents
2y 5m to grant Granted Mar 17, 2026
Patent 12562927
SECURELY PROCESSING A CONTINGENT ACTION TOKEN
2y 5m to grant Granted Feb 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
36%
Grant Probability
58%
With Interview (+21.9%)
3y 6m
Median Time to Grant
High
PTA Risk
Based on 564 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month