Prosecution Insights
Last updated: April 19, 2026
Application No. 18/542,074

SYSTEM TO AUTHENTICATE A PRODUCT AND A METHOD THEREOF

Final Rejection §103
Filed
Dec 15, 2023
Examiner
LAKHANI, ANDREW C
Art Unit
3629
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Sepio Products Private Limited
OA Round
2 (Final)
22%
Grant Probability
At Risk
3-4
OA Rounds
3y 0m
To Grant
53%
With Interview

Examiner Intelligence

Grants only 22% of cases
22%
Career Allow Rate
39 granted / 174 resolved
-29.6% vs TC avg
Strong +30% interview lift
Without
With
+30.4%
Interview Lift
resolved cases with interview
Typical timeline
3y 0m
Avg Prosecution
34 currently pending
Career history
208
Total Applications
across all art units

Statute-Specific Performance

§101
39.9%
-0.1% vs TC avg
§103
36.7%
-3.3% vs TC avg
§102
9.1%
-30.9% vs TC avg
§112
11.9%
-28.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 174 resolved cases

Office Action

§103
DETAILED ACTION This Final Office Action is in response to the arguments filed December 12, 2025. Claims 1-10 are currently pending and have been considered below. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Arguments In response to the arguments filed December 12, 2025 on page 6 regarding the priority under 35 USC 120, specifically that the parent application provides 35 USC 112(a) support for the priority status. Examiner respectfully disagrees. The arguments allege that the CIP application 17/799128 provides 35 USC 112(a) support for machine learning in paragraphs [23-24 and 43-48]. Based on the consideration, the passages are not providing proper 35 USC 112 written description support for the trained machine learning model. The considered passages provide aspects of machine learning with regards to image recognition, however, the specific claim limitations in the pending application is directed towards a specific pre-trained model and storing a machine learning model trained using image data. The ‘128 application does not provide written description support for the machine learning model being pre-trained or training with a specific set of data. As such, the priority is maintained as previously considered. In response to the 35 USC 112(f) interpretation, specifically that the specification provides structural support. Examiner respectfully disagrees. Examiner first notes that the 35 USC 112(f) is an interpretation of the claimed elements. The term module falls within the nonce term that is subject to 35 USC 112(f) interpretation. Absence of the word “means” (or “step”) in a claim creates a rebuttable presumption that the claim limitation is not to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is not interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites function without reciting sufficient structure, material or acts to entirely perform the recited function. Further, there is no rejection under 35 USC 112(a) or 35 USC 112(b) with respect to the 35 USC 112(f) interpretation. The interpretation is maintained with respect to the structural components provided in the specification. In response to the arguments filed December 12, 2025 on page 7-10 regarding the 35 USC 103 rejection, specifically that the prior art does not specifically teach the claimed invention. Examiner respectfully disagrees. The arguments are with respect to the combination of elements, specifically towards the combination of Caton in view of Tscherepanow with respect to the machine learning model. The arguments allege that the prior art is uncombinable, however, that is not a proper teaching away argument presented. Also, In response to applicant’s argument that there is no teaching, suggestion, or motivation to combine the references, the examiner recognizes that obviousness may be established by combining or modifying the teachings of the prior art to produce the claimed invention where there is some teaching, suggestion, or motivation to do so found either in the references themselves or in the knowledge generally available to one of ordinary skill in the art. See In re Fine, 837 F.2d 1071, 5 USPQ2d 1596 (Fed. Cir. 1988), In re Jones, 958 F.2d 347, 21 USPQ2d 1941 (Fed. Cir. 1992), and KSR International Co. v. Teleflex, Inc., 550 U.S. 398, 82 USPQ2d 1385 (2007). In this case, Tscherepanow provides QR code analysis that is provided for product analysis, similar to the product authentication and analysis within Caton to determine authenticity. Caton utilizes QR codes for authentication and security and Tscherepanow provides a specific aspect of QR code analysis using machine learning. The combination is that Caton provides the product authentication and identification based on matching QR code and other logo elements and Tscherepanow teaches a similar QR code system specifically to provide identification through a trained ML model. As such, it would have been obvious to combine Caton with Tscherepanow as considered in terms of the claimed invention. The arguments further allege that the combination of Caton and Kundregula. Examiner notes that the arguments are alleging elements and specific aspects that are not specifically described or claimed in the present claims, as currently written. The claims have a redirection based on appending and redirection of an extracted URL and the arguments are alleging further specifics and other technical aspects that are not required. As such, the combination is maintained, for the claims as currently written, for Kandregula teaching a similar QR code system that specifically provides the mapping table that redirects to a URL (Fig 4 and paragraphs [65-68]). This would be in combination with the website server and other mapping tables that are discussed and disclosed within Caton to provide the product authentication through the website server and Kandregula teaches the specific URL redirection. As such, the 35 USC 103 rejection is being maintained, as considered below. Lacking any further arguments, claims 1-10 are maintaining the 35 USC 103 rejection, as considered in the Non-Final Office Action [9/22/2025] and based on the arguments presented and considered. Priority Receipt is acknowledged of certified copies of papers required by 37 CFR 1.55. Examiner notes this acknowledgement is specifically for FOR application PCT/IB2022/054796 filed May 23, 2022 which claims priority to Indian Patent Application No 202123026879 filed June 16, 2021. Applicant’s claim for the benefit of a prior-filed application under 35 U.S.C. 119(e) or under 35 U.S.C. 120, 121, 365(c), or 386(c) is acknowledged. Applicant has not complied with one or more conditions for receiving the benefit of an earlier filing date under 35 U.S.C. 120 as follows: The later-filed application must be an application for a patent for an invention which is also disclosed in the prior application (the parent or original nonprovisional application or provisional application). The disclosure of the invention in the parent application and in the later-filed application must be sufficient to comply with the requirements of 35 U.S.C. 112(a) or the first paragraph of pre-AIA 35 U.S.C. 112, except for the best mode requirement. See Transco Products, Inc. v. Performance Contracting, Inc., 38 F.3d 551, 32 USPQ2d 1077 (Fed. Cir. 1994). The disclosure of the prior-filed application, Application No. 17/799,128, fails to provide adequate support or enablement in the manner provided by 35 U.S.C. 112(a) or pre-AIA 35 U.S.C. 112, first paragraph for one or more claims of this application. Claim 1 (and similarly claim 10) of the pending application ‘074 is directed towards the specific limitation, “a memory (102) configured to store a machine learning model trained using image data of a plurality of said products” and “said product identification module (108) further configured to cooperate with said memory (102) to identify said products based on said pre-trained machine learning model and said detected design”. Application ‘128 provides aspects of machine learning, however, ‘128 does not provide 35 USC 112(a) support for training the machine learning model and identifying products based on the pre-trained model. As such, Application 17/799128 does not provide sufficient or adequate support or enablement with respect to the pending application. Therefore, claims 1-10 has not complied with one or more conditions for receiving the benefit of an earlier filing date under 35 U.S.C. 120 as an identified Continuation-in-Part continuity. Claim Interpretation The following is a quotation of 35 U.S.C. 112(f): (f) Element in Claim for a Combination. – An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. The following is a quotation of pre-AIA 35 U.S.C. 112, sixth paragraph: An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. The claims in this application are given their broadest reasonable interpretation using the plain meaning of the claim language in light of the specification as it would be understood by one of ordinary skill in the art. The broadest reasonable interpretation of a claim element (also commonly referred to as a claim limitation) is limited by the description in the specification when 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is invoked. As explained in MPEP § 2181, subsection I, claim limitations that meet the following three-prong test will be interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph: (A) the claim limitation uses the term “means” or “step” or a term used as a substitute for “means” that is a generic placeholder (also called a nonce term or a non-structural term having no specific structural meaning) for performing the claimed function; (B) the term “means” or “step” or the generic placeholder is modified by functional language, typically, but not always linked by the transition word “for” (e.g., “means for”) or another linking word or phrase, such as “configured to” or “so that”; and (C) the term “means” or “step” or the generic placeholder is not modified by sufficient structure, material, or acts for performing the claimed function. Use of the word “means” (or “step”) in a claim with functional language creates a rebuttable presumption that the claim limitation is to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites sufficient structure, material, or acts to entirely perform the recited function. Absence of the word “means” (or “step”) in a claim creates a rebuttable presumption that the claim limitation is not to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is not interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites function without reciting sufficient structure, material or acts to entirely perform the recited function. Claim limitations in this application that use the word “means” (or “step”) are being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. Conversely, claim limitations in this application that do not use the word “means” (or “step”) are not being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. This application includes one or more claim limitations that do not use the word “means,” but are nonetheless being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, because the claim limitation(s) uses a generic placeholder that is coupled with functional language without reciting sufficient structure to perform the recited function and the generic placeholder is not preceded by a structural modifier. Such claim limitation(s) is/are: a product identification module (108) configured to detect a design printed on the packaging of said products in claim 1. a scanning module (104) configured to facilitate at least one user to scan said visual codes printed on said products, each visual code including an embedded information comprising a unique identification number (UID) of associated product and a verification URL in claim 1. second re-direction module (110) configured to cooperate with said scanning module (104) to receive said extracted UID and said verification URL, and further configured to cooperate with said product identification module (108) to re-direct said user to a third-party verification platform at an embedded URL for product verification if said product is not identified in claim 1. said verification module (118) configured to generate a verification successful message and optionally delete/kill said identified UID from said list in claim 2. wherein said product identification module (108) includes a second identification unit (126) configured to receive said detected design and use said pre-trained machine learning model to identify said product based on said detected design in claim 6. wherein said product identification module (108) includes a flag generator (120) configured to cooperate with said memory (102) to receive said detected design, recognize said products using said pre-trained machine learning model, and generate a flag signal on successful recognition of said products, said flag generator (120) further configured to transmit said flag signal to said first re-direction module (106) for appending URL for forceful redirection in claim 7. a receiving unit (128) configured to cooperate with said scanning module (104) and said product identification module (108) to receive said extracted UID and said verification URL if said product is identified in claim 8. wherein said product identification module (108) is configured to first detect said visual code printed on product packaging, and then use the detected visual code's location and scale as a reference for detecting and identifying said design printed on product packaging for product identification in claim 9. Because this/these claim limitation(s) is/are being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, it/they is/are being interpreted to cover the corresponding structure described in the specification as performing the claimed function, and equivalents thereof. If applicant does not intend to have this/these limitation(s) interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, applicant may: (1) amend the claim limitation(s) to avoid it/them being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph (e.g., by reciting sufficient structure to perform the claimed function); or (2) present a sufficient showing that the claim limitation(s) recite(s) sufficient structure to perform the claimed function so as to avoid it/them being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claim(s) 1-10 are rejected under 35 U.S.C. 103 as being unpatentable over Caton et al [2015/0302421], hereafter Caton, in view of Tscherepanow et al [2019/0325183], hereafter Tscherepanow, further in view of Kandregula [2016/0048604]. Regarding claim 1, Caton discloses a system (100) to authenticate a product, said system (100) comprising: a product identification module (108) configured to detect a design printed on the packaging of said products, said design comprising at least one of an artwork, a text in and around a visual code, a brand logo, and a relative position and size of said visual code and said artwork, text, or brand logo (Fig 1, 4A, 7A-D, and paragraphs [ and 175]; Caton discloses a character/symbol arrangement design that includes a code with text and other elements around the QR code for document (product) identification.), said product identification module (108) further configured to cooperate with said memory (102) to identify said products based on said detected design (Fig 1, 4A, and paragraphs [140-149]; Caton discloses mapping rules based on the image data to identify the document with the hidden/overt security features.); a scanning module (104) configured to facilitate at least one user to scan said visual codes printed on said products, each visual code including an embedded information comprising a unique identification number (UID) of associated product and a verification URL, said scanning module (104) further configured to extract said UIDs and said verification URLs from said scanned visual code (Fig 1, 4A, and paragraphs [185-186, 212-218, and 230-238]; Caton discloses authentication links to website elements and extracting the elements through the QR code (visual code) to produce the identification/authentication information.); a first re-direction module (106) configured to cooperate with said scanning module (104) and said product identification module (108) to receive said extracted UID and said verification URL if said product is identified, and further configured to screen said extracted URL to identify said product's authenticity and: re-direct said user to a verification server (114) at said extracted URL for product verification if said URL is found to be authentic; or append said extracted contents of said visual code (UID and verification URL) to a pre-stored URL of said verification server (114) if said extracted URL is found to be spurious and forcefully re-direct said user to said genuine verification server (114) at said appended URL for product verification (Fig 1, 16B, and paragraphs [139-147, 215-219, and 228-232]; Caton discloses providing verification to the authentication website server based on the captured image of the security elements within the code This includes user identity and other aspects that include access control and re-direct to an authentication display based on the authentication of the security elements.); and a second re-direction module (110) configured to cooperate with said scanning module (104) to receive said extracted UID and said verification URL, and further configured to cooperate with said product identification module (108) to re-direct said user to a third-party verification platform at an embedded URL for product verification if said product is not identified (Fig 1, 4A, and paragraphs [93-97, 140-149 and 228-231]; Caton discloses elements of providing third party services and authentication elements based on counterfeit verification for the product. This includes elements of re-direction and other aspects including providing user session information and the code within the counterfeit image.). Caton discloses the above-enclosed limitations of the QR code and product authentication system based on the information within the image, however, the combination does not specifically teach using machine learning model to identify the product; Tscherepanow teaches a memory (102) configured to store a machine learning model trained using image data of a plurality of said products; said product identification module (108) further configured to cooperate with said memory (102) to identify said products based on said pre-trained machine learning model and said detected design (Paragraphs [50-59 and 105-110]; Tscherepanow teaches a similar QR code matching system that specifically provides a trained machine learning model to provide identification for the codes. The combination is that Caton provides the product authentication and identification based on matching QR code and other logo elements and Tscherepanow teaches a similar QR code system specifically to provide identification through a trained ML model.). Caton discloses a QR code system to provide product authentication based on the detected design and other features, however, Caton does not specifically teach machine learning models to provide the identification; Tscherepanow teaches a similar QR code system that specifically provides a trained machine learning model to provide identification of the code. It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention for the QR code system to provide product authentication based on the detected design and other features of Caton the ability to include a similar QR code system that specifically provides a trained machine learning model to provide identification of the code as taught by Tscherepanow since the claimed invention is merely a combination of prior art elements and in the combination each element would have performed the same function as it did separately and one of ordinary skill in the art would have recognized the results of the combination as predictable. The combination teaches the above-enclosed limitations of the QR code system for product authentication, however, the combination does not explicitly state URL for the QR code redirection; Kandregula teaches a similar QR code system that specifically provides the mapping table that redirects to a URL (Fig 4 and paragraphs [65-68]). This would be in combination with the website server and other mapping tables that are discussed and disclosed within Caton to provide the product authentication through the website server and Kandregula teaches the specific URL redirection as discussed above. The combination teaches the above-enclosed limitations of the QR code system for product authentication, however, the combination does not explicitly state URL for the QR code redirection; It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention for the QR code system to provide product authentication with elements includes a website server and redirection elements to include a similar QR code system that specifically provides a mapping table for URL as taught by Kandregula since the claimed invention is merely a combination of prior art elements and in the combination each element would have performed the same function as it did separately and one of ordinary skill in the art would have recognized the results of the combination as predictable. Regarding claim 2, the combination teaches the above-enclosed limitations of the system (100) as claimed in claim 1, Caton further discloses wherein said verification server (114) comprises: a first repository (116) configured to store a list of registered products and UIDs associated with each of said products; and a verification module (118) configured to receive said extracted UID from said first re-direction module (106), and crawl through said list stored in said first repository (116) to identify whether or not said UID exists in said list, i. if said UID is identified in said list, said verification module (118) configured to generate a verification successful message and optionally delete/kill said identified UID from said list; and ii. if said UID is not identified in said list, said verification module (118) configured to generate a verification failure message (Fig 1, 4A-C, and paragraphs [139-145]; Caton discloses the use of verification messages based on the authentic/counterfeit document code provided by the scanned information. This includes a counterfeit message if counterfeit and an authentication message based on authentication information. Further, Caton discloses [225-230] the removal of ID based on single use authentication for the code that provides the authentication message then removes the code from the mapping database to send non-verified message for any subsequent attempt.). Regarding claim 3, the combination teaches the above-enclosed limitations of the system (100) as claimed in claim 1, Caton further discloses wherein said product identification module (108), said scanning module (104), said first re-direction module (106) and said second re-direction module (110) are configured in a user device (112) and implemented using one or more processor(s) of said user device (112) (Fig 1-3, 16A, 16B, and paragraphs [72-74 and 93-97]; Caton discloses the user device and other system elements to provide the modules and configuration elements.). Regarding claim 4, the combination teaches the above-enclosed limitations of the system (100) as claimed in claim 3, Caton further discloses wherein either of said verification failure message or said verification successful message is displayed on said user device (112) indicating whether or not said product is a verified product (Fig 1, 4A-C, and paragraphs [139-145]; Caton discloses the use of verification messages displayed on the user device.). Regarding claim 5, the combination teaches the above-enclosed limitations of the system (100) as claimed in claim 1, Caton further discloses wherein said scanning module (104) is configured in a user device (112), said product identification module (108), said first re-direction module (106) and said second re-direction module (110) are configured in said verification server (114) and implemented using one or more processor(s) of said verification server (114) (Fig 1-3, 16A, 16B, and paragraphs [72-74 and 93-97]; Caton discloses the user device and other system elements to provide the modules and configuration elements.). Regarding claim 6, the combination teaches the above-enclosed limitations of the system (100) as claimed in claim 1, Tscherepanow teaches wherein said product identification module (108) includes a second identification unit (126) configured to receive said detected design and use said pre-trained machine learning model to identify said product based on said detected design (Paragraphs [50-59 and 105-110]; Tscherepanow teaches a similar QR code matching system that specifically provides a trained machine learning model to provide identification for the codes. The combination is that Caton provides the system elements including the received design and identification and Tscherepanow teaches a similar QR code system specifically to provide identification through a trained ML model.). Caton discloses a QR code system to provide product authentication based on the detected design and other features, however, Caton does not specifically teach machine learning models to provide the identification; Tscherepanow teaches a similar QR code system that specifically provides a trained machine learning model to provide identification of the code. It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention for the QR code system to provide product authentication based on the detected design and other features of Caton the ability to include a similar QR code system that specifically provides a trained machine learning model to provide identification of the code as taught by Tscherepanow since the claimed invention is merely a combination of prior art elements and in the combination each element would have performed the same function as it did separately and one of ordinary skill in the art would have recognized the results of the combination as predictable. Regarding claim 7, the combination teaches the above-enclosed limitations of the system (100) as claimed in claim 1, Caton further discloses wherein said product identification module (108) includes a flag generator (120) configured to cooperate with said memory (102) to receive said detected design, recognize said products using said pre-trained machine learning model, and generate a flag signal on successful recognition of said products, said flag generator (120) further configured to transmit said flag signal to said first re-direction module (106) for appending URL for forceful redirection (Fig 1, 4A-C, and paragraphs [139-145]; Caton discloses the use of verification messages based on the authentic/counterfeit document code provided by the scanned information. This includes a counterfeit message if counterfeit and an authentication message based on authentication information. Within the combination, Tscherepanow teaches the machine learning identification.). Regarding claim 8, the combination teaches the above-enclosed limitations of the system (100) as claimed in claim 1, Caton further discloses wherein said first re-direction module (106) includes: a receiving unit (128) configured to cooperate with said scanning module (104) and said product identification module (108) to receive said extracted UID and said verification URL if said product is identified; a screening unit (130) comprising: i. a parser (132) configured to parse through said extracted URL and generate at least one token; and ii. an authenticator (134) configured to cooperate with said parser to receive said generated token and compare said received token with a standard pre-stored string to determine whether or not said URL authentic, a forwarding unit (136) configured to cooperate with said screening unit to re-direct said user to said verification server (114) at said extracted URL for product verification if said URL is found to be authentic when said generated token is same as said standard pre-stored string (Paragraphs [135-148 and 154-157]; Caton discloses the system to OCR and provide the authentication determination based on the id and other information extracted from the code. This includes redirected to the authentication determination of authentic or counterfeit.); and an appending unit (138) configured to append said extracted contents of said visual code (UID and verification URL) to said a pre-stored URL of said verification server (114) if said extracted URL is found to be spurious, when said generated token is not same as said standard pre-stored string, said appending unit (138) further configured to forcefully re-direct said user to said genuine verification server (114) at said appended URL for product verification (Paragraphs [135-148 and 154-157]; Caton discloses the system to OCR and provide the authentication determination based on the id and other information extracted from the code. This includes redirected to the authentication determination of authentic or counterfeit. When the code is counterfeit the system redirects to provide the counterfeit message and provides the ID and other information to third party services and directs the user to the authenticated indicator. This is further shown in paragraphs [225-230].). Regarding claim 9, the combination teaches the above-enclosed limitations of the system (100) as claimed in claim 1, Caton further discloses wherein said product identification module (108) is configured to first detect said visual code printed on product packaging, and then use the detected visual code's location and scale as a reference for detecting and identifying said design printed on product packaging for product identification (Figs 7A-7D, 9A-9D, and paragraphs [132-139, 160-171, 181-184, and 254-256]; Caton discloses the design printed and identified based on reference to location and other elements to detect the code and hidden features.). Regarding claim 10, Caton discloses a method (200) for authenticating a product, said method (200) comprising the following steps: detecting (204), by a product identification module (108), a design printed on the packaging of said products, said design comprising at least one of an artwork, a text in and around a visual code, a brand logo, and a relative position and size of said visual code and said artwork, text, or brand logo (Fig 1, 4A, 7A-D, and paragraphs [ and 175]; Caton discloses a character/symbol arrangement design that includes a code with text and other elements around the QR code for document (product) identification.); identifying (206), by said product identification module (108), said products based on said detected design (Fig 1, 4A, and paragraphs [140-149]; Caton discloses mapping rules based on the image data to identify the document with the hidden/overt security features.); facilitating (208), by a scanning module (104), at least one user to scan said visual codes printed on said products, each visual code including an embedded information comprising a unique identification number (UID) of associated product and a verification URL; extracting (210), by said scanning module (104), said UIDs and said verification URLs from said scanned visual code (Fig 1, 4A, and paragraphs [185-186, 212-218, and 230-238]; Caton discloses authentication links to website elements and extracting the elements through the QR code (visual code) to produce the identification/authentication information.); receiving (212), by a first re-direction module (106), said extracted UID and said verification URL if said product is identified;" screening (214), by said first re-direction module (106), said extracted URL to identify its authenticity; re-directing (216), by said first re-direction module (106), said user to a verification server at said extracted URL for product verification if said URL is found to be authentic; or appending (218), by said first re-direction module (106), said extracted UID to said extracted URL if said URL is found to be spurious and forcefully re- directing said user to said verification server at said appended URL for product verification (Fig 1, 16B, and paragraphs [139-147, 215-219, and 228-232]; Caton discloses providing verification to the authentication website server based on the captured image of the security elements within the code This includes user identity and other aspects that include access control and re-direct to an authentication display based on the authentication of the security elements.); receiving (220), by a second re-direction module (110), said extracted UID and said verification URL; and re-directing (222), by said second re-direction module (110), said user to a third-party verification platform at said embedded URL for product verification if said product is not identified (Fig 1, 4A, and paragraphs [93-97, 140-149 and 228-231]; Caton discloses elements of providing third party services and authentication elements based on counterfeit verification for the product. This includes elements of re-direction and other aspects including providing user session information and the code within the counterfeit image.). Caton discloses the above-enclosed limitations of the QR code and product authentication system based on the information within the image, however, the combination does not specifically teach using machine learning model to identify the product; Tscherepanow teaches storing (202), in a memory (102), a machine learning model trained using image data of a plurality of said products; identifying (206), by said product identification module (108), said products based on said pre-trained machine learning model and said detected design (Paragraphs [50-59 and 105-110]; Tscherepanow teaches a similar QR code matching system that specifically provides a trained machine learning model to provide identification for the codes. The combination is that Caton provides the product authentication and identification based on matching QR code and other logo elements and Tscherepanow teaches a similar QR code system specifically to provide identification through a trained ML model.). Caton discloses a QR code system to provide product authentication based on the detected design and other features, however, Caton does not specifically teach machine learning models to provide the identification; Tscherepanow teaches a similar QR code system that specifically provides a trained machine learning model to provide identification of the code. It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention for the QR code system to provide product authentication based on the detected design and other features of Caton the ability to include a similar QR code system that specifically provides a trained machine learning model to provide identification of the code as taught by Tscherepanow since the claimed invention is merely a combination of prior art elements and in the combination each element would have performed the same function as it did separately and one of ordinary skill in the art would have recognized the results of the combination as predictable. The combination teaches the above-enclosed limitations of the QR code system for product authentication, however, the combination does not explicitly state URL for the QR code redirection; Kandregula teaches a similar QR code system that specifically provides the mapping table that redirects to a URL (Fig 4 and paragraphs [65-68]). This would be in combination with the website server and other mapping tables that are discussed and disclosed within Caton to provide the product authentication through the website server and Kandregula teaches the specific URL redirection as discussed above. The combination teaches the above-enclosed limitations of the QR code system for product authentication, however, the combination does not explicitly state URL for the QR code redirection; It would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention for the QR code system to provide product authentication with elements includes a website server and redirection elements to include a similar QR code system that specifically provides a mapping table for URL as taught by Kandregula since the claimed invention is merely a combination of prior art elements and in the combination each element would have performed the same function as it did separately and one of ordinary skill in the art would have recognized the results of the combination as predictable. Conclusion THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to ANDREW CHASE LAKHANI whose telephone number is (571)272-5687. The examiner can normally be reached M-F 730am - 5pm (EST). Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Sarah Monfeldt can be reached at 571-270-1833. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /ANDREW CHASE LAKHANI/Primary Examiner, Art Unit 3629
Read full office action

Prosecution Timeline

Dec 15, 2023
Application Filed
Sep 17, 2025
Non-Final Rejection — §103
Dec 12, 2025
Response Filed
Mar 11, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12591858
TURF MAINTENANCE SYSTEM AND METHODS
2y 5m to grant Granted Mar 31, 2026
Patent 12572898
SITE MAINTENANCE UTILIZING AUTONOMOUS VEHICLES
2y 5m to grant Granted Mar 10, 2026
Patent 12554014
DETERMINING RESTROOM OCCUPANCY
2y 5m to grant Granted Feb 17, 2026
Patent 12488355
LIMITING BATTERY DEGRADATION FOR A GROUP OF VEHICLES
2y 5m to grant Granted Dec 02, 2025
Patent 12475519
METHODS AND SYSTEMS OF ENVIRONMENTAL MONITORING BASED ON INTELLIGENT GAS REGULATORY INTERNET OF THINGS (IoTs)
2y 5m to grant Granted Nov 18, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
22%
Grant Probability
53%
With Interview (+30.4%)
3y 0m
Median Time to Grant
Moderate
PTA Risk
Based on 174 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month