Prosecution Insights
Last updated: April 19, 2026
Application No. 18/545,484

SYSTEMS AND METHODS FOR PROVIDING A DYNAMIC DEVICE TRUST DASHBOARD

Non-Final OA §101
Filed
Dec 19, 2023
Examiner
KIM, STEVEN S
Art Unit
3698
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Wells Fargo Bank N A
OA Round
1 (Non-Final)
37%
Grant Probability
At Risk
1-2
OA Rounds
5y 2m
To Grant
78%
With Interview

Examiner Intelligence

Grants only 37% of cases
37%
Career Allow Rate
170 granted / 454 resolved
-14.6% vs TC avg
Strong +40% interview lift
Without
With
+40.3%
Interview Lift
resolved cases with interview
Typical timeline
5y 2m
Avg Prosecution
35 currently pending
Career history
489
Total Applications
across all art units

Statute-Specific Performance

§101
23.8%
-16.2% vs TC avg
§103
31.6%
-8.4% vs TC avg
§102
8.2%
-31.8% vs TC avg
§112
31.2%
-8.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 454 resolved cases

Office Action

§101
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . This non-final action is in response to the applicant’s communication received on 10/15/2025 (“Response”). Information Disclosure Statement (IDS) The IDSs received on 12/19/2025 is considered by the examiner. Restriction/Election Acknowledgement The Applicant’s election on claims 2-7 with claims 1, 19, and 20 being linking claims without traverse in the Response is acknowledged. Claims 8-18 are withdrawn from further consideration pursuant to 37 CFR 1.142(b) as being drawn to a nonelected group(s). Claim Status Claims 8-18 have been withdrawn. Claims 1-20 are pending. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-7, 19, and 20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-statutory subject matter. The claim(s) does not fall within at least one of the four categories of patent eligible subject matter because the claimed invention is directed to a judicial exception (i.e., a law of nature, a natural phenomenon, or an abstract idea) without significantly more. MPEP 2106 provides step(s) in determining eligibility under 35 U.S.C. § 101. Specifically, it must be determined whether the claim is directed to one of the four statutory categories of invention, i.e., process, machine, manufacture, or composition of matter. If the claim does fall within one of the statutory categories, it must then be determined whether the claim is directed to a judicial exception (i.e., law of nature, natural phenomenon, and abstract idea), and if so, it must additionally be determined whether the claim is a patent-eligible application of the exception. If an abstract idea is present in the claim, any additional elements in the claim must integrate the judicial exception into a practical application. If not, the inquiry continues to see whether any element or combination of elements in the claim must be sufficient to ensure that the claim amounts to significantly more than the abstract idea itself. Examples of abstract ideas include mathematical concepts, mental processes, and certain methods of organizing human activities. Under Step 1, claims 1-7 are directed to a method (i.e. process), claim 19 directed to an apparatus, while claim 20 is directed to a non-transitory computer-readable storage medium. Thus, the claimed inventions are directed towards one of the four statutory categories under 35 USC § 101. Nevertheless, the claims also fall within the judicial exception of an abstract idea without significantly more. Step 2A, 1st prong: Claim 1 recites: A method for providing a device trust dashboard, the method comprising: generating, by device management circuitry, a device profile for a first user device associated with a user account of a user; determining, by the device management circuitry and based on a device feature set associated with the first user device, a device trust score for the first user device; determining, by the device management circuitry and based on the device trust score and a user preference set associated with the user, an authorization rule set for the first user device; updating, by the device management circuitry, the device profile for the first user device to comprise the device trust score for the first user device and the authorization rule set for the first user device; receiving, by communications hardware, a device trust dashboard request, wherein the device trust dashboard request comprises candidate user credentials; performing, by verification circuitry and based on the received candidate user credentials, a verification routine for the user; and in an instance in which the user is successfully verified, providing, by the communications hardware, the device trust dashboard, wherein the device trust dashboard comprises at least a representation of the device profile for the first user device. (Emphasis added on the additional element(s)) The claim recites a process of providing representation of a device profile for a first user device (i.e., displaying the device profile) in an instance in which the user who requests the device profile is successfully verified using received user credentials. As such, the claim recites a method of organizing human activity (i.e., following rules or instructions in providing information). The claim further recites generation and updating of the device profile by generating a device profile for a first user device associated with a user account of a user; determining, based on a device feature set associated with the first user device, a device trust score for the first user device; determining, based on the device trust score and a user preference set associated with the user, an authorization rule set for the first user device; and updating the device profile for the first user device to comprise the device trust score for the first user device and the authorization rule set for the first user device. As such, these step(s) recite mental processes that can be performed in the human mind with pen and paper. Other independent claims, claims 19 and 20, are significantly similar to claim 1. As such, claims 19 and 20 also recite abstract idea. Under the Step 2A (prong 2), this judicial exception is not integrated into a practical application. Specifically, the additional elements in the claim(s), i.e. circuitry(s), communication hardware, dashboard, an apparatus comprising the circuitry(s), the communication hardware, and computer product comprising at least one a non-transitory computer-readable storage medium storing software are recited at a high-level generality such that it amounts to no more than mere instructions to implement the abstract idea as described above in the Step 2A (prong 1), and/or merely uses a computer (i.e., device, processor, database, program, server) as a tool to perform an abstract idea – see MPEP 2106.05(f). These limitation(s) do not represent: Improvements to the functioning of additional elements individually or in combination, or to any other technology or technical field - see MPEP 2106.05(a). Furthermore, the dashboard is merely a mean for outputting the device profile, i.e., insignificant extract-solution activity to the judicial exception – see MPEP 2106.05(f). Under Step 2B, examiners should evaluate additional elements individually and in combination to determine whether they provide an inventive concept (i.e. whether the additional elements amount to significantly more than the exception itself). Here, the claim(s) do not include additional elements that are sufficient to amount to significantly more than the judicial exception. Specifically, the claims as a whole, taken individually and in combination, do not provide an inventive concept. As explained above with respect to the integration of the abstract idea into a practical application, the additional elements used to perform the claimed judicial exception amount to no more than mere instructions to implement the abstract idea on a computer, and/or merely uses a computer as a tool to perform an abstract idea and/or generally linking the use of the judicial exception to a particular environment (i.e., virtual environment). Mere instructions to implement the abstract idea on a computer, or merely using the computer as a tool to perform an abstract idea to apply the exception using a generic computer component cannot provide an inventive concept. Looking at the limitations as a combination adds nothing that is not already present when looking at the elements taken individually. There is no indication that the combination of the elements improves the functioning of the recited computer, processor, user device, and/or the database. For these reasons, the claims are rejected under 35 U.S.C. § 101 as being directed to non-statutory subject matter. Dependent claim 2 further expands on the abstract idea of generating and providing a trust improvement event, detecting of the event and updating of the trust score based on the performance of the event. Dependent claims 3-5 further expands on the abstract idea of claim 2 with additional description of what the trust improvement event includes, i.e., performing an action at one of the one or more candidate ATMs using the first user device; transaction with one or more candidate merchants using the first user device; visit one of the one or more candidate institution locations and perform an authentication routine using the first user device. In other words, the claim further expands on the description of the data that is determined and detected. Dependent claim 6 further expands on the abstract idea of authentication for updating the device trust score. Dependent claim 7 further expands on the abstract idea of using captured image for authentication for updating of the device trust score. Accordingly, it is determined that claims 1, 3-9, 11-12, and 20 are directed to non-statutory subject matter under 35 U.S.C. § 101 and are ineligible. Conclusion The cited references, either alone or in combination, do not teach the particulars of the claimed elements as a whole. See below analysis. The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. US 20220114587 A1 discloses system and method for binding device(s) with a hub of a local network. The publication discloses creating a device profile for the device which includes information such as spending controls and a device identifier. Upon receiving payment request from the device, the device is authenticated using the device identifier and the payment parameters of the payment request are determined in order to verify that the parameters do not violate the spending control in the device profile. The publication further discloses client device that receives and displays screens including device profiles and also use of username and password to provide information regarding payment rules and limits of any of devices. The disclosure, however, does teach device trust score, the generation of the device trust score, and that the device trust score along with the user preference are used to determine the authorization rules of the device as recited in the claim. US 20120233665 A1 discloses assigning of a dynamic trust score that may be updated as needed, wherein the trust score of a device and the updates are based on various activities and information associated with the device. The trust score is based on parameters of the device, i.e., device type, registered device location, device phone number, device ID, etc., and activities the device engages in such of amount of transactions, dollar amount of transactions, amount of denied transactions, amount of denied requests, amount of approved requests, location of requests, etc. The disclosure also discloses a device profile that includes the dynamic trust score. Since the trust score is dynamic, a system receiving a transaction from the device can have more accurate information about the device and allow accurate assessment of the risk associated with the request. The disclosure, however, does not teach that the device profile includes the authorization rule, generating of the authorization rule based on the device trust score and a user preference set associated with the user of the user device, and user credential protected dashboard comprising of at least a representation of the device profile for the device. US 10826889 B2 discloses a device that determines a registered device associated with the customer is a trusted device, a location trust value for the applicant device based on a geolocation proximity between the applicant device and the trusted device, and an environment trust value for the applicant device based on a proximity in a network topology between the applicant device and the trusted device. The device further determines a trust score for the applicant device based on the location trust value and the environment trust value, and sends a signed certificate to the applicant device over the network when the trust score for the applicant device exceeds a threshold. The patent also discloses a dashboard that shows device profile including trust score. PNG media_image1.png 826 1515 media_image1.png Greyscale The patent, however, does not teach the particulars of determining of authorization rule set for the device based on the device trust score and a user preference set associated with the user and updating of the device profile to include the user device trust score and the authorization rule set for the user device. US 20100274597 A1 discloses a methods and systems for establishing an identity confidence database, particularly activities that either increase or decrease confidence score in a customer and granting of additional privileges or removing of privileges based on the dynamic confidence score. Any inquiry concerning this communication or earlier communications from the examiner should be directed to STEVEN S KIM whose telephone number is (571)270-5287. The examiner can normally be reached Monday -Friday: 7:00 - 3:30. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Patrick McAtee can be reached on 571-272-7575. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /STEVEN S KIM/Primary Examiner, Art Unit 3698
Read full office action

Prosecution Timeline

Dec 19, 2023
Application Filed
Nov 07, 2025
Non-Final Rejection — §101
Jan 28, 2026
Interview Requested
Feb 11, 2026
Applicant Interview (Telephonic)
Feb 11, 2026
Examiner Interview Summary

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12586067
DUPLICATING SMART CONTRACTS WITH TERMINATION CONDITION
2y 5m to grant Granted Mar 24, 2026
Patent 12572924
OFFLINE CRYPTO ASSET CUSTODIAN
2y 5m to grant Granted Mar 10, 2026
Patent 12567068
DEVICES, SYSTEMS, AND METHODS FOR ENHANCING TRANSACTIONS VIA A BLOCKCHAIN NETWORK
2y 5m to grant Granted Mar 03, 2026
Patent 12561681
ACQUISITION OF DIGITAL ASSETS ON A BLOCKCHAIN USING OFF-CHAIN VALUATION AND AUTHORIZATION
2y 5m to grant Granted Feb 24, 2026
Patent 12505438
SECURE PROVISION OF UNDETERMINED DATA FROM AN UNDETERMINED SOURCE INTO THE LOCKING SCRIPT OF A BLOCKCHAIN TRANSACTION
2y 5m to grant Granted Dec 23, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
37%
Grant Probability
78%
With Interview (+40.3%)
5y 2m
Median Time to Grant
Low
PTA Risk
Based on 454 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month