DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claim Rejections - 35 USC § 101
35 U.S.C. 101 reads as follows:
Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.
Claims 42-91 are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-patentable subject matter. The claimed invention is directed to one or more abstract ideas without significantly more. The judicial exception is not integrated into a practical application. The claims do not include additional elements that are sufficient to amount to significantly more than judicial exception. The eligibility analysis in support of these findings is provided below.
Step 1:
The claimed method (claims 42-91) is directed to one of the eligible categories of subject matter and therefore satisfies step 1.
Step 2A, Prong One:
Independent claim 42 and 89 recite the following limitations that can be practically performed in the mind: providing a solution to a technical problem.
Step 2A, Prong Two:
The additional elements are:
analysing/querying a network node, such as a blockchain node or other database node, in which the instance of the optimisable proof of work problem has been deployed at the network node as part of a protocol requiring optimisable proof of work to be performed by running or executing an algorithm on the node, or another node in the network.
These additional elements are using generic computer functions as a tool to perform.
Step 2B:
For Step 2B, the additional elements, taken individually and in combination, do not result in the claim, as a whole, amounting to significantly more than the identified judicial exception. MPEP 2106.07(a)(III)(B) identifies the list of cases in MPEP 2106. 05(d)(II) as available bases. Taking these aforementioned additional elements as an ordered combination, these additional elements add nothing that is not already present when the elements are considered separately.
As per dependent claims 43-88 and 90-91:
The additional elements of dependent claims are directed to generic computer functions.
Claim Rejections - 35 USC § 103
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
Claims 42-91 are rejected under 35 U.S.C. 103(a) as being unpatentable over Zhu (US Pub. 2020/0013027) in view of Varilly.
Regarding claim 42, Zhu discloses a computer-implemented method of generating an instance of an optimisable proof of work problem (¶ [0035], the validation step requires some form of consensus among the blockchain nodes, such as through proof of work (PoW) or proof of stake (PoS)), comprising the step of analysing/querying a network node, such as a blockchain node or other database node (¶ [0035], disclosing the block chain nodes), in which the instance of the optimisable proof of work problem has been deployed at the network node as part of a protocol requiring optimisable proof of work to be performed by running or executing an algorithm on the node, or another node in the network (¶ [0035], the miner nodes generate the new blocks as well as validate the transactions in the blocks. In present PoS systems, the validators are allowed… using the PoS and PoW [proof of work] validation mechanisms).
While Zhu discloses proof of work, but does not explicitly disclose optimizable proof of work; however, Varilly, in the same field of endeavor, discloses optimizable proof of work (p. 6, lines 20-25;). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Varilly’s disclosure into Zhu to find the solver who found best valid solution to the problem statement.
Regarding claim 43, Zhu in view of Varilly discloses the method of Claim 42 including the step of retrieving, at the node, parameters necessary to generate the instances of problems (V, p. 9, lines 3-9, set of decision problems for which the problem instances, where foe answer is "yes", have proofs verifiable in polynomial time).
Regarding claim 44, Zhu in view of Varilly discloses the method of Claim 43 in which the parameters include difficulty parameters (p. 7, lines 1-8; public input parameters).
Regarding claim 45, Zhu in view of Varilly discloses the method of Claim 43 in which the parameters include a timestamp (¶ [0029], at least a timestamp).
Regarding claim 46, Zhu in view of Varilly discloses the method of Claim 43 in which the parameters are used to derive a random seed (¶ [0070], the random selection of the validation committee is done using a seed produced by a PoW miner).
Regarding claim 47, Zhu in view of Varilly discloses the method of Claim 46 in which the random seed is substantially impossible to predict or replicate (¶ [0094], impossible to do by proposing a longer blockchain).
Regarding claim 48, Zhu in view of Varilly discloses the method of Claim 47 in which the random seed is derived from a timestamp (¶ [0070]).
Regarding claim 49, Zhu in view of Varilly discloses the method of Claim 48 in which the random seed is derived from a timestamp and unpredictable data (¶ [0041], nodes that have different consensus rules are actually using two different networks or currencies, and changing any of the rules requires hard fork).
Regarding claim 50, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm runs or executes on the node, or another node in the network, to solve an instance of the optimisable proof of work problem (Varilly, p. 6, lines 20-25).
Regarding claim 51, Zhu in view of Varilly discloses the method of Claim 42 including the step of, at the node or another node on the network, verifying a solution to an instance of the optimisable proof of work problem (¶ [0061], verifiable).
Regarding claim 52, Zhu in view of Varilly discloses the method of Claim 42 in which the network node is a blockchain node (¶ [0035]).
Regarding claim 53, Zhu in view of Varilly discloses the method of Claim 42 in which the network node is a blockchain node and the analysis or querying of the node is to determine block addition or reward (¶ [0047], a block reward).
Regarding claim 54, Zhu in view of Varilly discloses the method of Claim 42 in which the network node is a database node (¶ [0035]).
Regarding claim 55, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm outputs or generates a solution to a proof of work problem (¶ [0035]).
Regarding claim 56, Zhu in view of Varilly discloses the method of Claim 42 in which there are multiple algorithms that each generate a solution to a different proof of work problem (¶ [0007]).
Regarding claim 57, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to an inverse problem (¶ [0056]).
Regarding claim 58, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to a NP problem (Varilly, p.3, lines 10-13).
Regarding claim 59, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to a NP-complete problem (Varilly, p.3, lines 10-13).
Regarding claim 60, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to a computational problem that is computationally demanding to solve but for which it is relatively efficient to verify the correctness of a solution (¶ [0041], ¶ [0061]).
Regarding claim 61, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to an NP-hard problem (Varilly, p.3, lines 10-13, NP related).
Regarding claim 62, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to an asymmetric problem (p. 3, lines 18-26).
Regarding claim 63, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to a quantum resistant problem (¶ [0033]).
Regarding claim 64, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to a problem dependent on human input (Varilly, Fig. 3).
Regarding claim 65, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to a progress-free problem (¶ [0083]).
Regarding claim 66, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to a sequential problem (¶ [0033]).
Regarding claim 67, Zhu in view of Varilly discloses the method of Claim 42 in which the algorithm generates a solution to a verifiable delay function (VDF) (¶ [0052]).
Regarding claim 68, Zhu in view of Varilly discloses the method of Claim 69 in which the algorithm generates a solution to an optimisable problem in hardware and/or software (¶ [0035]).
Regarding claim 69, Zhu in view of Varilly discloses the method of Claim 42 in which the step of analysing/querying the network node is performed to assess the performance of the algorithm (¶ [0004]).
Regarding claim 70, Zhu in view of Varilly discloses the method of Claim 42 in which the step of analysing/querying the network node is performed to assess performance of an implementation of the algorithm (¶ [0033]).
Regarding claim 71, Zhu in view of Varilly discloses the method of Claim 42 in which the step of analysing/querying the network node is performed to assess performance of computer hardware (¶ [0033]).
Regarding claim 72, Zhu in view of Varilly discloses the method of Claim 42 in which the step of analysing/querying the network node is performed to produce a proof of work (¶ [0035]).
Regarding claim 73, Zhu in view of Varilly discloses the method of Claim 42 in which the step of analysing/querying the network node is performed to earn a reward (¶ [0047], a block reward).
Regarding claim 74, Zhu in view of Varilly discloses the method of Claim 42 in which the step of analysing/querying the network node in which the algorithm has been deployed is performed in order to find a solution to a useful problem (¶ [0035]).
Regarding claim 75, Zhu in view of Varilly discloses the method of Claim 42 including the step of providing multiple optimisable proof of work problems to prevent centralisation of power or influence in the network (¶ [0031]).
Regarding claim 76, Zhu in view of Varilly discloses the method of Claim 42 including the step of providing multiple optimisable proof of work problems to prevent centralisation of power or influence in a blockchain consensus mechanism (¶ [0031]).
Regarding claim 77, Zhu in view of Varilly discloses the method of Claim 75in which there are multiple algorithms that each generate a solution to a different optimisable proof of work problem and the method provides that deploying a significant optimisation with respect to a single optimisable proof of work problem does not result in a significant advantage (Varilly, p. 9).
Regarding claim 78, Zhu in view of Varilly discloses the method of Claim 76 including the step of determining the influence of a node on a blockchain consensus mechanism based on an off-chain stake or balance of tokens recorded on-chain (¶¶ [0034]-[0035], block-chain tokens).
Regarding claim 79, Zhu in view of Varilly discloses the method of Claim 42 including the step of retrieving, at the node, parameters necessary to generate the instances of problems, in which the parameters include difficulty parameters and the method includes the further step of updating at least one of the difficulty parameters to control the computational cost of computing a solution to an instance of the optimisable proof of work problem (¶ [0097, updating the ledger).
Regarding claim 80, Zhu in view of Varilly discloses the method of Claim 42 including the step of retrieving, at the node, parameters necessary to generate the instances of problems, in which the parameters include difficulty parameters and the method includes the further step of updating at least one of the difficulty parameters in order to modify the probability of computing a solution to an instance of the optimisable proof of work problem (¶ [0097, updating the ledger).
Regarding claim 81, Zhu in view of Varilly discloses the method of Claim 42 including the step of controlling the distribution of block rewards to improve participation in a distributed blockchain consensus algorithm (¶ [0070], participating in block validation process).
Regarding claim 82, Zhu in view of Varilly discloses the method of claim 42, including the step of identifying a solution by: (i) determining a first factor relating to a computational power devoted by a further node to a first proof of work problem; and (ii) determining a second factor relating to a computational power devoted by the further node to a second proof of work problem (Varilly, Fig. 7a).
Regarding claim 83, Zhu in view of Varilly discloses the method of Claim 82, wherein the influence of and/or the reward for the further node is dependent on one or more of: i. the centre of the distribution of factors; ii. the spread of the distribution of factors; iii. a minimum factor; iv. an average of factors; v. a distribution of factors; vi. a variance of factors; and vii. a parity between factor values, preferably wherein there is a penalty for exceeding a threshold disparity (¶ [0037]).
Regarding claim 84, Zhu in view of Varilly discloses the method of Claim 82, wherein the influence of a further node is dependent on at least one non-proof-of-work sybil-defence factor and/or wherein determining the influence of the further node comprises determining that the further node is a proposer, validator, and/or signer of a record of the network (¶ [0006], validators).
Regarding claim 85, Zhu in view of Varilly discloses the method of Claim 82, wherein there is at least one further proof of work problem that comprises a progress-free and/or non-optimisable problem, preferably wherein the influence of the further node on the consensus mechanism is dependent on said proof of work problem (¶ [0033]; a consensus requirement).
Regarding claim 86, Zhu in view of Varilly discloses the method of Claim 82, wherein at least one of the proof of work problems comprises a non-progress-free and/or optimisable problem, and wherein the reward, but not the influence, of the further node on a consensus mechanism is dependent on said proof of work problem (¶ [0033]; a consensus requirement).
Regarding claim 87, Zhu in view of Varilly discloses the method of Claim 82 further comprising determining a threshold value relating to one or more of: i. a maximum permitted value of the first factor and/or the second factor of the further node; ii. a maximum permitted increase in the first factor and/or the second factor of the further node over a unit of time and/or over a number of records of the network; and iii. a maximum permitted disparity between the first factor and the second factor of the further node (¶ [0037]);
preferably, wherein the threshold value is dependent on one or more of: a. a hardcoded value; b. a popular vote by the nodes of the network; c. a computational cost associated with the first factor and/or the second factor; a transaction recorded on the network; and d. an external input, preferably a bid from an external party (¶ [0037]).
Regarding claim 88, Zhu in view of Varilly discloses the method of claim 86, wherein exceeding the threshold value is associated with a penalty, preferably wherein: the penalty relates to a redistribution of an amount of the first factor and/or the second factor of the further node among the other nodes of the network; and/or the penalty is dependent on one or more of: a magnitude of a disparity between the first factor and the second factor, more preferably wherein the penalty increases with the magnitude, yet more preferably wherein the penalty increases exponentially and/or in a stepped manner; a cost related to the node altering the first factor and/or the second factor; and the factors of other nodes (¶ [0063]).
Regarding claim 89, Zhu discloses a computer-implemented method of running/executing an algorithm to generate a solution to a technical problem (¶ [0029], randomly selected from the candidate pool by the results of a PoW method using miners to solve cryptographic puzzles), in which the algorithm has been performance assessed when deployed as part of a process requiring optimisable proof of work to be performed (¶ [0035], the validation step requires some form of consensus among the blockchain nodes, such as through proof of work (PoW) or proof of stake (PoS)).
While Zhu discloses proof of work, but does not explicitly disclose optimizable proof of work; however, Varilly, in the same field of endeavor, discloses optimizable proof of work (p. 6, lines 20-25;). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Varilly’s disclosure into Zhu to find the solver who found best valid solution to the problem statement.
Regarding claim 90, Zhu in view of Varilly discloses the computer-implemented method of Claim 81, in which the process includes a computer-implemented method of generating an instance of an optimisable proof of work problem, comprising the step of analysing/querying a network node, such as a blockchain node or other database node, in which the instance of the problem has been deployed at the network node as part of a protocol requiring optimisable proof of work to be performed by an algorithm running or executing on the node, or another node in the network (¶ [0035]).
Regarding claim 91, Zhu in view of Varilly discloses the computer-implemented method of Claim 81 in which the algorithm generates a solution to one or more of the following: i. a computational problem that is computationally demanding to solve but for which it is relatively efficient to verify the correctness of a solution, ii. an inverse problem, iii. a NP problem (Varilly, p.3, lines 10-13), iv. a NP-complete problem, v. an NP-hard problem, vi. an asymmetric problem, vii. a quantum resistant problem, viii. a problem dependent on human input, ix. a progress-free problem, x. a sequential problem, xi. a verifiable delay function (VDF), and xii. an optimisable problem in hardware and/or software.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to TUANKHANH D PHAN whose telephone number is (571)270-3047. The examiner can normally be reached on Mon-Fri, 10:00am-18:00pm.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Boris Gorney can be reached on 571-270-5626. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of an application may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 or 571-272-1000.
/TUANKHANH D PHAN/ Examiner, Art Unit 2154