Prosecution Insights
Last updated: April 19, 2026
Application No. 18/571,692

APPLICATION DATA PROCESSING METHOD, APPARATUS, ELECTRONIC DEVICE AND STORAGE MEDIUM

Final Rejection §103
Filed
Dec 18, 2023
Examiner
NAHAR, SAYEDA S
Art Unit
2435
Tech Center
2400 — Computer Networks
Assignee
BEIJING ZITIAO NETWORK TECHNOLOGY CO., LTD.
OA Round
2 (Final)
67%
Grant Probability
Favorable
3-4
OA Rounds
3y 5m
To Grant
99%
With Interview

Examiner Intelligence

Grants 67% — above average
67%
Career Allow Rate
18 granted / 27 resolved
+8.7% vs TC avg
Strong +36% interview lift
Without
With
+35.8%
Interview Lift
resolved cases with interview
Typical timeline
3y 5m
Avg Prosecution
25 currently pending
Career history
52
Total Applications
across all art units

Statute-Specific Performance

§101
14.0%
-26.0% vs TC avg
§103
61.6%
+21.6% vs TC avg
§102
4.4%
-35.6% vs TC avg
§112
17.6%
-22.4% vs TC avg
Black line = Tech Center average estimate • Based on career data from 27 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Amendment 2. This is in response to the amendments filed on 12/23/2025. Claims 1, 10, 12, 13, and 22 have been amended. Claims 1-22 are currently pending and have been considered below. The 101 rejections to the claims 1-22 and 112(a) rejection to the claims 8 and 21 has been reconsidered and withdrawn. Response to Arguments 3. Applicant’s arguments filed on 12/23/2025 have been fully considered but they are not persuasive. On the Remarks, Applicant argues that Dasi does not disclose ”the first application cannot directly transmit data to a second application running on the operating system of the …..device”. Dasi does not disclose “acquiring target data …… in response to a data replication instruction associated with a first application”. Behzadi does not disclose that “the clipboard comprises a system-level application running on the operating system of the electronic device that is configured to cache data”. Behzadi does not disclose “loading the temporary file by the second application to obtain the target data”. Dasi does not disclose that the target data is generated during a process of running the first application on an operating system of the electronic device. The examiner respectfully disagrees. First, in response to applicant's argument that Dasi does not disclose ”the first application cannot directly transmit data to a second application running on the operating system of the …..device”, it is noted that, Dasi at Para.0115, Para.0071, Para.0025 discloses, “….the data processed by the application …..partitioned in such a way as to permit concurrent and/or parallel processing of different portions of a data set ……”, “the data loading applications 120 ….each be different applications used to load different types of target files… a first data loading application …. used to load target files …. a second data loading application … used to load target files ….”, “One or more data loading applications …. used to load data sequentially …. using one channel…. Another data loading application may load data using in parallel using many channels” which the examiner interpreted as being the claimed “the first application cannot directly transmit data to a second application running on the operating system of the …..device" because the broadest reasonable interpretation of the claimed “the first application cannot directly transmit data to a second application running on the operating system of the …..device" includes data processed by an application partitioned in such a way as to permit concurrent and/or parallel processing of different portions of a data set. Also, one or more data loading applications used to load data sequentially using one channel and another data loading application may load data using in parallel using many channels, which is equivalent to the claimed ‘the first application cannot directly transmit data to a second application running on the operating system of the …..device’. Second, in response to applicant's argument that Dasi does not disclose "acquiring target data …. in response to a data replication instruction associated with a first application", it is noted that, Dasi at Para.0044, Para.0061, Para.0022 discloses, “receives a request ... to integrate a source file …. in the database system ….by …. transforming the source file … to a target file”, “the source file 134 is to be transformed using a duplicate file …. to provide a copy of the source file 134 instead of the original raw source file 134…. loaded to the ….database”, “A source file …. including …. raw data …. A target file is a transformed version of the source file” which the examiner interpreted as being the claimed “acquiring target data ….. in response to a data replication instruction associated with a first application" because the broadest reasonable interpretation of the claimed “acquiring target data ….. in response to a data replication instruction associated with a first application" includes providing/receiving a copy/duplicate file of the source file instead of the original raw source file. Thus, in response to a data replication instruction, the duplicate file is transformed and target file is generated, which is equivalent to the claimed ‘acquiring target data in response to a data replication instruction associated with a first application’. Then, in response to applicant's argument that Behzadi does not disclose that “the clipboard comprises a system-level application running on the operating system of the electronic device that is configured to cache data”, it is noted that, Behzadi at Para.0467, Para.0412, Para.0427, Para.0420 discloses, “the electronic device … includes… an option … to copy the link …. to a clipboard of the electronic device”, “copying the content to a …. clipboard of the electronic device….. adding the content to a collection of content (e.g., a playlist of media content, an album of photo content….”, “a collection of content items ….is selected for sharing from the respective application (e.g., a collection of photos in a photos application …. an album of songs in a music application ….”, “a music application includes …. the collection of songs to a playback queue of the music application”, which the examiner interpreted as being the claimed “the clipboard comprises a system-level application running on the operating system of the electronic device that is configured to cache data” because the broadest reasonable interpretation of the claimed “the clipboard comprises a system-level application running on the operating system of the electronic device that is configured to cache data” includes photos application and music application [claimed ‘system-level application’], copying the content of photos application and music application containing collection of photos or an album of songs, to a clipboard of the electronic device. Finally, in response to applicant's argument that Behzadi does not disclose that “loading the temporary file by the second application to obtain the ….data”, it is noted that, Behzadi at Para.0539, Para.0536 discloses, “if the content is shared from a second application, …. sharing images ….. For example…. a …. image viewing application …. the option to share the image along with any captured video or audio data ….”, “temporary copy of the content …. is shared (e.g., the file that is transferred) …. a temporary file …. is shared” which the examiner interpreted as being the claimed “loading the temporary file by the second application to obtain the ….data” because the broadest reasonable interpretation of the claimed “loading the temporary file by the second application to obtain the ….data” includes temporary copy of the content/images including video or audio data shared from a second application, which is equivalent to the claimed ‘loading the temporary file by the second application to obtain the ….data’. Applicant's further arguments with respect to claimed features “…. data is generated during a process of running the first application on an operating system of the electronic device” have been considered but are moot because the new ground of rejection does not rely on any reference applied in the prior rejection of record for any teaching or matter specifically challenged in the argument. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. 4. Claims 1, 2,5,12-13,15 and 18 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Dasi et al (US 20230140109 A1) in view of BEHZADI et al. (US 20200356221 A1) and further in view of Wang et al. (US 20240086184 A1) Regarding Claim 1: Dasi discloses: a. An application data processing method for …. data transmission between applications in a data isolation state, (Claim.5, Para.0071, Para.0025; “The method … further comprising validating data in the target file”, “the data loading applications 120 ….each be different applications used to load different types of target files… a first data loading application …. used to load target files …. a second data loading application … used to load target files ….”, “One or more data loading applications …. used to load data sequentially …. using one channel…. Another data loading application may load data using in parallel using many channels” as one data loading application loads data sequentially using one channel and another data loading applications load data in parallel using many channels and first/second data loading applications, each are different applications used to load different types of target files, it is construed that first application is in data isolation with a second application) comprising: b. acquiring target data ….. in response to a data replication instruction associated with a first application, (Para.0044, Para.0061, Para.0022; “receives a request ... to integrate a source file …. in the database system ….by …. transforming the source file … to a target file”, “the source file 134 is to be transformed using a duplicate file …. to provide a copy of the source file 134 instead of the original raw source file 134…. loaded to the ….database”, “A source file …. including …. raw data …. A target file is a transformed version of the source file” providing/receiving a copy/duplicate file of the source file instead of the original raw source file is construed as in response to a data replication instruction, the duplicate file is transformed and target file is generated [claimed ‘acquiring target data’]) wherein the target data ….. during …. running the first application on an operating system ……. (Para.0071, Para.0025; “the data loading applications 120 ….each be different applications used to load different types of target files… a first data loading application …. used to load target files ….”) and wherein the first application cannot directly transmit data to a second application running on the operating system of the …… device; (Para.0115, Para.0071, Para.0025; “….the data processed by the application …..partitioned in such a way as to permit concurrent and/or parallel processing of different portions of a data set ……”, “the data loading applications 120 ….each be different applications used to load different types of target files… a first data loading application …. used to load target files …. a second data loading application … used to load target files ….”, “One or more data loading applications …. used to load data sequentially …. using one channel…. Another data loading application may load data using in parallel using many channels” it is indicated that the data processed by the application partitioned in such a way as to permit concurrent and/or parallel processing of different portions of a data set. Also, one or more data loading applications used to load data sequentially using one channel and another data loading application may load data using in parallel using many channels, which is construed as the first application cannot directly transmit data to a second application running on the operating system of the …… device) c. loading the target data …… to generate ….. file indicative of the target data (Para.0047; “target file ….is to be generated….and…. loaded to the ….database …. with the target file ….”) …… …… obtain the target data; (Para.0075; “obtain the target file”) and d. executing a target function corresponding to the second application based on the target data. (Para.0094, Para.0090, Para.0048; “one of data loading applications 120 …. the load/update function…. to load the target file 136”, “one or more data loading applications 120, a load/update… used to upload different types of data to different types of …. databases”, “The data loading applications …. each be different applications used to load different types of target files 136 or different sizes of target files 136 to …. database” load/update function to load the target file is construed as a target function, as one data loading application using a load/update function to upload specific type of data to specific type of target database, it is construed that …executing a target function corresponding to the second application based on the target data) however, Dasi does not explicitly disclose: a. …..data processing …. for improving ….. b. acquiring …. data by an electronic device……. the …. data is generated during a process of running the …..application on an operating system of the electronic device…. c. loading the …. data to a system clipboard to generate a temporary file indicative of the ….. data in the system clipboard, wherein the system clipboard comprises a system-level application running on the operating system of the electronic device that is configured to cache data; loading the temporary file by means of the second application to obtain the …. data; and In an analogous reference BEHZADI discloses: a. …..data processing …. for improving ….. (Para.0506, Para.0507; “the interaction between the user and the electronic device ….. to share the content ….. reduces …. improves battery life of the electronic device ….”, “the content ….include …. metadata associated with the image”) c. loading the …..data to a system clipboard to generate a temporary file indicative of the ….. data in the system clipboard, (Para.0486, Para.0539, Para.0467, Para.0514, Para.0442; “one or more temporary files are created….and the temporary files are shared”, “image viewing application …. with sharing images …”, “the electronic device …presents the sharing user interface …. includes… an option … to copy the link …. to a clipboard of the electronic device”, “the option to share each image …. share a link to access the images…allows the electronic device to provide the user with different methods of sharing images”, “a … image ….representing the collection of photos” a link of sharing images/collection of photos (by creating temporary files of images) are being copied and saved in a clipboard of the electronic device which is construed as loading the data to a system clipboard to generate a temporary file) wherein the system clipboard comprises a system-level application running on the operating system of the electronic device that is configured to cache data; (Para.0412, Para.0427, Para.0420; “copying the content to a …. clipboard of the electronic device….. adding the content to a collection of content (e.g., a playlist of media content, an album of photo content….”, “a collection of content items ….is selected for sharing from the respective application (e.g., a collection of photos in a photos application …. an album of songs in a music application ….”, “a music application includes …. the collection of songs to a playback queue of the music application”, photos application and music application are construed as system-level application) loading the temporary file by means of the second application to obtain the …. data; (Para.0539, Para.0536; “if the content is shared from a second application, …. sharing images ….. For example…. a …. image viewing application …. the option to share the image along with any captured video or audio data ….”, “temporary copy of the content …. is shared (e.g., the file that is transferred) …. a temporary file …. is shared” temporary copy of the content/images including video or audio data shared from a second application is construed as loading the temporary file by means of the second application to obtain the data) and however, Dasi in view of BEHZADI does not explicitly disclose: b. acquiring …. data by an electronic device……. the …. data is generated during a process of running the …..application on an operating system of the electronic device…. In an analogous reference Wang discloses: b. acquiring …. data by an electronic device……. the ….. data is generated during a process of running the ….application on ….. the electronic device, (Para.0076, Para.0098; “identify data generated during execution of the application”, “techniques … are implemented by ….. computing devices… include …. electronic devices”) Before the effective filing date of the claimed invention, it would have been obvious to one with ordinary skill in the art to modify Dasi in view of BEHZADI’s method of validating data in the target file by enhancing Dasi in view of BEHZADI’s method to include Wang’s method of analyzing features of an application. The motivation: A system identify data generated by application modules in one or both of an application build process and an application execution process, therefore monitors and manages an application build and execution. A build platform performs various build processes to convert the source code into one or more executable applications. Also, a build platform may execute compile, test, package, and deploy the source code. With respect to independent claims 12 and 13, a corresponding reasoning was given earlier in this section with respect to claim 1; therefore, claims 12 and 13 rejected, for similar reasons, under the grounds as set forth for claim 1. Regarding Claim 2: Dasi in view of BEHZADI in view of Wang discloses: The method according to claim 1, wherein the target data comprises at least two target files; the step of loading the target data to the system clipboard to generate the temporary file comprises: merging the at least two target files to generate at least one merged file; (BEHZADI, Para.0515; “a collection of the plurality of content items ….in a group…. if the plurality of content items is a group of images, display a stack of images”) and invoking the system clipboard to load the at least one merged file to generate the temporary file. (Para.0467, Para.0513, Para.0486; “the electronic device …presents the sharing user interface …. includes… an option … to copy the link …. to a clipboard of the electronic device”, “based on the…. file size of the group of images…. electronic device presents an option for sharing the images ….. an option is presented to upload the images to an album and share a link for accessing the album to the recipient”, “if a user selects to share a picture via text messaging…. includes launching a text messaging application….. one or more temporary files are created …. and the temporary files are shared”) With respect to dependent claim 15, a corresponding reasoning was given earlier in this section with respect to claim 2; therefore, claim 15 rejected, for similar reasons, under the grounds as set forth for claim 2. Regarding Claim 5: Dasi in view of BEHZADI in view of Wang discloses: The method according to claim 2, wherein a target file comprises a media file (BEHZADI, Para.0097; “camera module …. includes executable instructions to capture still images or video and store them ….”) and an editing file corresponding to the media file, and the editing file represents content for editing the media file. (Para.0098; “image management module …includes executable instructions to …. modify (e.g., edit) …. video images”) With respect to dependent claim 18, a corresponding reasoning was given earlier in this section with respect to claim 5; therefore, claim 18 rejected, for similar reasons, under the grounds as set forth for claim 5. Claims 3-4 and 16-17 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Dasi et al (US 20230140109 A1) in view of BEHZADI et al. (US 20200356221 A1) also in view of Wang et al. (US 20240086184 A1) and further in view of Li et. Al (US 20210357147 A1) Regarding Claim 3: Dasi in view of BEHZADI in view of Wang discloses: The method according to claim 2, wherein the step of merging the at least two target files to generate the at least one merged file comprises: acquiring file information of the at least two target files, wherein the file information comprises storage addresses of the target files; (BEHZADI, Para.0515, Para.0513, Para.0484; “a collection of the plurality of content items ….in a group…. if the plurality of content items is a group of images, display a stack of images”, “number of images selected and/or the file size of the group of images”, “content that is stored on the electronic device or in a storage location associated with the electronic device”) the step of invoking the system clipboard to load the at least one merged file to generate the temporary file comprises: invoking the system clipboard to perform file loading process based on the merged file information to generate the temporary file. (disclosed in claim 2) however, Dasi in view of BEHZADI in view of Wang does not explicitly disclose: …. performing logical address merging based on the storage addresses corresponding to the at least two target files to obtain merged file information, wherein the merged file information represents a storage address of the merged file; and …. In an analogous reference Li discloses: …..performing logical address merging based on the storage addresses corresponding to the at least two target files to obtain merged file information, wherein the merged file information represents a storage address of the merged file; (Para.0063, Para.0049; “the size of file 4 …merged with file 1 …in physical unit …results in a merged file size which falls between a watermark 506 and the size of physical unit”, “the physical units are formatted into …. 128 Bytes”) and …. Before the effective filing date of the claimed invention, it would have been obvious to one with ordinary skill in the art to modify Dasi in view of BEHZADI in view of Wang’s method of validating data in the target file by enhancing Dasi in view of BEHZADI in view of Wang’s method to include Li’s method for facilitating operation of a storage system. The motivation: Performing logical address merging of multiple files into a single output file offers several benefits, primarily centered on enhanced storage efficiency, improved I/O performance, and streamlined data management. With respect to dependent claim 16, a corresponding reasoning was given earlier in this section with respect to claim 3; therefore, claim 16 rejected, for similar reasons, under the grounds as set forth for claim 3. Regarding Claim 4: Dasi in view of BEHZADI in view of Wang discloses: The method according to claim 2, wherein the step of merging the at least two target files to generate the at least one merged file ….. (Dasi, Para.0045; “one or more scripts ….. combined ….. into a target file”) acquiring a data length of each of the target files; (Para.0072, Para.0047; “determine the data loading application 120 to load the target file 136 based on …. a size of the target file 136”, “target file 136 is to be split into separate files”) and ….. however, Dasi in view of BEHZADI in view of Wang does not explicitly disclose: …. sequentially merging the target files based on the data length of each of the target files and a preset merging length to generate the at least one merged file, wherein the data length of the merged file is less than or equal to the merging length. In an analogous reference Li discloses: …. sequentially merging the target files based on the data length of each of the target files (Para.0060, Para.0033; “If the size of a file is less than the size available of …. physical unit …. the system will write the small file to the …. physical unit. The system can hold …. the buffer …. and …. merge the small file with other incoming small file(s)”, “store a data file in the file storage device based on the size of the data file”) and a preset merging length to generate the at least one merged file, wherein the data length of the merged file is less than or equal to the merging length. (Para.0062, Para.0049; “The system does not allow merging small files whose …. merged file size….. greater than the size of a physical unit….”, “the physical units are formatted into …. 128 Bytes”) Before the effective filing date of the claimed invention, it would have been obvious to one with ordinary skill in the art to modify Dasi in view of BEHZADI in view of Wang’s method of validating data in the target file by enhancing Dasi in view of BEHZADI in view of Wang’s method to include Li’s method for facilitating operation of a storage system. The motivation: Sequentially merging target files based on their data length and a preset merging length improves efficiency by reducing I/O overhead and optimizing storage. With respect to dependent claim 17, a corresponding reasoning was given earlier in this section with respect to claim 4; therefore, claim 17 rejected, for similar reasons, under the grounds as set forth for claim 4. Claims 6 and 19 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Dasi et al (US 20230140109 A1) in view of BEHZADI et al. (US 20200356221 A1) also in view of Wang et al. (US 20240086184 A1) and further in view of Wang-2 et. Al (CN 104182697 A) Regarding Claim 6: Dasi in view of BEHZADI in view of Wang discloses: The method according to claim 2, wherein the step of merging the at least two target files to generate the at least one merged file ….. (Dasi, Para.0045; “one or more scripts ….. combined ….. into a target file”) however, Dasi in view of BEHZADI in view of Wang does not explicitly disclose: …. encrypting at least one target file to generate a corresponding encrypted file; and generating the corresponding merged file based on the encrypted file. In an analogous reference Wang-2 discloses: …. encrypting at least one target file to generate a corresponding encrypted file; (Para.0021, Abstract; “n data packets in …. batches is encrypted”, “n data corresponding to the target file packet….”) and generating the corresponding merged file based on the encrypted file. (Para.0029; “….the encrypted packet in the batch, and then merging to obtain the target file”) Before the effective filing date of the claimed invention, it would have been obvious to one with ordinary skill in the art to modify Dasi in view of BEHZADI in view of Wang’s method of validating data in the target file by enhancing Dasi in view of BEHZADI in view of Wang’s method to include Wang-2’s method of file encryption. The motivation: Generating a merged file from encrypted files offers several benefits, primarily centered around data privacy, security, and integrity. This approach allows for collaborative computations on sensitive data without exposing the plaintext information. With respect to dependent claim 19, a corresponding reasoning was given earlier in this section with respect to claim 6; therefore, claim 19 rejected, for similar reasons, under the grounds as set forth for claim 6. Claims 7 and 20 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Dasi et al (US 20230140109 A1) in view of BEHZADI et al. (US 20200356221 A1) in view of Wang et al. (US 20240086184 A1) also in view of Wang-2 et. Al (CN 104182697 A) and further in view of Dou et. Al (CN 113032810 A) Regarding Claim 7: Dasi in view of BEHZADI in view of Wang also in view of Wang-2 discloses: The method according to claim 6, wherein the step of encrypting the at least one target file to generate the corresponding encrypted file comprises: acquiring encryption information, wherein the encryption information represents a rule for randomly encrypting the target file; (Para.0047; “the target file 136 is to be encrypted ….with a specified encryption technology, that the target file 136 is to be compressed prior to being loaded to…..”) ….. ……. filling the encrypted data into a corresponding target file to generate the encrypted file. (Para.0060; “the target file 136 is to be encrypted …..include obtaining the … encryption key(s) used to encrypt the target file 136 according to an encryption scheme …..”) however, Dasi in view of BEHZADI in view of Wang also in view of Wang-2 does not explicitly disclose: …..randomly encrypting the file information of the at least one target file to generate corresponding encrypted data based on the encryption information; In an analogous reference Dou discloses: ….. randomly encrypting the file information of the at least one target file to generate corresponding encrypted data based on the encryption information; (Abstract, Description/Contents of the Invention; “processing the initial plaintext information based on the …. policy to generate the target encryption information”, “based on the …. policy processing the target encryption information to obtain the encrypted ciphertext information”) Before the effective filing date of the claimed invention, it would have been obvious to one with ordinary skill in the art to modify Dasi in view of BEHZADI in view of Wang also in view of Wang-2’s method of validating data in the target file by enhancing Dasi in view of BEHZADI in view of Wang also in view of Wang-2’s method to include Dou’s method of processing the target encryption information based on the policy to obtain the encrypted ciphertext information The motivation: encrypting file information of the at least one target file to generate corresponding encrypted data based on the encryption information; provides a crucial layer of security that makes unauthorized access significantly more difficult. With respect to dependent claim 20, a corresponding reasoning was given earlier in this section with respect to claim 7; therefore, claim 20 rejected, for similar reasons, under the grounds as set forth for claim 7. Claims 9 is rejected under AIA 35 U.S.C. 103 as being unpatentable over Dasi et al (US 20230140109 A1) in view of BEHZADI et al. (US 20200356221 A1) in view of Wang et al. (US 20240086184 A1) also in view of Wang-2 et. Al (CN 104182697 A) and in view of Dou et. Al (CN 113032810 A) and further in view of Liu-2 et. Al (CN 115242498 A) Regarding Claim 9: Dasi in view of BEHZADI in view of Wang also in view of Wang -2 and further in view of Dou discloses: The method according to claim 7, wherein after the step of randomly encrypting the at least one target file to generate the corresponding encrypted file based on the encryption information, the method further comprises: sending the encryption information to the second application; (Dou, Abstract; “sending the ….encryption information …. to the second application program”) and …. however, Dasi in view of BEHZADI in view of Wang also in view of Wang-2 and further in view of Dou does not explicitly disclose: …. the step of generating the corresponding merged file based on the encrypted file comprises: combining the encrypted file with other unencrypted target files to generate the merged file. In an analogous reference Liu-2 discloses: …. the step of generating the corresponding merged file based on the encrypted file comprises: combining the encrypted file with other unencrypted target files to generate the merged file. (Description/Contents of the invention; “combining the …. encrypted file with the non-encrypted file as the encrypted target file”) Before the effective filing date of the claimed invention, it would have been obvious to one with ordinary skill in the art to modify Dasi in view of BEHZADI in view of Wang also in view of Wang-2 and further in view of Dou’s method of validating data in the target file by enhancing Dasi in view of BEHZADI in view of Wang also in view of Wang-2 and further in view of Dou’s method to include Liu-2’s method of obtaining an encrypted target file. The motivation: Combining an encrypted file with other unencrypted files is a form of "security through obscurity," where the primary benefit is to conceal the very existence of secret communication. Instead of a single encrypted file that might draw suspicion, the confidential data is hidden within what appears to be a harmless, mundane merged file. Claims 10 and 22 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Dasi et al (US 20230140109 A1) in view of BEHZADI et al. (US 20200356221 A1) also in view of Wang et al. (US 20240086184 A1) and further in view of LIU et. Al (US 20230396594 A1) Regarding Claim 10: Dasi in view of BEHZADI in view of Wang discloses: The method according to claim 1, wherein the step of loading the temporary file by the second application to obtain the target data, comprises: when the second application runs in the foreground of the electronic device, (Para.0539, Para.0193; “if the content is shared from a second application, …. sharing images (e.g., the same …. content ….), ….. For example…. a ….image viewing application ….the option to share the image along with any captured video or audio data …..”, “an active application, which is currently displayed on a display screen of the device that the application is being used on”) reading the system clipboard to obtain the temporary file; (Para.0536, Para.0467; “temporary copy of the content …. is shared (e.g., the file that is transferred) …. a temporary file …. is shared”, “the electronic device …presents the sharing user interface …. includes… an option … to copy the link …. to a clipboard of the electronic device”) and ….. however, Dasi in view of BEHZADI also in view of Wang does not explicitly disclose: …. acquiring the encrypted file corresponding to the temporary file, and restoring the temporary file based on the encrypted file to obtain the target data. In an analogous reference LIU discloses: ….. acquiring the encrypted file corresponding to the temporary file, (Para.0128; “encrypting the ….temporary file ….. to generate the encrypted file”) and restoring the temporary file based on the encrypted file to obtain the target data. (Claim.19; “encryption algorithm to obtain a …. temporary file ….the ….temporary file … to restore the …. file targetSourceFile”) Before the effective filing date of the claimed invention, it would have been obvious to one with ordinary skill in the art to modify Dasi in view of BEHZADI in view of Wang’s method of validating data in the target file by enhancing Dasi in view of BEHZADI in view of Wang’s method to include LIU’s method of generating file information of each file in a set of files to be transmitted. The motivation: Restoring a file that is being encrypted, provides enhanced data security, protection against ransomware, and compliance with data privacy regulations. The ability to recover encrypted files is a crucial part of a robust data recovery strategy, especially for sensitive information. With respect to dependent claim 22, a corresponding reasoning was given earlier in this section with respect to claim 10; therefore, claim 22 rejected, for similar reasons, under the grounds as set forth for claim 10. Allowable Subject Matter 5. Claims 8 and 21 are objected to as being dependent upon a rejected base claim, but would be allowable if rewritten in independent form including all of the limitations of the base claim and any intervening claims. The following is a statement of reasons for the indication of allowable subject matter: In interpreting the currently amended claims, in light of the specification, the Examiner finds the claimed invention to be patentably distinct from the prior art of record. Dasi et al (US 20230140109 A1) discloses that a first data loading application used to load one type of target files, a second data loading application used to load another type of target files. BEHZADI et al. (US 20200356221 A1) discloses that an electronic shares content with a second electronic device, the content sharing options are applied to a temporary copy of the content and/or the content sharing options are applied as the content is shared. Wang-2 et. Al (CN 104182697 A) discloses that n number of encrypted packets in a batch are merged to obtain a target file; The prior art of record fails to teach or suggest, individually or in combination, each and every limitation of the claimed invention. For example, Dasi-BEHZADI -Wang-2 in combination do not disclose, “the step of randomly encrypting the at least one target file to generate the corresponding encrypted file based on the encryption information, the method further comprises: acquiring a first data length of the at least one target file and a preset second data length; calculating a first encryption number of times required for encrypting the first data length and a second encryption number of times required for encrypting the second data length; and determining a smaller one of the first encryption number of times and the second encryption number of times to be a target encryption number of times, and generating the encryption information based on the target encryption number of times.” within the context of the claimed invention as a whole, as recited in claims 8. Although Dasi discloses a first data loading application used to load one type of target files, a second data loading application used to load another type of target files. Dasi does not disclose acquiring a first data length of the at least one target file and a preset second data length; calculating a first encryption number of times required for encrypting the first data length and a second encryption number of times required for encrypting the second data length; and determining a smaller one of the first encryption number of times and the second encryption number of times to be a target encryption number of times, and generating the encryption information based on the target encryption number of times. BEHZADI and Wang-2 have the similar deficiency. Considering all these references, however there is no motivation to put the references together to disclose the claimed “the step of randomly encrypting the at least one target file to generate the corresponding encrypted file based on the encryption information, the method further comprises: acquiring a first data length of the at least one target file and a preset second data length; calculating a first encryption number of times required for encrypting the first data length and a second encryption number of times required for encrypting the second data length; and determining a smaller one of the first encryption number of times and the second encryption number of times to be a target encryption number of times, and generating the encryption information based on the target encryption number of times”. Thus, the Examiner finds that the prior arts do not provide sufficient teaching or motivation for anticipating or rendering obvious the claimed invention as a whole, without the usage of impermissible hindsight reasoning. Therefore, claims 8 and 21 would be allowed if the base claim would be amended to traverse the rejections above. Conclusion Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any extension fee pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the date of this final action. Contact Information Any inquiry concerning this communication or earlier communications from the examiner should be directed to SAYEDA SALMA NAHAR whose telephone number is (703)756-4609. The examiner can normally be reached M-F 12:00 PM to 6:00 PM EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Amir Mehrmanesh can be reached on (571) 270-3351. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SAYEDA SALMA NAHAR/Examiner, Art Unit 2435 /AMIR MEHRMANESH/Supervisory Patent Examiner, Art Unit 2435
Read full office action

Prosecution Timeline

Dec 18, 2023
Application Filed
Sep 19, 2025
Non-Final Rejection — §103
Dec 23, 2025
Response Filed
Mar 10, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12537850
CONCEALED MONITOR COMMUNICATIONS FROM A TASK IN A TRUSTED EXECUTION ENVIRONMENT
2y 5m to grant Granted Jan 27, 2026
Patent 12506751
METHOD AND SYSTEM FOR SCORING SEVERITY OF CYBER ATTACKS
2y 5m to grant Granted Dec 23, 2025
Patent 12493681
PUF-RAKE: A PUF-BASED ROBUST AND LIGHTWEIGHT AUTHENTICATION AND KEY ESTABLISHMENT PROTOCOL
2y 5m to grant Granted Dec 09, 2025
Patent 12457490
ON-DEMAND SUBSCRIPTION CONCEALED IDENTIFIER (SUCI) DECONCEALMENT FOR SELECT APPLICATIONS
2y 5m to grant Granted Oct 28, 2025
Patent 12445469
USING A THREAT INTELLIGENCE FRAMEWORK TO POPULATE A RECURSIVE DNS SERVER CACHE
2y 5m to grant Granted Oct 14, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
67%
Grant Probability
99%
With Interview (+35.8%)
3y 5m
Median Time to Grant
Moderate
PTA Risk
Based on 27 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month