Prosecution Insights
Last updated: April 19, 2026
Application No. 18/598,968

INFORMATION PROCESSING APPARATUS CAPABLE OF DETERMINING RISK OF INFORMATION LEAKAGE IN PRINT JOB, CONTROL METHOD, AND STORAGE MEDIUM

Non-Final OA §102§103
Filed
Mar 07, 2024
Examiner
AUGUSTIN, MARCELLUS
Art Unit
2682
Tech Center
2600 — Communications
Assignee
Canon Kabushiki Kaisha
OA Round
1 (Non-Final)
82%
Grant Probability
Favorable
1-2
OA Rounds
2y 8m
To Grant
98%
With Interview

Examiner Intelligence

Grants 82% — above average
82%
Career Allow Rate
684 granted / 838 resolved
+19.6% vs TC avg
Strong +16% interview lift
Without
With
+15.9%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
31 currently pending
Career history
869
Total Applications
across all art units

Statute-Specific Performance

§101
11.0%
-29.0% vs TC avg
§103
50.7%
+10.7% vs TC avg
§102
18.5%
-21.5% vs TC avg
§112
12.0%
-28.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 838 resolved cases

Office Action

§102 §103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Filed IDS of 03/07/2024 has been entered and considered. Claims 1-10 are currently pending. Please refer to the action below. Examiner Notes The claims in this application are given their broadest reasonable interpretation using the plain meaning of the claim language in light of the specification as it would be understood by one of ordinary skill in the art. However, the claimed subject matter, not the specification, is the measure of the invention. Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1-3, 5, and 9-10 are rejected under 35 U.S.C. 102 (a)(1) as being unpatentable over Jian et al (CN 110955395, A1). Regarding claim 1, Jian teaches an information processing apparatus that determines a risk of confidential information leakage in a print job (a print system of the Abstract is configured to receive a print document and assess based on detected contents of the print document and security level of the document corresponding to security level of the user whether a risk of confidential information leakage and disclosure in a print job exists), the information processing apparatus comprising: at least one memory that stores instructions (the disclosure further cites “printing system, comprising: a memory on which a computer program is stored”); and at least one processor (the disclosure further cites “printing system, comprising: a processor for executing the computer program in the memory to realize the step any one of the first aspect of the method”); that executes the instructions to: detect confidential information from print data acquired from the print job (obtaining and detect contents of the document of the Abstract and the disclosure such as “word analysis and image recognition and so on, obtaining the to-be-printed confidential document security classification, comprehensive of confidential user information and other related information to realize the printing system of leakage risk assessment” further comprising at least collectively said detected confidential information from print data acquired from the print job); acquire a risk level of each job attribute of the print job (Steps 13-15 of the disclosure); execute a weighting process for the risk level of each job attribute, using the detected confidential information and information of weight for the job attribute set for each confidential information (further in the disclosure ascertaining “in addition to collecting the to-be-printed document itself, but also needs to collect part of the information user. wherein the information of the user comprises but not limited to authority of the user, the history of user printing risk information, printing time, client identifier ID, client IP address, approval the client identifier ID, approval the client IP address” where each of the attribute classification comprises in the art a weighted classification, risk, and leakage weighting process, collectively forming a weighing process using the detected confidential information and information of weight for the job attribute set for each confidential information); determine the risk of confidential information leakage for the print job, using the weighting-processed risk level of each job attribute (the disclosure in steps 12-15 further determine as recited “for leakage risk of the current printing action to accurately judge, according to the content information and the user information of the analysis model, the document to be printed for quantitative analysis, the leakage risk generated document itself and the leakage risk caused by user behaviour, can be obtained by combining them one time printing operation total leakage risk level, so as to accurately judge the printing action whether there is leakage risk, and the risk of leakage” further indicating said risk of confidential information leakage for the print job, using at least the combined or weighting-processed risk level of each job attribute); and restrict printing of the print job according to a result of the determination of the risk of confidential information leakage (step S16 of the disclosure is configured to send alert notification to Audit personnel about detect results of positive determination of the risk of confidential information leakage, and to terminate said printing action and/or pause the printing until an approval is obtained of the current printing action such as “judging whether the current printing action leakage risk level leakage risk level greater than or equal to the preset threshold, if it is greater than or equal to, then controlling the printing system to terminates…. the printing system may also pause print authority by the user directly.” thereby restrict printing of said print job according to a result of the determination of the risk of confidential information leakage). Regarding claim 2 (according to claim 1), Jian further teaches wherein, in the determination, the risk of confidential information leakage for the print job is determined using a risk level according to the detected confidential information and the weighting-processed risk level of each job attribute (the print documents risk level determination of further S1-S16 of the disclosure further comprises in the determining, risk information of confidential information leakage for the print job using a risk level according to the detected confidential information and the combined or weighting-processed risk level of each job attribute further including “judge the security level by keyword matching, semantic matching and security picture matching…,client identifier ID, client IP address can judge whether the user login in the common computer, the approval person client identifier ID, printing time, authority of the user, the history of user to print the risk information, and the like”). Regarding claim 3 (according to claim 2), Jian further teaches wherein the risk level according to the detected confidential information is determined according to the number of detected confidential information (a case further exists in the disclosure such as when “judge the security level by keyword matching, semantic matching and security picture matching. the individual using any one matching keyword matching, semantic matching degree of matching or secret pictures is calculated to be the security level of the printed document, the corresponding matching degree is higher, then the security level is higher” at least insinuate said risk level determination according to the detected confidential information is determined according to the number of matched detected confidential information). Regarding claim 5 (according to claim 1), Jian further teaches wherein the processor further executes the instructions to: request an administrator to approve the printing of the print job for which the printing has been restricted (upon successful determination of risk of confidential information leakage, the system pauses and suspend a print job, sending warning to audit/managing personnel and awaits approval of said personnel); and permit the approved printing for the print job (a case exists further in at least S16 that the job after being paused may obviously be permitted to be printed). Regarding claim 9, Jian teaches an control method of an information processing apparatus that determines a risk of confidential information leakage in a print job (a print system of the Abstract is configured to receive a print document and assess based on detected contents of the print document and security level of the document corresponding to security level of the user whether a risk of confidential information leakage and disclosure in a print job exists), the control method comprising: detecting confidential information from print data acquired from the print job (obtaining and detect contents of the document of the Abstract and the disclosure such as “word analysis and image recognition and so on, obtaining the to-be-printed confidential document security classification, comprehensive of confidential user information and other related information to realize the printing system of leakage risk assessment” further comprising at least collectively said detected confidential information from print data acquired from the print job); in a case where the confidential information is detected, acquiring a risk level of each job attribute of the print job (Steps 13-15 of the disclosure); executing a weighting process for the risk level of each job attribute, using the detected confidential information and information of weight for the job attribute set for each confidential information (further in the disclosure ascertaining “in addition to collecting the to-be-printed document itself, but also needs to collect part of the information user. wherein the information of the user comprises but not limited to authority of the user, the history of user printing risk information, printing time, client identifier ID, client IP address, approval the client identifier ID, approval the client IP address” where each of the attribute classification comprises in the art a weighted classification, risk, and leakage weighting process, collectively forming a weighing process using the detected confidential information and information of weight for the job attribute set for each confidential information); determining the risk of confidential information leakage for the print job, using the weighting-processed risk level of each job attribute (the disclosure in steps 12-15 further determine as recited “for leakage risk of the current printing action to accurately judge, according to the content information and the user information of the analysis model, the document to be printed for quantitative analysis, the leakage risk generated document itself and the leakage risk caused by user behaviour, can be obtained by combining them one time printing operation total leakage risk level, so as to accurately judge the printing action whether there is leakage risk, and the risk of leakage” further indicating said risk of confidential information leakage for the print job, using at least the combined or weighting-processed risk level of each job attribute); and restricting printing of the print job according to a result of the determination of the risk of confidential information leakage (step S16 of the disclosure is configured to send alert notification to Audit personnel about detect results of positive determination of the risk of confidential information leakage, and to terminate said printing action and/or pause the printing until an approval is obtained of the current printing action such as “judging whether the current printing action leakage risk level leakage risk level greater than or equal to the preset threshold, if it is greater than or equal to, then controlling the printing system to terminates…. the printing system may also pause print authority by the user directly.” thereby restrict printing of said print job according to a result of the determination of the risk of confidential information leakage). Regarding claim 10, Jian teaches a non-transitory computer-readable storage medium that stores instructions, the instructions cause at least one processor (a print system of the Abstract and the disclosure comprises a cited ““printing system, comprising: a memory on which a computer program is stored…..a processor for executing the computer program in the memory to realize the step any one of the first aspect of the method”) to receive a print document and assess based on detected contents of the print document and security level of the document corresponding to security level of the user whether a risk of confidential information leakage and disclosure in a print job exists) to: detect confidential information from print data acquired from a print job (obtaining and detect contents of the document of the Abstract and the disclosure such as “word analysis and image recognition and so on, obtaining the to-be-printed confidential document security classification, comprehensive of confidential user information and other related information to realize the printing system of leakage risk assessment” further comprising at least collectively said detected confidential information from print data acquired from the print job); acquire a risk level of each job attribute of the print job (Steps 13-15 of the disclosure); executing a weighting process for the risk level of each job attribute, using the detected confidential information and information of weight for the job attribute set for each confidential information (further in the disclosure ascertaining “in addition to collecting the to-be-printed document itself, but also needs to collect part of the information user. wherein the information of the user comprises but not limited to authority of the user, the history of user printing risk information, printing time, client identifier ID, client IP address, approval the client identifier ID, approval the client IP address” where each of the attribute classification comprises in the art a weighted classification, risk, and leakage weighting process, collectively forming a weighing process using the detected confidential information and information of weight for the job attribute set for each confidential information); determining the risk of confidential information leakage for the print job, using the weighting-processed risk level of each job attribute (the disclosure in steps 12-15 further determine as recited “for leakage risk of the current printing action to accurately judge, according to the content information and the user information of the analysis model, the document to be printed for quantitative analysis, the leakage risk generated document itself and the leakage risk caused by user behaviour, can be obtained by combining them one time printing operation total leakage risk level, so as to accurately judge the printing action whether there is leakage risk, and the risk of leakage” further indicating said risk of confidential information leakage for the print job, using at least the combined or weighting-processed risk level of each job attribute); and restricting printing of the print job according to a result of the determination of the risk of confidential information leakage (step S16 of the disclosure is configured to send alert notification to Audit personnel about detect results of positive determination of the risk of confidential information leakage, and to terminate said printing action and/or pause the printing until an approval is obtained of the current printing action such as “judging whether the current printing action leakage risk level leakage risk level greater than or equal to the preset threshold, if it is greater than or equal to, then controlling the printing system to terminates…. the printing system may also pause print authority by the user directly.” thereby restrict printing of said print job according to a result of the determination of the risk of confidential information leakage). Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim 4 is rejected under 35 U.S.C. 103 as being unpatentable and obvious over Jian in view of Usutbo et al (US 2009/0122347, A1). Regarding claim 4 (according to claim 1), Jian further teaches wherein in a case where the risk level of each job attribute of the print job cannot be acquired, the risk of confidential information leakage is determined as maximum in the risk level. Usutbo teaches identifying of print job keyword attributes depicting confidential data, and in a case an attribute of the job is unregistered or cannot be acquired in at least para. 0070 and Fig. 4A to set in a case the risk level of the job attribute of the print job or the risk of confidential information leakage as the maximum in the risk level. It would have been obvious to one of ordinary skill in the art at the time the invention was made to combine the teachings of Jian in view of Usutbo to include wherein said wherein in a case where the risk level of each job attribute of the print job cannot be acquired, the risk of confidential information leakage is determined as maximum in the risk level, as discussed above, as Jian in view of Usutbo are in the same field of endeavor of preventing leakage of confidential of information such as when a print job is receive, to assess a risk level of each job attribute of the print job, and to determine the risk level of each job attribute, and a leakage risk level for the print job to prevent leakage of confidential of information, Usutbo’s determined maximum risk level setting of at least Fig. 4A when in a case an un-registered user risk level can not obtained or identified complements the confidential risk leakage determination and assessment of the print job of Jian, in the sense that said determined maximum risk level setting of at least Fig. 4A, when combined with the confidential risk leakage determination and assessment of the print job of Jian, enables the system to set in a case the maximum available security risk level for a user when in a case the system cannot determine or acquire for the said user any of a pre-approved set risk level or set security/confidentiality for the said user, thereby ensuring an unregistered or unauthorized user does not have to print any confidential content or the like, which ultimately further prevent a risk of confidential information leakage in a print job, according to further known methods to yield predictable results since known work in one field of endeavor may prompt variations of it for use in either the same field or a different one based on design incentives or other market forces if the variations are predictable to one of ordinary skill in the art as said combination is thus the adaptation of an old idea or invention using newer technology that is either commonly available and understood in the art thereby a variation on already known art (See MPEP 2143, KSR Exemplary Rationale F). Claims 6-8 are rejected under 35 U.S.C. 103 as being unpatentable and obvious over Jian in view of Tsuji et al (US 2013/0321850, A1). Regarding claim 6 (according to claim 5), Jian is silent regarding wherein the processor further executes the instruction to: in a case where the administrator approves the printing of the print job, execute a setting change for making smaller the weight for the job attribute set for the confidential information detected from the print data of the print job. Tsuji teaches analyzing of in at least Fig. 20 contents of a received print job and the determining of said print job being deemed unprintable and restricted based on at least detected confidential word information, the system is further set up in at least Fig. 20 in a case where the administrator approves the printing of the print job by selecting the icon 195, settings changes as further noted in at least para. 0094-0101 are executed for making smaller when selecting icon 195 as understood in the art the weight for the job attribute set for the confidential information detected from the print data of the print job. It would have been obvious to one of ordinary skill in the art at the time the invention was made to combine the teachings of Jian in view of Tsuji to include wherein said in a case where the administrator approves the printing of the print job, execute a setting change for making smaller the weight for the job attribute set for the confidential information detected from the print data of the print job, as discussed above, as Jian in view of Tsuji are in the same field of endeavor of preventing leakage of confidential of information such as when a print job is receive, to assess a risk level of each job attribute of the print job, and to determine the risk level of each job attribute, and a leakage risk level for the print job to prevent leakage of confidential of information, Tsuji’s methods and systems changing a print job for which the printing is not restricted to the print job for which the printing is restricted based on detected confidential attribute information of the print job complements the confidential risk leakage determination and assessment of the print job of Jian, in the sense that said changed print job setting for which the printing is not restricted to the print job for which the printing is restricted based on detected confidential attribute information of the print job, when combined with the confidential risk leakage determination and assessment of the print job of Jian, enables the system in a case to change by an administrator or the like the settings of the now restricted print job to a job that is now printable with an approval permit or to a job that is unprintable or denied, the change of settings from unprintable or denied, to now printable with an approval permit creates in as a case such as understood in the art settings change for making classified security/risk level or the said weight obviously smaller for the job attribute set and for the said user allowing evidently the said user in a case to continue the printing process when approve by the administrator or the like for the target print confidential information thereby in a case overriding a restricted print job to an un-restricted print job, according to further known methods to yield predictable results since known work in one field of endeavor may prompt variations of it for use in either the same field or a different one based on design incentives or other market forces if the variations are predictable to one of ordinary skill in the art as said combination is thus the adaptation of an old idea or invention using newer technology that is either commonly available and understood in the art thereby a variation on already known art (See MPEP 2143, KSR Exemplary Rationale F). Regarding claim 7 (according to claim 5), Jian is silent regarding wherein the processor further executes the instruction to: in a case where the print job for which the printing is not restricted is changed by the administrator to the print job for which the printing has been restricted, execute a setting change for making larger the weight for the job attribute set for the confidential information detected from the print data of the print job. Tsuji further teaches analyzing of in at least Fig. 20 contents of a received print job and further in Fig. 6 and Fig. 9 where the print job for which the printing was not yet restricted is changed by the administrator to the print job for which the printing has been restricted, thereby according to one skill in the art the settings for which the printing has now been restricted are obviously changed for making larger the weight for the job attribute set rendering them unprintable by the said user for the confidential information detected from the print data of the print job. It would have been obvious to one of ordinary skill in the art at the time the invention was made to combine the teachings of Jian in view of Tsuji to include wherein said in a case where the print job for which the printing is not restricted is changed by the administrator to the print job for which the printing has been restricted, execute a setting change for making larger the weight for the job attribute set for the confidential information detected from the print data of the print job, as discussed above, as Jian in view of Tsuji are in the same field of endeavor of preventing leakage of confidential of information such as when a print job is receive, to assess a risk level of each job attribute of the print job, and to determine the risk level of each job attribute, and a leakage risk level for the print job to prevent leakage of confidential of information, Tsuji’s methods and systems changing a print job for which the printing is not restricted to the print job for which the printing is restricted based on detected confidential attribute information of the print job complements the confidential risk leakage determination and assessment of the print job of Jian, in the sense that said changed print job setting for which the printing is not restricted to the print job for which the printing is restricted based on detected confidential attribute information of the print job, when combined with the confidential risk leakage determination and assessment of the print job of Jian, enables the system in a case to change by an administrator or the like the settings of an un-restricted print job to a job that is now unprintable or denied, the change of settings from un-restricted print job to a job that is now unprintable or denied creates in as a case such as understood in the art settings change for making classified security/risk level or the said weight obviously higher for the set job attribute values and for the said user making it harder evidently for the said user in a case to continue the printing process when rejected or denied by the administrator or the like for the target print confidential information thereby in a case prevent the risk of confidential information leakage, according to further known methods to yield predictable results since known work in one field of endeavor may prompt variations of it for use in either the same field or a different one based on design incentives or other market forces if the variations are predictable to one of ordinary skill in the art as said combination is thus the adaptation of an old idea or invention using newer technology that is either commonly available and understood in the art thereby a variation on already known art (See MPEP 2143, KSR Exemplary Rationale F). Regarding claim 8 (according to claim 7), Jian is silent regarding wherein the processor further executes the instruction to: in a case where the setting change is executed, warn a user corresponding to the print job. Tsuji further teaches at least in Figs. 6-20 executed instruction to in a case where the setting change is executed, warn a user corresponding to an unprintable or restricted print job. It would have been obvious to one of ordinary skill in the art at the time the invention was made to combine the teachings of Jian in view of Tsuji to include wherein said in a case where the setting change is executed, warn a user corresponding to the print job, as discussed above, as Jian in view of Tsuji are in the same field of endeavor of preventing leakage of confidential of information such as when a print job is receive, to assess a risk level of each job attribute of the print job, and to determine the risk level of each job attribute, and a leakage risk level for the print job to prevent leakage of confidential of information, Tsuji’s methods and systems of warning a user corresponding to the print job in a case where the setting change is executed complements the confidential risk leakage determination and assessment of the print job of Jian, in the sense that said warning when combined with the confidential risk leakage determination and assessment of the print job of Jian, enables the system in a case confidential information is detected in the print job attribute information and/or where the print job settings are changed from an un-restricted print job to a job that is now unprintable or denied, said user would in essence be alerted and notified of the detection and the result, which may in a case allow the user to take mitigations steps to solve the problem, according to further known methods to yield predictable results since known work in one field of endeavor may prompt variations of it for use in either the same field or a different one based on design incentives or other market forces if the variations are predictable to one of ordinary skill in the art as said combination is thus the adaptation of an old idea or invention using newer technology that is either commonly available and understood in the art thereby a variation on already known art (See MPEP 2143, KSR Exemplary Rationale F). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to MARCELLUS AUGUSTIN whose telephone number is (571)270-3384. The examiner can normally be reached 9 AM- 5 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, BENNY TIEU can be reached at 571-272-7490. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /MARCELLUS J AUGUSTIN/Primary Examiner, Art Unit 2682 02/26/2026
Read full office action

Prosecution Timeline

Mar 07, 2024
Application Filed
Mar 13, 2026
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12597126
IMAGE SETTING DEVICE, IMAGE SETTING METHOD, AND IMAGE SETTING PROGRAM
2y 5m to grant Granted Apr 07, 2026
Patent 12586170
SYSTEM AND METHOD FOR GENERATING PREDICTIVE IMAGES FOR WAFER INSPECTION USING MACHINE LEARNING
2y 5m to grant Granted Mar 24, 2026
Patent 12573079
System and Method for Identifying Feature in an Image of a Subject
2y 5m to grant Granted Mar 10, 2026
Patent 12573388
BEHAVIOR DETECTION
2y 5m to grant Granted Mar 10, 2026
Patent 12569129
ANATOMICAL LOCATION DETECTION OF FEATURES OF A GASTROINTESTINAL TRACT OF A PATIENT
2y 5m to grant Granted Mar 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
82%
Grant Probability
98%
With Interview (+15.9%)
2y 8m
Median Time to Grant
Low
PTA Risk
Based on 838 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month