Prosecution Insights
Last updated: April 19, 2026
Application No. 18/602,397

SECURELY PAIRING A COMPUTING DEVICE WITH PERIPHERALS OF A TERMINAL DEVICE

Non-Final OA §103
Filed
Mar 12, 2024
Examiner
TABOR, AMARE F
Art Unit
2434
Tech Center
2400 — Computer Networks
Assignee
Target Brands Inc.
OA Round
1 (Non-Final)
83%
Grant Probability
Favorable
1-2
OA Rounds
3y 0m
To Grant
99%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
682 granted / 824 resolved
+24.8% vs TC avg
Strong +23% interview lift
Without
With
+23.2%
Interview Lift
resolved cases with interview
Typical timeline
3y 0m
Avg Prosecution
12 currently pending
Career history
836
Total Applications
across all art units

Statute-Specific Performance

§101
9.2%
-30.8% vs TC avg
§103
56.6%
+16.6% vs TC avg
§102
11.1%
-28.9% vs TC avg
§112
6.3%
-33.7% vs TC avg
Black line = Tech Center average estimate • Based on career data from 824 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claims 1-20 filed on 03/12/2024 are presented for examination. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1-20 is/are rejected under 35 U.S.C. 103 as being unpatentable over “PAL” (US 8689002 B2) in view of “Yamamoto” et al. (US 2022/0210236 A1). Regarding Claim 1. Yamamoto discloses, A computer system for securely pairing a computing device with peripherals of a terminal device, the system comprising: the computing device, wherein the computing device includes a wireless communication interface [Yamamoto discloses NFC-Equipped Mobile Device 7 (FIG.1 and Abstract)]; the terminal device, wherein the terminal device includes a wired communication interface and a wireless communication interface [Yamamoto discloses NFC reader/writer (NFC-R/W) apparatus 9 (FIG.1 with col.5, lines 33-67)], wherein the peripheral devices of the terminal device are each configured to communicate with the terminal device using the wired communication interface of the terminal device [Yamamoto discloses image forming apparatus 1 as an example of a peripheral device connected to network 4, which may be wired or wireless LAN (FIG.1 with col.5, lines 33-67)]; and wherein the computing device, the terminal device, see FIG.2 of Yamamoto, and FIGS.2A-2B of PAL), when executed, cause the respective computing device, terminal device, and session server [Yamamoto disclose an external server (col.8, lines 13-15)] to perform operations comprising: outputting, by the terminal device, connection information that identifies the terminal device [Yamamoto discloses NFC-R/W provides an interface with an NFC token 5 (FIG.1)]; detecting, by the computing device, the connection information that has been output by the terminal device [Yamamoto disclose Acquire NFC Token Information S204, FIG.6]; in response to detecting the connection information, transmitting, by the computing device using its wireless communication interface and for receipt by the terminal device, a trust negotiation initiation message [Yamamoto disclose Network Setting Authentication S201-206, FIG.6-7 (col.8, line 47 to col.9, line 29]; after the trust negotiation initiation message has been transmitted, performing a trust negotiation protocol between the computing device, the terminal device, Yamamoto discloses PERFORM WLAN ASSOCIATION, or BLUETOOTH PAIRING, or WIRELESS-USB PAIRING S207-S217, FIGS.6-7 (col.9, lines 30-39)]; Yamamoto does not; but, PAL, analogues art, disclose a facility server [Network server 14, FIG.1 of PAL]; and receiving, by the terminal device using its wireless communication interface and from the computing device over the secure connection, a request to access one or more peripherals of the terminal device [PAL discloses, “The modular platform includes a processor for acting as a bridge between one or more communication modules and each of the peripheral devices” (abstract with FIG.1); see also steps 60-64 of FIG.4A, where peripherals are scanned for connection]; and in response to receiving the request to access the one or more peripherals of the terminal device, establishing, by the terminal device, a temporary pairing between the computing device and the one or more peripherals of the terminal device [PAL discloses, “The processor is configured translate the wired communication protocols of the peripheral devices to the wireless communication protocols of the communication modules to enable communication with a network server or a mobile device” (Abstract with FIG.1) ; see also steps 66-68 of FIG.4A, where peripherals are enables; i.e., paired]. Therefore, it would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to establish IoT-based modular hardware platform. Yamamoto in view of PAL further disclose claims 2-3. The computer system of claim 1, wherein the computing device, the terminal device, and the facility server [Network server 14, FIG.1 of PAL] are included in a local network of a facility, with the computing device being a mobile computing device having a wireless connection to the local network of the facility, and with the terminal device and the facility server each having respective wired connections to the local network, wherein the one or more peripherals only have a wired connection to the terminal device and are not directly connected to the local network [Yamamoto discloses “A peripheral device includes an interface for connection to a wired or wireless LAN” (Abstract with FIG.1). PAL disclose wired communication (FIG.1 with par.0008-0039)]. The motivation to combine is the same as that of claim 1 above. Yamamoto in view of PAL further disclose claim 4. The computer system of claim 2, wherein the connection information that identifies the terminal device corresponds to an address of the terminal device on the local network [Yamamoto discloses address book 27-7 (FIG.4) and PAL disclose device address 86b (FIG.3B)]. The motivation to combine is the same as that of claim 1 above. Yamamoto in view of PAL further disclose claims 5-7. The computer system of claim 1, wherein outputting the connection information that identifies the terminal device is performed by the terminal device when a user is actively logged into the terminal device, and in response to the launching of a pairing application on the terminal device [Yamamoto discloses NFC-R/W provides an interface with an NFC token 5 (the terminal device is active, FIGS.1 & 6)], wherein the connection information that identifies the terminal device is visually output by a display of the terminal device, and wherein detecting the connection information by the computing device comprises performing a scan of the connection information using scanning hardware of the computing device [Yamamoto discloses visually displaying (FIG.6)], wherein the connection information that identifies the terminal device is output by the terminal device in a non-visual manner, and wherein detecting the connection information by the computing device comprises using non-visual detection hardware of the computing device to detect the connection information [PAL discloses non-visual detection (FIGS.1 & 4A)]. The motivation to combine is the same as that of claim 1 above. Yamamoto in view of PAL further disclose claim 8. The computer system of claim 2, wherein the trust negotiation protocol between the computing device, the terminal device, and the facility server comprises: in response to receiving the trust negotiation initiation message, transmitting, by the terminal device, a terminal device certificate for receipt by the computing device; after receiving the terminal device certificate, validating the terminal device certificate, by the computing device and based on terminal device certificate validation data provided by a certificate authority [CA 3, FIG1 of Yamamoto] of the facility server; in response to validating the terminal device certificate, transmitting, by the computing device, a computing device certificate for receipt by the terminal device; and after receiving the computing device certificate, validating the computing device certificate, by the terminal device and based on computing device certificate validation data provided by the certificate authority of the facility server [Yamamoto discloses, “control unit configured to check a legitimacy of a user based on a user-specific certificate stored in a communication-function-equipped device” (Abstract); Certificate information 6, 8 (FIG.1 with col.5, lines 33-67); see also FIGS.5 & 9-11 where PAL discloses selecting and using certificate]. The motivation to combine is the same as that of claim 1 above. Yamamoto in view of PAL further disclose claim 9-11. The computer system of claim 1, wherein the request to access one or more peripherals of the terminal device is a request to access all peripherals of the terminal device, wherein the request to access one or more peripherals of the terminal device is a request to access a particular one of the peripherals of the terminal device; and further comprising: transmitting, by the computing device and for receipt by the terminal device over the secure connection, the request to access one or more peripherals of the terminal device, wherein the request to access the one or more peripherals is initiated by a transaction building and processing application running on the computing device [Both Yamamoto and PAL can disclose one or more peripherals (Abstract and FIG.1 of Yamamoto, FIG.B of PAL)]. The motivation to combine is the same as that of claim 1 above. Yamamoto in view of PAL further disclose claim 12. The computer system of claim 1, further comprising: determining, by the terminal device, whether the one or more peripherals of the terminal device are currently paired with another computing device, wherein the terminal device establishes the temporary pairing between the computing device and the one or more peripherals of the terminal device when the one or more peripherals of the terminal device are not currently paired [PAL discloses, “The processor is configured translate the wired communication protocols of the peripheral devices to the wireless communication protocols of the communication modules to enable communication with a network server or a mobile device” (Abstract with FIG.1) ; see also steps 66-68 of FIG.4A, where peripherals are enables; i.e., paired]. The motivation to combine is the same as that of claim 1 above. Yamamoto in view of PAL further disclose claims 13-16. The computer system of claim 1, further comprising: determining, by the terminal device, whether a particular peripheral of the one or more peripherals of the terminal device is associated with a one-to-one pairing relationship or a one-to-many pairing relationship, wherein the terminal device establishes the temporary pairing between the computing device and the particular peripheral when the particular peripheral is associated with a one-to-many pairing relationship [PAL discloses, “The processor is configured translate the wired communication protocols of the peripheral devices to the wireless communication protocols of the communication modules to enable communication with a network server or a mobile device” (Abstract with FIG.1) ; see also steps 66-68 of FIG.4A, where peripherals are enables; i.e., paired]; further comprising: receiving, by the terminal device and from another computing device over another secure connection between the other computing device and the terminal device, another request to access the particular peripheral that is associated with the one-to-many pairing relationship; and in response to receiving the other request, concurrently establishing another temporary pairing between the other computing device and the particular peripheral; further comprising: after establishing the temporary pairing between the computing device and the one or more peripherals of the terminal device, receiving, by the terminal device and from the computing device, a peripheral device command for a particular peripheral of the one or more peripherals of the terminal device; and routing, by the terminal device, the peripheral device command to the particular peripheral; and further comprising: after establishing the temporary pairing between the computing device and the one or more peripherals of the terminal device, receiving, by the terminal device and from the peripheral, peripheral data generated by the peripheral; and routing, by the terminal device, the peripheral data to the computing device [Both Yamamoto and PAL can disclose peripherals establishing pairing and routing process (Abstract and FIG.1 of Yamamoto, FIG.B of PAL)]. The motivation to combine is the same as that of claim 1 above. Yamamoto in view of PAL further disclose claims 17-19. The computer system of claim 1, further comprising: after establishing the temporary pairing between the computing device and the one or more peripherals of the terminal device, maintaining a record of the established pairing at a datastore of the terminal device; further comprising: receiving, by the terminal device and from a terminal device application, a request to reclaim the one or more peripherals of the terminal device; and in response to receiving the request to reclaim the one or more peripherals of the terminal device, terminating, by the terminal device, the temporary pairing that has been established between the computing device and the one or more peripherals of the terminal device; and further comprising: receiving, by the terminal device and from the computing device, a command to release the one or more peripherals of the terminal device; and in response to receiving the command to release the one or more peripherals of the terminal device, terminating, by the terminal device, the temporary pairing that has been established between the computing device and the one or more peripherals of the terminal device [Yamamoto disclose reissuing token, disabling old token and token information is stored (FIG.13 with col.12, lines 15-23) and token status; i.e., pairing, is also regularly checked (see FIG.14 with col.12, lines 24-63)]. Yamamoto in view of PAL further disclose claim 20. The computer system of claim 1, further comprising: determining, by the terminal device, that a timeout condition has occurred for a particular peripheral of the one or more peripherals of the terminal device; and in response to determining that the timeout condition has occurred, terminating, by the terminal device, the temporary pairing that has been established between the computing device and the particular peripheral of the terminal device [Yamamoto disclose checking if token is disabled or not used for certain period (see FIG.14 with col.12, lines 24-63)]. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. (See PTO—892). For example, US 2019/0347216 A1 directed to METHOD FOR CONNECTING EXTERNAL DEVICE AND ELECTRONIC DEVICE SUPPORTING SAME Contact Information Any inquiry concerning this communication or earlier communications from the examiner should be directed to AMARE F TABOR whose telephone number is (571) 270-3155. The examiner can normally be reached Mon.—Fri.: 8:00 AM to 5:00 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, KAMBIZ ZAND can be reached at (571) 272-3811. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /AMARE F TABOR/Primary Examiner, Art Unit 2434
Read full office action

Prosecution Timeline

Mar 12, 2024
Application Filed
Feb 07, 2026
Non-Final Rejection — §103
Apr 02, 2026
Interview Requested
Apr 10, 2026
Examiner Interview Summary
Apr 10, 2026
Applicant Interview (Telephonic)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12598166
SYSTEMS AND METHODS FOR FACILITATING INGESTION OF ENCRYPTED COMMUNICATIONS RECEIVED ACROSS CLOUD COMPUTING NETWORKS
2y 5m to grant Granted Apr 07, 2026
Patent 12592913
System and Method to Dynamically Encrypt Data
2y 5m to grant Granted Mar 31, 2026
Patent 12592960
COMMUNICATION METHOD AND APPARATUS
2y 5m to grant Granted Mar 31, 2026
Patent 12587508
DATA COMMUNICATION SYSTEM, DATA COMMUNICATION DEVICE, HOST DEVICE, DATA COMMUNICATION METHOD, AND DATA COMMUNICATION PROGRAM
2y 5m to grant Granted Mar 24, 2026
Patent 12587511
METHOD OF SECURE DATA STORAGE AND TRANSFER
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
83%
Grant Probability
99%
With Interview (+23.2%)
3y 0m
Median Time to Grant
Low
PTA Risk
Based on 824 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month