Prosecution Insights
Last updated: April 19, 2026
Application No. 18/674,095

SYSTEMS AND METHODS FOR PROVIDING SECURITY LEVEL BASED GEOSPATIAL NOTIFICATION

Final Rejection §103
Filed
May 24, 2024
Examiner
MALINOWSKI, WALTER J
Art Unit
2439
Tech Center
2400 — Computer Networks
Assignee
Palantir Technologies Inc.
OA Round
2 (Final)
69%
Grant Probability
Favorable
3-4
OA Rounds
3y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 69% — above average
69%
Career Allow Rate
232 granted / 335 resolved
+11.3% vs TC avg
Strong +52% interview lift
Without
With
+52.1%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
22 currently pending
Career history
357
Total Applications
across all art units

Statute-Specific Performance

§101
12.9%
-27.1% vs TC avg
§103
64.6%
+24.6% vs TC avg
§102
4.1%
-35.9% vs TC avg
§112
8.2%
-31.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 335 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION This Office Action is in response to the amendment filed January 2 2026 for application 18/674,095. Claims 1-20 have been examined and are pending. Claims 1, 13, and 17 have been amended. Claims 1, 13, and 17 are independent claims. This Action is made FINAL. Information Disclosure Statement The information disclosure statement (IDS) submitted on 3/10/2026 is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement has been considered by the examiner. Response to Arguments Applicant’s arguments, filed 1/2/2026, with respect to the rejection(s) of claim(s) 1-20 under 35 USC 103 have been fully considered and are persuasive. Therefore, the rejection has been withdrawn. However, upon further consideration, a new ground(s) of rejection is made in view of Cheng in view of Day. Applicant asserts as follows: As provided in the Examiner Interview Summary section, the Examiner agreed that the proposed amendments would overcome the prior art of record. As such, the cited references do not disclose "in response to determining that the user security level satisfies the second security level threshold, updating the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user" recited in amended claim 1. For at least these reasons, Applicant respectfully submits that the Office Action has not established a prima facie case of obviousness of amended claim 1 in view of the cited references. Independent claims 13 and 17 recite similar features as claim 1 and Applicant respectfully submits that claims 13 and 17 are patentable for at least similar reasons as claim 1 and more particularly for the specific features they recite. Examiner respectfully submits, regarding claim 1, Cheng discloses,14th page, lines 18-24, 20th page, lines 41-45, a method for providing a security level based geospatial notification by disclosing real-time location information to smart watch security level; Nontransitory computer readable medium, processors, memory, the method comprising, 9th page, lines 8-13, 3rd page, lines 1-2, displaying a map to a user, the map corresponding to a map security level by disclosing different areas, corresponding security level set for each region, real time positioning information displayed on a map; 9th page, lines 16-24, receiving an indication of a geospatial area on the map, the geospatial area corresponding to an area security level by disclosing warning sent when safe area and enters a dangerous area; 14th page, lines 29-37, receiving a data stream, the data stream corresponds to a data security level by disclosing video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area; 14th page, lines 29-37, determining if the data security level satisfies a first security level threshold by disclosing video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area; 12th page, lines 22-42, determining if a user security level for the user satisfies a second security level threshold if the smart watch wearer is a child; 12th page, lines 22-42, in response to determining that the user security level satisfies the second security level threshold, presenting the geospatial notification to the user by disclosing child enters dangerous area, baby leaves security area, reminding message can be character; 19th page, lines 15-27, wherein the method is performed using one or more processors by disclosing processors. Day discloses, paragraphs 0390, 0255, 0401, in response to determining that the data security level satisfies the first security level threshold, detecting whether an entity satisfies a notification condition based on the data stream by disclosing notify of attempted curfew violations, child device updates, periodic updates from child mobile device, setting geographic restrictions; notify the parent of attempted curfew violations; paragraphs 0390, 0255, 0401, in response to detecting the entity that satisfies the notification condition, generating a geospatial notification including information representing the geospatial area and the entity by disclosing notify of attempted curfew violations, child device updates, periodic updates from child mobile device, setting geographic restrictions; notify the parent of attempted curfew violations; paragraphs 0390, 0255, 0401, in response to determining that the user security level satisfies the second security level threshold, updating the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user by disclosing notify of attempted curfew violations, child device updates, periodic updates from child mobile device, setting geographic restrictions; notify the parent of attempted curfew violations. The Examiner respectfully suggests that the claim be further amended and details in the specification be incorporated to distinguish the claimed invention over prior art of record. Should the Applicant desire an interview to further clarify the claim interpretation/rejections, please contact the Examiner at (571) 272 5368 to schedule an interview. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically discloses as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. This application currently names joint inventors. In considering patentability of the claims the examiner presumes that the subject matter of the various claims was commonly owned as of the effective filing date of the claimed invention(s) absent any evidence to the contrary. Applicant is advised of the obligation under 37 CFR 1.56 to point out the inventor and effective filing dates of each claim that was not commonly owned as of the effective filing date of the later invention in order for the examiner to consider the applicability of 35 U.S.C. 102(b)(2)(C) for any potential 35 U.S.C. 102(a)(2) prior art against the later invention. Claims 1, 3-5, 8-13, 15-17, 19, and 20 are rejected under 35 U.S.C. 103 as being unpatentable over Cheng (CN105701967), published June 22, 2016, in view of Day (US20170149795), filed June 24, 2016. Regarding claim 1, Cheng discloses a method for providing a security level based geospatial notification (Cheng, 14th page, lines 18-24, real-time location information to smart watch security level; 20th page, lines 41-45. Nontransitory computer readable medium, processors, memory), the method comprising: displaying a map to a user, the map corresponding to a map security level (Cheng, 9th page, lines 8-13, different areas, corresponding security level set for each region, 3rd page, lines 1-2, real time positioning information displayed on a map); receiving an indication of a geospatial area on the map, the geospatial area corresponding to an area security level (Cheng, 9th page, lines 16-24, warning sent when safe area and enters a dangerous area); receiving a data stream, the data stream corresponds to a data security level (Cheng, 14th page, lines 29-37, video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area); determining if the data security level satisfies a first security level threshold (Cheng, 14th page, lines 29-37, video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area); determining if a user security level for the user satisfies a second security level threshold (Cheng, 12th page, lines 22-42, if the smart watch wearer is a child); in response to determining that the user security level satisfies the second security level threshold, presenting the geospatial notification to the user (Cheng, 12th page, lines 22-42, child enters dangerous area, baby leaves security area, reminding message can be character); wherein the method is performed using one or more processors (Cheng, 19th page, lines 15-27, processors). Cheng discloses in response to determining that the user security level satisfies the second security level threshold, presenting the geospatial notification to the user, but does not explicitly disclose in response to determining that the data security level satisfies the first security level threshold, detecting whether an entity satisfies a notification condition based on the data stream; in response to detecting the entity that satisfies the notification condition, generating a geospatial notification including information representing the geospatial area and the entity; in response to determining that the user security level satisfies the second security level threshold, updating the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user. However, in an analogous art, Day discloses in response to determining that the data security level satisfies the first security level threshold, detecting whether an entity satisfies a notification condition based on the data stream (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ); in response to detecting the entity that satisfies the notification condition, generating a geospatial notification including information representing the geospatial area and the entity (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations); in response to determining that the user security level satisfies the second security level threshold, updating the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Day with the method / computing device / non-transitory computer-readable medium of Cheng to include in response to determining that the data security level satisfies the first security level threshold, detecting whether an entity satisfies a notification condition based on the data stream; in response to detecting the entity that satisfies the notification condition, generating a geospatial notification including information representing the geospatial area and the entity to provide users with the benefits of allowing parents to view and track smart phone activities of their children (Day: paragraph 0012). Regarding claim 3, Cheng and Day disclose the method of claim 1. Cheng and Day disclose wherein determining if the data security level satisfies a first security level threshold comprises determining if the data security level is lower than the area security level (Cheng, 6th page, lines 20-23, child leaves security area; 10th page, lines 13-15, entering or leaving original area). Regarding claim 4, Cheng and Day disclose the method of claim 1. Cheng and Day disclose wherein determining whether the entity has satisfied the notification condition based on the data stream comprises determining whether the entity has changed from being outside of the geospatial area to being inside the geospatial area based on the data stream (Cheng, 6th page, lines 20-23, child leaves security area; 10th page, lines 13-15, entering or leaving original area). Regarding claim 5, Cheng and Day disclose the method of claim 4. Cheng and Day disclose wherein the geospatial notification includes an identity of the entity and the time when the entity has changed from being outside of the geospatial area to being inside the geospatial area based on the data stream. (Cheng, 6th page, lines 20-23, child leaves security area; 10th page, lines 13-15, entering or leaving original area). Regarding claim 8, Cheng and Day disclose the method of claim 1. Cheng and Day disclose wherein the area security level is equal to the map security level (Cheng, 9th page, lines 8-13, different areas, corresponding security level set for each region, 3rd page, lines 1-2, real time positioning information displayed on a map). Regarding claim 9, Cheng and Day disclose the method of claim 1. Cheng and Day disclose wherein the geospatial notification includes an identity of the entity and the time when the entity satisfied the notification condition (Day, paragraph 0191, location on a map, date and time that the location was recorded). Regarding claim 10, Cheng and Day disclose the method of claim 1. Cheng and Day disclose wherein the geospatial notification corresponds to a notification security level (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ). Regarding claim 11, Cheng and Day disclose the method of claim 1. Cheng and Day disclose, further comprising: transmitting the geospatial notification to a second user based on a user security level of the second user (Cheng, 10th page, lines 15-22, notifying the parent the child has entered a dangerous area). Regarding claim 12, Cheng and Day disclose the method of claim 1. Cheng and Day disclose, further comprising: wherein generating the geospatial notification includes at least one selected from a group consisting of: generating a first geospatial notification indicating that the entity goes into the geospatial area (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ); generating a second geospatial notification indicating that the entity goes out of the geospatial area (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations); generating a third geospatial notification indicating that one or more entities satisfy one or more criteria (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations). Regarding claim 13, Cheng discloses a computing device for providing a security level based geospatial notification, the computing device comprising (Cheng, 14th page, lines 18-24, real-time location information to smart watch security level; 20th page, lines 41-45. Nontransitory computer readable medium, processors, memory): a processor (Cheng, 14th page, lines 18-24, real-time location information to smart watch security level; 20th page, lines 41-45. Nontransitory computer readable medium, processors, memory); and a memory having a plurality of instructions stored thereon that, when executed by the processor, causes the computing device to (Cheng, 14th page, lines 18-24, real-time location information to smart watch security level; 20th page, lines 41-45. Nontransitory computer readable medium, processors, memory): display a map to a user, the map corresponding to a map security level; (Cheng, 9th page, lines 8-13, different areas, corresponding security level set for each region, 3rd page, lines 1-2, real time positioning information displayed on a map) receive an indication of a geospatial area on the map, the geospatial area corresponding to an area security level (Cheng, 9th page, lines 16-24, warning sent when safe area and enters a dangerous area); receive a data stream, the data stream corresponds to a data security level (Cheng, 14th page, lines 29-37, video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area); determine if the data security level satisfies a first security level threshold (Cheng, 14th page, lines 29-37, video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area) determine if a user security level for the user satisfies a second security level threshold (Cheng, 12th page, lines 22-42, child enters dangerous area, baby leaves security area, reminding message can be character); and in response to the determination that the user security level satisfies the second security level threshold, present the geospatial notification to the user (Cheng, 12th page, lines 22-42, child enters dangerous area, baby leaves security area, reminding message can be character). Cheng discloses in response to the determination that the user security level satisfies the second security level threshold, present the geospatial notification to the user, but does not explicitly disclose in response to the determination that the data security level satisfies the first security level threshold, detect whether an entity satisfies a notification condition based on the data stream; in response to the detection of the entity that satisfies the notification condition, generate a geospatial notification including information representing the geospatial area and the entity; in response to the determination that the user security level satisfies the second security level threshold, update the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user. However, in an analogous art, Day discloses in response to the determination that the data security level satisfies the first security level threshold, detect whether an entity satisfies a notification condition based on the data stream (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ); in response to the detection of the entity that satisfies the notification condition, generate a geospatial notification including information representing the geospatial area and the entity (Day, paragraph 0221, generate notification when a user (e.g., child) attempts to bypass the curfew screen, paragraph 0251, generate notifications); in response to the determination that the user security level satisfies the second security level threshold, update the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Day with the method / computing device / non-transitory computer-readable medium of Cheng to include in response to the determination that the data security level satisfies the first security level threshold, detect whether an entity satisfies a notification condition based on the data stream; in response to the detection of the entity that satisfies the notification condition, generate a geospatial notification including information representing the geospatial area and the entity; in response to the determination that the user security level satisfies the second security level threshold, update the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user to provide users with the benefits of allowing parents to view and track smart phone activities of their children (Day: paragraph 0012). Regarding claim 15, Cheng and Day disclose the computing device of claim 13. Cheng and Day disclose wherein to determine if the data security level satisfies a first security level threshold comprises to determine if the data security level is lower than the area security level (Cheng, 6th page, lines 20-23, child leaves security area; 10th page, lines 13-15, entering or leaving original area, 6th page, lines 20-23, child leaves security area; 10th page, lines 13-15, entering or leaving original area, 14th page, lines 29-37, video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area). Regarding claim 16, Cheng and Day disclose the computing device of claim 13. Cheng and Day disclose wherein to determine whether the entity has satisfied the notification condition based on the data stream comprises to determine whether the entity has changed from being outside of the geospatial area to being inside the geospatial area based on the data stream (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ) wherein the geospatial notification includes an identity of the entity and the time when the entity has changed from being outside of the geospatial area to being inside the geospatial area based on the data stream (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ) . Regarding claim 17, Cheng discloses a non-transitory computer-readable medium storing instructions for providing a security level based geospatial notification, the instructions when executed by one or more processors of a computing device, cause the computing device to (Cheng, 14th page, lines 18-24, real-time location information to smart watch security level; 20th page, lines 41-45. Nontransitory computer readable medium, processors, memory): display a map to a user, the map corresponding to a map security level (Cheng, 9th page, lines 8-13, different areas, corresponding security level set for each region, 3rd page, lines 1-2, real time positioning information displayed on a map); receive an indication of a geospatial area on the map, the geospatial area corresponding to an area security level (Cheng, 9th page, lines 16-24, warning sent when safe area and enters a dangerous area); receive a data stream, the data stream corresponds to a data security level (Cheng, 14th page, lines 29-37, video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area); determine if the data security level satisfies a first security level threshold (Cheng, 14th page, lines 29-37, video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area); determine if a user security level for the user satisfies a second security level threshold (Cheng, 12th page, lines 22-42, child enters dangerous area, baby leaves security area, reminding message can be character); and in response to the determination that the user security level satisfies the second security level threshold, present the geospatial notification to the user (Cheng, 12th page, lines 22-42, child enters dangerous area, baby leaves security area, reminding message can be character). Cheng discloses in response to the determination that the user security level satisfies the second security level threshold, present the geospatial notification to the user, but does not explicitly disclose in response to the determination that the data security level satisfies the first security level threshold, detect whether an entity satisfies a notification condition based on the data stream; in response to the detection of the entity that satisfies the notification condition, generate a geospatial notification including information representing the geospatial area and the entity; in response to the determination that the user security level satisfies the second security level threshold, update the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user. However, in an analogous art, Day discloses in response to the determination that the data security level satisfies the first security level threshold, detect whether an entity satisfies a notification condition based on the data stream (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ); in response to the detection of the entity that satisfies the notification condition, generate a geospatial notification including information representing the geospatial area and the entity (Day, paragraph 0221, generate notification when a user (e.g., child) attempts to bypass the curfew screen, paragraph 0251, generate notifications); in response to the determination that the user security level satisfies the second security level threshold, update the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Day with the method / computing device / non-transitory computer-readable medium of Cheng to include in response to the determination that the data security level satisfies the first security level threshold, detect whether an entity satisfies a notification condition based on the data stream; in response to the detection of the entity that satisfies the notification condition, generate a geospatial notification including information representing the geospatial area and the entity; in response to the determination that the user security level satisfies the second security level threshold, update the geospatial notification including content that is allowable according to the second security level threshold to be presented to the user to provide users with the benefits of allowing parents to view and track smart phone activities of their children (Day: paragraph 0012). Regarding claim 19, Cheng and Day disclose the non-transitory computer-readable medium of claim 17. Cheng and Day disclose wherein to determine if the data security level satisfies a first security level threshold comprises to determine if the data security level is lower than the area security level. (Cheng, 6th page, lines 20-23, child leaves security area; 10th page, lines 13-15, entering or leaving original area, 14th page, lines 29-37, video information security level, video picture, starts a video player, inform watch wearer away from a dangerous area). Regarding claim 20, Cheng and Day disclose the non-transitory computer-readable medium of claim 17. Cheng and Day disclose wherein to determine whether the entity has satisfied the notification condition based on the data stream comprises to determine whether the entity has changed from being outside of the geospatial area to being inside the geospatial area based on the data stream (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ) wherein the geospatial notification includes an identity of the entity and the time when the entity has changed from being outside of the geospatial area to being inside the geospatial area based on the data stream (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ).. Claims 2, 14, and 18 are rejected under 35 U.S.C. 103 as being unpatentable over Cheng (CN105701967), published June 22, 2016, in view of Day (US20170149795), filed June 24, 2016, and further in view of Hanada (JP2008040745), published February 21, 2008. Regarding claim 2, Cheng and Day disclose the method of claim 1. Cheng and Day disclose presenting the edited geospatial notification to the user (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ). Cheng and Day do not explicitly disclose in response to determining that the user security level does not satisfy the second security level threshold, editing content of the geospatial notification based on the user security level. However, in an analogous art, Hanada discloses further comprising: in response to determining that the user security level does not satisfy the second security level threshold, editing content of the geospatial notification based on the user security level (Hanada, 8th page, lines 19-24, security level higher than indicated, updated status information, notice that status information has been updated). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Hanada with the method / computing device / non-transitory computer-readable medium of Cheng and Day to include further comprising: in response to determining that the user security level does not satisfy the second security level threshold, editing content of the geospatial notification based on the user security level to provide users with the benefits of reducing the capacity of stored log information (Hanada: first page, technical field). Regarding claim 14, Cheng and Day disclose the computing device of claim 13. Cheng and Day disclose present the edited geospatial notification to the user (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ). Cheng and Day do not explicitly disclose in response to the determination that the user security level does not satisfy the second security level threshold, edit content of the geospatial notification based on the user security level. However, in an analogous art, Hanada discloses in response to the determination that the user security level does not satisfy the second security level threshold, edit content of the geospatial notification based on the user security level (Hanada, 8th page, lines 19-24, security level higher than indicated, updated status information, notice that status information has been updated). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Hanada with the method / computing device / non-transitory computer-readable medium of Cheng and Day to include in response to the determination that the user security level does not satisfy the second security level threshold, edit content of the geospatial notification based on the user security level to provide users with the benefits of reducing the capacity of stored log information (Hanada: first page, technical field). Regarding claim 18, Cheng and Day disclose the non-transitory computer-readable medium of claim 17, wherein the instructions when executed by the one or more processors further cause the computing device to.. Cheng and Day disclose present the edited geospatial notification to the user (Day, paragraph 0390, notify of attempted curfew violations, child device updates, periodic updates from child mobile device, paragraph 0255, setting geographic restrictions; paragraph 0401, notify the parent of attempted curfew violations ). Cheng and Day do not explicitly disclose in response to the determination that the user security level does not satisfy the second security level threshold, edit content of the geospatial notification based on the user security level. However, in an analogous art, Hanada discloses in response to the determination that the user security level does not satisfy the second security level threshold, edit content of the geospatial notification based on the user security level (Hanada, 8th page, lines 19-24, security level higher than indicated, updated status information, notice that status information has been updated). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Hanada with the method / computing device / non-transitory computer-readable medium of Cheng and Day to include in response to the determination that the user security level does not satisfy the second security level threshold, edit content of the geospatial notification based on the user security level to provide users with the benefits of reducing the capacity of stored log information (Hanada: first page, technical field). Claim 6 is rejected under 35 U.S.C. 103 as being unpatentable over Cheng (CN105701967), published June 22, 2016, in view of Day (US20170149795), filed June 24, 2016, and further in view of Vijayakumar (US20230214510), filed December 30, 2021. Regarding claim 6, Cheng and Day disclose the method of claim 5. Cheng and Day disclose wherein determining if the user security level for the user satisfies the second security level threshold (Cheng, 12th page, lines 22-42, child enters dangerous area, baby leaves security area, reminding message can be character). Cheng and Day do not explicitly disclose comprises determining if the user security level is higher than or equal to the notification security level. However, in an analogous art, Vijayakumar discloses comprises determining if the user security level is higher than or equal to the notification security level (Vijayakumar, paragraph 0033, user permission to access messages). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Vijayakumar with the method / computing device / non-transitory computer-readable medium of Cheng and Day to include determining if the user security level is higher than or equal to the notification security level to provide users with the benefits of facilitating communication between and among users (Vijayakumar: paragraph 0001). Claim 7 is rejected under 35 U.S.C. 103 as being unpatentable over Cheng (CN105701967), published June 22, 2016, in view of Day (US20170149795), filed June 24, 2016, and further in view of Zhu (CN105320279), published August 14, 2020. Regarding claim 7, Cheng and Day disclose the method of claim 1. Cheng and Day do not explicitly disclose wherein in response to determining that the user security level does not satisfy the second security level threshold, presenting a portion of the geospatial notification to the user based on the user security level. However, in an analogous art, Zhu discloses wherein in response to determining that the user security level does not satisfy the second security level threshold, presenting a portion of the geospatial notification to the user based on the user security level (Zhu, 4th page, lines 19-26, when the motion state indicates that the user is in the security condition, the control display displays all of the received notification message, when the motion state indicates that the user is in the dangerous situation, the control display does not display the received notification message, and when the motion state indicates that the user is not in the security condition and is not in the dangerous situation, the control display displays a portion of the received notification message.). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Zhu with the method / computing device / non-transitory computer-readable medium of Cheng and Day to include wherein in response to determining that the user security level does not satisfy the second security level threshold, presenting a portion of the geospatial notification to the user based on the user security level to provide users with the benefits of receiving notification messages (Zhu: abstract). Conclusion Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to WALTER J MALINOWSKI whose telephone number is (571)272-5368. The examiner can normally be reached 8-6:30 MTWH. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, LUU PHAM can be reached at 5712705002. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /W.J.M/Examiner, Art Unit 2439 /LUU T PHAM/Supervisory Patent Examiner, Art Unit 2439
Read full office action

Prosecution Timeline

May 24, 2024
Application Filed
Sep 30, 2025
Non-Final Rejection — §103
Dec 03, 2025
Interview Requested
Dec 16, 2025
Applicant Interview (Telephonic)
Dec 16, 2025
Examiner Interview Summary
Jan 02, 2026
Response Filed
Mar 12, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12580897
ANALYZING INDIVIDUAL INFORMATION FROM MULTI-DATABASE SYSTEM
2y 5m to grant Granted Mar 17, 2026
Patent 12574209
DATA PROTECTION USING PORTABLE DATA STRUCTURES
2y 5m to grant Granted Mar 10, 2026
Patent 12568090
SYSTEMS AND METHODS FOR MANAGING DATABASE-LEVEL ROLES FOR DATA SHARING
2y 5m to grant Granted Mar 03, 2026
Patent 12536340
SYSTEM AND METHOD FOR VALIDATING AUTHORSHIP OF AN ELECTRONIC SIGNATURE SESSION
2y 5m to grant Granted Jan 27, 2026
Patent 12517992
DETECTING ATTEMPTS TO DEFEAT FACIAL RECOGNITION
2y 5m to grant Granted Jan 06, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
69%
Grant Probability
99%
With Interview (+52.1%)
3y 2m
Median Time to Grant
Moderate
PTA Risk
Based on 335 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month