Prosecution Insights
Last updated: April 19, 2026
Application No. 18/674,114

SYSTEMS AND METHODS FOR GENERATING AND MANAGING SECURITY LEVEL-AWARE MAP

Non-Final OA §101
Filed
May 24, 2024
Examiner
DESROSIERS, EVANS
Art Unit
2491
Tech Center
2400 — Computer Networks
Assignee
Palantir Technologies Inc.
OA Round
1 (Non-Final)
83%
Grant Probability
Favorable
1-2
OA Rounds
3y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
853 granted / 1031 resolved
+24.7% vs TC avg
Strong +23% interview lift
Without
With
+23.0%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
22 currently pending
Career history
1053
Total Applications
across all art units

Statute-Specific Performance

§101
10.0%
-30.0% vs TC avg
§103
51.4%
+11.4% vs TC avg
§102
14.7%
-25.3% vs TC avg
§112
8.4%
-31.6% vs TC avg
Black line = Tech Center average estimate • Based on career data from 1031 resolved cases

Office Action

§101
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Detailed Action This communication is in response to the application filed on 05/24/2024 in which Claims 1-20 are presented for examination. Drawings The applicant’s drawings submitted on 05/24/2024 are acceptable for examination purposes. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-20 are rejected under 35 U.S.C. 101 because the claimed invention are directed to non-statutory subject matter. As to claims 1, 13 and 17, claims 1, 13 and 17 appear to be directed to an abstract idea rather than a practical application of the idea. The claim does not result in a physical transformation, nor does it appear to provide a useful, concrete and tangible result. The claimed step of " A method for generating and managing a security level-aware map, the method comprising: receiving a map request from a first user to generate a map with a map security level; determining if the map security level satisfies a first security condition; in response to determining that the map security level satisfies the first security level threshold, generating the map with the map security level…" Thus, what results from the claimed method is merely a security map. The security map is not claimed as applied in a practical application, which provides a tangible, i.e., real world result. security map is not produced a tangible result, because it does not use the result of the connect in a practical application nor make the result available for use in such a form as to enable any usefulness of having performed the step of pairing to be realized. Instead, it appears to remain a mere abstraction. Therefore, claim 1 is not statutory and it is rejected under 35 U. S. C. 101. The dependent claims 2-12, 14-16 and 18-20 included in the statement of rejection but not specifically addressed in the body of the rejection have inherited the deficiencies of their parent claim and have not resolved the deficiencies. Therefore, they are rejected based on the same rationale as applied to their parent claims above. The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. These include. US 20100235640 A1 – Satoh relates to an information processing apparatus, a method of mutual authentication, mutual authentication program, and storage medium, and more particularly, to an information processing apparatus capable of data communications based on mutual authentication, a method of mutual authentication, a mutual authentication program, and a storage medium storing the mutual authentication program. US 20110238840 A1- Shi relates to network communications technologies, and in particular, to a method, system, and device for service negotiation. US 20160026786 A1 Thomas discloses a security techniques and, more particularly, to security techniques for allowing access to applications of a mobile device. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to EVANS DESROSIERS whose telephone number is (571)270-5438. The examiner can normally be reached Monday -Friday 8:00 am - 5:30 pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, William Korzuch can be reached at (571)272-7589. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /EVANS DESROSIERS/Primary Examiner, Art Unit 2491
Read full office action

Prosecution Timeline

May 24, 2024
Application Filed
Feb 22, 2026
Non-Final Rejection — §101 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12596822
PROTECTION OF SECURE VIDEO CONTENT FROM MALICIOUS PROCESSING IN THE DISPLAY PIPELINE
2y 5m to grant Granted Apr 07, 2026
Patent 12592942
SESSION ANALYSIS FOR IDENTITY THREAT DETECTION AND IDENTITY SECURITY POSTURE MANAGEMENT
2y 5m to grant Granted Mar 31, 2026
Patent 12587860
METHOD AND SYSTEM FOR SECURED PAIRING FOR DATA COMMUNICATION BETWEEN AN EDGE NODE AND A BLUETOOTH DEVICE
2y 5m to grant Granted Mar 24, 2026
Patent 12587502
SERVER-INITIATED SECURE SESSIONS
2y 5m to grant Granted Mar 24, 2026
Patent 12587361
ENCRYPTION PROCESSING APPARATUS AND ENCRYPTION PROCESSING METHOD
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
83%
Grant Probability
99%
With Interview (+23.0%)
3y 2m
Median Time to Grant
Low
PTA Risk
Based on 1031 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month