Prosecution Insights
Last updated: April 19, 2026
Application No. 18/711,576

METHOD FOR SECURING SECURITY TOKEN AND SMARTCARD INTO PROCESSING DEVICE, AND SYSTEM, TERMINAL AND COMPUTER-READABLE MEDIUM FOR THE SAME

Non-Final OA §102
Filed
May 17, 2024
Examiner
OKEKE, IZUNNA
Art Unit
2497
Tech Center
2400 — Computer Networks
Assignee
X70 Io Ltd.
OA Round
1 (Non-Final)
82%
Grant Probability
Favorable
1-2
OA Rounds
2y 11m
To Grant
97%
With Interview

Examiner Intelligence

Grants 82% — above average
82%
Career Allow Rate
609 granted / 744 resolved
+23.9% vs TC avg
Strong +15% interview lift
Without
With
+15.4%
Interview Lift
resolved cases with interview
Typical timeline
2y 11m
Avg Prosecution
12 currently pending
Career history
756
Total Applications
across all art units

Statute-Specific Performance

§101
8.7%
-31.3% vs TC avg
§103
30.3%
-9.7% vs TC avg
§102
37.9%
-2.1% vs TC avg
§112
14.7%
-25.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 744 resolved cases

Office Action

§102
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. Claim(s) 1-21 is/are rejected under 35 U.S.C. 102[a][1] as being anticipated by Motika et al. (US-20160234022). a. Referring to claims 1, 9, 10, 14, 19 and 20: Regarding claims 1, 9, 10, 14, 19 and 20, Motika teaches a method for data processing, the method comprising: establishing a communicative connection between a first processing device and a second processing device (Para 31…. connection between source device and recipient device); receiving a request at the first processing device, the request sent from the second processing device via the communicative connection (Para 36…. request message to the source device); processing by a cryptology portion of the first processing device, the processing by the cryptology portion of the first processing device including one or more secrets (Para 36 and 39…. the secure element of the source device processing the request, including secrets); processing data associated with the request, by the cryptology portion of the first processing device, the cryptology portion operative to process a result by emulating a processing device on the cryptology portion of the first processing device to generate a reply (Para 36…. the secure element of the source device processing data associated with the request to generate a reply); and sending the reply from the first processing device to the second processing device (Para 36…. sending the reply from the source device to the recipient device). a. Referring to claim 2: Regarding claim 2, Motika teaches the method of claim 1, further comprising the second processing device evaluating whether the one or more secrets were used in generating the reply to establish an identity of the cryptology portion of the first processing device (Para 36… the recipient device validating the response message based on an identifier). a. Referring to claims 3 and 13: Regarding claims 3 and 13, Motika teaches the method of claim 1, further comprising granting a privilege to a user (Para 36… privilege to user upon authentication). a. Referring to claims 4 and 18: Regarding claims 4 and 18, Motika teaches the method of claim 1, wherein the cryptology portion is operative to process a result by emulating a processing device on the cryptology portion (Para 36 and 39… secure element). a. Referring to claim 5: Regarding claim 5, Motika teaches the method of claim 1, wherein the request includes an authentication request (Para 36…. authentication request). a. Referring to claim 6: Regarding claim 6, Motika teaches the method of claim 1, wherein the cryptology portion of the first processing device is substantially separate from other processors on the first processing device (See Fig. 10…. secure element). a. Referring to claim 7: Regarding claim 7, Motika teaches the method of claim 1, wherein the one or more secrets identify the first cryptology portion to the second processing device (Para 33 and 36… unique identifier). a. Referring to claim 8: Regarding claim 8, Motika teaches the method of claim 1, wherein the first processing device includes a mobile processing device (Para 29…. source device as a smartphone). a. Referring to claim 11: Regarding claim 11, Motika teaches the method of claim 10, wherein the one or more secrets are sent from the second processing device to the cryptology portion using a secure channel (Para 39…. transmission between secure elements comprise a secure channel). a. Referring to claim 12: Regarding claim 12, Motika teaches the method of claim 1, wherein the cryptology portion includes an embedded universal integrated circuit card (eUICC) (Para 30… secure element). a. Referring to claim 15: Regarding claim 15, Motika teaches the method of claim 14, wherein the first processing device is a mobile device and the second processing device is a device operative to identify a user (Para 28 and 29…. source device as a mobile device and recipient device operable to identify a user). a. Referring to claim 16: Regarding claim 16, Motika teaches the method of claim 14, wherein the first processing device is further operative to generate a reply identifying an account associated with the first processing device (Para 36…. authentication response). a. Referring to claim 17: Regarding claim 17, Motika teaches the method of claim 14, further comprising establishing a second communicative connection between a processor of the first processing device and a processor of the second processing device; and receiving by the processor of the first processing device a request from the second processing device via the second communicative connection (Para 35 and 36…. authentication request from the receiving device to the source device). a. Referring to claim 21: Regarding claim 21, Motika teaches a method for data processing, the method comprising: establishing a communicative connection between a first processing device and a second processing device (Para 31…. connection between source device and recipient device); processing a request at the first processing device, the request sent from the second processing device via the communicative connection; processing by a cryptology portion of the first processing device, the processing by the cryptology portion of the first processing device including one or more secrets (Para 36 and 39…. the secure element of the source device processing the request, including secrets); processing the one or more secrets at a cryptology portion of the second processing device; processing data associated with the request, by the cryptology portion of the first processing device, the cryptology portion operative to process a result by emulating a processing device on the cryptology portion of the first processing device to generate a response, the response being operative to identify the first processing device, the processing of the reply by the second device includes evaluating whether the one or more secrets were used in generating the reply to establish the identity of the cryptology portion of the first processing device (Para 36…. the secure element of the source device processing data associated with the request to generate a reply); and sending the response from the first processing device to the second processing device (Para 36…. sending the reply from the source device to the recipient device). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to IZUNNA OKEKE whose telephone number is (571)270-3854. The examiner can normally be reached Mon - Fri 8 - 4 EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, ELENI SHIFERAW can be reached at (571) 272-3867. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /IZUNNA OKEKE/Primary Examiner, Art Unit 2497
Read full office action

Prosecution Timeline

May 17, 2024
Application Filed
Dec 23, 2025
Non-Final Rejection — §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12580767
TRANSMISSION OF SECURE AND AUTHENTICATED DATA OVER A NETWORK
2y 5m to grant Granted Mar 17, 2026
Patent 12574257
SMART HEATER SYSTEM FOR BATHING INSTALLATIONS INCLUDING SPAS
2y 5m to grant Granted Mar 10, 2026
Patent 12567971
ENTERPRISE AUTHENTICATION WITH VIRTUALIZED TPM
2y 5m to grant Granted Mar 03, 2026
Patent 12561415
GENERATION OF CRYPTOGRAPHIC KEYS
2y 5m to grant Granted Feb 24, 2026
Patent 12554869
A DEVICE AND A METHOD FOR PERFORMING A CRYPTOGRAPHIC ALGORITHM
2y 5m to grant Granted Feb 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
82%
Grant Probability
97%
With Interview (+15.4%)
2y 11m
Median Time to Grant
Low
PTA Risk
Based on 744 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month