Prosecution Insights
Last updated: April 19, 2026
Application No. 18/737,159

METHODS AND SYSTEMS FOR MAPPING ADVERTISING INVENTORY

Non-Final OA §101§103§DP
Filed
Jun 07, 2024
Examiner
VIG, NARESH
Art Unit
3622
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Comcast Cable Communications LLC
OA Round
3 (Non-Final)
37%
Grant Probability
At Risk
3-4
OA Rounds
4y 2m
To Grant
80%
With Interview

Examiner Intelligence

Grants only 37% of cases
37%
Career Allow Rate
223 granted / 607 resolved
-15.3% vs TC avg
Strong +44% interview lift
Without
With
+43.8%
Interview Lift
resolved cases with interview
Typical timeline
4y 2m
Avg Prosecution
47 currently pending
Career history
654
Total Applications
across all art units

Statute-Specific Performance

§101
29.4%
-10.6% vs TC avg
§103
43.9%
+3.9% vs TC avg
§102
2.6%
-37.4% vs TC avg
§112
17.7%
-22.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 607 resolved cases

Office Action

§101 §103 §DP
DETAILED ACTION This is in reference to communication received 10 October 2025. Claims 1 – 20 are pending for examination. The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to a judicial exception (i.e., a law of nature, a natural phenomenon, or an abstract idea) without significantly more. Independent claim 1 representative of claim 12, in part, directed toward a statutory category of invention, the claim appears to be directed toward a judicial exception namely an abstract idea. Claim 1 recites invention directed to generating an identifier corresponding with a user, sending the generated identifier to an advertiser, and receiving an advertisement content from the advertiser to be provided to the user identified by the provided identifier, which, pursuant to MPEP 2106.04, is aptly categorized as a method of organizing human activity (i.e. advertising). Therefore, under Step 2A, Prong One, the claims recite a judicial exception. Independent claim 17 representative of claim 20, in part, directed toward a statutory category of invention, the claim appears to be directed toward a judicial exception namely an abstract idea. Claim 17 recites invention directed to receiving an identifier corresponding with a user, sending and advertisement content identified for the user, which, pursuant to MPEP 2106.04, is aptly categorized as a method of organizing human activity (i.e. advertising). In addition, the aforementioned claims recite additional functional elements that are associated with the judicial exception, including: generating of the identifier which is perishable (e.g., an identifier which will be considered valid for a defined time period) which will be used by the advertisers for providing advertising content, which, pursuant to MPEP 2106.04, is aptly categorized as a method of organizing human activity (i.e. advertising). Therefore, under Step 2A, Prong One, the claims recite a judicial exception. Represented claims 12 and 20, which do recite statutory categories (machine, product of manufacture, for example), the same analysis as above applies to these claims since the method steps are the same. However, the judicial exception is not integrated into a practical application. These claims add the generic computer components (additional elements) of a system comprising one or more hardware processors and a memory (claims 10 and 20). The computing device and advertisement server are recited at a high-level of generality such that they amount to no more than mere instructions to apply the exception using a generic computer component. Accordingly, these additional elements do not integrate the abstract idea into a practical application because they do not impose any meaningful limits on practicing the abstract idea. The claims are directed to an abstract idea. The claims do not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea into a practical application, the additional element of the advertisement-server and computing-device amounts to no more than mere instructions to apply the exception using a generic computer component. Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. Therefore, the claims are not patent eligible. When taken as an ordered combination, nothing is added that is not already present when the elements are taken individually. When viewed as a whole, the marketing activities amount to instructions applied using generic computer components. As for dependent claims 2 – 11, 13 - 16 and 18 – 19, these claims recite limitations that further define the same abstract idea with details regarding defining that the advertising server will only be able to send advertising content to the user until the perishable identifier has expired; a mapping-log will be maintained wherein the “user identifier” is mapped with the “perishable user identifier” (a concept similar to using a DNS server); defining that the perishable identifier will be valid for a defined period of time (e.g., time-to-live), or some triggering criteria; defining which remote devices will be provided with the perishable identifier; and defining that the received advertising content will be forwarded to the user device only when the perishable identifier has not expired. Thus, the dependent claims merely provide additional non-structural (and predominantly non-functional) details that fail to meaningfully limit the claims or the abstract idea(s). Therefore, claims 1 – 20 are not drawn to eligible subject matter, as they are directed to an abstract idea without significantly more. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1 – 20 are rejected under 35 U.S.C. 103 as being unpatentable over Alsina et al. US Publication 2015/0348102 in view of Information on AWS-IAM hereinafter known as AWS, Gatto et al. US Publication 2015/0067118 and Burcham et al. US Patent 10,055,757. Regarding claim 1 and representative claim 12, Alsina teaches system and method for targeting segments based on a respective purchase history of the users, and receives a segment identifier from a server, the segment identifier to be associated with a targeting segment from the targeting segments for anonymously identifying the targeting segment, comprising: an advertisement server (Alsina, content delivery server and/or a separate advertising server) [Alsina, 0100, Fig. 1 and associated disclosure]; and a computing device (Alsina, content delivery server and/or a separate advertising server) [Alsina, 0100, Fig. 1 and associated disclosure] configured for: generating an identifier corresponding to a user identifier associated with a user (Alsina, The UUIDs can be generated to hide the real identity of the users) [Alsina, 0009], Alsina does not explicitly recite user identifier to be perishable. However, AWS teaches system and method for identity management. AWS teaches that permission can be granted through policies that are created and then attached to users, groups, or roles (e.g., user segments), temporary security credentials which are short lived (e.g., perishable), they can be requested using the AWS STS API actions [AWS, page 16]. Therefore, at the time of filing, it would have been obvious to one of ordinary skill in the art to modify Alsina by adopting teachings of AWS to secure control access to resources. Alsina in view of AWS teaches system and method further comprising: generating a perishable identifier corresponding to a user identifier associated with a user, wherein the perishable identifier is configured to be used by an advertisement server to identify advertisement content for the user, and wherein the perishable identifier is only usable prior to its expiration (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16, 26]; Alsina in view of AWS does not teach generating a data structure that establishes a mapping between a persistent identifier associated with a user and a secondary identifier. However, Gatto teaches system and method for anonymous cross-device linking using temporal identifiers (Gatto, receiving login credentials provided by a user when communicating through a first user device. The method further includes creating a temporal identifier (e.g., perishable identifiers) for the user based at least in part on the login credentials and a temporary key) [Gatto, 0004]. Gatto further teaches storing the temporal identifier 206a can include storing the temporal identifier 206a and the device identifier (e.g., "A") in a data structure, e.g., the user devices registry 124, that is indexed by the temporal identifier.) [Gatto, 0069]. Therefore, at the time of filing, it would have been obvious to one of ordinary skill in the art to modify Alsina in view of AWS by adopting teachings of Gatto to implement effective mechanisms for protecting the user's privacy when targeting users, and often share and disseminate private user information beyond the particular user's own control, knowledge, or even approval. Alsina in view of AWS and Gatto teaches system and method further comprising: generating a perishable identifier by generating a data structure that establishes a mapping between a persistent identifier associated with a user and a secondary identifier (Gatto, storing the temporal identifier 206a can include storing the temporal identifier 206a and the device identifier (e.g., "A") in a data structure, e.g., the user devices registry 124, that is indexed by the temporal identifier.) [Gatto, 0069], wherein the perishable identifier is configured to be used by an advertisement server to identify advertisement content for the user, and wherein the secondary identifier is configured to persist in the mapping for a session duration or until expiration of a predetermined time-to-live value (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16, 26]; sending the perishable identifier to the advertisement server (Alsina, the system sends, to the server, the segment identifiers and unique user identifiers of the users mapped to the targeting segments associated with the segment identifiers) [Alsina, Fig. 5 and associated disclosure]; and Alsina in view of AWS and Gatto does not explicitly teach receiving advertising content identified for the user. However, Alsina teaches to instruct the server to deliver selected invitational content to the associated user [Alsina, Fig. 5 and associated disclosure]. Burcham teaches system and method for receiving, at an advertisement gateway, a request message for an advertisement from an electronic device, hashing identifying information in the request message with a temporary identifier, creating a unique identification for the electronic device based on the hashing [Burcham, col. 1, lines 39 – 44]. Therefore, at the time of filing, it would have been obvious to one of ordinary skill in the art to modify Alsina in view of AWS in view of Gatto by adopting teachings of Burcham for mediating advertisements through an advertising gateway. Alsina in view of AWS, Gatto and Burcham teaches system and method further comprising: receiving, from the advertisement server, advertisement content identified for the user (Burcham, At step 262, the content can be received at the advertisement gateway 112. The content can include an advertisement from one or more of the advertisement provider servers 118, 120, and/or content associated with an advertisement from one or more of the content provider servers 114, 116 and/or the advertisement provider servers 118, 120)) [Burcham, col. 14, lines 33 – 39; col. 11, lines 1 – 2]. Regarding claim 2 and represented claim 13, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, wherein, if the perishable identifier is not expired at the advertisement server, the advertisement server is provided access to use the perishable identifier to determine a targeted placement of the advertisement content that maps to one or more attributes associated with the persistent identifier without exposing the persistent identifier to the advertisement server (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16. 26]. Regarding claim 3 and represented claim 14, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, wherein, if the perishable identifier is expired at the advertisement server prior to a determination of a targeted placement of the advertisement content, the advertisement server is not provided access to use the perishable identifier to determine the targeted placement of the advertisement content (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16, 26]. Regarding claim 4 and represented claim 15, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, wherein the perishable identifier is generated based on a mapping between the secondary identifier and the persistent identifier (Gatto, storing the temporal identifier 206a can include storing the temporal identifier 206a and the device identifier (e.g., "A") in a data structure, e.g., the user devices registry 124, that is indexed by the temporal identifier.) [Gatto, 0069]. Regarding claim 5 and represented claim, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, wherein the perishable identifier is configured to expire based on an event (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16. 26], and wherein the event comprises a configurable time period PNG media_image1.png 234 664 media_image1.png Greyscale [Aws, page 18]. Regarding claim 6, The method of claim 1, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, wherein the perishable identifier is configured to expire based on an event, and wherein the event comprises termination of the session duration (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16. 26; also see Using Temporary Security Credentials with AWS SDKs, page 28]. Regarding claim 7, The method of claim 1, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, wherein the perishable identifier indicates a subset of information associated with the persistent identifier prior to occurrence of an event, wherein the subset of the information comprises one or more of content viewing behavior of one or more users, a location of one or more users, and a demographic information of one or more users (Alsina, the system can also deliver a campaign to the server and instruct the server to deliver invitational content to the UUIDs associated with the segment identifier based on the campaign parameters. To this end, the system can use the segment identifier to target invitational content to one or more users in the targeting segment; The mapping 400 can also associate UUIDs with particular segments and segment identifiers. For example, the mapping 400 can associate UUIDs 406 with the "sportswear" segment, which is associated with the "ABC" segment identifier. Thus, through the association of UUIDs 406, the business can associate a segment identifier with both a segment and the customers in the segment. As a result, the segment identifier "ABC" can represent to the business the "sports wear" segment made up by customers 845, 639, 101, 966, and 43) [Alsina, 0010, 0099]. Regarding claim 8, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, further comprising receiving an indication of an advertisement opportunity associated with content (Alsina, in some configurations, the system can send a request to the server to deliver invitational content to a segment represented by the segment identifier. The server can then deliver the invitational content to the segment based on the request, without knowing the identity of the segment or the users in the segment) [Alsina, 0011]. Regarding claim 9, The method of claim 8, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, further comprising placing the advertisement content in the advertisement opportunity associated with the content (Alsina, The system then instructs the server to deliver selected invitational content to at least one unique user identifier associated with a segment identifier (508)) [Alsina, 0104; also see, Burcham, col. 1, lines 39 – 44]. Regarding claim 10 and represented claim 16, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method further comprising: transmitting the persistent identifier to at least one of one or more first devices associated with a rights management entity (Alsina, The UUID database 154 can include UUIDs created or generated by the user terminals 102. For example, user terminal 102, can generate a UUID to identify the user associated with the terminal 102, and subsequently send the UUID to the content delivery system 106) [Alsina, 0037]; and transmitting the perishable identifier [AWS] to the at least one of one or more first devices associated with the rights management entity, and wherein sending the perishable identifier comprises transmitting the perishable identifier to a second device associated with the advertisement server (Alsina, Next, the system sends, to the server, the segment identifiers and unique user identifiers of the users mapped to the targeting segments associated with the segment identifiers, the unique user identifiers masking respective identities of the users from the server and the segment identifiers masking an identity of the targeting segments associated with the segment identifiers (506). The unique user identifiers can include identifiers generated by, or received from, the user's client device as previously mentioned) [Alsina, 0104]. Regarding claim 11, The method of claim 10, as combined and under the same rationale as above, Alsina in view of AWS, Gatto and Burcham teaches system and method, further comprising transmitting, if the perishable identifier is not expired at least at a time of the transmitting the perishable identifier, to a user device associated with the persistent identifier, the advertisement content placed in an advertisement opportunity associated with content (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16. 26]. Regarding claim 17 and represented claim 20, Alsina teaches system and method for targeting segments based on a respective purchase history of the users, and receives a segment identifier from a server, the segment identifier to be associated with a targeting segment from the targeting segments for anonymously identifying the targeting segment, comprising: a computing device (Alsina, content delivery server and/or a separate advertising server) [Alsina, 0100, Fig. 1 and associated disclosure]; and an advertisement server (Alsina, content delivery server and/or a separate advertising server) [Alsina, 0100, Fig. 1 and associated disclosure] configured to: an identifier corresponding to a user identifier associated with a user (Alsina, The UUIDs can be generated to hide the real identity of the users) [Alsina, 0009], Alsina does not explicitly recite user identifier to be perishable. However, AWS teaches system and method for identity management. AWS teaches that permission can be granted through policies that are created and then attached to users, groups, or roles (e.g., user segments), temporary security credentials which are short lived (e.g., perishable), they can be requested using the AWS STS API actions [AWS, page 16]. Therefore, at the time of filing, it would have been obvious to one of ordinary skill in the art to modify Alsina by adopting teachings of AWS to secure control access to resources. Alsina in view of AWS teaches system and method further comprising: receiving, from a computing device, a perishable identifier, wherein the perishable identifier is configured to be used by an advertisement server to identify advertisement content for the user, and wherein the secondary identifier is configured to persist in the mapping for a session duration or until expiration of a predetermined time-to-live value (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16, 26]; Alsina in view of AWS does not teach generating a data structure that establishes a mapping between a persistent identifier associated with a user and a secondary identifier. However, Gatto teaches system and method for anonymous cross-device linking using temporal identifiers (Gatto, receiving login credentials provided by a user when communicating through a first user device. The method further includes creating a temporal identifier (e.g., perishable identifiers) for the user based at least in part on the login credentials and a temporary key) [Gatto, 0004]. Gatto further teaches storing the temporal identifier 206a can include storing the temporal identifier 206a and the device identifier (e.g., "A") in a data structure, e.g., the user devices registry 124, that is indexed by the temporal identifier.) [Gatto, 0069]. Therefore, at the time of filing, it would have been obvious to one of ordinary skill in the art to modify Alsina in view of AWS by adopting teachings of Gatto to implement effective mechanisms for protecting the user's privacy when targeting users, and often share and disseminate private user information beyond the particular user's own control, knowledge, or even approval. Alsina in view of AWS and Gatto teaches system and method further comprising: receiving, from a computing device, a perishable identifier generated by the computing device by generating a data structure that establishes a mapping between a persistent identifier associated with a user and a secondary identifier (Gatto, storing the temporal identifier 206a can include storing the temporal identifier 206a and the device identifier (e.g., "A") in a data structure, e.g., the user devices registry 124, that is indexed by the temporal identifier.) [Gatto, 0069], wherein the perishable identifier is configured to be used by an advertisement server to identify advertisement content for the user, and wherein the secondary identifier is configured to persist in the mapping for a session duration or until expiration of a predetermined time-to-live value (AWS, temporary security credentials which are short lived (i.e., perishable), they can be requested using the AWS STS API actions. The temporary credentials expire after a specified interval. After the credential expire, any calls that you make using those credentials will fail) [AWS, page 16, 26], and; Alsina in view of AWS and Gatto does not explicitly teach receiving advertising content identified for the user. However, Alsina teaches to instruct the server to deliver selected invitational content to the associated user [Alsina, Fig. 5 and associated disclosure]. Burcham teaches system and method for receiving, at an advertisement gateway, a request message for an advertisement from an electronic device, hashing identifying information in the request message with a temporary identifier, creating a unique identification for the electronic device based on the hashing [Burcham, col. 1, lines 39 – 44]. Therefore, at the time of filing, it would have been obvious to one of ordinary skill in the art to modify Alsina in view of AWS in view of Gatto by adopting teachings of Burcham for mediating advertisements through an advertising gateway. Alsina in view of AWS, Gatto and Burcham teaches system and method further comprising: sending, to the computing device, advertisement content identified for the user (Burcham, At step 262, the content can be received at the advertisement gateway 112. The content can include an advertisement from one or more of the advertisement provider servers 118, 120, and/or content associated with an advertisement from one or more of the content provider servers 114, 116 and/or the advertisement provider servers 118, 120)) [Burcham, col. 14, lines 31 – 39; col. 11, lines 1 – 2]. Double Patenting The nonstatutory double patenting rejection is based on a judicially created doctrine grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or improper timewise extension of the “right to exclude” granted by a patent and to prevent possible harassment by multiple assignees. A nonstatutory double patenting rejection is appropriate where the conflicting claims are not identical, but at least one examined application claim is not patentably distinct from the reference claim(s) because the examined application claim is either anticipated by, or would have been obvious over, the reference claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); In re Thorington, 418 F.2d 528, 163 USPQ 644 (CCPA 1969). A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may be used to overcome an actual or provisional rejection based on nonstatutory double patenting provided the reference application or patent either is shown to be commonly owned with the examined application, or claims an invention made as a result of activities undertaken within the scope of a joint research agreement. See MPEP § 717.02 for applications subject to examination under the first inventor to file provisions of the AIA as explained in MPEP § 2159. See MPEP §§ 706.02(l)(1) - 706.02(l)(3) for applications not subject to examination under the first inventor to file provisions of the AIA . A terminal disclaimer must be signed in compliance with 37 CFR 1.321(b). The USPTO Internet website contains terminal disclaimer forms which may be used. Please visit www.uspto.gov/patent/patents-forms. The filing date of the application in which the form is filed determines what form (e.g., PTO/SB/25, PTO/SB/26, PTO/AIA /25, or PTO/AIA /26) should be used. A web-based eTerminal Disclaimer may be filled out completely online using web-screens. An eTerminal Disclaimer that meets all requirements is auto-processed and approved immediately upon submission. For more information about eTerminal Disclaimers, refer to www.uspto.gov/patents/process/file/efs/guidance/eTD-info-I.jsp. Claims 1 – 20 are rejected on the ground of nonstatutory double patenting as being unpatentable over claims 1 – 31 of U.S. Patent No. 11,430,007 and claims 1 – 21 of U.S. Patent 12,033,185. Although the claims at issue are not identical, they are not patentably distinct from each other because the subject matter claimed in the instant application is fully disclosed in the patent and is covered by the patent since the patent and the application are claiming common subject matter, as follows: Application 15/457,387 (Claim 1 representative of claim 15) US Patent 11,430,007 generating a perishable identifier by generating a data structure that establishes a mapping between a persistent identifier associated with a user and a secondary identifier, wherein the perishable identifier is configured to be used by an advertisement server to identify advertisement content for the user, and wherein the secondary identifier is configured to persist in the mapping for a session duration or until expiration of a predetermined time-to-live value; receiving a first identifier associated with a user of content, wherein the content comprises one or more advertisement events; determining a second identifier based at least on the first identifier, wherein the second identifier is a perishable identifier configured to expire based on an event; sending the perishable identifier to the advertisement server; and transmitting the second identifier to an external entity, wherein, if not expired, the second identifier facilitates the external entity to determine targeted placement of one or more advertisements without exposing the first identifier to the external entity, and wherein, if expired before determination of the targeted placement of the one or more advertisements, the second identifier does not facilitate the external entity to determine targeted placement of the one or more advertisements; receiving, from the advertisement server, advertisement content identified for the user. receiving the one or more advertisements and the second identifier; receiving the one or more advertisements and the second identifier; determining that the second identifier is based at least on the first identifier; and sending, if the second identifier is not expired at least at the time of the transmitting, the one or more advertisements to the user associated with the first identifier. Application 15/457,387 (Claim 17 and representative of claim 20) US Patent 11,430,007 receiving, from a computing device, a perishable identifier generated by the computing device by generating a data structure that establishes a mapping between a persistent identifier associated with a user and a secondary identifier, wherein the perishable identifier is configured to be used by an advertisement server to identify advertisement content for the user, and wherein the secondary identifier is configured to persist in the mapping for a session duration or until expiration of a predetermined time-to-live value; receiving a first identifier associated with a user of content, wherein the content comprises one or more advertisement events; determining a second identifier based at least on the first identifier, wherein the second identifier is a perishable identifier configured to expire based on an event; transmitting the second identifier to an external entity, wherein, if not expired, the second identifier facilitates the external entity to determine targeted placement of one or more advertisements without exposing the first identifier to the external entity, and wherein, if expired before determination of the targeted placement of the one or more advertisements, the second identifier does not facilitate the external entity to determine targeted placement of the one or more advertisements; sending, to the computing device, advertisement content identified for the user receiving the one or more advertisements and the second identifier; receiving the one or more advertisements and the second identifier; determining that the second identifier is based at least on the first identifier; and sending, if the second identifier is not expired at least at the time of the transmitting, the one or more advertisements to the user associated with the first identifier. Furthermore, there is no apparent reason why applicant was prevented from presenting claims corresponding to those of the instant application during prosecution of the application which matured into a patent. See In re Schneller, 397 F.2d 350, 158 USPQ 210 (CCPA 1968). See also MPEP § 804. Response to Arguments Applicant’s arguments and concerns are for added limitations to the independent claims which are moot under new grounds or rejection. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to Naresh Vig whose telephone number is (571)272-6810. The examiner can normally be reached Mon-Fri 06:30a - 04:00p. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Ilana Spar can be reached at 571.270.7537. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /NARESH VIG/Primary Examiner, Art Unit 3622 January 5, 2026
Read full office action

Prosecution Timeline

Jun 07, 2024
Application Filed
Feb 07, 2025
Non-Final Rejection — §101, §103, §DP
May 12, 2025
Response Filed
Jul 08, 2025
Final Rejection — §101, §103, §DP
Oct 10, 2025
Request for Continued Examination
Oct 18, 2025
Response after Non-Final Action
Jan 05, 2026
Non-Final Rejection — §101, §103, §DP (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12346935
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE RECORDING MEDIUM FOR PROVIDING INFORMATION TO A PASSENGER
2y 5m to grant Granted Jul 01, 2025
Patent 12314966
Providing Wireless Network Access
2y 5m to grant Granted May 27, 2025
Patent 12282936
OMNI-CHANNEL DIGITAL COUPON CLIPPING AND REDEMPTION
2y 5m to grant Granted Apr 22, 2025
Patent 12277580
METHODS AND SYSTEMS FOR PERSONALIZING VISITOR EXPERIENCE, ENCOURAGING PHILANTHROPIC ACTIVITY AND SOCIAL NETWORKING
2y 5m to grant Granted Apr 15, 2025
Patent 12254494
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE RECORDING MEDIUM FOR PROVIDING INFORMATION TO A PASSENGER
2y 5m to grant Granted Mar 18, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
37%
Grant Probability
80%
With Interview (+43.8%)
4y 2m
Median Time to Grant
High
PTA Risk
Based on 607 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month