Prosecution Insights
Last updated: April 19, 2026
Application No. 18/744,579

TECHNIQUES TO PERFORM AUTHORIZATION ON LARGE LANGUAGE MODEL RESPONSES

Non-Final OA §103
Filed
Jun 14, 2024
Examiner
DESROSIERS, EVANS
Art Unit
2491
Tech Center
2400 — Computer Networks
Assignee
Salesforce Inc.
OA Round
1 (Non-Final)
83%
Grant Probability
Favorable
1-2
OA Rounds
3y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
853 granted / 1031 resolved
+24.7% vs TC avg
Strong +23% interview lift
Without
With
+23.0%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
22 currently pending
Career history
1053
Total Applications
across all art units

Statute-Specific Performance

§101
10.0%
-30.0% vs TC avg
§103
51.4%
+11.4% vs TC avg
§102
14.7%
-25.3% vs TC avg
§112
8.4%
-31.6% vs TC avg
Black line = Tech Center average estimate • Based on career data from 1031 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Detailed Action This communication is in response to the application filed on 06/14/2024 in which Claims 1-20 are presented for examination. Drawings The applicant’s drawings submitted on 06/14/2024 are acceptable for examination purposes. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-3, 6-11, 14-19 are rejected under 35 U.S.C. 103 as being unpatentable over St. Martin U.S. Patent Application Publication No. 20250200028 A1 (hereinafter "St. Martin"), in view of Rothschild US 20250371263 A1. As to claim 1, St. Martin teaches a method for data processing, comprising (St. Martin Pa. [0046]) [systems and methods discussed herein provide an interactive search system powered by a Large Language Model (LLM)]: receiving, from a user and at an interface for accessing a large language model, a request for a response from the large language model (St. Martin Pa. [0093]) [the server system 106 receives a trained large language model from the system setup module 108, which receives the trained large language model, by querying a third-party network 122 to access, one or more large language models, and select a large language model], the request comprising a prompt for the large language model (St. Martin Pa. [0112]) [the result interpretation module 112 creates a prompt for an LLM based upon the received query results…the prompt may include prioritization of the object description, object history, and/or object emotions, based on the user requests] and data access role information associated with the user (St. Martin Pa. [0138]) [The role of user may provide prompts or queries which are to be replied to by the LLM]; retrieving, from a data source comprising a plurality of data objects (St. Martin Pa. [0094]) [The data stored may comprise at least a plurality of objects and attributes describing a social identity of the objects], inputting, via a model interface (St. Martin Pa. [0106]) [using an LLM interface], the one or more data objects to the large language model (St. Martin Pa. [0124]) [during the processing of input data, the LLM might inaccurately weigh the significance of certain data vectors housed within the vector database, leading to the generation of fabricated or illogical content]; and receiving, via the model interface (St. Martin Pa. [0106]) [using an LLM interface], an output of the large language model based at least in part on the one or more data objects, the output comprising the response to the request comprising the prompt (St. Martin Pa. [0114]) [the prompt could specify whether or not specific details in the SIO data needed to be rigidly included in the LLM's output, or if the LLM should take a more creative approach to answering the prompt, using SIO data as a guide. In some examples, the prompt generated may provide a filter for results that scales the LLM creative output versus utilizing specific SIO data elements] [0129-A response is received from the LLM which is displayed to a user. The user determines whether the LLM response is acceptable or requires further improvement] It is noted that St. Martin does not explicitly disclose one or more data objects for inputting to the large language model based at least in part on comparing the data access role information associated with the user with data access policy information associated with the one or more data objects. However, Rothschild discloses one or more data objects for inputting to the large language model based at least in part on comparing the data access role information associated with the user with data access policy information associated with the one or more data objects (Rothschild Pa. [0033]) [the disclosed techniques may ensure data security by only providing the large language model with data that is accessible to the user based on the access level (read role) of the user.] [0058] [The prompt may only include portions of the data and the metadata that user 115 has access to, based on the access level of user 115, so that the large language model does not receive secure data outside the access level of user 115. This may increase the security of the records by preventing user 115 from accessing information outside the access level of user 115 through the large language model] Thus, it would have been recognized by one of ordinary skill in the art before the effective filing date of the claimed invention, that applying the known technique taught by Rothschild to the Large Language Model system of St. Martin would have yield predictable results and resulted in an improved system, namely, a system that would provide identity-based policy enforcement for SIM devices (Rothschild Pa. [0001]) As to claim 2, St. Martin teaches further comprising: transforming a plurality of data records into a plurality of vectors (St. Martin Pa. [0095]) [the complex language patterns may be aggregated to structurally store a wide array of multidimensional vectors into the vector database, with each vector representing a linguistic component of the input data], wherein the plurality of vectors comprise the plurality of data objects (St. Martin Pa. [0055]) [system may display these objects as data]; and storing , prior to receiving the request from the user (St. Martin Pa. [0139]) [the user may have requested an image], the plurality of vectors in the data source (St. Martin Pa. [0095]) [multidimensional vectors into the vector database] As to claim 3, the combination of St. Martin and Rothschild teaches further comprising: augmenting the plurality of vectors stored in the data source with role information metadata associated with each data record of the plurality of data records (St. Martin Pa. [0095]) [store a wide array of multidimensional vectors into the vector database, with each vector representing a linguistic component of the input data], wherein the data access policy information associated with the plurality of data objects is based at least in part on the role information metadata (Rothschild Pa. [0058]) [[The prompt may only include portions of the data and the metadata that user 115 has access to, based on the access level of user 115] Thus, it would have been recognized by one of ordinary skill in the art before the effective filing date of the claimed invention, that applying the known technique taught by Rothschild to the Large Language Model system of St. Martin would have yield predictable results and resulted in an improved system, namely, a system that would provide identity-based policy enforcement for SIM devices (Rothschild Pa. [0001]) As to claim 6, the combination of St. Martin and Rothschild teaches further comprising: determining that the data access role information associated with the user satisfies the data access policy information associated with the one or more data objects, wherein inputting the one or more data objects to the large language model is based at least in part on the data access role information associated with the user satisfying the data access policy information associated with the one or more data objects (Rothschild Pa. [0033]) [the disclosed techniques may ensure data security by only providing the large language model with data that is accessible to the user based on the access level (read role) of the user.] [0058] [The prompt may only include portions of the data and the metadata that user 115 has access to, based on the access level of user 115, so that the large language model does not receive secure data outside the access level of user 115. This may increase the security of the records by preventing user 115 from accessing information outside the access level of user 115 through the large language model] Thus, it would have been recognized by one of ordinary skill in the art before the effective filing date of the claimed invention, that applying the known technique taught by Rothschild to the Large Language Model system of St. Martin would have yield predictable results and resulted in an improved system, namely, a system that would provide identity-based policy enforcement for SIM devices (Rothschild Pa. [0001]) As to claim 7, the combination of St. Martin and Rothschild teaches further comprising: receiving, from a second user and at the interface for accessing the large language model (St. Martin Pa. [0093]) [the server system 106 receives a trained large language model from the system setup module 108, which receives the trained large language model, by querying a third-party network 122 to access, one or more large language models, and select a large language model], a second request for a second response from the large language model, the second request comprising a second prompt for the large language model (St. Martin Pa. [0112]) [the result interpretation module 112 creates a prompt for an LLM based upon the received query results…the prompt may include prioritization of the object description, object history, and/or object emotions, based on the user requests] and a second data access role information associated with the second user (St. Martin Pa. [0138]) [The role of user may provide prompts or queries which are to be replied to by the LLM]; retrieving, from the data source, a second set of data objects associated with the second request (St. Martin Pa. [0114]) [the prompt could specify whether or not specific details in the SIO data needed to be rigidly included in the LLM's output, or if the LLM should take a more creative approach to answering the prompt, using SIO data as a guide. In some examples, the prompt generated may provide a filter for results that scales the LLM creative output versus utilizing specific SIO data elements] [0129-A response is received from the LLM which is displayed to a user. The user determines whether the LLM response is acceptable or requires further improvement]; and comparing the second data access role information associated with the second user with a second data access policy information associated with the second set of data objects (Rothschild Pa. [0033]) [the disclosed techniques may ensure data security by only providing the large language model with data that is accessible to the user based on the access level (read role) of the user.] [0058] [The prompt may only include portions of the data and the metadata that user 115 has access to, based on the access level of user 115, so that the large language model does not receive secure data outside the access level of user 115. This may increase the security of the records by preventing user 115 from accessing information outside the access level of user 115 through the large language model] Thus, it would have been recognized by one of ordinary skill in the art before the effective filing date of the claimed invention, that applying the known technique taught by Rothschild to the Large Language Model system of St. Martin would have yield predictable results and resulted in an improved system, namely, a system that would provide identity-based policy enforcement for SIM devices (Rothschild Pa. [0001]) As to claim 8, the combination of St. Martin and Rothschild teaches further comprising: determining that the second data access role information associated with the second user does not satisfy the second data access policy information associated with the second set of data objects; and transmitting, to the user, a notification indication that the second request is not satisfied based at least in part on the second data access role information associated with the second user not satisfying the second data access policy information associated with the second set of data objects (Rothschild Pa. [0058]) [The data and the metadata associated with the portion of the record may be included in the prompt to allow the large language model to analyze the data and the metadata to generate answer data to the query. The prompt may only include portions of the data and the metadata that user 115 has access to, based on the access level of user 115, so that the large language model does not receive secure data outside the access level of user 115. ] Thus, it would have been recognized by one of ordinary skill in the art before the effective filing date of the claimed invention, that applying the known technique taught by Rothschild to the Large Language Model system of St. Martin would have yield predictable results and resulted in an improved system, namely, a system that would provide identity-based policy enforcement for SIM devices (Rothschild Pa. [0001]) As to claims 9 and 17, claims 9 and 17 recite the claimed that contain similar limitations as claim 1; therefore, they are rejected under the same rationale. As to claims 10 and 18, claims 10 and 18 recite the claimed that respectively contain similar limitations as claim 2; therefore, they are is rejected under the same rationale. As to claims 11 and 19, claims 11 and 19 recite the claimed that respectively contain similar limitations as claim 3; therefore, they are is rejected under the same rationale. As to claims 12 and 20, claims 12 and 20 recite the claimed that respectively contain similar limitations as claim 4; therefore, they are is rejected under the same rationale. Allowable Subject Matter Claims 4-5, 12-13, 20 are objected to as being dependent upon a rejected base claim, but would be allowable if rewritten in independent form including all of the limitations of the base claim and any intervening claims. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to EVANS DESROSIERS whose telephone number is (571)270-5438. The examiner can normally be reached Monday -Friday 8:00 am - 5:30 pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, William Korzuch can be reached at (571)272-7589. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /EVANS DESROSIERS/Primary Examiner, Art Unit 2491
Read full office action

Prosecution Timeline

Jun 14, 2024
Application Filed
Feb 21, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12596822
PROTECTION OF SECURE VIDEO CONTENT FROM MALICIOUS PROCESSING IN THE DISPLAY PIPELINE
2y 5m to grant Granted Apr 07, 2026
Patent 12592942
SESSION ANALYSIS FOR IDENTITY THREAT DETECTION AND IDENTITY SECURITY POSTURE MANAGEMENT
2y 5m to grant Granted Mar 31, 2026
Patent 12587860
METHOD AND SYSTEM FOR SECURED PAIRING FOR DATA COMMUNICATION BETWEEN AN EDGE NODE AND A BLUETOOTH DEVICE
2y 5m to grant Granted Mar 24, 2026
Patent 12587502
SERVER-INITIATED SECURE SESSIONS
2y 5m to grant Granted Mar 24, 2026
Patent 12587361
ENCRYPTION PROCESSING APPARATUS AND ENCRYPTION PROCESSING METHOD
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
83%
Grant Probability
99%
With Interview (+23.0%)
3y 2m
Median Time to Grant
Low
PTA Risk
Based on 1031 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month