Prosecution Insights
Last updated: April 19, 2026
Application No. 18/843,555

Authentication and Security Protocols for On-Line Instructional System

Non-Final OA §103
Filed
Sep 03, 2024
Examiner
REZA, MOHAMMAD W
Art Unit
2407
Tech Center
2400 — Computer Networks
Assignee
Saras-3D Inc.
OA Round
1 (Non-Final)
88%
Grant Probability
Favorable
1-2
OA Rounds
2y 11m
To Grant
98%
With Interview

Examiner Intelligence

Grants 88% — above average
88%
Career Allow Rate
825 granted / 943 resolved
+29.5% vs TC avg
Moderate +11% lift
Without
With
+10.9%
Interview Lift
resolved cases with interview
Typical timeline
2y 11m
Avg Prosecution
15 currently pending
Career history
958
Total Applications
across all art units

Statute-Specific Performance

§101
14.6%
-25.4% vs TC avg
§103
47.5%
+7.5% vs TC avg
§102
6.1%
-33.9% vs TC avg
§112
12.9%
-27.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 943 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION Claims 1-14 are presented for examination. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. 3. Claims 1-14 are rejected under 35 U.S.C. 103 as being unpatentable over Schmidt (US pat. App. Pub. 20230284013) and in view of DORFMAN et al hereafter DORFMAN (US pat. App. Pub. 20140282961) and further in view of Cook et al hereinafter Cook (US pat. app. Pub. 20150379253). 4. As per claim 1, Schmidt discloses a system for authenticating an individual subscriber to access a network-based on-line system platform from a computing system including an installed software module for controlling an instruction session, comprising a unique hardware verification component paired with an individual subscriber in a one-to-one manner and co-located with the computing system having the installed software module, the unique hardware verification component including a camera for capturing a digital verification code displayed on a computer monitor of the computing system (paragraphs: 32-33, wherein it emphasizes a user uses a computing system to access the network resources and a mobile device (a unique hardware verification component) belongs to the user that is located close to the display screen of the computing system. This mobile device where a software app is running and installed with a camera that captures an image of the QR-code being displayed on the display screen), and a communication interface for transmitting the captured digital verification code (paragraph: 29, wherein it elaborates that server receives the QR-code from the device); and a network-based on-line system platform comprising: at least one memory including instructions; and at least one processor configured to execute the instructions and cause the network-based on-line system platform to perform an authentication process for the individual subscriber including (paragraph: 30, wherein it discusses that server receives the QR-cod and performs an authentication for the user): accessing a subscriber database to retrieve authentication information associated with the individual subscriber; comparing retrieved information to a decrypted version of a verification code captured by the hardware verification component and communicated to the network-based system platform from computing (paragraphs: 34, wherein it describes comparing the QR-code to the extracted code to verify the authenticity of the user); and: if matching, transmitting a command to individual computing system to render the displayed image and permit access to the network-based system platform (paragraphs: 36-38, wherein it deliberates if the comparison result is positive then the user is permitted to access the network resource); otherwise, transmitting a “denial of access” response to the individual computing system (paragraph: 35, wherein it describes the if the comparison result is negative then No message occurs). Schmidt does not specifically disclose a communication interface for receiving data communications from the computing system of the individual subscriber. However, in the same field of endeavor, DORFMAN discloses a communication interface for receiving data communications from the computing system of the individual subscriber (paragraphs: 19, 26, 31-32, and 40). Accordingly, it would been obvious to one of ordinary skill in the network security art before the effective filing date of the claimed invention to have incorporated DORFMAN’s teachings of communication interface for receiving data communications from the computing system of the individual subscriber with the teachings of Schmidt, for the purpose of effectively authenticating the user identity by a remote communication system. Schmidt does not specifically disclose authenticating an individual subscriber to access a network-based on-line learning system platform from a computing system. However, in the same field of endeavor, Cook discloses authenticating an individual subscriber to access a network-based on-line learning system platform from a computing system (paragraphs: 8, 44, 45). Accordingly, it would been obvious to one of ordinary skill in the network security art before the effective filing date of the claimed invention to have incorporated Cook’s teachings of authenticating an individual subscriber to access a network-based on-line learning system platform from a computing system with the teachings of Schmidt, for the purpose of effectively validating a subscriber to access the on-line courses. 5. As per claim 2, Schmidt discloses the system, wherein the combination of the at least one memory including instructions and the at least one processor are further configured to execute accessibility instructions and cause the network-based on-line system platform to perform processes related to controlling access to at the platform (paragraphs: 24-27). Schmidt does not specifically disclose the system, wherein the network-based on-line learning system platform to perform processes related to controlling access to individual learning modules at the platform. However, in the same field of endeavor, Cook discloses wherein the network-based on-line learning system platform to perform processes related to controlling access to individual learning modules at the platform (paragraphs: 22, 44-45, and 48). Accordingly, it would been obvious to one of ordinary skill in the network security art before the effective filing date of the claimed invention to have incorporated Cook’s teachings of wherein the network-based on-line learning system platform to perform processes related to controlling access to individual learning modules at the platform with the teachings of Schmidt, for the purpose of effectively allowing to access different learning modules of an on-line course. 6. As per claim 3, Schmidt discloses the system, where the hardware verification component is used to read this unique verification code to create an access response that is sent to the network-based system platform for use in determining if the subscribed individual has a proper permission to access a selected module (paragraphs: 32-34). Schmidt does not specifically disclose wherein each learning module contains a unique verification code on an initial page, where the hardware verification component is used is sent to the network-based learning system platform for use in determining if the subscribed individual has a proper permission to access a selected learning module. However, in the same field of endeavor, Cook discloses wherein each learning module contains a unique verification code on an initial page, where the hardware verification component is used is sent to the network-based learning system platform for use in determining if the subscribed individual has a proper permission to access a selected learning module (paragraphs: 25, 54, 57). Accordingly, it would been obvious to one of ordinary skill in the network security art before the effective filing date of the claimed invention to have incorporated Cook’s teachings of each learning module contains a unique verification code on an initial page, where the hardware verification component is used is sent to the network-based learning system platform for use in determining if the subscribed individual has a proper permission to access a selected learning module with the teachings of Schmidt, for the purpose of effectively protecting the each on-line learning module. 7. As per claim 4, Schmidt discloses the system, wherein the at least one memory including instructions; the at least one processor configured to execute the instructions and cause the network-based on-line learning system platform to perform an authentication process for the individual subscriber are located within a service management component at the network-based learning system platform (paragraphs: 17, and 26). 8. As per claim 5, Schmidt discloses the system wherein the service management component further comprises a module for maintaining a history of an individual subscriber's use of different learning modules (paragraphs: 28-30). 9. As per claims 6, Schmidt discloses a method for authenticating an individual subscriber to access a network-based system platform, comprising providing a unique hardware verification component to an individual subscriber, the unique hardware verification component including a camera and a communication interface coupled to a computing system associated with the individual subscriber; displaying, on a computer monitor associated with the individual subscriber, an access page associated with the network-based on-line instructional system, the access page including a unique verification code associated with the individual subscriber and embedded within the displayed access page; using the camera of the unique hardware verification component, capturing an image of the embedded code (paragraphs: 32-33); comparing the captured image to the unique verification code (paragraph: 34), and if matching, transmitting a command to the computing system associated with the individual subscriber to authenticate the subscribed individual and permit access to the network-based system platform (paragraphs: 36-38); otherwise, transmitting a “denial of access” response to the computing system of the individual subscriber (paragraph: 35). Schmidt does not specifically disclose authenticating an individual subscriber to access a network-based learning system platform. However, in the same field of endeavor, Cook discloses authenticating an individual subscriber to access a network-based learning system platform (8, 44-45). Accordingly, it would been obvious to one of ordinary skill in the network security art before the effective filing date of the claimed invention to have incorporated Cook’s teachings of authenticating an individual subscriber to access a network-based learning system platform with the teachings of Schmidt, for the purpose of effectively validating a subscriber to access the on-line courses. 10. As per claim 7, Schmidt discloses the method, wherein the step of displaying an access page further comprises displaying an inactive version of the access page until authentication is completed (paragraphs: 17, and 22). 11. As per claims 8, and 11, Schmidt discloses, the method and apparatus further comprising the steps of: in using the camera of the unique hardware verification component, capturing an image of the lesson module embedded code; decoding the captured image to determine the subscription associations for the selected lesson module; and accessing the subscribed individual's subscription profile and, if a permission is present to access the selected module (paragraphs: 24-27, and 36-38), otherwise, transmitting a “denial of selected lesson module access” response to the computing system of the individual subscriber (paragraph: 35). Schmidt does not specifically disclose response to additional requests from the subscribed individual to access certain lesson modules from the learning system platform, transmitting an initial lesson module access page to the individual subscriber, the lesson module access page including a unique embedded verification code; transmitting a command to the computing system associated with the individual subscriber to permit access to the selected lesson module. However, in the same field of endeavor, Cook discloses response to additional requests from the subscribed individual to access certain lesson modules from the learning system platform, transmitting an initial lesson module access page to the individual subscriber, the lesson module access page including a unique embedded verification code (paragraphs: 25, and 44-45); transmitting a command to the computing system associated with the individual subscriber to permit access to the selected lesson module (paragraphs: 28-29). Accordingly, it would been obvious to one of ordinary skill in the network security art before the effective filing date of the claimed invention to have incorporated Cook’s teachings of response to additional requests from the subscribed individual to access certain lesson modules from the learning system platform, transmitting an initial lesson module access page to the individual subscriber, the lesson module access page including a unique embedded verification code with the teachings of Schmidt, for the purpose of effectively permitting the particular lesson module of the access page. 12. As per claim 9, Schmidt discloses the method, further comprising steps of: transmitting lesson module verification codes at selected time intervals; and confirming continued accessibility to the selected lesson module (paragraphs: 33-34). 13. As per claim 10, Schmidt discloses the method, further comprising the steps of: creating a lesson history record for the individual subscriber; and Recording each log-in to individual lesson modules by the individual subscriber (paragraphs: 35-37). 14. Claims 12-14 are listed all the same elements of claims 7-10. Therefore, the supporting rationales of the rejection to claims 7-10 apply equally as well to claims 12-14. Citation of References 15. The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. The following references are cited but not been replied upon for this office action: ETWARU et al (US pat. app. Pub. 20220353079): discusses establishing a video connection between the apparatus and a first device, in response to establishing the video connection, transmitting a token to a second device equipped with a display, the token being displayed on the display of the second device, receiving visual data comprising the token displayed on the display of the second device, the visual data being generated by the first device, that includes a camera, capturing the token displayed on the display of the second device, accessing a frame buffer of a graphics processing unit (GPU), analyzing, in the frame buffer of the GPU, a frame representing a section of the visual data to detect the token, and in response to the token being detected in the visual data, generating an authentication to authenticate the video connection between the apparatus and the first device. Sabin et al (US pat. App. Pub. 20130111208): elaborates that a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website. Conclusion 16. Any inquiry concerning this communication or earlier communications from the examiner should be directed to MOHAMMAD W REZA whose telephone number is (571)272-6590. The examiner can normally be reached on Monday-Friday 8:30-5:30 ET. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Cathy Thiaw can be reached on 571-270-1138. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). /MOHAMMAD W REZA/Primary Examiner, Art Unit 2407
Read full office action

Prosecution Timeline

Sep 03, 2024
Application Filed
Feb 21, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602486
SYSTEM AND METHOD FOR EVALUATING AN ORGANIZATION'S RISK FOR EXPOSURE TO CYBER SECURITY EVENTS
2y 5m to grant Granted Apr 14, 2026
Patent 12603899
DEVICE ANALYTICS ENGINE
2y 5m to grant Granted Apr 14, 2026
Patent 12598065
MANAGING DATA ENCRYPTION DURING SYSTEM UPGRADES
2y 5m to grant Granted Apr 07, 2026
Patent 12592973
SYSTEM AND METHOD FOR SECURITY CONTROL OVER DATA FLOWS IN DISTRIBUTED COMPUTING SYSTEMS
2y 5m to grant Granted Mar 31, 2026
Patent 12587286
Quantum Teleportation Imaging
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
88%
Grant Probability
98%
With Interview (+10.9%)
2y 11m
Median Time to Grant
Low
PTA Risk
Based on 943 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month