Prosecution Insights
Last updated: April 19, 2026
Application No. 18/854,235

METHOD AND SYSTEM FOR PERSONALIZING A SECURE ELEMENT

Non-Final OA §101§103§112
Filed
Oct 04, 2024
Examiner
WADE-WRIGHT, SHAQUEAL D
Art Unit
2407
Tech Center
2400 — Computer Networks
Assignee
Giesecke+Devrient Mobile Security Germany GmbH
OA Round
1 (Non-Final)
85%
Grant Probability
Favorable
1-2
OA Rounds
2y 6m
To Grant
99%
With Interview

Examiner Intelligence

Grants 85% — above average
85%
Career Allow Rate
376 granted / 443 resolved
+26.9% vs TC avg
Strong +18% interview lift
Without
With
+18.3%
Interview Lift
resolved cases with interview
Typical timeline
2y 6m
Avg Prosecution
16 currently pending
Career history
459
Total Applications
across all art units

Statute-Specific Performance

§101
14.5%
-25.5% vs TC avg
§103
48.6%
+8.6% vs TC avg
§102
8.6%
-31.4% vs TC avg
§112
17.8%
-22.2% vs TC avg
Black line = Tech Center average estimate • Based on career data from 443 resolved cases

Office Action

§101 §103 §112
DETAILED ACTION Claims 13-24 are pending. Claims 1-12 are canceled. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Priority Receipt is acknowledged of certified copies of papers required by 37 CFR 1.55. Information Disclosure Statement The information disclosure statement (IDS) submitted on 10/04/2024 is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner. Specification Applicant is reminded of the proper language and format for an abstract of the disclosure. The abstract should be in narrative form and generally limited to a single paragraph on a separate sheet within the range of 50 to 150 words in length. The abstract should describe the disclosure sufficiently to assist readers in deciding whether there is a need for consulting the full patent text for details. The language should be clear and concise and should not repeat information given in the title. It should avoid using phrases which can be implied, such as, “The disclosure concerns,” “The disclosure defined by this invention,” “The disclosure describes,” etc. In addition, the form and legal phraseology often used in patent claims, such as “means” and “said,” should be avoided. See MPEP § 608.01(b) for guidelines for the preparation of patent abstracts. The abstract of the disclosure is objected to because the abstract contains legal phraseology. A corrected abstract of the disclosure is required and must be presented on a separate sheet, apart from any other text. See MPEP § 608.01(b). Claim Objections Claims 13 and 23-24 are objected to because of the following informalities: The examiner suggest amending the claim limitations “said data sets” to “the data sets” to correspond with the other claim limitations. Appropriate correction is required. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 13-17 and 21 & 23 rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Independent claims 13 and 23, only include wherein clauses. The claims does not include any transition words (i.e. comprising) to separate the preamble and the elements/steps of the claims. The claims does not provide any steps to positively recite the claimed limitations to understand the scope of the claim. Claim 13 and 23 recites the limitation "the control" in line 6. There is insufficient antecedent basis for this limitation in the claims. For examiner purposes, limitation is considered to be a control. Claim 14 recites the limitation "the data" in line. There is insufficient antecedent basis for this limitation in the claim. For examiner purposes, limitation is considered to be the data set. Claim 15 use the term “is/are”. This term renders the scope of the claim language unclear because it is not clear whether all of the limitations are required or not, in order to fall within the scope of the claim. The use of "is/are" makes the applicants intended scope unclear because one of ordinary skill in the art would be unable to determine whether or not all of the listed limitations are required or not. Therefore, the claims are rejected for failing to specifically point out and distinctly claim the subject matter which the inventors regard as the invention. Claim 16 recites the limitation "the continuation" in line. There is insufficient antecedent basis for this limitation in the claim. For examiner purposes, limitation is considered to be a continuation. Claim 17 recites the limitation "the occurrence" in line. There is insufficient antecedent basis for this limitation in the claim. For examiner purposes, limitation is considered to be an occurrence. Claim 21 recites the limitation "the first step" in line. There is insufficient antecedent basis for this limitation in the claim. For examiner purposes, limitation is considered to be a first step. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 23-24 are rejected under 35 U.S.C. 101 for being directed to non-statutory subject matter. The claims does not include at least one hardware element within the body of the claim. The claims recite a “memory" and “operating system”. Neither the claims nor specification define the "memory" or any other elements of the claim to include only a hardware. Thus, the claims are directed to non-statutory subject matter. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 13-19 and 21-24 are rejected under 35 U.S.C. 103 as being unpatentable over Alfarano et al. (US Pub No. 2021/0096178) in view of ZIECIK et al. (US Pub No. 2023/0342476). Regarding independent claim 13, Alfarano teaches a method for computer-aided personalization of a secure element onto which an image is loaded, wherein an operating system of the secure element is integrated into said image (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020 & 0027 and page 4, paragraphs 0061-0066; personalization images with personalization data loaded into memory of integrated circuit), wherein one or more data sets provided individually for the secure element are written to a memory area of the secure element, said data sets containing card-specific data with which the secure element is personalized under the control of the operating system (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020 & 0027 and page 4, paragraphs 0061-0066; personalization images with personalization data loaded into dedicated memory area of integrated circuit), wherein a sequence in which the data sets are personalized is defined with a configuration command in the personalization of the secure element (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020, 0022 & 0027, page 3, paragraph 0031 and page 4, paragraphs 0061-0066; personalization data with APDU sequence of commands). Alfarano teaches storing the personalized data/images in a dedicated memory section (Alfarano, page 2, paragraph 0020) but does not explicitly wherein one or more data sets provided individually for the secure element are written to a special memory area of the secure element. ZIECIK teaches wherein one or more data sets provided individually for the secure element are written to a special memory area of the secure element (ZIECIK, page 9, paragraph 0139; dedicated area of memory; an area reserved for holding an update package). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding claim 14, Alfarano in view of ZIECIK teaches the method wherein the data which are intended to be personalized in one or more of the data sets in a first step are defined by the configuration command (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020, 0022 & 0027, page 3, paragraph 0031 and page 4, paragraphs 0061-0066; personalization data with APDU sequence of commands). Regarding claim 15, Alfarano in view of ZIECIK teaches each and every claim limitation of claim 13, however, ZIECIK teaches the method wherein one or more interruption points up to which the data set(s) is/are personalized are set by the configuration command (ZIECIK, page 8, paragraph 0136). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area for update script/package to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding claim 16, Alfarano in view of ZIECIK teaches each and every claim limitation of claim 13, however, ZIECIK teaches the method wherein the continuation of the personalization at a later time is configured by means of the configuration command (ZIECIK, page 9, paragraphs 0139-0140; after device reset). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area for update script/package to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding claim 17, Alfarano in view of ZIECIK teaches each and every claim limitation of claim 16, however, ZIECIK teaches the method wherein a predefined event, on the occurrence of which the personalization is continued, is configured by means of the configuration command (ZIECIK, page 9, paragraphs 0139-0140; after device reset). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area for update script/package to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding claim 18, Alfarano in view of ZIECIK teaches each and every claim limitation of claim 17, however, ZIECIK teaches the method wherein the event is a reset or the reaching of a predefined number of resets of the secure element (ZIECIK, page 9, paragraphs 0139-0140; after device reset). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area for update script/package to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding claim 19, Alfarano in view of ZIECIK teaches each and every claim limitation of claim 13, however, ZIECIK teaches the method wherein the configuration command is transmitted to the secure element at least one further time, as a result of which the personalization is continued at a later time (ZIECIK, page 9, paragraphs 0139-0140). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area for update script/package to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding claim 21, Alfarano in view of ZIECIK teaches each and every claim limitation of claim 13, however, ZIECIK teaches the method wherein a firmware update key is personalized in one of the data sets in the first step (ZIECIK, page 8, paragraph 0134). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area for update script/package to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding claim 22, Alfarano in view of ZIECIK teaches each and every claim limitation of claim 21, however, ZIECIK teaches the method wherein a firmware update is carried out in a second step (ZIECIK, page 8, paragraphs 0118-0119 & 0134 and page 9, paragraphs 0139-0140). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area for update script/package to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding independent claim 23, Alfarano teaches a system for computer-aided personalization of a secure element onto which an image is loaded, wherein an operating system of the secure element is integrated into said image (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020 & 0027 and page 4, paragraphs 0061-0066; personalization images with personalization data loaded into memory of integrated circuit), wherein one or more data sets provided individually for the secure element are written to a memory area of the secure element, said data sets containing card-specific data with which the secure element is personalized under the control of the operating system (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020 & 0027 and page 4, paragraphs 0061-0066; personalization images with personalization data loaded into dedicated memory area of integrated circuit), wherein a sequence in which the data sets are personalized is defined with a configuration command in the personalization of the secure element (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020, 0022 & 0027, page 3, paragraph 0031 and page 4, paragraphs 0061-0066; personalization data with APDU sequence of commands). Alfarano teaches storing the personalized data/images in a dedicated memory section (Alfarano, page 2, paragraph 0020) but does not explicitly wherein one or more data sets provided individually for the secure element are written to a special memory area of the secure element. ZIECIK teaches wherein one or more data sets provided individually for the secure element are written to a special memory area of the secure element (ZIECIK, page 9, paragraph 0139; dedicated area of memory; an area reserved for holding an update package). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Regarding claim 24, Alfarano in view of ZIECIK teaches the system of claim 23 configured to carry out a method for computer-aided personalization of a secure element onto which an image is loaded, wherein an operating system of the secure element is integrated into said image (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020 & 0027 and page 4, paragraphs 0061-0066; personalization images with personalization data loaded into memory of integrated circuit), wherein one or more data sets provided individually for the secure element are written to a special memory area of the secure element, said data sets containing card-specific data with which the secure element is personalized under the control of the operating system (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020 & 0027 and page 4, paragraphs 0061-0066; personalization images with personalization data loaded into dedicated memory area of integrated circuit; ZIECIK, page 9, paragraph 0139; dedicated area of memory; an area reserved for holding an update package), wherein a sequence in which the data sets are personalized is defined with a configuration command in the personalization of the secure element (Alfarano, page 1, paragraphs 0010-0013, page 2, paragraphs 0020, 0022 & 0027, page 3, paragraph 0031 and page 4, paragraphs 0061-0066; personalization data with APDU sequence of commands). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano with the teachings of ZIECIK for the dedicated area of the memory to be a reserved memory area to provide the advantage of improving the process of updating software (ZIECIK, page 1, paragraphs 0003-0006). Claim(s) 20 is rejected under 35 U.S.C. 103 as being unpatentable over Alfarano et al. (US Pub No. 2021/0096178) in view of ZIECIK et al. (US Pub No. 2023/0342476) as applied to claims 13-19 and 21-24 above, and further in view of Alfarano et al. (US Patent No. 11,792,166), hereinafter Alfarano (2). Regarding claim 20, Alfarano in view of ZIECIK teaches each and every claim limitation of claim 13. Alfarano in view of ZIECIK does not explicitly teach the method wherein the configuration command is transmitted to the secure element in encrypted or unencrypted form. Alfarano (2) teaches wherein the configuration command is transmitted to the secure element in encrypted or unencrypted form (Alfarano (2), column 4, lines 35-48). It would have been obvious to one having one having ordinary skill in the art before the effective filing date of the claimed invention to modify Alfarano in view of ZIECIK with the teachings of Alfarano (2) encrypting personalization packages to provide the advantage of secure transmission and size solution (Alfarano, column 4, lines 35-67). Prior Art The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Alfarano et al. (US Pub No. 2023/0384969) and Sibert et al. (US Pub No. 2018/0089434). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to SHAQUEAL D WADE whose telephone number is (571)270-0357. The examiner can normally be reached M-F 8:00-5:00. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Catherine Thiaw can be reached at 571-270-1138. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SHAQUEAL D WADE-WRIGHT/ Primary Examiner, Art Unit 2407
Read full office action

Prosecution Timeline

Oct 04, 2024
Application Filed
Jan 10, 2026
Non-Final Rejection — §101, §103, §112
Apr 01, 2026
Applicant Interview (Telephonic)
Apr 01, 2026
Examiner Interview Summary

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12598087
CRYPTOGRAPHIC ASSET BLOCKCHAIN PROCESSING APPARATUS, PROCESSING METHOD, PROCESSING SYSTEM, AND PROCESSING PROGRAM
2y 5m to grant Granted Apr 07, 2026
Patent 12598061
HISTORY ACCESS FOR END-TO-END (E2E) SECURE CONTENT
2y 5m to grant Granted Apr 07, 2026
Patent 12587526
AUTHENTICATION REQUEST FULFILMENT
2y 5m to grant Granted Mar 24, 2026
Patent 12580737
SCALABLE KEY STATE FOR NETWORK ENCRYPTION
2y 5m to grant Granted Mar 17, 2026
Patent 12574228
DEVICE FOR GENERATING AT LEAST ONE CRYPTOGRAPHIC KEY, CORRESPONDING METHODS AND COMPUTER PROGRAM PRODUCTS
2y 5m to grant Granted Mar 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
85%
Grant Probability
99%
With Interview (+18.3%)
2y 6m
Median Time to Grant
Low
PTA Risk
Based on 443 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month