Prosecution Insights
Last updated: April 19, 2026
Application No. 18/859,647

MOVING BODY, ENCRYPTION KEY DELIVERY SYSTEM, ENCRYPTION KEY DELIVERY METHOD, AND PROGRAM

Non-Final OA §102
Filed
Oct 24, 2024
Examiner
MAAZOUZ, GHIZLANE
Art Unit
2499
Tech Center
2400 — Computer Networks
Assignee
NEC Corporation
OA Round
1 (Non-Final)
60%
Grant Probability
Moderate
1-2
OA Rounds
3y 6m
To Grant
99%
With Interview

Examiner Intelligence

Grants 60% of resolved cases
60%
Career Allow Rate
21 granted / 35 resolved
+2.0% vs TC avg
Strong +51% interview lift
Without
With
+50.9%
Interview Lift
resolved cases with interview
Typical timeline
3y 6m
Avg Prosecution
25 currently pending
Career history
60
Total Applications
across all art units

Statute-Specific Performance

§101
3.8%
-36.2% vs TC avg
§103
60.7%
+20.7% vs TC avg
§102
19.9%
-20.1% vs TC avg
§112
12.7%
-27.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 35 resolved cases

Office Action

§102
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Information Disclosure Statement Acknowledgment is made of the information disclosure statements filed on October 24, 2024, September 4, 2025, and October 21, 2025. The U.S. patents and Foreign Patents have been considered. Drawings The drawings submitted on October 24, 2024 have been considered and accepted. Claim Interpretation The following is a quotation of 35 U.S.C. 112(f): (f) ELEMENT IN CLAIM FOR A COMBINATION.—An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. The claims in this application are given their broadest reasonable interpretation using the plain meaning of the claim language in light of the specification as it would be understood by one of ordinary skill in the art. The broadest reasonable interpretation of a claim element (also commonly referred to as a claim limitation) is limited by the description in the specification when 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is invoked. As explained in MPEP 2181, subsection I, claim limitations that meet the following three-prong test will be interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph: the claim limitation uses the term “means” or “step” or a term used as a substitute for “means” that is a generic placeholder (also called a nonce term or a non-structural term having no specific structural meaning) for performing the claimed function; the term “means” or “step” or the generic placeholder is modified by functional language, typically, but not always linked by the transition word “for” (e.g., “means for”) or another linking word or phrase, such as "configured to" or "so that"; and the term “means” or “step” or the generic placeholder is not modified by sufficient structure, material, or acts for performing the claimed function. Use of the word “means” (or “step”) in a claim with functional language creates a rebuttable presumption that the claim limitation is to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites sufficient structure, material, or acts to entirely perform the recited function. Absence of the word “means” (or “step”) in a claim creates a rebuttable presumption that the claim limitation is not to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is not interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites function without reciting sufficient structure, material or acts to entirely perform the recited function. Claim limitations in this application that use the word “means” (or “step”) are being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. Conversely, claim limitations in this application that do not use the word “means” (or “step”) are not being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. This application includes one or more claim limitations that use the word “part.” Such claim limitations are: Claim 1 recites the terms “an input/output part,” “a storage control part,” and “a movement control part.” Claim 2 recites the terms “an abnormality sensing part.” Claim 3 recites the terms “input/output part.” Claim 4 recites the terms “an authentication request part.” Claim 5 recites the terms “input/output part.” Claim 6 recites the terms “input/output part.” Claim 9 recites the terms “a transmission apparatus communication part,” “a reception apparatus communication part.” Claim 10 recites the terms “a transmission apparatus authentication part,” “a reception apparatus authentication part.” Because these claim limitations are being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, they are being interpreted to cover the corresponding structure described in the specification as performing the claimed function, and equivalents thereof. If applicant does not intend to have these limitations interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, applicant may: (1) amend the claim limitation(s) to avoid them being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph (e.g., by reciting sufficient structure to perform the claimed function); or (2) present a sufficient showing that the claim limitation(s) recite(s) sufficient structure to perform the claimed function so as to avoid them being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1-20 are rejected under 35 U.S.C. 102(a)(2) as being anticipated by Stapleton et al. (Pub. No. US 2025/0015980), hereinafter Stapleton. Claim 1. Stapleton discloses a moving body (see drone(s) 102A-N) comprising: at least a processor; and a memory in circuit communication with the processor, wherein the processor is configured to execute program instructions stored in the memory (see Parag. [0036]; A drone (e.g., any one of drones 102A-N) may be embodied by one or more computing devices, shown as apparatus 200 in FIG. 2. The apparatus 200 may include processor 202, memory 204, communications hardware 206…) to implement: an input/output part that receives an encryption key from a transmission apparatus and transmits the encryption key to a reception apparatus (See Parag. [0056]; the host device (transmission apparatus) may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device (reception apparatus)); a storage control part that controls storage of the encryption key in a storage part (See Parag. [0034]; A storage device may store information relied upon during operation of the drone, such as various cryptographic keys, key check values. See Parag. [0075]; the drone may traverse some distance while possessing the cryptographic key (i.e., having the cryptographic key stored (e.g., in memory 204, storage device 106A, or the like))); and a movement control part that moves the moving body to the reception apparatus after receiving the encryption key from the transmission apparatus (See Parag. [0056]; the host device may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device), wherein the storage control part stores the encryption key in the storage part upon receiving the encryption key from the transmission apparatus and erases the encryption key stored in the storage part in a case where an abnormality is detected (See Parag. [0075]; the drone may traverse some distance while possessing the cryptographic key (i.e., having the cryptographic key stored (e.g., in memory 204, storage device 106A, or the like)). To combat potential eavesdropping or unauthorized access of the cryptographic key during travel, the drone may comprise security circuitry that is configured to detect anomalous conditions of the drone and, if necessary, alter the cryptographic key to avoid the key being compromised. See Parag. [0077]; altering the cryptographic key may comprise deleting the cryptographic key. See Parag. [0045]). Claim 2. Stapleton discloses the moving body according to claim 1, Stapleton further discloses wherein the processor is configured to execute program instructions stored in the memory to further implement: an abnormality sensing part that detects the abnormality and notifies the storage control part (See Parag. [0075]; the drone may traverse some distance while possessing the cryptographic key (i.e., having the cryptographic key stored (e.g., in memory 204, storage device 106A, or the like)). To combat potential eavesdropping or unauthorized access of the cryptographic key during travel, the drone may comprise security circuitry that is configured to detect anomalous conditions of the drone and, if necessary, alter the cryptographic key to avoid the key being compromised). Claim 3. Stapleton discloses the moving body according to claim, Stapleton further discloses wherein the input/output part receives from an external apparatus that the abnormality has been detected and notifies the storage control part (See Parag. [0045]; the apparatus 200 further comprises security circuitry 214 that detects anomalous conditions of a drone and alters cryptographic keys in response to a detection of an anomalous condition. The security circuitry 214 may utilize processor 202, memory 204, or any other hardware component included in the apparatus 200 to perform these operations, as described in connection with FIG. 5 below. The security circuitry 214 may further utilize communications hardware 206 to gather data from a variety of sources, may utilize input-output circuitry 208 to receive data from a user, and in some embodiments may utilize processor 202 and/or memory 204 to detect anomalous conditions and alter cryptographic keys). Claim 4. Stapleton discloses the moving body according to claim 1, Stapleton further discloses wherein the processor is configured to execute program instructions stored in the memory to further implement: an authentication request part that requests the transmission apparatus and the reception apparatus to authenticate the moving body prior to transmitting and receiving the encryption key (See Parag. [0029]; an example scenario in which a drone 102 may communicate with another drone 103 of a drone network in order to establish secure communication between a host device 101 and a remote device 105. In this regard, a first drone 102 may deliver a cryptographic key to a second drone 103 so the first drone and the second drone can communicate securely. In some embodiments, the second drone 103 may deliver another cryptographic key to a third drone, such that the second drone and the third drone can communicate securely, and so the first drone 102 and third drone can communicate securely via the second drone 103. This sequential process may continue indefinitely to produce an authenticated “mesh” of drones that can be leveraged to enable any endpoint remote device 105 and host device 101 to communicate securely). Claim 5. Stapleton discloses the moving body according to claim 1, Stapleton further discloses wherein the input/output part communicates the encryption key with the transmission apparatus and the reception apparatus using a laser beam (See Parag. [0040]; the communications hardware 206 may be any means suitable for transmitting data such as cryptographic keys, encrypted data, and/or the like, such as a device or circuitry embodied in either hardware or a combination of hardware and software that is configured to receive and/or transmit data from/to any other device, circuitry, or module in communication with the apparatus 200 (e.g., remote devices 108A-N, other drones 102A-N, and/or host device 106. In this regard, the communications hardware 206 may include, for example, interfaces for enabling communications with other devices, such as one or more ports (e.g., a laser port, a fiber-optic cable port, and/or the like). See Parag. [0061]; a connection between the drone and the first device may be established using communications hardware 206 interacting with corresponding communications hardware of the remote device. For example, the connection may be a physical connection, such as via a fiber-optic cable. As another example, the connection may be a laser connection. In some embodiments, the connection may a wireless connection, such that the connection may be established via a secure spectrum, channel, or the like). Claim 6. Stapleton discloses the moving body according to claim 1, Stapleton further discloses wherein the input/output part communicates the encryption key with the transmission apparatus and the reception apparatus using a quantum cryptography communication (See Parag. [0002]; cryptographic keys may be generated and distributed to devices via a process known as Quantum Key Distribution (QKD). See Parag. [0026]; utilize a plurality of drones to efficiently navigate to remote locations and leverage quantum-based hardware to generate and securely inject cryptographic keys into multiple devices across different remote locations and correspondingly securely provide the cryptographic keys to a host device. In various embodiments, the host device and drone network may establish a unique key per remote device and/or per drone for secure communications. Since only each remote device and the host have access to the corresponding cryptographic key, each respective device and the host can mutually authenticate using keys for which there is a high assurance level that no other party will be able to access). Claim 7. Stapleton discloses the moving body according to claim 1, Stapleton further discloses wherein the abnormality includes at least one selected from the group consisting of an abnormal value, an interference of another object with the moving body, data transmission between the moving body and another device, and an abnormality resulting from analysis of log information of the moving body (See Parag. [0076]; The anomalous condition may be detected based on a variety of factors. As one example, an anomalous condition may be detected in an instance in which the drone has deviated from a route defined by the itinerary data. As another example, an anomalous condition may be detected in an instance in which an unknown device has connected to or is attempting to connect to the drone), wherein the abnormal value is at least one selected from the group consisting of abnormal values of vibration, temperature, voltage, position, movement speed, and movement time of the moving body (See Parag. [0076]; The anomalous condition may be detected based on a variety of factors. As one example, an anomalous condition may be detected in an instance in which the drone has deviated from a route defined by the itinerary data. As another example, an anomalous condition may be detected in an instance in which an unknown device has connected to or is attempting to connect to the drone). Claim 8. Stapleton discloses the moving body according to claim 1, Stapleton further discloses wherein the moving body is a flying body (See Parag. [0036]; A drone (e.g., any one of drones 102A-N)). Claim 9. Stapleton discloses an encryption key delivery system, comprising: a first moving body that is the moving body according to claim 1 (see Parag. [0036]; A drone (e.g., any one of drones 102A-N) may be embodied by one or more computing devices, shown as apparatus 200 in FIG. 2. The apparatus 200 may include processor 202, memory 204, communications hardware 206…); a transmission apparatus (the host device); and a reception apparatus (remote device), wherein the transmission apparatus comprises at least a processor; and a memory in circuit communication with the processor, wherein the processor is configured to execute program instructions stored in the memory (See Parag. [0035]; one or more remote devices 108A-N and/or the host device(s) 106 need not be stationary or fixed devices, and need not be devices of any specific kind; rather, in various implementations these devices may be embodied by any computing devices known in the art, such as desktop or laptop computers, tablet devices, smartphones, or the like. See Parag. [0022-0023]) to implement: a transmission apparatus communication part that transmits the encryption key to the moving body (See Parag. [0056]; the host device may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device), and the reception apparatus comprises at least a processor; and a memory in circuit communication with the processor, wherein the processor is configured to execute program instructions stored in the memory (See Parag. [0035]; one or more remote devices 108A-N and/or the host device(s) 106 need not be stationary or fixed devices, and need not be devices of any specific kind; rather, in various implementations these devices may be embodied by any computing devices known in the art, such as desktop or laptop computers, tablet devices, smartphones, or the like. See Parag. [0022-0023]) to implement: a reception apparatus communication part that receives the encryption key from the moving body (See Parag. [0056]; the host device may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device). Claim 10. Stapleton discloses the encryption key delivery system according to claim 9, Stapleton further discloses wherein the transmission apparatus further comprises a transmission apparatus authentication part that authenticates the moving body, the reception apparatus further comprises a reception apparatus authentication part that authenticates the moving body, the transmission apparatus communication part transmits the encryption key to the moving body in a case where the transmission apparatus authentication part succeeds in authentication, and the reception apparatus communication part receives the encryption key from the moving body in a case where the reception apparatus authentication part succeeds in authentication (See Parag. [0029]; an example scenario in which a drone 102 may communicate with another drone 103 of a drone network in order to establish secure communication between a host device 101 and a remote device 105. In this regard, a first drone 102 may deliver a cryptographic key to a second drone 103 so the first drone and the second drone can communicate securely. In some embodiments, the second drone 103 may deliver another cryptographic key to a third drone, such that the second drone and the third drone can communicate securely, and so the first drone 102 and third drone can communicate securely via the second drone 103. This sequential process may continue indefinitely to produce an authenticated “mesh” of drones that can be leveraged to enable any endpoint remote device 105 and host device 101 to communicate securely. See also Parag. [0061]). Claim 11. Stapleton discloses the encryption key delivery system according to claim 9, Stapleton further discloses the system further comprising: a second moving body having a same configuration as the first moving body; wherein the second moving body receives an encryption key from the transmission apparatus, the encryption key received being the same as the encryption key delivered by the first moving body (See Para. [0029]; a drone 102 may communicate with another drone 103 of a drone network in order to establish secure communication between a host device 101 and a remote device 105. In this regard, in some example embodiments, a first drone 102 may deliver a cryptographic key to a second drone 103 so the first drone and the second drone can communicate securely... This sequential process may continue indefinitely to produce an authenticated “mesh” of drones that can be leveraged to enable any endpoint remote device 105 and host device 101 to communicate securely). Claim 12. Stapleton discloses the encryption key delivery system according to claim 9, Stapleton further discloses the system further comprising: a second moving body having a same configuration as the first moving body (see Parag. [0036]; A drone (e.g., any one of drones 102A-N); wherein the second moving body receives an encryption key from the transmission apparatus, the encryption key received being different from the encryption key delivered by the first moving body (See Parag. [0074-0075]; the drone may utilize itinerary data received from a host device (or another drone) to navigate to the second location of the second device (e.g., another remote device 108A-N, or another drone 102A-N). The drone may travel to a second device in order to generate and cause transmission of another cryptographic key (e.g., a cryptographic key different from the cryptographic key injected into the first remote device) to the second device). Claim 13. Stapleton discloses the encryption key delivery system according to claim 9, Stapleton further discloses the system further comprising: a charging processing apparatus that comprises at least a processor; and a memory in circuit communication with the processor, wherein the processor is configured to: collect parameters related to charging generated by the encryption key delivery system and performs charging (See Parag. [0045]; The security circuitry 214 may further utilize communications hardware 206 to gather data from a variety of sources, may utilize input-output circuitry 208 to receive data from a user, and in some embodiments may utilize processor 202 and/or memory 204 to detect anomalous conditions and alter cryptographic keys. See Parag. [0075]; the drone may traverse some distance while possessing the cryptographic key (i.e., having the cryptographic key stored (e.g., in memory 204, storage device 106A, or the like)). To combat potential eavesdropping or unauthorized access of the cryptographic key during travel, the drone may comprise security circuitry that is configured to detect anomalous conditions of the drone and, if necessary, alter the cryptographic key to avoid the key being compromised). Claim 14. Stapleton discloses an encryption key delivery method executed by a computer loaded on a moving body (see Parag. [0036]; A drone (e.g., any one of drones 102A-N) may be embodied by one or more computing devices, shown as apparatus 200 in FIG. 2. The apparatus 200 may include processor 202, memory 204, communications hardware 206…), the encryption key delivery method, comprising: receiving an encryption key from a transmission apparatus (See Parag. [0056]; the host device (transmission apparatus) may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device (reception apparatus)); storing the encryption key received in a storage part (See Parag. [0034]; A storage device may store information relied upon during operation of the drone, such as various cryptographic keys, key check values. See Parag. [0075]; the drone may traverse some distance while possessing the cryptographic key (i.e., having the cryptographic key stored (e.g., in memory 204, storage device 106A, or the like)); moving the moving body toward a reception apparatus after storing the encryption key (See Parag. [0056]; the host device may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device); erasing the encryption key stored in the storage part in a case where an abnormality of the moving body is detected during a movement (See Parag. [0075]; the drone may traverse some distance while possessing the cryptographic key (i.e., having the cryptographic key stored (e.g., in memory 204, storage device 106A, or the like)). To combat potential eavesdropping or unauthorized access of the cryptographic key during travel, the drone may comprise security circuitry that is configured to detect anomalous conditions of the drone and, if necessary, alter the cryptographic key to avoid the key being compromised. See Parag. [0077]; altering the cryptographic key may comprise deleting the cryptographic key. See Parag. [0045]); and transmitting the encryption key stored in the storage part to the reception apparatus, upon arriving at a destination area (See Parag. [0056]; the host device may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device). Claim 15. Stapleton discloses a non-transitory computer-readable medium storing a program causing a computer loaded on a moving body see Parag. [0036]; A drone (e.g., any one of drones 102A-N) may be embodied by one or more computing devices, shown as apparatus 200 in FIG. 2. The apparatus 200 may include processor 202, memory 204, communications hardware 206…) to execute; receiving an encryption key from a transmission apparatus (See Parag. [0056]; the host device (transmission apparatus) may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device (reception apparatus)); storing the encryption key received in a storage part (See Parag. [0034]; A storage device may store information relied upon during operation of the drone, such as various cryptographic keys, key check values. See Parag. [0075]; the drone may traverse some distance while possessing the cryptographic key (i.e., having the cryptographic key stored (e.g., in memory 204, storage device 106A, or the like)); moving the moving body toward a reception apparatus after storing the encryption key (See Parag. [0056]; the host device may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device); erasing the encryption key stored in the storage part in a case where an abnormality of the moving body is detected during a movement (See Parag. [0075]; the drone may traverse some distance while possessing the cryptographic key (i.e., having the cryptographic key stored (e.g., in memory 204, storage device 106A, or the like)). To combat potential eavesdropping or unauthorized access of the cryptographic key during travel, the drone may comprise security circuitry that is configured to detect anomalous conditions of the drone and, if necessary, alter the cryptographic key to avoid the key being compromised. See Parag. [0077]; altering the cryptographic key may comprise deleting the cryptographic key. See Parag. [0045]); and transmitting the encryption key stored in the storage part to the reception apparatus, upon arriving at a destination area (See Parag. [0056]; the host device may generate the cryptographic key itself (e.g., via an in-house QRNG) and provide it to the drone, after which the drone may travel to the remote device and provide the cryptographic key to the remote device). Claim 16. The applicant is directed to the rejections to claim 2 set forth above, as it is rejected based on the same rationale. Claim 17. The applicant is directed to the rejections to claim 4 set forth above, as it is rejected based on the same rationale. Claim 18. The applicant is directed to the rejections to claim 5 set forth above, as it is rejected based on the same rationale. Claim 19. The applicant is directed to the rejections to claim 6 set forth above, as it is rejected based on the same rationale. Claim 20. The applicant is directed to the rejections to claim 7 set forth above, as it is rejected based on the same rationale. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure (see PTO-form 892). The following Patents and Papers are cited to further show the state of the art at the time of Applicant’s invention with respect to encryption key delivery technology by a moving body. Esbensen et al. (Patent No. US 11,108,550); “Method and System for Highly Secured Network Communication using Quantum Technologies;” Teaches Methods and systems for configuring computing devices using mobile workspace contexts based on proximity to locations (see Abstract). Teaches systems and methods for secure network communications of data using quantum key distribution (QKD) are presented. Source data is provided. The source data is encrypted to produce encrypted data and key data corresponding to the encrypted data. Using QKD, the key data is transmitted from a first network location to a second network location. Successful transmission of the key data to the second location is verified, and upon verification, the encrypted data is transmitted from the first network location to the second network location using QKD. Successful transmission of the encrypted data to the second location is verified, and upon verification, the encrypted data is decrypted with the key data to provide a data output. (See Abstract). Any inquiry concerning this communication or earlier communications from the examiner should be directed to GHIZLANE MAAZOUZ whose telephone number is (571)272-8118. The examiner can normally be reached Telework M-F 7:30-5 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Philip J Chea can be reached on 571-272-3951. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /GHIZLANE MAAZOUZ/Examiner, Art Unit 2499 /PHILIP J CHEA/Supervisory Patent Examiner, Art Unit 2499
Read full office action

Prosecution Timeline

Oct 24, 2024
Application Filed
Mar 06, 2026
Non-Final Rejection — §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12574407
GENERATING A CONTENT SIGNATURE OF A TEXTUAL COMMUNICATION USING OPTICAL CHARACTER RECOGNITION AND TEXT PROCESSING
2y 5m to grant Granted Mar 10, 2026
Patent 12537680
SECURE CACHING OF NAMESPACE KEYS
2y 5m to grant Granted Jan 27, 2026
Patent 12499212
APPARATUS AND METHOD FOR KERNEL RUNTIME RANDOMIZATION
2y 5m to grant Granted Dec 16, 2025
Patent 12494900
PUBLIC KEY INFRASTRUCTURE BASED SESSION AUTHENTICATION
2y 5m to grant Granted Dec 09, 2025
Patent 12481599
Monitor Integrity of Endpoints having Secure Memory Devices for Identity Authentication
2y 5m to grant Granted Nov 25, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
60%
Grant Probability
99%
With Interview (+50.9%)
3y 6m
Median Time to Grant
Low
PTA Risk
Based on 35 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month