DETAILED ACTION
Status
This communication is in response to Applicant’s U.S. national stage application (35 U.S.C. § 371 application) and in response to Applicant’s “PRELIMINARY AMENDMENT” (hereinafter “Amendment”), both of which were concurrently filed on October 28, 2024. In the Amendment, Applicant amended the abstract, amended Claims 1-20; and cancelled Claim 21. Therefore, Claims 1-20 are currently pending and presented for examination. Of the pending claims, Claims 1 and 19-20 are independent claims.
The present application (i.e., U.S. Patent Application No. 18/861,067) is U.S. national stage application (35 U.S.C. § 371 application) filed on October 28, 2024. The present application corresponds international application number PCT/AU2023/050353 filed on 4/28/2023 (“Parent Application”); and to foreign Australian Application AU2022901139 filed on 4/29/2022, all of which were filed after March 16, 2013, and, therefore, the present application (i.e., App. No. 18/861,067) is being examined under the first inventor to file (FITF) provisions of the America Invents Act (AIA ).
Claims 1-20 are originally presented by Applicant and, therefore, have been constructively elected by original presentation for prosecution on the merits per MPEP § 819 and MPEP § 821.03.
Examiner notes that this case (i.e., U.S. App. No. 18/861,067) has published as U.S. Patent Application Publication No. 2025/0292337 of Nuttall et al. (hereinafter “Nuttall”).
Priority/Benefit Claim
No U.S. domestic benefit claim has been made in this application.
Foreign priority has been claimed in this application to PCT application PCT/AU2023/050353 filed on 4/28/2023 (“Parent Application”) via claiming priority to Australian Application AU2022901139 filed on 4/29/2022 (see ADS filed on 10/28/2024). A certified copy of the Australian priority document was received electronically at the USPTO on October 28, 2024.
CPC Classification Notes
Examiner notes the following CPC classifications, particularly G06Q 10/42, as being related to this instant application (i.e., U.S. App. No. 18/861,067), to PCT application PCT/AU2023/050353 (“Parent Application”), as well as to Australian Application AU2022901139:
_________________________________________________________________________
G06Q 10/00 Administration; Management
G06Q 10/40 • Business processes related to social networking or social networking services
G06Q 10/42 •• Determination of affinities or common interests between users
_________________________________________________________________________
G06F 16/95 . . Retrieval from the web
G06F 16/953 . . . Querying, e.g. by the use of web search engines
G06F 16/9535 . . . . Search customization based on user profiles and personalization
G06F 16/9536 . . . . Search customization based on social or collaborative filtering
G06F 16/9538 . . . . Presentation of query results
Claim Objections
Claim 1 is objected to because of the following informalities: improper antecedent basis / grammatical error(s). For example, there is insufficient antecedent basis for the phrases “the one or more processors” recited in Claim 1 (bolding emphases added by Examiner) because “one or more processors” is at least twice introduced in Claim 1. Consequently, independent Claim 1 is objected to for improper antecedent basis/grammatical errors.
Appropriate correction(s) is required.
Claims 2 and 13 are each objected to because of the following informalities: improper antecedent basis / grammatical error(s). For example, there is insufficient antecedent basis for the phrases “the one or more processors” recited in Claims 2 and 13 (bolding emphases added by Examiner) because, for example, “one or more processors” is introduced multiple times in Claim 1. Hence, Claims 2 and 13 are objected to for improper antecedent basis/grammatical errors.
Appropriate corrections are required.
Claims 1, 10, 12, 19 and 20 are each objected to because of the following informalities: lack of antecedent basis / grammatical error(s). For example, there is insufficient antecedent basis for the phrases “the identity” recited in Claims 1, 10, 12, 19 and 20 (bolding emphases added by Examiner) because the word “identity” was never specifically/positively introduced in the independent claims. Therefore, Claims 1, 10, 12, 19 and 20 are objected to for lack of antecedent basis / grammatical error(s). Appropriate corrections are required.
Claim 19 is objected to because of the following informalities: improper antecedent basis / grammatical error. More specifically, there is insufficient antecedent basis for ““The computer-implemented system” in the phrase “The computer-implemented system for…, the system including…:” recited in the preamble of Claim 19 (bolding emphases added by Examiner) because “The computer-implemented system for” (in Claim 19) should be “A computer-implemented system for…” (bolding emphases added by Examiner). Therefore, independent Claim 19 is objected to for an improper antecedent basis/grammatical error.
Appropriate correction is required.
Claim Rejections - 35 USC § 112
The following is a quotation of 35 U.S.C. 112(b) of the America Invents Act (AIA ):
(b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.
Claims 1-20 are rejected under 35 U.S.C. 112(b) of the AIA as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor regards as the invention. “A claim is indefinite when it contains words or phrases whose meaning is unclear” (MPEP § 2173.05(e)).
Regarding independent Claims 1, 19 and 20, since it is unclear as to what the phrase “the first user” (singular) makes antecedent reference to in each corresponding independent claim, Claims 1, 19 and 20 are rejected under 35 U.S.C. 112(b) of the AIA as being indefinite. There is insufficient antecedent basis for the phrase “the first user” recited in Claims 1, 19 and 20. For example, it is unclear as to whether the phrases “the first user” in the phrase “…to be matching with the first user such that the first user…” references one the previously recited users of the plurality of users introduced in each independent claims, references subsequently recited “a first user” which is improper, references some combination thereof, or references something else. Therefore, independent Claims 1, 19 and 20 are rejected under AIA 35 U.S.C. 112(b) as being indefinite. For purposes of this Office action, “the first user”, as recited in the independent claims, is understood to be any user of the plurality of users introduced in the independent claims. Appropriate correction(s) is required.
Furthermore regarding independent Claims 1, 19 and 20, since it is unclear as to what the phrase “the user” (singular) makes antecedent reference to in each corresponding independent claim, Claims 1, 19 and 20 are rejected under AIA 35 U.S.C. 112(b) as being indefinite. There is insufficient antecedent basis for the phrase “the user” recited in Claims 1, 19 and 20. For example, it is unclear as to whether the phrase “the user” references only one (singular) of the “plurality of users”, references all of the “plurality of users” (plural), references recited “each user” of the plurality of users, or references something else. Therefore, independent Claims 1, 19 and 20 are rejected under AIA 35 U.S.C. 112(b) as being indefinite. For purposes of this Office action, “the user”, as recited in the independent claims, is understood to be any user of the plurality of users introduced in the independent claims. Appropriate correction(s) is required.
In addition, since it is unclear as to what the phrase “the other users” makes antecedent reference to in each corresponding independent claim, Claims 1, 19 and 20 are rejected under AIA 35 U.S.C. 112(b) as being indefinite. There is insufficient antecedent basis for the phrase “the other users” recited in Claims 1, 19 and 20. For example, it is unclear as to whether the phrase “the other users” references a set of the first-recited “one or more other users”, references all of the first-recited “one or more other users”, references a set of second-introduced “one or more other users”, references all of second-introduced “one or more other users”, or references some combination of the first and second introductions of “one or more other users” recited in each of the independent claims. Therefore, independent Claims 1, 19 and 20 are rejected under AIA 35 U.S.C. 112(b) as being indefinite. For purposes of this Office action, “the others users”, as recited in the independent claims, is understood to be any set of other users introduced in the independent claims. Appropriate correction(s) is required.
Furthermore regarding independent Claims 1, 19 and 20, since it is unclear as to what the phrase “the matching users” makes antecedent reference to in each corresponding independent claim, Claims 1, 19 and 20 are rejected under AIA 35 U.S.C. 112(b) as being indefinite. There is insufficient antecedent basis for the phrase “the matching users” recited in Claims 1, 19 and 20. For example, it is unclear as to whether the phrase “the matching users” references “first user” and a subset of second-introduced “one or more other users”, references the “first user” and all of second-introduced “one or more other users”, or references some combination thereof. Therefore, independent Claims 1, 19 and 20 are rejected under 35 U.S.C. 112(b) of the AIA as being indefinite. For purposes of this Office action, “the matching users”, as recited in the independent claims, is understood to be any users that match in the independent claims. Appropriate correction(s) is required.
Claims 2-18 depend from independent Claim 1, but do not resolve the above issues and inherit the deficiencies of the parent claim(s); therefore, Claims 2-18 are rejected under 35 U.S.C. 112(b).
Claim Rejections - 35 USC § 101
35 U.S.C. 101 reads as follows:
Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.
Claims 1-20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-statutory subject matter. During patent examination, the pending claims must be “given their broadest reasonable interpretation consistent with the specification” (MPEP § 2111). In view of this standard and based upon consideration of all of the relevant factors with respect to each claim as a whole, Claims 1-20 are rejected as ineligible subject matter under 35 U.S.C. 101.
Step 1: Claims 1-20 appear to satisfy Step 1 enunciated in Alice Corp. v. CLS Bank International, 573 U.S. __, 134 S. Ct. 2347 (2014).
Step 2A: Claims 1-20 are rejected under § 101 because Applicant’s claimed subject matter is directed to an abstract idea without significantly more. The rationale for this finding is that Applicant’s claims recite matchmaking or matching individuals together based on managing information about their background (e.g., recited “information associated with each user” and recited “a location associated with the user”) including their preferences (e.g., “their likes, dislikes and other social…activity”, such as recited “activity or activities of interest to the user”), and with the matchmaking/matching using a score (i.e., recited “a similarity score”) satisfying a threshold to determine the match between the individuals (i.e., recited “exceeds a pre-defined threshold similarity score indicating a match”), as more particularly recited in the pending claims save for recited (non-abstract claim elements): one or more processors; a plurality of users; using one or more artificial intelligence techniques; a user communication step; a means of establishing a private and secure communication channel; a request to establish a private and secure communication channel; a communication channel configured to enable; each of Applicant’s recited steps/processes of receiving and providing; (only Claim 2) receiving, by one or more processors from a [user] device, an instruction to enable the one or more processors to establish a link or communication channel with the user device, comprising to interface with the social media account(s) associated with the user and/or Global Positioning System (GPS) location tracking hardware and/or software operating on the user device; (only Claim 3) the location tracking hardware or software is operable to record GPS location data; (only Claim 6) storing, by one or more processors, in an indexed database that implements a data structure, and updating, by one or more processors, the indexed database; (only Claim 7) providing a prompt to accept or reject; (only Claim 9) the information being received as a result of prompting to enter; (only Claim 10) establishing, by one or more processors, a communication link with one or more processors associated with one or more external databases to obtain information; (only Claim 13) data exchanged between the user devices and the one or more processors is encrypted using Security Assertion Markup Language (SAML), wherein a software application operating on each user device employs code obfuscation software to protect downloaded data in a multi-layered Trusted Execution Environment (TEE), with the accuracy of information verified using an encrypted cloud service central administration tool; (only Claim 14) providing a selectable link to establish the private and secure communication channel; (only Claim 15) selection of the link enables a live chat wherein communications via the live chat is private and protected using a data masking Host-based Intrusion Detection System (HIDS); (only Claim 16) providing, by one or more processors, a search facility to search and using one or more artificial intelligence techniques; (only Claim 18) generating, by one or more processors, notifications; (only Claim 19) a computer-implemented system including one or more processors configured to perform; and (only Claim 20) a non-transitory computer-readable medium comprising computer instruction code executable on a computer to cause one or more processors of the computer to perform steps. However, matchmaking or matching individuals together based on managing information about their background (e.g., recited “information associated with each user” and recited “a location associated with the user”) including their preferences (e.g., “their likes, dislikes and other social…activity”, such as recited “activity or activities of interest to the user”), and with the matchmaking/matching using a score (i.e., recited “a similarity score”) satisfying a threshold to determine the match between the individuals (i.e., recited “exceeds a pre-defined threshold similarity score indicating a match”), as currently recited in Applicant’s pending claims and further explained below {also see Applicant’s specification regarding “a need… to generate more comprehensive and accurate user profiles that enable… users to be better-matched with like-minded individuals” (see Nuttall at ¶ [0007] as well as at ¶ [0007] of Applicant’s originally-filed specification)} is within a certain method of organizing human activity — (i) fundamental economic principle or practice; and/or (ii) managing personal behavior or relationships/interactions between people (including social activities). MPEP 2106.04(a)(2)(II)(A) provides examples of “fundamental economic principles or practices” while MPEP 2106.04(a)(2)(II)(C) provides additional discussion and examples of “Managing Personal Behavior or Relationships or Interactions Between People”. This judicial exception (i.e., abstract idea exception) is not integrated into a practical application because each claim as a whole, having the combination of additional elements beyond the judicial exception(s), does not integrate the exception into a practical application of the exception and, therefore, the pending claims are “directed to” a judicial exception under USPTO Step 2A. More specifically, each claim as a whole does not appear to reflect the combination of additional elements as: (1) improving the functioning of a computer itself or improving another technology or technical field, (2) applying the judicial exception with, or by use of, a particular machine/manufacture that is integral to the claim, (3) effecting a transformation or reduction of a particular article to a different state or thing, or (4) applying or using the judicial exception in some other meaningful way beyond generally linking the use of the judicial exception to a particular technological environment. Instead, any improvement is to the underlying abstract idea of matchmaking or matching individuals together based on managing information about their background including their preferences (“their likes, dislikes and other social…activity”, “activity or activities of interest to the user”) by using a score (“a similarity score”) satisfying a threshold (i.e., “exceeds a pre-defined threshold similarity score indicating a match”). SAP Am., Inc. v. InvestPic, LLC, No. 2017-2081, 2018 U.S. App. LEXIS 12590, Slip. Op. 13 (Fed. Cir. May 15, 2018) (“What is needed is an inventive concept in the non-abstract realm.”). Examiner notes that Applicant's recited use or usage of “one or more artificial intelligence techniques” in independent Claims 1, 19 and 20 appears as a high-level black box with no detail about any artificial intelligence (AI) technique itself or any artificial intelligence processes, such as how Applicant's AI technique operates on input data (e.g., recited “the information associated with each verified user”) to produce an output(s), such as Applicant’s “similarity score” recited in each of Applicant's independent claims. In addition, Examiner notes that no detail of any AI algorithm appears to be mentioned in Applicant's disclosure and, therefore, no specific way of training the algorithm/model exists within Applicant's recited use of artificial intelligence. Consequently, Applicant's mere recitation to "using one or more artificial intelligence techniques" is not sufficient to amount to a practical application under Step 2A, Prong 2 of the Subject Matter Eligibility (SME) analysis. In addition, although the claims require “determine a similarity score” and “determining whether the similarity score… exceeds a pre-defined threshold similarity score”, as discussed above, these techniques encompass mathematical concepts in the form of formulas, equations, and calculations which also have been determined to constitute abstract ideas. See Memorandum, "Grouping of Abstract Ideas" and cases cited in footnote 12, such as enumerated in Section I of the 2019 Revised Patent Subject Matter Eligibility Guidance (84 Fed. Reg. 50). As noted on page 4 of the “October 2019 Update: Subject Matter Eligibility” issued by the USPTO, Examiner notes that a claim does not have to recite the word “calculating” in order to be considered a mathematical calculation. For example, a step of “determining” a variable or number using mathematical methods or “performing” a mathematical operation may also be considered mathematical calculations when the broadest reasonable interpretation (BRI) of the claim, in light of the specification, encompasses one or more mathematical calculations. Applicant’s additional elements, taken individually and in combination, do not appear to be integrated into a practical application since they embody mere instructions to implement the abstract idea on a computer or mere use of a computer as a tool to perform the abstract idea, do no more than generally linking the use of the abstract idea to a particular technological environment or field of use {e.g., see Figures 1 and 3-5 of Applicant’s drawings illustrating a communications network that includes a server 20 in communication 140 with electronic devices 50 of individuals or users 30}, and amount to no more than combining the abstract idea with insignificant extra-solution activity including each of Applicant’s recited operations/processes of receiving and providing, as further explained below. For the reasons discussed above, Applicant’s pending claims are directed to an abstract idea that is not integrated into a practical application under Step 2A, Prong 2 of the Subject Matter Eligibility (SME) analysis of 35 U.S.C. 101.
Step 2B: Under Step 2B enunciated in Alice Corp. v. CLS Bank International, 573 U.S. __, 134 S. Ct. 2347 (2014), Applicant’s instant claims do not recite limitations, taken individually and in combination, that are sufficient to amount to “significantly more” than the abstract idea because Applicant’s claims do not recite, as further explained in detail below, an improvement to another technology or technical field, an improvement to the functioning of a computer itself, an application with or by a particular machine, a transformation or reduction of a particular article to a different state or thing, unconventional steps confining the claim to a particular useful application, or meaningful limitations beyond generally linking the use of an abstract idea to a particular technological environment. Examiner also notes that albeit limitations recited in the Claims 1-18 are performed by the generically recited “one or more processors” of a computer, these processor claim limitations taken individually and in combination are merely instructions to implement the abstract idea on a computer processor and require no more than a generic computer processor to generally link Applicant’s abstract idea to a particular technological environment or field of use {e.g., see Figures 1 and 3-5 of Applicant’s drawings illustrating a communications network that includes a server 20 in communication 140 with electronic devices 50 of individuals or users 30}, and no more than a combination of the abstract idea with insignificant extra-solution activity including each of Applicant’s recited operations/processes of receiving and providing, as further explained below. As mentioned above, the claim elements in addition to the abstract idea arguably include: one or more processors; a plurality of users; using one or more artificial intelligence techniques; a user communication step; a means of establishing a private and secure communication channel; a request to establish a private and secure communication channel; a communication channel configured to enable; each of Applicant’s recited steps/processes of receiving and providing; (only Claim 2) receiving, by one or more processors from a [user] device, an instruction to enable the one or more processors to establish a link or communication channel with the user device, comprising to interface with the social media account(s) associated with the user and/or Global Positioning System (GPS) location tracking hardware and/or software operating on the user device; (only Claim 3) the location tracking hardware or software is operable to record GPS location data; (only Claim 6) storing, by one or more processors, in an indexed database that implements a data structure, and updating, by one or more processors, the indexed database; (only Claim 7) providing a prompt to accept or reject; (only Claim 9) the information being received as a result of prompting to enter; (only Claim 10) establishing, by one or more processors, a communication link with one or more processors associated with one or more external databases to obtain information; (only Claim 13) data exchanged between the user devices and the one or more processors is encrypted using Security Assertion Markup Language (SAML), wherein a software application operating on each user device employs code obfuscation software to protect downloaded data in a multi-layered Trusted Execution Environment (TEE), with the accuracy of information verified using an encrypted cloud service central administration tool; (only Claim 14) providing a selectable link to establish the private and secure communication channel; (only Claim 15) selection of the link enables a live chat wherein communications via the live chat is private and protected using a data masking Host-based Intrusion Detection System (HIDS); (only Claim 16) providing, by one or more processors, a search facility to search and using one or more artificial intelligence techniques; (only Claim 18) generating, by one or more processors, notifications; (only Claim 19) a computer-implemented system including one or more processors configured to perform; and (only Claim 20) a non-transitory computer-readable medium comprising computer instruction code executable on a computer to cause one or more processors of the computer to perform steps. However, each of these components is recited at a high level of generality that taken individually and in combination perform corresponding generic computer functions of receiving and providing — there is no indication that the combination of elements improves the functioning of a computer or improves any other technology since the additional elements taken individually and collectively merely provide generic computer implementations known to the industry. Furthermore, Examiner notes that none of the processes/steps recited in the pending claims taken individually and in combination impose a meaningful limit on the claim’s scope since none of recited processes/steps taken individually and in combination involve activity that amounts to more than generic computer functions/activity. The steps/processes of receiving, recording, storing and providing, as currently recited individually and in combination in Applicant’s claims, are considered to be generic computer functions since they involve having the abstract idea combined with insignificant extra-solution activity, and generally linking the use of an abstract idea to a particular technological environment or field of use previously known to the industry — each of the steps of receiving encompasses a data input/loading or retrieving function performed by virtually all general purpose computers {see Alice Corp., 134 S. Ct. at 2360; see Ultramercial, 772 F.3d at 716‐17; see buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355 (Fed. Cir. 2014); see Cyberfone Systems, LLC v. CNN Interactive Group, Inc., 558 Fed. Appx. 988, 993 (Fed. Cir. 2014); and see Mayo Collaborative Serv. v. Prometheus Labs., Inc., 566 U.S. __, 132 S.Ct. 1289, 101 USPQ2d 1961 (2012)}; each of the steps of verifying encompasses a data recognition/inquiry function or retrieving function performed by virtually all general purpose computers {see Content Extraction and Transmission LLC v. Wells Fargo Bank, N.A., 776 F.3d 1343, 113 U.S.P.Q.2d 1354 (Fed. Cir. 2014), hereinafter “Content Extraction”, for data recognition); each of the steps of recording and storing encompasses a data saving or depositing function performed by virtually all general purpose computers {see Alice Corp., 134 S. Ct. at 2360; Cyberfone Systems, LLC v. CNN Interactive Group, Inc., 558 Fed. Appx. 988 (Fed. Cir. 2014), hereinafter “Cyberfone”; and Content Extraction and Transmission LLC v. Wells Fargo Bank, N.A., 776 F.3d 1343, 113 U.S.P.Q.2d 1354 (Fed. Cir. 2014), hereinafter “Content Extraction”, for data storage}; and each of the steps of providing encompasses a data output/transmittal function performed by virtually all general purpose computers {see Ultramercial, 772 F.3d at 716‐17; see buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355 (Fed. Cir. 2014); and see Cyberfone Systems, LLC v. CNN Interactive Group, Inc., 558 Fed. Appx. 988, 993 (Fed. Cir. 2014)}. In addition, Examiner notes that Applicant’s disclosure at mentions that “the term ‘server’, ‘system’, ‘computer’, ‘computing system’ or the like may include any processor-based or microprocessor-based system including systems using microcontrollers, reduced instruction set computers (RISC), application specific integrated circuits (ASICs), logic circuits, and any other circuit or processor including hardware, software, or a combination thereof capable of executing the functions described herein” (see Nuttall at ¶ [0077] as well as at ¶ [0070] of Applicant’s originally-filed specification)}. Examiner notes it may be worth being mindful of the “July 2015 Update: Subject Matter Eligibility” document, at page 7, second and sixth bullet points (July 30, 2015) regarding various well‐understood, routine, and conventional functions of a computer. Employing well-known computer functions individually and in combination to execute an abstract idea, even when limiting the use of the idea to one particular environment, does not add significantly more, similar to how limiting the computer-implemented abstract idea in Flook (Parker v. Flook, 437 U.S. 584, 19 U.S.P.Q. 193 (1978)) to petrochemical and oil-refining industries was insufficient. For the reasons discussed above, Applicant’s pending claims do not satisfy Step 2B enunciated in Alice Corp. v. CLS Bank International, 573 U.S. __, 134 S. Ct. 2347 (2014).
Consequently, based upon consideration of all of the relevant factors with respect to each claim as a whole, Claims 1-20 are rejected under 35 U.S.C. 101 as being directed to non-statutory subject matter. For information regarding 35 U.S.C. 101, please see Subject Matter Eligibility (SME) guidance and instructional materials at https://www.uspto.gov/patents/laws/examination-policy/subject-matter-eligibility, which includes guidance, memoranda, and updates regarding SME under 35 U.S.C. 101.
Claim Rejections - 35 USC § 102
The following is a quotation of the appropriate paragraph(s) of AIA 35 U.S.C. 102 that form(s) the basis for the rejections under this section made in this Office action:
A person shall be entitled to a patent unless –
(a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale or otherwise available to the public before the effective filing date of the claimed invention.
(a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention.
Claims 1-20 are rejected under America Invents Act (AIA ) 35 U.S.C. §§ 102(a)(1) and 102(a)(2) as being anticipated by U.S. Patent Application Publication No. 2013/0185368 of Nordstrom et al. (hereinafter “Nordstrom”).
Regarding Claim 1, Nordstrom discloses a computer-implemented method for virtually connecting individuals, the method comprising:
in a user matching step: receiving, by one or more processors, information associated with each user of a plurality of users, the information sourced from at least one social media account associated with the user and comprising: an activity or activities of interest to the user; a location associated with the user; and a date and time regarding the user's availability to share an activity of interest with one or more other users (e.g., “two individuals are in the same vicinity and may be interested in being made aware of each other's availability in order to initiate a personal encounter such as a meeting…. matchmaking services, where a mobile device user… search for companions,… new friends, dates, exercise partners,… and so on. Regardless of the application, a list of possible dates, new friends, etc. are presented… which shares a common attribute, feature, or the like….” —Nordstrom at ¶ [0024]; “use a variety of methods to search for these connections, such as scanning the system's database… using outside data sources such as other social…networking sites” —Nordstrom at ¶ [0120]; “Profile data elements can include… a mobile device user's status, e.g., hungry or bored, personal interests, direct and/or shared social relationships…, associated attributes about the user, e.g. job title, desired search or scanning preferences such as a designated search radii about the mobile device, current or historical location data, and… other relevant user information. Profile data can…be derived from external sources, such as personal profile data retrieved from an online social media account, a database,… human resource data source, and… other repository containing profile data…” —Nordstrom at ¶ [0034]; “A location of a mobile device 12… tracked using GPS” —Nordstrom at ¶ [0033]; “User data may include…: user profile and account information, search criteria/preferences to locate other users or points of interest, user location data or movement patterns, patterns of the connections among or between users and… social network graphs, user usage statistics, user transaction data, time and date information, usage data regarding the user or any other information about the user or their use of the system 26…. "user maps" that map users that share similar profiles or other characteristics” —Nordstrom at ¶ [0124]; “assist users of smartphones or other mobile devices to detect friends and interesting people in a flexible and private manner…. for example, other mobile devices determined to be in a same vicinity and… that share a common interest, attribute, status, or profile. The roaming mobile device user can be presented with a list of names or identifiers of other mobile device users when a "match" is found, e.g., another mobile device user is identified as being in the same vicinity and… determined to share a common interest, attribute, current status, and so on as the roaming mobile device” —Nordstrom at ¶ [0023]; “tracks…the locations of the registered mobile devices…using GPS” —Nordstrom at ¶ [0048]; “a current status… indicating that the user is available …. The collaboration system 26 can identify other registered mobile devices having the same status, and are also determined to be available for an electronic chat, game, or the like. The system 26 can then generate an alert for the initiating user and… other identified users having the same status” and “assess from mobile device profile data the current location and interests of each mobile device user and identify that they both drink coffee” —Nordstrom at ¶¶ [0040] and [0076]; as well as Nordstrom at ¶¶ [0060] and [0083]);
generating, by one or more processors, a user profile for each user in which the information associated with the user is recorded (e.g., “Each mobile device includes profile data…. The collaboration system determines a match between profile data of the first registered mobile device and profile data of the second registered mobile device” —Nordstrom at ¶ [0004]; “Profile data elements can include… a mobile device user's status, e.g., hungry or bored, personal interests, direct and/or shared social relationships…, associated attributes about the user, e.g. job title, desired search or scanning preferences such as a designated search radii about the mobile device, current or historical location data, and… other relevant user information. Profile data can…be derived from external sources, such as personal profile data retrieved from an online social media account, a database,… human resource data source, and… other repository containing profile data…” —Nordstrom at ¶ [0034]; “map users that share similar profiles or other characteristics” —Nordstrom at ¶ [0124]; “assist users of smartphones or other mobile devices to detect friends and interesting people in a flexible and private manner…. for example, other mobile devices determined to be in a same vicinity and… that share a common interest, attribute, status, or profile. The roaming mobile device user can be presented with a list of names or identifiers of other mobile device users when a "match" is found, e.g., another mobile device user is identified as being in the same vicinity and… determined to share a common interest, attribute, current status, and so on as the roaming mobile device” —Nordstrom at ¶ [0023]; “profile data such as a current status… indicating that the user is available …. The collaboration system 26 can identify other registered mobile devices having the same status, and are also determined to be available for an electronic chat, game, or the like. The system 26 can then generate an alert for the initiating user and… other identified users having the same status” and “assess from mobile device profile data the current location and interests of each mobile device user and identify that they both drink coffee” —Nordstrom at ¶¶ [0040] and [0076]; as well as Nordstrom at ¶¶ [0051] and [0067]);
verifying, by the one or more processors and using one or more verification techniques, the identity of each user and updating security details associated with the user profile of the user based upon a verification result (e.g., “collaboration system 26 can include…automatic security features” such as “using third-party data of systems to verify… users on the network” —Nordstrom at ¶¶ [0112] and [0119]; and Nordstrom at ¶¶ [0117] and [0119]); and
comparing, by the one or more processors and using one or more artificial intelligence techniques, the information associated with each verified user to determine a similarity score for each user pair, the similarity score based upon an extent to which the information associated with the users in each user pair is determined as similar (e.g., “determined to be in a same vicinity and… that share a common interest, attribute, status, or profile” and “only receive an alert if there is a high degree of match” —Nordstrom at ¶¶ [0023] and [0046]; “establish a prioritization or weighting to search attributes.… a setting for a "high quality match only" and only receive an alert if there is a high degree of match…. Other settings can include a high setting, which detects and… alerts the user if an ideal user that matches all search criteria is in the range of the roaming mobile device” —Nordstrom at ¶ [0046]; “match preferences such as a desired attributes, match strength thresholds, scan distance, window of time” and “generate a match result in response to a determination that mobile device users 12A and 12B are both at a same shopping mall, and that the profile data of mobile device 12A includes information indicating that mobile device user 12A is interested in martial arts, and that mobile device user 12B is also interested in martial arts…. The strength of a relationship can be established by a predetermined "degree of separation" with respect to each other…. The collaboration system 26 can… generate match results in response to a predetermined strength of the relationship, for example, no more than two degrees of separation” —Nordstrom at ¶¶ [0133] and [0052]; “establishing communications with other registered users within 1 mile of the first smartphone 312A. The collaboration system 26 can also… determine from the profile data of each of the users of the smartphones 312A, 312B that the users have a common interest, for example, sports” and “generate a match result in response to a determination that the second smartphone 312B is within 1 mile of the first smartphone 312A” —Nordstrom at ¶¶ [0061]–[0062]; and Nordstrom at ¶ [0133]);
determining, by one or more processors, whether the similarity score for each user pair exceeds a pre-defined threshold similarity score thereby indicating a match between verified users (e.g., “match strength thresholds, scan distance, window of time” —Nordstrom at ¶ [0133]; “only receive an alert if there is a high degree of match” such as “a same vicinity and… that share a common interest, attribute, status, or profile” and such as “generate a match result in response to a determination that the second smartphone 312B is within 1 mile of the first smartphone 312A” —Nordstrom at ¶¶ [0046], [0023] and [0062]; and Nordstrom at ¶¶ [0023], [0046], [0052], [0061]–[0062] and [0133]); and
in a user communication step that follows the user matching step:
based upon one or more other users determined in the user matching step to be matching with the first user such that the first user and each of the one or more other users forms a matching user pair, providing, by one or more processors, the first user with a means of establishing a private and secure communication channel with the one or more other users (e.g., “receive an alert if …a high degree of match” —Nordstrom at ¶ [0046]; “match the user with other nearby users for the purpose of forming new connections…. system 26 can output other notification data such as an introduction… which can be used when forming a connection” and “provide privacy and security for mobile device users” —Nordstrom at ¶¶ [0134] and [0002]; “when Beth and Sally select each other from the lists 714A, 714B, respectively, a notification is displayed at Beth's invite screen 716A indicating that Sally is interested in… chatting, or otherwise communicating with Beth. Similarly, a notification is displayed at Sally's invite screen 716B that Beth is interested in…chatting, or otherwise participating in a communication” —Nordstrom at ¶ [0097]; “if mobile device users 712A, 712B select each other from their respective lists, then…. Each user can be presented with… communication options, for example, "Talk", "SMS",… etc., and can select an option, for example, initiating a telephone call…” or “user may… have an option of selecting an "Instant Message" button” —Nordstrom at ¶¶ [0098] and [0101]; and “allow for mobile device users to chat without having to reveal their phone numbers. For example, after a mutual opt-in event and subsequent communication is established, two users may be able to conduct a voice call through the system blindly without having to reveal their actual phone numbers” and “provide privacy and security for mobile device users” —Nordstrom at ¶¶ [0103] and [0002]); and
receiving, by one or more processors, a request from a first user to establish a private and secure communication channel with one or more of the other users (e.g., “system 26 can output other notification data such as an introduction… which can be used when forming a connection” and “provide privacy and security for mobile device users” —Nordstrom at ¶¶ [0134] and [0002]; “when Beth and Sally select each other from the lists 714A, 714B, respectively, a notification is displayed at Beth's invite screen 716A indicating that Sally is interested in… chatting, or otherwise communicating with Beth. Similarly, a notification is displayed at Sally's invite screen 716B that Beth is interested in…chatting, or otherwise participating in a communication” —Nordstrom at ¶ [0097]; “if mobile device users 712A, 712B select each other from their respective lists, then…. Each user can be presented with… communication options, for example, "Talk", "SMS",… etc., and can select an option, for example, initiating a telephone call…” or “user may… have an option of selecting an "Instant Message" button” —Nordstrom at ¶¶ [0098] and [0101]; and “allow for mobile device users to chat without having to reveal their phone numbers. For example, after a mutual opt-in event and subsequent communication is established, two users may be able to conduct a voice call through the system blindly without having to reveal their actual phone numbers” and “provide privacy and security for mobile device users” —Nordstrom at ¶¶ [0103] and [0002]), and
providing, in response to the request, a communication channel configured to enable the matching users to arrange to participate in one or more of the activities of interest (e.g., “automatic introduction tool providing geospatially active features that facilitate users to meet each other… two individuals are in the same vicinity and may be interested in being made aware of each other's availability in order to initiate a personal encounter such as a meeting” —Nordstrom at ¶ [0024]; “system 26 can output other notification data such as an introduction… which can be used when forming a connection” and “provide privacy and security for mobile device users” —Nordstrom at ¶¶ [0134] and [0002]; “when Beth and Sally select each other from the lists 714A, 714B, respectively, a notification is displayed at Beth's invite screen 716A indicating that Sally is interested in… chatting, or otherwise communicating with Beth. Similarly, a notification is displayed at Sally's invite screen 716B that Beth is interested in…chatting, or otherwise participating in a communication” —Nordstrom at ¶ [0097]; “if mobile device users 712A, 712B select each other from their respective lists, then…. Each user can be presented with… communication options, for example, "Talk", "SMS",… etc., and can select an option, for example, initiating a telephone call…” or “user may… have an option of selecting an "Instant Message" button” —Nordstrom at ¶¶ [0098] and [0101]; and “allow for mobile device users to chat without having to reveal their phone numbers. For example, after a mutual opt-in event and subsequent communication is established, two users may be able to conduct a voice call through the system blindly without having to reveal their actual phone numbers” and “provide privacy and security for mobile device users” —Nordstrom at ¶¶ [0103] and [0002]).
Regarding Claim 2, Nordstrom discloses the method of claim 1, further comprising: receiving, by one or more processors from a device associated with the user, an instruction from the user to enable the one or more processors to establish a link or communication channel with the user device, comprising to interface with the social media account(s) associated with the user and/or Global Positioning System (GPS) location tracking hardware and/or software operating on the user device (e.g., Nordstrom at ¶¶ [0024], [0040], [0056], [0058], [0099] and [0116]).
Regarding Claim 3, Nordstrom discloses the method of claim 2, wherein the location tracking hardware or software is operable to record GPS location data associated with the user (e.g., Nordstrom at ¶¶ [0033]–[0034], [0042] and [0048]–[0049]).
Regarding Claim 4, Nordstrom discloses the method of claim 3, further comprising: collating, by one or more processors, the GPS location data based on the user's movements to thereby create a detailed profile of each user's movements and habits (e.g., Nordstrom at ¶¶ [0033]–[0034], [0038], [0042], [0060] and [0124]).
Regarding Claim 5, Nordstrom discloses the method of claim 3, further comprising: predicting, by one or more processors, the activity or activities of interest to the user based on one or more of: social media activity or history extracted from the user's social media account(s), and the GPS location data associated with the user (e.g., Nordstrom at ¶¶ [0025], [0038], [0054], [0085] and [0129]).
Regarding Claim 6, Nordstrom discloses the method of claim 5, further comprising: storing, by one or more processors, user profiles in an indexed database that implements a data structure, and updating, by one or more processors, the indexed database based upon newly predicted activity or activities of interest to the user (e.g., Nordstrom at ¶¶ [0028], [0034], [0042], [0048], [0055], [0113], [0124] and [0129]).
Regarding Claim 7, Nordstrom discloses the method of claim 6, further comprising: providing the user with a prompt to accept or reject predicted activities of interest that are proposed for inclusion in the profile of the user (e.g., Nordstrom at ¶¶ [0038], [0064], [0073], [0077] and [0125]).
Regarding Claim 8, Nordstrom discloses the method of claim 1, wherein the activity or activities of interest to the user comprise one or more of: attending a gymnasium; walking; attending a café or bar or restaurant; attending the cinema; walking a dog; studying a course, or attending an event or concert (e.g., Nordstrom at ¶¶ [0025], [0067], [0076]–[0077], [0122], [0125], [0135] and [0138]).
Regarding Claim 9, Nordstrom discloses the method of claim 1, wherein the information associated with each user is received as a result of prompting each user to enter details comprising the user's activities of interest, the location of the user, and date and time regarding the user's availability to share an activity of interest with one or more other users (e.g., Nordstrom at ¶¶ [0042], [0046]–[0047], [0060] and [0133]).
Regarding Claim 10, Nordstrom discloses the method of claim 1, wherein verifying the identity of each user comprises: establishing, by one or more processors, a communication link with one or more processors associated with one or more external databases to obtain information to verify the identity of the user (e.g., Nordstrom at ¶¶ [0112], [0117] and [0119]).
Regarding Claim 11, Nordstrom discloses the method according to claim 10, wherein the one or more external databases comprise any one or more of: a Passport Office; a Births, Deaths and Marriages Registry; a Department of Justice and/or Community Safety Registry; or a Public Record Office (e.g., Nordstrom at ¶¶ [0034], [0044]–[0045], [0112], [0117], [0119] and [0132]).
Regarding Claim 12, Nordstrom discloses the method of claim 1, wherein verifying the identity of each user comprises performing one or more of a security and/or a police check (e.g., Nordstrom at ¶¶ [0112], [0117] and [0119]).
Regarding Claim 13, Nordstrom discloses the method of claim 1, wherein data exchanged between the user devices and the one or more processors is encrypted using Security Assertion Markup Language (SAML), wherein a software application operating on each user device employs code obfuscation software to protect downloaded data in a multi-layered Trusted Execution Environment (TEE), with the accuracy of information verified using an encrypted cloud service central administration tool (e.g., Nordstrom at ¶¶ [0028], [0031] and [0058]).
Regarding Claim 14, Nordstrom discloses the method of claim 1, wherein providing the first user with a means of establishing a private and secure communication channel with the matching one or more other users comprises: providing the first user with a selectable link to establish the private and secure communication channel (e.g., Nordstrom at ¶¶ [0002], [0046], [0058], [0097]–[0098], [0101], [0103] and [0134]).
Regarding Claim 15, Nordstrom discloses the method of claim 14, wherein selection of the link enables a live chat between the first user and the matched other user, wherein communications via the live chat is private and protected using a data masking Host-based Intrusion Detection System (HIDS) (e.g., Nordstrom at ¶¶ [0002], [0046], [0058], [0097]–[0098], [0101], [0103] and [0134]).
Regarding Claim 16, Nordstrom discloses the method of claim 1, wherein providing the first user with a means of establishing a private and secure communication channel with the matching one or more other users comprises: providing, by one or more processors, the first user with a search facility to search for matching one or more other users comprising based on keyword(s) entered by the first user, wherein keyword(s) entered are analyzed using one or more artificial intelligence techniques (e.g., Nordstrom at ¶¶ [0023]–[0024], [0034], [0042], [0047], [0067], [0069], [0132]–[0133] and [0135]).
Regarding Claim 17, Nordstrom discloses the method according to claim 16, wherein the search facility further provides the first user with the ability to filter search results, comprising based on one or more of: an activity or activities of interest of the matching one or more other users, a location of the matching one or more other users, a date and time regarding the availability of the one or more other users to share an activity of interest (e.g., Nordstrom at ¶¶ [0023]–[0024], [0034], [0042], [0047], [0067], [0069], [0132]–[0133] and [0135]).
Regarding Claim 18, Nordstrom discloses the method of claim 1, further comprising: generating, by one or more processors, notifications to matching the one or more other users based on: the one or more other users being matched and/or selected by the first user for establishing a private and secure communication channel, the one or more other users being in a geographical location proximal to the first user's location, and the one or more other users being available to socialize (e.g., Nordstrom at ¶¶ [0002], [0023], [0046], [0052], [0061]–[0062], [0097]–[0098], [0101], [0103] and [0133]–[0134]).
Regarding Claim 19, Nordstrom discloses a computer-implemented system for virtually connecting individuals, the system including one or more processors configured (e.g., Figures 1, 3, 4 and 7 of Nordstrom) to perform respective processes/steps as recited in Claim 1, and, therefore, Claim 19 is rejected on the same basis(es) as applied above with respect to Claim 1.
Regarding Claim 20, Nordstrom discloses a non-transitory computer-readable medium comprising computer instruction code that, when executed on a computer, causes one or more processors of the computer (e.g., Figures 1, 3, 4 and 7 of Nordstrom) to perform respective steps/processes as recited in Claim 1, and, therefore, Claim 20 is rejected on the same basis(es) as applied above with respect to Claim 1.
Conclusion
The following references are considered pertinent to Applicant's disclosure, and are being made of record albeit the references are not relied upon as a basis for rejection in this Office action:
U.S. Patent Application Publication No. 2019/0065609 of Jason S. Finder (hereinafter “Finder”).
U.S. Patent Application Publication No. 2018/0068028 of THIRUGNANASUNDARAM et al. (hereinafter “Thirugnanasundaram”) for “FOR IDENTIFYING SAME USERS ACROSS MULTIPLE SOCIAL NETWORKS” —Title of Thirugnanasundaram.
U.S. Patent Application Publication No. 2015/0254311 of Clifford Lerner (hereinafter “Lerner”) for receiving, by one or more processors, information associated with each user of a plurality of users, the information sourced from at least one social media account associated with the user and comprising: an activity or activities of interest to the user; and a location associated with the user (e.g., “social dating system 100 retrieves social networking data from a social networking system 120” —Lerner at ¶ [0018]; “social access module 440 accesses the social networking system 120 and manages data received from the social networking system 120…. social access module 440 retrieves social data including social networking objects describing interests of users,… activity data for the users of the social networking system 120, and so forth” —Lerner at ¶ [0027]; “computerized dating system suggests matches using social networking information to identify common interests between matched users. The common interests between a viewing user and a matched user are determined using sparse social graph data. The social graph data describes a user's interactions with social networking objects in a social networking system. The social networking objects represent concepts such as things, activities,… locations…. Such interactions include… a user ‘liking’ an object, joining an event related to the object, or interacting …. used to identify specific interests of a user” —Lerner at ¶ [0004]; “determines interests in common between users of the social dating system 100…. access social networking data relating to two members of the social dating system 100” —Lerner at ¶ [0029]; “determines common interests between the two users” —Lerner at ¶ [0030]; “dating system accesses activities by the matching users (such as posts to a social networking system) that relate to the common interests” —Lerner at ¶ [0008]; Lerner at ¶¶ [0029]–[0030]; and Figure 7 of Lerner; and “location” —Lerner at ¶ [0029]; generating, by one or more processors, a user profile for each user in which the information associated with the user is recorded (e.g., “FIG. 7 is a user interface for displaying a user profile including common interests for a match” —Lerner at ¶ [0042]; Figure 7 of Lerner shows a “profile page …includ[ing] a picture, demographic information about the matching user, common interests between the viewing user and the matching user, and other information”; Figure 7 of Lerner; as well as Lerner at ¶¶ [0004]–[0005] and [0045]; “In addition to the things in common 710, the profile may also include the matched user's interests 740. The matched user's interests 740 may display any interests of the matched user, or may exclude the interests that have already been displayed as a common interest 720. These displayed interests include general interests 740A. The interests may also include specific interests in categories, such as music interests 740B” —Lerner at ¶ [0045]); comparing, by the one or more processors and using one or more artificial intelligence techniques, the information associated with each verified user to determine a similarity score for each user pair, the similarity score based upon an extent to which the information associated with the users in each user pair is determined as similar (e.g., “generates the match score based in part on the common interests between the viewing user and a potential match” —Lerner at ¶ [0006]; “suggests matches using … interests between matched users. The common interests between a viewing user and a matched user are determined using sparse social graph data. The social graph data describes a user's interactions with social networking objects in a social networking system. The social networking objects represent concepts such as things, activities,… locations…. Such interactions include… a user "liking" an object, joining an event related to the object, or interacting …. used to identify specific interests of a user” —Lerner at ¶ [0004]; “determines interests in common between users of the social dating system 100…. access social networking data relating to two members of the social dating system 100” —Lerner at ¶ [0029]; “a compatibility score between the viewing user and each preliminary matched user” —Lerner at ¶ [0032]; “common interests between the two users” —Lerner at ¶ [0030]; and Lerner at ¶¶ [0005]–[0006]; and Figure 7 of Lerner); determining, by one or more processors, whether the similarity score for each user pair exceeds a pre-defined threshold similarity score thereby indicating a match between verified users (e.g., “generates the match score based… on the common interests between the viewing user and a potential match” —Lerner at ¶ [0006]; “suggests matches using … interests between matched users. The common interests between a viewing user and a matched user are determined” —Lerner at ¶ [0004]; “determines interests in common between users … relating to two members of the social dating system 100” —Lerner at ¶ [0029]; “a compatibility score between the viewing user and each preliminary matched user” —Lerner at ¶ [0032]; “common interests between the two users” —Lerner at ¶ [0030]; “To select a set of matching users, the matching module 410 selects users from the preliminary matched users based on… exceeds an interest level threshold” —Lerner at ¶ [0033]; Lerner at ¶¶ [0005]–[0006]; and Figure 7 of Lerner); and in a user communication step that follows the user matching step: based upon one or more other users determined in the user matching step to be matching with the first user such that the first user and each of the one or more other users forms a matching user pair, providing, by one or more processors, the first user with a means of establishing a private and secure communication channel with the one or more other users (e.g., “matching module 410 identifies users that are suitable matches for one another and prepares data for transmission to the user via the user interface module 400. The matching module 410 may provide matching users to the user as a set or list of matching users” —Lerner at ¶ [0031]; “The user device 110… for communicating with the social dating system 100 and interacting with content provided by the social dating system 100…. The user device 110 may communicate with the social dating system 100 through a website or Internet browser, or the user device 110 may execute an application that communicates with the social dating system 100” —Lerner at ¶ [0019]; Figure 7 of Lerner showing “an interface to send a message 700 to the matched user” and a “user may select and publish a date request. For example, the date request may request another user do something related to a common interest with the user” —Lerner at ¶¶ [0043] and [0039]; “Send Her a Message” and “Send Message” —Figure 7 of Lerner).
U.S. Patent Application Publication No. 2014/0101243 of Naveh et al. (hereinafter “Naveh”) for “IDENTIFYING COMMON INTEREST BETWEEN SOCIAL NETWORK USERS” —Title of Naveh.
U.S. Patent Application Publication No. 2013/0080427 of Cross et al. (hereinafter “Cross ‘427”) for “PRESENTING USER PREFERENCE ACTIVITIES” —Title of Cross ‘427.
U.S. Patent Application Publication No. 2012/0185486 of Voigt et a. (hereinafter “Voigt”).
U.S. Patent Application Publication No. 2012/0331055 of Cross et al. (hereinafter “Cross ‘055”) for “MATCHING USERS WITH SIMILAR INTERESTS” —Title of Cross ‘055; “The user's items of interest from the various external sources may be imported into a profile for the user at the platform for matching users with similar interests and the platform may compare the user's items of interest across the external sources against those imported items of interests of other users to determine which other users have similar items of interest to the user. In some embodiments, the most similar one or more other users (i.e., users with the most amount of overlapping items of interest as the user) are identified for the user. The user may then, for example, interact with these other users and/or their profiles at the platform to discover other items of possible interest to the user” —Cross ‘055at ¶ [0017]; “For example, the social networking website Facebook® may be such an external source and those items (e.g., movies, songs, books) that a user "Likes" on the Facebook® website may be deemed as items of interest for the user. In some embodiments, importation engine 202 is configured to present a user interface at which a user may input the user's logon (e.g., logon identifier, password) and/or credential information for each of one or more external sources. Importation engine 202 then stores such logon and/or credential information and uses it to access the user's respective accounts at the one or more external sources so as to obtain the privilege to obtain the user's items of interest from each of the one or more external sources.… an item of interest obtained by importation engine 202 is a title and/or description (e.g., movie, book, song, activity). In some embodiments, importation engine 202 is configured to categorize each imported item of interest into at least one category recognized by importation engine 202” —Cross ‘055 at ¶ [0024]; “Server 110 is configured to host a social networking platform that imports and aggregates users' items of interest as indicated at one or more websites hosted by source servers 102, 104, and/or 106 and also to match users at the platform with other similar users based on their items of interest” —Cross ‘055 at ¶ [0021]; and “first user may desire to browse the respective profiles associated with these matching users to discover other items of interest of those users that the first user may be interested in and… the first user may wish to send a message to these other users to discuss their common interests” —Cross ‘055 at ¶ [0022].
Any inquiry concerning this communication or earlier communications from the examiner should be directed to Mathew Syrowik whose telephone number is 313-446-4862. The examiner can normally be reached on Monday through Friday 8:30 AM to 4:00 PM (Eastern Time). If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Waseem Ashraf, can be reached at telephone number 517-270-3948. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of an application may be obtained from Patent Center. Status information of published applications may be obtained from Patent Center. Status information of unpublished applications is available through Patent Center for authorized users only. Should you have questions about access to Patent Center, please contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free) or by email at EBC@uspto.gov. Examiner interviews are available via telephone or video conference using a USPTO supplied web-based collaboration tool. To schedule an interview, please email Mathew.Syrowik@USPTO.gov or applicant may use the USPTO Automated Interview Request (AIR) Form at https://www.uspto.gov/patents/uspto-automated-interview-request-air-form. For additional information or questions, please contact the Inventors Assistance Center at 1-800-786-9199 (toll free), 571-272-1000 (local), or 1-800-877-8339 (TDD/TTY).
/Mathew Syrowik/ Primary Examiner, Art Unit 3621