DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claims 1-20 have been examined and are pending.
Information Disclosure Statement
The information disclosure statement (IDS) submitted on 10/25/2024 and 10/25/2024 was filed. The submission is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner.
Examiner’s Comments
An examiner's amendment to the record appears below. Should the changes and/or additions be unacceptable to applicant, an amendment may be filed as provided by 37 CFR 1.312. To ensure consideration of such an amendment, it MUST be submitted no later than the payment of the issue fee.
The application has been amended as follows:
Please replace claim 1 with:
(Currently Amended) A method comprising:
receiving, by computing hardware, a request on behalf of a first party to have a third party provide an electronic artifact, wherein:
the request is submitted by the first party through a data exchange computing platform,
the data exchange computing platform provides a data exchange service that facilitates exchange of electronic artifacts between a plurality of tenants of the data exchange computing platform, and
the first party is a first tenant of the plurality of tenants and has a first tenant instance on the data exchange computing platform;
determining, by the computing hardware, that the third party is not a tenant of the plurality of tenants;
responsive to determining the third party is not the tenant of the plurality of tenants, sending, by the computing hardware, an electronic notification on behalf of the first party to the third party requesting the electronic artifact, wherein the electronic notification comprises an invitation mechanism for facilitating registration of the third party with the data exchange service;
receiving, by the computing hardware, an indication of an activation of the invitation mechanism; and
responsive to receiving the indication:
generating, by the computing hardware, a second tenant instance on the data exchange computing platform for the third party to facilitate the third party [[being]] with a second tenant of the plurality of tenants; and
providing, by the computing hardware, access to the request via the second tenant instance so that the request is automatically available to the third party through the data exchange service.
Please replace claim 5 with:
5. (Currently Amended) The method of Claim 1, wherein generating the second tenant instance on the data exchange computing platform for the third party to facilitate the third party [[being]] with the second tenant of the plurality of tenants comprises:
sending, by the computing hardware, a second electronic communication comprising a conformation mechanism for confirming creation of the second tenant instance for the third party;
receiving, by the computing hardware, a second indication of an activation of the conformation mechanism; and
responsive to receiving the second indication, creating, by the computing hardware, the second tenant instance on the data exchange computing platform.
Please replace claim 8 with:
8. (Currently Amended) A system comprising:
a non-transitory computer-readable medium storing instructions; and
a processing device communicatively coupled to the non-transitory computer-readable medium, wherein,
the processing device is configured to execute the instructions and thereby perform operations comprising:
receiving, by computing hardware, a request on behalf of a first party to have a third party provide an electronic artifact, wherein:
the request is submitted by the first party through a data exchange computing platform,
the data exchange computing platform provides a data exchange service that facilitates exchange of electronic artifacts between a plurality of tenants of the data exchange computing platform, and
the first party is a first tenant of the plurality of tenants and has a first tenant instance on the data exchange computing platform;
determining, by the computing hardware, that the third party is not a tenant of the plurality of tenants;
responsive to determining the third party is not the tenant of the plurality of tenants, sending, by the computing hardware, an electronic notification on behalf of the first party to the third party requesting the electronic artifact, wherein the electronic notification comprises an invitation mechanism for facilitating registration of the third party with the data exchange service;
receiving, by the computing hardware, an indication of an activation of the invitation mechanism; and
responsive to receiving the indication:
generating, by the computing hardware, a second tenant instance on the data exchange computing platform for the third party to facilitate the third party [[being]] with a second tenant of the plurality of tenants; and providing, by the computing hardware, access to the request via the second tenant instance so that the request is automatically available to the third party through the data exchange service.
Please replace claim 12 with:
12. (Currently Amended) The system of Claim 8, wherein generating the second tenant instance on the data exchange computing platform for the third party to facilitate the third party [[being]] with the second tenant of the plurality of tenants comprises:
sending, by the computing hardware, a second electronic communication comprising a conformation mechanism for confirming creation of the second tenant instance for the third party;
receiving, by the computing hardware, a second indication of an activation of the conformation mechanism; and
responsive to receiving the second indication, creating, by the computing hardware, the second tenant instance on the data exchange computing platform.
Please replace claim 14 with:
14. (Currently Amended) A non-transitory computer-readable medium storing computer-executable instructions that, when executed by computing hardware, configure the computing hardware to perform operations comprising:
receiving, by computing hardware, a request on behalf of a first party to have a third party provide an electronic artifact, wherein:
the request is submitted by the first party through a data exchange computing platform,
the data exchange computing platform provides a data exchange service that facilitates exchange of electronic artifacts between a plurality of tenants of the data exchange computing platform, and
the first party is a first tenant of the plurality of tenants and has a first tenant instance on the data exchange computing platform;
determining, by the computing hardware, that the third party is not a tenant of the plurality of tenants;
responsive to determining the third party is not the tenant of the plurality of tenants, sending, by the computing hardware, an electronic notification on behalf of the first party to the third party requesting the electronic artifact, wherein the electronic notification comprises an invitation mechanism for facilitating registration of the third party with the data exchange service;
receiving, by the computing hardware, an indication of an activation of the invitation mechanism; and
responsive to receiving the indication:
generating, by the computing hardware, a second tenant instance on the data exchange computing platform for the third party to facilitate the third party [[being]] with a second tenant of the plurality of tenants; and
providing, by the computing hardware, access to the request via the second tenant instance so that the request is automatically available to the third party through the data exchange service.
Please replace claim 18 with:
18. (Currently Amended) The non-transitory computer-readable medium of Claim 14, wherein generating the second tenant instance on the data exchange computing platform for the third party to facilitate the third party [[being]] with the second tenant of the plurality of tenants comprises:
sending, by the computing hardware, a second electronic communication comprising a conformation mechanism for confirming creation of the second tenant instance for the third party;
receiving, by the computing hardware, a second indication of an activation of the conformation mechanism; and
responsive to receiving the second indication, creating, by the computing hardware, the second tenant instance on the data exchange computing platform.
CLAIM INTERPRETATION
The following is a quotation of 35 U.S.C. 112(f):
(f) Element in Claim for a Combination. – An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof.
The following is a quotation of pre-AIA 35 U.S.C. 112, sixth paragraph:
An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof.
The claims in this application are given their broadest reasonable interpretation using the plain meaning of the claim language in light of the specification as it would be understood by one of ordinary skill in the art. The broadest reasonable interpretation of a claim element (also commonly referred to as a claim limitation) is limited by the description in the specification when 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is invoked.
As explained in MPEP § 2181, subsection I, claim limitations that meet the following three-prong test will be interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph:
(A) the claim limitation uses the term “means” or “step” or a term used as a substitute for “means” that is a generic placeholder (also called a nonce term or a non-structural term having no specific structural meaning) for performing the claimed function;
(B) the term “means” or “step” or the generic placeholder is modified by functional language, typically, but not always linked by the transition word “for” (e.g., “means for”) or another linking word or phrase, such as “configured to” or “so that”; and
(C) the term “means” or “step” or the generic placeholder is not modified by sufficient structure, material, or acts for performing the claimed function.
Use of the word “means” (or “step”) in a claim with functional language creates a rebuttable presumption that the claim limitation is to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites sufficient structure, material, or acts to entirely perform the recited function.
Absence of the word “means” (or “step”) in a claim creates a rebuttable presumption that the claim limitation is not to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is not interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites function without reciting sufficient structure, material or acts to entirely perform the recited function.
Claim limitations in this application that use the word “means” (or “step”) are being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. Conversely, claim limitations in this application that do not use the word “means” (or “step”) are not being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action.
This application includes one or more claim limitations that do not use the word “means,” but are nonetheless being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, because the claim limitation(s) uses a generic placeholder that is coupled with functional language without reciting sufficient structure to perform the recited function and the generic placeholder is not preceded by a structural modifier. Such claim limitation(s) is/are: “…wherein the electronic notification comprises an invitation mechanism for facilitating registration of the third party with the data exchange service…an upload mechanism…providing, by the computing hardware, an access mechanism through the second tenant instance to facilitate the third party accessing the assessment via the data exchange service…sending, by the computing hardware, a second electronic communication comprising a conformation mechanism for confirming creation of the second tenant instance for the third party; receiving, by the computing hardware, a second indication of an activation of the conformation mechanism;” in claims 8-20.
Because this/these claim limitation(s) is/are being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, it/they is/are being interpreted to cover the corresponding structure described in the specification as performing the claimed function, and equivalents thereof.
If applicant does not intend to have this/these limitation(s) interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, applicant may: (1) amend the claim limitation(s) to avoid it/them being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph (e.g., by reciting sufficient structure to perform the claimed function); or (2) present a sufficient showing that the claim limitation(s) recite(s) sufficient structure to perform the claimed function so as to avoid it/them being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph.
Claim Rejections - 35 USC § 112
The following is a quotation of 35 U.S.C. 112(b):
(b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.
The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph:
The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention.
Claims 8 and 14 rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention.
Claim limitation “…an invitation mechanism…an upload mechanism…an access mechanism…a conformation mechanism…” invokes 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. However, the written description fails to disclose the corresponding structure, material, or acts for performing the entire claimed function and to clearly link the structure, material, or acts to the function. There is no association between the structure and the function can be found in the specification. At most, in paras 0205 and 0207 of the specification describes “a data storage device 1118…stored one or more modules 1122…the modules 1122 include an artifact request module 110, a process request link module 115, an autocompletion assessment module 120, an ingest module 125, an identify answers module 130, a populate assessment module 135, a process invitation link module 140, and/or a claim profile module 145 as described herein... There is no disclosure of any particular structure, either explicitly or inherently, to perform facilitation of the electronic assessment via a data exchange computing platform. As would be recognized by those of ordinary skill in the art, the term “facilitating” refers to assisting or enabling some event or action and can be performed in many ways in hardware, software of a combination of the two. The specification does not provide sufficient details such that one of ordinary skill in the art would understand which structures perform(s) the claimed function.” Therefore, the claim is indefinite and is rejected under 35 U.S.C. 112(b) or pre-AIA 35 U.S.C. 112, second paragraph.
Applicant may:
(a) Amend the claim so that the claim limitation will no longer be interpreted as a limitation under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph;
(b) Amend the written description of the specification such that it expressly recites what structure, material, or acts perform the entire claimed function, without introducing any new matter (35 U.S.C. 132(a)); or
(c) Amend the written description of the specification such that it clearly links the structure, material, or acts disclosed therein to the function recited in the claim, without introducing any new matter (35 U.S.C. 132(a)).
If applicant is of the opinion that the written description of the specification already implicitly or inherently discloses the corresponding structure, material, or acts and clearly links them to the function so that one of ordinary skill in the art would recognize what structure, material, or acts perform the claimed function, applicant should clarify the record by either:
(a) Amending the written description of the specification such that it expressly recites the corresponding structure, material, or acts for performing the claimed function and clearly links or associates the structure, material, or acts to the claimed function, without introducing any new matter (35 U.S.C. 132(a)); or
(b) Stating on the record what the corresponding structure, material, or acts, which are implicitly or inherently set forth in the written description of the specification, perform the claimed function. For more information, see 37 CFR 1.75(d) and MPEP §§ 608.01(o) and 2181.
The following is a quotation of the first paragraph of 35 U.S.C. 112(a):
(a) IN GENERAL.—The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor or joint inventor of carrying out the invention.
The following is a quotation of the first paragraph of pre-AIA 35 U.S.C. 112:
The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor of carrying out his invention.
Claims 8-20 are rejected under 35 U.S.C. 112(a) or 35 U.S.C. 112 (pre-AIA ), first paragraph, as failing to comply with the written description requirement. The claim(s) contains subject matter which was not described in the specification in such a way as to reasonably convey to one skilled in the relevant art that the inventor or a joint inventor, or for applications subject to pre-AIA 35 U.S.C. 112, the inventor(s), at the time the application was filed, had possession of the claimed invention. As described above, the disclosure does not provide adequate structure to perform the claimed functions of facilitating access to an electronic assessment, registration of third party with data exchange services, or validating the activation associated with third party. The specification does not describe with sufficient detail such that one of ordinary skill in the art can reasonably conclude that the inventor had possession of the claimed invention.
Allowable Subject Matter
Claims 1-20 would be in condition for allow if the 112(a) and 112(b) rejection was obviated.
The following is an examiner's statement of reasons for allowance:
The closest prior art, as recited, McKervey et al 11,921,873 B1, Ford et al 20170041296 A1, Diestler 20160255089 A1 and Christopher GB2541040A are also generally directed to a method comprising [McKervey et al 11,921,873 B1 Abstract. Ford et al 20170041296 A1 Fig. 10 and ¶¶0200-0201 present disclosure describes an exchange content access facility 1008 (content access management facility 251 as in FIG. 2a ) in association with the secure exchange server 1002; improves the security for a plurality of users 1004 to freely collaborate. A method for managing a networked secure collaborative computer data exchange environment:]; receiving, by computing hardware, a request on behalf of a first party to have a third party provide an electronic artifact, wherein [McKervey col 8, lines 7-9 and col 13, lines 1-5 client 102/404a-n and host application 114 send various requests and receive data packets to initiate communication, making a request for a specific resource. Ford Fig. 10 and ¶¶0201-0202 0209 a networked secure collaborative computer data exchange environment a first of the plurality of users 1004 may request a sharing access to services/files/file sharing/documents via a dashboard facility through third-party environments from the secure exchange server 1002 to a content item to at least a second of the plurality of users.]:
the request is submitted by the first party through a data exchange computing platform [McKervey col 7, lines 39-46 and col 13, lines 11-20 communications by client devices 102/404a-n are coupled to host devices 106 sends search request to search head 210 of data intake and query system 108 via network 104/420. Ford Fig. 10 and ¶0209 plurality of users from a plurality of channels request edits to a document, send for electronic signature, request form completion)], the data exchange computing platform provides a data exchange service that facilitates exchange of electronic artifacts between a plurality of tenants of the data exchange computing platform [Ford Fig. 10 and ¶0210 system may provide for enterprise integration and business process management, including a plurality of channels (e.g. published integration API, third-party app integration], and the first party is a first tenant of the plurality of tenants and has a first tenant instance on the data exchange computing platform [McKervey col 7, lines 48-64 host device 106 broadly include any number of computers configured to host or execute one or more instances of host applications 114, involved directly or indirectly when processing requests received from client devices 102. Ford ¶0201 The user may be one of a plurality of users 1004 that work for a plurality of other business entities (e.g., users may be employees of the same business entity or users may be working for different business entities), where the users of the other business entities communicate with the secure exchange server through a communications network; an exchange content access facility 1008 managed by the intermediate business entity.]; determining, by the computing hardware, that the third party is not a tenant of the plurality of tenants [McKervey col 12, lines 55-63 Fig. 4 shows a data intake and query system 108 provides transparent search facilities for data systems that are external to the data intake and query system. See col 7, lines 39-46 and col 13, lines 11-20. Ford ¶0241 a secure collaborative content facility 282 may be provided for the secure management of a plurality of secure documents, resources, communications, workflows, and the like, among a plurality of users, where secure documents, communications, and the like may contain or have associated therewith metadata content. ¶¶0259-0260 the user of a first client computing device 1308 may send the spreadsheet document to the server 1304 (e.g., a secure server) hosting a server-based spreadsheet viewer facility 292]; responsive to determining the third party is not the tenant of the plurality of tenants, sending, by the computing hardware, an electronic notification on behalf of the first party to the third party requesting the electronic artifact, wherein the electronic notification for facilitating registration of the third party with the data exchange service [Diestler 20160255089 A1 ¶¶0065-0069 Fig. 3 shows method of registering an individual, a new member, to the collaboration system 100. At step 302B, IA 116 may set up the secure tunnel between client device 102 and the login API for identity server 106-1 via the collaboration platform 104.Ford et al 20170041296 A1 ¶0241 one or more workflows may be created, triggered, modified, or redirected based on the metadata; workflows may include, without limitation, workflows that include steps that take place across multiple entities or enterprises, such as work flows involve in inter-enterprise negotiation, collaboration, or cooperation. Secure communications may include an email, FTP, USB transfer, a secure third-party document sharing facility, and the like. Fig. 13 and ¶0260 the user of a first client computing device 1308 may send the spreadsheet document to the server 1304 (e.g., a secure server) hosting the spreadsheet viewer facility 292, along with a sharing invitation to the user of a second client computing device 1310 with permission to view the spreadsheet document. The second client computer 1310 may, upon the user's request, communicate with the spreadsheet viewer facility 292 to render the spreadsheet document with a spreadsheet renderer 1306 to a client spreadsheet viewer 1312 on the second client computer 1310. The spreadsheet renderer 1306 may then transmit spreadsheet document data to the client spreadsheet viewer 1312 for the initial rendering of the rendered spreadsheet document. The user of the second client computer 1310 may then interact with the rendered spreadsheet document, where the client spreadsheet viewer 1312 transmits user actions (e.g., keyboard and mouse actions) to the spreadsheet viewer facility 292 for interpretation and updating of the rendered spreadsheet.]; receiving, by the computing hardware, an activation of the invitation mechanism [Diestler ¶0087 platform 104 may create an internal user identity when a user first registers with system 100. IA 116 allows a member to map multiple organizational/external identities together (via the internal user identifier) and self-identify as the same person through a one-time authentication to each individual identity. Christopher GB2541040A ¶00115 open an invitation, maybe asked to accept/decline].
However, none of McKervey, Ford, Diestler and Christopher teach or suggests, alone or in combination, the particular combination of steps or elements as recited in the independent claims, claims 1, 8, and 14. For example, none of the cited prior art teaches or suggest responsive to determining the third party is not the tenant of the plurality of tenants, sending, by the computing hardware, an electronic notification on behalf of the first party to the third party requesting the electronic artifact, wherein the electronic notification comprises an invitation mechanism for facilitating registration of the third party with the data exchange service; receiving, by the computing hardware, an indication of an activation of the invitation mechanism; and responsive to receiving the indication: generating, by the computing hardware, a second tenant instance on the data exchange computing platform for the third party to facilitate the third party being a second tenant of the plurality of tenants; and providing, by the computing hardware, access to the request via the second tenant instance so that the request is automatically available to the third party through the data exchange service, in view of other limitations of claims 1, 8, and 14.
Any comments considered necessary by applicant must be submitted no later than the payment of the issue fee and, to avoid processing delays, should preferably accompany the issue fee. Such submissions should be clearly labeled "Comments on Statement of Reasons for Allowance."
The closest prior art made of record are:
Diestler et al 20160255089 A1 teaches systems and methods for controlling access to electronic collaboration content data associated with a plurality of organizations. The system includes one or more databases storing the electronic collaboration content data. An identity aggregator receives a request for access to the electronic collaboration content data from an individual's client device and determines an internal user identifier of the individual, that represents an aggregate identity of the individual corresponding to at least one of organizational identities or external identities. A content access manager maps the internal user identifier to content permissions associated with the individual across each organization that is associated with the individual and the external content services associated with the individual. The content access manager permits access by the client device to at least a portion of the electronic data stored among the databases across each organization associated with the individual and based on the individual's content permissions.
Christopher 20170041296 A1 teaches an improved secure exchange system features include a federated search facility, hybrid encryption management (adjustable encryption key management), anonymous IRM, disassembled storage of data as chunks rather than files, asynchronous notification process/integrated file upload and messaging, an identity facility, multi-factor authentication, dynamic access authorization, and various enhancements to a customizable exchange system
Perretta et al 11500909 B1 teaches techniques for communicating with a third-party management database are described herein. According to an embodiment, a computer receives a search-style query, searches the third-party management database, retrieves multiple computer-readable database search strings, displays the computer-readable database search strings, and receives a selected computer-readable database search string. The computer may receive data associated with one or more third party surveys, and questions and answer options may be displayed according to various metadata attributes associated with previously-selected answer options.
Rodriguez et al 20200090197 A1 teaches systems to establish a security profile may include a memory to store original text from security questionnaires, and values associated with the original text from the questionnaires, the values indicating a section, a control, or a question of the original text. The system may also include a processing unit. The processing unit can identify a set of latent topics present in the original text from the stored security questionnaires, score the original text based on presence or absence of latent topics, receive a new security questionnaire, score the new text from the new security questionnaire based on presence or absence of latent topics, compute a distance between the scored original text from the stored security questionnaires and the scored new text from the new security questionnaire, and link the original text to the new text with a smallest distance between.
Adam 20140067731 A1 teaches intended meanings of user input character strings having multiple interpretations and having a single intended meaning are predicted in real time as they are entered by applying a profile thereto. The profile is generated by application of unsupervised and supervised learning techniques which identify predictive factors. Substantially simultaneously with application of the profile to the character strings, a plurality of remotely located profiles are accessed. The remotely located profiles are determined by application of supervised and unsupervised techniques to a plurality of third parties and are identified and ranked to determine those profiles that most nearly match one or more predictive factors in the user profile, where the predictive factors are weighted based on the ranking, the weighted predictive factors are combined with the user profile to determine the intended meaning of the character string from among the multiple interpretations, and the intended meaning is displayed to the user.
Isozaki et al 20140026228 A1 teaches an information processing apparatus includes a management module and a control module. The control module detects an event of requesting install of an application program, and transmits, prior to execution of the install, install event information including an application name of the application program to the management module. The management module notifies the install event information to a determination program, and transmits to the control module a determination result indicative of permission or prohibition of the install, the determination result being received from the determination program. (para 0133)
Becker et al 20070156901 A1 teaches methods and systems may allow for a first tenant of a plurality of tenants to access a data structure at a provider database, wherein each of the plurality of tenants has common access to the data structure. By receiving, from the first tenant, a data request identifying the data structure, and querying, based on the data request, a tenant database associated with the first tenant for the identified data structure a determination may be made, based on the data request, that the identified data structure is located at the provider database. A tenant may redirect the data request to the provider database based on a data structure link reflecting a logical connection to an address of the identified data structure. With this capability a tenant may easily access data structures at a provider database (paras 0010 0036-0037 0044-0052 0060-0062 0078-0081).
Hsu 20210326978 A1 teaches real estate product related finance system and a management method thereof are provided. The finance organization server obtains a loan request. The real estate platform receives a real estate request and predicts a deductible amount of the customer through a machine learning algorithm. The sale terminal receives a deal processed through a purchase certificate, where the purchase certificate relates to digital money. The real estate platform calculates a value difference between a comparing result between the predicted deductible amount and the total purchase amount and home loan interest of the customer within a liquidation period, and provides the value difference to the finance organization server, to deduct the home loan interest within the liquidation period. Accordingly, the mechanism for paying the home loan interest is changed, it is easier to manage for financial organizations, and the customer can be notified automatically.
Smit 20210056148 A1 teaches an invention that provides a session-based bi-directional multi-tier client-server asynchronous information database search and retrieval system for sending a character-by-character string of data to an intelligent server that can be configured to immediately analyze the lengthening string character-by-character and return to the client increasingly appropriate database information as the client sends the string.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to SAKINAH WHITE-TAYLOR whose telephone number is (571)270-0682. The examiner can normally be reached Monday-Friday, 10:45a-6:45p.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, CATHERINE THIAW can be reached at 571-270-1138. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
SAKINAH WHITE-TAYLOR
Primary Examiner
Art Unit 2407
/Sakinah White-Taylor/Primary Examiner, Art Unit 2407