Prosecution Insights
Last updated: April 19, 2026
Application No. 18/936,902

Enhancing Domain Keys Identified Mail (DKIM) Signatures

Non-Final OA §DP
Filed
Nov 04, 2024
Examiner
WILLIAMS, CLAYTON R
Art Unit
2443
Tech Center
2400 — Computer Networks
Assignee
Google LLC
OA Round
1 (Non-Final)
82%
Grant Probability
Favorable
1-2
OA Rounds
2y 9m
To Grant
76%
With Interview

Examiner Intelligence

Grants 82% — above average
82%
Career Allow Rate
551 granted / 676 resolved
+23.5% vs TC avg
Minimal -5% lift
Without
With
+-5.2%
Interview Lift
resolved cases with interview
Typical timeline
2y 9m
Avg Prosecution
12 currently pending
Career history
688
Total Applications
across all art units

Statute-Specific Performance

§101
17.1%
-22.9% vs TC avg
§103
39.1%
-0.9% vs TC avg
§102
13.2%
-26.8% vs TC avg
§112
19.1%
-20.9% vs TC avg
Black line = Tech Center average estimate • Based on career data from 676 resolved cases

Office Action

§DP
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claims 1-20 are pending. Double Patenting The nonstatutory double patenting rejection is based on a judicially created doctrine grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or improper timewise extension of the “right to exclude” granted by a patent and to prevent possible harassment by multiple assignees. A nonstatutory double patenting rejection is appropriate where the conflicting claims are not identical, but at least one examined application claim is not patentably distinct from the reference claim(s) because the examined application claim is either anticipated by, or would have been obvious over, the reference claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); In re Thorington, 418 F.2d 528, 163 USPQ 644 (CCPA 1969). A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may be used to overcome an actual or provisional rejection based on nonstatutory double patenting provided the reference application or patent either is shown to be commonly owned with the examined application, or claims an invention made as a result of activities undertaken within the scope of a joint research agreement. See MPEP § 717.02 for applications subject to examination under the first inventor to file provisions of the AIA as explained in MPEP § 2159. See MPEP § 2146 et seq. for applications not subject to examination under the first inventor to file provisions of the AIA . A terminal disclaimer must be signed in compliance with 37 CFR 1.321(b). The filing of a terminal disclaimer by itself is not a complete reply to a nonstatutory double patenting (NSDP) rejection. A complete reply requires that the terminal disclaimer be accompanied by a reply requesting reconsideration of the prior Office action. Even where the NSDP rejection is provisional the reply must be complete. See MPEP § 804, subsection I.B.1. For a reply to a non-final Office action, see 37 CFR 1.111(a). For a reply to final Office action, see 37 CFR 1.113(c). A request for reconsideration while not provided for in 37 CFR 1.113(c) may be filed after final for consideration. See MPEP §§ 706.07(e) and 714.13. The USPTO Internet website contains terminal disclaimer forms which may be used. Please visit www.uspto.gov/patent/patents-forms. The actual filing date of the application in which the form is filed determines what form (e.g., PTO/SB/25, PTO/SB/26, PTO/AIA /25, or PTO/AIA /26) should be used. A web-based eTerminal Disclaimer may be filled out completely online using web-screens. An eTerminal Disclaimer that meets all requirements is auto-processed and approved immediately upon submission. For more information about eTerminal Disclaimers, refer to www.uspto.gov/patents/apply/applying-online/eterminal-disclaimer. Claims 1, 3-11 and 13-20 are rejected on the ground of nonstatutory double patenting as being unpatentable over claims 1, 3-11 and 13-20 of U.S. Patent No. 12149633 (hereinafter ‘633). Although the claims at issue are not identical, they are not patentably distinct from each other because each of the specifically enumerated instant claims in following table is anticipated by a correspondingly mapped ‘633 claim. Instant claims ‘633 claims 1. A computer-implemented method when executed by data processing hardware causes the data processing hardware to perform operations comprising: obtaining, at a message server, a message for a user of a message service hosted by the message server, the message comprising a header, the header comprising: a digital signature signed by an author of the message; and a list of one or more recipients of the message; determining that the digital signature by the author is valid; determining, using the list of one or more recipients, that the user is not a declared recipient of the message; and based on determining that the user is not the declared recipient of the message, indicating the message is unauthentic. 3. The method of claim 1, wherein indicating the message is unauthentic comprises generating a notification indicating the message may be a replay attack. 4. The method of claim 1, wherein the operations further comprise: receiving, from a user device of the user, a second message for transmission to a first recipient and a second recipient, the first recipient comprising a non-private recipient and the second recipient comprising a private recipient; generating a first header comprising the first recipient; generating a second header comprising the second recipient; digitally signing the first header with the digital signature associated with the user; digitally signing the second header with the digital signature associated with the user; transmitting the first header and the message to a second message server associated with the first recipient; and transmitting the second header and the message to a third message server associated with the second recipient. 5. The method of claim 1, wherein: the header further comprises a second header, the second header: digitally signed by a subsequent distributor of the message; and comprising a list of one or more subsequent recipients of the message; and determining that the user is not the declared recipient of the message comprises determining that the list of one or more subsequent recipients does not include the user. 6. The method of claim 5, wherein the second header further comprises an increment indicating a number of times the message has been forwarded. 7. The method of claim 1, wherein indicating the message is unauthentic comprises designating the message as spam. 8. The method of claim 1, wherein the operations further comprises transmitting a challenge request to a sender of the message, the challenge request challenging the sender to prove the sender digitally signed the digital signature. 9. The method of claim 8, wherein the challenge request requests the sender to transmit a challenge response comprising a second digital signature signed using an encryption key used to sign the digital signature. 10. The method of claim 9, wherein the operations further comprise: receiving, from the sender of the message, the challenge response; and verifying that the sender of the message is the author of the message. 11. A system comprising: data processing hardware; and memory hardware in communication with the data processing hardware, the memory hardware storing instructions that when executed on the data processing hardware cause the data processing hardware to perform operations comprising: obtaining, at a message server, a message for a user of a message service hosted by the message server, the message comprising a header, the header comprising: a digital signature signed by an author of the message; and a list of one or more recipients of the message; determining that the digital signature by the author is valid; determining, using the list of one or more recipients, that the user is not a declared recipient of the message; and based on determining that the user is not the declared recipient of the message, indicating the message is unauthentic. 13. The system of claim 11, wherein indicating the message is unauthentic comprises generating a notification indicating the message may be a replay attack. 14. The system of claim 11, wherein the operations further comprise: receiving, from a user device of the user, a second message for transmission to a first recipient and a second recipient, the first recipient comprising a non-private recipient and the second recipient comprising a private recipient; generating a first header comprising the first recipient; generating a second header comprising the second recipient; digitally signing the first header with the digital signature associated with the user; digitally signing the second header with the digital signature associated with the user; transmitting the first header and the message to a second message server associated with the first recipient; and transmitting the second header and the message to a third message server associated with the second recipient. 15. The system of claim 11, wherein: the header further comprises a second header, the second header: digitally signed by a subsequent distributor of the message; and comprising a list of one or more subsequent recipients of the message; and determining that the user is not the declared recipient of the message comprises determining that the list of one or more subsequent recipients does not include the user. 16. The system of claim 15, wherein the second header further comprises an increment indicating a number of times the message has been forwarded. 17. The system of claim 11, wherein indicating the message is unauthentic comprises designating the message as spam. 18. The system of claim 11, wherein the operations further comprises transmitting a challenge request to a sender of the message, the challenge request challenging the sender to prove the sender digitally signed the digital signature. 19. The system of claim 18, wherein the challenge request requests the sender to transmit a challenge response comprising a second digital signature signed using an encryption key used to sign the digital signature. 20. The system of claim 19, wherein the operations further comprise: receiving, from the sender of the message, the challenge response; and verifying that the sender of the message is the author of the message. 1. A computer-implemented method when executed by data processing hardware causes the data processing hardware to perform operations comprising: obtaining, at a message server, a message for a user of a message service hosted by the message server, the message comprising a header, the header comprising: a digital signature signed by an author of the message; and a list of one or more recipients of the message; determining whether the digital signature by the author is valid; determining, using the list of one or more recipients, whether the user is a declared recipient of the message; when the digital signature by the author is valid and the user is the declared recipient of the message, indicating the message is authentic; and when the digital signature by the author is valid and the user is not the declared recipient of the message, indicating the message is unauthentic. 3. The method of claim 1, wherein indicating the message is unauthentic comprises generating a notification indicating the message may be a replay attack. 4. The method of claim 1, wherein the operations further comprise: receiving, from a user device of the user, a second message for transmission to a first recipient and a second recipient, the first recipient a non-private recipient and the second recipient a private recipient; generating a first header comprising the first recipient; generating a second header comprising the second recipient; digitally signing the first header with the digital signature associated with the user; digitally signing the second header with the digital signature associated with the user; transmitting the first header and the message to a second message server associated with the first recipient; and transmitting the second header and the message to a third message server associated with the second recipient. 5. The method of claim 1, wherein: the header further comprises a second header, the second header: digitally signed by a subsequent distributor of the message; and comprising a list of one or more subsequent recipients of the message; and determining whether the user is the declared recipient of the message comprises determining whether the list of one or more subsequent recipients includes the user. 6. The method of claim 5, wherein the second header further comprises an increment indicating a number of times the message has been forwarded. 7. The method of claim 1, wherein indicating the message is unauthentic comprises designating the message as spam. 8. The method of claim 1, wherein the operations further comprises transmitting a challenge request to a sender of the message, the challenge request challenging the sender to prove the sender digitally signed the digital signature. 9. The method of claim 8, wherein the challenge request requests the sender to transmit a challenge response comprising a second digital signature signed using an encryption key used to sign the digital signature. 10. The method of claim 9, wherein the operations further comprise: receiving, from the sender of the message, the challenge response; and verifying that the sender of the message is the author of the message. 11. A system comprising: data processing hardware; and memory hardware in communication with the data processing hardware, the memory hardware storing instructions that when executed on the data processing hardware cause the data processing hardware to perform operations comprising: obtaining, at a message server, a message for a user of a message service hosted by the message server, the message comprising a header, the header comprising: a digital signature signed by an author of the message; and a list of one or more recipients of the message; determining whether the digital signature by the author is valid; determining, using the list of one or more recipients, whether the user is a declared recipient of the message; when the digital signature by the author is valid and the user is the declared recipient of the message, indicating the message is authentic; and when the digital signature by the author is valid and the user is not the declared recipient of the message, indicating the message is unauthentic. 13. The system of claim 11, wherein indicating the message is unauthentic comprises a notification indicating the message may be a replay attack. 14. The system of claim 11, wherein the operations further comprise: receiving, from a user device of the user, a second message for transmission to a first recipient and a second recipient, the first recipient a non-private recipient and the second recipient a private recipient; generating a first header comprising the first recipient; generating a second header comprising the second recipient; digitally signing the first header with the digital signature associated with the user; digitally signing the second header with the digital signature associated with the user; transmitting the first header and the message to a second message server associated with the first recipient; and transmitting the second header and the message to a third message server associated with the second recipient. 15. The system of claim 11, wherein: the header further comprises a second header, the second header: digitally signed by a subsequent distributor of the message; and comprising a list of one or more subsequent recipients of the message; and determining whether the user is the declared recipient of the message comprises determining whether the list of one or more subsequent recipients includes the user. 16. The system of claim 15, wherein the second header further comprises an increment indicating a number of times the message has been forwarded. 17. The system of claim 11, wherein indicating the message is unauthentic comprises designating the message as spam. 18. The system of claim 11, wherein the operations further comprises transmitting a challenge request to a sender of the message, the challenge request challenging the sender to prove the sender digitally signed the digital signature. 19. The system of claim 18, wherein the challenge request requests the sender to transmit a challenge response comprising a second digital signature signed using an encryption key used to sign the digital signature. 20. The system of claim 19, wherein the operations further comprise: receiving, from the sender of the message, the challenge response; and verifying that the sender of the message is the author of the message. Allowable Subject Matter Claims 2 and 12 are objected to as being dependent upon a rejected base claim, but would be allowable if rewritten in independent form including all of the limitations of the base claim and any intervening claims. The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Duncan (USP 10904012): “The method may proceed with digitally securing the message by generating a first digital signature for the message. The first digital signature may be added to a list of digital signatures for inclusion in the message.” (abstract) Goldstein (US 20200137081): Email digital signature headers disclosed (par. 0041, 0043) Griffin (USP 10742420): Email signature authentication methods (abstract) Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to CLAYTON R WILLIAMS whose telephone number is (571)270-3801. The examiner can normally be reached M-F 10:00am - 6:00pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Nicholas Taylor can be reached at 571-272-3889. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /CLAYTON R WILLIAMS/Primary Examiner, Art Unit 2443
Read full office action

Prosecution Timeline

Nov 04, 2024
Application Filed
Feb 20, 2026
Non-Final Rejection — §DP (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12604185
SECURITY KEY DERIVATION USING DECODED INFORMATION BLOCKS
2y 5m to grant Granted Apr 14, 2026
Patent 12579235
FACIAL RECOGNITION AND/OR AUTHENTICATION SYSTEM WITH MONITORED AND/OR CONTROLLED CAMERA CYCLING
2y 5m to grant Granted Mar 17, 2026
Patent 12567980
DELIVERING APPLICATIONS ON DEMAND BASED ON TRUST BETWEEN SYSTEMS
2y 5m to grant Granted Mar 03, 2026
Patent 12563121
CONTENT MANAGEMENT SYSTEM INTEGRATIONS WITH WEB MEETINGS
2y 5m to grant Granted Feb 24, 2026
Patent 12556575
WEBSITE ACCESS WORKFLOW
2y 5m to grant Granted Feb 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
82%
Grant Probability
76%
With Interview (-5.2%)
2y 9m
Median Time to Grant
Low
PTA Risk
Based on 676 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month