Prosecution Insights
Last updated: April 19, 2026
Application No. 18/940,044

AI LEARNING SYSTEM

Non-Final OA §103§DP
Filed
Nov 07, 2024
Examiner
PHAM, PHUC H
Art Unit
2408
Tech Center
2400 — Computer Networks
Assignee
Toyota Jidosha Kabushiki Kaisha
OA Round
1 (Non-Final)
90%
Grant Probability
Favorable
1-2
OA Rounds
2y 9m
To Grant
99%
With Interview

Examiner Intelligence

Grants 90% — above average
90%
Career Allow Rate
149 granted / 166 resolved
+31.8% vs TC avg
Strong +19% interview lift
Without
With
+19.4%
Interview Lift
resolved cases with interview
Typical timeline
2y 9m
Avg Prosecution
23 currently pending
Career history
189
Total Applications
across all art units

Statute-Specific Performance

§101
7.6%
-32.4% vs TC avg
§103
59.9%
+19.9% vs TC avg
§102
1.5%
-38.5% vs TC avg
§112
8.2%
-31.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 166 resolved cases

Office Action

§103 §DP
DETAILED ACTION The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . The present application, filed on November 07, 2024, is accepted. Claims 1 – 2 are being considered on the merits. Drawings The drawings, filed on November 07, 2024, are accepted. Specification The specification, filed on November 07, 2024, is accepted. Claim Objections Claim 1 is objected to because of the following informalities: “an encryptor configured to encrypts” should be “an encryptor configured to encrypt”. Appropriate correction is required. Double Patenting No rejection warranted at application’s initial filling time of filling for a patent. Claim Interpretation The following is a quotation of 35 U.S.C. 112(f): (f) Element in Claim for a Combination. – An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. This application includes one or more claim limitations that do not use the word “means,” but are nonetheless being interpreted under 35 U.S.C. 112(f) because the claim limitation(s) uses a generic placeholder that is coupled with functional language without reciting sufficient structure to perform the recited function and the generic placeholder is not preceded by a structural modifier. Such claim limitations are: Claim 1 recites “a sorter configured to sort…” Because these claim limitations are being interpreted under 35 U.S.C. 112(f), they are being interpreted to cover the corresponding structure described in the specification as performing the claimed function, and equivalents thereof. Examiner has investigated the specification of the instant application and finds the following: Page [4] lines [25 – 32]: “The sorting unit 12 is configured to sort the personal information data Dp that should be secret when creating a desired AI model from AI learning data, in accordance with prescribed criteria. The desired AI model may be, for example, an AI model for personnel evaluation or the like. Sorting unit 12 may have criteria setting unit 12a. The criteria setting unit 12a sets prescribed criteria so as to reduce the amount of calculation processing, depending on the degree of increase or decrease in the amount of calculation processing for secure computation and the degree to which the personal information should be secret.” Claim 1 recites “an encryptor configured to encrypt …” Because these claim limitations are being interpreted under 35 U.S.C. 112(f), they are being interpreted to cover the corresponding structure described in the specification as performing the claimed function, and equivalents thereof. Examiner has investigated the specification of the instant application and finds the following: Page [6] lines [4 – 11]: “The encryption unit 13 is configured to output the personal information data Dp sorted by the sorting unit 12 as an encrypted personal information data Dpe by encrypting the personal information data Dp using various encryption techniques that are already or will be developed. The sorted personal information data Dp can be said to be personal information data Dp to be encrypted. As an example of encryption technology, secure computation such as homomorphic encryption and secure distributed encryption can be mentioned.” Claim 1 recites “a holder configured to hold …” Because these claim limitations are being interpreted under 35 U.S.C. 112(f), they are being interpreted to cover the corresponding structure described in the specification as performing the claimed function, and equivalents thereof. Examiner has investigated the specification of the instant application and finds the following: Page [6] lines [12 – 21]: “Holding unit 14 includes a memory or the like of a plurality of computers housed in a network and is configured using existing or upgraded blockchain technology. Holding unit 14 holds in the blockchain AI learn data of the status including the enciphered personal information Dpe either sequentially or at appropriate timing-intervals. That is, the holding unit 14 holds AI learning data including two kinds of data, an encrypted personal information data Dpe and an unencrypted personal information data Dn, in a block chain. A personal information data Dn that is not encrypted is data that can be treated as "non-personal information data".” Claim 1 recites “AI learner configured to perform …” Because these claim limitations are being interpreted under 35 U.S.C. 112(f), they are being interpreted to cover the corresponding structure described in the specification as performing the claimed function, and equivalents thereof. Examiner has investigated the specification of the instant application and finds the following: Page [6] lines [28 – 36] to page [7] lines [1 – 12]: “The AI learning unit 15 may be configured to perform AI learning using a supervised learning method, an unsupervised learning method, a semi-supervised learning method, a reinforcement learning method, a generative AI method, or the like, and to provide the learned AI models sequentially or collectively to a destination via a network. AI learning unit 15 may be configured using a neural network that performs efficient AI learning by expression learning, transfer learning, feature selection, fine tuning or hyperparameter tuning, ensemble learning, or the like. Alternatively, AI learning unit 15 may be configured as a generation AI that learns a pattern or a relation of the AI learning data and generates content data differing from the AI learning data. In either case, since the criteria setting by the criteria setting unit 12a in the sorting unit 12 is performed, the computation processing amount in the secure computing unit 15a is small compared to the case where the criteria setting is not performed. The secure computation here is, for example, a secure computation such as a perfectly homomorphic encryption method or a homomorphic encryption method and a secure distribution method. In particular, when the criteria setting unit 12a in the sorting unit 12 sets the criteria by AI learning, the further the learning proceeds, the less the computation processing of the secure computation is, which is advantageous in practice.” If applicant does not intend to have these limitations interpreted under 35 U.S.C. 112(f) applicant may: (1) amend the claim limitations to avoid them being interpreted under 35 U.S.C. 112(f) (e.g., by reciting sufficient structure to perform the claimed function); or (2) present a sufficient showing that the claim limitations recite sufficient structure to perform the claimed function so as to avoid them being interpreted under 35 U.S.C. 112(f). Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1 – 2 are rejected under 35 U.S.C. 103 as being unpatentable over US 20230385451 A1 to Lockhart, III et al., (hereinafter, “Lockhart”) in view of US 20230006845 A1 to Leedom, JR., (hereinafter, “Leedom”). Regarding claim 1, Shmukler teaches an AI learning system comprising: a sorter configured to sort, from among AI learning data, personal information that should be secret when creating a desired AI model, according to prescribed criteria; [Lockhart, para. 11 discloses the system may crawl one or more identified web sites to extract data. The system may process the extracted data, searching the extracted data to identify patterns representing portions of PII data. The scraped data may be provided to an Artificial Intelligence (AI) engine for processing against particular rules to verify PII data or may be elevated to an administrator for review. Para. 14 discloses the compromised PII exchange system and method may be configured to not only search (and crawl) an initially identified set of websites based on an list of URLs (e.g., URLs for websites on the dark web) that have been provided to the system, but also automatically search additional websites identified by URLs detected in the initially identified websites.] an encryptor configured to encrypts the sorted personal information; [Lockhart, para. 39 discloses the compromised identity exchange system may disassociate and encrypt the PII data from an at-risk entity if the at risk entity did not perform the disassociation and may communicate the encrypted data to one or more of the compromised entities in response to the query. The compromised identity exchange system may receive results from the one or more entities in response to the queries where a match was made to a full PII identity or disassociated identity elements.] and an AI learner configured to perform secret calculations on at least the data portion related to encrypted the personal information to learn the AI model, using the stored AI learning data; [Lockhart, para. 13 discloses the memory may be configure to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.] wherein the sorting unit sets the prescribed criteria so as to reduce amount of calculation processing, depending on the degree of increase or decrease in the amount of calculation processing of the secure computation due to encryption of the personal information and the degree to which the personal information should be secret, [Lockhart, para. 39 discloses the compromised identity exchange system may receive results from the one or more entities in response to the queries where a match was made to a full PII identity or disassociated identity elements. Each match returned can include information about the data breach, which may consists of the date of the breach, the size/volume of the breach, a code indicating how the data was lost or stolen, among other attributes. In addition to these attributes, attributes associated with the consumer may also be used to measure risk. These attributes might include the number and severity of data breaches a consumer has been involved with, the location of the consumer, the event, if any, that is triggering the risk assessment, among other things. Additionally, participating at-risk entities' reported fraud data will be used to identify fraud rates within every compromised entity's compromised file, as well as attributes will be generated that reflect location of fraud, fraud linkages to email, physical address, phone number or other identity elements.], but Lockhart does not teach a holder configured to hold the AI learning data including the encrypted personal information in a blockchain. However, Leedom does teach a holder configured to hold the AI learning data including the encrypted personal information in a blockchain. [Leedom, para. 77 discloses The operating systems within each device are designed to aid in authenticating the user including time variable encryption keys generated by each of the paired hardware components to allow secure encryption of the personal data arranged to be stored immutably in the associated personal blockchain or as blocks in a blockchain, serving other users and/or purposes, wherein only the user can enable the personal computer device(s) to grant access to those blocks containing the immutably stored personal data.] Therefore, it would have been obvious to one of ordinary skill within the art before the effective filling date to combine Leedom’s system with Lockhart’s system, with a motivation for user transactions, such as transactions successively enabled over time by the user's smartphone and/or paired smartwatch will generate user data that may be encrypted within blocks of the user's blockchain. The immutably stored personal data will be date stamped and stored in successive blocks of the associated personal blockchain. By creating and storing parts of each encryption key in the respective paired personal computers, the encryption of personal data for storage in the personal blockchain may be undertaken in a way that requires the respective paired personal computers to be in sufficient proximity for the DApp (smartcontract and blockchain) to operate properly. [Leedom, para. 75] As per claim 2, modified Lockhart teaches the AI learning system according to claim 1, wherein the sorting unit sets the prescribed criteria and sorts the personal information by AI learning using the degree of increase/decrease in the amount of calculation processing and the degree to which the personal information should be secret as AI learning data. [Lockhart, para. 39 discloses the compromised identity exchange system may receive results from the one or more entities in response to the queries where a match was made to a full PII identity or disassociated identity elements. Each match returned can include information about the data breach, which may consists of the date of the breach, the size/volume of the breach, a code indicating how the data was lost or stolen, among other attributes. In addition to these attributes, attributes associated with the consumer may also be used to measure risk. These attributes might include the number and severity of data breaches a consumer has been involved with, the location of the consumer, the event, if any, that is triggering the risk assessment, among other things. Additionally, participating at-risk entities' reported fraud data will be used to identify fraud rates within every compromised entity's compromised file, as well as attributes will be generated that reflect location of fraud, fraud linkages to email, physical address, phone number or other identity elements.] Conclusion Pertinent prior art made of record however not relied upon: US 20240089081 A1 to Kushnir et al. “An example system includes a processor to compute a tensor of indicators indicating a presence of partial sums in an encrypted vector of indicators. The processor can also securely reorder an encrypted array based on the computed tensor of indicators to generate a reordered encrypted array.” Any inquiry concerning this communication or earlier communications from the examiner should be directed to Phuc Pham whose telephone number is (571)272-8893. The examiner can normally be reached Monday - Thursday 7:30 AM - 4:30 PM; Friday 8:00 AM - 12:00 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Linglan Edwards can be reached at (571) 270-5440. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /P.P./Patent Examiner, Art Unit 2408 /LINGLAN EDWARDS/Supervisory Patent Examiner, Art Unit 2408
Read full office action

Prosecution Timeline

Nov 07, 2024
Application Filed
Jan 23, 2026
Non-Final Rejection — §103, §DP (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12598201
MULTIFACETED DETECTION OF FRAUDULENT DATA USAGE
2y 5m to grant Granted Apr 07, 2026
Patent 12585305
REMOVABLE COMPUTER FOR AN AIRCRAFT
2y 5m to grant Granted Mar 24, 2026
Patent 12580924
TELEMETRY RESTRICTION MECHANISM
2y 5m to grant Granted Mar 17, 2026
Patent 12562890
METHOD FOR EXCHANGING CRYPTOGRAPHIC KEYS BETWEEN COMMUNICATION SUBSCRIBERS
2y 5m to grant Granted Feb 24, 2026
Patent 12556383
SYSTEMS AND METHODS FOR UTILIZING MACHINE LEARNING MODELS TO GENERATE ENCRYPTION KEYS
2y 5m to grant Granted Feb 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
90%
Grant Probability
99%
With Interview (+19.4%)
2y 9m
Median Time to Grant
Low
PTA Risk
Based on 166 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month