Prosecution Insights
Last updated: April 19, 2026
Application No. 18/942,069

SYSTEM AND METHOD FOR IDENTIFICATION, AUTHENTICATION, AND VERIFICATION OF A PERSON BASED UPON A SHORT AUDIO-VISUAL RECORDING OF THE PERSON

Non-Final OA §103
Filed
Nov 08, 2024
Examiner
GUNDRY, STEPHEN T
Art Unit
2435
Tech Center
2400 — Computer Networks
Assignee
UNIVERSITY OF WEST BOHEMIA IN PILSEN
OA Round
1 (Non-Final)
92%
Grant Probability
Favorable
1-2
OA Rounds
2y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 92% — above average
92%
Career Allow Rate
540 granted / 587 resolved
+34.0% vs TC avg
Moderate +8% lift
Without
With
+8.5%
Interview Lift
resolved cases with interview
Typical timeline
2y 2m
Avg Prosecution
23 currently pending
Career history
610
Total Applications
across all art units

Statute-Specific Performance

§101
14.1%
-25.9% vs TC avg
§103
41.7%
+1.7% vs TC avg
§102
7.3%
-32.7% vs TC avg
§112
16.0%
-24.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 587 resolved cases

Office Action

§103
DETAILED ACTION This office action is in response to the application filed on 11/8/2024. Claim(s) 1-3 is/are pending and are examined. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Priority/Benefit Applicant’s priority claim is hereby acknowledged of PRO 63/601,118 11/20/2023, which papers have been placed of record in the file. Examiner’s Note – Oath The oath has not been filed. Claim Objections Claim(s) 3 is/are objected to because of the following informalities: The examiner suggests the following corrections:Claim 3: Insertion of a period. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1 is/are rejected under 35 U.S.C. 103 as being unpatentable over Wyss (US 2021/0320801 A1), in view of Alattar (US 2024/0362738 A1). Regarding claim 1, Wyss teaches: “A method for the computation of a cryptographic hash, the method comprising: detecting and localizing a person’s face in an input image sequence (Wyss, ¶ 37, 41, 43 and 45 teach facial recognition being applied to a live feed of a person’s face); detecting the person’s voice in an input (Wyss, ¶ 36, 39, 41, 43 and 45 teaches detecting a person’s voice in a live feed); transforming the detected person’s face into a partial fingerprint (Wyss, ¶ 37, 39, 43, 49, and 53 teaches taking the sequence of images and performing facial analysis to determine components of the face for the various images in the sequence); transforming the detected person’s voice into a partial fingerprint (Wyss, ¶ 36, 39, 43, 50 and 52 teaches capturing the voice and voice printing the portions of the temporal recording of the voice); and comparing partial face fingerprints and partial voice fingerprints by computing a similarity measure (Wysss, ¶ 47-53 teaches bimodal recognition that utilizes fingerprint information from audio and video to arrive at a confidence level greater than a threshold, thus authenticating the information)”. Wyss does not, but in related art Alattar teaches detecting in an “input media file (Alattar, ¶ 22-23, 44-45, 47-48 teaches processing the audio track of a multimedia file)”; comparing two complete hashes (Alattar, ¶ 47-50, teaches hashing the audio and video of a video and comparing to verified signatures to determine authenticity). Before applicant’s earliest effective filing it would have been obvious to one of ordinary skill in the art, having the teachings of Wyss and Alattar, to modify the audio/video authentication system of Wyss to include the method of authenticating media files using hashing of audio and video as taught in Alattar. The motivation to do so would be, as stated by Alattar, ¶ 50-51 would be to prevent deep fakes. Further, the motivation constitutes applying a known technique to known devices and/or methods ready for improvement to yield predictable results. Claim(s) 2 is/are rejected under 35 U.S.C. 103 as being unpatentable over Wyss in view of Alattar in view of Ra (US 2020/0211162 A1). Regarding claim 2, Wyss and Alattar teaches: “The method of claim 1 (Wyss and Alattar teaches the limitations of the parent claims as discussed above). Wyss and Alattar do not, but in related art, Ra teaches: “wherein detecting and localizing a person’s face in an input image sequence includes computation of an averaged facial representation of the person’s face (Ra, ¶ 30 teaches using a model which converted a face into a representation based on the average face characteristics over several frames)”. Before applicant’s earliest effective filing it would have been obvious to one of ordinary skill in the art, having the teachings of Wyss, Alattar, and Ra, to modify the audio/video authentication system of Wyss and Alattar to include the method of averaging facial traits as taught in Goel. The motivation to do so constitutes applying a known technique to known devices and/or methods ready for improvement to yield predictable results. Claim(s) 3 is/are rejected under 35 U.S.C. 103 as being unpatentable over Wyss in view of Alattar in view of Goel (US 2025/0005123 A1). Regarding claim 3, Wyss and Alattar teaches: “The method of claim 1 (Wyss and Alattar teaches the limitations of the parent claims as discussed above). Wyss and Alattar do not, but in related art, Goel teaches: “wherein detecting the person’s voice in an input multimedia file includes computation of an averaged voice representation of the person’s voice (Goel, ¶ 12 and 22 teaches using a model which converted a voice into a representation based on the average voice characteristics)”. Before applicant’s earliest effective filing it would have been obvious to one of ordinary skill in the art, having the teachings of Wyss, Alattar, and Goel, to modify the audio/video authentication system of Wyss and Alattar to include the method of averaging voice traits as taught in Goel. The motivation to do so constitutes applying a known technique to known devices and/or methods ready for improvement to yield predictable results. Conclusion In the case of amending the claimed invention, Applicant is respectfully requested to indicate the portion(s) of the specification which dictate(s) the structure relied on for proper interpretation and also to verify and ascertain the metes and bounds of the claimed invention. The prior art made of record and not relied upon is considered pertinent to applicant’s disclosure: See PTO-892. Any inquiry concerning this communication or earlier communications from the examiner should be directed to Stephen T Gundry whose telephone number is (571) 270-0507. The examiner can normally be reached Monday-Friday 9AM-5PM (EST). Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Joseph Hirl can be reached on (571) 272-3685. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /STEPHEN T GUNDRY/Primary Examiner, Art Unit 2435
Read full office action

Prosecution Timeline

Nov 08, 2024
Application Filed
Jan 24, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12596841
ANONYMIZING PERSONAL INFORMATION FOR USE IN ASSESSING FRAUD RISK
2y 5m to grant Granted Apr 07, 2026
Patent 12591667
Detecting and mitigating application security threats based on threat change patterns
2y 5m to grant Granted Mar 31, 2026
Patent 12592825
METHODS AND SYSTEMS OF FACILITATING AUTHENTICATION FOR ACCESSING A SERVICE
2y 5m to grant Granted Mar 31, 2026
Patent 12580943
SYSTEMS AND METHODS FOR NETWORK RESILIENCY
2y 5m to grant Granted Mar 17, 2026
Patent 12579309
ANONYMIZATION APPARATUS
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
92%
Grant Probability
99%
With Interview (+8.5%)
2y 2m
Median Time to Grant
Low
PTA Risk
Based on 587 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month