Prosecution Insights
Last updated: April 19, 2026
Application No. 18/950,165

ATTRIBUTE-BASED ENCRYPTION FOR SELECTIVE DOCUMENT CONTENT PROTECTION

Non-Final OA §101§112
Filed
Nov 17, 2024
Examiner
GERGISO, TECHANE
Art Unit
2408
Tech Center
2400 — Computer Networks
Assignee
NTT Data Services Federal Government LLC
OA Round
1 (Non-Final)
84%
Grant Probability
Favorable
1-2
OA Rounds
3y 3m
To Grant
99%
With Interview

Examiner Intelligence

Grants 84% — above average
84%
Career Allow Rate
703 granted / 835 resolved
+26.2% vs TC avg
Strong +24% interview lift
Without
With
+24.2%
Interview Lift
resolved cases with interview
Typical timeline
3y 3m
Avg Prosecution
34 currently pending
Career history
869
Total Applications
across all art units

Statute-Specific Performance

§101
12.8%
-27.2% vs TC avg
§103
55.0%
+15.0% vs TC avg
§102
11.3%
-28.7% vs TC avg
§112
10.9%
-29.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 835 resolved cases

Office Action

§101 §112
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Specification The specification submitted on 11/17/2024 and the drawing submitted on 01/05/2005 has been considered. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 1-20 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Claim 1 recites the limitation “the document” in line 5. Claim 1 recites the limitation “the scope of each annotation” in line 6. Claim 1 recites the limitation “the presence” in line 33. Claim 3 recites the limitation “the sensitivity” in line 6. Claim 3 recites the limitation “the extracted features” in line 6. Claim 4 recites the limitation “the user’s” in line 5. Claim 6 recites the limitation “the text” in line 6. Claim 9 recites the limitation “the scope of each annotation” in line 3. Claim 9 recites the limitation “the encrypted schemes” in line 4. Claim 9 recites the limitation “the presence” in line 33. Claim 12 recites the limitation “the use’s attribute set” in line 2. Claim 16 recites the limitation “the document” in line 5. Claim 16 recites the limitation “the scope of each annotation” in line 6. Claim 16 recites the limitation “the presence” in line 33. There are insufficient antecedent basis for this limitation in the claim. Claims 1, 9 and 16 recite “their associated encryption credential”. Claims 6 and 14 recites ”their attribute credentials”. Claims 3, 11 and 18 recite “its classified sensitivity”. Use of the pronouns “their” and “its” are discouraged because they ambiguously establish improper antecedent basis. The antecedent bases should be referenced with “said” or “The” for clarity. Therefore, claims 1, 9 and 16 are rendered indefinite. Claims 1, 9 and 16 recite “replacing original text content” without linking to the previously recited “original text content” failing to establish a proper antecedent basis. Therefore, claims 1, 9 and 16 rendered indefinite. Claims 1, 9 and 16 should recite “replacing the original text content”. Claims 1, 9 and 16 recite “an attribute-based encryption scheme” without linking to the previously recited “attribute-based encryption scheme” failing to establish a proper antecedent basis. Therefore, claim 1 rendered indefinite. Claim 1 should recites “the attribute-based encryption scheme”. Dependent claims 2-8 , 10-15 and 17-20 failed to remedy the above deficiencies of their respective independent claims and therefore they are rendered indefinite. Therefore, claims 1-20 are rejected under 35 U.S.C. 112(b) as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor regards as the invention. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 9-15 are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-statutory subject matter. The claim(s) does/do not fall within at least one of the four categories of patent eligible subject matter because claim 9 calls for a system for securing document content. However, limitations of claim 9 failed to recite a device or an apparatus for the system claim to be a machine category. A document security manager is not a process, a machine, a manufacture or a composition of matter for claim 9 to be an eligible statutory subject matter. Dependent claims 10-15 failed to remedy the deficiencies of the independent claim 9. Therefore, claims 9-15 are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-statutory subject matter. Allowable Subject Matter Claims 1-20 are allowable. The following is an examiner’s statement of reasons for allowance: After consideration of the applicant’s correspondence filed on November 17, 2024 through examination of the application, claims, and conducted search, the pertinent prior arts of record, either taken alone or in combination neither anticipates nor renders obvious the claimed subject matter of the instant application when taken as a whole and therefore claims 1-20 having the following features have been found could be in condition for allowance, based on condition after resolving any outstanding objections or rejections provided in this Office Action Correspondence. In claims 1, 9 and 14: processing an original text content of a document to identify text content portions by: parsing the document to locate in-line text annotations, analyzing proximate text to determine scope of each annotation, extracting text content within the determined scope, and determining encryption attributes for an attribute-based encryption scheme based on the in-line text annotations; detecting user-defined selections of image regions through a graphical interface, or employing a trained neural network to automatically identify and classify sensitive objects within the images; generating one or more encrypt content requests that includes the identified text portions with their associated encryption attributes, the identified image portions with corresponding bounding box coordinates, and metadata specifying the encryption schemes to be applied; receiving, from the cryptographic engine, encrypted text content for the text portions and encrypted image content for the image portions, applying an attribute-based encryption scheme to the text portions and image portions; and building a partially encrypted document by: replacing original text content with masking symbols, adjusting the masking symbol width to maintain document layout and formatting, applying visual obfuscation techniques to the original image content based on sensitivity levels, embedding the encrypted text and image content as metadata within the document structure, and updating document properties to indicate the presence of encrypted content. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Eldefrawy et al. (US 20220052835 A1) describes a system for selectively sharing of portion of unstructured data containers/documents based on security attributes or policies used to encrypt/decrypt data within the unstructured data containers using standard encryption schemes The system includes a key generation authority to generate encryption keys based on a selected cryptographic security scheme and one or more security attributes or security policies; an encryption service to selectively encrypt one or more data subgroups using the one or more public keys and based on one or more security attributes or security policies assigned to the one or more data subgroups with the unstructured data containers; and a decryption service to decrypt the one or more data subgroups within unstructured data containers using the one or more secret keys and the one or more public keys. However, the prior art Eldefrawy, does not disclose specific limitation features of claims 1, 9 and 14 described above. De Gaspari (US 20190297063 A1) discusses an infrastructure-as-a-service (IaaS) and an IaaS node that encrypts content with first encryption using a first key and second encryption using a second key, to produce twice encrypted content. A producer encrypts the second key with attribute-based encryption and symmetric encryption using an IaaS key, to produce a twice encrypted second key. The producer provides to the user application the twice encrypted content, the twice encrypted second key, and key information configured to remove the first encryption from the twice encrypted content. The producer provides to the IaaS node the IaaS key to enable the IaaS node to remove the symmetric encryption from the twice encrypted second key, such that the user application and the IaaS node are constrained to exchange with each other key-related information and intermediate decryption results in order to recover the content. However, the prior art De Gaspari, does not disclose specific limitation features of claims 1, 9 and 14 described above. Seaborn et al. (US 20240275584 A1) provides mechanisms for computing resource access security in which a credential of a user agent is authenticated to determine if the user agent is associated with an entity for which an attribute based encryption (ABE) key is to be generated. An ABE key is generated and provided which corresponds to a set of attributes of the entity. Token issuance logic receives a token request and the ABE key from a relying party computing device and executes a decryption operation on locking metadata associated with at least one attribute value based on the ABE key. The token issuance logic, in response to the decryption operation successfully decrypting the locking metadata, issues a generated token to the relying party computing device based on the at least one attribute value. The relying party computing device accesses the computing resources using the generated token. However, the prior art Seaborn et al., does not disclose specific limitation features of claims 1, 9 and 14 described above. Contact Information Any inquiry concerning this communication or earlier communications from the examiner should be directed to TECHANE GERGISO whose telephone number is (571)272-3784. The examiner can normally be reached 9:30am to 6:30pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, LINGLAN EDWARDS can be reached at (571) 270-5440. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /TECHANE GERGISO/ Primary Examiner, Art Unit 2408
Read full office action

Prosecution Timeline

Nov 17, 2024
Application Filed
Feb 21, 2026
Non-Final Rejection — §101, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12587379
COMPUTER-BASED SYSTEMS CONFIGURED TO GENERATE A PLURALITY OF TIME-BASED DIGITAL VERIFICATION CODES AND METHODS OF USE THEREOF
2y 5m to grant Granted Mar 24, 2026
Patent 12567966
ENDPOINT VALIDATION SECURITY
2y 5m to grant Granted Mar 03, 2026
Patent 12537669
IDENTITY AUTHENTICATION METHOD AND APPARATUS, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT
2y 5m to grant Granted Jan 27, 2026
Patent 12536266
SYSTEMS AND METHODS FOR CONTENT SELECTIONS FOR SECURING COMMUNICATIONS BETWEEN AGENT DEVICES AND USER DEVICES
2y 5m to grant Granted Jan 27, 2026
Patent 12531739
TECHNIQUES FOR PHISHING-RESISTANT ENROLLMENT AND ON-DEVICE AUTHENTICATION
2y 5m to grant Granted Jan 20, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
84%
Grant Probability
99%
With Interview (+24.2%)
3y 3m
Median Time to Grant
Low
PTA Risk
Based on 835 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month