Prosecution Insights
Last updated: April 19, 2026
Application No. 18/953,504

System, Method, and Computer Program Product for Determining a Pseudo-Identity Score in a Virtual Environment Based on a Blockchain Network

Non-Final OA §103
Filed
Nov 20, 2024
Examiner
COBB, MATTHEW
Art Unit
3661
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
VISA INTERNATIONAL SERVICE ASSOCIATION
OA Round
1 (Non-Final)
72%
Grant Probability
Favorable
1-2
OA Rounds
2y 5m
To Grant
99%
With Interview

Examiner Intelligence

Grants 72% — above average
72%
Career Allow Rate
142 granted / 198 resolved
+19.7% vs TC avg
Strong +36% interview lift
Without
With
+36.2%
Interview Lift
resolved cases with interview
Typical timeline
2y 5m
Avg Prosecution
33 currently pending
Career history
231
Total Applications
across all art units

Statute-Specific Performance

§101
29.5%
-10.5% vs TC avg
§103
40.9%
+0.9% vs TC avg
§102
9.6%
-30.4% vs TC avg
§112
11.0%
-29.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 198 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Information Disclosure Statement The information disclosure statements (IDS) submitted on 01/15/2025 and 05/28/2025 is are in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statements have been considered by the examiner. Status of Claims This Office action is in reply to filing by applicant on 11/20/2024. Claims 1 – 20 are currently pending and have been examined. THIS ACTION IS MADE NON-FINAL Examiner Note Regarding 35 USC 101, the claims herein accomplish the processing of a transaction, which amounts to a practical application whether or not any abstract idea may be present in the claims. Claim Rejections – 35 USC 103 In the event the determination of the status of the application as subject to AIA 35 USC 102 and 103 is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 USC 103 which forms the basis for all obviousness rejections set forth in this Office Action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 USC 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1, 6 – 9, and 14 – 17 are rejected pursuant to 35 USC 103 as being unpatentable over Caldera (US20190122149A1) in view of Vishal (US20170364920A1). Regarding claims 1, 9, and 17: Caldera discloses: A system comprising: at least one processor programmed or configured to: identify a pseudo-identity in a virtual environment, the pseudo- identity controlled by a user; In light of the disclosure, the claim term “virtual” is neither defined nor otherwise distinguished from its normal usage, which here is taken by examiner to include the meaning that the word “virtual” preceding any other claimed thing (“environment”, “bank”, “payment device”, see claims herein) denotes that said thing does not necessarily physically exist, that said … (“In FIG. 2, the device (120) includes memory (160) storing software (161), at least one network interface (143) to communicate via a network (100), one or more microprocessors (145) to execute the software (161) stored in the memory (160).”, [055]) and (“The anonymous network (231) and pseudonymous network (233) generally provide enhanced privacy protections for their users by allowing various degrees of anonymity in activities on their network.”, [099]) and (“Further, in some computer systems, authentication credentials may not be connected to the real identities of the users as known in the society. In some systems, the lack of association between the authentication credentials and the real user identities is intentional to allow anonymous access and/or pseudonymous access.”, [008]); the pseudo-identity score based on a plurality of parameters including a measure of activity of the pseudo-identity in the virtual environment; (“Scoring is accumulated based on whether the new data elements match the data elements of the original graph. Data elements may include, but are not limited to, examples such as these: Payment method—same name of person? Social security number associated with payment method—same number? Same billing address? Same shipping address? Many factors may be considered, depending on availability of data. Note that each sublist 1-n may contain a different number of data elements, but the score per element may be the same.”, [0305]) and (“The anonymous network (231) and pseudonymous network (233) generally provide enhanced privacy protections for their users by allowing various degrees of anonymity in activities on their network,”, [099]), scoring is based on past user measured activity; issue the virtual payment device to the pseudo-identity Examiner interprets this limitation broadly to include the meaning that the pseudo-entity is now authorized to make a payment inuring from the paying entity using the virtual device … (“For example, the access may allow the user to run an application, consume information/data, transmit a message to another user, make an asset exchange/trade, and/or make or receive a payment, etc.”, [046]) and (“The peer to peer network may be configured to allow anonymous access and/or pseudonymous access. Through correlation/connection of data elements of contextual information of accesses made on the anonymous/pseudonymous network(s) and respective data elements of contextual information of accesses made on other networks, the user authentication capability of the controller (101) can be improved.”, [052]); the virtual payment device configured to transact with merchants in the virtual environment; and (“For example, the user device (120) may access the computing site (110) using an access token to sign in the computing site (110), send a message to another user or make an exchange with another user via the computing site (110), or make a payment transaction with the merchant operating the computing site (110) using an account or a payment instrument.”, [0179]); Caldera does not expressly disclose, but Vishal teaches: receive a request for a virtual payment device via an interaction between the pseudo-identity and a virtual bank in the virtual environment; (“The virtual reality hardware 104 may include a processor, memory, input/output devices, and a computer readable medium coupled to the processor.”, [062]) and (“An “authorization response message” may be a message that responds to an authorization request. In some cases, it may be an electronic message reply to an authorization request message generated by an issuing financial institution or a transaction processing computer. The authorization response message may include, by way of example only, one or more of the following status indicators: Approval—transaction was approved; Decline—transaction was not approved; or Call Center—response pending more information, … The authorization response message may also include an authorization code, which may be a code that a credit card issuing bank returns in response to an authorization request message in an electronic message (either directly or through the transaction processing computer) to the merchant's access device (e.g. POS equipment) that indicates approval of the transaction. The code may serve as proof of authorization.”, [050]) and (“In some embodiments, receiving the indication that the avatar of the user has initiated the transaction in the virtual reality environment includes presentation by the avatar of a unique identifier to a resource provider in the virtual reality environment. In some embodiments, the unique identifier includes a barcode or a representation of an access device in the virtual reality environment.”, [010]); determine, with a pseudo-identity service, a pseudo-identity score for the pseudo-identity based on a query from the virtual bank, (“The authentication service may utilize risk profiles compiled from previous comparisons of incomplete sets of eigenvalues from a plurality of transactions to identify the risk of a current transaction before authenticating the transaction.”, [025]) and (“The machine learning algorithm may utilize the submitted samples and maintained templates to generate a risk score that can be compared to a threshold value for determining whether to authenticate the transaction. Multiple variations of comparing the risk score to the threshold values may be suitable for determining authentication of a user for the transaction in the current disclosure. For example, a transaction may be determined to be authenticated if the risk score exceeds the threshold, exceeds the threshold by a certain amount, is within a certain range of the threshold, etc.”, [058]) and (“In some embodiments, the process 400 may include the resource provider computer 110 providing a prompt or request to the virtual reality hardware 104 that queries the avatar of the user within the virtual reality environment to confirm the transaction at 432 in response to receiving the authorization response message.”, [085]); process a transaction between the pseudo-identity and a merchant in the virtual environment using the virtual payment device. (“In some embodiments, the computer-implemented method further comprises providing a transaction code to the avatar of the user to complete the transaction in response to providing the authentication response message to the resource provider.”, [009]). It would have been obvious to one of ordinary skill in the art before the effective filing date of this application to have modified Caldera to incorporate the teachings of Vishal because Caldera would be more efficient and secure should it use risk scores to help determine the likelihood of whether a transaction was proper as done in Vishal ("The machine learning algorithm may utilize the submitted samples and maintained templates to generate a risk score that can be compared to a threshold value for determining whether to authenticate the transaction. Multiple variations of comparing the risk score to the threshold values may be suitable for determining authentication of a user for the transaction in the current disclosure.”, see [058]) of Vishal. Regarding claims 6 and 14: The combination of Caldera and Vishal discloses the limitations of claims 1 and 9, Vishal further teaches: wherein the virtual payment device is linked to a physical payment device. (“Users conducting transactions may be subject to certain security vulnerabilities such as the sharing and proliferation of personal information and/or financial information such as credit card numbers or bank account information.”, [002]). It would have been obvious to one of ordinary skill in the art before the effective filing date of this application to have modified Caldera to incorporate the teachings of Vishal because Caldera would be more efficient and secure should it use risk scores to help determine the likelihood of whether a transaction was proper as done in Vishal ("The machine learning algorithm may utilize the submitted samples and maintained templates to generate a risk score that can be compared to a threshold value for determining whether to authenticate the transaction. Multiple variations of comparing the risk score to the threshold values may be suitable for determining authentication of a user for the transaction in the current disclosure.”, see [058]) of Vishal. Regarding claims 7 and 15: The combination of Caldera and Vishal discloses the limitations of claims 1 and 9, Vishal further teaches: wherein the virtual payment device is a wallet associated with a cryptocurrency balance. (“In some embodiments, an access credential may include payment account information or a token associated with the payment account information, a cryptogram, a digital certificate, etc. A “transaction code” may be an example of an access credential.”, [040) and (“Other information may be provided during the enrollment process to the authentication computer 114 such as account information, credit card numbers, bank account numbers, digital wallet references, other suitable information such as personal authentication information,”, [057]). It would have been obvious to one of ordinary skill in the art before the effective filing date of this application to have modified Caldera to incorporate the teachings of Vishal because Caldera would be more efficient and secure should it use risk scores to help determine the likelihood of whether a transaction was proper as done in Vishal ("The machine learning algorithm may utilize the submitted samples and maintained templates to generate a risk score that can be compared to a threshold value for determining whether to authenticate the transaction. Multiple variations of comparing the risk score to the threshold values may be suitable for determining authentication of a user for the transaction in the current disclosure.”, see [058]) of Vishal. Regarding claims 8 and 16: The combination of Caldera and Vishal discloses the limitations of claims 1 and 9, Caldera further teaches: wherein the virtual payment device is issued to the pseudo-identity in response to the pseudo-identity score satisfying a threshold. (“For example, the access may allow the user to run an application, consume information/data, transmit a message to another user, make an asset exchange/trade, and/or make or receive a payment, etc.”, [046]) and (“The peer to peer network may be configured to allow anonymous access and/or pseudonymous access. Through correlation/connection of data elements of contextual information of accesses made on the anonymous/pseudonymous network(s) and respective data elements of contextual information of accesses made on other networks, the user authentication capability of the controller (101) can be improved.”, [052]). Allowable Subject Matter Claims 2 – 5, 10 – 13, and 18 – 20 would be allowable if rewritten or amended to be in an independent claim form. The following is a statement of reasons for the indication of allowable subject matter: Independently, while the claims' limitations most recently set forth herein may individually be disclosed by the prior art, the claims as a whole are not obvious because the examiner would have to improperly use their separate limitations as a road map to combine them. CONCLUSION The following prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Please see attached form 892. Nandakumar (US10819503B2) - An example operation may include one or more of joining, by a host device, a blockchain managed by one or more devices on a decentralized network, the blockchain is configured to use one or more smart contracts that specify transactions among a plurality of end-users, creating on the blockchain the smart contract defining authentication parameters for an authentication of an end-user from the plurality of the end-users, executing the smart contract to perform the authentication of the end-user associated with a transaction based on the authentication parameters by generating an authentication challenge for the transaction, and recording an authentication log produced by the authentication challenge into a metadata of a transaction payload for analytics. Castagna (US11146535B2) – Embodiments of the present invention provide a system for expediting validation and authorization of transactions between end points. Embodiments of the invention utilize a private blockchain to control transaction workflow amongst compute nodes, provide automatic authorization of transactions in the workflow, and provide efficient record-keeping functions within the virtual ledgers in an upstream and a downstream application. By using a private distributed ledger in this manner, the system addresses the computer networking-centric challenge of processing transactions in a secure and efficient manner; avoiding desynchronization of data as well as preventing the need for authorization and confirmation requests amongst the nodes greatly reduces the amount of computing resources required to process transactions, including, but not limited to, processing power, memory space, storage space, cache space, electric power, networking bandwidth, and I/O calls. Any inquiry concerning this communication or earlier communications from the examiner should be directed to MATTHEW COBB whose telephone number is (571) 272-3850. The examiner can normally be reached 9 - 5, M - F. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to call examiner Cobb as above, or to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Peter Nolan, can be reached at (571) 270-7016. The fax phone number for the organization where this application or proceeding is assigned is (571) 273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at (866) 217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call (800) 786-9199 (IN USA OR CANADA) or (571) 272-1000. /MATTHEW COBB/Examiner, Art Unit 3661 /PETER D NOLAN/Supervisory Patent Examiner, Art Unit 3661
Read full office action

Prosecution Timeline

Nov 20, 2024
Application Filed
Jan 28, 2026
Non-Final Rejection — §103
Apr 01, 2026
Examiner Interview Summary
Apr 01, 2026
Applicant Interview (Telephonic)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602728
CONNECTED HOME SYSTEM WITH RISK UNITS
2y 5m to grant Granted Apr 14, 2026
Patent 12597010
Machine Learning Model for Combining Device Presence Data with Physical Venue Transaction Data
2y 5m to grant Granted Apr 07, 2026
Patent 12586073
Controlling Transactions on a Network
2y 5m to grant Granted Mar 24, 2026
Patent 12586045
PAYMENT PROCESSING METHOD AND APPARATUS USING AN INTERMEDIARY PLATFORM
2y 5m to grant Granted Mar 24, 2026
Patent 12583361
BATTERY TEMPERATURE CONTROL METHOD AND BATTERY TEMPERATURE CONTROL SYSTEM
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
72%
Grant Probability
99%
With Interview (+36.2%)
2y 5m
Median Time to Grant
Low
PTA Risk
Based on 198 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month