Prosecution Insights
Last updated: April 19, 2026
Application No. 18/956,848

Data Asset Graph Management Method and Related Device

Final Rejection §101§103
Filed
Nov 22, 2024
Examiner
CAIADO, ANTONIO J
Art Unit
2164
Tech Center
2100 — Computer Architecture & Software
Assignee
Huawei Cloud Computing Technologies Co. Ltd.
OA Round
2 (Final)
69%
Grant Probability
Favorable
3-4
OA Rounds
3y 4m
To Grant
99%
With Interview

Examiner Intelligence

Grants 69% — above average
69%
Career Allow Rate
130 granted / 188 resolved
+14.1% vs TC avg
Strong +50% interview lift
Without
With
+49.9%
Interview Lift
resolved cases with interview
Typical timeline
3y 4m
Avg Prosecution
23 currently pending
Career history
211
Total Applications
across all art units

Statute-Specific Performance

§101
30.1%
-9.9% vs TC avg
§103
50.5%
+10.5% vs TC avg
§102
3.9%
-36.1% vs TC avg
§112
13.0%
-27.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 188 resolved cases

Office Action

§101 §103
DETAILED ACTION 1. Claims 1-6, 8-17 and 19-22 are pending in this application. Notice of Pre-AIA or AIA Status 2. The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . In the event the determination of the status of the application as subject to AIA 35 U.S.C. §102 and §103 (or as subject to pre-AIA 35 U.S.C. §102 and §103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. Information Disclosure Statement 3. The information disclosure statement filed 08/07/2025 is in compliance with the provisions of 37 CFR 1.97, 1.98 and MPEP § 609. It has been placed in the application file and the information referred to therein has been considered as to the merits. Response to Amendment 4. This office action is in response to applicant’s amendment filed on 10/24/2025 in response to the non-final rection mailed on 07/25/2025. Claims 1-6, 10, 12-17 and 20 have been amended. Claims 21-22 have been newly introduced. Claims 7 and 18 have been cancelled. Claims 8-9, 11, and 19 have been previously presented. Amendment has been entered. Response to Arguments 5. Applicant's arguments, filed on 10/24/2025, with respect to the rejection of claims 1-6, 8-17 and 19-22 under 35 U.S.C. §101 an abstract idea (mental process) (Applicant’s arguments, pages 11-12), have been fully considered but are not persuasive. Respectfully, the examiner disagrees, see the clarification below. The applicant argues that the claims were amended to include a management system; therefore, the claims are no longer an abstract mental process. However, simply amending the claims to include a management system does not overcome the abstract idea rejection. An abstract idea does not become nonabstract by limiting the invention to a particular field of use or technological environment, see MPEP 2106(I). Using a management system to manage a data asset graph is an example of limiting the invention to a particular field of use or technological environment. The applicant argues that the claims, when implemented, reduce the user's blind choices and improve the efficiency of their exploration and analysis of the data asset graph. However, the claims do not include steps disclosing such improvements. The claim must be evaluated to ensure the claim itself reflects the disclosed improvement in technology, see MPEP 2106.05(a). The applicant seems to argue for a solution related to managing assets using a graph; however, the claims fail to disclose in detail how that solution is accomplished, see MPEP 2106.05(f)(1) – “Whether the claim recites only the idea of a solution or outcome i.e., the claim fails to recite details of how a solution to a problem is accomplished.”. Therefore, none of the amendments introduced by the applicant have changed the rejection. The amendments seem more like mere instructions to implement the abstract idea using a management system. They also do not show how the system would even improve the claimed management system. For all the above reasons, claims 1–6, 8–17, and 19–22 continue to be rejected under 35 U.S.C. § 101 as being directed to an abstract idea (specifically, a mental process). Applicant's arguments, filed on 10/24/2025, with respect to the rejection of claims 1-6, 8-17 and 19-22 under 35 U.S.C. §103 (Applicant’s arguments, pages 12-17), have been fully considered and are but are moot because the independent claims are amended and introduce new limitations that were not previously presented newly found prior art has been applied. Claim Rejections - 35 USC § 101 6. 35 U.S.C. §101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-6, 8-17 and 19-22 are rejected under 35 U.S.C. §101 because the claimed invention is directed to an abstract idea (Mental Process) without significantly more. The claims similarly outline steps for data asset graph management. The following is an analysis based on 2019 Revised Patent Subject Matter Eligibility Guidance (2019 PEG). Step 1, Statutory Category? Claims 1-6 and 7-11 are directed to a method. Claims 12-17 and 19 are directed to a computing device. Claims 20-22 are directed to a computer program product. Therefore, claims 1-6, 8-17 and 19-22 fall into at least one of the four statutory categories. Step 2A, Prong I: Judicial Exception Recited? The examiner submits that the foregoing claim limitations constitute a “Mental Process”, as the claims cover performance of the limitations in the human mind, given the broadest reasonable interpretation. As per claims 1, 12 and 20, the claims similarly recite the limitations of: “obtaining a data asset graph corresponding to the first keyword, wherein the data asset graph is stored in the management system and comprises nodes representing asset entities of a data asset and edges representing association relationships between the asset entities;” A human can mentally visualize a graph representing data assets. The wherein the data asset graph is stored in the management system and comprises nodes representing asset entities of a data asset and edges representing association relationships between the asset entities is merely instructions used to implement the abstract idea. There is nothing so complex in the limitation that could not be doing in the human mind. “determining recommended exploration information for the data asset graph based on an impact factor of the data asset graph, wherein the impact factor is used to evaluate importance of a node or an edge, and wherein the recommended exploration information comprises a recommended exploration start node in the data asset graph;” A human can observe information and make recommendations based on judgments of the observed information. The impact factor of the data asset graph is merely an element used to implement the abstract idea. The wherein the impact factor is used to evaluate importance of a node or an edge is merely instructions used to implement the abstract idea. The wherein the recommended exploration information comprises a recommended exploration start node in the data asset graph is merely instructions used to implement the abstract idea. There is nothing so complex in the limitation that could not be doing in the human mind. As per dependent claims 2, 13 and 21, the claims recite the limitation of: “wherein the recommended exploration information further comprises a recommended edge, or a recommended exploration target node, wherein the recommended edge comprises a potential extended edge of a first node selected by the user from the recommended exploration start node, and wherein the recommended exploration target node comprises a node through which a path on which a second node selected by the user from the recommended exploration start node is a start node passes.” The recommended exploration start node, recommended edge, and recommended exploration target node are merely components used to implement the mental steps recited in claims 1 and 12. The wherein the recommended edge comprises a potential extended edge of a first node selected by the user from the recommended exploration start node is merely instructions used to implement the mental steps recited in claims 1 and 12. The wherein the recommended exploration target node comprises a node through which a path on which a second node selected by the user from the recommended exploration start node is a start node passes is merely instructions used to implement the mental steps recited in claims 1 and 12. As per dependent claims 5 and 16, the claims recite the limitation of: “wherein determining the recommended exploration information based on the impact factor of the data asset graph comprises at least one of: sorting the nodes in the data asset graph based on the impact factor and determining a first n1 nodes as the recommended exploration start node; sorting potential extended edges of the first node based on the impact factor and determining a first n2 potential extended edges as the recommended edge; or sorting nodes along paths starting from the second node based on the impact factor and determining a first n3 nodes as the recommended exploration target node..” A human can observe data describing impact factors, judge that data, and rank the results. For example, a researcher who observes how many times a scientific paper has been cited, judges the quality of those citations, and then ranks the papers by their importance. There is nothing so complex in the limitation that could not be doing in the human mind. As per dependent claims 6 and 17, the claims recite the limitation of: “wherein the impact factor comprises a structure, feature for determining structure importance of the node and the edge in the data asset graph; a service, feature for determining service importance of the node and the edge in the data asset graph; or historical experience of the user for the data asset graph, wherein the historical experience comprises an interactive exploration experience of the user for the data asset graph in a historical period.” The structure, feature for determining structure importance of the node and the edge in the data asset graph; a service, feature for determining service importance of the node and the edge in the data asset graph; or historical experience of the user for the data asset graph, wherein the historical experience comprises an interactive exploration experience of the user for the data asset graph in a historical period are merely components and instructions used to implement the mental steps recited in claims 1 and 12. As per dependent claims 9 and 19, the claims recite the limitation of: “wherein the feedback comprises selection or rejection of the user for the recommended exploration information.” A human can observe data that represent user feedback and mentally select or not select the data for further analysis. There is nothing so complex in the limitation that could not be doing in the human mind. As per dependent claim 10, the claim recites the limitation of: “generating, in response to a selection operation from the user on an intent asset in the intent asset list, the data asset graph corresponding to the intent asset.” A human can mentally choose a procedure to be applied to a plurality of data. There is nothing so complex in the limitation that could not be doing in the human mind. Accordingly, claims 1-6, 8-17 and 19-22 recite at least one abstract idea. Step 2A, Prong II: Integrated into a Practical Application? The claims recite the following additional limitations/elements: As per claims 1, 12 and 20, the claims recite the additional limitation of: “presenting the recommended exploration information to a user to guide the user to explore the data asset graph.” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. As per dependent claims 3, 14 and 22, the claims recite the limitations of: “wherein presenting the recommended exploration information comprises at least one of: displaying the recommended exploration start node on the graph display interface when the user triggers a recommendation control on the graph display interface; displaying the recommended edge on the graph display interface when the user selects the first node and triggers an edge recommendation operation on the graph display interface; or displaying the recommended exploration target node on the graph display interface when the user triggers a target recommendation operation on the graph display interface.” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. As per dependent claims 4 and 15, the claims recite the limitation of: “further comprising: receiving a selection of the user for a third node from the recommended exploration target node;” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplifies mere data gathering, without any further processing or analysis. “displaying, on the graph display interface, an exploration path in which the second node is used as the start node and the third node is used as a target node.” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplifies mere data gathering and transmission, without any further processing or analysis. As per dependent claims 8 and 19, the claims recite the limitations of: “receiving a feedback of the user on the recommended exploration information; This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. “updating a recommendation parameter based on the feedback.” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. As per dependent claim 10, the claim recites the limitations of: “further comprising: receiving a second keyword input by the user in the search box of the search interface;” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. “obtaining an intent asset list, based on the second keyword, from the data asset managed by the management system, wherein the intent asset list includes a unique identifier of the data asset that matches the second keyword;” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. “displaying the intent asset list to the user through the search interface;” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. As per dependent claim 11, the claim recites the limitations of: “receiving an extended edge from the user;” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. “updating the data asset graph based on the extended edge.” This limitation is example of adding insignificant extra-solution activity to the judicial exception (see MPEP § 2106.05(g)). Specifically, the additional limitation exemplify mere data gathering and transmission, without any further processing or analysis. As per claims 12, the claim recites the additional elements of: “a computing device cluster, at least one computing device, a memory, and one or more processors.” This element is example of mere instruction to implement an abstract idea on a computer, or merely using a computer as a tool to perform an abstract idea (see MPEP § 2106.05(f)). Specifically, the additional elements of the limitations invoke computers or other machinery merely as a tool to perform an existing process. Use of a computer or other machinery in its ordinary capacity for economic or other tasks (e.g., to receive, store, or transmit data) or simply adding a general-purpose computer or computer components after the fact to an abstract idea (e.g., a fundamental economic practice or mathematical equation) do not provide improvements to the functioning of a computer or to any other technology or technical field; and do not integrate a judicial exception into a practical application. As per claims 20, the claim recites the additional elements of: “a non-transitory computer-readable medium, a one or more processors, and a computing device cluster.” This element is example of mere instruction to implement an abstract idea on a computer, or merely using a computer as a tool to perform an abstract idea (see MPEP § 2106.05(f)). Specifically, the additional elements of the limitations invoke computers or other machinery merely as a tool to perform an existing process. Use of a computer or other machinery in its ordinary capacity for economic or other tasks (e.g., to receive, store, or transmit data) or simply adding a general-purpose computer or computer components after the fact to an abstract idea (e.g., a fundamental economic practice or mathematical equation) do not provide improvements to the functioning of a computer or to any other technology or technical field; and do not integrate a judicial exception into a practical application. Therefore, claims 1-6, 8-17 and 19-22 do not integrate the recited abstract ideas into a practical application. Step 2B: Claim provides an Inventive Concept? With respect to the limitations identified as insignificant extra-solution activity above the conclusions are carried over, and both the “presenting ...; displaying ...; receiving ...; updating ...; and obtaining an intent asset list ....” are well-understood, routine, and conventional operations. For support as being well-understood, routine, and conventional for “presenting ...; displaying ...; receiving ...; updating ...; and obtaining an intent asset list ....” as noted by the courts is well understood routine and conventional, see MPEP 2106.05(d)(ii) “i. Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec, 838 F.3d at 1321, 120 USPQ2d at 1362 (utilizing an intermediary computer to forward information); … buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355, 112 USPQ2d 1093, 1096 (Fed. Cir. 2014) (computer receives and sends information over a network);” and/or MPEP 2106.05(d)(ii) “iv. Storing and retrieving information in memory, Versata Dev. Group, Inc. v. SAP Am., Inc., 793 F.3d 1306, 1334, 115 USPQ2d 1681, 1701 (Fed. Cir. 2015); OIP Techs., 788 F.3d at 1363, 115 USPQ2d at 1092-93;”, and/or MPEP 2106.05(d)(II) “iii. Ultramercial, 772 F.3d at 716, 112 USPQ2d at 1755 (updating an activity log);” See also see [Display Interface - an overview | ScienceDirect Topics, Introducing ASP.NET Web Pages - Displaying Data | Microsoft Docs, Execute DBCC PAGE command to Display Contents of Data Pages in SQL Server (kodyaz.com) and Load and display paged data | Android Developers]. Looking at the limitations in combination and the claim as a whole does not change this conclusion and the claim is ineligible. Therefore, the claims 1-6, 8-17 and 19-22 are not patent eligible. Claim Rejections - 35 USC § 103 7. In the event the determination of the status of the application as subject to AIA 35 U.S.C. § 102 and § 103 (or as subject to pre-AIA 35 U.S.C. § 102 and § 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. § 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section § 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under pre-AIA 35 U.S.C. § 103(a) are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. 8. Claims 1-2, 5-6, 10-13, 16-17 and 20-21 are rejected under 35 U.S.C. § 103 as being unpatentable over Circlaeys et al. (US 20190340529 A1) in view of Raghavan et al. (US 20130218899 A1) in further view of Grossman et al. (US 20220277047 A1). As per claim 1, Circlaeys teaches a method (i.e. “Methods, apparatuses, computer-readable media, and systems for organizing, storing, describing, and/or retrieving digital assets (also referred to herein as “DAs”)”; para. [0024]) executed by a management system (i.e. “FIG. 1A illustrates, in block diagram form, an asset management processing system that includes electronic components for performing digital asset management (DAM),”; fig. 1A, Para. [0014]; Examiner note: the management system is interpreted as the asset management processing system), comprising: wherein the data asset graph is stored in the management system (i.e. “The system 100 can also include memory 110 for storing and/or retrieving metadata 112, the metadata network 114”; fig 1a, para. [0042]; Examiner note: the management system is interpreted as the system 100. The metadata network 114 is interpreted as the data asset graph) and comprises nodes representing asset entities of a data asset and edges representing association relationships between the asset entities (i.e. “a “multidimensional network” and its variations refer to a complex graph having multiple kinds of relationships. A multidimensional network generally includes multiple nodes and edges. For one embodiment, the nodes represent metadata, and the edges represent relationships or correlations between the metadata.”; para. [0036]; Examiner note: the asset entities are interpreted as the metadata. The relationships between the asset entities are interpreted as the correlations between the metadata); However, it is noted that the prior art of Circlaeys does not explicitly teach “receiving a first keyword input by a user in a search box of a search interface of the management system, obtaining a data asset graph corresponding to the first keyword; determining recommended exploration information for the data asset graph based on an impact factor of the data asset graph, wherein the impact factor is used to evaluate importance of a node or an edge, and wherein the recommended exploration information comprises a recommended exploration start node in the data asset graph; presenting the recommended exploration information through a graph display interface to the user to guide the user to explore the data asset graph.” On the other hand, in the same field of endeavor, Raghavan teaches receiving a first keyword input by a user in a search box of a search interface of the management system (i.e. “The search request comprises search criteria, including one or more terms (or “keywords”) ... The terms may have been entered, for instance, via user input received at any suitable search interface presented by a client computer, such as one of clients 130.”; fig. 2; para. [0082]; Examiner note: the receiving a first keyword input by a user is interpreted as the terms may have been entered, for instance, via user input received where the term is keyword. The management system is taught by Circlaeys); obtaining a data asset graph corresponding to the first keyword (i.e. “At block 390, for each root node in the set of root nodes identified in block 358, the server constructs a search result subgraph.”; fig. 3, para. [0172]. Further, i.e. “search for the terms “John Tablet 95050” would yield three candidate nodes— nodes 413, 414, 419. Since node 411 is the common ancestor of each of these candidate nodes, a search result subgraph for such a query could include nodes 411, 413, 414, 416, and 419.”; fig.4, para. [191]; Examiner note: the obtaining a data asset graph is the constructs a search result subgraph. The first keyword is interpreted as the search for the terms “John Tablet 95050”); determining recommended exploration information for the data asset graph (i.e. “the search result subgraph identification process may be optimized to consider higher-priority candidate nodes ahead of lower-priority candidates, as determined in block 275.”; fig. 2, para. [0133]; Examiner note: the recommended exploration information is interpreted as the higher-priority candidate nodes) based on an impact factor of the data asset graph (i.e. “based on the average candidate node priority score for each set. Other optimization strategies for higher-priority candidate nodes are also possible.”; fig. 2, para. [0133]; Examiner note: the impact factor is interpreted as the node priority score), wherein the impact factor is used to evaluate importance of a node or an edge (i.e. “the link analysis involves, in part, assigning weights to the edges (relationships) and nodes (data objects) in the graph, with a node's weight being proportional to that node's indegrees. The weights are then used to calculate a score reflecting the relative importance of each node”; fig. 1, para. [0113]; Examiner note: the impact factor is used to evaluate importance of a node is interpreted as the score reflecting the relative importance of each node), and wherein the recommended exploration information comprises a recommended exploration start node in the data asset graph (i.e. “The root node of the search result subgraph is, in the context of the forward graph computed in block 240, a common ancestor of the set of nodes.”; fig.3, para. [0128]; Examiner note: the recommended exploration start node is the root node); Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the prior art of Circlaeys that teaches digital asset management (DAM). Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). However, it is noted that the prior art of Circlaeys and Raghavan do not explicitly teach “presenting the recommended exploration information through a graph display interface to the user to guide the user to explore the data asset graph.” On the other hand, in the same field of endeavor, Grossman teaches presenting the recommended exploration information (i.e. “the graph can be used to generate displays for users interested in learning about the graph and/or for performing queries and the like on that graph data.”; para. [0028]; Examiner note: the presenting is interpreted as the display) through a graph display interface to the user (i.e. “The user interface output devices 214 may include a display subsystem”; para. [0041]) to guide the user to explore the data asset graph (i.e. “for users interested in learning about the graph and/or for performing queries and the like on that graph data.”; para. [0028], [0054]; Examiner note: the to explore the data asset graph is interpreted as the learning about the graph and/or for performing queries and the like on that graph data). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Raghavan that teaches enhancing search results for unstructured queries on normalized data. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to identify assets under control in a network-connected environment, as it lowers security risks (Grossman, para. [0004]-[0005]). As per claim 2, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 1 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “wherein the recommended exploration information further comprises a recommended edge, or a recommended exploration target node, wherein the recommended edge comprises a potential extended edge of a first node selected by the user from the recommended exploration start node, and wherein the recommended exploration target node comprises a node through which a path on which a second node selected by the user from the recommended exploration start node is a start node passes.” On the other hand, in the same field of endeavor, Raghavan teaches wherein the recommended exploration information further comprises a recommended edge, or a recommended exploration target node (i.e. “At block 330, the server adds each of the nodes to a queue for processing, in the order by which they were sorted in block 320, with the highest priority node at the head of the queue.”; fig.3, para. [0161]; Examiner note: the recommended exploration target node is the highest priority node), wherein the recommended edge comprises a potential extended edge of a first node selected by the user from the recommended exploration start node, and wherein the recommended exploration target node comprises a node through which a path on which a second node selected by the user from the recommended exploration start node is a start node passes (i.e. “the ordering may also or instead be based on a popularity-based scoring of the nodes, such as how often each node has been returned as part of a result set for a query, or how often each node has been a member of a search result subgraph that has actually been selected by a user in a search result listing.”; para.[0121]. Further, i.e. “create size_of(K) ordered lists to track paths from root to leaf in SRT”; para. [0176]; Examiner note: the path is interpreted as the paths from root to leaf). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). As per claim 5, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 2 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “wherein determining the recommended exploration information based on the impact factor of the data asset graph comprises at least one of: sorting the nodes in the data asset graph based on the impact factor and determining a first n1 nodes as the recommended exploration start node; sorting potential extended edges of the first node based on the impact factor and determining a first n2 potential extended edges as the recommended edge; or sorting nodes along paths starting from the second node based on the impact factor and determining a first n3 nodes as the recommended exploration target node.” On the other hand, in the same field of endeavor, Raghavan teaches wherein determining the recommended exploration information (i.e. “the search result subgraph identification process may be optimized to consider higher-priority candidate nodes ahead of lower-priority candidates, as determined in block 275.”; fig. 2, para. [0133]; Examiner note: the recommended exploration information is interpreted as the higher-priority candidate nodes) based on the impact factor of the data asset graph (i.e. “based on the average candidate node priority score for each set. Other optimization strategies for higher-priority candidate nodes are also possible.”; fig. 2, para. [0133]; Examiner note: the impact factor is interpreted as the node priority score) comprises at least one of: sorting the nodes in the data asset graph based on the impact factor and determining a first n1 nodes as the recommended exploration start node; sorting potential extended edges of the first node based on the impact factor and determining a first n2 potential extended edges as the recommended edge; or sorting nodes along paths starting from the second node based on the impact factor and determining a first n3 nodes as the recommended exploration target node (i.e. “the server sorts the nodes by their likelihood of being part of a highly relevant search result subgraph.”; fig. 3, para. [0160]. Further, i.e. “in the order by which they were sorted in block 320, with the highest priority node at the head of the queue.”; para. [0161]; Examiner note: the recommended exploration start node is interpreted as the highest priority node at the head of the queue). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). As per claim 6, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 5 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “wherein the impact factor comprises a structure feature for determining structure importance of the node and the edge in the data asset graph; a service feature for determining service importance of the node and the edge in the data asset graph; or historical experience of the user for the data asset graph, wherein the historical experience comprises an interactive exploration experience of the user for the data asset graph in a historical period.” On the other hand, in the same field of endeavor, Raghavan teaches wherein the impact factor comprises a structure feature for determining structure importance of the node and the edge in the data asset graph (i.e. “The server calculates priority scores for the data objects in the candidate sets based at least in part on one or more of: a link analysis of the graph; or metadata describing structural constraints upon the data objects.”; para. [0064]; Examiner note: the structure feature for determining structure importance is interpreted as the metadata describing structural constraints); a service feature for determining service importance of the node and the edge in the data asset graph; or historical experience of the user for the data asset graph, wherein the historical experience comprises an interactive exploration experience of the user for the data asset graph in a historical period (i.e. “The server calculates priority scores for the data objects in the candidate sets based at least in part on one or more of: a link analysis of the graph; or metadata describing structural constraints upon the data objects.”; para. [0064]; Examiner note: The service feature for determining service importance is interpreted as the link analysis of the graph). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). As per claim 10, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 1 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “further comprising: receiving a second keyword input by the user in the search box of the search interface; obtaining an intent asset list, based on the second keyword, from the data asset managed by the management system, wherein the intent asset list includes a unique identifier of the data asset that matches the second keyword; displaying the intent asset list to the user through the search interface; and generating, in response to a selection operation from the user on an intent asset in the intent asset list, the data asset graph corresponding to the intent asset.” On the other hand, in the same field of endeavor, Raghavan teaches further comprising: receiving a second keyword input by the user in the search box of the search interface (i.e. “The search request comprises search criteria, including one or more terms (or “keywords”) ... The terms may have been entered, for instance, via user input received at any suitable search interface presented by a client computer, such as one of clients 130.”; fig. 2; para. [0082]; Examiner note: the receiving a second keyword input by a user is interpreted as the terms may have been entered, for instance, via user input received where the term is keyword); obtaining an intent asset list (i.e. “At block 230, the server builds an index”; fig.2, para. [0089]; Examiner note: the intent asset list is interpreted as the index), based on the second keyword (i.e. “terms associated with the interpreted data objects.”; fig.2, para. [0089]), from the data asset managed by the management system (i.e. “indexed terms may further be selected from certain types of related data objects.”; para. [0089]; Examiner note: the data asset is interpreted as the data objects), wherein the intent asset list includes a unique identifier of the data asset that matches the second keyword (i.e. “the indexed terms are selected only from content associated with certain fields or tags.”; para. [0089]; Examiner note: the unique identifier is interpreted as the certain fields or tags); displaying the intent asset list to the user through the search interface (i.e. “a client may look up and retrieve any information necessary to generate its own display of information about the data objects in each search result subgraph in the result set.”; fig. 2, para. [141]); and generating, in response to a selection operation from the user on an intent asset in the intent asset list, the data asset graph corresponding to the intent asset (i.e. “At block 240, the server generates a graph describing relationships between each of the interpreted data objects.”; fig.2, para. [0092]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). As per claim 11, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 1 above. Additionally, Circlaeys teaches further comprising: receiving an extended edge from the user (i.e. “the matching of the determined at least one moment may optionally be further enhanced based, at least in part, on the sender of the message's relationship to the identified moment (e.g., whether or not the sender appears in a DA associated with the moment, whether the sender was present at the same location during the identified moment(s), whether the sender is in a particular social group with the user, etc.).”; fig. 6, para. [0070]; Examiner note: where the sender that sends message in over computer device is known as a user; the extended edge from the user is interpreted as the sender of the message's relationship to the identified moment; an extended edge is known as a way to capture new relationships or connections between existing data assets); and updating the data asset graph based on the extended edge (i.e. “the matching of the determined at least one moment may optionally be further enhanced based, at least in part, on the sender of the message's relationship to the identified moment (e.g., whether or not the sender appears in a DA associated with the moment, whether the sender was present at the same location during the identified moment(s), whether the sender is in a particular social group with the user, etc.).”; fig. 6, para. [0070]; Examiner note: the updating the data asset graph based on the extended edge is interpreted as the enhanced based, at least in part, on the sender of the message's relationship to the identified moment). As per claim 12, Circlaeys teaches a computing device cluster comprising (i.e. “Methods, apparatuses, computer-readable media, and systems for providing users with more intelligent and automated DA sharing suggestions”; para. [0008]; Examiner note: the computing device cluster is interpreted as the apparatuses): at least one computing device comprising (i.e. “computing device”; figs. 5, 7, para. [0067], [0073]): a memory (i.e. “memory 760”; fig. 7, para. [0073]) configured to store computer-readable instructions (i.e. “Processor 705 may execute instructions necessary to carry out or control the operation of many functions performed by device 700 (e.g., such as the generation and/or processing of DAs in accordance with the various embodiments described herein).”; fig. 7, para. [0074]); and one or more processors coupled to the memory and configured to execute the computer-readable instructions to cause the computing device cluster to (i.e. “Processor 705 may execute instructions necessary to carry out or control the operation of many functions performed by device 700 (e.g., such as the generation and/or processing of DAs in accordance with the various embodiments described herein).”; fig. 7, para. [0074]): wherein the data asset graph is stored in the computing device cluster (i.e. “The system 100 can also include memory 110 for storing and/or retrieving metadata 112, the metadata network 114”; fig 1a, para. [0042]; Examiner note: the computing device cluster is interpreted as the system 100. The metadata network 114 is interpreted as the data asset graph) and comprises nodes representing asset entities of a data asset and edges representing association relationships between the asset entities (i.e.” a “multidimensional network” and its variations refer to a complex graph having multiple kinds of relationships. A multidimensional network generally includes multiple nodes and edges. For one embodiment, the nodes represent metadata, and the edges represent relationships or correlations between the metadata.”; para. [0036]; Examiner note: the asset entities are interpreted as the metadata. The relationships between the asset entities are interpreted as the correlations between the metadata); However, it is noted that the prior art of Circlaeys does not explicitly teach “receive a first keyword input by a user in a search box of a search interface of the computing device cluster; obtain a data asset graph corresponding to the first keyword; determine recommended exploration information for the data asset graph based on an impact factor of the data asset graph, wherein the impact factor is used to evaluate importance of a node or an edge and wherein the recommended exploration information comprises a recommended exploration start node in the data asset graph; present the recommended exploration information through a graph display interface to the user to guide the user to explore the data asset graph.” On the other hand, in the same field of endeavor, Raghavan teaches receive a first keyword input by a user in a search box of a search interface of the computing device cluster (i.e. “The search request comprises search criteria, including one or more terms (or “keywords”) ... The terms may have been entered, for instance, via user input received at any suitable search interface presented by a client computer, such as one of clients 130.”; fig. 2; para. [0082]; Examiner note: the receiving a first keyword input by a user is interpreted as the terms may have been entered, for instance, via user input received where the term is keyword. The computing device cluster is taught by Circlaeys); obtain a data asset graph corresponding to the first keyword (i.e. “At block 390, for each root node in the set of root nodes identified in block 358, the server constructs a search result subgraph.”; fig. 3, para. [0172]. Further, i.e. “search for the terms “John Tablet 95050” would yield three candidate nodes— nodes 413, 414, 419. Since node 411 is the common ancestor of each of these candidate nodes, a search result subgraph for such a query could include nodes 411, 413, 414, 416, and 419.”; fig.4, para. [191]; Examiner note: the obtaining a data asset graph is the constructs a search result subgraph. The first keyword is interpreted as the search for the terms “John Tablet 95050”) determine recommended exploration information for the data asset graph (i.e. “the search result subgraph identification process may be optimized to consider higher-priority candidate nodes ahead of lower-priority candidates, as determined in block 275.”; fig. 2, para. [0133]; Examiner note: the recommended exploration information is interpreted as the higher-priority candidate nodes) based on an impact factor of the data asset graph (i.e. “based on the average candidate node priority score for each set. Other optimization strategies for higher-priority candidate nodes are also possible.”; fig. 2, para. [0133]; Examiner note: the impact factor is interpreted as the node priority score), wherein the impact factor is used to evaluate importance of a node or an edge (i.e. “the link analysis involves, in part, assigning weights to the edges (relationships) and nodes (data objects) in the graph, with a node's weight being proportional to that node's indegrees. The weights are then used to calculate a score reflecting the relative importance of each node”; fig. 1, para. [0113]; Examiner note: the impact factor is used to evaluate importance of a node is interpreted as the score reflecting the relative importance of each node) and wherein the recommended exploration information comprises a recommended exploration start node in the data asset graph (i.e. “The root node of the search result subgraph is, in the context of the forward graph computed in block 240, a common ancestor of the set of nodes.”; fig.3, para. [0128]; Examiner note: the recommended exploration start node is the root node); Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the prior art of Circlaeys that teaches digital asset management (DAM). Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). However, it is noted that the prior art of Circlaeys and Raghavan do not explicitly teach “present the recommended exploration information through a graph display interface to the user to guide the user to explore the data asset graph.” On the other hand, in the same field of endeavor, Grossman teaches present the recommended exploration information (i.e. “the graph can be used to generate displays for users interested in learning about the graph and/or for performing queries and the like on that graph data.”; para. [0028]; Examiner note: the presenting is interpreted as the display) through a graph display interface to the user (i.e. “The user interface output devices 214 may include a display subsystem”; para. [0041]) to guide the user to explore the data asset graph (i.e. “for users interested in learning about the graph and/or for performing queries and the like on that graph data.”; para. [0028], [0054]; Examiner note: the to explore the data asset graph is interpreted as the learning about the graph and/or for performing queries and the like on that graph data). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Raghavan that teaches enhancing search results for unstructured queries on normalized data. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to identify assets under control in a network-connected environment, as it lowers security risks (Grossman, para. [0004]-[0005]). As per claim 13, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 12 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “wherein the recommended exploration information further comprises a recommended edge or a recommended exploration target node, wherein the recommended edge comprises a potential extended edge of a first node selected by the user from the recommended exploration start node, and wherein the recommended exploration target node comprises a node through which a path on which a second node selected by the user from the recommended exploration start node is a start node passes.” On the other hand, in the same field of endeavor, Raghavan teaches wherein the recommended exploration information further comprises a recommended edge or a recommended exploration target node (i.e. “At block 330, the server adds each of the nodes to a queue for processing, in the order by which they were sorted in block 320, with the highest priority node at the head of the queue.”; fig.3, para. [0161]; Examiner note: the recommended exploration target node is the highest priority node), wherein the recommended edge comprises a potential extended edge of a first node selected by the user from the recommended exploration start node, and wherein the recommended exploration target node comprises a node through which a path on which a second node selected by the user from the recommended exploration start node is a start node passes (i.e. “the ordering may also or instead be based on a popularity-based scoring of the nodes, such as how often each node has been returned as part of a result set for a query, or how often each node has been a member of a search result subgraph that has actually been selected by a user in a search result listing.”; para.[0121]. Further, i.e. “create size_of(K) ordered lists to track paths from root to leaf in SRT”; para. [0176]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). As per claim 16, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 13 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “wherein the one or more processors are further configured to execute the computer-readable instructions to cause the computing device cluster to perform at least one of: determine the recommended exploration information based on the impact factor sorting the nodes in the data asset graph based on the impact factor and determining a first n1 nodes as the recommended exploration start node; sorting potential extended edges of the first node based on the impact factor and determining a first n2 potential extended edges as the recommended edge; or sorting nodes along paths starting from the second node based on the impact factor and determining a first n3 nodes as the recommended exploration target node.” On the other hand, in the same field of endeavor, Raghavan teaches wherein the one or more processors are further configured to execute the computer-readable instructions to cause the computing device cluster to perform (i.e. “The components thereof may, for example, be implemented by one or more hardware processors of those one or more computer systems, configured to execute instructions for performing the various functions described herein”; para. [0080]) at least one of: determine the recommended exploration information based on the impact factor sorting the nodes in the data asset graph based on the impact factor and determining a first n1 nodes as the recommended exploration start node; sorting potential extended edges of the first node based on the impact factor and determining a first n2 potential extended edges as the recommended edge; or sorting nodes along paths starting from the second node based on the impact factor and determining a first n3 nodes as the recommended exploration target node (i.e. “the search result subgraph identification process may be optimized to consider higher-priority candidate nodes ahead of lower-priority candidates, as determined in block 275.”; fig. 2, para. [0133]; Examiner note: the recommended exploration information is interpreted as the higher-priority candidate nodes. Further, i.e. “based on the average candidate node priority score for each set. Other optimization strategies for higher-priority candidate nodes are also possible.”; fig. 2, para. [0133]; Examiner note: the impact factor is interpreted as the node priority score. Furthermore, i.e. “the server sorts the nodes by their likelihood of being part of a highly relevant search result subgraph.”; fig. 3, para. [0160]. Furthermore, i.e. “in the order by which they were sorted in block 320, with the highest priority node at the head of the queue.”; para. [0161]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). As per claim 17, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 16 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “wherein the impact factor comprises: a structure feature for determining structure importance of a node and an edge in the data asset graph; a service feature for determining service importance of the node and the edge in the data asset graph; or historical experience of the user for the data asset graph, wherein the historical experience comprises an interactive exploration experience of the user for the data asset graph in a historical period.” On the other hand, in the same field of endeavor, Raghavan teaches wherein the impact factor comprises: a structure feature for determining structure importance of a node and an edge in the data asset graph (i.e. “The server calculates priority scores for the data objects in the candidate sets based at least in part on one or more of: a link analysis of the graph; or metadata describing structural constraints upon the data objects.”; para.[0064]; Examiner note: The structure feature for determining structure importance is interpreted as the metadata describing structural constraints); a service feature for determining service importance of the node and the edge in the data asset graph; or historical experience of the user for the data asset graph, wherein the historical experience comprises an interactive exploration experience of the user for the data asset graph in a historical period (i.e. “The server calculates priority scores for the data objects in the candidate sets based at least in part on one or more of: a link analysis of the graph; or metadata describing structural constraints upon the data objects.”; para.[0064]; Examiner note: The service feature for determining service importance is interpreted as the link analysis of the graph). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). As per claim 20, Circlaeys teaches a computer program product (i.e. “Methods, apparatuses, computer-readable media, and systems for providing users with more intelligent and automated DA sharing suggestions”; para. [0008]; Examiner note: the computing device cluster is interpreted as the apparatuses) comprising computer-executable instructions that are stored on a non-transitory computer-readable medium and that, when executed by one or more processors, cause a computing device cluster to (i.e. “memory 760” and “Processor 705 may execute instructions necessary to carry out or control the operation of many functions performed by device 700 (e.g., such as the generation and/or processing of DAs in accordance with the various embodiments described herein).”; fig. 7, para. [0073]-[0074]): wherein the data asset graph is stored in the computing device cluster (i.e. “The system 100 can also include memory 110 for storing and/or retrieving metadata 112, the metadata network 114”; fig 1a, para. [0042]; Examiner note: the computing device cluster is interpreted as the system 100. The metadata network 114 is interpreted as the data asset graph) and comprises nodes representing asset entities of a data asset and edges representing association relationships between the asset entities (i.e.” a “multidimensional network” and its variations refer to a complex graph having multiple kinds of relationships. A multidimensional network generally includes multiple nodes and edges. For one embodiment, the nodes represent metadata, and the edges represent relationships or correlations between the metadata.”; para. [0036]; Examiner note: the asset entities are interpreted as the metadata. The relationships between the asset entities are interpreted as the correlations between the metadata); However, it is noted that the prior art of Circlaeys does not explicitly teach “receive a first keyword input by a user in a search box of a search interface of the computing device cluster; obtain a data asset graph corresponding to the first keyword; determine recommended exploration information for the data asset graph based on an impact factor of the data asset graph, wherein the impact factor is used to evaluate importance of a node or an edge and wherein the recommended exploration information comprises a recommended exploration start node in the data asset graph; present the recommended exploration information through a graph display interface to the user to guide the user to explore the data asset graph.” On the other hand, in the same field of endeavor, Raghavan teaches receive a first keyword input by a user in a search box of a search interface of the computing device cluster (i.e. “The search request comprises search criteria, including one or more terms (or “keywords”) ... The terms may have been entered, for instance, via user input received at any suitable search interface presented by a client computer, such as one of clients 130.”; fig. 2; para. [0082]; Examiner note: the receiving a first keyword input by a user is interpreted as the terms may have been entered, for instance, via user input received where the term is keyword. The computing device cluster is taught by Circlaeys); obtain a data asset graph corresponding to the first keyword (i.e. “At block 390, for each root node in the set of root nodes identified in block 358, the server constructs a search result subgraph.”; fig. 3, para. [0172]. Further, i.e. “search for the terms “John Tablet 95050” would yield three candidate nodes— nodes 413, 414, 419. Since node 411 is the common ancestor of each of these candidate nodes, a search result subgraph for such a query could include nodes 411, 413, 414, 416, and 419.”; fig.4, para. [191]; Examiner note: the obtaining a data asset graph is the constructs a search result subgraph. The first keyword is interpreted as the search for the terms “John Tablet 95050”); determine recommended exploration information for the data asset graph (i.e. “the search result subgraph identification process may be optimized to consider higher-priority candidate nodes ahead of lower-priority candidates, as determined in block 275.”; fig. 2, para. [0133]; Examiner note: the recommended exploration information is interpreted as the higher-priority candidate nodes) based on an impact factor of the data asset graph (i.e. “based on the average candidate node priority score for each set. Other optimization strategies for higher-priority candidate nodes are also possible.”; fig. 2, para. [0133]; Examiner note: the impact factor is interpreted as the node priority score), wherein the impact factor is used to evaluate importance of a node or an edge (i.e. “the link analysis involves, in part, assigning weights to the edges (relationships) and nodes (data objects) in the graph, with a node's weight being proportional to that node's indegrees. The weights are then used to calculate a score reflecting the relative importance of each node”; fig. 1, para. [0113]; Examiner note: the impact factor is used to evaluate importance of a node is interpreted as the score reflecting the relative importance of each node) and wherein the recommended exploration information comprises a recommended exploration start node in the data asset graph (i.e. “The root node of the search result subgraph is, in the context of the forward graph computed in block 240, a common ancestor of the set of nodes.”; fig.3, para. [0128]; Examiner note: the recommended exploration start node is the root node); Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the prior art of Circlaeys that teaches digital asset management (DAM). Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). However, it is noted that the prior art of Circlaeys and Raghavan do not explicitly teach “present the recommended exploration information through a graph display interface to the user to guide the user to explore the data asset graph.” On the other hand, in the same field of endeavor, Grossman teaches present the recommended exploration information (i.e. “the graph can be used to generate displays for users interested in learning about the graph and/or for performing queries and the like on that graph data.”; para. [0028]; Examiner note: the presenting is interpreted as the display) through a graph display interface (i.e. “The user interface output devices 214 may include a display subsystem”; para. [0041]) to the user to guide the user to explore the data asset graph (i.e. “for users interested in learning about the graph and/or for performing queries and the like on that graph data.”; para. [0028], [0054]; Examiner note: the to explore the data asset graph is interpreted as the learning about the graph and/or for performing queries and the like on that graph data). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Raghavan that teaches enhancing search results for unstructured queries on normalized data. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to identify assets under control in a network-connected environment, as it lowers security risks (Grossman, para. [0004]-[0005]). As per claim 21, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 20 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “wherein the recommended exploration information further comprises a recommended edge or a recommended exploration target node, wherein the recommended edge comprises a potential extended edge of a first node selected by the user from the recommended exploration start node, and wherein the recommended exploration target node comprises a node through which a path on which a second node selected by the user from the recommended exploration start node is a start node passes.” On the other hand, in the same field of endeavor, Raghavan teaches wherein the recommended exploration information further comprises a recommended edge or a recommended exploration target node (i.e. “At block 330, the server adds each of the nodes to a queue for processing, in the order by which they were sorted in block 320, with the highest priority node at the head of the queue.”; fig.3, para. [0161]; Examiner note: the recommended exploration target node is the highest priority node), wherein the recommended edge comprises a potential extended edge of a first node selected by the user from the recommended exploration start node, and wherein the recommended exploration target node comprises a node through which a path on which a second node selected by the user from the recommended exploration start node is a start node passes (i.e. “the ordering may also or instead be based on a popularity-based scoring of the nodes, such as how often each node has been returned as part of a result set for a query, or how often each node has been a member of a search result subgraph that has actually been selected by a user in a search result listing.”; para.[0121]. Further, i.e. “create size_of(K) ordered lists to track paths from root to leaf in SRT”; para. [0176]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). 9. Claims 3-4, 14-15 and 22 are rejected under 35 U.S.C. § 103 as being unpatentable over Circlaeys et al. (US 20190340529 A1) in view of Raghavan et al. (US 20130218899 A1) in further view of Grossman et al. (US 20220277047 A1) still in further view of Hirmer et al. (US 20200081917 A1). As per claim 3, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 2 above. However, it is noted that the prior art of Circlaeys and Grossman do not explicitly teach “wherein presenting the recommended exploration information comprises at least one of: displaying the recommended exploration start node on the graph display interface when the user triggers a recommendation control on the graph display interface; displaying the recommended edge on the graph display interface when the user selects the first node and triggers an edge recommendation operation on the graph display interface; or displaying the recommended exploration target node on the graph display interface when the user triggers a target recommendation operation on the graph display interface.” On the other hand, in the same field of endeavor, Raghavan teaches wherein presenting the recommended exploration information (i.e. “the graph can be used to generate displays for users interested in learning about the graph and/or for performing queries and the like on that graph data.”; para. [0028]; Examiner note: the presenting is interpreted as the display) comprises at least one of: Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to utilize a common underlying format to access database data, as it standardizes data structures to ensure consistency and efficiency (Raghavan, para. [0002]). However, it is noted that the prior art of Circlaeys, Raghavan and Grossman do not explicitly teach “displaying the recommended exploration start node on the graph display interface when the user triggers a recommendation control on the graph display interface; displaying the recommended edge on the graph display interface when the user selects the first node and triggers an edge recommendation operation on the graph display interface; or displaying the recommended exploration target node on the graph display interface when the user triggers a target recommendation operation on the graph display interface.” On the other hand, in the same field of endeavor, Hirmer teaches displaying the recommended exploration start node on the graph display interface when the user triggers a recommendation control on the graph display interface (i.e. “The exemplary user interface 700 depicts only a single moment identified with keyword tag 708 “Paris—Trocadero, Dec. 21, 2015” with associated multimedia content icon 706. Selection of the moment multimedia content icon 606 will return the digital assets associated with that moment.”; figs. 2, 6-7, para. [0103]-[0105]; Examiner note: the graph display interface is interpreted as the user interface; when the user triggers a recommendation control on the graph display interface is interpreted as the selection of the moment multimedia content icon); displaying the recommended edge on the graph display interface when the user selects the first node and triggers an edge recommendation operation on the graph display interface; or displaying the recommended exploration target node on the graph display interface when the user triggers a target recommendation operation on the graph display interface (i.e. “User interface 800 depicts the moment with multimedia content icon 806 and keyword tag 808 for “Paris-Trocadero” from the search described for FIG. 7. As depicted in FIG. 8, related searches can be conducted by selecting one of the multimedia content icon 806 for the collections for Groups and People.”; figs. 2, 7-10, para. [0105]-[0106]; Examiner note: the first node is interpreted as the selecting one of the multimedia content icon; the triggers the edge recommendation operation is interpreted as the keyword tag). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Hirmer that teaches automatically labelling the digital assets assists a user in organizing and sharing the digital assets with friends and family into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), Raghavan that teaches enhancing search results for unstructured queries on normalized data, and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to enable a user to quickly and easily filter digital assets in a digital asset collection because it can provide an overall improved user experience (Hirmer, para. [0003]). As per claim 4, Circlaeys, Raghavan, Grossman and Hirmer teach all the limitations as discussed in claim 3 above. However, it is noted that the prior art of Circlaeys, Grossman and Hirmer do not explicitly teach “further comprising: receiving a selection of the user for a third node from the recommended exploration target node; and displaying, on the graph display interface, an exploration path in which the second node is used as the start node and the third node is used as a target node.” On the other hand, in the same field of endeavor, Raghavan teaches further comprising: receiving a selection of the user for a third node from the recommended exploration target node (i.e. “The ordering may also or instead be based on a popularity-based scoring of the nodes, such as how often each node has been returned as part of a result set for a query, or how often each node has been a member of a search result subgraph that has actually been selected by a user in a search result listing”; para. [0161]); and displaying, on the graph display interface (i.e. “The user interface output devices 214 may include a display subsystem”; para. [0041]), an exploration path in which the second node is used as the start node and the third node is used as a target node (i.e. “create size_of(K) ordered lists to track paths from root to leaf in SRT”; para. [0176]; Examiner note: the exploration path is interpreted as the track paths from root to leaf). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity, and Hirmer that teaches automatically labelling the digital assets assists a user in organizing and sharing the digital assets with friends and family. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to enable a user to quickly and easily filter digital assets in a digital asset collection because it can provide an overall improved user experience (Hirmer, para. [0003]). As per claim 14, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 13 above. However, it is noted that the prior art of Circlaeys, Raghavan and Grossman do not explicitly teach “wherein the one or more processors are further configured to execute the computer-readable instructions to cause the computing device cluster to perform at least one of: displaying the recommended exploration start node on the graph display interface when the user triggers a recommendation control on the graph display interface; displaying the recommended edge on the graph display interface when the user selects the first node and triggers an edge recommendation operation on the graph display interface; or displaying the recommended exploration target node on the graph display interface when the user triggers a target recommendation operation on the graph display interface.” On the other hand, in the same field of endeavor, Hirmer teaches wherein the one or more processors are further configured to execute the computer-readable instructions to cause the computing device cluster to perform at least one of (i.e. “The computer readable medium can store a plurality of instructions that, when executed by one or more processors of a computing device, cause the one or more processors to perform various operations.”; fig. 16A, 16B, para. [0096]): displaying the recommended exploration start node on the graph display interface when the user triggers a recommendation control on the graph display interface; displaying the recommended edge on the graph display interface when the user selects the first node and triggers an edge recommendation operation on the graph display interface; displaying the recommended exploration target node on the graph display interface when the user triggers a target recommendation operation on the graph display interface (i.e. “The exemplary user interface 700 depicts only a single moment identified with keyword tag 708 “Paris—Trocadero, Dec. 21, 2015” with associated multimedia content icon 706. Selection of the moment multimedia content icon 606 will return the digital assets associated with that moment.”; figs. 2, 6-7, para. [0103]-[0105]; Examiner note: the graph display interface is interpreted as the user interface; when the user triggers a recommendation control on the graph display interface is interpreted as the selection of the moment multimedia content icon). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Hirmer that teaches automatically labelling the digital assets assists a user in organizing and sharing the digital assets with friends and family into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), Raghavan that teaches enhancing search results for unstructured queries on normalized data, and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to enable a user to quickly and easily filter digital assets in a digital asset collection because it can provide an overall improved user experience (Hirmer, para. [0003]). As per claim 15, Circlaeys, Raghavan, Grossman and Hirmer teach all the limitations as discussed in claim 14 above. However, it is noted that the prior art of Circlaeys, Grossman and Hirmer do not explicitly teach “wherein the one or more processors are further configured to execute the computer-readable instructions to cause the computing device cluster to: receive a selection of the user for a third node from the recommended exploration target node; and display, on the graph display interface, an exploration path in which the second node is used as the start node and the third node is used as a target node.” On the other hand, in the same field of endeavor, Raghavan teaches wherein the one or more processors are further configured to execute the computer-readable instructions to cause the computing device cluster to (i.e. “The computer readable medium can store a plurality of instructions that, when executed by one or more processors of a computing device, cause the one or more processors to perform various operations.”; fig. 16A, 16B, para. [0096]): receive a selection of the user for a third node from the recommended exploration target node (i.e. “selecting the moment content icon 930 for “Cupertino Village” would return digital assets with metadata associated a moment for Cupertino Village captured on Aug. 22, 2016. In addition to the moment multimedia content icons 930 and associated keyword tags 932, asset counts 940 are displayed for each moment.”; fig. 2, 9, para. [0072]; Examiner note: the third node from the recommended exploration target node is interpreted as the moment content icon 930 for “Cupertino Village”); and display, on the graph display interface, an exploration path in which the second node is used as the start node and the third node is used as a target node (i.e. “Selection of any one of these moment multimedia content icons 930 would further limit the search of the digital asset collection and return only digital assets that relate to both the location and temporal limitation associated with the moment.”; fig. 2, 9, para. [0072]; Examiner note: the second path from the second node to the third node is interpreted as the return only digital assets that relate to both the location and temporal limitation associated with the moment). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Raghavan that teaches enhancing search results for unstructured queries on normalized data into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity, and Hirmer that teaches automatically labelling the digital assets assists a user in organizing and sharing the digital assets with friends and family. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to enable a user to quickly and easily filter digital assets in a digital asset collection because it can provide an overall improved user experience (Hirmer, para. [0003]). As per claim 22, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 21 above. However, it is noted that the prior art of Circlaeys, Raghavan and Grossman do not explicitly teach “wherein when executed by the one or more processors, the computer-executable instructions further cause the computing device cluster to perform at least one of: displaying the recommended exploration start node on the graph display interface when the user triggers a recommendation control on the graph display interface; displaying the recommended edge on the graph display interface when the user selects the first node and triggers an edge recommendation operation on the graph display interface; or displaying the recommended exploration target node on the graph display interface when the user triggers a target recommendation operation on the graph display interface.” On the other hand, in the same field of endeavor, Hirmer teaches wherein when executed by the one or more processors, the computer-executable instructions further cause the computing device cluster to perform (i.e. “The computer readable medium can store a plurality of instructions that, when executed by one or more processors of a computing device, cause the one or more processors to perform various operations.”; fig. 16A, 16B, para. [0096]) at least one of: displaying the recommended exploration start node on the graph display interface when the user triggers a recommendation control on the graph display interface; displaying the recommended edge on the graph display interface when the user selects the first node and triggers an edge recommendation operation on the graph display interface; or displaying the recommended exploration target node on the graph display interface when the user triggers a target recommendation operation on the graph display interface (i.e. “The exemplary user interface 700 depicts only a single moment identified with keyword tag 708 “Paris—Trocadero, Dec. 21, 2015” with associated multimedia content icon 706. Selection of the moment multimedia content icon 606 will return the digital assets associated with that moment.”; figs. 2, 6-7, para. [0103]-[0105]; Examiner note: the graph display interface is interpreted as the user interface; when the user triggers a recommendation control on the graph display interface is interpreted as the selection of the moment multimedia content icon. Further, “User interface 800 depicts the moment with multimedia content icon 806 and keyword tag 808 for “Paris-Trocadero” from the search described for FIG. 7. As depicted in FIG. 8, related searches can be conducted by selecting one of the multimedia content icon 806 for the collections for Groups and People.”; figs. 2, 7-10, para. [0105]-[0106]; Examiner note: the first node is interpreted as the selecting one of the multimedia content icon; the triggers the edge recommendation operation is interpreted as the keyword tag). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Hirmer that teaches automatically labelling the digital assets assists a user in organizing and sharing the digital assets with friends and family into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), Raghavan that teaches enhancing search results for unstructured queries on normalized data, and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to enable a user to quickly and easily filter digital assets in a digital asset collection because it can provide an overall improved user experience (Hirmer, para. [0003]). 10. Claims 8-9 and 19 are rejected under 35 U.S.C. § 103 as being unpatentable over Circlaeys et al. (US 20190340529 A1) in view of Raghavan et al. (US 20130218899 A1) in further view of Grossman et al. (US 20220277047 A1) still in further view of Strauss (US 20180253661 A1). As per claim 8, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 1 above. However, it is noted that the prior art of Circlaeys, Raghavan and Grossman do not explicitly teach “further comprising: receiving a feedback of the user on the recommended exploration information; and updating a recommendation parameter based on the feedback.” On the other hand, in the same field of endeavor, Strauss teaches further comprising: receiving a feedback of the user on the recommended exploration information (i.e. “The content review interface 410 presents the user-provided content 420, typically through a client device 210 accessed by a user of the online system 240 who has been granted review privileges.”; fig. 4, para. [0062]-[0064]); and updating a recommendation parameter based on the feedback (i.e. “For example, the online system 240 identifies rejected content items from the sampled subset that received a rejection review decision from the quality review interface and modifies parameters of the machine learning model by using the identified rejected content items as training inputs to the machine learning model.”; para. [0076]. Further, i.e. “In response to selecting a control 430 to reject the content, the content review interface 410 may prompt the reviewing user to select one or more reasons 440 for rejection.”; fig. 4, para. [0062]-[0064]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Strauss that teaches validating performance of a machine learning classifier by efficiently identifying members of a minority class among a population with a class imbalance into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), Raghavan that teaches enhancing search results for unstructured queries on normalized data, and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to provide the sampled content for human review through a review interface because it can evaluate and improve the effectiveness of the content review (Strauss, para. [0059]). As per claim 9, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 8 above. However, it is noted that the prior art of Circlaeys, Raghavan and Grossman do not explicitly teach “wherein the feedback comprises selection or rejection of the user for the recommended exploration information.” On the other hand, in the same field of endeavor, Strauss teaches wherein the feedback comprises selection or rejection of the user for the recommended exploration information (i.e. “In response to selecting a control 430 to reject the content, the content review interface 410 may prompt the reviewing user to select one or more reasons 440 for rejection.”; fig. 4, para. [0062]-[0064]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Strauss that teaches validating performance of a machine learning classifier by efficiently identifying members of a minority class among a population with a class imbalance into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), Raghavan that teaches enhancing search results for unstructured queries on normalized data, and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to provide the sampled content for human review through a review interface because it can evaluate and improve the effectiveness of the content review (Strauss, para. [0059]). As per claim 19, Circlaeys, Raghavan and Grossman teach all the limitations as discussed in claim 12 above. However, it is noted that the prior art of Circlaeys, Raghavan and Grossman do not explicitly teach “ wherein the one or more processors are further configured to execute the computer-readable instructions to cause the computing device cluster to: receive a feedback of the user on the recommended exploration information, wherein the feedback comprises selection or rejection of the user for the recommended exploration information; and update a recommendation parameter based on the feedback.” On the other hand, in the same field of endeavor, Strauss teaches wherein the one or more processors are further configured to execute the computer-readable instructions to cause the computing device cluster to (i.e. “The content review interface 410 presents the user-provided content 420, typically through a client device 210 accessed by a user of the online system 240 who has been granted review privileges.”; fig. 4, para. [0062]-[0064]): receive a feedback of the user on the recommended exploration information (i.e. “The content review interface 410 presents the user-provided content 420, typically through a client device 210 accessed by a user of the online system 240 who has been granted review privileges.”; fig. 4, para. [0062]-[0064]), wherein the feedback comprises selection or rejection of the user for the recommended exploration information (i.e. “In response to selecting a control 430 to reject the content, the content review interface 410 may prompt the reviewing user to select one or more reasons 440 for rejection.”; fig. 4, para. [0062]-[0064]); and update a recommendation parameter based on the feedback (i.e. “For example, the online system 240 identifies rejected content items from the sampled subset that received a rejection review decision from the quality review interface and modifies parameters of the machine learning model by using the identified rejected content items as training inputs to the machine learning model.”; para. [0076]. Further, i.e. “In response to selecting a control 430 to reject the content, the content review interface 410 may prompt the reviewing user to select one or more reasons 440 for rejection.”; fig. 4, para. [0062]-[0064]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the teachings of Strauss that teaches validating performance of a machine learning classifier by efficiently identifying members of a minority class among a population with a class imbalance into the combination of prior arts of Circlaeys that teaches digital asset management (DAM), Raghavan that teaches enhancing search results for unstructured queries on normalized data, and Grossman that teaches techniques for performing searches of network-connected assets to identify assets under control of an entity. Additionally, this can improve computer functionality by enabling computing systems that use one or more embodiments of the digital asset management (DAM) systems. The motivation for doing so would be to provide the sampled content for human review through a review interface because it can evaluate and improve the effectiveness of the content review (Strauss, para. [0059]). Prior Art of Record 11. The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Sagi et al. (US 12141158 B2), teaches a search engine responding to a user query to find relevant data assets in a federation business data lake (FBDL) system by monitoring. Newman et al. (US 11580127 B1), teaches a plurality of graph type options. Savir et al. (US 20220374446 A1), teaches processing search queries for data stored in a large-scale data lake system. Kurniawan et al. (US 20220309475 A1), teaches remote monitoring and management of assets from a portfolio of assets based on an asset model. Conrad et al. (US 20220292089 A1), teaches a data asset curating system. Conclusion 12. Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to ANTONIO CAIA DO whose telephone number is (469)295-9251. The examiner can normally be reached on Monday - Friday / 06:30 to 16:30. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Ng, Amy can be reached on (571) 270-1698. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /ANTONIO J CAIA DO/ Examiner, Art Unit 2164 /MARK E HERSHLEY/Primary Examiner, Art Unit 2164
Read full office action

Prosecution Timeline

Nov 22, 2024
Application Filed
Jan 13, 2025
Response after Non-Final Action
Jul 23, 2025
Non-Final Rejection — §101, §103
Oct 24, 2025
Response Filed
Dec 24, 2025
Final Rejection — §101, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12597055
IDENTIFYING ITEMS OFFERED BY AN ONLINE CONCIERGE SYSTEM FOR A RECEIVED QUERY BASED ON A GRAPH IDENTIFYING RELATIONSHIPS BETWEEN ITEMS AND ATTRIBUTES OF THE ITEMS
2y 5m to grant Granted Apr 07, 2026
Patent 12579121
MANAGEMENT OF A SECONDARY VERTEX INDEX FOR A GRAPH
2y 5m to grant Granted Mar 17, 2026
Patent 12579129
System and Method for Processing Hierarchical Data
2y 5m to grant Granted Mar 17, 2026
Patent 12579125
SYSTEMS AND METHODS FOR ADMISSION CONTROL INPUT/OUTPUT
2y 5m to grant Granted Mar 17, 2026
Patent 12578842
STRUCTURED SUGGESTIONS
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
69%
Grant Probability
99%
With Interview (+49.9%)
3y 4m
Median Time to Grant
Moderate
PTA Risk
Based on 188 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month