Prosecution Insights
Last updated: April 19, 2026
Application No. 19/013,133

QUANDLE-BASED CRYPTOPGRAPHIC FRAMEWORK

Non-Final OA §112
Filed
Jan 08, 2025
Examiner
LIPMAN, JACOB
Art Unit
2434
Tech Center
2400 — Computer Networks
Assignee
BAR ILAN UNIVERSITY
OA Round
1 (Non-Final)
84%
Grant Probability
Favorable
1-2
OA Rounds
2y 10m
To Grant
98%
With Interview

Examiner Intelligence

Grants 84% — above average
84%
Career Allow Rate
654 granted / 782 resolved
+25.6% vs TC avg
Moderate +14% lift
Without
With
+14.1%
Interview Lift
resolved cases with interview
Typical timeline
2y 10m
Avg Prosecution
33 currently pending
Career history
815
Total Applications
across all art units

Statute-Specific Performance

§101
3.6%
-36.4% vs TC avg
§103
39.4%
-0.6% vs TC avg
§102
31.0%
-9.0% vs TC avg
§112
17.1%
-22.9% vs TC avg
Black line = Tech Center average estimate • Based on career data from 782 resolved cases

Office Action

§112
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Information Disclosure Statement The information disclosure statement (IDS) submitted on 21 April 2025 and 21 October 2025 have been considered by the examiner. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 1-23 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Claim 1 recites the limitation "generate a ciphertext (c) based on the message (x), the encoding variable (y), and the public encryption key (e)", after which, it displays a formula that calculates the ciphertext (c) using binary functions based on the message (x), the encoding variable (y), but does not include the public encryption key (e) in the formula. These seem to contradict one and other. . It is further unclear how the private key (f) is used, as the claim text again seems to contradict the formula. It is unclear if and how the public encryption key (e) is used in generating the ciphertext (c) and if and how private key (f) is used to decode the ciphertext. This renders the claim indefinite. Claim 14 recites the limitation "generating, using the encoder, a ciphertext (c) based on the message (x), the encoding variable (y), and the public encryption key (e)", after which, it displays a formula that calculates the ciphertext (c) using binary functions based on the message (x), the encoding variable (y), but does not include the public encryption key (e) in the formula. These seem to contradict one and other. It is further unclear how the private key (f) is used, as the claim text again seems to contradict the formula. It is unclear if and how the public encryption key (e) is used in generating the ciphertext (c) and if and how private key (f) is used to decode the ciphertext. This renders the claim indefinite. Claim 20 recites the limitation "the ciphertext is generated (c) based on the message (x), the encoding variable (y), and the public encryption key (e)", after which, it displays a formula that calculates the ciphertext (c) using binary functions based on the message (x), the encoding variable (y), but does not include the public encryption key (e) in the formula. These seem to contradict one and other. It is further unclear how the private key (f) is used, as the claim text again seems to contradict the formula. It is unclear if and how the public encryption key (e) is used in generating the ciphertext (c) and if and how private key (f) is used to decode the ciphertext. This renders the claim indefinite. Allowable Subject Matter Claims 1-23, as best understood, would be allowable if the claimed formulas were amended to include the public and private keys role, as indicated in the claimed text. The following is a statement of reasons for the indication of allowable subject matter: With regard to claim 1, Honorio Araujo da Silver et al., USPN 2022/0407719, discloses a system for implementing secure communication (0022), the system including an encoder, wherein the encoder is configured to receive a message (the rational number), an encoding variable (using p-adic based integer Hensel encoding as a function of a Hensel encoding value v), and a public encryption key (public key n), generate a ciphertext (c) based on the message (x), the encoding variable (y), and the public encryption key (e) (0009), and transmit the ciphertext (c) on a communication channel, wherein the communication channel is operatively coupled to the encoder (Fig. 1); and a decoder operatively coupled to the communication channel, wherein the decoder is configured to receive the ciphertext (c), the encoding variable (y), and a private encryption key (f) (009-0010), and generate a deciphered form (x') of the message (x) based on the ciphertext (c), the encoding variable (y), and the private encryption key (f), (0009-0010), but does not disclose using binary operations that satisfy axioms of a quandle. It would not have been obvious for one of ordinary skill in the art, prior to the instant effective filing date, to add this limitation to the system of Honorio Araujo da Silver without the benefit of hindsight. References Cited Chandrasekaran, USPN 2011/0096926, discloses a system of for implementing secure communication (0003) implementing using knots (0007), and Reidemeister moves against a knot (0029) using symmetric keys (0041). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to JACOB LIPMAN whose telephone number is (571)272-3837. The examiner can normally be reached 5:30AM-6:00PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Ali Shayanfar can be reached at 571-270-1050. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /JACOB LIPMAN/Primary Examiner, Art Unit 2434
Read full office action

Prosecution Timeline

Jan 08, 2025
Application Filed
Feb 24, 2026
Non-Final Rejection — §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12585819
SYSTEMS, METHODS, AND MEDIA FOR GENERATING DOCUMENTS CONTAINING CONFIDENTIAL INFORMATION
2y 5m to grant Granted Mar 24, 2026
Patent 12585748
RECONFIGURABLE BRAILLE BOARD-BASED AUTHENTICATION SYSTEM AND METHOD THEREFOR
2y 5m to grant Granted Mar 24, 2026
Patent 12579233
APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROACTIVE OFFLINE AUTHENTICATION
2y 5m to grant Granted Mar 17, 2026
Patent 12530442
DEVICE FOR AUTOMATICALLY DETECTING COUPLING BETWEEN ELECTRONIC DEVICES
2y 5m to grant Granted Jan 20, 2026
Patent 12511363
METHOD AND TOKEN FOR DOCUMENT AUTHENTICATION
2y 5m to grant Granted Dec 30, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
84%
Grant Probability
98%
With Interview (+14.1%)
2y 10m
Median Time to Grant
Low
PTA Risk
Based on 782 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month