Prosecution Insights
Last updated: April 19, 2026
Application No. 19/058,668

MULTI-TABLE DATA STORAGE WITH AUDITABLE DATA CHANGES

Non-Final OA §101§103
Filed
Feb 20, 2025
Examiner
MORRIS, JOHN J
Art Unit
2152
Tech Center
2100 — Computer Architecture & Software
Assignee
The Toronto-Dominion Bank
OA Round
1 (Non-Final)
61%
Grant Probability
Moderate
1-2
OA Rounds
4y 0m
To Grant
81%
With Interview

Examiner Intelligence

Grants 61% of resolved cases
61%
Career Allow Rate
167 granted / 273 resolved
+6.2% vs TC avg
Strong +20% interview lift
Without
With
+20.1%
Interview Lift
resolved cases with interview
Typical timeline
4y 0m
Avg Prosecution
21 currently pending
Career history
294
Total Applications
across all art units

Statute-Specific Performance

§101
11.6%
-28.4% vs TC avg
§103
62.0%
+22.0% vs TC avg
§102
11.1%
-28.9% vs TC avg
§112
5.8%
-34.2% vs TC avg
Black line = Tech Center average estimate • Based on career data from 273 resolved cases

Office Action

§101 §103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION This Office Action corresponds to application 1/9058,668 which was filed on 2/20/2025 and claims benefit of 63/567,627 filed 03/20/2024. Claims 1-20 are currently pending. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea without significantly more. Step 1 The claims recite a system (claim 1), a method (claim 9), and a non-transitory computer-readable storage medium (claim 17). These claims fall within at least one of the four categories of patentable subject matter. Step 2A, Prong One Claim 1 recites identifying a database with data and transaction tables specifying a set of transactions as valid or invalid, receiving a request to store data, determining a transaction identifier for the request, storing the data, and storing the transaction identifier and valid indication. The recited steps identify and store data for information retrieval, which are acts of information evaluation and retrieval that can be practically performed in the human mind. For example, a person identify where a data is stored and whether they are storing valid data or not. The processor, storage medium, and database with tables are interpreted as generic computer components, e.g., generic data structures, and insignificant extra-solution activity of merely retrieving the data and monitoring the retrieval. Thus, these steps are an abstract idea in the “mental processes” grouping. Dependent claims 2-8 recite additional elements of querying the database, filtering the data, retrieving the data, specifying the data tables are not jointly idempotent, using a computer model, invalidating a transaction, specifying why the transaction would be invalidated, and rolling back invalid data. These are all further extensions of the abstract idea or mere extra-solution activity. For example, with claim 2, a person can access a ledger to assist in retrieving data; and claim 6, a person can identify erroneous data. Claim 9 recites identifying a database with data and transaction tables specifying a set of transactions as valid or invalid, receiving a request to store data, determining a transaction identifier for the request, storing the data, and storing the transaction identifier and valid indication. The recited steps identify and store data for information retrieval, which are acts of information evaluation and retrieval that can be practically performed in the human mind. For example, a person identify where a data is stored and whether they are storing valid data or not. The database with tables are interpreted as generic computer components, e.g., generic data structures, and insignificant extra-solution activity of merely retrieving the data and monitoring the retrieval. Thus, these steps are an abstract idea in the “mental processes” grouping. Dependent claims 10-16 recite additional elements of querying the database, filtering the data, retrieving the data, specifying the data tables are not jointly idempotent, using a computer model, invalidating a transaction, specifying why the transaction would be invalidated, and rolling back invalid data. These are all further extensions of the abstract idea or mere extra-solution activity. For example, with claim 10, a person can access a ledger to assist in retrieving data; and claim 14, a person can identify erroneous data. Claim 17 recites identifying a database with data and transaction tables specifying a set of transactions as valid or invalid, receiving a request to store data, determining a transaction identifier for the request, storing the data, and storing the transaction identifier and valid indication. The recited steps identify and store data for information retrieval, which are acts of information evaluation and retrieval that can be practically performed in the human mind. For example, a person identify where a data is stored and whether they are storing valid data or not. The processor, storage medium, and database with tables are interpreted as generic computer components, e.g., generic data structures, and insignificant extra-solution activity of merely retrieving the data and monitoring the retrieval. Thus, these steps are an abstract idea in the “mental processes” grouping. Dependent claims 18-20 recite additional elements of querying the database, filtering the data, retrieving the data, specifying the data tables are not jointly idempotent, and using a computer model. These are all further extensions of the abstract idea or mere extra-solution activity. For example, with claim 18, a person can access a ledger to assist in retrieving data. Step 2A, Prong Two This judicial exception is not integrated into a practical application because the combination of additional elements includes only generic computer elements which do not add a meaningful limitation to the abstract idea because they amount to simply implementing the abstract idea on a computer. For claims 1-8, the additional elements include the processor, memory, and database with tables. For claims 9-16, the additional elements include the database with tables. For claims 17-20, the additional elements include the non-transitory computer-readable storage medium, processor, memory, and database with tables. The processor, memory, database with tables, and non-transitory computer-readable storage medium are all recited at a high-level of generality (i.e., as a generic computer function) such that it amounts no more than mere instructions to apply the exception using a generic computer component. Accordingly, these additional elements do not integrate the abstract idea into a practical application because it does not impose any meaningful limits on practicing the abstract idea. The claims are directed to an abstract idea. Step 2B The claims do not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea into a practical application, the additional elements of using a processor, memory, database with tables, and non-transitory computer-readable storage medium to perform the steps or the additional elements from the dependent claims amounts to no more than part of the abstract idea, mere extra-solution activity, and mere instructions to apply the exception using a generic computer component. The claims are not patent eligible. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1-3, 9-11, and 17-19 is/are rejected under 35 U.S.C. 103 as being unpatentable over Wetterau et al. (US2021/0097036), hereinafter Wetterau, in view of Zhang (US2015/0278281). Regarding Claim 1: Wetterau teaches: A data management system comprising: a processor (Wetterau, figure 6, note processor); and a non-transitory computer-readable storage medium having instructions executable by the processor (Wetterau, figure 6, note processor and memory) for: identifying a database having a plurality of data tables and a transaction table, the transaction table specifying a set of transactions and whether each transaction is valid or invalid (Wetterau, figures 3A-5, [0017, 0098, 0124-0129, 0137], note identifying data tables and transaction tables in a storage system; note the transaction table stores state and version information which can be used to determine if the transaction is currently valid or invalid); receiving a request to store data to a plurality of separate data tables, the request specifying a first data entry for a first data table and a second data entry for a second data table (Wetterau, figures 3A-5, [0123], note receiving a request to perform a write data to multiple storage nodes); determining a transaction identifier for the request (Wetterau, figures 3A-5, [0129, 0137], note creating an entry in the transaction table includes creating/determining the transaction ID); storing the first data entry in the first data table in association with the transaction identifier (Wetterau, figures 3A-5, [0130], note executing the write transaction for each data entry, e.g., storing the data); storing the second data entry in the second data table in association with the transaction identifier (Wetterau, figures 3A-5, [0130], note executing the write transaction for each data entry, e.g., storing the data); and after storing the first and second data entries, storing the transaction identifier in the transaction table indicating that the transaction identifier is valid, wherein queries to the database are executed on transactions indicated as valid in the transaction table (Wetterau, figures 3A-5, [0130], note executing the write transaction for each data entry, e.g., storing the data, and then updating the status in the transaction table so subsequent queries may retrieve the requested objects). While Wetterau teaches storing data in data tables using a transaction table, Wetterau doesn’t teach storing the transaction identifier in the table after storing the first and second data entries. However, Zhang is in the same field of endeavor, data management, and Zhang teaches: after storing the first and second data entries, storing the transaction identifier in the transaction table indicating that the transaction identifier is valid, wherein queries to the database are executed on transactions indicated as valid in the transaction table (Zhang, [0006, 0014-0015], note the transaction IDs are updated when the transaction is complete. When combined with the previously cited reference this would be for the first and second data entries as taught by Wetterau). It would have been obvious to one of ordinary skill in the art before the effective date of filing to modify the cited references to incorporate the teachings of Zhang because all references are directed towards data management and because Zhang would expand upon the teachings of the previously cited references in data integrity which would improve the efficiency by utilizing transaction IDs to improve performance (Zhang, [0013-0016]). Regarding Claim 2: Wetterau as modified shows the system as disclosed above; Wetterau as modified further teaches: wherein the instructions for the data management system are further executable for: receiving, from a querying system, a query to the database (Wetterau, figure 5, [0130-0139], note receiving a query to read from the database); accessing the transaction table (Wetterau, figure 5, [0130-0139], note accessing the transaction table); filtering data in the transaction table to identify one or more transactions, each of the one or more transactions indicated as valid and associated with respective transaction identifiers (Wetterau, figure 5, [0130-0139], note determining which transactions are associated with the query, which is interpreted as filtering); retrieving, from the plurality of data tables, data associated with the one or more transaction identifiers (Wetterau, figure 5, [0130-0139], note determining which transactions are associated with the query and if the transactions are valid and ready to be retrieved, executing the query, e.g., retrieving the data associated with the transaction identifiers); applying the received query to the retrieved data to generate a query response (Wetterau, figure 5, [0130-0139], note determining which transactions are associated with the query and if the transactions are valid and ready to be retrieved, executing the query, e.g., retrieving the data associated with the transaction identifiers); and transmitting the query response to the querying system (Wetterau, figure 5, [0130-0139], note providing the data to the front end system or the client). Regarding Claim 3: Wetterau as modified shows the system as disclosed above; Wetterau as modified further teaches: wherein transactions to the plurality of data tables of the database are not jointly idempotent (Wetterau, figures , figures 3A-5, [0124-0139], note the data tables may not be jointly idempotent). Claim 9 discloses substantially the same limitations as claim 1 respectively, except claim 9 is directed to a method while claim 1 is directed to a system. Therefore claim 9 is rejected under the same rationale set forth for claim 1. Claim 10 discloses substantially the same limitations as claim 2 respectively, except claim 10 is directed to a method while claim 2 is directed to a system. Therefore claim 10 is rejected under the same rationale set forth for claim 2. Claim 11 discloses substantially the same limitations as claim 3 respectively, except claim 11 is directed to a method while claim 3 is directed to a system. Therefore claim 11 is rejected under the same rationale set forth for claim 3. Claim 17 discloses substantially the same limitations as claim 1 respectively, except claim 17 is directed to a non-transitory computer-readable storage medium while claim 1 is directed to a system. Therefore claim 17 is rejected under the same rationale set forth for claim 1. Claim 18 discloses substantially the same limitations as claim 2 respectively, except claim 18 is directed to a non-transitory computer-readable storage medium while claim 2 is directed to a system. Therefore claim 18 is rejected under the same rationale set forth for claim 2. Claim 19 discloses substantially the same limitations as claim 3 respectively, except claim 19 is directed to a non-transitory computer-readable storage medium while claim 3 is directed to a system. Therefore claim 19 is rejected under the same rationale set forth for claim 3. Claim Rejections - 35 USC § 103 Claim(s) 4, 12, and 20 is/are rejected under 35 U.S.C. 103 as being unpatentable over Wetterau in view of Zhang and Li et al. (US11709809), hereinafter Li. Regarding Claim 4: Wetterau as modified shows the system as disclosed above; Wetterau as modified doesn’t specifically teach wherein the data is an output of a trained computer model. However, Li is in the same field of endeavor, data management, and Li teaches: wherein the data is an output of a trained computer model (Li, column 6 lines 1-32, note the use of a fully-managed machine learning model on the data). It would have been obvious to one of ordinary skill in the art before the effective date of filing to modify the cited references to incorporate the teachings of Li because all references are directed towards data management and because Li would expand upon the teachings of the previously cited references in data management, accessibility, and accuracy which would improve the efficiency and use of the system by utilizing trained computer models on the data (Li, column 1 lines 7-41, column 6 lines 1-57). Claim 12 discloses substantially the same limitations as claim 4 respectively, except claim 12 is directed to a method while claim 4 is directed to a system. Therefore claim 12 is rejected under the same rationale set forth for claim 4. Claim 20 discloses substantially the same limitations as claim 4 respectively, except claim 20 is directed to a non-transitory computer-readable storage medium while claim 4 is directed to a system. Therefore claim 20 is rejected under the same rationale set forth for claim 4. Claim Rejections - 35 USC § 103 Claim(s) 5-8 and 13-16 is/are rejected under 35 U.S.C. 103 as being unpatentable over Wetterau in view of Zhang and Chrysanthakopoulos et al. (US2017/0374161), hereinafter Chrysanthakopoulos. Regarding Claim 5: Wetterau as modified shows the system as disclosed above; Wetterau as modified further teaches: Receiving a request to invalidate a transaction (Wetterau, figure 3c, [0120], note a transaction may be aborted) (Zhang, figure 2, [0014-0016, 0021, 0032-0033], note aborting a transaction); accessing the transaction table (Wetterau, figures 3A-5, [0124-0139], note accessing the transaction table for any operation to the data entries); filtering data in the transaction table to identify the transaction, the transaction indicated as valid and associated with a transaction identifier (Wetterau, figures 3A-5, [0130-0139], note determining which transactions are associated with the query, which is interpreted as filtering); and storing the transaction identifier as a new record in the transaction table, the new record associated with a new timestamp and indicating that the transaction is invalid (Wetterau, figures 3A-5, [01020, 0130], note updating the transaction table for the aborted transaction) (Zhang, figure 2, [0014-0016, 0031, 0039], note storing a new transaction ID and updating a transaction table for the aborted transaction indicating it is invalid). It would have been obvious to one of ordinary skill in the art before the effective date of filing to modify the cited references to incorporate the teachings of Zhang because all references are directed towards data management and because Zhang would expand upon the teachings of the previously cited references in data integrity which would improve the efficiency by utilizing transaction IDs to improve performance (Zhang, [0013-0016]). While Wetterau as modified teaches invalidating a transaction, Wetterau as modified doesn’t specifically state the request to abort is coming from the client. However, Chrysanthakopoulos is in the same field of endeavor, data management, and Chrysanthakopoulos teaches: receiving, from a client device, a request to invalidate a transaction (Chrysanthakopoulos, [0082], note the client may request to cancel a transaction, which is interpreted as invalidating the transaction). It would have been obvious to one of ordinary skill in the art before the effective date of filing to modify the cited references to incorporate the teachings of Chrysanthakopoulos because all references are directed towards data management and because Chrysanthakopoulos would expand upon the teachings of the previously cited references in data integrity and management which would improve the efficiency of the system by allowing transactions to be cancelled and thereby saving processing, space, and time. Regarding Claim 6: Wetterau as modified shows the system as disclosed above; Wetterau as modified further teaches: wherein the transaction is invalidated because at least one of the data entries corresponding to the transaction identifier is erroneous (Chrysanthakopoulos, figures 12-13, [0076, 0081-0082, 0088, 0090], note the transaction may fail due to data conflicts, which is interpreted as erroneous). It would have been obvious to one of ordinary skill in the art before the effective date of filing to modify the cited references to incorporate the teachings of Chrysanthakopoulos because all references are directed towards data management and because Chrysanthakopoulos would expand upon the teachings of the previously cited references in data integrity and management which would improve the efficiency of the system by allowing transactions to be cancelled and thereby saving processing, space, and time. Regarding Claim 7: Wetterau as modified shows the system as disclosed above; Wetterau as modified further teaches: wherein at least one other data entry corresponding to the transaction identifier is not erroneous (Wetterau, figures 3A-5, [0124-0139], note at least one data entry is not erroneous. Regarding Claim 8: Wetterau as modified shows the system as disclosed above; Wetterau as modified further teaches: wherein an earlier timestamped transaction representing the same data as the invalidated transaction is retrieved responsive to a query to the data management system (Zhang, [0014-0016, 0021, 0033], note aborted transactions may be rolled-backed transactions which means an earlier timestamped transaction representing the data is retrieved responsive to a query such as the querying as taught by Wetterau). It would have been obvious to one of ordinary skill in the art before the effective date of filing to modify the cited references to incorporate the teachings of Zhang because all references are directed towards data management and because Zhang would expand upon the teachings of the previously cited references in data integrity which would improve the efficiency by utilizing transaction IDs to improve performance (Zhang, [0013-0016]). Claim 13 discloses substantially the same limitations as claim 5 respectively, except claim 13 is directed to a method while claim 5 is directed to a system. Therefore claim 13 is rejected under the same rationale set forth for claim 5. Claim 14 discloses substantially the same limitations as claim 6 respectively, except claim 14 is directed to a method while claim 6 is directed to a system. Therefore claim 14 is rejected under the same rationale set forth for claim 6. Claim 15 discloses substantially the same limitations as claim 7 respectively, except claim 15 is directed to a method while claim 7 is directed to a system. Therefore claim 15 is rejected under the same rationale set forth for claim 7. Claim 16 discloses substantially the same limitations as claim 8 respectively, except claim 16 is directed to a method while claim 8 is directed to a system. Therefore claim 16 is rejected under the same rationale set forth for claim 8. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to JOHN J MORRIS whose telephone number is (571)272-3314. The examiner can normally be reached M-F 6:00-2:00 PM EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Neveen Abel-Jalil can be reached at 571-270-0474. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /JOHN J MORRIS/Examiner, Art Unit 2152 12/12/2025 /NEVEEN ABEL JALIL/Supervisory Patent Examiner, Art Unit 2152
Read full office action

Prosecution Timeline

Feb 20, 2025
Application Filed
Dec 12, 2025
Non-Final Rejection — §101, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12585666
CLOUD ENVIRONMENT DATA DISTRIBUTION
2y 5m to grant Granted Mar 24, 2026
Patent 12585630
METHOD AND APPARATUS FOR ANALYZING COVERAGE, BIAS, AND MODEL EXPLANATIONS IN LARGE DIMENSIONAL MODELING DATA
2y 5m to grant Granted Mar 24, 2026
Patent 12536137
VALIDATING DATA FOR INTEGRATION
2y 5m to grant Granted Jan 27, 2026
Patent 12530369
RESUME BACKUP OF EXTERNAL STORAGE DEVICE USING MULTI-ROOT SYSTEM
2y 5m to grant Granted Jan 20, 2026
Patent 12524397
AUTOMATED BATCH GENERATION AND SUBSEQUENT SUBMISSION AND MONITORING OF BATCHES PROCESSED BY A SYSTEM
2y 5m to grant Granted Jan 13, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
61%
Grant Probability
81%
With Interview (+20.1%)
4y 0m
Median Time to Grant
Low
PTA Risk
Based on 273 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month