Prosecution Insights
Last updated: April 19, 2026
Application No. 19/063,282

ARTIFICIAL INTELLIGENCE BASED METHODS AND SYSTEMS FOR PREDICTING OVERALL ACCOUNT-LEVEL RISKS OF CARDHOLDERS

Non-Final OA §101
Filed
Feb 25, 2025
Examiner
FU, HAO
Art Unit
3695
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
Mastercard International Incorporated
OA Round
1 (Non-Final)
50%
Grant Probability
Moderate
1-2
OA Rounds
3y 8m
To Grant
75%
With Interview

Examiner Intelligence

Grants 50% of resolved cases
50%
Career Allow Rate
268 granted / 535 resolved
-1.9% vs TC avg
Strong +25% interview lift
Without
With
+25.3%
Interview Lift
resolved cases with interview
Typical timeline
3y 8m
Avg Prosecution
41 currently pending
Career history
576
Total Applications
across all art units

Statute-Specific Performance

§101
32.9%
-7.1% vs TC avg
§103
42.0%
+2.0% vs TC avg
§102
6.7%
-33.3% vs TC avg
§112
8.3%
-31.7% vs TC avg
Black line = Tech Center average estimate • Based on career data from 535 resolved cases

Office Action

§101
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . This application is a CON of 17/739,056 05/06/2022 (now abandoned). The present amended claims 2-21 are similar to the abandoned claims of 17/739,056 filed on 12/11/2024. Foreign Priority Acknowledgment is made of applicant's claim for foreign priority based on an application filed in India on 05/08/2021. Status of Claims Claim 1 is cancelled. Claims 2-21 are currently pending and rejected. Claim Rejection – 35 U.S.C. 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 2-21 are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-statutory subject matter. The rationale for this finding is explained below. In the instant case, the claims are directed towards accessing transaction data, analyzing the accessed data, calculating a plurality of network risk scores, determining a most vulnerable risk that is likely to happen, and causing a preventive actions for the most vulnerable risk. The concept is clearly related to managing personal behavior associated with an account, thus the present claims fall within the Certain Method of Organizing Human Activity grouping. Moreover, the claimed steps could be performed mentally, thus the present claims also fall within the Mental Processes grouping. The claims do not include limitations that are “significantly more” than the abstract idea because the claims do not include an improvement to another technology or technical field, an improvement to the functioning of the computer itself, or meaningful limitations beyond generally linking the use of an abstract idea to a particular technological environment. Note that the limitations, in the instant claims, are done by the generically recited computer device. The limitations are merely instructions to implement the abstract idea on a computer and require no more than a generic computer to perform generic computer functions that are well-understood, routine and conventional activities previously known to the industry. Therefore, claims 2-21 are rejected under 35 U.S.C. 101 as being directed to non-statutory subject matter. Step 1: The claims 2-21 are directed to a process, machine, manufacture, or composition matter. In Alice Corp. Pty. Ltd. v. CLS Bank Intern., 134 S. Ct. 2347 (2014), the Supreme Court applied a two-step test for determining whether a claim recites patentable subject matter. First, we determine whether the claims at issue are directed to one or more patent-ineligible concepts, i.e., laws of nature, natural phenomenon, and abstract ideas. Id. at 2355 (citing Mayo Collaborative Servs. v. Prometheus Labs., Inc., 132 S. Ct. 1289, 1296–96 (2012)). If so, we then consider whether the elements of each claim, both individually and as an ordered combination, transform the nature of the claim into a patent-eligible application to ensure that the patent in practice amounts to significantly more than a patent upon the ineligible concept itself. Claims 2-9 are directed to a process (i.e., method claims). Claims 1-16 are directed to a machine (i.e. system claims). Claims 17-21 are directed to a manufacture (i.e., non-transitory computer readable storage medium claims). Step 2A: The claims are directed to an abstract idea. Prong One The present claims are directed towards accessing transaction data, analyzing the accessed data, calculating a plurality of network risk scores, determining a most vulnerable risk that is likely to happen, and causing a preventive actions for the most vulnerable risk. Claim 2, for example, recites accessing payment transaction data associated with a cardholder within a predetermined time period, generating a set of transaction features, determining a plurality of network risk scores based on the set of transaction features, aggregating the plurality of network risk scores to calculate an overall account risk score based on a statistical model, determining a most vulnerable risk that is likely to happen, and causing a preventive actions for the most vulnerable risk. The concept is clearly related to managing personal behavior associated with an account, thus the present claims fall within the Certain Method of Organizing Human Activity grouping. Moreover, the claimed steps could be performed mentally, since the claimed steps are mostly performing calculations with unspecified amount of data or computation difficulty. As such, the present claims also fall within the Mental Processes grouping. The performance of the claim limitations using generic computer components (i.e. a server system comprising a communication interface, a processor, and a memory) does not preclude the claim limitation from being in the certain methods of organizing human activity grouping and mental processes grouping. The use of machine learning models does not render the claims less abstract, because machine learning was well-known and the preset claims do not improve machine learning itself. Accordingly, this claim recites an abstract idea. Prong Two Independent claim 2 recites a server system as additional element. Independent claim 10 recites a server system comprising a communication interface, a memory, and a processor as additional elements. Independent claim 17 recites a non-transitory medium, and a processor of a system as additional elements. The additional elements are claimed to perform basic computer functions, such as accessing data from a database, generating data based on accessed data, performing calculations, and transmitting notification over network. Dependent claims 3-9, 11-16, and 18-21 do not recite any additional element. The recitation of the computer elements amounts to mere instruction to implement an abstract concept on computers. The present claims do not solve a problem specifically arising in the realm of computer networks. Rather, the present claims implement an abstract concept using existing computer technology in a networked computer environment. The present claims do not recite limitation that improve the functioning of computer, effect a physical transformation, or apply the abstract concept in some other meaningful way beyond generally linking the use of the abstract concept to a particular technological environment. As such, the present claims fail to integrate into a practical application. Step 2B: The claims do not recite additional elements that amount to significantly more than the abstract idea. Independent claim 2 recites a server system as additional element. Independent claim 10 recites a server system comprising a communication interface, a memory, and a processor as additional elements. Independent claim 17 recites a non-transitory medium, and a processor of a system as additional elements. Dependent claims 3-9, 11-16, and 18-21 do not recite any additional element. The additional elements are claimed to perform basic computer functions, such as accessing data from a database, generating data based on accessed data, performing calculations, and transmitting notification over network. According to MPEP 2106.05(d), “performing repetitive calculations”, “receiving, processing, and storing data”, “electronically scanning or extracting data from a physical document”, “electronic recordkeeping”, “storing and retrieving information in memory”, and “receiving or transmitting data over a network, e.g., using the Internet to gather data” are considered well-understood, routine, and conventional functions of computer. The present claims do not improve the functioning of computer technology. Simply implementing the abstract idea on a generic computer or using a computer as a tool to perform an abstract idea cannot integrate a judicial exception into a practical application at Step 2A or provide an inventive concept in Step 2B. Therefore, the present claims are ineligible for patent. Prior Art Cited Not Applied Wu et al. (Pub. No.: US 2022/0108329) is cited, because the prior art teaches the following limitations in independent claim 2, 10, and 17: accessing, by a server system, payment transaction data associated with a cardholder from a transaction database (see paragraph 0006, “a computer-implemented method for fraud prevention may include receiving transaction data associated with a plurality of transactions of at least one payment account”), the payment transaction data comprising a plurality of transaction indicators of payment transactions performed by the cardholder within a predetermined time period (see paragraph 0007, “the transaction data may include all transaction associated with the least one account during a preceding time period”; also see paragraph 0023, 0027, 0079, 0100, 0101, 0107, for example); generating, by the server system, a set of transaction features based, at least in part, on the plurality of transaction indicators (see paragraph 0112, 0117, “For example, transaction service provider system 102 and/or issuer system 104 may determine whether to accept or reject the subsequent transaction based solely on the fraud risk score or may determine whether to accept or reject the subsequent transaction based on the fraud risk score and other criteria(e.g., criteria otherwise used by transaction service provider system 102 and/or issuer system 104 to determine whether to accept and/or reject a transaction, such as a predictive model, a deep learning model, a set of rules, features of transaction data and/or attributes determined based thereon, any combination therefore, and/or the like)”); determining, by the server system, a plurality of network risk scores associated with the cardholder based, at least in part, on the set of transaction features and a set of trained machine learning models (see paragraph 0006, “A fraud score for each subperiod of a plurality of subperiods in a time period following the attempted attack(s) may be generated based on the transaction data using a deep learning model and a survival model”; see paragraph 0010, 0022 for generating risk scores using machine learning models; also see paragraph 0008, 0016, 0024, 0108 for different learning models); and transmitting, by the server system, a notification to an issuer server associated with the cardholder based, at least in part, on the overall account risk score (see paragraph 0115, “the further action may include sending a notification indicating that the payment account is in the high risk category (e.g., to issuer system 104, a fraud detection system (e.g., of transaction service provider system 102 and/or issuer system 104), and/or the like)”). Joa et al. (Pub. No.: US 2010/0070405) is cited, because the prior art teaches the following limitations in independent claim 2, 10, and 17: determining, by the server system, a plurality of network risk scores associated with the cardholder for a prediction window, where the plurality of network risk scores comprising at least one or more of: (a) a payment capacity risk score, (b) a contactless payment risk score, and (c) a set of account-level risk scores (see paragraph 0049, “Evaluation of wireless number risk scores may be employed by the financial institution extending credit or maintaining the deposit account. Sample factors considered in the wireless number risk analysis include wireless phone number, wireless phone model, length of wireless number ownership, amount of wireless bill, wireless service provider, number of distinct phone number called, number of late payments, number of nonsufficient (NSF) items, amount of NSF items, prior POS purchase history, prior credit history”; prior art considers a plurality of risk factors, which could be interpreted as category risk scores of an overall risk score; number of late payments, number of NSF items, and amount of NSF items are indications for payment capacity risk; wireless number risk including prior POS purchase history is an indication of a contactless payment risk; and prior credit history is an indication of account-level risk); and aggregating, by the server system, the plurality of network risk scores to calculate an overall account risk score associated with cardholder based, at least in part, on a statistical model (see paragraph 0028, “Wireless number risk scores may be used in conjunction with…other available risk identifiers in determining whether to grant these applications”, prior art teaches wireless number risk score is aggregated with other available risk scores to determine the overall risk of the account). However, neither Wu et al. nor Joa et al. teach “wherein the payment capacity risk score is determined by the following: calculating, by the server system, a credit burst score based, at least in part, on spend behavioral data associated with the cardholder; determining, by the server system, whether the credit burst score being at least equal to a pre-defined threshold value; and in response to determining that the credit burst score is at least equal to the pre-defined threshold value, determining, by the server system, an account attrition score and a non-sufficient funds (NSF) score associated with the cardholder”, as recited in the independent claims. Raptnapu et al. (Pub. No.: US 2020/0043006) teaches the concept of detecting risky account status by determining whether current spending amount is more than three deviations from the mean of all spend transactions (see paragraph 0024). Paragraph 0099 of applicant’s specification discloses that credit burst score may be calculated as mean + 2 sigma. However, Raptnapu et al. does not fulfill the deficiency of Wu et al. and Joa et al., as the prior art fails to teach “wherein the payment capacity risk score is determined by the following: calculating, by the server system, a credit burst score based, at least in part, on spend behavioral data associated with the cardholder; determining, by the server system, whether the credit burst score being at least equal to a pre-defined threshold value; and in response to determining that the credit burst score is at least equal to the pre-defined threshold value, determining, by the server system, an account attrition score and a non-sufficient funds (NSF) score associated with the cardholder”. Examiner points out that these novel features sit entirely in the realm of abstract concept. They are the abstract concept itself, thus they do not integrate the abstract concept into a practical application. Therefore, the present claims are still ineligible for patent under 35 U.S.C. 101. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to HAO FU whose telephone number is (571)270-3441. The examiner can normally be reached 9:00 AM - 6:00 PM PST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Christine M Behncke can be reached at (571) 272-8103. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /HAO FU/Primary Examiner, Art Unit 3695 FEB-2026
Read full office action

Prosecution Timeline

Feb 25, 2025
Application Filed
Apr 21, 2025
Response after Non-Final Action
Feb 13, 2026
Non-Final Rejection — §101
Mar 27, 2026
Applicant Interview (Telephonic)
Mar 27, 2026
Examiner Interview Summary

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12555165
SYSTEMS AND METHODS FOR USING SECONDARY MARKET FOR PRIMARY CREATION AND REDEMPTION ACTIVITY IN SECURITIES
2y 5m to grant Granted Feb 17, 2026
Patent 12541789
Structuring a Multi-Segment Operation
2y 5m to grant Granted Feb 03, 2026
Patent 12499486
MESSAGE PROCESSING PROTOCOL WHICH MITIGATES OPTIMISTIC MESSAGING BEHAVIOR
2y 5m to grant Granted Dec 16, 2025
Patent 12493915
MULTIVARIATE PREDICTIVE SYSTEM
2y 5m to grant Granted Dec 09, 2025
Patent 12475509
INTELLIGENT ITEM FINANCING
2y 5m to grant Granted Nov 18, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
50%
Grant Probability
75%
With Interview (+25.3%)
3y 8m
Median Time to Grant
Low
PTA Risk
Based on 535 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month