Prosecution Insights
Last updated: April 19, 2026
Application No. 19/240,001

Fingerprint data processing method, host device and wireless device with encrypted communications

Non-Final OA §102§103
Filed
Jun 17, 2025
Examiner
FLORES, ROBERTO W
Art Unit
2621
Tech Center
2600 — Communications
Assignee
Realtek Semiconductor Corp.
OA Round
1 (Non-Final)
49%
Grant Probability
Moderate
1-2
OA Rounds
2y 10m
To Grant
62%
With Interview

Examiner Intelligence

Grants 49% of resolved cases
49%
Career Allow Rate
260 granted / 533 resolved
-13.2% vs TC avg
Moderate +13% lift
Without
With
+13.0%
Interview Lift
resolved cases with interview
Typical timeline
2y 10m
Avg Prosecution
33 currently pending
Career history
566
Total Applications
across all art units

Statute-Specific Performance

§101
1.1%
-38.9% vs TC avg
§103
64.3%
+24.3% vs TC avg
§102
18.4%
-21.6% vs TC avg
§112
11.2%
-28.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 533 resolved cases

Office Action

§102 §103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. Claim(s) 1-3, 6-11 and 14-19 is/are rejected under 35 U.S.C. 102 (a) (1) as being anticipated by Lin et al. U.S. Patent Publication No. 2020/0162455 (hereinafter Lin). Consider claim 1, Lin teaches a fingerprint data processing method (Figure 6 and [0046], biometric and further refers to fingerprint) for a wireless communication system, the wireless communication system comprising a host device and a wireless device (Figure 6, devices 61 and 62-63), which communicate with each other through a wireless communication interface ([0057], Bluetooth communication protocol (see also figure 4)), the fingerprint data processing method comprising: generating, by the host device, a fingerprint recognition command (Figure 6, 601); driving, by the host device, a first wireless communication circuit to transmit a fingerprint recognition request to the wireless device through the wireless communication interface according to the fingerprint recognition command (Figure 6 and [0057], Bluetooth and request 601); receiving, by the wireless device, the fingerprint recognition request through the wireless communication interface (Figure 6 and [0057-0058], biometric authentication process), and obtaining, by the wireless device, fingerprint data according to the fingerprint recognition request ([0058], a biometric authentication process is activated in the multi-functional authentication apparatus 61 (step 602) for producing a biometric feature by a biometric module of the apparatus 61. [0046], biometric module and further refers to fingerprint recognition module); and driving, by the wireless device, a second wireless communication circuit to transmit the fingerprint data to the host device through the wireless communication interface (Figure 6, 603. [0057], Bluetooth); wherein the wireless communication interface forwards at least one of the fingerprint recognition request and the fingerprint data using an encrypted communication protocol ([0058], An encryption key is used to create a digital signature. The digital signature becomes a security code for the computer system 62 (step 603)). Consider claim 2, Lin teaches all the limitations of claim 1. In addition, Lin teaches wherein the wireless communication interface comprises a Bluetooth interface [0057], and each of the first wireless communication circuit and the second wireless communication circuit is a Bluetooth control circuit ([0057], Bluetooth protocol and corresponding circuit). Consider claim 3, Lin teaches all the limitations of claim 1. In addition, Lin teaches performing, by the wireless device (Figure 6, 61), fingerprint collection through a fingerprint circuit according to the fingerprint recognition request, to obtain a fingerprint image as the fingerprint data to be transmitted to the host device ([0058], biometric authentication process is activated in the multi-functional authentication apparatus 61 (step 602) for producing a biometric feature by a biometric module of the apparatus 61, and further refers to an encryption key is used to create a digital signature. [0046], the biometric module 209 can be a fingerprint recognition module that cooperates with the biometric feature access interface 210 disposed on a surface of the multi-functional authentication apparatus 20 for scanning a fingerprint image. The biometric feature can be extracted from the fingerprint image by the fingerprint recognition module). Consider claim 6, Lin teaches all the limitations of claim 1. In addition, Lin teaches performing, by the wireless device, fingerprint collection through a fingerprint circuit according to the fingerprint recognition request [0046] and [0058], to obtain a fingerprint image [0046]. Consider claim 7, Lin teaches all the limitations of claim 6. In addition, Lin teaches storing, by the wireless device, the fingerprint image as an enrolled fingerprint image ([0029], the multi-functional authentication apparatus requires a user to register his biometric feature, e.g. fingerprint…The multi-functional authentication apparatus also stores an encryption key (i.e. private key), and the encryption key is provided for a security algorithm to calculate a security code from the biometric feature by a security authentication module of the multi-functional authentication apparatus. The security code becomes an identity of the multi-functional authentication apparatus), the enrolled fingerprint image being the fingerprint data to be transmitted to the host device ([0030], the computer system can obtain the security code from the multi-functional authentication apparatus, and the security code acts as a certification for logging on the computer system. Figure 4 shows wireless communication between multi-functional apparatus 20 (wireless device) and computer device 30 (host device)). Consider claim 8, Lin teaches all the limitations of claim 6. In addition, Lin teaches matching, by the wireless device, the fingerprint image with an enrolled fingerprint image to generate an authentication result ([0042], The security chip has a memory that can be used to store the encryption key and the data relating to the biometric feature for comparison. When the multi-functional authentication apparatus 20 is initiated to process authentication, the biometric feature can be obtained by the biometric module 209. The biometric feature is then compared with the data stored in the memory of the security chip. [0046], the biometric feature can be extracted from the fingerprint image by the fingerprint recognition module. The security authentication module 202 accordingly generates the security code as shown in the above embodiments. The security code acts as a reference for identity authentication), the authentication result being the fingerprint data to be transmitted to the host device ([0058], For example, a biometric authentication process is activated in the multi-functional authentication apparatus 61 (step 602) for producing a biometric feature by a biometric module of the apparatus 61. A security authentication module (202, FIG. 2) of the multi-functional authentication apparatus 61 is used to calculate a hash value. An encryption key is used to create a digital signature. The digital signature becomes a security code for the computer system 62 (step 603). The security code is then encrypted by a corresponding software program running in the computer system 62 for forming authentication packets (step 604)). Consider claim 9, Lin teaches all the limitations of claim 6. In addition, Lin teaches wherein the step of the host device driving the first wireless communication circuit to transmit the fingerprint recognition request to the wireless device through the wireless communication interface according to the fingerprint recognition command comprises: generating a virtual interface built in an operating system of the host device ([0058], web browser); transmitting the fingerprint recognition command to the first wireless communication circuit through the virtual interface ([0057-0058] and figure 6, Bluetooth, 601); and outputting, by the first wireless communication circuit, the fingerprint recognition request according to the fingerprint recognition command ([0058] and figure 6, 601). Consider claim 10, Lin teaches a host device comprising: a fingerprint driver configured to generate a fingerprint recognition command ([0058] and figure 6, the computer system 62 requires identity authentication for accessing a network service); a wireless communication circuit configured to transmit a fingerprint recognition request through a wireless communication interface and receive fingerprint data through the wireless communication interface ([0057], Bluetooth communication protocol (see also [0057-0058)]; and a protocol converter, coupled between the fingerprint driver and the wireless communication circuit ([0057], an Application Programming Interface (API) used for web authentication in the authentication server 63 is embedded in a web browser running in the computer system 62), configured to drive the wireless communication circuit to output the fingerprint recognition request according to the fingerprint recognition command ([0058], the computer system 62 requires identity authentication for accessing a network service via a web browser (step 601)); wherein the wireless communication interface forwards at least one of the fingerprint recognition request and the fingerprint data using an encrypted communication protocol ([0058] and figure 6). Consider claim 11, Lin teaches all the limitations of claim 10. In addition, Lin teaches wherein the fingerprint data comprises a fingerprint image [0046] and [0058]. Consider claim 14, Lin teaches all the limitations of claim 10. In addition, Lin teaches wherein the protocol converter comprises: a virtual interface driver configured to generate a virtual interface built in an operating system of the host device ([0057], an Application Programming Interface (API)); and a service provider configured to communicate with the wireless communication circuit through the virtual interface ([0057], web browser), to transmit the fingerprint recognition command from the fingerprint driver to the wireless communication circuit through the virtual interface ([0058], In the beginning, as shown in the diagram, the computer system 62 requires identity authentication for accessing a network service via a web browser (step 601)). Consider claim 15, Lin teaches a wireless device, comprising: a wireless communication circuit configured to receive a fingerprint recognition request through a wireless communication interface and transmit fingerprint data through the wireless communication interface (Figure 6, multi-functional 61, request 601, biometric (e.g. fingerprint). [0057], Bluetooth); and a fingerprint circuit, coupled to the wireless communication circuit ([0058], biometric module), configured to generate the fingerprint data according to the fingerprint recognition request and transmit the fingerprint data to the wireless communication circuit [0058]; wherein the wireless communication interface forwards at least one of the fingerprint recognition request and the fingerprint data using an encrypted communication protocol [0058]. Consider claim 16, Lin teaches all the limitations of claim 15. In addition, Lin teaches wherein the wireless communication interface comprises a Bluetooth interface, and the wireless communication circuit is a Bluetooth control circuit (Figure 6 and [0057], Bluetooth). Consider claim 17, Lin teaches all the limitations of claim 15. In addition, Lin teaches wherein the fingerprint data comprises a fingerprint image obtained through fingerprint collection performed by the fingerprint circuit ([0046] and [0058], a biometric authentication process is activated in the multi-functional authentication apparatus 61 (step 602) for producing a biometric feature by a biometric module of the apparatus 61. A security authentication module (202, FIG. 2) of the multi-functional authentication apparatus 61 is used to calculate a hash value. An encryption key is used to create a digital signature. The digital signature becomes a security code for the computer system 62 (step 603). The security code is then encrypted by a corresponding software program running in the computer system 62 for forming authentication packets (step 604)). Consider claim 18, Lin teaches all the limitations of claim 15. In addition, Lin teaches wherein the fingerprint circuit is configured to perform fingerprint collection to obtain a fingerprint image, and store the fingerprint image as an enrolled fingerprint image ([0029], the multi-functional authentication apparatus requires a user to register his biometric feature, e.g. fingerprint…The multi-functional authentication apparatus also stores an encryption key (i.e. private key), and the encryption key is provided for a security algorithm to calculate a security code from the biometric feature by a security authentication module of the multi-functional authentication apparatus. The security code becomes an identity of the multi-functional authentication apparatus), wherein the fingerprint data comprises a fingerprint enrollment result corresponding to the enrolled fingerprint image ([0030], the computer system can obtain the security code from the multi-functional authentication apparatus, and the security code acts as a certification for logging on the computer system. Figure 4 shows wireless communication between multi-functional apparatus 20 (wireless device) and computer device 30 (host device)). Consider claim 19, Lin teaches all the limitations of claim 15. In addition, Lin teaches wherein the fingerprint circuit is configured to perform fingerprint collection to obtain a fingerprint image, and match the fingerprint image with an enrolled fingerprint image to generate an authentication result ([0042], The security chip has a memory that can be used to store the encryption key and the data relating to the biometric feature for comparison. When the multi-functional authentication apparatus 20 is initiated to process authentication, the biometric feature can be obtained by the biometric module 209. The biometric feature is then compared with the data stored in the memory of the security chip. [0046], the biometric feature can be extracted from the fingerprint image by the fingerprint recognition module. The security authentication module 202 accordingly generates the security code as shown in the above embodiments. The security code acts as a reference for identity authentication), wherein the fingerprint data comprises the authentication result ([0058], For example, a biometric authentication process is activated in the multi-functional authentication apparatus 61 (step 602) for producing a biometric feature by a biometric module of the apparatus 61. A security authentication module (202, FIG. 2) of the multi-functional authentication apparatus 61 is used to calculate a hash value. An encryption key is used to create a digital signature. The digital signature becomes a security code for the computer system 62 (step 603). The security code is then encrypted by a corresponding software program running in the computer system 62 for forming authentication packets (step 604)). Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claim(s) 4-5, 12, 13 and 20 is/are rejected under 35 U.S.C. 103 as being unpatentable over Lin as applied to claim 3 above, and further in view of Zhang U.S. Patent Publication No. 2024/0054200 (hereinafter Zhang). Consider claim 4, Lin teaches all the limitations of claim 3. In addition, Lin teaches the biometric feature can be extracted from the fingerprint image by the fingerprint recognition module in [0046]. Lin does not appear to specifically disclose storing, by the host device, the fingerprint data as an enrolled fingerprint data. However, in a related field of endeavor, Zhang teaches fingerprint recognition (abstract) and further teaches storing, by the host device, the fingerprint data as an enrolled fingerprint data ([0238], the electronic device and/or the accessory device may store one or more pieces of user fingerprint data. [0264-0267], the fingerprint processing module may match the to-be-verified fingerprint data with the fingerprint data prestored in the device). Therefore, it would have been obvious to one of the ordinary skill in the art before the effective filing date of the claimed invention to store fingerprint data by the electronic device as taught by Zhang with the benefit that if the to-be-verified fingerprint data successfully matches the prestored fingerprint data, it indicates that identity verification succeeds as suggested in [0267]. Consider claim 5, Lin teaches all the limitations of claim 3. In addition, Lin teaches the biometric feature can be extracted from the fingerprint image by the fingerprint recognition module in [0046]. Lin does not appear to specifically disclose matching, by the host device, the fingerprint data with an enrolled fingerprint data to generate an authentication result. However, Zhang teaches matching, by the host device, the fingerprint data with an enrolled fingerprint data to generate an authentication result ([0264-0267], the fingerprint processing module may match the to-be-verified fingerprint data with the fingerprint data prestored in the device). Therefore, it would have been obvious to one of the ordinary skill in the art before the effective filing date of the claimed invention to match fingerprint data by the electronic device as taught by Zhang with the benefit that if the to-be-verified fingerprint data successfully matches the prestored fingerprint data, it indicates that identity verification succeeds as suggested in [0267]. Consider claim 12, Lin teaches all the limitations of claim 11. In addition, Lin teaches the biometric feature can be extracted from the fingerprint image by the fingerprint recognition module in [0046]. Lin does not appear to specifically disclose wherein the fingerprint driver is configured to store the fingerprint data as an enrolled fingerprint data, or match the fingerprint data with the enrolled fingerprint data to generate an authentication result. However, Zhang teaches wherein the fingerprint driver is configured to store the fingerprint data as an enrolled fingerprint data, or match the fingerprint data with the enrolled fingerprint data to generate an authentication result ([0238], the electronic device and/or the accessory device may store one or more pieces of user fingerprint data. [0264-0267], the fingerprint processing module may match the to-be-verified fingerprint data with the fingerprint data prestored in the device). Therefore, it would have been obvious to one of the ordinary skill in the art before the effective filing date of the claimed invention to store fingerprint data by the electronic device as taught by Zhang with the benefit that If the to-be-verified fingerprint data successfully matches the prestored fingerprint data, it indicates that identity verification succeeds as suggested in [0267]. Consider claim 13, Lin teaches all the limitations of claim 10. In addition, Lin teaches the biometric feature can be extracted from the fingerprint image by the fingerprint recognition module in [0046]. Lin does not appear to specifically disclose wherein the fingerprint data comprises an authentication result, and the authentication result is generated by matching a collected fingerprint data with an enrolled fingerprint image. However, Zhang teaches wherein the fingerprint data comprises an authentication result, and the authentication result is generated by matching a collected fingerprint data with an enrolled fingerprint image ([0238], the electronic device and/or the accessory device may store one or more pieces of user fingerprint data. [0264-0267], the fingerprint processing module may match the to-be-verified fingerprint data with the fingerprint data prestored in the device). Therefore, it would have been obvious to one of the ordinary skill in the art before the effective filing date of the claimed invention to store fingerprint data by the electronic device as taught by Zhang with the benefit that If the to-be-verified fingerprint data successfully matches the prestored fingerprint data, it indicates that identity verification succeeds as suggested in [0267]. Consider claim 20, Lin teaches all the limitations of claim 15. In addition, Lin teaches present example shows a card-type multi-functional authentication apparatus 10, the appearance of the apparatus is not limited by the present disclosure in [0031] Lin does not appear to specifically disclose wherein the wireless device is a wireless mouse or a wireless keyboard. However, Zhang teaches wherein the wireless device is a wireless mouse or a wireless keyboard (Figure 1 and [0154], 102). Therefore, it would have been obvious to one of the ordinary skill in the art before the effective filing date of the claimed invention to provide a wireless mouse or keyboard as taught by Zhang with the benefit that device 102 is an auxiliary device configured to assist a user in operating the electronic device as suggested in [0154] and figure 1. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to ROBERTO W FLORES whose telephone number is (571)272-5512. The examiner can normally be reached Monday-Friday, 7am-4pm, EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, AMR A AWAD can be reached at (571)272-7764. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /ROBERTO W FLORES/Primary Examiner, Art Unit 2621
Read full office action

Prosecution Timeline

Jun 17, 2025
Application Filed
Feb 17, 2026
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12597392
ORGANIC LIGHT EMITTING DIODE DISPLAY SYSTEM
2y 5m to grant Granted Apr 07, 2026
Patent 12592202
Display Device and Driving Method Thereof
2y 5m to grant Granted Mar 31, 2026
Patent 12586517
IMAGE DISPLAY APPARATUS, AND VIDEO WALL INCLUDING THE SAME
2y 5m to grant Granted Mar 24, 2026
Patent 12586536
DISPLAY DEVICE AND VEHICLE SYSTEM INCLUDING IT
2y 5m to grant Granted Mar 24, 2026
Patent 12578805
INFORMATION HANDLING SYSTEM DISPLAY SEAMLESS KVM SWITCH
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
49%
Grant Probability
62%
With Interview (+13.0%)
2y 10m
Median Time to Grant
Low
PTA Risk
Based on 533 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month