`Doc code: RCEX
`Approved for use through 071312012. 0MB 0551—0031
`Doc description: Request for Continued Examination (RCE)
`us. Patent and Trademark Office; us. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`
`
`REQUEST FOR CONTINUED EXAMINATION(RCE)TRANSMITTAL
`
`(Submitted Only via EFS-Web)
`
`D°°ket Number W0537-700620
`2007—06—26
`11758729
`Appllcatlon
`
`Number
`(if applicable)
`
`3- W- Dada
`Examlner
`F'rSt Named Kenneth P. Weiss
`Name
`Inventor
`
`
`This is a Request for Continued Examination (RCE) under 37 CFR 1.1 14 of the above-identified application.
`Request for Continued Examination (RCE) practice under 37 CFR 1.114 does not apply to any utility or plant application filed prior to June 8,
`1995, or to any design application. The Instruction Sheet for this form is located at WWW.USPTO.GOV
`
`SUBMISSION REQUIRED UNDER 37 CFR1.114
`
`
`Note: If the RCE is proper, any previously filed unentered amendments and amendments enclosed with the RCE will be entered in the order
`in which they were filed unless applicant instructs othenpvise. If applicant does not wish to have any previously filed unentered amendment(s)
`entered, applicant must request non—entry of such amendment(s).
`
`Previously submitted. If a final Office action is outstanding, any amendments filed after the final Office action may be considered as a
`submission even if this box is not checked.
`
`|:| Consider the arguments in the Appeal Brief or Reply Brief previously filed on
`
`|:| Other
`
`E Enclosed
`
`Amendmentheply
`
`Information Disclosure Statement (IDS)
`
`|:| Affidavit(s)l Declaration(s)
`
`|:| Other
`
`MISCELLANEOUS
`
`El Suspension of action on the above-identified application is requested under 37 CFR 1.103(c) for a period of months
`(Period of suspension shall not exceed 3 months; Fee under 37 CFR 1.17(i) required)
`
`|:| Other
`
`|:| Applicant Signature
`
`The RCE fee under 37 CFR 1.17(e) is required by 37 CFR 1.114 when the RCE is filed.
`The Director is hereby authorized to charge any underpayment of fees, or credit any overpayments, to
`Deposit Account No
`50/2762
`
`FEES
`
`SIGNATURE OF APPLICANT, ATTORNEY, OR AGENT REQUIRED
`
`Patent Practitioner Signature
`
`EFS — Web 2.1.15
`
`1
`
`Apple 1020
`Apple 1020
`
`1
`
`
`
`PTO/SBBOEFS (07—09)
`Doc code: RCEX
`Approved for use through 071312012. 0MB 0551—0031
`Doc description: Request for Continued Examination (RCE)
`us. Patent and Trademark Office; us. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`
`Signature of Registered U.S. Patent Practitioner
`
` Name
`
`Matthew H. Grady
`
`Registration Number
`
`52957
`
`This collection of information is required by 37 CFR 1.114. The information is required to obtain or retain a benefit by the public which is to
`file (and by the USPTO to process) an application. Confidentiality is governed by 35 U_S.C_ 122 and 37 CFR 1.11 and 1.14. This collection is
`estimated to take 12 minutes to complete, including gathering, preparing, and submitting the completed application form to the USPTO. Time
`will vary depending upon the individual case. Any comments on the amount of time you require to complete this form and/or suggestions for
`reducing this burden, should be sent to the Chief Information Officer, US. Patent and Trademark Office, US. Department of Commerce,
`PO. Box 1450, Alexandria, VA 22313—1450.
`if you need assistance in completing the form, call 1—800—PTO—9199 and select option 2.
`
`EFS - Web 2.1.15
`
`2
`
`
`
`Privacy Act Statement
`
`The Privacy Act of 1974 (P.L. 93-579) requires that you be given certain information in connection with your submission of the
`attached form related to a patent application or patent. Accordingly, pursuant to the requirements of the Act, please be
`advised that:
`(1) the general authority for the collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the information
`solicited is voluntary; and (3) the principal purpose for which the information is used by the US. Patent and Trademark Office
`is to process and/or examine your submission related to a patent application or patent.
`If you do not furnish the requested
`information, the US Patent and Trademark Office may not be able to process and/or examine your submission, which may
`result in termination of proceedings or abandonment of the application or expiration of the patent.
`
`The information provided by you in this form will be subject to the following routine uses:
`
`1.
`
`The information on this form will be treated confidentially to the extent allowed under the Freedom of Information
`Act (5 U.S.C. 552) and the Privacy Act (5 U.S.C. 552a). Records from this system of records may be disclosed to the
`Department of Justice to determine whether the Freedom of Information Act requires disclosure of these records.
`
`enforcement agency, if the USPTO becomes aware of a violation or potential violation of law or regulation.
`
`A record from this system of records may be disclosed, as a routine use, in the course of presenting evidence to a
`court, magistrate, or administrative tribunal, including disclosures to opposing counsel in the course of settlement
`negotiations.
`
`A record in this system of records may be disclosed, as a routine use, to a Member of Congress submitting a
`request involving an individual, to whom the record pertains, when the individual has requested assistance from the
`Member with respect to the subject matter of the record.
`
`A record in this system of records may be disclosed, as a routine use, to a contractor of the Agency having need
`for the information in order to perform a contract. Recipients of information shall be required to comply with the
`requirements of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(m).
`
`A record related to an International Application filed under the Patent Cooperation Treaty in this system of records
`may be disclosed, as a routine use, to the International Bureau of the World Intellectual Property Organization,
`pursuant to the Patent Cooperation Treaty.
`
`A record in this system of records may be disclosed, as a routine use, to another federal agency for purposes of
`National Security review (35 U.S.C. 181) and for review pursuant to the Atomic Energy Act (42 U.S.C. 218(c)).
`
`A record from this system of records may be disclosed, as a routine use, to the Administrator, General Services,
`or his/her designee, during an inspection of records conducted by GSA as part of that agency's responsibility to
`recommend improvements in records management practices and programs, under authority of 44 U.S.C. 2904 and
`2906. Such disclosure shall be made in accordance with the GSA regulations governing inspection of records for this
`purpose, and any other relevant (i.e., GSA or Commerce) directive. Such disclosure shall not be used to make
`determinations about individuals.
`
`A record from this system of records may be disclosed, as a routine use, to the public after either publication of
`the application pursuant to 35 U.S.C. 122(b) or issuance of a patent pursuant to 35 U.S.C. 151. Further, a record may
`be disclosed, subject to the limitations of 37 CFR 1.14, as a routine use, to the public if the record was filed in an
`application which became abandoned or in which the proceedings were terminated and which application is
`referenced by either a published application, an application open to public inspections or an issued patent.
`
`A record from this system of records may be disclosed, as a routine use, to a Federal, State, or local law
`
`EFS — Web 2.1.15
`
`3
`
`3
`
`
`
`I hereby certify that this paper (along with any paper referred to as being attached
`or enclosed) is being transmitted via the Office electronic filing system in
`accordance with 37 CFR § 1.6(a)(4).
`
`:
`
`y
`
`.
`
`Doc’ket N0.' W05(3P7A_’¥£)1S¥;
`
`Elaetagonichgignzatiurzeofosr Matthew H. Grady:
`
`/Matthew H. Grady/
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`In re Patent Application of:
`Kenneth P. Weiss
`
`Application No.: 11/768,729
`
`Confirmation No.: 3536
`
`Filed: June 26, 2007
`
`Art Unit: 2435
`
`
`For: UNIVERSAL SECURE REGISTRY
`
`Examiner: B. W. Dada
`
`AMENDMENT
`
`Commissioner for Patents
`
`Dear Madam:
`
`INTRODUCTORY COMMENTS
`
`In conjunction with a Request for Continued Examination and in response to the
`
`Advisory Action mailed on May 1, 2013 and the Final Office Action mailed on December 18,
`
`2012, please amend the above-identified application as follows: Changes to the claims are
`
`shown by strike through (for deleted matter) and underlining (for added matter).
`
`Amendments to the Claims are reflected in the listing of claims which begins on page 2
`
`of this paper.
`
`Remarks/Arguments begin on page 10 of this paper.
`
`1601508.l
`
`4
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`2
`
`Docket No.: W0537-700620
`
`AMENDMENTS TO THE CLAIMS
`
`This listing of claims will replace all prior versions, and listings, of claims in the
`application.
`
`Listing of Claims:
`
`1.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time—varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time—varying multicharacter code representing an identity of one of
`
`the respective entities; and
`
`a processor configured to receive, from the first party, at least the time-varying
`
`multicharacter code for the entity on whose behalf a transaction is to be performed, configured to
`
`map the time—varying multicharacter code to the identity of the entity in the database using en-l—y
`
`the time-varying multicharacter code, to execute a restriction mechanism configured to
`
`determine compliance with any access restrictions for the first party to secure data for
`
`completing the transaction, and to allow or not allow access Q secure data associated with the
`
`entity including information required to enable the transaction, the information including
`
`account identifying information, where the account identifying information is unknown—LN
`
`provided to the first partyrte—previdefll the account identifying information is provided to a
`
`third party to enable the transaction with the first party and without providing the account
`
`identifying information to the first party.
`
`2.
`
`3.
`
`(Canceled)
`
`(Previously Presented) The system of claim 1, wherein the time-varying multicharacter
`
`code is provided to the system Via a secure electronic transmission device.
`
`4.
`
`(Previously Presented) The system of claim 1, wherein the time-varying multicharacter
`
`code is encrypted and transmitted to the system, and
`
`5
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`3
`
`Docket No.: W0537-700620
`
`wherein the system is configured to decrypt the tirne—varying multicharacter code with a
`
`public key of the entity.
`
`5.
`
`(Previously Presented) The system as claimed in claim 1, wherein the transaction
`
`includes a service provided by the first party,
`
`wherein said first party’s service includes delivery,
`
`wherein the information is an address to which an item is to be delivered to the entity,
`
`wherein the system receives the time-varying multicharacter code, and
`
`wherein the system uses the time-varying multicharacter code to obtain the appropriate
`
`address for delivery of the item by the third party.
`
`6.
`
`7.
`
`8.
`
`9.
`
`(Canceled)
`
`(Canceled)
`
`(Canceled)
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information includes credit card account information regarding the entity, and wherein the
`
`processor is configured to provide the credit card account information based upon the
`
`multicharacter code of the entity to enable the transaction.
`
`10.
`
`(Previously Presented) The system as claimed in claim 9, wherein the system is
`
`configured to receive an approval of the credit card transaction.
`
`11.
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information includes bank card account information regarding the entity, and wherein the
`
`processor is configured to provide the bank card account information to enable the transaction
`
`based upon the multicharacter code of the entity.
`
`6
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`4
`
`Docket No.: W0537-700620
`
`12.
`
`(Previously Presented) The system as claimed in claim 11, wherein the system is
`
`configured to provide an approval of the bank card transaction.
`
`13.
`
`(Previously Presented) The system as claimed in claim 1, wherein the information
`
`includes personal identification information regarding the entity.
`
`14.
`
`(Previously Presented) The system as claimed in claim 13, wherein the personal
`
`identification information comprises a photograph of the entity, and wherein the photograph is
`
`provided to the first party.
`
`15.
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information identifies email address information regarding the entity.
`
`16.
`
`(Currently Amended) A method for providing information to a first party to enable
`
`transactions between the first party and entities who have secure data stored in a secure regisz
`
`in which each entity is identified by a time-varying multicharacter code, the method comprising:
`
`receiving the time-varying multicharacter code for an entity on whose behalf a
`
`transaction is to take place;
`
`mapping the time—varying multicharacter code to an identity of the entity in a database
`
`using only the time-varying multicharacter code;
`
`determining compliance based—en with any access restrictions for the first party to secure
`
`data for completing the transaction;
`
`accessing information required to perform the transaction, the information including
`
`account identifying information—unknown—te—thefirst—pafi—y;
`
`providing the account identifying information to a third party without providing the
`
`account identifying information to the first party; and
`
`using the account identifying information to enable the first party to perform the
`
`transaction without the first party’s knowledge of the account identifying information.
`
`17.
`
`(Canceled)
`
`7
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`5
`
`18.
`
`(Canceled)
`
`Docket No.: W0537-700620
`
`19.
`
`(Previously Presented) The method of claim 16, wherein the act of receiving the time-
`
`varying multicharacter code comprises receiving the time—varying multicharacter code
`
`transmitted via a secure electronic transmission device.
`
`20.
`
`(Previously Presented) The method of claim 16, wherein the act of receiving the time—
`
`varying multicharacter code comprises receiving an encrypted multicharacter code, and
`
`wherein the method further comprises decrypting the encrypted multicharacter code.
`
`21.
`
`(Previously Presented) The method as claimed in claim 16, wherein the transaction
`
`includes a service provided by the first party,
`
`wherein the service includes delivery,
`
`wherein the account identifying information is associated with an address to which an
`
`item is to be delivered for the entity, and
`
`wherein the third party receives the address for delivery of an item provided by the first
`
`party.
`
`22.
`
`(Canceled)
`
`23.
`
`(Canceled)
`
`24.
`
`(Previously Presented) The method as claimed in claim 16, wherein the account
`
`identifying information includes a credit card number, and wherein the act of using the account
`
`identifying information comprises using the credit card number to enable the transaction.
`
`25.
`
`(Previously Presented) The method as claimed in claim 24, wherein the act of using the
`
`account identifying information comprises receiving a validation or denial of the transaction
`
`without providing the credit card number of the entity to the first party.
`
`8
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`6
`
`Docket No.: W0537-700620
`
`26.
`
`(Previously Presented) The method as claimed in claim 16, wherein the act of using the
`
`account identifying information comprises using bank card information about the entity to
`
`enable a transaction.
`
`27.
`
`(Previously Presented) The method as claimed in claim 26, wherein the act of using the
`
`information comprises receiving a validation or denial of the bank card transaction without
`
`providing a bank card number of the entity to the first party.
`
`28.
`
`(Previously Presented) The method as claimed in claim 16, wherein the act of mapping
`
`the time—varying multicharacter code to information required by the first party comprises
`
`mapping the time—varying multicharacter code to personal identification information about the
`
`entity.
`
`29.
`
`(Previously Presented) The method as claimed in claim 28, wherein the personal
`
`identification information comprises a photograph of the entity, and
`
`wherein the method further comprises an act of providing the photograph to the first
`
`party.
`
`30.
`
`(Previously Presented) The method as claimed in claim 16, wherein the account
`
`identifying information identifies email address information about the entity.
`
`31.
`
`(Canceled).
`
`32.
`
`(Previously Presented) The method as claimed in claim 24, further comprising an act of
`
`transmitting to the first party one of an approval or a denial of the credit card transaction.
`
`33.
`
`(Previously Presented) The system of claim 1, wherein the database is further configured
`
`to associate biometric information with each entity having secure data in the secure registry,
`
`respectively.
`
`9
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`7
`
`Docket No.: W0537-700620
`
`34.
`
`(Previously Presented) The system of claim 33, wherein the processor is further
`
`configured to map the time-varying multicharacter code to biometric information associated with
`
`the entity on whose behalf the transaction is to be performed and to provide the biometric
`
`information to the first party.
`
`35.
`
`(Previously Presented) The system of claim 34, wherein the biometric information
`
`includes an image of the entity on whose behalf the transaction is to be performed.
`
`36.
`
`(Previously Presented) The system of claim 34, wherein the time-varying multicharacter
`
`code is generated by a device associated with the entity on whose behalf the transaction is to be
`
`performed.
`
`37.
`
`(Previously Presented) The method as claimed in claim 16, further comprising an act of
`
`associating biometric information with each entity having secure data in the secure registry,
`
`respectively.
`
`38.
`
`(Previously Presented) The method of claim 37, further comprising acts of:
`
`mapping the time—varying multicharacter code to biometric information associated with
`
`the entity on whose behalf the transaction is to be performed; and
`
`providing the biometric information to the first party.
`
`39.
`
`(Previously Presented) The method of claim 38, wherein the biometric information
`
`includes an image of the entity on whose behalf the transaction is to be performed.
`
`40.
`
`(Canceled).
`
`41.
`
`(Previously Presented) The system of claim 1, wherein the account identifying
`
`information includes an account number.
`
`10
`
`10
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`8
`
`Docket No.: W0537-700620
`
`42.
`
`(Previously Presented) The system of claim 41, wherein the account identifying
`
`information includes credit card account information and the account number includes a credit
`
`card number.
`
`43.
`
`(Previously Presented) The system of claim 41, wherein the third party includes a
`
`financial service provider and the account number includes at least one of a debit card number
`
`and a credit card number.
`
`44.
`
`(Previously Presented) The system of claim 43, wherein the first party includes a
`
`merchant, and the service includes a sale of at least one of goods and services.
`
`45.
`
`(Previously Presented) The system of claim 44, wherein the processor is further
`
`configured to receive, from the first party, a merchant ID, and a purchase amount.
`
`46.
`
`(Previously Presented) The system of claim 1, wherein the identity of the entity is
`
`unknown until the time-varying code is mapped to the identity by the processor.
`
`47.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time-varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time-varying multicharacter code representing an identity of one of
`
`the respective entities, wherein the database is configured to permit or deny access to
`
`information on the respective entity using the time—varying multicharacter code; and
`
`a processor configured to receive; the time-varying multicharacter code for the entity on
`
`whose behalf a transaction is to be performed, configured to map the time-varying
`
`multicharacter code to the identity of the entity to identify the entity, configured to execute a
`
`restriction mechanism configured—to determine compliance with any access restrictions for the
`
`first party to secure data for completing the transaction, configured to obtain from the database
`
`the secure data associated with the entity including information required to enable the
`
`11
`
`11
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`9
`
`Docket No.: W0537-700620
`
`transaction, the information including account identifying information, and configured to
`
`provide the account identifying information to a third party to enable the transaction without
`
`providing the account identifying information to the first party.
`
`48.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time-varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time—varying multicharacter code representing an identity of one of
`
`the respective entities; and
`
`a processor configured to receive the time-varying multicharacter code for the entity on
`
`whose behalf a transaction is to be performed, configured to map the time-varying
`
`multicharacter code to the identity of the entity without requiring further information to identify
`
`the entity, configured to access from the database secure data associated with the entity
`
`including information required to enable the transaction, the information including account
`
`identifying information, and configured to provide the account identifying information to a third
`
`party to enable the transaction without providing the account identifying information to the first
`
`party, and wherein enabling the transaction without providing account identifying information to
`
`the first party includes limiting the—aeeeunt—identifyi—n—g transaction information provided by the
`
`secure registry system to the first party to transaction approval information.
`
`12
`
`12
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`10
`
`Docket No.: W0537-700620
`
`REMARKS
`
`Claims 1, 3-5, 9-16, 19-21, 24-30, 32-39 and 41-48 were previously pending in this
`
`application. Claims 1, 16, 47 and 48 have been amended. As a result claims 1, 3-5, 9-16, 19-21,
`
`24—30, 32—39 and 41—48 are pending for examination with claims 1, 16, 47 and 48 being
`
`independent claims. No new matter has been added.
`
`mm
`
`As indicated in the Advisory Action communicated on May 1, 2013, the submitted
`
`amendments require further search and/or consideration. Applicant respectfully submits the
`
`present amendment (assuming entry of the Amendments to the claims submitted on April 12,
`
`2013) for further considered. For the convenience of the Examiner, Applicant has included the
`
`prior argument in the April 12, 2013 Response updated to reflect the claim amendments
`
`presented herein.
`
`Rejections Under 35 U.S.C. §103
`
`The Office Action rejected claims 1, 3—5, 9—16, 19—21, 24—30, 32—39 and 41—48 under 35
`
`U.S.C. §103(a) as being unpatentable over U.S. Patent No. 7,571,139 B1 to Gioradano et a1.
`
`(hereinafter Gioradano) in view of U.S. Patent No. 5,657,388 to Weiss (hereinafter Weiss). In
`
`response, Applicant has amended claims 1, 16, 47 and 48 and submits the following remarks.
`
`Applicant respectfully asserts that the claim 1, as amended, is patentable in View of the
`
`alleged combination at least because Giordano and Weiss alone or in proper combination do not
`
`teach or suggest “a restriction mechanism configured to determine compliance with any access
`
`restrictions for the first party to secure data for completing the transaction,” as recited in claim 1,
`
`as amended.
`
`Giordano is directed to “a network for processing retail sales transactions” including “a
`
`customer transceiver with a unique customer number” (Abstract). Giordano teaches a
`
`“transaction processing system” that processes transactions with the “appropriate payment
`
`processing center” based on received authorization requests including “the customer ID,
`
`merchant ID and transaction data” (Col. 3 Lines 29—36). In summary, Giordano teaches the use
`
`of a customer transceiver to authorize a transaction processing system to carry out a monetary
`
`transaction between a customer and a merchant at the appropriate payment processing center.
`
`13
`
`13
`
`
`
`Application No. 1 1/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`11
`
`Docket No.: W0537-700620
`
`Giordano does not teach or suggest “a restriction mechanism configured to determine
`
`compliance with any access restrictions for the first party to secure data for completing the
`
`transaction,” as recited in claim 1, as amended. Rather, Giordano teaches the use of a customer
`
`transceiver to authorize a transaction processing system to carry out a monetary transaction
`
`between a customer and a merchant at the appropriate payment processing center. Accordingly,
`
`claim 1, as amended, distinguishes over the Giordano reference.
`
`Weiss is directed to “a method and apparatus for utilizing a token” to “provide secure
`
`access by authorized users to a selected resource” (Abstract). Weiss teaches the generation and
`
`use of a one-time variable multi-character code based in part on information stored in the token
`
`to authenticate the user’s identity. Weiss does not teach or suggest “a restriction mechanism
`
`configured to determine compliance with any access restrictions for the first party to secure data
`
`for completing the transaction,” as recited in claim 1, as amended. Rather, Weiss teaches the use
`
`of a one-time variable multi-character code based in part on information stored in a user’ 5 token
`
`to authenticate a user. Accordingly, claim 1, as amended, distinguishes over the Weiss
`
`reference.
`
`As neither Giordano nor Weiss teach or suggest “a restriction mechanism configured to
`
`determine compliance with any access restrictions for the first party to secure data for
`
`completing the transaction,” the combination, even if assumed proper, does not teach or suggest
`
`claim 1, as amended. Claims 3—5, 9—15, 33—36 and 41—46 depend from claim 1 and are allowable
`
`for at least the same reasons. Accordingly, withdrawal of the rejection of claims 1, 3-5, 9-15,
`
`33-36 and 41-46 under 35 U.S.C. §103(a) is respectfully requested.
`
`Independent Claim 16
`
`Independent claim 16, as amended, recites “determining compliance with any access
`
`restrictions for the first party to secure data for completing the transaction.” As discussed above
`
`with respect to claim 1, Giordano teaches the use of a customer transceiver to authorize a
`
`transaction processing system to carry out a monetary transaction between a customer and a
`
`merchant at the appropriate payment processing center. Thus, Giordano does teach or suggest
`
`“determining compliance with any access restrictions for the first party to secure data for
`
`completing the transaction,” as recited in claim 16, as amended. Assuming the combination is
`
`proper, the addition of Weiss does not cure this deficiency as Weiss does not teach or suggest
`
`14
`
`14
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`12
`
`Docket No.: W0537-700620
`
`“determining compliance with any access restrictions for the first party to secure data for
`
`completing the transaction,” as recited in claim 16, as amended. Claims 19-21, 24-30, 32 and
`
`37-39 depend from claim 16 and are allowable for at least the same reasons. Accordingly,
`
`withdrawal of the rejection of claims 16, 19—21, 24—30, 32 and 37—39 under 35 U.S.C. §103(a) is
`
`respectfully requested.
`
`Independent Claim 47
`
`Independent claim 47 is also patentable in view of the alleged combination at least
`
`because Giordano and Weiss alone or in proper combination do not teach or suggest “restriction
`
`mechanism to determine compliance with any access restrictions for the first party to secure data
`
`for completing the transaction,” as recited in claim 47, as amended. As discussed above with
`
`respect to claim 1, Giordano teaches the use of a customer transceiver to authorize a transaction
`
`processing system to carry out a monetary transaction between a customer and a merchant at the
`
`appropriate payment processing center. The addition of Weiss does not cure this deficiency.
`
`Accordingly, withdrawal of the rejection of claim 47 under 35 U.S.C. §103(a) is respectfully
`
`requested.
`
`Independent Claim 48
`
`Independent claim 48, as amended, is patentable in view of the alleged combination at
`
`least because Giordano and Weiss alone or in proper combination do not teach or suggest
`
`“wherein enabling the transaction without providing account identifying information to the first
`
`party includes limiting transaction information provided by the secure registry system to the first
`
`party to transaction approval information,” as recited claim 48, as amended. Giordano teaches
`
`the “transaction processing system” transmitting to the online merchant “identification
`
`information and other data unique to the associated customer in the absence of a retail
`
`transaction” (See Col. 4 Lines 17-21). Giordano explicitly teaches the transmission of
`
`information regarding the user (e.g., entity or purchaser), including loyalty program information
`
`(See e.g., Col. 4 Lines 54—58), to a merchant (e.g., first party) rather than limiting the
`
`information transmitted to the merchant to transaction approval information. Accordingly,
`
`Giordano does not teach or suggest claim 48, as amended. Assuming the combination is proper,
`
`the addition of Weiss does not cure this deficiency. Weiss teaches the use of a one-time variable
`
`15
`
`15
`
`
`
`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`13
`
`Docket No.: W0537-700620
`
`multi—character code based in part on information stored in a user’ 5 token to authenticate a user.
`
`Thus, Weiss does not teach “wherein enabling the transaction without providing account
`
`identifying information to the first party includes limiting the account identifying information
`
`provided by the secure registry system to the first party to transaction approval information,” as
`
`recited in claim 48, as amended. Accordingly, withdrawal of the rejection of claim 48 under 35
`
`U.S.C. §103(a) is respectfully requested.
`
`CONCLUSION
`
`In view of the foregoing amendments and remarks, reconsideration is respectfully
`
`requested. This application should now be in condition for allowance; a notice to this effect is
`
`respectfully requested. If the Examiner believes, after this amendment, that the application is
`
`not in condition for allowance, the Examiner is requested to call the Applicant's attorney at the
`
`telephone number listed below.
`
`If this response is not considered timely filed and if a request for an extension of time is
`
`otherwise absent, Applicant hereby requests any necessary extension of time. If there is a fee
`
`occasioned