throbber
PTOISBlaoEFS (07—09)
`Doc code: RCEX
`Approved for use lhrough 071312012. OMB 0551-0031
`Doc description: Request for Continued Examination (RCE)
`us. Patent and Trademark Office; us. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`
`
`REQUEST FOR CONTINUED EXAMINATION(RCE)TRANSMITTAL
`(Submitted Only via EFS-Web)
`
`Appl'cat'on
`Number
`
`11768729
`
`F'l'”g
`Date
`
`F'rSl Name‘l Kenneth P. Weiss
`Inventor
`
`
`
`
`
`
`2007-06-26
`
`9°Cket .Number W0537-700620
`(If applicable)
`
`Art.
`Unit
`
`2435
`
`Exam'”er
`Name
`
`B. W. Dada
`
`This is a Request for Continued Examination (RCE) under 37 CFR 1.1 14 of the above-identified application.
`Request for Continued Examination (RCE) practice under 37 CFR 1.114 does not apply to any utility or plant application filed prior to June 8,
`1995, or to any design application. The Instruction Sheet for this form is located at WWW.USPTO.GOV
`
`
`SUBMISSION REQUIRED UNDER 37 CFR 1.114
`
`
`Note: If the RCE is proper, any previously filed unentered amendments and amendments enclosed with the RCE will be entered in the order
`in which they were filed unless applicant instructs otherwise. If applicant does not wish to have any previously filed unentered amendment(s)
`entered, applicant must request non—entry of such amendment(s).
`
`Previously submitted. If a final Office action is outstanding, any amendments filed after the final Office action may be considered as a
`submission even if this box is not checked.
`
`|:| Consider the arguments in the Appeal Brief or Reply Brief previously filed on
`
`|:| Other
`
`E Enclosed
`
`Amendmentheply
`
`Information Disclosure Statement (IDS)
`
`|:| Affidavit(s)l Declaration(s)
`
`|:| Other
`
`MISCELLANEOUS
`
`I:I Suspension of action on the above-identified application is requested under 37 CFR 1.103(c) for a period of months
`(Period of suspension shall not exceed 3 months; Fee under 37 CFR 1170) required)
`
`|:| Other
`
`The RCE fee under 37 CFR 1.17(e) is required by 37 CFR 1.114 when the RCE is filed.
`The Director is hereby authorized to charge any underpayment of fees, or credit any overpayments, to
`Deposit Account No
`50/2762
`
`FEES
`
`|:| Applicant Signature
`
`SIGNATURE OF APPLICANT, ATTORNEY, OR AGENT REQUIRED
`
`Patent Practitioner Sig nature
`
`EFS — Web 2.1.15
`
`1 of 16
`
`1 of 16
`
`APPLE 1120
`
`APPLE 1120
`
`

`

`PTOiSBiaOEFS (07—09)
`Doc code: RCEX
`Approved for use lhrough 071312012. OMB 0551-0031
`Doc description: Request for Continued Examination (RCE)
`us. Patent and Trademark Office; us. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`
`Signature of Registered U.S. Patent Practitioner
`
`[Matthew H. Grady]
`
`Date (YYYY-MM-DD)
`
`2013—05—20
`
`
`
`m Matthew H. Grady
`
`Registration Number
`
`52957
`
`This collection of information is required by 37 CFR 1.114. The information is required to obtain or retain a benefit by the public which is to
`file (and by the USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is
`estimated to take 12 minutes to complete, including gathering, preparing, and submitting the completed application form to the USPTO. Time
`will vary depending upon the individual case. Any comments on the amount of time you require to complete this form and/or suggestions for
`reducing this burden, should be sent to the Chief Information Officer, US. Patent and Trademark Office, US. Department of Commerce,
`PO. Box 1450, Alexandria, VA 22313—1450.
`if you need assistance in completing the form, caIi 1-800-PTO—9199 and select option 2.
`
`EFS — Web 2.1.15
`
`2 of 16
`
`20f16
`
`

`

`
`
`Privacy Act Statement
`
`The Privacy Act of 1974 (P.L. 93—579) requires that you be given certain information in connection with your submission of the
`attached form related to a patent application or patent. Accordingly, pursuant to the requirements of the Act, please be
`advised that:
`(1) the general authority for the collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the information
`solicited is voluntary; and (3) the principal purpose for which the information is used by the U.S. Patent and Trademark Office
`is to process and/or examine your submission related to a patent application or patent.
`If you do not furnish the requested
`information, the US. Patent and Trademark Office may not be able to process and/or examine your submission, which may
`result in termination of proceedings or abandonment of the application or expiration of the patent.
`
`The information provided by you in this form will be subject to the following routine uses:
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`The information on this form will be treated confidentially to the extent allowed under the Freedom of Information
`Act (5 U.S.C. 552) and the Privacy Act (5 U.S.C. 552a). Records from this system of records may be disclosed to the
`Department of Justice to determine whether the Freedom of Information Act requires disclosure of these records.
`
`A record from this system of records may be disclosed, as a routine use, in the course of presenting evidence to a
`court, magistrate, or administrative tribunal, including disclosures to opposing counsel in the course of settlement
`negotiations.
`
`A record in this system of records may be disclosed, as a routine use, to a Member of Congress submitting a
`request involving an individual, to whom the record pertains, when the individual has requested assistance from the
`Member with respect to the subject matter of the record.
`
`A record in this system of records may be disclosed, as a routine use, to a contractor of the Agency having need
`for the information in order to perform a contract. Recipients of information shall be required to comply with the
`requirements of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(m).
`
`A record related to an International Application filed under the Patent Cooperation Treaty in this system of records
`may be disclosed, as a routine use, to the International Bureau of the World Intellectual Property Organization,
`pursuant to the Patent Cooperation Treaty.
`
`A record in this system of records may be disclosed, as a routine use, to another federal agency for purposes of
`National Security review (35 U.S.C. 181) and for review pursuant to the Atomic Energy Act (42 U.S.C. 218(c)).
`
`A record from this system of records may be disclosed, as a routine use, to the Administrator, General Services,
`or his/her designee, during an inspection of records conducted by GSA as part of that agency's responsibility to
`recommend improvements in records management practices and programs, under authority of 44 U.S.C. 2904 and
`2906. Such disclosure shall be made in accordance with the GSA regulations governing inspection of records for this
`purpose, and any other relevant (i.e., GSA or Commerce) directive. Such disclosure shall not be used to make
`determinations about individuals.
`
`A record from this system of records may be disclosed, as a routine use, to the public after either publication of
`the application pursuant to 35 U.S.C. 122(b) or issuance of a patent pursuant to 35 U.S.C. 151. Further, a record may
`be disclosed, subject to the limitations of 37 CFR 1.14, as a routine use, to the public if the record was filed in an
`application which became abandoned or in which the proceedings were terminated and which application is
`referenced by either a published application, an application open to public inspections or an issued patent.
`
`9.
`
`A record from this system of records may be disclosed, as a routine use, to a Federal, State, or local law
`enforcement agency, if the USPTO becomes aware of a violation or potential violation of law or regulation.
`
`
`
`EFS — Web 2.1.15
`
`3 of 16
`
`3 0f16
`
`

`

`I hereby certify that this paper (along with any paper referred to as being attached
`or enclosed) is being transmitted via the Office electronic filing system in
`accordance with 37 CFR § 1.6(a)(4).
`
`:
`
`y
`
`.
`
`Doc’ket N0.' W05(3P7A_’¥£)1S¥;
`
`Elaetagonichgignzatiurzeofosr Matthew H. Grady:
`
`/Matthew H. Grady/
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`In re Patent Application of:
`Kenneth P. Weiss
`
`Application No.: 11/768,729
`
`Confirmation No.: 3536
`
`Filed: June 26, 2007
`
`Art Unit: 2435
`
`
`For: UNIVERSAL SECURE REGISTRY
`
`Examiner: B. W. Dada
`
`AMENDMENT
`
`Commissioner for Patents
`
`Dear Madam:
`
`INTRODUCTORY COMMENTS
`
`In conjunction with a Request for Continued Examination and in response to the
`
`Advisory Action mailed on May 1, 2013 and the Final Office Action mailed on December 18,
`
`2012, please amend the above-identified application as follows: Changes to the claims are
`
`shown by strike through (for deleted matter) and underlining (for added matter).
`
`Amendments to the Claims are reflected in the listing of claims which begins on page 2
`
`of this paper.
`
`Remarks/Arguments begin on page 10 of this paper.
`
`1601508.l
`
`4 of 16
`
`4ofl6
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`2
`
`Docket No.: W0537-700620
`
`AMENDMENTS TO THE CLAIMS
`
`This listing of claims will replace all prior versions, and listings, of claims in the
`application.
`
`Listing of Claims:
`
`1.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time—varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time—varying multicharacter code representing an identity of one of
`
`the respective entities; and
`
`a processor configured to receive, from the first party, at least the time-varying
`
`multicharacter code for the entity on whose behalf a transaction is to be performed, configured to
`
`map the time—varying multicharacter code to the identity of the entity in the database using en-l—y
`
`the time-varying multicharacter code, to execute a restriction mechanism configured to
`
`determine compliance with any access restrictions for the first party to secure data for
`
`completing the transaction, and to allow or not allow access Q secure data associated with the
`
`entity including information required to enable the transaction, the information including
`
`account identifying information, where the account identifying information is unknown—LN
`
`provided to the first partyrte—previdefll the account identifying information is provided to a
`
`third party to enable the transaction with the first party and without providing the account
`
`identifying information to the first party.
`
`2.
`
`3.
`
`(Canceled)
`
`(Previously Presented) The system of claim 1, wherein the time-varying multicharacter
`
`code is provided to the system Via a secure electronic transmission device.
`
`4.
`
`(Previously Presented) The system of claim 1, wherein the time-varying multicharacter
`
`code is encrypted and transmitted to the system, and
`
`5 of 16
`
`50f16
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`3
`
`Docket No.: W0537-700620
`
`wherein the system is configured to decrypt the tirne—varying multicharacter code with a
`
`public key of the entity.
`
`5.
`
`(Previously Presented) The system as claimed in claim 1, wherein the transaction
`
`includes a service provided by the first party,
`
`wherein said first party’s service includes delivery,
`
`wherein the information is an address to which an item is to be delivered to the entity,
`
`wherein the system receives the time-varying multicharacter code, and
`
`wherein the system uses the time-varying multicharacter code to obtain the appropriate
`
`address for delivery of the item by the third party.
`
`6.
`
`7.
`
`8.
`
`9.
`
`(Canceled)
`
`(Canceled)
`
`(Canceled)
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information includes credit card account information regarding the entity, and wherein the
`
`processor is configured to provide the credit card account information based upon the
`
`multicharacter code of the entity to enable the transaction.
`
`10.
`
`(Previously Presented) The system as claimed in claim 9, wherein the system is
`
`configured to receive an approval of the credit card transaction.
`
`11.
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information includes bank card account information regarding the entity, and wherein the
`
`processor is configured to provide the bank card account information to enable the transaction
`
`based upon the multicharacter code of the entity.
`
`6 of 16
`
`6of16
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`4
`
`Docket No.: W0537-700620
`
`12.
`
`(Previously Presented) The system as claimed in claim 11, wherein the system is
`
`configured to provide an approval of the bank card transaction.
`
`13.
`
`(Previously Presented) The system as claimed in claim 1, wherein the information
`
`includes personal identification information regarding the entity.
`
`14.
`
`(Previously Presented) The system as claimed in claim 13, wherein the personal
`
`identification information comprises a photograph of the entity, and wherein the photograph is
`
`provided to the first party.
`
`15.
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information identifies email address information regarding the entity.
`
`16.
`
`(Currently Amended) A method for providing information to a first party to enable
`
`transactions between the first party and entities who have secure data stored in a secure regisz
`
`in which each entity is identified by a time-varying multicharacter code, the method comprising:
`
`receiving the time-varying multicharacter code for an entity on whose behalf a
`
`transaction is to take place;
`
`mapping the time—varying multicharacter code to an identity of the entity in a database
`
`using only the time-varying multicharacter code;
`
`determining compliance based—en with any access restrictions for the first party to secure
`
`data for completing the transaction;
`
`accessing information required to perform the transaction, the information including
`
`account identifying information—unknown—te—thefirst—pafi—y;
`
`providing the account identifying information to a third party without providing the
`
`account identifying information to the first party; and
`
`using the account identifying information to enable the first party to perform the
`
`transaction without the first party’s knowledge of the account identifying information.
`
`17.
`
`(Canceled)
`
`7 of 16
`
`7of16
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`5
`
`18.
`
`(Canceled)
`
`Docket No.: W0537-700620
`
`19.
`
`(Previously Presented) The method of claim 16, wherein the act of receiving the time-
`
`varying multicharacter code comprises receiving the time—varying multicharacter code
`
`transmitted via a secure electronic transmission device.
`
`20.
`
`(Previously Presented) The method of claim 16, wherein the act of receiving the time—
`
`varying multicharacter code comprises receiving an encrypted multicharacter code, and
`
`wherein the method further comprises decrypting the encrypted multicharacter code.
`
`21.
`
`(Previously Presented) The method as claimed in claim 16, wherein the transaction
`
`includes a service provided by the first party,
`
`wherein the service includes delivery,
`
`wherein the account identifying information is associated with an address to which an
`
`item is to be delivered for the entity, and
`
`wherein the third party receives the address for delivery of an item provided by the first
`
`party.
`
`22.
`
`(Canceled)
`
`23.
`
`(Canceled)
`
`24.
`
`(Previously Presented) The method as claimed in claim 16, wherein the account
`
`identifying information includes a credit card number, and wherein the act of using the account
`
`identifying information comprises using the credit card number to enable the transaction.
`
`25.
`
`(Previously Presented) The method as claimed in claim 24, wherein the act of using the
`
`account identifying information comprises receiving a validation or denial of the transaction
`
`without providing the credit card number of the entity to the first party.
`
`8 of 16
`
`80f16
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`6
`
`Docket No.: W0537-700620
`
`26.
`
`(Previously Presented) The method as claimed in claim 16, wherein the act of using the
`
`account identifying information comprises using bank card information about the entity to
`
`enable a transaction.
`
`27.
`
`(Previously Presented) The method as claimed in claim 26, wherein the act of using the
`
`information comprises receiving a validation or denial of the bank card transaction without
`
`providing a bank card number of the entity to the first party.
`
`28.
`
`(Previously Presented) The method as claimed in claim 16, wherein the act of mapping
`
`the time—varying multicharacter code to information required by the first party comprises
`
`mapping the time—varying multicharacter code to personal identification information about the
`
`entity.
`
`29.
`
`(Previously Presented) The method as claimed in claim 28, wherein the personal
`
`identification information comprises a photograph of the entity, and
`
`wherein the method further comprises an act of providing the photograph to the first
`
`party.
`
`30.
`
`(Previously Presented) The method as claimed in claim 16, wherein the account
`
`identifying information identifies email address information about the entity.
`
`31.
`
`(Canceled).
`
`32.
`
`(Previously Presented) The method as claimed in claim 24, further comprising an act of
`
`transmitting to the first party one of an approval or a denial of the credit card transaction.
`
`33.
`
`(Previously Presented) The system of claim 1, wherein the database is further configured
`
`to associate biometric information with each entity having secure data in the secure registry,
`
`respectively.
`
`9 of 16
`
`9of16
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`7
`
`Docket No.: W0537-700620
`
`34.
`
`(Previously Presented) The system of claim 33, wherein the processor is further
`
`configured to map the time-varying multicharacter code to biometric information associated with
`
`the entity on whose behalf the transaction is to be performed and to provide the biometric
`
`information to the first party.
`
`35.
`
`(Previously Presented) The system of claim 34, wherein the biometric information
`
`includes an image of the entity on whose behalf the transaction is to be performed.
`
`36.
`
`(Previously Presented) The system of claim 34, wherein the time-varying multicharacter
`
`code is generated by a device associated with the entity on whose behalf the transaction is to be
`
`performed.
`
`37.
`
`(Previously Presented) The method as claimed in claim 16, further comprising an act of
`
`associating biometric information with each entity having secure data in the secure registry,
`
`respectively.
`
`38.
`
`(Previously Presented) The method of claim 37, further comprising acts of:
`
`mapping the time—varying multicharacter code to biometric information associated with
`
`the entity on whose behalf the transaction is to be performed; and
`
`providing the biometric information to the first party.
`
`39.
`
`(Previously Presented) The method of claim 38, wherein the biometric information
`
`includes an image of the entity on whose behalf the transaction is to be performed.
`
`40.
`
`(Canceled).
`
`41.
`
`(Previously Presented) The system of claim 1, wherein the account identifying
`
`information includes an account number.
`
`10 of 16
`
`10 of16
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`8
`
`Docket No.: W0537-700620
`
`42.
`
`(Previously Presented) The system of claim 41, wherein the account identifying
`
`information includes credit card account information and the account number includes a credit
`
`card number.
`
`43.
`
`(Previously Presented) The system of claim 41, wherein the third party includes a
`
`financial service provider and the account number includes at least one of a debit card number
`
`and a credit card number.
`
`44.
`
`(Previously Presented) The system of claim 43, wherein the first party includes a
`
`merchant, and the service includes a sale of at least one of goods and services.
`
`45.
`
`(Previously Presented) The system of claim 44, wherein the processor is further
`
`configured to receive, from the first party, a merchant ID, and a purchase amount.
`
`46.
`
`(Previously Presented) The system of claim 1, wherein the identity of the entity is
`
`unknown until the time-varying code is mapped to the identity by the processor.
`
`47.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time-varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time-varying multicharacter code representing an identity of one of
`
`the respective entities, wherein the database is configured to permit or deny access to
`
`information on the respective entity using the time—varying multicharacter code; and
`
`a processor configured to receive; the time-varying multicharacter code for the entity on
`
`whose behalf a transaction is to be performed, configured to map the time-varying
`
`multicharacter code to the identity of the entity to identify the entity, configured to execute a
`
`restriction mechanism configured—to determine compliance with any access restrictions for the
`
`first party to secure data for completing the transaction, configured to obtain from the database
`
`the secure data associated with the entity including information required to enable the
`
`11 of 16
`
`11 of16
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`9
`
`Docket No.: W0537-700620
`
`transaction, the information including account identifying information, and configured to
`
`provide the account identifying information to a third party to enable the transaction without
`
`providing the account identifying information to the first party.
`
`48.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time-varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time—varying multicharacter code representing an identity of one of
`
`the respective entities; and
`
`a processor configured to receive the time-varying multicharacter code for the entity on
`
`whose behalf a transaction is to be performed, configured to map the time-varying
`
`multicharacter code to the identity of the entity without requiring further information to identify
`
`the entity, configured to access from the database secure data associated with the entity
`
`including information required to enable the transaction, the information including account
`
`identifying information, and configured to provide the account identifying information to a third
`
`party to enable the transaction without providing the account identifying information to the first
`
`party, and wherein enabling the transaction without providing account identifying information to
`
`the first party includes limiting the—aeeeunt—identifyi—n—g transaction information provided by the
`
`secure registry system to the first party to transaction approval information.
`
`12 of 16
`
`12 0f16
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`10
`
`Docket No.: W0537-700620
`
`REMARKS
`
`Claims 1, 3-5, 9-16, 19-21, 24-30, 32-39 and 41-48 were previously pending in this
`
`application. Claims 1, 16, 47 and 48 have been amended. As a result claims 1, 3-5, 9-16, 19-21,
`
`24—30, 32—39 and 41—48 are pending for examination with claims 1, 16, 47 and 48 being
`
`independent claims. No new matter has been added.
`
`mm
`
`As indicated in the Advisory Action communicated on May 1, 2013, the submitted
`
`amendments require further search and/or consideration. Applicant respectfully submits the
`
`present amendment (assuming entry of the Amendments to the claims submitted on April 12,
`
`2013) for further considered. For the convenience of the Examiner, Applicant has included the
`
`prior argument in the April 12, 2013 Response updated to reflect the claim amendments
`
`presented herein.
`
`Rejections Under 35 U.S.C. §103
`
`The Office Action rejected claims 1, 3—5, 9—16, 19—21, 24—30, 32—39 and 41—48 under 35
`
`U.S.C. §103(a) as being unpatentable over U.S. Patent No. 7,571,139 B1 to Gioradano et a1.
`
`(hereinafter Gioradano) in view of U.S. Patent No. 5,657,388 to Weiss (hereinafter Weiss). In
`
`response, Applicant has amended claims 1, 16, 47 and 48 and submits the following remarks.
`
`Applicant respectfully asserts that the claim 1, as amended, is patentable in View of the
`
`alleged combination at least because Giordano and Weiss alone or in proper combination do not
`
`teach or suggest “a restriction mechanism configured to determine compliance with any access
`
`restrictions for the first party to secure data for completing the transaction,” as recited in claim 1,
`
`as amended.
`
`Giordano is directed to “a network for processing retail sales transactions” including “a
`
`customer transceiver with a unique customer number” (Abstract). Giordano teaches a
`
`“transaction processing system” that processes transactions with the “appropriate payment
`
`processing center” based on received authorization requests including “the customer ID,
`
`merchant ID and transaction data” (Col. 3 Lines 29—36). In summary, Giordano teaches the use
`
`of a customer transceiver to authorize a transaction processing system to carry out a monetary
`
`transaction between a customer and a merchant at the appropriate payment processing center.
`
`13 of 16
`
`13 ofl6
`
`

`

`Application No. 1 1/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`11
`
`Docket No.: W0537-700620
`
`Giordano does not teach or suggest “a restriction mechanism configured to determine
`
`compliance with any access restrictions for the first party to secure data for completing the
`
`transaction,” as recited in claim 1, as amended. Rather, Giordano teaches the use of a customer
`
`transceiver to authorize a transaction processing system to carry out a monetary transaction
`
`between a customer and a merchant at the appropriate payment processing center. Accordingly,
`
`claim 1, as amended, distinguishes over the Giordano reference.
`
`Weiss is directed to “a method and apparatus for utilizing a token” to “provide secure
`
`access by authorized users to a selected resource” (Abstract). Weiss teaches the generation and
`
`use of a one-time variable multi-character code based in part on information stored in the token
`
`to authenticate the user’s identity. Weiss does not teach or suggest “a restriction mechanism
`
`configured to determine compliance with any access restrictions for the first party to secure data
`
`for completing the transaction,” as recited in claim 1, as amended. Rather, Weiss teaches the use
`
`of a one-time variable multi-character code based in part on information stored in a user’ 5 token
`
`to authenticate a user. Accordingly, claim 1, as amended, distinguishes over the Weiss
`
`reference.
`
`As neither Giordano nor Weiss teach or suggest “a restriction mechanism configured to
`
`determine compliance with any access restrictions for the first party to secure data for
`
`completing the transaction,” the combination, even if assumed proper, does not teach or suggest
`
`claim 1, as amended. Claims 3—5, 9—15, 33—36 and 41—46 depend from claim 1 and are allowable
`
`for at least the same reasons. Accordingly, withdrawal of the rejection of claims 1, 3-5, 9-15,
`
`33-36 and 41-46 under 35 U.S.C. §103(a) is respectfully requested.
`
`Independent Claim 16
`
`Independent claim 16, as amended, recites “determining compliance with any access
`
`restrictions for the first party to secure data for completing the transaction.” As discussed above
`
`with respect to claim 1, Giordano teaches the use of a customer transceiver to authorize a
`
`transaction processing system to carry out a monetary transaction between a customer and a
`
`merchant at the appropriate payment processing center. Thus, Giordano does teach or suggest
`
`“determining compliance with any access restrictions for the first party to secure data for
`
`completing the transaction,” as recited in claim 16, as amended. Assuming the combination is
`
`proper, the addition of Weiss does not cure this deficiency as Weiss does not teach or suggest
`
`14 of 16
`
`l4 ofl6
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`12
`
`Docket No.: W0537-700620
`
`“determining compliance with any access restrictions for the first party to secure data for
`
`completing the transaction,” as recited in claim 16, as amended. Claims 19-21, 24-30, 32 and
`
`37-39 depend from claim 16 and are allowable for at least the same reasons. Accordingly,
`
`withdrawal of the rejection of claims 16, 19—21, 24—30, 32 and 37—39 under 35 U.S.C. §103(a) is
`
`respectfully requested.
`
`Independent Claim 47
`
`Independent claim 47 is also patentable in view of the alleged combination at least
`
`because Giordano and Weiss alone or in proper combination do not teach or suggest “restriction
`
`mechanism to determine compliance with any access restrictions for the first party to secure data
`
`for completing the transaction,” as recited in claim 47, as amended. As discussed above with
`
`respect to claim 1, Giordano teaches the use of a customer transceiver to authorize a transaction
`
`processing system to carry out a monetary transaction between a customer and a merchant at the
`
`appropriate payment processing center. The addition of Weiss does not cure this deficiency.
`
`Accordingly, withdrawal of the rejection of claim 47 under 35 U.S.C. §103(a) is respectfully
`
`requested.
`
`Independent Claim 48
`
`Independent claim 48, as amended, is patentable in view of the alleged combination at
`
`least because Giordano and Weiss alone or in proper combination do not teach or suggest
`
`“wherein enabling the transaction without providing account identifying information to the first
`
`party includes limiting transaction information provided by the secure registry system to the first
`
`party to transaction approval information,” as recited claim 48, as amended. Giordano teaches
`
`the “transaction processing system” transmitting to the online merchant “identification
`
`information and other data unique to the associated customer in the absence of a retail
`
`transaction” (See Col. 4 Lines 17-21). Giordano explicitly teaches the transmission of
`
`information regarding the user (e.g., entity or purchaser), including loyalty program information
`
`(See e.g., Col. 4 Lines 54—58), to a merchant (e.g., first party) rather than limiting the
`
`information transmitted to the merchant to transaction approval information. Accordingly,
`
`Giordano does not teach or suggest claim 48, as amended. Assuming the combination is proper,
`
`the addition of Weiss does not cure this deficiency. Weiss teaches the use of a one-time variable
`
`15 of 16
`
`15 ofl6
`
`

`

`Application No. 11/768,729
`Amendment dated May 20, 2013
`After Final Office Action of December 18, 2012
`
`13
`
`Docket No.: W0537-700620
`
`multi—character code based in part on information stored in a user’ 5 token to authenticate a user.
`
`Thus, Weiss does not teach “wherein enabling the transaction without providing account
`
`identifying information to the first party includes limiting the account identifying information
`
`provided by the secure registry system to the first party to transaction approval information,” as
`
`recited in claim 48, as amended. Accordingly, withdrawal of the rejection of claim 48 under 35
`
`U.S.C. §103(a) is respectfully requested.
`
`CONCLUSION
`
`In view of the foregoing amendments and remarks, reconsideration is respectfully
`
`requested. This application should now be in condition for allowance; a notice to this effect is
`
`respectfully requested. If the Examiner believes, after this amendment, that the application is
`
`not in condition

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket