Patent Application 15209709 - Point-to-Point Transaction Guidance Apparatuses - Rejection
Appearance
Patent Application 15209709 - Point-to-Point Transaction Guidance Apparatuses
Title: Point-to-Point Transaction Guidance Apparatuses, Methods and Systems
Application Information
- Invention Title: Point-to-Point Transaction Guidance Apparatuses, Methods and Systems
- Application Number: 15209709
- Submission Date: 2025-04-10T00:00:00.000Z
- Effective Filing Date: 2016-07-13T00:00:00.000Z
- Filing Date: 2016-07-13T00:00:00.000Z
- National Class: 705
- National Sub-Class: 039000
- Examiner Employee Number: 87445
- Art Unit: 3693
- Tech Center: 3600
Rejection Summary
- 102 Rejections: 0
- 103 Rejections: 3
Cited Patents
The following patents were cited in the rejection:
Office Action Text
DETAILED ACTION This Non-Final Office Action is in response to the application filed on 07/13/2016, the Amendment & Remark filed on 01/02/2025 and the Request for Continued Examination filed on 01/02/2025. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 01/02/2025 has been entered. Claim Interpretation The following is a quotation of 35 U.S.C. 112(f): (f) Element in Claim for a Combination. â An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. The following is a quotation of pre-AIA 35 U.S.C. 112, sixth paragraph: An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. Use of the word âmeansâ (or âstepâ) in a claim with functional language creates a rebuttable presumption that the claim limitation is to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites sufficient structure, material, or acts to entirely perform the recited function. Absence of the word âmeansâ (or âstepâ) in a claim creates a rebuttable presumption that the claim limitation is not to be treated in accordance with 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph. The presumption that the claim limitation is not interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, is rebutted when the claim limitation recites function without reciting sufficient structure, material or acts to entirely perform the recited function. Claim limitations in this application that use the word âmeansâ (or âstepâ) are being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. Conversely, claim limitations in this application that do not use the word âmeansâ (or âstepâ) are not being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph, except as otherwise indicated in an Office action. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-29, 57 and 85 are rejected under 35 U.S.C. 101 because the claimed invention is directed to a judicial exception (i.e., a law of nature, a natural phenomenon, or an abstract idea) without significantly more. As an initial matter, the claims as a whole are to an apparatus, a manufacture and a process, which falls within one or more statutory categories. (Step 1: YES) The ordered combination of the recited limitations is a process that, under its broadest reasonable interpretation, covers facilitating financial transaction but for the recitation of generic computer components. That is, other than reciting âmemoryâ, âany of at least one processor disposed in communication with the at least one memory, the any of at least one processor executing processor-executable instructions from the component collection, storage of the component collection structured with processor-executable instruction comprising: âŚâ, âat a beaconâ and blockchain serverâ, nothing in the claim elements that precludes the steps from that of a financial transaction. For example, but for the âprocessorâ and âbeaconâ language, âobtain a target wallet identifier registration at beacon passively, in which the beacon is structured registering variable target wallet identifier, and in which the beacon is structured having non-RFID wireless communicationsâ in the context of the claimed invention encompasses one or more person manually obtaining registration requests via wireless communication; but for the âprocessorâ and âbeaconâ language, âregister the target wallet identifier with the beacon, in which the beacon is structured registering variable target wallet identifiersâ in the context of the claimed invention encompasses one or more person manually register the identifier; but for the âprocessorâ, âbeaconâ and ââŚin which the beacon and obtainment of the unique wallet identifier is triggered by the userâs proximity to the beaconâ language, âobtain a unique wallet identifier from a wallet source associated with a user at the beaconâ in the context of the claimed invention encompasses one or more person manually obtaining the unique wallet identifier; but for the âprocessorâ and âbeaconâ language, âobtain a target transaction request at the beacon from the wallet sourceâ in the context of the claimed invention encompasses one or more person manually obtaining the transaction request; but for the âprocessorâ and âblockchain database networkâ language, âcommit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon.â in the context of the claimed invention encompasses one or more person manually committing that request to a blockchain database network; but for the âapparatusâ language, âverify the target wallet identifier is associated with the organizationâ in the context of the claimed invention encompasses one or more person manually conducting the verification; but for the âapparatusâ language, âidentifying the target wallet identifier exist in the organizationâs databaseâ in the context of the claimed invention encompasses one or more person manually identifying existing identifier; If a claim, under its broadest reasonable interpretation, covers commercial activity, such as the facilitating of a transaction, but for the recitation of certain generic computing components, then it falls within the âCertain Method of Organized Human Activityâ grouping of abstract ideas. As such, the claim recites an abstract idea. (Step 2A prong one: Yes) This judicial exception is not integrated into a practical application. In particular, the claim only recite the additional element of processor to perform the obtaining, registering, and committing steps. The involvement of the processor in the above steps is recited at a high-level of generality (i.e., as a generic computer components performing steps of the recited abstract idea) such that it amounts no more than mere instruction to apply the exception using a generic computer component. The additional elements âbeaconâ and âââŚin which the beacon and obtainment of the unique wallet identifier is triggered by the userâs proximity to the beaconâ are considered to be an insignificant extra solution to obtaining the identifier because proximity based communication, such as Bluetooth and NFC is a well-known solution to obtain data within certain proximity. Paragraph 0091 and other paragraphs of the Specification describe the proximity triggering of data obtainment at high generality of using known technology such as Bluetooth and NFC, the exact technological steps detailing how beacon is triggered by proximity is not discussed other than invoking the use of the known technology. Thus, it is apparent that feature of proximity triggered data obtainment is a result of using the known technology and would be nominal or tangential to the obtainment of data in the claims. Furthermore, the means plus functions in claim 85 are generically described in Specification paragraph 0406 that it amounts no more than mere instruction to apply the exception using a generic computer component. Accordingly, this additional element does not integrate the abstract idea into a practical application because it does not impose any meaningful limits on practicing the abstract idea. Thus, the claims is directed to an abstract idea. The claims, when considered both individually and as an ordered combination, do not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea into a practical application, the additional element of using a processor to conduct financial transaction amounts to no more than mere instructions to apply the exception using generic computer component. Mere instruction to apply an exception using a generic computer cannot provide an inventive concept. Such additional elements are determined to not contain an inventive concept according to MPEP 2106.05(f). It should be noted that (1) the ârecitation of claim limitations that attempt to cover any solution to an identified problem with no restriction on how the result is accomplished and no description of the mechanism for accomplishing the result, does not provide significantly more because this type of recitation is equivalent to the words âapply itââ, and (2) âUse of a computer or other machinery in its ordinary capacity for economic or other tasks (e.g., to receive, store, or transmit data) or simply adding a general purpose computer or computer components after the fact to an abstract idea (e.g., a fundamental economic practice or mathematical equation) does not integrate a judicial exception into a practical application or provide significantly moreâ. (Step 2A prong two: No) Additional elements that require no more than a generic computer to perform generic computer functions includes obtaining data and transmitting data (Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec,). These generic computer functions are factually determined to be well-understood, routine and conventional activities previously known to the industry as referenced by MPEP 2106.05(d) II according the USPTO Memorandum on Changes in Examination Procedure Pertaining to Subject Matter Eligibility, Recent Subject Matter Eligibility Decision (Berkheimer v. HP, Inc.) dated April 19 2018. The recited ordered combination of additional elements includes no more than a generic computing component performing steps of an abstract idea. Dependent claims 2-3, 6-28 merely limit the abstract idea but do not recite any additional element beyond the cited abstract idea, thus, do not amount to significantly more. No additional element currently recited in the claims amount the claims to be significantly more than the cited abstract idea. (Step 2B: No) Therefore, claims 1-29, 57 and 85 are rejected under 35 U.S.C. 101 as being directed to non-statutory subject matter. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-9, 15, 16, 19-21, 29, 57 and 85 are is/are rejected under 35 U.S.C. 103 as being unpatentable over Elston et al (US 2003/0191709) in view of Yang et al (US 2015/0287026) further in view of Hymes (US 2008/0064333). As per claim 1, Elston teaches a system comprising: a memory; (See Elston Paragraph 0061-0071) a point-to-point guidance component; (See Elston Paragraph 0061-0071, the âpoint-to-point guidance componentâ is interpreted as software or computer program under the Broadest Reasonable Interpretation in light of the Specification.) any of at least one processor disposed in communication with the at least one memory, the any of at least one processor executing processor-executable instructions from the component collection, storage of the component collection structured with processor-executable instruction (See Elston Paragraph 0061-0071) comprising obtain a target account identifier registration at a beacon passively, in which the beacon is structured registering variable target account identifier; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) register the target account identifier with the beacon; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) obtain a unique account identifier from a migrant account source associated with a user at the beacon; (See Elston Paragraph 0131-134, 0168 and 0191-0192) obtain a target transaction request at the beacon from the migrant account source; (See Elston Paragraph 0071, 0120 and 0231-0244) commit the target transaction request for the amount specified in the target transaction request to database. (See Elston Paragraph 0071, 0120 and 0231-0244) Elston does not teaches the account identifier are wallet identifier; commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon. However, Yang teaches using payment source wallet identifier as payment source identifier; using target wallet identifier as payment target identifier and processing payment by transmitting a destination address of a payee to receive a payment from the payment source wallet identifier to a distributed blockchain database structured propagating the transaction request to a distributed blockchain database network for payment targeted to the destination address provided. (See Yang Paragraph 0018, 0033-0034 and 0058-0059) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston with teaching from Yang to execute the payment transaction using cryptocurrency protocol. One of ordinary skill in the art would have been motivated as cryptocurrency payment enable higher anonymity of financial transactions, more flexibility in types of financial transactions, and better protection of user privacy (See Yang 0003), adapting such form of payment increases the usability of the system. Elston in view of Yang does not teach in which the beacon and obtainment of the unique wallet identifier is triggered by the userâs proximity to the beacon and in which the beacon is structured having non-RFID wireless communication. However, Hymes teaches a terminal obtaining identifier triggered by the userâs proximity to the beacon and in which the terminal is structured having non-RFID wireless communication. (See Hymes Paragraph 0075) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of non-RFID technology. One of ordinary skill in the art would have been motivated as non-RFID, such as wifi and bluetooth, is a known form of effective communication. As per claims 2, Elston in view of Yang in view of Hymes teaches: in which the beacon is registered to an organization. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 3, Elston in view of Yang in view of Hymes teaches: in which the target wallet identifier is of an employee of the organization. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 4, Elston in view of Yang in view of Hymes teaches: verify the target wallet identifier is associated with the organization. (See Elston Paragraph 0090-0101 and 0232-0236 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 5, Elston in view of Yang in view of Hymes teaches: in which the verification includes identifying the target wallet identifier exists in the organizationâs database. (See Elston Paragraph 0090-0101 and 0232-0236 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 6, Elston in view of Yang in view of Hymes teaches: in which the verification includes authentication credentials. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 7, Elston in view of Yang in view of Hymes teaches: in which the authentication credentials are digitally signed. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 8, Elston in view of Yang in view of Hymes teaches: in which the authentication credentials are encrypted. (See Elston Paragraph 0090-0101 and 0232-0236) As per claims 9, Elston in view of Yang in view of Hymes teaches: in which the registration of the target wallet occurs upon the verification. (See Elston Paragraph 0090-0101 and 0232-0236 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 15, Elston in view of Yang in view of Hymes teaches: in which the beacon is a target mobile user device with access to a target userâs target wallet associated with the target wallet identifier. (See Elston Paragraph 0071-0073 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 16, Elston in view of Yang in view of Hymes teaches: in which the unique wallet identifierâs source is a source mobile user device with access to a userâs source wallet associated with the unique wallet identifier. (See Elston Paragraph 0071-0073 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 19, Elston in view of Yang in view of Hymes teaches: in which the beacon may be integral to a device. As per claims 20, Elston in view of Yang in view of Hymes teaches: in which the integration may be through a smart device having a processor and wireless communication. (See Elston Paragraph 0060-0071) As per claims 21, Elston in view of Yang in view of Hymes teaches: in which the integration may be by affixing a beacon to the device. (See Elston Paragraph 0060-0071) As per claim 29, Elston teaches a non-transient medium storing processor- executable components, the components, comprising: a component collection stored in the medium, including: a point-to-point guidance component; (See Elston Paragraph 0061-0071, the âpoint-to-point guidance componentâ is interpreted as software or computer program under the Broadest Reasonable Interpretation in light of the Specification.) in which the component collection, stored in the medium, includes processor-issuable instructions to: obtain a target account identifier registration at a beacon passively, in which the beacon is structured registering variable target account identifier; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) register the target account identifier with the beacon; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) obtain a unique account identifier from a migrant account source associated with a user at the beacon; (See Elston Paragraph 0131-134, 0168 and 0191-0192) obtain a target transaction request at the beacon from the migrant account source; (See Elston Paragraph 0071, 0120 and 0231-0244) commit the target transaction request for the amount specified in the target transaction request to database. (See Elston Paragraph 0071, 0120 and 0231-0244) Elston does not teaches the account identifier are wallet identifier; commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon. However, Yang teaches using payment source wallet identifier as payment source identifier; using target wallet identifier as payment target identifier and processing payment by transmitting a destination address of a payee to receive a payment from the payment source wallet identifier to a distributed blockchain database structured propagating the transaction request to a distributed blockchain database network for payment targeted to the destination address provided. (See Yang Paragraph 0018, 0033-0034 and 0058-0059) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston with teaching from Yang to execute the payment transaction using cryptocurrency protocol. One of ordinary skill in the art would have been motivated as cryptocurrency payment enable higher anonymity of financial transactions, more flexibility in types of financial transactions, and better protection of user privacy (See Yang 0003), adapting such form of payment increases the usability of the system. Elston in view of Yang does not teach in which the beacon and obtainment of the unique wallet identifier is triggered by the userâs proximity to the beacon and in which the beacon is structured having non-RFID wireless communication. However, Hymes teaches a terminal obtaining identifier triggered by the userâs proximity to the beacon and in which the terminal is structured having non-RFID wireless communication. (See Hymes Paragraph 0075) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of non-RFID technology. One of ordinary skill in the art would have been motivated as non-RFID, such as wifi and bluetooth, is a known form of effective communication. As per claim 57, Elston teaches a method comprising: executing processor-implemented point-to-point guidance component instructions to: obtain a target account identifier registration at a beacon passively, in which the beacon is structured registering variable target account identifier; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) register the target account identifier with the beacon; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) obtain a unique account identifier from a migrant account source associated with a user at the beacon; (See Elston Paragraph 0131-134, 0168 and 0191-0192) obtain a target transaction request at the beacon from the migrant account source; (See Elston Paragraph 0071, 0120 and 0231-0244) commit the target transaction request for the amount specified in the target transaction request to database. (See Elston Paragraph 0071, 0120 and 0231-0244) Elston does not teaches the account identifier are wallet identifier; commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon. However, Yang teaches using payment source wallet identifier as payment source identifier; using target wallet identifier as payment target identifier and processing payment by transmitting a destination address of a payee to receive a payment from the payment source wallet identifier to a distributed blockchain database structured propagating the transaction request to a distributed blockchain database network for payment targeted to the destination address provided. (See Yang Paragraph 0018, 0033-0034 and 0058-0059) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston with teaching from Yang to execute the payment transaction using cryptocurrency protocol. One of ordinary skill in the art would have been motivated as cryptocurrency payment enable higher anonymity of financial transactions, more flexibility in types of financial transactions, and better protection of user privacy (See Yang 0003), adapting such form of payment increases the usability of the system. Elston in view of Yang does not teach in which the beacon and obtainment of the unique wallet identifier is triggered by the userâs proximity to the beacon and in which the beacon is structured having non-RFID wireless communication. However, Hymes teaches a terminal obtaining identifier triggered by the userâs proximity to the beacon and in which the terminal is structured having non-RFID wireless communication. (See Hymes Paragraph 0075) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of non-RFID technology. One of ordinary skill in the art would have been motivated as non-RFID, such as wifi and bluetooth, is a known form of effective communication. As per claim 85, Elston teaches a system comprising: means to process processor-executable instructions from the component collection, the component collection storage structured with processor executable instruction including: obtain a target account identifier registration at a beacon, in which the beacon is structured registering variable target account identifier; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) register the target account identifier with the beacon; (See Elston Paragraph 0090-0101 and 0232-0236, merchant account and employee ID teaches a target account identifier, while the linking or association process teaches a registration.) obtain a unique account identifier from a migrant account source associated with a user at the beacon; (See Elston Paragraph 0131-134, 0168 and 0191-0192) obtain a target transaction request at the beacon from the migrant account source; (See Elston Paragraph 0071, 0120 and 0231-0244) commit the target transaction request for the amount specified in the target transaction request to database. (See Elston Paragraph 0071, 0120 and 0231-0244) Elston does not teaches the account identifier are wallet identifier; commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database structured propagating the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beacon. However, Yang teaches using payment source wallet identifier as payment source identifier; using target wallet identifier as payment target identifier and processing payment by transmitting a destination address of a payee to receive a payment from the payment source wallet identifier to a distributed blockchain database structured propagating the transaction request to a distributed blockchain database network for payment targeted to the destination address provided. (See Yang Paragraph 0018, 0033-0034 and 0058-0059) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston with teaching from Yang to execute the payment transaction using cryptocurrency protocol. One of ordinary skill in the art would have been motivated as cryptocurrency payment enable higher anonymity of financial transactions, more flexibility in types of financial transactions, and better protection of user privacy (See Yang 0003), adapting such form of payment increases the usability of the system. Elston in view of Yang does not teach in which the beacon and obtainment of the unique wallet identifier is triggered by the userâs proximity to the beacon and in which the beacon is structured having non-RFID wireless communication. However, Hymes teaches a terminal obtaining identifier triggered by the userâs proximity to the beacon and in which the terminal is structured having non-RFID wireless communication. (See Hymes Paragraph 0075) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of non-RFID technology. One of ordinary skill in the art would have been motivated as non-RFID, such as wifi and bluetooth, is a known form of effective communication. Claims 10-14, 17, 18, are is/are rejected under 35 U.S.C. 103 as being unpatentable over Elston et al (US 2003/0191709) in view of Yang et al (US 2015/0287026) in view of Hymes (US 2008/0064333), as applied to claims 1-9, 15, 16, 19-21, 29, 57 and 85, further in view of Griffin et al (US 2014/0074497). As per claims 10, Elston in view of Yang in view of Hymes teaches: in which the transaction request includes a number of additional fields specified in a transaction payload. (See Elston Paragraph 0071, 0120 and 0231-0244) but not that the transaction payload is 80 byte. However, Griffin teaches containing transaction information within an 80-byte transaction message. (See Griffin Paragraph 0022 and 0039) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang in view of Hymes with teaching from Griffin to convey transaction request in an 80-byte transaction record. One of ordinary skill in the art would have been motivated as low volume message reduces data usage. As per claims 11, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include a tip amount. (See Elston Paragraph 0071, 0127 and 0236) As per claims 12, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include the beaconâs unique identifier. (See Elston Paragraph 0092) As per claims 13, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include the target wallet identifier. (See Elston Paragraph 0071-0073 and Yang Paragraph 0018, 0033-0034 and 0058-0059 regarding wallet identifier.) As per claims 14, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include the userâs identification information. (See Elston Paragraph 0192) As per claims 17, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include a transaction amount. (See Elston Paragraph 0236) As per claims 18, Elston in view of Yang in view of Hymes in view of Griffin teaches: in which the fields include a transaction item. (See Elston Paragraph 0236) Claims 22-28 are is/are rejected under 35 U.S.C. 103 as being unpatentable over Elston et al (US 2003/0191709) in view of Yang et al (US 2015/0287026) in view of in view of Hymes (US 2008/0064333), as applied to claims 1-9, 15, 16, 19-21, 29, 57 and 85, further in view of Imes et al (US 2015/0195099). As per claim 22, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon may be affixed to a utility meter. However, Imes teaches a network connect to utility meter recording usage. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang in view of Hymes with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 23, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter may be read by a user. However, Imes teaches a network connect to utility meter recording usage. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang in view of Hymes with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 24, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter may be read by a user and outstanding usage may be paid by the user. However, Imes teaches a network connect to utility meter recording usage. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang in view of Hymes with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 25, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter is a refrigerator at a hotel, and usage metrics include items consumed by the user. However, Imes teaches a network connect to utility meter recording usage of a refirgerator. (See Imes Paragraph 0003, 0018, 0032, 0035, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 26, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter is a thermostat at a hotel, and usage metrics include items consumed by the user. However, Imes teaches a network connect to utility meter recording usage of thermostat. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 27, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter is a television at a hotel, and usage metrics include items viewed by the user. However, Imes teaches a network connect to utility meter recording usage of television. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. As per claim 28, Elston in view of Yang in view of Hymes teaches: the beacon being affixed to a vending machine dispensing product; (See Elston Paragraph 0141) does not teach: in which the beacon affixed to a utility meter is a button affixed to consumables at a hotel, and usage metrics include items consumed by the user. However, Imes teaches a network connect to utility meter recording usage. (See Imes Paragraph 0003, 0018, 0032, 0036, 0047, 0050 and 0056) It would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Imes to affix the beacon to a utility meter. One of ordinary skill in the art would have been motivated as such implement allows transaction resulted from utility usage. Response to Arguments Applicant's arguments filed 01/02/2025 have been fully considered but they are not persuasive. Regarding the applicantâs arguments on the rejection under 35 USC 101, the examiner respectfully disagrees. As to the argument that the Office Action ignored the limitations, the examiner respectfully disagrees. The applicant contend that âif a patent applicant were to claim a teleportation device, and the Office took that position that âbut for the teleporterâ, the claim is somehow directed to a manual processâ. However, that is a mischaracterization of the Office Action. For instance, a claim to a teleportation device should include technological specifics of the teleportation device. Using this example, the applicantâs claims would not be claiming the teleportation device, but to claim forth a transaction process using the teleportation device. The applicant clearly did not invent distributed blockchain, nor the processor, nor the beacon. Otherwise, the instant claims or disclosure should recite the technological details of these components. The distributed blockchain, the processor and the beacon are existing generic computing elements in which the cited Judicial Exception is applied on. The examiner maintains that other than invoking a generic computing elements of a proximity triggered beacon, the two limitations argued by the applicant encompasses no more than one or more person manually obtaining the unique wallet identifier and obtain a target transaction request. As to the applicantâs request for âlegal support âŚthat a method claim is patent eligible only if it recites new structureâ, the applicant appeared to misunderstand the nature of the rejection. It should be noted that the claims are rejected upon reciting a Judicial Exception (Step 2A prong one: YES), failing to include additional elements that integrate the recited Judicial Exception into practical application as the claims merely apply the Judicial Exception to generically recited computing elements (Step 2A prong two: NO), and failing to include additional elements that amount the claims to be significantly more than the Judicial Exception. (Step 2B: No). As to the argument citing DDR and Enfish, the examiner maintains that the applicantâs argument did not adequately demonstrate how the claimed invention provide improvement to computer functionality, which is the crux of the eligibility rationale in DDR and Enfish. As discussed in Paged 29 of the Non-Final Office Action, the alleged improvement of âimprove processing/bandwidth are reduced and security is enhancedâ is âdirected to the transaction, such as making the transaction faster, more compact and more secured. The role of the technology involved remains to be tool for conducting the now improved transaction, while the technology used remains unaltered, let alone improved.â As to the argument citing Amdoc and Berheimer, the examiner maintains that the applicantâs argument did not adequately demonstrate how the claims include additional elements or a combination of additional elements that are unconventional. Based on the claim language, the recited additional elements include a generically recited processor invoked to perform the obtaining, registering and committing steps; a beacon for which the claimed processor obtain data at; and a distributed block chain database as a recipient the claimed processor committing transaction requests. As noted in the rejection, the claims merely invoke the generically recited processor to âapplyâ the steps of the cited Organized Human Activity. MPEP 2106.05 (f) indicated that the âapply itâ format of drafting effort would not amount to significantly more. As to the beacon and the blockchain database, the two additional elements are not actively claimed as component of the invention, only where the claimed invention take place and what the claimed processor commits transaction request to. As to the argument the claimed invention provide specific machines and transformation of matter from one for to another, the examiner respectfully disagrees. The examiner maintains that specification Paragraph 00402 and 00404 generally defined the processor, server and client without any technical specificity, indicating the recited machines are generic. MPEP 2106.05 (b) indicates that â[i]t is important to note that a general purpose computer that applies a judicial exception, such as an abstract idea, by use of conventional computer functions does not qualify as a particular machine.â Moreover, the cited paragraph 00461 discussing the transforming of smart contract request is not a transformation of matter from one state to another. MPEP 2106.05 (c) explicitly indicates that â[a]n "article" includes a physical object or substance. The physical object or substance must be particular, meaning it can be specifically identified. "Transformation" of an article means that the "article" has changed to a different state or thing. Changing to a different state or thing usually means more than simply using an article or changing the location of an article. A new or different function or use can be evidence that an article has been transformed. Purely mental processes in which thoughts or human based actions are "changed" are not considered an eligible transformation. For data, mere "manipulation of basic mathematical constructs [i.e.,] the paradigmatic âabstract idea,â" has not been deemed a transformationâ. Since the smart contract request is obviously a non-physical ârequestâ, the transformation of such request is considered to be a transformation according the Particular Transformation analysis. As to the argument that claimed mechanism could not be carried out by human, the examiner maintains that the ineligible claim in Content Extraction & Transmission LLC v. Wells Fargo Bank also processes data in a way not performable by human. CET attempted to distinguish the claim from those found to be abstract in Alice and other case by pointing out the element â scanner and that human minds are unable to process and recognize bit output by scanner. The Court responded that "the claims in Alice also required a computer that processed streams of bit, but nonetheless were found to be abstract". Thus, the requirement of having a computer element to implement an abstract idea does not render such abstract idea eligible. As discussed in the rejection, the claimed beacon merely act as to an insignificant extra solution to obtain information pertaining the Judicial Exception, in which the claimed beacon performs only its conventional function of obtaining data. As to the argument âno human in a retail establishment is asking for everyoneâs mobile phone as they enter the store, and then proceed to somehow obtain a target wallet identifier from the personâs phone and register it with a beacon, and then somehow commit the target transaction request for the amount specified in the target transaction request to a distributed block chain database, and then somehow propagate the target transaction request across a distributed block chain database network for payment targeted to the target wallet identifier registered at the beaconâ, the examiner maintains that while a new form of transaction maybe claimed, âeven newly discovered judicial exceptions are still exceptions, despite their novelty. For example, the mathematical formula in Flook, the laws of nature in Mayo, and the isolated DNA in Myriad were all novel, but nonetheless were considered by the Supreme Court to be judicial exceptions because they were ââbasic tools of scientific and technological workâ that lie beyond the domain of patent protection.â (See July 2015 Update of IGPSME Page 3) Therefore, the applicantâs arguments regarding the rejection under 35 USC 101 are not persuasive. Regarding the applicantâs argument that the cited prior arts do not teach âobtain a target wallet identifier registration at a beacon ⌠commit the target transaction request to a distributed block chain databaseâ, the examiner respectfully disagrees. The applicant argued that Hymes is silent on beacons. However, it should be noted that while Hymes does not use the word beacon in a verbatim fashion, Hymes explicitly discloses the obtaining of identifier triggered by userâs proximity to a terminal having non-RFID wireless communication, rendering the terminal functionality equivalent to the claimed beacon. (See Hymes Paragraph 0075, âbroadcasting a request via bluetooth, WiFi, or UltraWideBand (or other digital or analog signal) to the communications terminals of proximal people to transmit back to the requestor (or to transmit directly to the server along with the requestor's ID/address) their ID's or addressâ) In combination with Elston in view of Yang under the cited motivation, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the transaction system taught by Elston in view of Yang with teaching from Hymes to obtain wallet identifier via proximity triggering of NFC technology. It should be noted that terminal in Hymes is functionally equivalent to the claimed beacon in terms of communication function as it also contain non-RFID functionality such as wifi and bluetooth, while the obtaining of the identifier is proximity based. As to the applicantâs argument that popularity of technology does not provide a suggestion to combine, the examiner contends that the modification of a known method/apparatus with another known method/apparatus to produce predictable result, such as obtaining identifier via NFC to obtaining identifier via non-RFID, is at least supported by the Exemplary Rationale (A), (B), (C), (D) and (G) in MPEP 2143 to obvious. Thus, the applicantâs argument is not persuasive. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to CHO KWONG whose telephone number is (571)270-7955. The examiner can normally be reached 9am - 5pm EST M-F. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examinerâs supervisor, MICHAEL W ANDERSON can be reached on 571-270-0508. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /CHO YIU KWONG/Primary Examiner, Art Unit 3693