Patent Application 15851326 - SECURE END-TO-END PERSONALIZATION OF SMART CARDS - Rejection
Appearance
Patent Application 15851326 - SECURE END-TO-END PERSONALIZATION OF SMART CARDS
Title: SECURE END-TO-END PERSONALIZATION OF SMART CARDS
Application Information
- Invention Title: SECURE END-TO-END PERSONALIZATION OF SMART CARDS
- Application Number: 15851326
- Submission Date: 2025-05-12T00:00:00.000Z
- Effective Filing Date: 2017-12-21T00:00:00.000Z
- Filing Date: 2017-12-21T00:00:00.000Z
- National Class: 705
- National Sub-Class: 041000
- Examiner Employee Number: 94941
- Art Unit: 3695
- Tech Center: 3600
Rejection Summary
- 102 Rejections: 0
- 103 Rejections: 8
Cited Patents
No patents were cited in this rejection.
Office Action Text
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . This is a Non-Final Office Action in response to application 15/851,326 entitled "SECURE END-TO-END PERSONALIZATION OF SMART CARDS" with amendment filed on September 25, 2024, with claims 1-22 and 24-26 pending. Status of Claims No claims have been amended. Claim 23 was previously cancelled. Claims 1-22 and 24-26 are pending and have been examined. Response to Amendment The response filed September 25, 2024, has been entered. Claims 1-22 and 24-26 remain pending in the application. Applicantâs amendments to the Specification, Drawings, and/or Claims have been noted in response to the Non-Final Office Action mailed April 11, 2024. Information Disclosure Statement The information disclosure statement (IDS) submitted on April 17, 2025, is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the Examiner. Claim Interpretation The following claim limitations are interpreted by the Examiner as follows: Claims 1, 11, 20, and 22: âwithout requiring a concurrent [secured] connection to a card issuance deviceâ. Claim 24: âwithout requiring a concurrent connection to the personalization systemâ. are described as being supported in the specification at [0009] and [0024]. The Remarks dated 4/30/2021 explain âthat the personalization process does not require a connection to the card issuance device to create a virtual smart card in accordance with the present invention, and that the virtual smart card may be later conveyed to the card issuance device so the card issuance device may use the information in the virtual smart card for personalizing a real smart card.â Examiner interprets this as the data personalization software for either the ârealâ or âvirtualâ card exists separate and apart from the printer (card issuance device); Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-22 and 24-26 are rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea without significantly more. Please see MPEP 2106 for additional information regarding Patent Subject Matter Eligibility Guidance. Claims 1-22 and 24-26 are directed to a system, method/process, machine/apparatus, or composition of matter, which are/is one of the statutory categories of invention. (Step 1: YES). The claimed invention is directed to an abstract idea without significantly more. Independent Claim 1 recites: âA method comprising: generating, at a personalization system, a customized dataset including personalization data of a particular user for installation onto a smart card, the customized dataset being generated based on an operating system of the smart card by performing a personalization process to generate a virtual smart card formatted according to the operating system without requiring a concurrent connection âŚ; ⌠at least a portion of the customized dataset, at the personalization system, using an encryption key that is specific to the card issuance device that is separate from the personalization system, the encryption key being different from any encryption key used to secure the customized dataset when stored on the smart card; and ⌠the virtual smart card including the customized dataset...â These limitations, under their broadest reasonable interpretation, cover performance of the limitation as certain methods of organizing human activity. Specific instances include instructions for generating, at a personalization system, a customized dataset and to generate a virtual smart card formatted recite a fundamental economic principles or practice and/or commercial or legal interactions. If a claim limitation, under its broadest reasonable interpretation, covers performance of the limitation as a fundamental economic, commercial, or financial action, principle, or practice then it falls within the âCertain Methods of Organizing Human Activityâ grouping of abstract ideas. Accordingly, the claim recites an abstract idea. (Step 2A-Prong 1: YES. The claims recite an abstract idea). This judicial exception is not integrated into a practical application. In particular, the claims recite the additional elements of: [a card issuance device][to the card issuance device]: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea [encrypting] [transmitting]: insignificant extra-solution activity to the judicial exception of data gathering are recited at a high-level of generality (i.e., as a generic processor performing a generic computer function) such that it amounts no more than mere instructions to apply the exception using a generic computer components and/or electronic processes. For example, the Applicantâs Specification reads, [0033] ârather than use of a card issuance device such as printers106, 107, a software-based card issuance device could be used to issue a smart card to a user. As seen in Fig. 1, a mobile device, such as a smartphone112 having mobile wallet software installed thereon, can act as a card issuance device by including card issuance software capable of generating a real personalized software-implemented smart cardâ. Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. The additional elements merely add instructions to implement an abstract idea on a computer, or merely uses a computer as a tool to perform an abstract idea, see MPEP 2106.05(f). Accordingly, these additional elements, when considered separately and as an ordered combination, do not integrate the abstract idea into a practical application because they do not impose any meaningful limits on practicing the abstract idea and are at a high level of generality. Therefore, Claim 1 is directed to an abstract idea without a practical application. (Step 2A-Prong 2: NO. The additional claimed elements are not integrated into a practical application) Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. The additional elements merely add instructions to implement an abstract idea on a computer, or merely uses a computer as a tool to perform an abstract idea, see MPEP 2106.05(f). Accordingly, the additional elements, do not change the outcome of the analysis, when considered separately and as an ordered combination. The claim further defines the abstract idea and hence is abstract for the reasons presented above. The claim does not include any additional elements that integrate the abstract idea into a practical application or are sufficient to amount to significantly more than the judicial exception when considered both individually and as an ordered combination. For the encryption step that was considered extra-solution activity and determined to be well-understood, routine, conventional activity in the field, the background does not provide any indication that the network appliance is anything other than a generic, off-the-shelf computer component that is a wellâunderstood, routine, and conventional function when it is claimed in a merely generic manner (as it is here). The Specification reads, [0073] âAn Application Load Certificate (ALC)632 can be used as well, and corresponds to a certified copy of the public key of an application provider, as well as an application header. The ALC634 can be signed using a MULTOS card authority's private key certifying key (KCK), allowing any MULTOS card that are appropriately implemented to verify the authenticity of the certificate.â For these reasons, there is no inventive concept. For causing the transmission, MPEP 2106.05(d)(II) indicates that the courts have recognized receiving or transmitting data over a network as well-understood, routine and conventional functions when claimed in a merely generic manner: Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec, 838 F.3d at 1321, 120 USPQ2d at 1362 (utilizing an intermediary computer to forward information); TLI Communications LLC v. AV Auto. LLC, 823 F.3d 607, 610, 118 USPQ2d 1744, 1745 (Fed. Cir. 2016) (using a telephone for image transmission); OIP Techs., Inc., v. Amazon.com, Inc., 788 F.3d 1359, 1363, 115 USPQ2d 1090, 1093 (Fed. Cir. 2015) (sending messages over a network); buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355, 112 USPQ2d 1093, 1096 (Fed. Cir. 2014) (computer receives and sends information over a network).For these reasons, there is no inventive concept. The claims are not patent eligible. Therefore, the claim is directed to an abstract idea. Thus, the claim is not patent eligible. (Step 2B: NO. The claim does not provide significantly more) Dependent Claims recite additional elements. This judicial exception is not integrated into a practical application. In particular, the recited additional elements of Claims 2 and 3: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea Claim 4: (none found: does not include additional elements and merely narrows the abstract idea) Claim 5: âcard issuance deviceâ, âmobile deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âcard printer associated with a physical smart cardâ: merely applying printing technologies as a tool to perform an abstract idea Claim 6: âencryptingâ: insignificant extra-solution activity to the judicial exception Claim 7: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âtransmittingâ: insignificant extra-solution activity to the judicial exception Claim 8: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âdecryptingâ: insignificant extra-solution activity to the judicial exception Claim 9: âcard issuance device via the Internetâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea Claim 10: âencryptedâ: insignificant extra-solution activity to the judicial exception Claim 26: âa computing deviceâ, âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea are recited at a high-level of generality (i.e., as a generic processor performing a generic computer function) such that it amounts no more than mere instructions to apply the exception using a generic computer components and/or electronic processes. For example, the Applicantâs Specification reads, For example, the Applicantâs Specification reads, [0033] ârather than use of a card issuance device such as printers106, 107, a software-based card issuance device could be used to issue a smart card to a user. As seen in Fig. 1, a mobile device, such as a smartphone112 having mobile wallet software installed thereon, can act as a card issuance device by including card issuance software capable of generating a real personalized software-implemented smart cardâ. Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. The additional elements merely add instructions to implement an abstract idea on a computer, or merely uses a computer as a tool to perform an abstract idea, see MPEP 2106.05(f). Accordingly, these additional elements, when considered separately and as an ordered combination, do not integrate the abstract idea into a practical application because they do not impose any meaningful limits on practicing the abstract idea and are at a high level of generality. Therefore, the claim is directed to an abstract idea without a practical application. (Step 2A-Prong 2: NO. The additional claimed elements are not integrated into a practical application) Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. The additional elements merely add instructions to implement an abstract idea on a computer, or merely uses a computer as a tool to perform an abstract idea, see MPEP 2106.05(f). Accordingly, these additional elements, do not change the outcome of the analysis, when considered separately and as an ordered combination. Dependent claims further define the abstract idea that is present in their respective independent claims and hence are abstract for the reasons presented above. The dependent claims do not include any additional elements that integrate the abstract idea into a practical application or are sufficient to amount to significantly more than the judicial exception when considered both individually and as an ordered combination. For the encryption step that was considered extra-solution activity and determined to be well-understood, routine, conventional activity in the field, the background does not provide any indication that the network appliance is anything other than a generic, off-the-shelf computer component that is a wellâunderstood, routine, and conventional function when it is claimed in a merely generic manner (as it is here). The Specification reads, [0073] âAn Application Load Certificate (ALC)632 can be used as well, and corresponds to a certified copy of the public key of an application provider, as well as an application header. The ALC634 can be signed using a MULTOS card authority's private key certifying key (KCK), allowing any MULTOS card that are appropriately implemented to verify the authenticity of the certificate.â For these reasons, there is no inventive concept. For causing the transmission, MPEP 2106.05(d)(II) indicates that the courts have recognized receiving or transmitting data over a network as well-understood, routine and conventional functions when claimed in a merely generic manner: Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec, 838 F.3d at 1321, 120 USPQ2d at 1362 (utilizing an intermediary computer to forward information); TLI Communications LLC v. AV Auto. LLC, 823 F.3d 607, 610, 118 USPQ2d 1744, 1745 (Fed. Cir. 2016) (using a telephone for image transmission); OIP Techs., Inc., v. Amazon.com, Inc., 788 F.3d 1359, 1363, 115 USPQ2d 1090, 1093 (Fed. Cir. 2015) (sending messages over a network); buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355, 112 USPQ2d 1093, 1096 (Fed. Cir. 2014) (computer receives and sends information over a network).For these reasons, there is no inventive concept. Therefore, the dependent claims are directed to an abstract idea. Thus, the dependent claims are not patent eligible. (Step 2B: NO. The claims do not provide significantly more) Independent Claim 11 recites: âA secure end-to-end smart card personalization system comprising: a personalization system comprising âŚcause the personalization system to: generate a customized dataset including personalization data for installation onto a smart card, the customized dataset being generated based on an operating system of the smart card by performing a personalization process to generate a virtual smart card formatted according to the operating system without requiring a concurrent connection to a card issuance device; ⌠at least a portion of the customized dataset, at a personalization system, using an encryption key that is specific to a card issuance device that is separate from the personalization system, the encryption key being different from any encryption key used to secure the customized dataset when stored on the smart card; and ⌠the virtual smart card including the customized dataset to the card issuance device.â These limitations, under their broadest reasonable interpretation, cover performance of the limitation as certain methods of organizing human activity. Specific instances include instructions for generating, at a personalization system, a customized dataset and to generate a virtual smart card formatted recite a fundamental economic principles or practice and/or commercial or legal interactions. If a claim limitation, under its broadest reasonable interpretation, covers performance of the limitation as a fundamental economic, commercial, or financial action, principle, or practice then it falls within the âCertain Methods of Organizing Human Activityâ grouping of abstract ideas. Accordingly, the claim recites an abstract idea. (Step 2A-Prong 1: YES. The claims recite an abstract idea). This judicial exception is not integrated into a practical application. In particular, the claims recite the additional elements of: [a programmable circuit communicatively connected to a memory storing computer executable instructions which, when executed]: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea [encrypt] [transmit]: insignificant extra-solution activity to the judicial exception of data gathering are recited at a high-level of generality (i.e., as a generic processor performing a generic computer function) such that it amounts no more than mere instructions to apply the exception using a generic computer components and/or electronic processes. For example, the Applicantâs Specification reads, [0033] ârather than use of a card issuance device such as printers106, 107, a software-based card issuance device could be used to issue a smart card to a user. As seen in Fig. 1, a mobile device, such as a smartphone112 having mobile wallet software installed thereon, can act as a card issuance device by including card issuance software capable of generating a real personalized software-implemented smart cardâ. Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. The additional elements merely add instructions to implement an abstract idea on a computer, or merely uses a computer as a tool to perform an abstract idea, see MPEP 2106.05(f). Accordingly, these additional elements, when considered separately and as an ordered combination, do not integrate the abstract idea into a practical application because they do not impose any meaningful limits on practicing the abstract idea and are at a high level of generality. Therefore, Claim 11 is directed to an abstract idea without a practical application. (Step 2A-Prong 2: NO. The additional claimed elements are not integrated into a practical application) Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. The additional elements merely add instructions to implement an abstract idea on a computer, or merely uses a computer as a tool to perform an abstract idea, see MPEP 2106.05(f). Accordingly, the additional elements, do not change the outcome of the analysis, when considered separately and as an ordered combination. The claim further defines the abstract idea and hence is abstract for the reasons presented above. The claim does not include any additional elements that integrate the abstract idea into a practical application or are sufficient to amount to significantly more than the judicial exception when considered both individually and as an ordered combination. For the encryption step that was considered extra-solution activity and determined to be well-understood, routine, conventional activity in the field, the background does not provide any indication that the network appliance is anything other than a generic, off-the-shelf computer component that is a wellâunderstood, routine, and conventional function when it is claimed in a merely generic manner (as it is here). The Specification reads, [0073] âAn Application Load Certificate (ALC)632 can be used as well, and corresponds to a certified copy of the public key of an application provider, as well as an application header. The ALC634 can be signed using a MULTOS card authority's private key certifying key (KCK), allowing any MULTOS card that are appropriately implemented to verify the authenticity of the certificate.â For these reasons, there is no inventive concept. For causing the transmission, MPEP 2106.05(d)(II) indicates that the courts have recognized receiving or transmitting data over a network as well-understood, routine and conventional functions when claimed in a merely generic manner: Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec, 838 F.3d at 1321, 120 USPQ2d at 1362 (utilizing an intermediary computer to forward information); TLI Communications LLC v. AV Auto. LLC, 823 F.3d 607, 610, 118 USPQ2d 1744, 1745 (Fed. Cir. 2016) (using a telephone for image transmission); OIP Techs., Inc., v. Amazon.com, Inc., 788 F.3d 1359, 1363, 115 USPQ2d 1090, 1093 (Fed. Cir. 2015) (sending messages over a network); buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355, 112 USPQ2d 1093, 1096 (Fed. Cir. 2014) (computer receives and sends information over a network).For these reasons, there is no inventive concept. The claims are not patent eligible. Therefore, the claim is directed to an abstract idea. Thus, the claim is not patent eligible. (Step 2B: NO. The claim does not provide significantly more) Dependent Claims recite additional elements. This judicial exception is not integrated into a practical application. In particular, the recited additional elements of Claims 12 and 14: (none found: does not include additional elements and merely narrows the abstract idea) Claim 15: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea Claim 16: âcard issuance deviceâ, âInternetâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea Claim 17: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âsmart card printerâ: merely applying printing technologies as a tool to perform an abstract idea Claim 18: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea Claim 19: âcard issuance deviceâ, âInternetâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea Claim 20: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âencryptâ: insignificant extra-solution activity to the judicial exception Claim 21: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âencryptedâ, âdecryptedâ: insignificant extra-solution activity to the judicial exception Claim 22: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âencryptingâ: insignificant extra-solution activity to the judicial exception Claim 24: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âencryptedâ: insignificant extra-solution activity to the judicial exception Claim 25: âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âdecryptingâ: insignificant extra-solution activity to the judicial exception Claim 26: âcomputing deviceâ, âcard issuance deviceâ: merely applying computer processing, networking, and display technologies as a tool to perform an abstract idea âcard issuance device comprises a card printer.â: merely applying printing technologies as a tool to perform an abstract idea are recited at a high-level of generality (i.e., as a generic processor performing a generic computer function) such that it amounts no more than mere instructions to apply the exception using a generic computer components and/or electronic processes. For example, the Applicantâs Specification reads, For example, the Applicantâs Specification reads, [0033] ârather than use of a card issuance device such as printers106, 107, a software-based card issuance device could be used to issue a smart card to a user. As seen in Fig. 1, a mobile device, such as a smartphone112 having mobile wallet software installed thereon, can act as a card issuance device by including card issuance software capable of generating a real personalized software-implemented smart cardâ. Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. The additional elements merely add instructions to implement an abstract idea on a computer, or merely uses a computer as a tool to perform an abstract idea, see MPEP 2106.05(f). Accordingly, these additional elements, when considered separately and as an ordered combination, do not integrate the abstract idea into a practical application because they do not impose any meaningful limits on practicing the abstract idea and are at a high level of generality. Therefore, the claim is directed to an abstract idea without a practical application. (Step 2A-Prong 2: NO. The additional claimed elements are not integrated into a practical application) Mere instructions to apply an exception using a generic computer component cannot provide an inventive concept. The additional elements merely add instructions to implement an abstract idea on a computer, or merely uses a computer as a tool to perform an abstract idea, see MPEP 2106.05(f). Accordingly, these additional elements, do not change the outcome of the analysis, when considered separately and as an ordered combination. Dependent claims further define the abstract idea that is present in their respective independent claims and hence are abstract for the reasons presented above. The dependent claims do not include any additional elements that integrate the abstract idea into a practical application or are sufficient to amount to significantly more than the judicial exception when considered both individually and as an ordered combination. For the encryption step that was considered extra-solution activity and determined to be well-understood, routine, conventional activity in the field, the background does not provide any indication that the network appliance is anything other than a generic, off-the-shelf computer component that is a wellâunderstood, routine, and conventional function when it is claimed in a merely generic manner (as it is here). The Specification reads, [0073] âAn Application Load Certificate (ALC)632 can be used as well, and corresponds to a certified copy of the public key of an application provider, as well as an application header. The ALC634 can be signed using a MULTOS card authority's private key certifying key (KCK), allowing any MULTOS card that are appropriately implemented to verify the authenticity of the certificate.â For these reasons, there is no inventive concept. For causing the transmission, MPEP 2106.05(d)(II) indicates that the courts have recognized receiving or transmitting data over a network as well-understood, routine and conventional functions when claimed in a merely generic manner: Receiving or transmitting data over a network, e.g., using the Internet to gather data, Symantec, 838 F.3d at 1321, 120 USPQ2d at 1362 (utilizing an intermediary computer to forward information); TLI Communications LLC v. AV Auto. LLC, 823 F.3d 607, 610, 118 USPQ2d 1744, 1745 (Fed. Cir. 2016) (using a telephone for image transmission); OIP Techs., Inc., v. Amazon.com, Inc., 788 F.3d 1359, 1363, 115 USPQ2d 1090, 1093 (Fed. Cir. 2015) (sending messages over a network); buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355, 112 USPQ2d 1093, 1096 (Fed. Cir. 2014) (computer receives and sends information over a network).For these reasons, there is no inventive concept. Therefore, the dependent claims are directed to an abstract idea. Thus, the dependent claims are not patent eligible. (Step 2B: NO. The claims do not provide significantly more) Examinerâs Note Independent claims have been rejected by two separate prior art rejections under 35 USC § 103. Firstly by: Johnson ("METHOD AND SYSTEM FOR PERSONALIZING SMART CARDS USING ASYMMETRIC KEY CRYPTOGRAPHY", U.S. Publication Number: US 20080005567 A1), in view of Tamblyn ("METHOD AND APPARATUS FOR PRINTING A SECURITY CARD", U.S. Publication Number: US 20180086125 A1),in view of Kobayashi (âNETWORK PRINTING SYSTEMâ, Japanese Publication Number: JP2000181645A) Secondly by: Lee ("Personalization of smart cards", U.S. Patent Number: US 6367011B1), in view of Tamblyn ("METHOD AND APPARATUS FOR PRINTING A SECURITY CARD", U.S. Publication Number: US 20180086125 A1) Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1, 2, 5, 8, 11, 20, 21, 22, and 24-26 are rejected under 35 U.S.C. 103 as being unpatentable over Johnson ("METHOD AND SYSTEM FOR PERSONALIZING SMART CARDS USING ASYMMETRIC KEY CRYPTOGRAPHY", U.S. Publication Number: US 20080005567 A1),in view of Tamblyn ("METHOD AND APPARATUS FOR PRINTING A SECURITY CARD", U.S. Publication Number: US 20180086125 A1),in view of Kobayashi (âNETWORK PRINTING SYSTEMâ, Japanese Publication Number: JP2000181645A) Regarding Claim 1, Johnson teaches, A method comprising: generating, at a personalization system, a customized dataset including personalization data of a particular user for installation onto a smart card, (Johnson [0031] data 14 to be used by the application, such as, for example, the personalization data, can be passed to the application Johnson [0032] permit smart card personalization data to be encrypted) the customized dataset being generated based on an operating system of the smart card by performing a personalization process (Johnson [0028] permit a smart card using Java Card⢠technology, MULTOS⢠technology or any other type of proprietary technology to be personalized in a secure way using asymmetric cryptography. A smart card can consist of, for example, a secure microcontroller implemented in hardware, firmware containing an operating system and/or Java Card Runtime Environment implementation Johnson [0039] the various perso_descriptors 544 can be formatted into a data structure called the plaintext_KTU Examiner notes the Applicant's invention also utilizes MULTOS operating system as Johnson (i.e., the operating systems are equivalent) The Applicantâs Specification in the instant application reads: [0025] Examples of operating systems include MULTOS, GlobalPlatform, and a variety of proprietary or native operating systems [0072] system 600 for secure personalization of a smart card using a first operating system, such as the MULTOS operating system. [0073] can be signed using a MULTOS card authority's private key certifying key (KCK), allowing any MULTOS card that are appropriately implemented to verify the authenticity of the certificate. to generate a virtual smart card formatted according to the operating system (Johnson [0010] During personalization, the smart card is generally loaded ... with data that allows the card to be used in a payment system, for example. Personalization data may include file information, application information, a maximum value for an application or of the card and a personal identification number (PIN) or other cardholder information. Also included may be the currency in which the card or application is valid, the expiration date of the card or application, and a variety of cryptographic keys and algorithm information for the card or applications on the card.) Examiner notes the Applicant's invention also utilizes MULTOS operating system and formatting as Johnson (i.e., the operating systems are equivalent) The Applicantâs Specification in the instant application reads: [0025] Examples of operating systems include MULTOS, GlobalPlatform, and a variety of proprietary or native operating systems [0072] system 600 for secure personalization of a smart card using a first operating system, such as the MULTOS operating system. [0073] can be signed using a MULTOS card authority's private key certifying key (KCK), allowing any MULTOS card that are appropriately implemented to verify the authenticity of the certificate.) encrypting at least a portion of the customized dataset, at the personalization system (Johnson [0006] The encryption is generally accomplished by manipulating or transforming the message using a cipher key or keys. Johnson [0016] a plurality of keys are provided to the device including device-related keys, provider-specific keys, and transfer keys. Personalization instructions can be directed to a selected application in the device Johnson [Claim 5] for encrypting the personalization instruction) Johnson implicitly teaches âwithout requiring a concurrent connection to a card issuance deviceâ because the âtransfer keyâ to encrypt the personalization instruction being sent to the smart card application, without an online secured link established between the application on the smart card and the application provider (i.e., a secure channel). Johnson teaches in [0014] that in related arts personalization requires a secure channel between the application on the smart card and the application provider. Johnson states in [0007] secure channels are impractical and expensive. Johnson does not explicitly teach using an encryption key that is specific to the card issuance device that is separate from the personalization system, the encryption key being different from any encryption key used to secure the customized dataset when stored on the smart card; without requiring a concurrent connection to a card issuance device; transmitting the virtual smart card including the customized dataset to the card issuance device. Tamblyn teaches, using an encryption key that is specific to the card issuance device âŚ, the encryption key being different from any encryption key used to secure the customized dataset when stored on the smart card; (Tamblyn [0012] using a decryption key stored local to the printer being used to print the security image prior to printing the visual security image. Tamblyn [0079] The decryption key may for example only be accessed or used by certain printers (identified by unique properties to that printer) Tamblyn [0025] may be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do so. When authorised to print ... using a decryption key stored local to the printer prior to printing the security image.) transmitting the virtual smart card including the customized dataset to the card issuance device. (Tamblyn [0020] Such a printer enables a security card to be printed, where the security card has a primary image (for example an image of the card bearer, and/or some other identifying data pertaining to the card bearer) together with a visual security image that identifies the card as being a genuine Tamblyn [0052] The VSI can be customised, by the printer manufacturer, so that it is a specific image chosen by the end user. This will typically be a corporate logo, a government logo, or other image which is proprietary to the end user. In this case when the VSI is a custom image, the ability to print that image may be programmed into each individual printer. Tamblyn [Abstract] A security image is printed onto the receiving layer of a dye receptive reverse transfer film, which can then be applied to the card and bonded with the card. The printing of the security image occurs by transferring overcoat material from an overcoat panel of the dye carrying film onto the receiving layer of the dye receptive reverse transfer film in a pattern, which forms the visual security image. .... in a reverse transfer printing method to provide a security card having a primary image and a security image. Tamblyn [0012] The visual security image may be encrypted with an encryption key for preventing unauthorised printing of the visual security image. As such, printing of a visual security image may be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do so. When authorised to print the encrypted visual security image, receiving a visual security image to be printed may comprise receiving the encrypted visual security image, and decrypting the encrypted visual security image using a decryption key stored local to the printer being used to print the security image prior to printing the visual security image.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the card printer encryption key teachings of Tamblyn that is âusing a decryption key stored local to the printer.â (Tamblyn [0012]). The modification would have been obvious, because it is merely applying a known technique (i.e. card printer encryption key) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âmay be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do soâ Tamblyn [0025]) Tamblyn suggests the VSI is received from a remote entity (Tamblyn [0052] âVSI can be customized, by the printer manufacturerâ ) does not teach without requiring a concurrent connection to a card issuance device; While Johnson also implies personalizing a card without requiring a concurrent connection to a card issuance device (Johnson [0042] âapplication may be personalized by sending commands directly from personalization equipment such as a smart card reader, point of sale terminal, ATM or smart card printer/encoder or other such equipment âŚThe personalization commands can be passed to the smart card platform from the on-card application by using an application program interface (API) provided by the smart card operating systemâ ), Johnson is not explicit about âa personalization process ⌠without requiring a concurrent connection to a card issuance device.â Kobayashi explicitly teaches, without requiring a concurrent connection to a card issuance device (Kobayashi [0005] Since the job data is absorbed into various buffers existing between the personal computer and the network printer, the next print processing is started even though the print processing is not actually completed....the buffer processing and the asynchronous processing are necessary for efficient processing Kobayashi [0006] unprocessed data is minimized and the number of connections is effectively used. Kobayashi [0015] The print spooler 209 creates a queue for the port monitor 210 and processes each job. There is no flow control function between the print daemon 204 and the port monitor 210.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the asynchronous network printing system teachings of Kobayashi where âjob data is absorbed into various buffers.â (Kobayashi [0005]). The modification would have been obvious, because it is merely applying a known technique (i.e. asynchronous network printing) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âbuffer processing and the asynchronous processing are necessary for efficient processingâ Kobayashi [0005]) Regarding Claim 2, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 1 as described earlier. Johnson teaches, wherein the encryption key comprises a public key of a public-private key pair, wherein a private key of the public-private key pair (Johnson [0034] smart card 12 (MCD) can maintain an asymmetric key pair, including a public key 124 (MKD_PK) and a private key) Johnson does not teach is maintained at the card issuance device or a key repository. Tamblyn teaches, [the key] is maintained at the card issuance device or a key repository. (Tamblyn [0012] using a decryption key stored local to the printer being used to print the security image prior to printing the visual security image. Tamblyn [0079] The decryption key may for example only be accessed or used by certain printers (identified by unique properties to that printer) Tamblyn [0025] may be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do so. When authorised to print ... using a decryption key stored local to the printer prior to printing the security image.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the card printer encryption key teachings of Tamblyn that is âusing a decryption key stored local to the printer.â (Tamblyn [0012]). The modification would have been obvious, because it is merely applying a known technique (i.e. card printer encryption key) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âmay be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do soâ Tamblyn [0025]) Regarding Claim 5, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 1 as described earlier. Johnson teaches, wherein the card issuance device comprises at least one of a card printer associated with a physical smart card or a mobile device onto which an electronic smart card is installed. (Johnson [Abstract] permit a smart card to be personalized Johnson [0042] the application may be personalized by sending commands directly from personalization equipment such as a smart card reader, point of sale terminal, ATM or smart card printer/encoder or other such equipment Johnson [0058] personalization equipment includes smart card readers, point of sale terminals, ATMs and smart card printers.) Regarding Claim 8, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 1 as described earlier. Johnson teaches, using a secured communication session established using one or more encryption keys of the smart card, the one or more encryption keys being different from the key specific to the card issuance device. (Johnson [0014] the establishment of a session key, and (3) then secured communication of many personalization commands through the established secure channel. Johnson [0016] a plurality of keys are provided to the device including device-related keys, provider-specific keys, and transfer keys. Personalization instructions can be directed to a selected application in the device. The selected application is typically identified and the personalization instructions can be encrypted using different ones of the plurality of keys. Johnson [0017] The plurality of keys can also include transfer keys used to secure the personalization instruction through encryption. In certain embodiments, the plurality of keys includes a device-specific secret key and a device-specific public key.) Johnson does not teach decrypting the encrypted at least a portion of the customized dataset received at the card issuance device using a key specific to the card issuance device; based on the customized dataset, personalizing the smart card. Tamblyn teaches, decrypting the encrypted at least a portion of the customized dataset received at the card issuance device using a key specific to the card issuance device; based on the customized dataset, personalizing the smart card. (Tamblyn [0012] decrypting the encrypted visual security image using a decryption key stored local to the printer being used to print the security image prior to printing the visual security image.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the card printer encryption key teachings of Tamblyn that is âusing a decryption key stored local to the printer.â (Tamblyn [0012]). The modification would have been obvious, because it is merely applying a known technique (i.e. card printer encryption key) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âmay be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do soâ Tamblyn [0025]) Claim 11 is rejected on the same basis as Claim 1. Claim 20 is rejected on the same basis as Claim 1. Claim 21 is rejected on the same basis as Claim 8. Regarding Claim 22, Johnson teaches, A method of personalizing a smart card, the method comprising: receiving at a personalization system an operating system type of a smart card to be personalized; (Johnson [0028] Certain embodiments of the present invention permit a smart card using Java Card⢠technology, MULTOS⢠technology or any other type of proprietary technology to be personalized in a secure way using asymmetric cryptography. A smart card can consist of, for example, a secure microcontroller implemented in hardware, firmware containing an operating system and/or Java Card Runtime Environment implementation, and volatile and non-volatile memory for the storage and processing of software programs or other executable code and their associated data) generating a customized dataset including personalization data for installation onto the smart card (Johnson [0031] data 14 to be used by the application, such as, for example, the personalization data, can be passed to the application Johnson [0032] permit smart card personalization data to be encrypted) to be personalized by performing a personalization process using a virtual smart card formatted according to the operating system (Johnson [0028] permit a smart card using Java Card⢠technology, MULTOS⢠technology or any other type of proprietary technology to be personalized in a secure way using asymmetric cryptography. A smart card can consist of, for example, a secure microcontroller implemented in hardware, firmware containing an operating system and/or Java Card Runtime Environment implementation Johnson [0039] the various perso_descriptors 544 can be formatted into a data structure called the plaintext_KTU Examiner notes the Applicant's invention also utilizes MULTOS operating system: [0025] Examples of operating systems include MULTOS, GlobalPlatform, and a variety of proprietary or native operating systems [0072] system 600 for secure personalization of a smart card using a first operating system, such as the MULTOS operating system. [0073] can be signed using a MULTOS card authority's private key certifying key (KCK), allowing any MULTOS card that are appropriately implemented to verify the authenticity of the certificate.) at the personalization system (Johnson [0057] Certain embodiments of the invention provide methods for remotely personalizing an electronically addressable device that comprise providing one or more secured personalization instructions and a ciphertext_KTU to remote personalization equipment) transmitting the virtual smart card including the encrypted customized dataset to the card issuance device. (Johnson [0057] remotely personalizing an electronically addressable device that comprise providing one or more secured personalization instructions and a ciphertext_KTU to remote personalization equipment Johnson [0003] personalizing smart cards...personalizing smart cards using asymmetric key cryptography. Johnson [0058] providing additional secured personalization instructions to the remote personalization equipment,....personalization equipment includes... smart card printers. Johnson [0006] sending a message from a sender to a receiver over a medium so that the message is secure... This process is typically referred to as enciphering..... This process is typically referred to as deciphering. So long as only the sender and receiver have knowledge of the cipher key, such an encrypted transmission is secure. Johnson [Abstract] whereby the personalized instructions can be encrypted) Johnson does not teach without requiring a concurrent secured connection to the card issuance device; receiving an encryption key specific to the card issuance device and encrypting at least a portion of the customized dataset prior to transmitting the customized dataset to the card issuance device; the encryption key being different from any encryption key used to secure the customized dataset when stored on the smart card; and after the customized dataset is generated. Tamblyn teaches, receiving an encryption key specific to the card issuance device and encrypting at least a portion of the customized dataset prior to transmitting the customized dataset to the card issuance device (Tamblyn [0025] The visual security image may be encrypted with an encryption key for preventing unauthorised printing of the visual security image. As such, printing of a visual security image may be limited to a particular printer ...When authorised to print the encrypted visual security image, the controller may be configured to decrypt the encrypted visual security image using a decryption key stored local to the printer prior to printing the security image. Tamblyn [0012] When authorised to print the encrypted visual security image, receiving a visual security image to be printed may comprise receiving the encrypted visual security image, and decrypting the encrypted visual security image using a decryption key stored local to the printer being used to print the security image prior to printing the visual security image.) the encryption key being different from any encryption key used to secure the customized dataset when stored on the smart card; (Tamblyn [0012] using a decryption key stored local to the printer being used to print the security image prior to printing the visual security image. Tamblyn [0079] The decryption key may for example only be accessed or used by certain printers (identified by unique properties to that printer) Tamblyn [0025] may be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do so. When authorised to print ... using a decryption key stored local to the printer prior to printing the security image.) and after the customized dataset is generated (Tamblyn [0025] The visual security image may be encrypted with an encryption key for preventing unauthorised printing of the visual security image.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the card printer encryption key teachings of Tamblyn that is âusing a decryption key stored local to the printer.â (Tamblyn [0012]). The modification would have been obvious, because it is merely applying a known technique (i.e. card printer encryption key) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âmay be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do soâ Tamblyn [0025]) Tamblyn suggests the VSI is received from a remote entity (Tamblyn [0052] âVSI can be customized, by the printer manufacturerâ ) does not teach without requiring a concurrent connection to a card issuance device; While Johnson also implies personalizing a card without requiring a concurrent connection to a card issuance device (Johnson [0042] âapplication may be personalized by sending commands directly from personalization equipment such as a smart card reader, point of sale terminal, ATM or smart card printer/encoder or other such equipment âŚThe personalization commands can be passed to the smart card platform from the on-card application by using an application program interface (API) provided by the smart card operating systemâ ), Johnson is not explicit about âa personalization process ⌠without requiring a concurrent connection to a card issuance device.â Kobayashi explicitly teaches, without requiring a concurrent secured connection to a card issuance device (Kobayashi [0005] Since the job data is absorbed into various buffers existing between the personal computer and the network printer, the next print processing is started even though the print processing is not actually completed....the buffer processing and the asynchronous processing are necessary for efficient processing Kobayashi [0006] unprocessed data is minimized and the number of connections is effectively used. Kobayashi [0015] The print spooler 209 creates a queue for the port monitor 210 and processes each job. There is no flow control function between the print daemon 204 and the port monitor 210.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the asynchronous network printing system teachings of Kobayashi where âjob data is absorbed into various buffers.â (Kobayashi [0005]). The modification would have been obvious, because it is merely applying a known technique (i.e. asynchronous network printing) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âbuffer processing and the asynchronous processing are necessary for efficient processingâ Kobayashi [0005]) Regarding Claim 24, Johnson teaches, in a first communication session, transmitting from a card issuance device ( Johnson [0035] âApplication provider 10 receives (33) the MKD_PKC 204 of a particular target smart card 12 which includes an application that requires personalization data.â ( Johnson [Figure 1]: PNG media_image1.png 792 578 media_image1.png Greyscale Card-specific Public Key 124 sent from the smart card 12 to Application Provider 10. Johnson [0042] application may be personalized by sending commands directly from personalization equipment such as a smart card reader, point of sale terminal, ATM or smart card printer/encoder or other such equipment) to a personalization system an operating system type of a smart card to be personalized; (Johnson [0028] Certain embodiments of the present invention permit a smart card using Java Card⢠technology, MULTOS⢠technology or any other type of proprietary technology to be personalized in a secure way using asymmetric cryptography. A smart card can consist of, for example, a secure microcontroller implemented in hardware, firmware containing an operating system and/or Java Card Runtime Environment implementation, and volatile and non-volatile memory for the storage and processing of software programs or other executable code and their associated data Johnson [0035] Application provider 10 receives (33) the MKD_PKC 204 of a particular target smart card 12 which includes an application that requires personalization data.) in a second communication session different from the first communication session (Johnson [Figure 1, at step 114] PNG media_image1.png 792 578 media_image1.png Greyscale Smart Card 12 receives personalization commands for specific smart card from Application Provider 10. Johnson [0041] âIn certain embodiments of the invention, the encrypted personalization commands, ciphertext_KTU 52 and KTU_sig 50 can be transported to the location where the data can be loaded into the smart card. This transportation does not require any security, as the personalization data is encrypted with a public key and may only be decrypted within the smart card containing a correct private key.â) receiving, at a card issuance device, a customized dataset including personalization data for installation onto the smart card to be personalized, (Johnson [0042] application may be personalized by sending commands directly from personalization equipment such as a smart card reader, point of sale terminal, ATM or smart card printer/encoder or other such equipment Johnson [0011] The personalization device generally provides data which, when installed on a card) the customized dataset including a personalized virtual smart card (Johnson [0042] application may be personalized by sending commands directly from personalization equipment such as a smart card reader, point of sale terminal, ATM or smart card printer/encoder or other such equipment Johnson [0011] The personalization device generally provides data which, when installed on a card Johnson [0010] During personalization, the smart card is generally loaded ... with data that allows the card to be used in a payment system, for example. Personalization data may include file information, application information, a maximum value for an application or of the card and a personal identification number (PIN) or other cardholder information. Also included may be the currency in which the card or application is valid, the expiration date of the card or application, and a variety of cryptographic keys and algorithm information for the card or applications on the card.) formatted according to the operating system; (Johnson [0028] Certain embodiments of the present invention permit a smart card using Java Card⢠technology, MULTOS⢠technology or any other type of proprietary technology to be personalized in a secure way using asymmetric cryptography. A smart card can consist of, for example, a secure microcontroller implemented in hardware, firmware containing an operating system and/or Java Card Runtime Environment implementation, and volatile and non-volatile memory for the storage and processing of software programs or other executable code and their associated data) Johnson implicitly teaches âwithout requiring a concurrent connection to the personalization systemâ because the âtransfer keyâ to encrypt the personalization instruction being sent to the smart card application, without an online secured link established between the application on the smart card and the application provider (i.e., a secure channel). Johnson teaches in [0014] that in related arts personalization requires a secure channel between the application on the smart card and the application provider. Johnson states in [0007] secure channels are impractical and expensive. Therefore, Johnson does not explicitly teach personalizing a real smart card using the customized dataset at the card issuance device without requiring a concurrent connection to the personalization system, wherein, when received at the card issuance device, the customized dataset is encrypted with an encryption key specific to the card issuance device. Tamblyn teaches, personalizing a real smart card using the customized dataset at the card issuance device (Tamblyn [0020] Such a printer enables a security card to be printed, where the security card has a primary image (for example an image of the card bearer, and/or some other identifying data pertaining to the card bearer) together with a visual security image that identifies the card as being a genuine) wherein, when received at the card issuance device, the customized dataset is encrypted with an encryption key specific to the card issuance device. (Tamblyn [0012] using a decryption key stored local to the printer being used to print the security image prior to printing the visual security image. Tamblyn [0079] The decryption key may for example only be accessed or used by certain printers (identified by unique properties to that printer) Tamblyn [0025] may be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do so. When authorised to print ... using a decryption key stored local to the printer prior to printing the security image.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the card printer encryption key teachings of Tamblyn that is âusing a decryption key stored local to the printer.â (Tamblyn [0012]). The modification would have been obvious, because it is merely applying a known technique (i.e. card printer encryption key) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âmay be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do soâ Tamblyn [0025]) Tamblyn suggests the VSI is received from a remote entity (Tamblyn [0052] âVSI can be customized, by the printer manufacturerâ ) does not teach explicitly without requiring a concurrent connection to the personalization system; Tamblyn does not explicitly teach without requiring a concurrent connection to the personalization system. Kobayashi teaches, without requiring a concurrent connection to the personalization system (Kobayashi [0005] Since the job data is absorbed into various buffers existing between the personal computer and the network printer, the next print processing is started even though the print processing is not actually completed....the buffer processing and the asynchronous processing are necessary for efficient processing Kobayashi [0006] unprocessed data is minimized and the number of connections is effectively used. Kobayashi [0015] The print spooler 209 creates a queue for the port monitor 210 and processes each job. There is no flow control function between the print daemon 204 and the port monitor 210) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the asynchronous network printing system teachings of Kobayashi where âjob data is absorbed into various buffers.â (Kobayashi [0005]). The modification would have been obvious, because it is merely applying a known technique (i.e. asynchronous network printing) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âbuffer processing and the asynchronous processing are necessary for efficient processingâ Kobayashi [0005]) Regarding Claim 25, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 24 as described earlier. Johnson does not teach the method further comprising decrypting the customized dataset using a decryption key of the card issuance device. Tamblyn teaches, the method further comprising decrypting the customized dataset using a decryption key of the card issuance device. (Tamblyn [0012] decrypting the encrypted visual security image using a decryption key stored local to the printer being used to print the security image prior to printing the visual security image.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the card printer encryption key teachings of Tamblyn that is âusing a decryption key stored local to the printer.â (Tamblyn [0012]). The modification would have been obvious, because it is merely applying a known technique (i.e. card printer encryption key) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âmay be limited to a particular printer (to guarantee authenticity of the security image being printed for applying to cards) that is authorised to do soâ Tamblyn [0025]) Regarding Claim 26, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 1 as described earlier. Johnson teaches, wherein the personalization system comprises a computing device communicatively connectable to the card issuance device, and wherein the card issuance device comprises a card printer. (Johnson [0058] providing additional secured personalization instructions to the remote personalization equipment,....personalization equipment includes... smart card printers.) Claims 3 is rejected under 35 U.S.C. 103 as being unpatentable over Johnson, Tamblyn, and Kobayashi in view of Bjerrum ("METHOD OF TRANSFERRING DATA, BETWEEN COMPUTER SYSTEMS USING ELECTRONIC CARDS", U.S. Publication Number: US RE36310 E) Regarding Claim 3, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 1 as described earlier. Johnson does not teach generating, at the personalization system, a second customized dataset including personalization data of a second user for installation onto a second smart card; encrypting at least a portion of the second customized dataset, at the personalization system, using the encryption key, and transmitting the second customized dataset to the card issuance device, wherein the second customized dataset is secured on the second smart card using a second set of encryption keys that are different from either the encryption key or any encryption key used to secure the customized data set stored on the smart card Bjerrum teaches, generating, at the personalization system, a second customized dataset including personalization data of a second user for installation onto a second smart card; encrypting at least a portion of the second customized dataset, at the personalization system, using the encryption key, and transmitting the second customized dataset to the card issuance device, wherein the second customized dataset is secured on the second smart card using a second set of encryption keys that are different from either the encryption key or any encryption key used to secure the customized data set stored on the smart card. (Bjerrum [Col 21, Lines 26-28] ensures that only the holder of the Batch card can personalize cards and that the batch card holder only can personalize cards Bjerrum [Col 4, Lines 62-64] a second set of data being generated in said second electronic card, said second set of data being input into and stored in said internal storage of said second electronic card Bjerrum [Col 5, Lines 58-60] a second combination of said second set of data received in encrypted form Bjerrum [Col 8, Lines 7-9] said second electronic card or said encryption key(s) stored in said internal storage of said second electronic card Bjerrum [Col 17, Lines 47-49] especially as different keys are used for different transfers) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the data transfer and end-to-end encryption teachings of Bjerrum such that âtransferring data, an electronic document or the like from a first computer system to a second computer system via a data transmission line.â (Bjerrum [Col 1, Lines 9-12]). The modification would have been obvious, because it is merely applying a known technique (i.e. data transfer and end-to-end encryption) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âensured that it will not be possible for either of the parties or for a third party to interfere with the data or document transfer.â Bjerrum [Col 2, Lines 12-14]) Claims 6, 13, and 18 are rejected under 35 U.S.C. 103 as being unpatentable over Johnson, Tamblyn, and Kobayashi in view of Irisawa ("METHOD OF ISSUING IC CARD, IC CARD ISSUING SYSTEM, AND IC CARD", Japanese Publication Number JP2007206765A) Regarding Claim 6, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 2 as described earlier. Johnson does not teach wherein the customized dataset comprises a plurality of Application Protocol Data Units (APDUs), and wherein encrypting at least a portion of the customized dataset comprises encrypting at least one or more secure channel keys used in generating the customized dataset. Irisawa teaches, wherein the customized dataset comprises a plurality of Application Protocol Data Units (APDUs), and wherein encrypting at least a portion of the customized dataset comprises encrypting at least one or more secure channel keys used in generating the customized dataset. (Irisawa [page 5] The data field of the command APDU of the encryption write command 111 transmitted from the IC card issuer 3 to the IC card 1 includes at least the EEPROM 21. The physical or logical of the EEPROM 21 that writes the ciphertext 111c in which the data to be written is encrypted with the session key Irisawa [page 6] the encrypted text contained in the command APDU is decrypted with the decrypted session key) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the IC card issuing system teachings of Irisawa that is âcapable of issuing an IC card at high speed even if the IC card is implemented with a virtual machine.â (Irisawa [Abstract]). The modification would have been obvious, because it is merely applying a known technique (i.e. IC card issuing system) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âthe time required for the virtual machine 10 to operate can be reduced and the time to issue the IC card 1 can be shortenedâ Irisawa [Abstract]) Claim 13 is rejected on the same basis as Claim 6. Regarding Claim 18, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 13 as described earlier. Johnson teaches, wherein the personalization system is located remotely from the card issuance device. (Johnson [0058] providing additional secured personalization instructions to the remote personalization equipment,....personalization equipment includes... smart card printers. Johnson [0057] remotely personalizing an electronically addressable device that comprise providing one or more secured personalization instructions and a ciphertext_KTU to remote personalization equipment.) Claims 10 and 14 are rejected under 35 U.S.C. 103 as being unpatentable over Johnson, Tamblyn, Kobayashi, Irisawa, and Bjerrum Regarding Claim 10, Johnson does not teach wherein the encrypted at least a portion of the customized dataset is included in one or more virtual application protocol data units (APDUs) created using an encryption key of a virtual smart card, and wherein generation of the customized dataset includes performing mutual authentication with the virtual smart card. Irisawa teaches, wherein the encrypted at least a portion of the customized dataset is included in one or more virtual application protocol data units (APDUs) created using an encryption key (Irisawa [page 5] The data field of the command APDU of the encryption write command 111 transmitted from the IC card issuer 3 to the IC card 1 includes at least the EEPROM 21. The physical or logical of the EEPROM 21 that writes the ciphertext 111c in which the data to be written is encrypted with the session key Irisawa [page 6] the encrypted text contained in the command APDU is decrypted with the decrypted session key) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the IC card issuing system teachings of Irisawa that is âcapable of issuing an IC card at high speed even if the IC card is implemented with a virtual machine.â (Irisawa [Abstract]). The modification would have been obvious, because it is merely applying a known technique (i.e. IC card issuing system) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âthe time required for the virtual machine 10 to operate can be reduced and the time to issue the IC card 1 can be shortenedâ Irisawa [Abstract]) Irisawa does not teach of a virtual smart card, and wherein generation of the customized dataset includes performing mutual authentication with the virtual smart card. Bjerrum teaches, of a virtual smart card, and wherein generation of the customized dataset includes performing mutual authentication with the virtual smart card. (Bjerrum [Col 20, Lines 40-51] micro processor, data and program storage and an I/O gate, secret information and protected information being hidden or stored in a data memory....For encryption and decryption, the Data Encryption Standard (DES) is used. In addition to the operating system for the micro processor the program memory also contains the encryption algorithm DES. Bjerrum [Col 12, Lines 37-39] Such an encrypted data transmission presupposes, however, that the transmitter and the receiver can agree to establishing a mutual set of encryption/decryption keys, as the parties involved, transmitter and receiver, invariably have to reveal details concerning security levels, etc. Such an agreement requires, however, that both transmitter and receiver fully trust the other party) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the data transfer and end-to-end encryption teachings of Bjerrum such that âtransferring data, an electronic document or the like from a first computer system to a second computer system via a data transmission line.â (Bjerrum [Col 1, Lines 9-12]). The modification would have been obvious, because it is merely applying a known technique (i.e. data transfer and end-to-end encryption) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âensured that it will not be possible for either of the parties or for a third party to interfere with the data or document transfer.â Bjerrum [Col 2, Lines 12-14]) Regarding Claim 14, Johnson, Tamblyn, Kobayashi , and Irisawa teach the virtual smart card personalization of Claim 13 as described earlier. Johnson does not teach wherein the customized dataset further comprises one or more session keys, and wherein the at least a portion of the customized dataset comprises the one or more session keys Bjerrum teaches, wherein the customized dataset further comprises one or more session keys, and wherein the at least a portion of the customized dataset comprises the one or more session keys. (Bjerrum [Col 29, Lines 18-24] generating a first set of data in said first electronic card, inputting and storing said first set of data in said internal storage of said first electronic card, and encrypting said first set of data in said first electronic card by means of said encryption/decryption means of said first electronic card and said encryption key(s) Bjerrum [Col 17, Lines 47-49] especially as different keys are used for different transfers) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Strater to incorporate the data transfer and end-to-end encryption teachings of Bjerrum such that âtransferring data, an electronic document or the like from a first computer system to a second computer system via a data transmission line.â (Bjerrum [Col 1, Lines 9-12]). The modification would have been obvious, because it is merely applying a known technique (i.e. data transfer and end-to-end encryption) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âensured that it will not be possible for either of the parties or for a third party to interfere with the data or document transfer.â Bjerrum [Col 2, Lines 12-14]) Claims 4, 7, and 9 are rejected under 35 U.S.C. 103 as being unpatentable over Johnson, Tamblyn, and Kobayashi in view of Briscoe ("CLIENT CUSTOMIZED VIRTUAL OR PHYSICAL CARD FOR USE WITH SELECTED MERCHANTS", U.S. Publication Number: US 20110178924 A1) Regarding Claim 4, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 1 as described earlier. Johnson does not teach wherein the customized dataset comprises a personalized virtual smart card. Briscoe teaches, wherein the customized dataset comprises a personalized virtual smart card (Briscoe [0002] A stored value card, which may be a physical and/or virtual card, represents money on deposit with the issuer of the card or an affiliate of the issuer. Briscoe [0005] method and system for customizing a physical or virtual card for a card recipient.) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the virtual and physical card teachings of Briscoe such that âCards such as credit cards, debit cards, and stored value cards are widely used by cardholders (e.g., consumers) to purchase products and services from merchants.â (Briscoe [0001]). The modification would have been obvious, because it is merely applying a known technique (i.e. virtual and physical card) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âallows the client to design and provide a prototype card, either physical form or virtual form, or both.â Briscoe [0027]) Regarding Claim 7, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 1 as described earlier. Johnson does not teach wherein the customized dataset is generated entirely prior to transmitting any portion of the customized dataset to the card issuance device. Briscoe teaches, wherein the customized dataset is generated entirely prior to transmitting any portion of the customized dataset to the card issuance device. (Briscoe [0043] the client interface 110 identifies a pre-existing account identifier (e.g., an account identifier printed or otherwise included as part of the card before the card is customized). Briscoe [Claim 16] wherein the client interface interacts with the client to display a preview of the virtual card to the client before the virtual card creator dispenses the virtual card. Briscoe [0057] The order of execution or performance of the operations in embodiments of the invention illustrated and described herein is not essential, unless otherwise specified. That is, the operations may be performed in any order, unless otherwise specified, and embodiments of the invention may include additional or fewer operations than those disclosed herein. For example, it is contemplated that executing or performing a particular operation before, contemporaneously with, or after another operation is within the scope of aspects of the invention. Briscoe [0019] A card creator 14 such as a kiosk or website supports the overall customization process. Examiner notes that in Briscoe, the customizing of a card is on a website or kisosk, the information is communicated by transmission to a fulfillment resource which creates the card â so the personalization device is separate from the card issuance device. ) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the virtual and physical card teachings of Briscoe such that âCards such as credit cards, debit cards, and stored value cards are widely used by cardholders (e.g., consumers) to purchase products and services from merchants.â (Briscoe [0001]). The modification would have been obvious, because it is merely applying a known technique (i.e. virtual and physical card) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âallows the client to design and provide a prototype card, either physical form or virtual form, or both.â Briscoe [0027]) Regarding Claim 9, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 1 as described earlier. Johnson does not teach wherein the personalization system is communicatively connected to the card issuance device via the Internet. Briscoe teaches, wherein the personalization system is communicatively connected to the card issuance device via the Internet. (Briscoe [0033] monitor, printer,....and other output devices known in the art.... the client interface 110 further includes a memory for storing instructions and a processor for executing the stored instructions and Internet access. ) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the virtual and physical card teachings of Briscoe such that âCards such as credit cards, debit cards, and stored value cards are widely used by cardholders (e.g., consumers) to purchase products and services from merchants.â (Briscoe [0001]). The modification would have been obvious, because it is merely applying a known technique (i.e. virtual and physical card) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âallows the client to design and provide a prototype card, either physical form or virtual form, or both.â Briscoe [0027]) Claim 12 is rejected under 35 U.S.C. 103 as being unpatentable over Johnson, Tamblyn, and Kobayashi in view of Calvert ("SYSTEM AND METHOD FOR POST-ISSUANCE ENABLEMENT OF ASYMMETRIC-KEY APPLICATION LOADING ON SMARTCARDS ISSUED AS SYMMETRIC-KEY APPLICATION-LOADING SMARTCARDS", WIPO Publication Number: US WO2015/177310 A1) Regarding Claim 12, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 11 as described earlier. Johnson does not teach wherein the customized dataset comprises an application load unit. Calvert teaches, wherein the customized dataset comprises an application load unit. (Calvert [0011] Applications to be loaded onto the smartcard are encrypted into an Application Load Unit (ALU) Calvert [0015] transporting application programs onto an IC card from a source located outside the card. A secret key and public key pair is stored on the card. The application provider sends an application load unit (ALU) to the card. The ALU includes an application unit (AU) and a key transformation unit (KTU).) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the application load unit card teachings of Calvert such that âApplications to be loaded onto the smartcard are encrypted into an Application Load Unit (ALU) .â (Calvert [0011]). The modification would have been obvious, because it is merely applying a known technique (i.e. application load unit ) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âThe ALU includes an application unit (AU) and a key transformation unit (KTU). The AU contains both the program code and associated data which is to be loaded onto the card of the card user. â Calvert [ 0015 ]) Claims 15, 16, 17, and 19 are rejected under 35 U.S.C. 103 as being unpatentable over Johnson, Tamblyn, Kobayashi, Irisawa, and Briscoe. Regarding Claim 15, Johnson, Tamblyn, Kobayashi and Irisawa teach the virtual smart card personalization of Claim 13 as described earlier. Johnson does not teach further comprising a card issuance device communicatively connected to the personalization system Briscoe teaches, further comprising a card issuance device communicatively connected to the personalization system. (Briscoe [0002] A stored value card, which may be a physical and/or virtual card, represents money on deposit with the issuer of the card or an affiliate of the issuer. Briscoe [0035] The processor communicates the data received from the client 102 to the card creator 112. The card creator 112 prints a physical card and/or creates a virtual card according to the received client-specified data...the card creator 112 prints the selected background and the selected logo on the physical card or creates a virtual card including the selected background and the selected logo for a display for a mobile device. The card creator 112 then dispenses the printed physical card to the client 102 or transfers the virtual card .... Alternatively or in addition, the creator 112 includes a link which transmits the virtual card and/or prints a document for the client 102 including a listing of the selected merchants. Briscoe [0029] it is contemplated that part or all of the databases may be remotely located from the kiosk 104 and connected by a network such as the Internet. Briscoe [0033] the client interface 110 further includes a memory for storing instructions and a processor for executing the stored instructions and Internet access⌠when the card is a virtual card, the interface 110 may be connected to network, such as the Internet or a 3G cellular network) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson Johnson to incorporate the virtual and physical card teachings of Briscoe such that âCards such as credit cards, debit cards, and stored value cards are widely used by cardholders (e.g., consumers) to purchase products and services from merchants.â (Briscoe [0001]). The modification would have been obvious, because it is merely applying a known technique (i.e. virtual and physical card) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âallows the client to design and provide a prototype card, either physical form or virtual form, or both.â Briscoe [0027]) Regarding Claim 16, Johnson, Tamblyn, and Kobayashi teach the virtual smart card personalization of Claim 15 as described earlier. Johnson does not teach a card issuance computing system communicatively connected between the card issuance device and the personalization system, wherein the card issuance computing system is local to the card issuance device and is communicatively connected to the personalization system via the Internet Briscoe teaches, further comprising a card issuance computing system communicatively connected between the card issuance device and the personalization system, wherein the card issuance computing system is local to the card issuance device and is communicatively connected to the personalization system via the Internet. (Briscoe [0012] FIG. 3 is a block diagram illustrating a system for allowing a client to interactively create a customized physical or virtual card based on data stored locally with respect to the client, according to one embodiment of the invention. Briscoe [0033] the client interface 110 further includes a memory for storing instructions and a processor for executing the stored instructions and Internet access⌠when the card is a virtual card, the interface 110 may be connected to network, such as the Internet or a 3G cellular network) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the virtual and physical card teachings of Briscoe such that âCards such as credit cards, debit cards, and stored value cards are widely used by cardholders (e.g., consumers) to purchase products and services from merchants.â (Briscoe [0001]). The modification would have been obvious, because it is merely applying a known technique (i.e. virtual and physical card) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âallows the client to design and provide a prototype card, either physical form or virtual form, or both.â Briscoe [0027]) Claim 17 is rejected on the same basis as Claim 5. Regarding Claim 19, Johnson, Tamblyn, Kobayashi, and Irisawa teach the virtual smart card personalization of Claim 18 as described earlier. Johnson does not teach wherein the personalization system is communicatively connected to the card issuance device via the Internet. Briscoe teaches, wherein the personalization system is communicatively connected to the card issuance device via the Internet. (Briscoe [0033] monitor, printer,....and other output devices known in the art.... the client interface 110 further includes a memory for storing instructions and a processor for executing the stored instructions and Internet access. ) It is prima facie obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to have modified the chip-card production environment of Johnson to incorporate the virtual and physical card teachings of Briscoe such that âCards such as credit cards, debit cards, and stored value cards are widely used by cardholders (e.g., consumers) to purchase products and services from merchants.â (Briscoe [0001]). The modification would have been obvious, because it is merely applying a known technique (i.e. virtual and physical card) to a known concept (i.e. chip-card production environment) ready for improvement to yield predictable result (i.e. âallows the client to design and provide a prototype card, either physical form or virtual form, or both.â Briscoe [0027]) Supplemental Independent Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1, 11, 20 and 22 are rejected under 35 U.S.C. 103 as being unpatentable over Lee ("Personalization of smart cards", U.S. Patent Number: US 6367011B1), in view of Tamblyn ("METHOD AND APPARATUS FOR PRINTING A SECURITY CARD", U.S. Publication Number: US 20180086125 A1) Regarding Claim 1, Lee teaches, A method comprising: generating, at a personalization system (154 Preparation processing device), a customized dataset including personalization data of a particular user for installation onto a smart card (col 6, lines 31-35 âDevice 154, as will be described in more detail below, is used to manipulate and store cardholder data, application data, and other data such as parameter data. The cardholder data includes data such as the identification of the cardholder and the credit limit of the cardholder.â), the customized data set being generated based on an operating system of the smart card by performing a personalization process to generate a virtual smart card formatted according to the operating system (column 6, line 63 â column 7, line 3 âPreparation processing device 154 produces output file 160, which includes data to be used in the personalization process for all cards to be personalized. File 160 is described in greater detail below in FIGS. 5A-5D. Data in output file 160 may include: data for any of a variety of applications such as credit, stored value, loyalty, etc.; derived card keys and derivation data for particular applications; public key certificates; and other data.â Column 7, lines 6-27 âoutput file 160 may be run through the process of FIG. 2 multiple times, each pass generating and adding information to records in the file for different applicationsâ) without requiring a concurrent connection to a card issuance device (column 6, lines 45-48 âTransport mechanism 158 may use any of the numerous, well-known file transfer methods for transferring file 160. By way of example, transfer via a floppy disk or over a secure network connection may be used.â); encrypting at least a portion of the customized dataset, at the personalization system (column 7, lines 66-67 âa key encryption key (KEK) for sending other keys to the personalization locationâ Column 8, lines 17-35 âAs secret data may be generated at the issuer location, instead of at the personalization location, it is preferable to protect this secret data before it is stored onto the card in some fashion. In one embodiment, secret data is encrypted under a key encryption key when generated. Once at the personalization location, HSM 152 decrypts the secret data, re-encrypts it under a personalization key known to the card and then the encrypted secret data is loaded onto the card using personalization device 150.â), âŚthe encryption key being different from any encryption key used to secure the customized dataset when stored on the smart card (column 8, lines 17-35 âIn one embodiment, secret data is encrypted under a key encryption key when generated.â; and transmitting the virtual smart card including the customized dataset to the card issuance device (column 7, lines 3-5 âResulting output file 160 is then transferred to personalization device 150 via transport mechanism 158.â). Lee suggests the output file 160, which includes secret data, may be protected by other techniques (column 8, lines 34-35), but does not specify that the encryption key is specific to the card issuance device. However, Tamblyn teaches a method for printing a security card, wherein customized data is received at a card issuance device ([0013] âThe present invention also provides a method of applying a visual security image to a security cardâ), wherein the received customized data is encrypted ([0012] âThe visual security image may be encrypted with an encryption key for preventing unauthorised printing of the visual security image.â), using an encryption key that is specific to the card issuance device that is separate from the personalization system ([0078] âSince the VSI may be customised, by the printer manufacturer, so that it is a specific image chosen by the end user (for example a corporate logo, a government logo, or other image which is proprietary to the end user), it is advantageous to use means to ensure that the VSI cannot be obtained and used fraudulently on other printers.â [0079] âAs such, one mechanism that may be employed with the present invention is that the visual security image is encrypted using an encryption key. In order for the visual security image to be printed on a printer, the encrypted security image must first be decrypted. Measures may then be put in place to limit how and in what circumstances the printer may decrypt the encrypted VSI. For example, the printer may be programmed to access a decryption key local to the printer, for example a decryption key stored in the printer memory or stored on an internal company communications network. The decryption key may for example only be accessed or used by certain printers (identified by unique properties to that printer), or only accessed or used by certain printers on a particular internal company communications network (for example an internal network subdomain). Other ways of limiting access to and use by a printer for the decryption key may be apparent to those skilled in the art.â) It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Tamblyn with the teachings of Lee because as Lee suggests it is advantageous to secure the personalized secret data at the time of generation (column 8, lines 34-35) and Tamblyn teaches that secret data, which includes data that is proprietary to the end user, can be protected by encrypting the data with an encryption key local to the printer or restricted to specific printers, gives the user confidence that the card is genuine ([0078]-[0079]). Similar to the logo information being proprietary data that should be protected, one of ordinary skill in the art would recognize the encryption for a specific printer would be advantageous to protect the secret data of the user. Response to Remarks Applicant's arguments filed on September 25, 2024, have been fully considered and Examinerâs remarks to Applicantâs amendments follow. Response Remarks on Claim Rejections - 35 USC § 101 The Applicant states: âIt is respectfully submitted that the claims are not directed to an abstract ideaâŚ. the claims are entirely devoid of commercial transaction steps such as actually performing a financial transaction using a smart card" Examiner responds: The Applicantâs Specification states the virtual cards are directed to financial matters: [0026] Furthermore, and as noted in further detail below, the term smart card is intended to encompass not only physical smart cards (both contact smart cards and contactless cards), but also electronic smart cards, such as electronic representations of banking cards or other cards that store sensitive personal data and can be used in conjunction with trusted transactions (e.g., for access or financial transactions). [0029] Example smart card applications and/or data can include information associated with an intended user of the smart card, information regarding access rights, programming logic defining security access and/or financial account access, retail loyalty, and/or other types of applications. Accordingly, the card issuance location 102 may be a bulk card issuance facility, or may be a location at which smart cards may be issued to users in an "on demand" manner, such as at a financial institution [0032] Example types of smart cards that can be personalized by printers106, 107 can include, for example, physical smart cards including financial cards (e.g., debit cards or credit cards) Therefore, the Examiner concludes the invention is directed towards fundamental economic principles or practice and/or commercial or legal interactions that are abstract ideas. The Applicant states: âRather, the current claims exclusively discuss generation and personalization of a virtual smart card, and encryption of such a smart card for secure transmission using a specific key of a card issuance device " Examiner responds: Even if the Specification disavowed any connection to financial matters, the acts of âgeneration and personalization of a virtual smart card⌠using a specific keyâ still falls Managing personal behavior or relationships or interactions between people and/or Mental Processing which are also abstract ideas. The Applicant states: âThe claims are also eligible at least under Step 2A, Prong Two because the claims are directed to a practical application of technologyâŚ. The pending claims involve generating a virtual smart card formatted according to the operating system of the smart card, encrypting at least a portion of the customized dataset using an encryption key specific to the card issuance device and transmitting the customized dataset to the card issuance device, which, when viewed as a whole, has the clear, practical application of secure personalization of a real smart card for delivery to a particular card issuance device. An operating system of the smart card is not abstract or stated generally such that it applies to any commercial transactionâŚ. The claimed steps are therefore directed to security in data transmission, not the economic activity of use of a smart card for payments. " Examiner responds: The focus of the claims is not on such an improvement in computers, encryption, nor operating systems as tools, but on certain independently abstract ideas that use computers, encryption, and operating systems as tools. The additional elements (technological components) perform as expected and are in no unusual arrangement. The encryption and card issuance device are merely applying such technologies. A newly minted functioning smartcard inherently is formatted to the operating system that creates it. Also, it is not unusual to format a smartcard to any operating system it is expected to encounter. Therefore, the functions are well-understood, routine, and conventional, see MPEP 2106.05(d). Given there is no improvement to the generic technological components, there is no improvement to security in data transmission. The Applicant states: âThe claimed method provides a technical improvement to the field of personalization of smart cards. As described in a non-limiting example from [0022] of the instant application, personalization of the smart card and issuance of the smart card typically occur at the same time. Smart card manufacturing is thus limited by the rate at which a personalization system can simultaneously generate personalization data and print the card. " Examiner responds: Again, âpersonalization of smart cardsâ is an abstract idea. To âprint the cardâ seemingly refers to physical cards. However, the Specification describes the invention as encompassing intangible cards as well: [0026] Furthermore, and as noted in further detail below, the term smart card is intended to encompass not only physical smart cards (both contact smart cards and contactless cards), but also electronic smart cards, such as electronic representations of banking cards or other cards that store sensitive personal data and can be used in conjunction with trusted transactions (e.g., for access or financial transactions). The Applicant states: âThese smart keys may be transmitted over the Internet. This causes security concerns. This method of encrypting at least a portion of the customized dataset using an encryption key specific to the card issuance device that is different from any key used to secure the customized dataset when stored on the card enhances the security of the data on the card " Examiner responds: Encryption specific to given devices is common. One such example is RSA encryption fobs. There is no advancement to technology (encryption), so it is well-understood, routine, and conventional, see MPEP 2106.05(d) Therefore, the rejection under 35 USC § 101 remains. Response Remarks on Claim Rejections - 35 USC §103 Applicant's arguments required the application of new/additional prior art. New prior art includes: Johnson ("METHOD AND SYSTEM FOR PERSONALIZING SMART CARDS USING ASYMMETRIC KEY CRYPTOGRAPHY", U.S. Publication Number: US 20080005567 A1), Tamblyn ("Method and apparatus for printing a security card", U.S. Publication Number: US 20180086125 A1) Calvert ("SYSTEM AND METHOD FOR POST-ISSUANCE ENABLEMENT OF ASYMMETRIC-KEY APPLICATION LOADING ON SMARTCARDS ISSUED AS SYMMETRIC-KEY APPLICATION-LOADING SMARTCARDS", WIPO Publication Number: US WO2015/177310 A1) Applicantâs remarks regarding the rejection made under 35 USC § 103 are rendered moot by the introduction of new prior art. Therefore, the rejection under 35 USC § 103 remains. Prior Art Cited But Not Applied The prior art made of record and not relied upon is considered pertinent to applicant's disclosure: Datacard ("DatacardÂŽ XPS Card Printer Driver⢠Userâs Guide", October 2015) teaches âCard Printer Driver uses Microsoft XPS print technology to support printing from currently available applications. This chapter provides a task overview of what the Card Printer Driver does, and a description of the communication between the Card Printer Driver and the card printerâ [page 1] Datacard User Guide, January 2017 - This manual provides user information for the DatacardÂŽ SD260Lâ˘, SD360â˘, and SD460⢠Card Printers. The manual includes: An overview of printer components and options, and a description of the system label. How to use the printer, including how to power the printer on and off, how to use the front panel and LCD menus, card processing basics, how to print a test card, and how to load and replace supplies. Tushie ("SYSTEM AND APPARATUS FOR SMART CARD PERSONALIZATION", U.S. Publication Number: 5889941A) describes personalization equipment specifications and provides a centralized interface of inputs and outputs to a card issuing process which dynamically adjusts to changes in the issuing process to easily permit a card issuer to change data formats, card applications, card operating systems and/or personalization equipment in a card issuing process. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to CHINEDU EKECHUKWU whose telephone number is (571)272-4493. The examiner can normally be reached on Mon-Fri 9 AM ET to 3:30 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examinerâs supervisor, Christine Behncke, can be reached on (571) 272-8103. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /C.E./Examiner, Art Unit 3695 /CHRISTINE M BEHNCKE/Supervisory Patent Examiner, Art Unit 3695