Patent Application 18315530 - PROCESSING DATA IN A DATA FORMAT WITH KEY-VALUE - Rejection
Appearance
Patent Application 18315530 - PROCESSING DATA IN A DATA FORMAT WITH KEY-VALUE
Title: PROCESSING DATA IN A DATA FORMAT WITH KEY-VALUE PAIRS
Application Information
- Invention Title: PROCESSING DATA IN A DATA FORMAT WITH KEY-VALUE PAIRS
- Application Number: 18315530
- Submission Date: 2025-05-22T00:00:00.000Z
- Effective Filing Date: 2023-05-11T00:00:00.000Z
- Filing Date: 2023-05-11T00:00:00.000Z
- National Class: 707
- National Sub-Class: 741000
- Examiner Employee Number: 94974
- Art Unit: 2163
- Tech Center: 2100
Rejection Summary
- 102 Rejections: 0
- 103 Rejections: 1
Cited Patents
The following patents were cited in the rejection:
- US 0309549đ
- US 0211572đ
Office Action Text
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 1/16/2025 has been entered. Response to Arguments Applicant's arguments filed 1/16/2025 have been fully considered but they are not persuasive. 101 Rejection Applicant states (pp. 12) that the claimed invention is not directed to an abstract idea falling within the category of âCertain Methods of Organizing Human Activityâ. However, the claims are directed instead to an abstract idea as a mental process. Applicant further states (pp. 13) that the claimed invention is integrated into a practical application by including additional elements that apply the judicial exception in some other meaningful way. Examiner respectfully disagrees. The additional elements included in independent claims, e.g., âprocessorâ, âstorage mediaâ and "instructions", are high-level recitations of generic computer components and functions that represent mere instructions to apply on a computer. Viewing the additional limitations together and the claim as a whole, nothing provides integration into a practical application. Applicant further states (pp. 15) that the claimed subject matter improves medical technology. Examiner respectfully disagrees. All elements of independent claims are either mentally performable or high-level recitations of generic computer components and functions. They do not add significantly more or provide any "inventive concept". In summary, claims 1-20 are not eligible. 103 Rejection Applicant states (pp. 17) that the cited prior art of record combined does not teach the amended claim 1. Examiner respectfully disagrees. Claim 1 recites three original limitations âextractingâ, âreorganizingâ and âgroupingâ and one amended limitation âdeterminingâ incorporated from claim 3. The original limitations are taught by combining Xu and Beyer, while the amended limitation is taught by combining Xu and Beyer with Yueh. In summary, the cited prior art of record combined teaches the argued limitations of independent claims 1, 10 and 19. Claim Objections Claims 9 and 18 are objected to because of the following informalities: the claim sentence does not end with a period. Appropriate correction is required. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.âThe specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. Claims 1, 10 and 19 recite the limitation "the reference" in âthe reference to the reused partâ. There is insufficient antecedent basis for this limitation in the claim. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea as a mental process without significantly more. Claims 1, 10 and 19 are rejected under 35 U.S.C. 101. Step 1 Claim 1 recites âA computer-implemented methodâ. Claim 10 recites âA computer systemâ comprising computer processors, and thus is not directed to software per se. Claim 19 recites âA computer program productâ comprising computer-readable storage media. According to the instant specification (spec. [0019]), a computer readable storage medium is not to be construed as storage in the form of transitory signals per se. Therefore, all three claims are directed to a statutory category. Step 2A â Prong One Claims 1, 10 and 19 recite the following limitations directed to an abstract idea: âextracting all keys fromâŚdata objects of the data, wherein duplicated keys are removedâ recites an abstract idea as a mental process. One can mentally observe or evaluate to extract a key simply by identifying a piece of data from a data object. âreorganizing the dataâŚinto a format with a key portion followed by a value portion, wherein the extracted keys are arrangedâŚin a predetermined order, and the valuesâŚare arrangedâŚinâŚthe order of the keysâ recites an abstract idea as a mental process. One can mentally evaluate or judge to arrange extracted keys in an order simply by sorting the keys. âgrouping the values corresponding to each of the extracted keysâŚinto a respective value groupsâŚarranged in respective value partitions of the value portion in the orderâŚof the keysâ recites an abstract idea as a mental process. One can mentally evaluate or judge to group and partition values sharing the same key, and to sort the resulting groups in the same order as the corresponding keys. âdetermining a reused partâŚwherein the reused partâŚis replaced by the reference to the reused partâ recites an abstract idea as a mental process. One can mentally evaluate or judge to replace copies of a value by references to a single copy of the value. Step 2A â Prong Two This judicial exception is not integrated into a practical application. Claims 1, 10 and 19 include addition elements âprocessorâ, âstorage mediaâ and "instructions", which are high-level recitations of generic computer components and functions that represent mere instructions to apply on a computer per MPEP §2106.05(f). Viewing the additional limitations together and the claim as a whole, nothing provides integration into a practical application. Step 2B The conclusions on the mere instructions to apply the abstract idea using generic computer components and functions carry over and do not add significantly more or provide any "inventive concept". In summary, claims 1, 10 and 19 are not eligible. Claims 2-9, 11-18 and 20 depend on claims 1, 10 and 19 respectively and recite the same abstract idea. Step 2A Prong One Claims 2 and 11 recite sorting value groups in the same order as the corresponding keys. Claims 3 and 12 recite reuse shared values among different keys by storing and referencing a single copy of the shared value. Claims 4 and 13 recite storing single copies of shared values in reused-part partitions. Claims 5 and 14 recite replacing shared values in the value portion by referencing single copies of shared values in reused-part partitions. Claims 6, 15 and 20 recite using a search keyword to match keys in a range of the sorted list of keys. Claims 7 and 16 recite sorting keys in the same order as traversing the leaf nodes of a tree structure. Step 2A Prong Two Claims 9 and 18 recite additional element âJSONâ, which is a high-level recitation of generic computer components and functions. Step 2B Claim 8 recites transmitting data in the reorganized format, which qualifies as âi. Receiving or transmitting data over a networkâ, and is recognized by the courts as well-understood, routine, and conventional per MPEP §2106.05(d)(II). Claim 17 recites storing data in the reorganized format, which qualifies as âiv. Storing and retrieving information in memoryâ, and is recognized by the courts as well-understood, routine, and conventional per MPEP §2106.05(d)(II). In summary, these dependent claims do not add any additional elements sufficient to make the claims non-abstract. Therefore, they are not eligible accordingly. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-20 are rejected under 35 U.S.C. 103 as being unpatentable over Xu et al. US patent application 2022/0309549 [herein âXuâ], in view of Beyer et al. US patent application 2010/0211572 [herein âBeyerâ], and further in view of Yueh. US patent 8,190,835 [herein âYuehâ]. Claim 1 recites âA computer-implemented method for processing data in a data format with key-value pairs, comprising: extracting all keys from a plurality of data objects of the data, wherein duplicated keys are removed such that only one of the same keys remains;â Xu automatically converts unstructured documents (i.e., data objects) into lists of structured key-value pairs (i.e., data format) [0030], leveraging machine-learned detection models to accurately identify key-value pairs [0032]. Claim 1 further recites âreorganizing the data in the data format into a format with a key portion followed by a value portion, wherein the extracted keys are arranged in the key portion in a predetermined order, andâ. In Xu, a key detection model identifies a set of keys (i.e., key portion), a value detection model identifies a set of values (i.e., value portion), and a key-value pair is detected by a match score exceeding a threshold [0065]. The detected (i.e., extracted) keys are ordered (i.e., arranged) by their visual appearance in the document (i.e., predetermined order) [0047], based on which their matching (i.e., corresponding) values can be ordered (i.e., reorganized) accordingly. Xu does not disclose limitation âthe values of each of the plurality of data objects are arranged in the value portion in an order corresponding to the order of the keys, grouping the values corresponding to each of the extracted keys for the plurality of data objects into a respective value group, wherein the respective value groups are arranged in respective value partitions of the value portion in the order corresponding to the order of the keys; andâ. However, Beyer teaches a JSON document as a list of name-value pairs (i.e., key-value pairs), where a value is a JSON object that can be an atom, an array of values, or a nested JSON object (Beyer: [0005]). Each name in a name-value pair is unique (i.e., only one of the same keys remains) within the document (Beyer: [0006]), because two name-value pairs (n,v1) and (n,v2) with the same name can be equivalently represented (i.e., grouped) as one name-value pair (n,[v1,v2]), whose value is an array (i.e., partition) of values in the same order as that of the corresponding name-value pairs. Therefore, it would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to apply the teachings of Beyer to Xu. One having ordinary skill in the art would have found motivation to adopt the nested JSON object model of Beyer to represent the key-value pairs extracted from unstructured documents by Xu for better indexing and searching. Xu and Beyer do not disclose limitation âdetermining a reused part shared by the values of different data objects of the plurality of data objects; wherein the reused part of the values sharing the reused part in the value portion is replaced by the reference to the reused part.â However, Yueh deduplicates redundant data globally across files in a shared storage architecture (Yueh: 2:64-66). Yueh breaks (i.e., partitions) each file (i.e., data object) or other digital sequence (i.e., portion) into blocks (i.e., values) of a fixed or variable size (Yueh: 7:59-62), and hash each block. A new block is duplicate of an existing block if they have the same hash, in which case the new block is replaced with a pointer (i.e., reference) to a single (i.e., shared) instance of the block (i.e., reused part) in storage (Yueh: 3:9-21). A hash recipe is used to reconstruct (i.e., arrange) a file from the list of hashes of blocks in the file (Yueh: 6:64-7:6). Therefore, it would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to apply the teachings of Yueh to Xu and Beyer. One having ordinary skill in the art would have found motivation to utilize Yueh to minimize data redundancy globally across the JSON documents of Xu and Beyer. Claims 10 and 19 are analogous to claim 1, and are similarly rejected. Claim 2 recites âThe computer-implemented method of claim 1, wherein the respective value groups are arranged in the value portion in the order corresponding to the order of the keys.â Xu orders (i.e., arranges) the detected (i.e., extracted) keys by their visual appearance in the document (i.e., data object) [0047], based on which their matching (i.e., corresponding) values (i.e., value portion) can be ordered accordingly. Xu and Beyer teach claim 1, where a JSON document in Beyer is a list of name-value pairs, and a value is a JSON object which can be an atom, an array (i.e., group) of values, or a nested JSON object (Beyer: [0005]). Claim 11 is analogous to claim 2, and is similarly rejected. Claim 3 recites âThe computer-implemented method of claim 1, wherein the value portion comprises a reused-part partition in which the reused part is arranged in a position corresponding to a reference to the reused part.â Xu, Beyer and Yueh teach claim 1, where Yueh deduplicates redundant data globally across files in a shared storage architecture (Yueh: 2:64-66). Yueh breaks (i.e., partitions) each file or other digital sequence (i.e., value portion) into blocks of a fixed or variable size (Yueh: 7:59-62), and hash each block. A new block is duplicate of an existing block if they have the same hash, in which case the new block is replaced with a pointer (i.e., reference) to a single (i.e., shared) instance of the block (i.e., reused part) in storage (Yueh: 3:9-21). A hash recipe is used to reconstruct (i.e., arrange in position) a file from the list of hashes of blocks in the file (Yueh: 6:64-7:6). Claim 12 is analogous to claim 3, and is similarly rejected. Claim 4 recites âThe computer-implemented method of claim 3, wherein the reused part is arranged in the reused-part partition as one of a list of reused parts shared by the values of the different data objects, and the reference to the reused part comprises the position of the reused part within the list of the reused-part partition.â Xu, Beyer and Yueh teach claim 3, where Yueh breaks (i.e., partitions) a file (i.e., data object) or other digital sequence into blocks (Yueh: 7:59-62), and hash each block (i.e., value). A new block is duplicate of an existing block if they have the same hash, in which case the new block is replaced with a pointer (i.e., reference) to a single (i.e., shared) instance of the block (i.e., reused part) in storage (Yueh: 3:9-21). A hash recipe is used to reconstruct (i.e., arrange in position) a file from the list of hashes of blocks in the file (Yueh: 6:64-7:6). Claim 13 is analogous to claim 4, and is similarly rejected. Claim 5 recites âThe computer-implemented method of claim 3, wherein the value partitions of the value portion following the reused-part partition, wherein the reused part of the values sharing the reused part in a respective value partition is replaced by the reference to the reused part.â Xu, Beyer and Yueh teach claim 3, where Yueh breaks (i.e., partitions) a file or other digital sequence (i.e., value portion) into blocks (Yueh: 7:59-62), and hash each block (i.e., value). A new block is duplicate of an existing block if they have the same hash, in which case the new block is replaced with a pointer (i.e., reference) to a single (i.e., shared) instance of the block (i.e., reused part) in storage (Yueh: 3:9-21). Claim 14 is analogous to claim 5, and is similarly rejected. Claim 6 recites âThe computer-implemented method of claim 1, further comprising: identifying one of the keys of the plurality of data objects of the data based on a search keyword; determining a search range within the value portion corresponding to the identified key based on the order of the keys; andâ. Xu orders the detected keys by their visual appearance in the document (i.e., data object) [0047], based on which their matching values (i.e., value portion) are ordered accordingly. Xu and Beyer teach claim 1, where a JSON document of Beyer is a list of name-value pairs, and a value is a JSON object which can be an atom, an array of values, or a nested JSON object (Beyer: [0005]). Xu does not disclose limitation âsearching for the search keyword within the search range corresponding to the identified key.â However, Beyer indexes JSON documents in two separate files, one for document IDs and the other for payloads (Beyer: [0034]). Using the parse tree of a search query (i.e., keyword), Beyer searches the first file to identify candidate documents (i.e., keys) that may match the query. Beyer then searches the second file (i.e., search range) to check if those candidates match the query exactly (Beyer: [0039]). Therefore, it would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to apply the teachings of Beyer to Xu. One having ordinary skill in the art would have found motivation to adopt the nested JSON object model of Beyer to represent the key-value pairs of Xu extracted from unstructured documents for better indexing and searching. Claims 15 and 20 are analogous to claim 6, and are similarly rejected. Claim 7 recites âThe computer-implemented method of claim 1, wherein the predetermined order for the extracted keys is an order of traversing leaf nodes of a tree structure of the data in the data format with key-value pairs.â Xu orders the detected (i.e., extracted) keys by their visual appearance in the document (i.e., predetermined order) [0047], based on which their matching values are ordered accordingly. Xu and Beyer teach claim 1, where a JSON document (i.e., data format) of Beyer is a list of name-value pairs (i.e., key-value pairs), and a value is a JSON object which can be an atom, an array of values, or a nested JSON object (Beyer: [0005]). Xu does not disclose this claim; however, Beyer indexes JSON documents in two separate files, one for document IDs and the other for payloads (Beyer: [0034]). Using the parse tree of a search query, Beyer searches the first file to identify candidate documents that may match the query. Beyer then searches the second file to check if those candidates match the query exactly (Beyer: [0039]), by recursively traversing the tree to atom (i.e., leaf) nodes (Beyer: [0048]). Therefore, it would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to apply the teachings of Beyer to Xu. One having ordinary skill in the art would have found motivation to adopt the nested JSON object model of Beyer to represent the key-value pairs of Xu extracted from unstructured documents for better indexing and searching. Claim 16 is analogous to claim 7, and is similarly rejected. Claim 8 recites âThe computer-implemented method of claim 1, further comprising: transmitting the data in the reorganized format.â After identifying key-value pairs (i.e., reorganized format) from documents, Xu outputs (i.e., transmits) the identified key-value pairs [0063] using input/output devices [0081]. Claim 9 recites âThe computer-implemented method of claim 1, wherein the data format comprises JavaScript Object Notation (JSON)â. Xu and Beyer teach claim 1, where a JSON document (i.e., data format) of Beyer is a list of name-value pairs, where a value is a JSON object which can be an atom, an array of values, or a nested JSON object (Beyer: [0005]). Claim 18 is analogous to claim 9, and is similarly rejected. Claim 17 recites âThe computer system of claim 10, further comprising: storing the data in the reorganized format.â Xu stores data defining the identified key-value pairs (i.e., reorganized format) in a database accessible to users [0063]. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. For example, Cao et al. TDDFS: A Tier-Aware Data Deduplication-Based File System. ACM Transaction on Storage 15:1, 2019, pp. 1-26. Any inquiry concerning this communication or earlier communications from the examiner should be directed to SHELLY X. QIAN whose telephone number is (408)918-7599. The examiner can normally be reached Monday - Friday 8-5 PT. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examinerâs supervisor, Tony Mahmoudi can be reached on (571)272-4078. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SHELLY X QIAN/Examiner, Art Unit 2163 /TONY MAHMOUDI/Supervisory Patent Examiner, Art Unit 2163
(Ad) Transform your business with AI in minutes, not months
â
Custom AI strategy tailored to your specific industry needs
â
Step-by-step implementation with measurable ROI
â
5-minute setup that requires zero technical skills
Trusted by 1,000+ companies worldwide