Prosecution Insights
Last updated: April 19, 2026
Application No. 12/691,992

METHOD, SYSTEM AND APPARATUS FOR ACTIVATION OF A HOME SECURITY, MONITORING AND AUTOMATION CONTROLLER

Final Rejection §103
Filed
Jan 22, 2010
Examiner
YANG, JAMES J
Art Unit
2686
Tech Center
2600 — Communications
Assignee
Icontrol Networks Inc.
OA Round
21 (Final)
57%
Grant Probability
Moderate
22-23
OA Rounds
3y 2m
To Grant
78%
With Interview

Examiner Intelligence

Grants 57% of resolved cases
57%
Career Allow Rate
409 granted / 720 resolved
-5.2% vs TC avg
Strong +22% interview lift
Without
With
+21.5%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
47 currently pending
Career history
767
Total Applications
across all art units

Statute-Specific Performance

§101
3.6%
-36.4% vs TC avg
§103
56.7%
+16.7% vs TC avg
§102
13.1%
-26.9% vs TC avg
§112
20.0%
-20.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 720 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application is being examined under the pre-AIA first to invent provisions. This Office Action is in response to Applicant’s amendment filed 11/21/2025. Claims 1-2, 17-18, 27, 32, 35, 37-39, 42-43, 46, 49, 52-59, and 61-62 are currently pending in this application. Claim Objections Claims 37-39, 42-43, 54, and 57 are objected to because of the following informalities: Claim 37, as amended, recites “a plurality of preconfigured zone functions” and subsequently “a subset of the preconfigured plurality of zone functions”. The Examiner suggests amending the subsequent limitation to --a subset of the plurality of preconfigured zone functions-- for consistency. Claims 38-39, 42-43, 54, and 57 are further objected to because of their dependency on claim 37. Appropriate correction is required. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of pre-AIA 35 U.S.C. 103(a) which forms the basis for all obviousness rejections set forth in this Office action: (a) A patent may not be obtained though the invention is not identically disclosed or described as set forth in section 102, if the differences between the subject matter sought to be patented and the prior art are such that the subject matter as a whole would have been obvious at the time the invention was made to a person having ordinary skill in the art to which said subject matter pertains. Patentability shall not be negatived by the manner in which the invention was made. Claims 1-2, 17, 35, 37-38, 42-43, 46, 49, 52-59, and 61-62 are rejected under pre-AIA 35 U.S.C. 103(a) as being unpatentable over Sefton (U.S. 7,119,674 B2) in view of Bourke-Dunphy et al. (U.S. 6,918,112 B2). Claim 1, Sefton teaches: A method (Sefton, Col. 1, Lines 51-56, Col. 3, Lines 3-6, and Lines 38-46) comprising: receiving, by a computing device associated with a premises management system located at a premises (Sefton, Fig. 1: 12 and 16, Col. 3, Lines 33-38 and 43-46, The image processing system 12 processes and identifies the license plate numbers based on the captured images by the cameras. The main processor 16 performs functions in response to the identified license plate numbers and rules set by the user (see Sefton, Col. 2, Lines 19-22). Together, the image processing system 12 and the main processor 16 form a computing device of the automated system 10, which is a premises management system. The automated system 10 controls access to a secure site, such as a military base or high-security research facility, which is a premises (see Sefton, Col. 3, Lines 50-51).), information identifying a premises device (Sefton, Col. 5, Lines 18-27, Each camera, i.e. a premises device, that captures an image of a license plate transmits a camera identifier. It would have been obvious to one of ordinary skill in the art for the camera identifier to identify the camera in order to differentiate itself from other vehicle presence sensors that may be used (see Sefton, Col. 4, Lines 63-67 through Col. 5, Lines 1-7).) of a plurality of premises devices (Sefton, Fig. 1: C1-C14) associated with the premises management system (Sefton, Fig. 1, Col. 1, Lines 3-10, The system of Figs. 1 and 2 are for monitoring vehicles entering a high-security facility that is performed by the components shown in the Figures, and collectively disclose an automated system 10.); receiving, by the computing device, user input indicative of an assignment, by a user, of a preconfigured zone function to the premises device (Sefton, Col. 2, Lines 19-22, The automation system performs various site security monitoring and site access-control actions, i.e. zone functions, based on event types defined by the user. Examples of a preconfigured zone function include license plate or temporary passive tag reading. The term preconfigured is interpreted as a function that a premises device is capable to perform that is assignable to a particular premises device, e.g. a camera.), wherein the assigned zone function determines a type of response of the premises management system to premises device data received from the premises device (Sefton, Col. 7, Lines 49-60, A zone function is interpreted as a function that occurs at a zone or area in response to the premises management system receiving data from the premises device of the zone or area. In the example of a high security parking lot, camera C6 is associated with raising barrier B4 and/or notifying security personnel, which are functions associated with the high security parking lot, i.e. zone functions. The main processor 16 determines if a captured LPN, e.g. a premises device data, is given access to a high-security zone based on whether the LPN matches an LPN stored in a high-security database. The determination of whether or not a captured LPN by the main processor 16 is thus equivalent to a type of response of the premises management system.); and causing, by the computing device based on a trigger signal received from the premises device and based on the premises device being assigned the zone function, outputting of one or more alarms associated with the zone function (Sefton, Col. 7, Lines 49-60, Based on the identifying of a vehicle by camera C6, the system performs step C (see Sefton, Fig. 6), which corresponds to accessing a high-security zone. It is also noted that a vehicle presence at a high-security zone entrance may also be detected by other types of sensors (see Sefton, Col. 4, Lines 60-66). Additionally, the corresponding functions are according to the zone function profile associated with camera C6 and barrier B4. The image, along with the time-stamp, camera identifier, and other pertinent information associated with the image of the plate are functionally equivalent to a trigger signal because the image and associated data cause the system to perform the steps of comparing the LPNs (see Sefton, Col. 5, Lines 18-27). The notifying of the security personnel if the detected LPN is not in the high-security database 42 is functionally equivalent to an alarm.), wherein a type of alarm for the one or more alarms is based on the zone function assigned to the premises device (Sefton, Fig. 6, An example operation includes steps 192 and 193, which occur after the step 190, which is an example of a zone function. Thus, for example, adding an LPN to High-Security Parking Lot Inventory Database, i.e. step 192, is based on the step of raising barrier B4, i.e. step 190. The type of alarm is based on the functions assigned to camera C6 and barrier B4 in the example of Fig. 6 (see Sefton, Col. 7, Lines 49-60).). Sefton does not explicitly teach: Receiving, by the computing device, via a user interface, user input of an assignment selection, by a user, of a zone function of a plurality of preconfigured zone functions to the premises device, and wherein the computing device is capable of being assigned a subset of the plurality of preconfigured zone functions according to the information identifying the premises device and a sensor type for the premises device. However, as per the limitation of user input of an assignment, by a user, of a zone function of a plurality of preconfigured zone functions to the premises device, it would have been obvious to one of ordinary skill in the art for the user defined security monitoring and site access-control actions (see Sefton, Col. 2, Lines 19-22) to include zone functions associated with each sensor. For example, step C in Fig. 6, associated with camera C6 (see also Sefton, Fig. 2), specifically applies the sensing of camera C6 with a high security parking lot. Thus, it would have been obvious to one of ordinary skill in the art for the user to define the association between sensed vehicles by camera C6 with the high security parking lot specifically, such that camera C6 would not be used for the visitor parking lot or the normal security parking lot. Similarly, camera C5 and barrier B4 would also be associated specifically with high security parking lot. Such a modification would ensure the invention is operable for its intended purpose and that non-related barriers are not mistakenly activated. Furthermore, the image processing system 12 and the main processor 16, form a computing device of the automated system 10, is thus capable of performing at least one of the plurality of preconfigured zone functions, i.e. any of the plurality of preconfigured zone functions, which includes, for example, the zone function associated with camera C6 and the high security parking lot. As per the limitation of wherein the computing device is capable of being assigned a subset of the plurality of preconfigured zone functions according to the information identifying the premises device and a sensor type for the premises device, in accordance with the explanation above, when each camera is assigned its respective function, e.g. camera C6 performing license plate/tag recognition at the high security parking lot, it would have been obvious to one of ordinary skill in the art for the assigned function to be in accordance with the camera identifier (see Sefton, Col. 5, Lines 18-27). The camera identifier thus identifies each premises device, e.g. camera C6, as well as identifying that the premises device is a camera, i.e. a sensory type. Additionally, each function assigned to each camera, e.g. camera C6, is a subset of the plurality of preconfigured zone functions, e.g. LPN or tag recognition for a high security parking lot, a visitor parking lot, or a normal security parking lot. Bourke-Dunphy teaches: Receiving, by the computing device, via a user interface, user input (Bourke-Dunphy, Col. 10, Lines 41-55) based on an installation order user interface that guides a user through configuring of installation of components to be installed (Bourke-Dunphy, Col. 8, Lines 40-45), and an assignment selection (Bourke-Dunphy, Col. 3, Lines 24-29, The user interface component 12 displays instructions and receives selections from the user.). Therefore, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the system in Sefton by integrating the teaching of a user interface as taught by Bourke-Dunphy. The motivation would be to mitigate possible installation errors by providing an installation procedure for the user of the system (see Bourke-Dunphy, Col. 1, Lines 49-52). Claim 2, Sefton in view of Bourke-Dunphy further teaches: Wherein the zone functions comprise at least one of an entry function, an exit function, a perimeter function, an interior function, a follower function, a fire monitoring function, or a 24-hour function (Sefton, Col. 7, Lines 49-65, In the example of a high security parking lot, the high security parking lot is functionally equivalent to include at least an entry function via barrier B4, an exit function via the barrier B4, and a perimeter function for protecting the perimeter of the high security parking lot.). Claim 17, Sefton teaches: A device (Sefton, Col. 1, Lines 51-56, Col. 3, Lines 3-6, and Lines 38-46) associated with a premises management system located at a premises (Sefton, Col. 3, Lines 50-51, The automated system 10, i.e. a premises management system, controls access to a secure site, such as a military base or high-security research facility, which is a premises.), wherein the device comprises: one or more processors (Sefton, Fig. 1: 12 and 16, Col. 3, Lines 33-38 and 43-46, The image processing system 12 processes and identifies the license plate numbers based on the captured images by the cameras. The main processor 16 performs functions in response to the identified license plate numbers and rules set by the user (see Sefton, Col. 2, Lines 19-22).); and memory storing instructions that, when executed by the one or more processors (Sefton, Col. 3, Lines 33-46, The image processing system 12 utilizes software for identifying license plate numbers. It would have been obvious to one of ordinary skill in the art for the main processor 16 to utilize software stored in memory for performing its functions, such as interpreting data stored in databases (see Sefton, Col. 4, Lines 11-26).), cause the device to: receive information identifying a premises device (Sefton, Col. 5, Lines 18-27, Each camera, i.e. a premises device, that captures an image of a license plate transmits a camera identifier. It would have been obvious to one of ordinary skill in the art for the camera identifier to identify the camera in order to differentiate itself from other vehicle presence sensors that may be used (see Sefton, Col. 4, Lines 63-67 through Col. 5, Lines 1-7).) of a plurality of premises devices (Sefton, Fig. 1: C1-C14) associated with the premises management system (Sefton, Fig. 1, Col. 1, Lines 3-10, The system of Figs. 1 and 2 are for monitoring vehicles entering a high-security facility that is performed by the components shown in the Figures, and collectively disclose an automated system 10.); receive user input indicative of an assignment, by a user, of a preconfigured zone function to the premises device (Sefton, Col. 2, Lines 19-22, The automation system performs various site security monitoring and site access-control actions, i.e. zone functions, based on event types defined by the user. Examples of a preconfigured zone function include license plate or temporary passive tag reading. The term preconfigured is interpreted as a function that a premises device is capable to perform that is assignable to a particular premises device, e.g. a camera.), wherein the assigned zone function determines a type of response of the premises management system to premises device data received from the premises device (Sefton, Col. 7, Lines 49-60, A zone function is interpreted as a function that occurs at a zone or area in response to the premises management system receiving data from the premises device of the zone or area. In the example of a high security parking lot, camera C6 is associated with raising barrier B4 and/or notifying security personnel, which are functions associated with the high security parking lot, i.e. zone functions. The main processor 16 determines if a captured LPN, e.g. a premises device data, is given access to a high-security zone based on whether the LPN matches an LPN stored in a high-security database. The determination of whether or not a captured LPN by the main processor 16 is thus equivalent to a type of response of the premises management system.); and cause, based on a trigger signal received from the premises device and based on the premises device being assigned the zone function, outputting of one or more alarms associated with the zone function (Sefton, Col. 7, Lines 49-60, Based on the identifying of a vehicle by camera C6, the system performs step C (see Sefton, Fig. 6), which corresponds to accessing a high-security zone. It is also noted that a vehicle presence at a high-security zone entrance may also be detected by other types of sensors (see Sefton, Col. 4, Lines 60-66). Additionally, the corresponding functions are according to the zone function profile associated with camera C6 and barrier B4. The image, along with the time-stamp, camera identifier, and other pertinent information associated with the image of the plate are functionally equivalent to a trigger signal because the image and associated data cause the system to perform the steps of comparing the LPNs (see Sefton, Col. 5, Lines 18-27). The notifying of the security personnel if the detected LPN is not in the high-security database 42 is functionally equivalent to an alarm.), wherein a type of alarm for the one or more alarms is based on the zone function assigned to the premises device (Sefton, Fig. 6, An example operation includes steps 192 and 193, which occur after the step 190, which is an example of a zone function. Thus, for example, adding an LPN to High-Security Parking Lot Inventory Database, i.e. step 192, is based on the step of raising barrier B4, i.e. step 190. The type of alarm is based on the functions assigned to camera C6 and barrier B4 in the example of Fig. 6 (see Sefton, Col. 7, Lines 49-60).). Sefton does not explicitly teach: Receive, via a user interface, user input of an assignment selection, by a user, of a zone function of a plurality of preconfigured zone functions to the premises device, and wherein the computing device is capable of being assigned a subset of the plurality of preconfigured zone functions according to the information identifying the premises device and a sensor type for the premises device. However, as per the limitation of user input of an assignment, by a user, of a zone function of a plurality of preconfigured zone functions to the premises device, it would have been obvious to one of ordinary skill in the art for the user defined security monitoring and site access-control actions (see Sefton, Col. 2, Lines 19-22) to include zone functions associated with each sensor. For example, step C in Fig. 6, associated with camera C6 (see also Sefton, Fig. 2), specifically applies the sensing of camera C6 with a high security parking lot. Thus, it would have been obvious to one of ordinary skill in the art for the user to define the association between sensed vehicles by camera C6 with the high security parking lot specifically, such that camera C6 would not be used for the visitor parking lot or the normal security parking lot. Similarly, camera C5 and barrier B4 would also be associated specifically with high security parking lot. Such a modification would ensure the invention is operable for its intended purpose and that non-related barriers are not mistakenly activated. Furthermore, the image processing system 12 and the main processor 16, form a computing device of the automated system 10, is thus capable of performing at least one of the plurality of preconfigured zone functions, i.e. any of the plurality of preconfigured zone functions, which includes, for example, the zone function associated with camera C6 and the high security parking lot. As per the limitation of wherein the computing device is capable of being assigned a subset of the plurality of preconfigured zone functions according to the information identifying the premises device and a sensor type for the premises device, in accordance with the explanation above, when each camera is assigned its respective function, e.g. camera C6 performing license plate/tag recognition at the high security parking lot, it would have been obvious to one of ordinary skill in the art for the assigned function to be in accordance with the camera identifier (see Sefton, Col. 5, Lines 18-27). The camera identifier thus identifies each premises device, e.g. camera C6, as well as identifying that the premises device is a camera, i.e. a sensory type. Additionally, each function assigned to each camera, e.g. camera C6, is a subset of the plurality of preconfigured zone functions, e.g. LPN or tag recognition for a high security parking lot, a visitor parking lot, or a normal security parking lot. Bourke-Dunphy teaches: Receiving, by the computing device, via a user interface, user input (Bourke-Dunphy, Col. 10, Lines 41-55) based on an installation order user interface that guides a user through configuring of installation of components to be installed (Bourke-Dunphy, Col. 8, Lines 40-45), and an assignment selection (Bourke-Dunphy, Col. 3, Lines 24-29, The user interface component 12 displays instructions and receives selections from the user.). Therefore, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the system in Sefton by integrating the teaching of a user interface as taught by Bourke-Dunphy. The motivation would be to mitigate possible installation errors by providing an installation procedure for the user of the system (see Bourke-Dunphy, Col. 1, Lines 49-52). Claim 35, Sefton in view of Bourke-Dunphy further teaches: Wherein the zone functions comprise at least one of an entry function, an exit function, a perimeter function, an interior function, a follower function, a fire monitoring function, or a 24-hour function (Sefton, Col. 7, Lines 49-65, In the example of a high security parking lot, the high security parking lot is functionally equivalent to include at least an entry function via barrier B4, an exit function via the barrier B4, and a perimeter function for protecting the perimeter of the high security parking lot.). Claim 37, Sefton teaches: A system (Sefton, Col. 1, Lines 51-56, Col. 3, Lines 3-6, and Lines 38-46) comprising: a plurality of premises devices (Sefton, Fig. 1: C1-C14) associated with a premises management system (Sefton, Fig. 1, Col. 1, Lines 3-10, The system of Figs. 1 and 2 are for monitoring vehicles entering a high-security facility that is performed by the components shown in the Figures, and collectively disclose an automated system 10.); and a computing device (Sefton, Fig. 1: 12 and 16, Col. 3, Lines 33-38 and 43-46, The image processing system 12 processes and identifies the license plate numbers based on the captured images by the cameras. The main processor 16 performs functions in response to the identified license plate numbers and rules set by the user (see Sefton, Col. 2, Lines 19-22). Together, the image processing system 12 and the main processor 16 form a computing device of the automated system 10, which is a premises management system.) configured to: receive information identifying a premises device (Sefton, Col. 5, Lines 18-27, Each camera, i.e. a premises device, that captures an image of a license plate transmits a camera identifier. It would have been obvious to one of ordinary skill in the art for the camera identifier to identify the camera in order to differentiate itself from other vehicle presence sensors that may be used (see Sefton, Col. 4, Lines 63-67 through Col. 5, Lines 1-7).) of the plurality of premises devices (Sefton, Fig. 1: C1-C14); receive user input indicative of an assignment, by a user of the computing device, of a preconfigured zone function to the premises device (Sefton, Col. 2, Lines 19-22, The automation system performs various site security monitoring and site access-control actions, i.e. zone functions, based on event types defined by the user. Examples of a preconfigured zone function include license plate or temporary passive tag reading. The term preconfigured is interpreted as a function that a premises device is capable to perform that is assignable to a particular premises device, e.g. a camera.), wherein the assigned zone function determines a type of response of the premises management system to premises device data received from the premises device (Sefton, Col. 7, Lines 49-60, A zone function is interpreted as a function that occurs at a zone or area in response to the premises management system receiving data from the premises device of the zone or area. In the example of a high security parking lot, camera C6 is associated with raising barrier B4 and/or notifying security personnel, which are functions associated with the high security parking lot, i.e. zone functions. The main processor 16 determines if a captured LPN, e.g. a premises device data, is given access to a high-security zone based on whether the LPN matches an LPN stored in a high-security database. The determination of whether or not a captured LPN by the main processor 16 is thus equivalent to a type of response of the premises management system.); and cause, based on a trigger signal received from the premises device and based on the premises device being assigned the zone function, outputting of one or more alarms associated with the zone function (Sefton, Col. 7, Lines 49-60, Based on the identifying of a vehicle by camera C6, the system performs step C (see Sefton, Fig. 6), which corresponds to accessing a high-security zone. It is also noted that a vehicle presence at a high-security zone entrance may also be detected by other types of sensors (see Sefton, Col. 4, Lines 60-66). Additionally, the corresponding functions are according to the zone function profile associated with camera C6 and barrier B4. The image, along with the time-stamp, camera identifier, and other pertinent information associated with the image of the plate are functionally equivalent to a trigger signal because the image and associated data cause the system to perform the steps of comparing the LPNs (see Sefton, Col. 5, Lines 18-27). The notifying of the security personnel if the detected LPN is not in the high-security database 42 is functionally equivalent to an alarm.), wherein a type of alarm for the one or more alarms is based on the zone function assigned to the premises device (Sefton, Fig. 6, An example operation includes steps 192 and 193, which occur after the step 190, which is an example of a zone function. Thus, for example, adding an LPN to High-Security Parking Lot Inventory Database, i.e. step 192, is based on the step of raising barrier B4, i.e. step 190. The type of alarm is based on the functions assigned to camera C6 and barrier B4 in the example of Fig. 6 (see Sefton, Col. 7, Lines 49-60).). Sefton does not specifically teach: Receive, via a user interface, user input of an assignment selection, by a user of the computing device, of a zone function of a plurality of preconfigured zone functions to the premises device, and wherein the computing device is capable of being assigned a subset of the preconfigured plurality of zone functions according to the information identifying the premises device and a sensor type for the premises device. However, as per the limitation of user input of an assignment, by a user, of a zone function of a plurality of preconfigured zone functions to the premises device, it would have been obvious to one of ordinary skill in the art for the user defined security monitoring and site access-control actions (see Sefton, Col. 2, Lines 19-22) to include zone functions associated with each sensor. For example, step C in Fig. 6, associated with camera C6 (see also Sefton, Fig. 2), specifically applies the sensing of camera C6 with a high security parking lot. Thus, it would have been obvious to one of ordinary skill in the art for the user to define the association between sensed vehicles by camera C6 with the high security parking lot specifically, such that camera C6 would not be used for the visitor parking lot or the normal security parking lot. Similarly, camera C5 and barrier B4 would also be associated specifically with high security parking lot. Such a modification would ensure the invention is operable for its intended purpose and that non-related barriers are not mistakenly activated. Furthermore, the image processing system 12 and the main processor 16, form a computing device of the automated system 10, is thus capable of performing at least one of the plurality of preconfigured zone functions, i.e. any of the plurality of preconfigured zone functions, which includes, for example, the zone function associated with camera C6 and the high security parking lot. As per the limitation of wherein the computing device is capable of being assigned a subset of the plurality of preconfigured zone functions according to the information identifying the premises device and a sensor type for the premises device, in accordance with the explanation above, when each camera is assigned its respective function, e.g. camera C6 performing license plate/tag recognition at the high security parking lot, it would have been obvious to one of ordinary skill in the art for the assigned function to be in accordance with the camera identifier (see Sefton, Col. 5, Lines 18-27). The camera identifier thus identifies each premises device, e.g. camera C6, as well as identifying that the premises device is a camera, i.e. a sensory type. Additionally, each function assigned to each camera, e.g. camera C6, is a subset of the plurality of preconfigured zone functions, e.g. LPN or tag recognition for a high security parking lot, a visitor parking lot, or a normal security parking lot. Bourke-Dunphy teaches: Receiving, by the computing device, via a user interface, user input (Bourke-Dunphy, Col. 10, Lines 41-55) based on an installation order user interface that guides a user through configuring of installation of components to be installed (Bourke-Dunphy, Col. 8, Lines 40-45), and an assignment selection (Bourke-Dunphy, Col. 3, Lines 24-29, The user interface component 12 displays instructions and receives selections from the user.). Therefore, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the system in Sefton by integrating the teaching of a user interface as taught by Bourke-Dunphy. The motivation would be to mitigate possible installation errors by providing an installation procedure for the user of the system (see Bourke-Dunphy, Col. 1, Lines 49-52). Claim 38, Sefton in view of Bourke-Dunphy further teaches: The computing device is further configured to: execute a script, wherein the script guides the user of the computing device through a process to input the user input (Bourke-Dunphy, Col. 8, Lines 40-45) of the assignment selection of the zone function of the plurality of preconfigured zone functions to the premises device (Sefton, Col. 2, Lines 19-22, The automation system performs various site security monitoring and site access-control actions, i.e. zone functions, based on event types defined by the user. In the combination of Sefton in view of Bourke-Dunphy, the selection is made by the user via a user interface (see Bourke-Dunphy, Col. 3, Lines 24-29 ).). Claim 42, Sefton in view of Bourke-Dunphy further teaches: Wherein the zone functions comprise at least one of an entry function, an exit function, a perimeter function, an interior function, a follower function, a fire monitoring function, or a 24-hour function (Sefton, Col. 7, Lines 49-65, In the example of a high security parking lot, the high security parking lot is functionally equivalent to include at least an entry function via barrier B4, an exit function via the barrier B4, and a perimeter function for protecting the perimeter of the high security parking lot.). Claim 43, Sefton in view of Bourke-Dunphy further teaches: The user input of the assignment selection of the zone function of the plurality of preconfigured zone functions to the premises device comprises an indication of a function (Sefton, Col. 2, Lines 19-22, The user preference associates a given camera, e.g. C6, with a given zone, e.g. a high security parking lot. The association dictates which database is used with each zone type, e.g. high security, normal security, visitor, etc., (see Sefton, Fig. 1) for comparison and thus the user preference is an indication of a zone type. The associated function in the example of camera C6 would be to open gate B4. In the combination of Sefton in view of Bourke-Dunphy, the selection is made by the user via a user interface (see Bourke-Dunphy, Col. 3, Lines 24-29 )), wherein the indicated function is executed in response to receiving the signal from the premises device (Sefton, Col. 7, Lines 52-59). Claim 46, Sefton in view of Bourke-Dunphy further teaches: Receiving, by the computing device, via the user interface, a second user input (Bourke-Dunphy, Col. 10, Lines 41-55) of an assignment selection of a second zone function to the premises device (Sefton, Col. 2, Lines 19-22, It would have been obvious to one of ordinary skill in the art for the user defined security monitoring and site access-control actions (see Sefton, Col. 2, Lines 19-22) to include zone functions associated with each sensor. For example, step C in Fig. 6, associated with camera C6 (see also Sefton, Fig. 2), specifically applies the sensing of camera C6 with a high security parking lot. Thus, it would have been obvious to one of ordinary skill in the art for the user to define the association between sensed vehicles by camera C6 with the high security parking lot specifically, such that camera C6 would not be used for the visitor parking lot or the normal security parking lot. Similarly, camera C5 and barrier B4 would also be associated specifically with high security parking lot. Within the zone functions associated with a single zone type, multiple zone functions may be established for each possible outcome, and it would have been obvious to one of ordinary skill in the art for the user-defined events to be associated with each possible outcome. In the combination of Sefton in view of Bourke-Dunphy, the selection is made by the user via a user interface (see Bourke-Dunphy, Col. 3, Lines 24-29 )), different from the zone function, of the plurality of preconfigured zone functions (Sefton, Col. 6, Lines 3-24 and Lines 25-47, As consistent with the rejection of claim 1, a situation in which a license plate number matches an LPN database 30 or expected visitor 32 may be associated with one zone function profile, wherein if the license plate number does not match any of the numbers stored in LPN database 30 or expected visitor database 32, then the system utilizes a “blacklist” database 36, and this step may be associated with a different zone function to account for situations in which license plate numbers do not match.); and causing, by the computing device and one or more operations associated with the second zone function (Sefton, Col. 6, Lines 3-24 and Lines 25-47, A second signal from the same sensor would be a signal of a second vehicle different than a first vehicle. Thus, one of ordinary skill in the art would recognize a possible scenario of a first vehicle matching the LPN database 30 or expected visitor database 32, whereas a subsequent vehicle not matching an of the stored license plate numbers, triggering the steps of comparing the vehicle LPN with the “blacklist” database 36.). Claim 49, Sefton in view of Bourke-Dunphy further teaches: The instructions further cause the device to: receive, via the user interface, a second user input (Bourke-Dunphy, Col. 10, Lines 41-55) of an assignment selection of a second zone function (Sefton, Col. 2, Lines 19-22, It would have been obvious to one of ordinary skill in the art for the user defined security monitoring and site access-control actions (see Sefton, Col. 2, Lines 19-22) to include zone functions associated with each sensor. For example, step C in Fig. 6, associated with camera C6 (see also Sefton, Fig. 2), specifically applies the sensing of camera C6 with a high security parking lot. Thus, it would have been obvious to one of ordinary skill in the art for the user to define the association between sensed vehicles by camera C6 with the high security parking lot specifically, such that camera C6 would not be used for the visitor parking lot or the normal security parking lot. Similarly, camera C5 and barrier B4 would also be associated specifically with high security parking lot. Within the zone functions associated with a single zone type, multiple zone functions may be established for each possible outcome, and it would have been obvious to one of ordinary skill in the art for the user-defined events to be associated with each possible outcome. In the combination of Sefton in view of Bourke-Dunphy, the selection is made by the user via a user interface (see Bourke-Dunphy, Col. 3, Lines 24-29 )), different from the zone function, of the plurality of preconfigured zone functions (Sefton, Col. 6, Lines 3-24 and Lines 25-47, As consistent with the rejection of claim 1, a situation in which a license plate number matches an LPN database 30 or expected visitor 32 may be associated with one zone function profile, wherein if the license plate number does not match any of the numbers stored in LPN database 30 or expected visitor database 32, then the system utilizes a “blacklist” database 36, and this step may be associated with a different zone function to account for situations in which license plate numbers do not match.); and cause one or more operations associated with the second zone function (Sefton, Col. 6, Lines 3-24 and Lines 25-47, A second signal from the same sensor would be a signal of a second vehicle different than a first vehicle. Thus, one of ordinary skill in the art would recognize a possible scenario of a first vehicle matching the LPN database 30 or expected visitor database 32, whereas a subsequent vehicle not matching an of the stored license plate numbers, triggering the steps of comparing the vehicle LPN with the “blacklist” database 36.). Claims 52-54, Sefton in view of Bourke-Dunphy further teaches: The premises devices comprise at least one of a thermostat, a light, an alarm, or a communication device (Sefton, Fig. 1: 14, Col. 4, Lines 8-11, The cameras C1-C14 are connected to video image processing system 12 via communication network 14. Therefore, cameras C1-C14 are functionally equivalent to communication devices.). Claims 55-57, Sefton in view of Bourke-Dunphy further teaches: The premises device is located in at least one of a room, a perimeter, or a portion of the premises (Sefton, Fig. 2, Each area protected by a barrier, e.g. “Normal Security Parking Lot”, “Visitor Parking Lot”, represents a zone. Therefore, each area is functionally equivalent to a portion of the premises, wherein the premises may be a military base or high-security research facility, for example (see Sefton, Col. 3, Lines 50-52). Each camera (see Sefton, Fig. 2: C1-C14) is thus located in at least a perimeter or a portion of the premises for which it is assigned, e.g. camera C6 is located at a perimeter of high security parking lot.). Claims 58-59, Sefton in view of Bourke-Dunphy further teaches: The one or more operations comprise at least one of a change of state, an arming, a disarming, a turning on, a turning off, triggering an alarm, or a triggering a camera (Sefton, Col. 7, Lines 49-60, The raising of a barrier (see Sefton, Fig. 6: 190) is one example of an operation, which is a change of state for the barrier, because the barrier can either be raised or not raised.). Claims 61-62, Sefton in view of Bourke-Dunphy further teaches: The premises device data comprises at least one of an image, sensor data, a device notification, or a user input (Sefton, Fig. 6, Col. 7, Lines 49-60, Data from the cameras include image data regarding the license plate number (LPN) of the vehicle.). Claims 18, 27, 32, and 39 are rejected under pre-AIA 35 U.S.C. 103(a) as being unpatentable over Sefton (U.S. 7,119,674 B2) in view of Bourke-Dunphy et al. (U.S. 6,918,112 B2), in view of Baum et al. (U.S. 2009/0165114 A1). Claim 18, Sefton in view of Bourke-Dunphy teaches: Wherein the instructions further cause the device to: display the user interface (Bourke-Dunphy, Fig. 6); execute a script, wherein the script guides the user, via the user interface, through a process to input the user input (Bourke-Dunphy, Col. 8, Lines 40-45) of the assignment selection of the zone function of the plurality of preconfigured zone functions to the premises device (Sefton, Col. 2, Lines 19-22, The automation system performs various site security monitoring and site access-control actions, i.e. zone functions, based on event types defined by the user. In the combination of Sefton in view of Bourke-Dunphy, the selection is made by the user via a user interface (see Bourke-Dunphy, Col. 3, Lines 24-29 )). Sefton in view of Bourke-Dunphy does not specifically teach: A touchscreen display, display, via the touchscreen display, the user interface. Baum teaches: Displaying a user interface on a touchscreen display (Baum, Fig. 8, Paragraph [0063]). Therefore, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the system in Sefton in view of Bourke-Dunphy, by integrating the teaching of a touchscreen interface, as taught by Baum. The motivation would be to utilize an intuitive method of presenting an interface to a user (see Baum, Paragraph [0063]). Claim 27, Sefton in view of Bourke-Dunphy teaches: User input of the assignment selection of the zone function (Sefton, Col. 2, Lines 19-22, It would have been obvious to one of ordinary skill in the art for the user defined security monitoring and site access-control actions (see Sefton, Col. 2, Lines 19-22) to include zone function profiles associated with each sensor. For example, step C in Fig. 6, associated with camera C6 (see also Sefton, Fig. 2), specifically applies the sensing of camera C6 with a high security parking lot. Thus, it would have been obvious to one of ordinary skill in the art for the user to define the association between sensed vehicles by camera C6 with the high security parking lot specifically, such that camera C6 would not be used for the visitor parking lot or the normal security parking lot. Similarly, camera C5 and barrier B4 would also be associated specifically with high security parking lot. Such a modification would ensure the invention is operable for its intended purpose and that non-related barriers are not mistakenly activated. In the combination of Sefton in view of Bourke-Dunphy, the selection is made by the user via a user interface (see Bourke-Dunphy, Col. 3, Lines 24-29 )). Sefton does not specifically teach: The computing device further comprises a touchscreen display, and wherein the user interface comprises a touchscreen display and the user input of the assignment selection of the zone function of the plurality of preconfigured zone functions to the premises device is received via the user interface of the touchscreen display. Baum teaches: A touchscreen display (Baum, Fig. 8, Paragraph [0063]), and wherein the user input is received via a user interface of the touchscreen display (Baum, Paragraph [0135]). Therefore, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the system in Sefton by integrating the teaching of a touchscreen interface, as taught by Baum. The motivation would be to utilize an intuitive method of presenting an interface to a user (see Baum, Paragraph [0063]). Claim 32, Sefton in view of Bourke-Dunphy teaches: User input of the assignment selection of the zone function (Sefton, Col. 2, Lines 19-22, It would have been obvious to one of ordinary skill in the art for the user defined security monitoring and site access-control actions (see Sefton, Col. 2, Lines 19-22) to include zone function profiles associated with each sensor. For example, step C in Fig. 6, associated with camera C6 (see also Sefton, Fig. 2), specifically applies the sensing of camera C6 with a high security parking lot. Thus, it would have been obvious to one of ordinary skill in the art for the user to define the association between sensed vehicles by camera C6 with the high security parking lot specifically, such that camera C6 would not be used for the visitor parking lot or the normal security parking lot. Similarly, camera C5 and barrier B4 would also be associated specifically with high security parking lot. Such a modification would ensure the invention is operable for its intended purpose and that non-related barriers are not mistakenly activated. In the combination of Sefton in view of Bourke-Dunphy, the selection is made by the user via a user interface (see Bourke-Dunphy, Col. 3, Lines 24-29 )). Sefton in view of Bourke-Dunphy does not specifically teach: The user interface comprises a touchscreen display and the user input of the assignment selection of the zone function of the plurality of preconfigured zone functions to the premises device is received via the user interface of the touchscreen display. Baum teaches: A touchscreen display (Baum, Fig. 8, Paragraph [0063]), and wherein the user input is received via a user interface of the touchscreen display (Baum, Paragraph [0135]). Therefore, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the system in Sefton in view of Bourke-Dunphy by integrating the teaching of a touchscreen interface, as taught by Baum. The motivation would be to utilize an intuitive method of presenting an interface to a user (see Baum, Paragraph [0063]). Claim 39, Sefton in view of Bourke-Dunphy teaches: User input associating the premises device with the zone function (Sefton, Col. 2, Lines 19-22, It would have been obvious to one of ordinary skill in the art for the user defined security monitoring and site access-control actions (see Sefton, Col. 2, Lines 19-22) to include zone function profiles associated with each sensor. For example, step C in Fig. 6, associated with camera C6 (see also Sefton, Fig. 2), specifically applies the sensing of camera C6 with a high security parking lot. Thus, it would have been obvious to one of ordinary skill in the art for the user to define the association between sensed vehicles by camera C6 with the high security parking lot specifically, such that camera C6 would not be used for the visitor parking lot or the normal security parking lot. Similarly, camera C5 and barrier B4 would also be associated specifically with high security parking lot. Such a modification would ensure the invention is operable for its intended purpose and that non-related barriers are not mistakenly activated. In the combination of Sefton in view of Bourke-Dunphy, the selection is made by the user via a user interface (see Bourke-Dunphy, Col. 3, Lines 24-29 )). Sefton in view of Bourke-Dunphy does not specifically teach: The user interface comprises a touchscreen display and the user input of the assignment selection of the zone function of the plurality of preconfigured zone functions to the premises device is received via the user interface of the touchscreen display. Baum teaches: A touchscreen display (Baum, Fig. 8, Paragraph [0063]), and wherein the user input is received via a user interface of the touchscreen display (Baum, Paragraph [0135]). Therefore, it would have been obvious to one of ordinary skill in the art at the time of the invention to modify the system in Sefton in view of Bourke-Dunphy by integrating the teaching of a touchscreen interface, as taught by Baum. The motivation would be to utilize an intuitive method of presenting an interface to a user (see Baum, Paragraph [0063]). Response to Arguments Applicant's arguments filed 11/21/2025 have been fully considered but they are not persuasive. In response to the Applicant’s argument on Page 9 that the Sefton reference teaches receiving the camera identifier after the user has already defined the functions for the security system, the Examiner respectfully disagrees to the applicability of the interpretation to the Applicant’s claimed invention, as currently amended. Although the claims include the step of the preconfigured zone functions according to the information identifying the premises device and a sensor type for the premises device, the step of assigning the preconfigured zone functions is not inherently or explicitly defined to occur after the reception of information identifying a premises device. Additionally, with respect to the rejection above, one of ordinary skill in the art would recognize that the assignment of a zone function to a particular premises device requires the knowledge of the premises device, otherwise the system would be inoperable for its intended function. For example, a user would not assign a camera C6 with the function of opening a barrier, because the camera C6 could not perform the barrier function. Furthermore, the Examiner contends that the claims, as currently amended, defines that the computing device, not the premises device(s), is capable of being assigned a subset of the plurality of preconfigured zone functions. Conclusion THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to JAMES J YANG whose telephone number is (571)270-5170. The examiner can normally be reached 9:30am-6:00p M-F. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, BRIAN ZIMMERMAN can be reached at (571) 272-3059. The fax phone number for the organization where thi
Read full office action

Prosecution Timeline

Jan 22, 2010
Application Filed
Jul 10, 2012
Non-Final Rejection — §103
Jan 14, 2013
Response Filed
Mar 18, 2013
Final Rejection — §103
Sep 23, 2013
Request for Continued Examination
Sep 26, 2013
Response after Non-Final Action
Jul 30, 2014
Non-Final Rejection — §103
Feb 04, 2015
Response Filed
Apr 10, 2015
Final Rejection — §103
Oct 19, 2015
Request for Continued Examination
Oct 20, 2015
Response after Non-Final Action
Dec 03, 2015
Non-Final Rejection — §103
Jun 08, 2016
Response Filed
Sep 15, 2016
Final Rejection — §103
Mar 20, 2017
Request for Continued Examination
Mar 22, 2017
Response after Non-Final Action
Mar 31, 2017
Final Rejection — §103
Jul 06, 2017
Request for Continued Examination
Jul 07, 2017
Response after Non-Final Action
Sep 14, 2017
Non-Final Rejection — §103
Jan 22, 2018
Response Filed
May 08, 2018
Final Rejection — §103
Aug 13, 2018
Notice of Allowance
Aug 13, 2018
Response after Non-Final Action
Aug 23, 2018
Response after Non-Final Action
Oct 15, 2018
Response after Non-Final Action
Oct 30, 2018
Response after Non-Final Action
Nov 09, 2018
Response after Non-Final Action
Jan 16, 2019
Response after Non-Final Action
Jan 18, 2019
Response after Non-Final Action
Jan 22, 2019
Response after Non-Final Action
Jan 22, 2019
Response after Non-Final Action
Jun 24, 2020
Response after Non-Final Action
Aug 26, 2020
Request for Continued Examination
Sep 01, 2020
Response after Non-Final Action
Sep 10, 2020
Non-Final Rejection — §103
Dec 15, 2020
Response Filed
Dec 22, 2020
Final Rejection — §103
Mar 23, 2021
Request for Continued Examination
Mar 26, 2021
Response after Non-Final Action
Mar 30, 2021
Non-Final Rejection — §103
Aug 05, 2021
Response Filed
Aug 17, 2021
Final Rejection — §103
Oct 20, 2021
Response after Non-Final Action
Dec 06, 2021
Request for Continued Examination
Dec 07, 2021
Response after Non-Final Action
Dec 10, 2021
Non-Final Rejection — §103
Jun 15, 2022
Response Filed
Jul 01, 2022
Final Rejection — §103
Sep 08, 2022
Response after Non-Final Action
Oct 11, 2022
Request for Continued Examination
Oct 12, 2022
Response after Non-Final Action
Nov 23, 2022
Non-Final Rejection — §103
Feb 27, 2023
Response Filed
Mar 07, 2023
Final Rejection — §103
May 12, 2023
Response after Non-Final Action
Jun 12, 2023
Request for Continued Examination
Jun 20, 2023
Response after Non-Final Action
Jun 22, 2023
Non-Final Rejection — §103
Sep 28, 2023
Response Filed
Nov 15, 2023
Final Rejection — §103
Jan 22, 2024
Response after Non-Final Action
Feb 20, 2024
Response after Non-Final Action
Feb 20, 2024
Notice of Allowance
Feb 26, 2024
Response after Non-Final Action
Apr 19, 2024
Response after Non-Final Action
Apr 27, 2024
Response after Non-Final Action
Apr 30, 2024
Response after Non-Final Action
Jul 03, 2024
Response after Non-Final Action
Jul 05, 2024
Response after Non-Final Action
Jul 08, 2024
Response after Non-Final Action
Jul 08, 2024
Response after Non-Final Action
Jun 12, 2025
Response after Non-Final Action
Aug 13, 2025
Request for Continued Examination
Aug 18, 2025
Response after Non-Final Action
Aug 18, 2025
Non-Final Rejection — §103
Nov 21, 2025
Response Filed
Dec 11, 2025
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602812
MITIGATING EFFECTS CAUSED BY REPEATED AND/OR SPORADIC MOVEMENT OF OBJECTS IN A FIELD OF VIEW
2y 5m to grant Granted Apr 14, 2026
Patent 12604164
SYSTEM AND METHODS FOR HYDROGEN PLANT CONDITION MONITORING USING A WIRELESS MODULAR SENSOR SYSTEM
2y 5m to grant Granted Apr 14, 2026
Patent 12579886
SYSTEM AND METHOD FOR USING V2X AND SENSOR DATA
2y 5m to grant Granted Mar 17, 2026
Patent 12570210
CONTROL APPARATUS FOR VEHICLE
2y 5m to grant Granted Mar 10, 2026
Patent 12564526
BED HAVING SENSOR FUSING FEATURES USEFUL FOR DETERMINING SNORE AND BREATHING PARAMETERS
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

22-23
Expected OA Rounds
57%
Grant Probability
78%
With Interview (+21.5%)
3y 2m
Median Time to Grant
High
PTA Risk
Based on 720 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month