Prosecution Insights
Last updated: April 19, 2026
Application No. 17/293,316

INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, AND INFORMATION PROCESSING SYSTEM FOR NETWORK ADDRESS PROVISION

Non-Final OA §103
Filed
May 12, 2021
Examiner
LESNIEWSKI, VICTOR D
Art Unit
2493
Tech Center
2400 — Computer Networks
Assignee
Connectfree Corporation
OA Round
8 (Non-Final)
58%
Grant Probability
Moderate
8-9
OA Rounds
3y 4m
To Grant
99%
With Interview

Examiner Intelligence

Grants 58% of resolved cases
58%
Career Allow Rate
275 granted / 476 resolved
At TC average
Strong +56% interview lift
Without
With
+55.7%
Interview Lift
resolved cases with interview
Typical timeline
3y 4m
Avg Prosecution
26 currently pending
Career history
502
Total Applications
across all art units

Statute-Specific Performance

§101
7.8%
-32.2% vs TC avg
§103
54.5%
+14.5% vs TC avg
§102
18.1%
-21.9% vs TC avg
§112
11.3%
-28.7% vs TC avg
Black line = Tech Center average estimate • Based on career data from 476 resolved cases

Office Action

§103
DETAILED ACTION The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . The amendment filed 12/31/2025 has been placed of record in the file. Claims 24 and 34 have been amended. Claims 24, 26-34, and 36-45 are pending. The applicant’s arguments with respect to claims 24, 26-34, and 36-45 have been fully considered but they are not persuasive as discussed below. Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 12/31/2025 has been entered. Claim Rejections - 35 USC § 103 7. In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. 8. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. 9. Claims 24, 26, 27, 31, 32, 34, 36, 37, 41, 42, 44, and 45 are rejected under 35 U.S.C. 103 as being unpatentable over Yamada (U.S. Patent Application Publication Number 2015/0080025) in view of Gagliano et al. (U.S. Patent Application Publication Number 2013/0036307), hereinafter referred to as Gagliano. Yamada disclosed techniques for controlling access to stored files. In an analogous art, Gagliano disclosed techniques for authenticating communication responses between devices. Both systems are directed toward the use of IP addresses for network connections. Regarding claim 24, Yamada discloses an information processing method performed by a first device and a second device comprising: generating, by the first device, a network address of the first device (paragraph 131, projector has IP address); generating, by the second device, a network address of the second device (paragraph 29, smartphone connected to network); displaying, by the first device, a two-dimensional pattern associated with the network address of the first device (paragraph 131, QR code including IP address of projector); acquiring, by the second device, image data representing the two-dimensional pattern with an imaging unit (paragraph 132, smartphone captures image of QR code); specifying, by the second device, the network address of the first device based on the acquired image data (paragraph 132, obtains device information from QR code); and establishing communication between the first device and the second device (paragraph 136, sends projection request to projector). Yamada does not explicitly state generating a secret key of the first device and a public key corresponding to the secret key, the network address of the first device being generated based solely on a hash value on the basis of the public key of the first device and a predetermined hash function, generating a secret key of the second device and a public key corresponding to the secret key, the network address of the second device being generated based solely on a hash value on the basis of the public key of the second device and a predetermined hash function, and the communication being secure communication between the first device and the second device based on the public key of the first device and the public key of the second device. However, generating network addresses in such a fashion was well known in the art as evidenced by Gagliano. Since the inventions encompass the same field of endeavor, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Yamada by adding the ability for generating a secret key of the first device and a public key corresponding to the secret key, the network address of the first device being generated based solely on a hash value on the basis of the public key of the first device and a predetermined hash function, generating a secret key of the second device and a public key corresponding to the secret key, the network address of the second device being generated based solely on a hash value on the basis of the public key of the second device and a predetermined hash function, and the communication being secure communication between the first device and the second device based on the public key of the first device and the public key of the second device as provided by Gagliano (see paragraph 41, node has signing key and public key, and paragraph 20, nodes include host, router, etc., and paragraph 41, address based on hash of public key, and paragraph 16, signature verification). One of ordinary skill in the art would have recognized the benefit that generating network addresses in this way would assist in securing communications (see Gagliano, paragraph 7). Regarding claim 26, the combination of Yamada and Gagliano discloses wherein the data transmitted to the first device comprises a display screen of the second device (Yamada, paragraph 136, sends projection file to projector and projector projects projection file). Regarding claim 27, the combination of Yamada and Gagliano discloses receiving, by the second device, image data representing a display screen of a third device that is connected to the second device (Yamada, paragraph 136, information storage apparatus sends projection file to smartphone); and transmitting, by the second device, data including the image data to the first device by using the network address of the first device (Yamada, paragraph 136, smartphone sends projection file to projector). Regarding claim 31, the combination of Yamada and Gagliano discloses wherein the first device includes a projector (Yamada, paragraph 131, projector). Regarding claim 32, the combination of Yamada and Gagliano discloses wherein the two-dimensional pattern includes at least one of a one-dimensional or two-dimensional bar code (Yamada, paragraph 131, QR code). Regarding claim 34, Yamada discloses an information processing system comprising: a first device (paragraph 131, projector); and a second device comprising an imaging unit (paragraph 131, smartphone), wherein the first device is configured to perform operations comprising: generating a network address of the first device (paragraph 131, projector has IP address); and displaying a two-dimensional pattern associated with the network address of the first device (paragraph 131, QR code including IP address of projector), and the second device is configured to perform operations comprising: generating a network address of the second device (paragraph 29, smartphone connected to network); acquiring image data representing the two-dimensional pattern from the imaging unit (paragraph 132, smartphone captures image of QR code); specifying the network address of the first device based on the acquired image data (paragraph 132, obtains device information from QR code); and establishing communication between the first device and the second device (paragraph 136, sends projection request to projector). Yamada does not explicitly state generating a secret key and a public key corresponding to the secret key, the network address of the first device being generated based solely on a hash value on the basis of the public key of the first device and a predetermined hash function, generating a secret key and a public key corresponding to the secret key, the network address of the second device being generated based solely on a hash value on the basis of the public key of the second device and a predetermined hash function, and the communication being secure communication between the first device and the second device based on the public key of the first device and the public key of the second device. However, generating network addresses in such a fashion was well known in the art as evidenced by Gagliano. Since the inventions encompass the same field of endeavor, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Yamada by adding the ability for generating a secret key and a public key corresponding to the secret key, the network address of the first device being generated based solely on a hash value on the basis of the public key of the first device and a predetermined hash function, generating a secret key and a public key corresponding to the secret key, the network address of the second device being generated based solely on a hash value on the basis of the public key of the second device and a predetermined hash function, and the communication being secure communication between the first device and the second device based on the public key of the first device and the public key of the second device as provided by Gagliano (see paragraph 41, node has signing key and public key, and paragraph 20, nodes include host, router, etc., and paragraph 41, address based on hash of public key, and paragraph 16, signature verification). One of ordinary skill in the art would have recognized the benefit that generating network addresses in this way would assist in securing communications (see Gagliano, paragraph 7). Regarding claim 36, the combination of Yamada and Gagliano discloses wherein the data transmitted to the first device comprises a display screen of the second device (Yamada, paragraph 136, sends projection file to projector and projector projects projection file). Regarding claim 37, the combination of Yamada and Gagliano discloses wherein the operations performed by the second device further comprise: receiving image data representing a display screen of a third device that is connected to the second device (Yamada, paragraph 136, information storage apparatus sends projection file to smartphone); and transmitting data including the image data to the first device by using the network address of the first device (Yamada, paragraph 136, smartphone sends projection file to projector). Regarding claim 41, the combination of Yamada and Gagliano discloses wherein the first device includes a projector (Yamada, paragraph 131, projector). Regarding claim 42, the combination of Yamada and Gagliano discloses wherein the two-dimensional pattern includes at least one of a one-dimensional or two-dimensional bar code (Yamada, paragraph 131, QR code). Regarding claim 44, the combination of Yamada and Gagliano discloses acquiring, by the second device, a digital certificate associated with the public key of the first device (Gagliano, paragraph 40, communicates certificate to host). Regarding claim 45, the combination of Yamada and Gagliano discloses wherein the operations performed by the second device further comprise acquiring a digital certificate associated with the public key of the first device (Gagliano, paragraph 40, communicates certificate to host). 10. Claims 28-30 and 38-40 are rejected under 35 U.S.C. 103 as being unpatentable over Yamada in view of Gagliano, further in view of Ruparelia et al. (U.S. Patent Application Publication Number 2016/0364729), hereinafter referred to as Ruparelia. The combination of Yamada and Gagliano disclosed techniques for controlling access to stored files. In an analogous art, Ruparelia disclosed techniques for securely pairing devices. Both systems are directed toward authenticating a user device for access to services. Regarding claim 28, the combination of Yamada and Gagliano does not explicitly state determining whether or not the second device exists in vicinity of the first device and permitting communication connection between the first device and the second device when the second device exists in the vicinity of the first device. However, verifying user vicinity in such a fashion was well known in the art as evidenced by Ruparelia. Since the inventions encompass the same field of endeavor, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the combination of Yamada and Gagliano by adding the ability for determining whether or not the second device exists in vicinity of the first device and permitting communication connection between the first device and the second device when the second device exists in the vicinity of the first device as provided by Ruparelia (see paragraph 62, pairing request based on vicinity, and paragraph 66, pairing is successful). One of ordinary skill in the art would have recognized the benefit that verifying user vicinity in this way would assist in facilitating pairing between a user device and a terminal (see Ruparelia, paragraph 9). Regarding claim 29, the combination of Yamada, Gagliano, and Ruparelia discloses wherein the determining whether or not the second device exists in the vicinity of the first device is based on a user input operation on the first device (Ruparelia, figure 7 and paragraph 66, passcode sent to kiosk). Regarding claim 30, the combination of Yamada, Gagliano, and Ruparelia discloses wherein the determining whether or not the second device exists in the vicinity of the first device is based on a one-time password displayed on the first device (Ruparelia, paragraph 66, kiosk displays passcode and passcode is unique). Regarding claim 38, the combination of Yamada and Gagliano does not explicitly state wherein the operations performed by the first device further comprise determining whether or not the second device exists in vicinity of the first device and permitting communication connection between the first device and the second device when the second device exists in the vicinity of the first device. However, verifying user vicinity in such a fashion was well known in the art as evidenced by Ruparelia. Since the inventions encompass the same field of endeavor, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the combination of Yamada and Gagliano by adding the ability that the operations performed by the first device further comprise determining whether or not the second device exists in vicinity of the first device and permitting communication connection between the first device and the second device when the second device exists in the vicinity of the first device as provided by Ruparelia (see paragraph 62, pairing request based on vicinity, and paragraph 66, pairing is successful). One of ordinary skill in the art would have recognized the benefit that verifying user vicinity in this way would assist in facilitating pairing between a user device and a terminal (see Ruparelia, paragraph 9). Regarding claim 39, the combination of Yamada, Gagliano, and Ruparelia discloses wherein the determining whether or not the second device exists in the vicinity of the first device is based on a user input operation on the first device (Ruparelia, figure 7 and paragraph 66, passcode sent to kiosk). Regarding claim 40, the combination of Yamada, Gagliano, and Ruparelia discloses wherein the determining whether or not the second device exists in the vicinity of the first device is based on a one-time password displayed on the first device (Ruparelia, paragraph 66, kiosk displays passcode and passcode is unique). 11. Claims 33 and 43 are rejected under 35 U.S.C. 103 as being unpatentable over Yamada in view of Gagliano, further in view of Yang (U.S. Patent Application Publication Number 2019/0266371). The combination of Yamada and Gagliano disclosed techniques for controlling access to stored files. In an analogous art, Yang disclosed techniques for generating and utilizing bar codes. Both systems are directed toward the use of bar codes. Regarding claim 33, the combination of Yamada and Gagliano does not explicitly state wherein the two-dimensional pattern includes a plurality of divided regions, and each of the plurality of divided regions includes color information associated with a part of the network address of the first device. However, utilizing color bar codes was well known in the art as evidenced by Yang. Since the inventions encompass the same field of endeavor, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the combination of Yamada and Gagliano by adding the ability that the two-dimensional pattern includes a plurality of divided regions, and each of the plurality of divided regions includes color information associated with a part of the network address of the first device as provided by Yang (see paragraph 10, bar code contains color sequence of various colors). One of ordinary skill in the art would have recognized the benefit that utilizing a color bar code would allow the bar code to contain more information than a conventional bar code (see Yang, paragraph 10). Regarding claim 43, the combination of Yamada and Gagliano does not explicitly state wherein the two-dimensional pattern includes a plurality of divided regions, and each of the plurality of divided regions includes color information associated with a part of the network address of the first device. However, utilizing color bar codes was well known in the art as evidenced by Yang. Since the inventions encompass the same field of endeavor, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the combination of Yamada and Gagliano by adding the ability that the two-dimensional pattern includes a plurality of divided regions, and each of the plurality of divided regions includes color information associated with a part of the network address of the first device as provided by Yang (see paragraph 10, bar code contains color sequence of various colors). One of ordinary skill in the art would have recognized the benefit that utilizing a color bar code would allow the bar code to contain more information than a conventional bar code (see Yang, paragraph 10). Response to Arguments 12. In the remarks, the applicant has argued that the combination of Yamada and Gagliano does not teach the newly amended limitations of the independent claims. However, Gagliano has been shown to teach these features. Namely, the applicant states that “Gagliano merely discloses features in which only a router has an address based on a public key of the router.” However, Gagliano clearly states that any node in the system might have an address based on the hash of its public key. The applicant is directed to the newly added citations in the rejection above. Conclusion 13. Any inquiry concerning this communication or earlier communications from the examiner should be directed to Victor Lesniewski whose telephone number is (571)272-2812. The examiner can normally be reached Monday thru Friday, 9am to 5pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Carl Colin can be reached at 571-272-3862. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /Victor Lesniewski/Primary Examiner, Art Unit 2493
Read full office action

Prosecution Timeline

May 12, 2021
Application Filed
May 12, 2021
Response after Non-Final Action
Mar 09, 2023
Non-Final Rejection — §103
Jun 14, 2023
Response Filed
Jul 07, 2023
Final Rejection — §103
Oct 02, 2023
Interview Requested
Oct 10, 2023
Examiner Interview Summary
Oct 10, 2023
Applicant Interview (Telephonic)
Oct 13, 2023
Request for Continued Examination
Oct 18, 2023
Response after Non-Final Action
Nov 04, 2023
Non-Final Rejection — §103
Feb 05, 2024
Interview Requested
Feb 13, 2024
Examiner Interview Summary
Feb 13, 2024
Applicant Interview (Telephonic)
Mar 08, 2024
Response Filed
May 28, 2024
Final Rejection — §103
Oct 03, 2024
Response after Non-Final Action
Nov 04, 2024
Notice of Allowance
Nov 04, 2024
Response after Non-Final Action
Nov 26, 2024
Response after Non-Final Action
Feb 03, 2025
Request for Continued Examination
Feb 05, 2025
Response after Non-Final Action
Feb 07, 2025
Final Rejection — §103
May 12, 2025
Request for Continued Examination
May 14, 2025
Response after Non-Final Action
Jun 10, 2025
Non-Final Rejection — §103
Sep 11, 2025
Response Filed
Sep 30, 2025
Final Rejection — §103
Dec 31, 2025
Request for Continued Examination
Jan 07, 2026
Response after Non-Final Action
Jan 24, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12579276
Application Vulnerability Score Based on Stack Traces
2y 5m to grant Granted Mar 17, 2026
Patent 12580945
SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS
2y 5m to grant Granted Mar 17, 2026
Patent 12568378
SYSTEM AND METHOD FOR VALIDATING AUTHORITY OF DEVICE BASED ON IP ADDRESS
2y 5m to grant Granted Mar 03, 2026
Patent 12567970
METHOD FOR MANAGING A ONE-TIME-PASSWORD
2y 5m to grant Granted Mar 03, 2026
Patent 12566854
METHOD FOR DETECTING MOBILE MALICIOUS APPLICATION BASED ON IMPLEMENTATION FEATURES, RECORDING MEDIUM, AND DEVICE FOR PERFORMING THE METHOD
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

8-9
Expected OA Rounds
58%
Grant Probability
99%
With Interview (+55.7%)
3y 4m
Median Time to Grant
High
PTA Risk
Based on 476 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month