Prosecution Insights
Last updated: April 19, 2026
Application No. 17/606,621

CROSS-CERTIFICATE METHOD AND DEVICE FOR ELECTRIC VEHICLE CHARGING

Non-Final OA §103§112
Filed
Oct 26, 2021
Examiner
CHAO, MICHAEL W
Art Unit
2492
Tech Center
2400 — Computer Networks
Assignee
Myongji University Industry And Academia Cooperation Foundation
OA Round
3 (Non-Final)
70%
Grant Probability
Favorable
3-4
OA Rounds
3y 4m
To Grant
99%
With Interview

Examiner Intelligence

Grants 70% — above average
70%
Career Allow Rate
375 granted / 538 resolved
+11.7% vs TC avg
Strong +41% interview lift
Without
With
+40.8%
Interview Lift
resolved cases with interview
Typical timeline
3y 4m
Avg Prosecution
42 currently pending
Career history
580
Total Applications
across all art units

Statute-Specific Performance

§101
13.9%
-26.1% vs TC avg
§103
43.6%
+3.6% vs TC avg
§102
14.9%
-25.1% vs TC avg
§112
20.4%
-19.6% vs TC avg
Black line = Tech Center average estimate • Based on career data from 538 resolved cases

Office Action

§103 §112
DETAILED ACTION The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 12/03/2025 has been entered. This action is in response to the claims/remarks filed 12/03/2025. Claims 1-3, 5-13, 15-22, 24, and 25 are pending. Claims 1 (a method), 10 (a method), and 20 (a machine) are independent. Claim interpretation: Per MPEP 2111.02(II), “If the body of a claim fully and intrinsically sets forth all of the limitations of the claimed invention, and the preamble merely states, for example, the purpose or intended use of the invention, rather than any distinct definition of any of the claimed invention’s limitations, then the preamble is not considered a limitation and is of no significance to claim construction.” Exemplary claim 1 sets forth a preamble comprising: “A method of validating an electric vehicle supply equipment (EVSE) associated with a charge point operator (CPO) having established a trust relationship with a first root certificate authority (CA), performed by an electric vehicle (EV) to be supplied with electric power from the EVSE and trusting a second root CA, the method comprising”. This preamble appears to be non-limiting as the body of the claim is directed to retrieving and verifying a certificate where the holders of the certificate do not appear material to performance of the claim. Thus, the preambles of independent claims 1, 10, and 20 appear to be non-limiting. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 1-3, 5-13, 15-22, 24, and 25 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Claims 1, 10, and 20 require: “maintained by the EVSE, so as to maintain a length of the certificate chain to be within a predetermined maximum length”. This is ambiguous because (1) the EVSE is not a component of the claimed method/machine; rather, the claim is required to “receive[], from the EVSE” making the EVSE separate from the claimed steps/machine. The structure or functions performed by the EVSE are unclaimed. (2) “so as to maintain a length” is a statement of purpose. It is unclear what is required beyond the utilization of a cross-certificate and what act or structure is required to perform “so as to maintain a length”. It is unclear what the clause “so as to …” requires. Claim 10 requires: “an electric vehicle (EV) trusting a second root CA”. This statement is ambiguous because devices themselves do not “trust” other devices. It is understood that this implicates the possession of a certificate, but possession of a certificate is not what the claim requires. Claims 2-3, 5-9, 11-13, 15-19, 21-22, 24, and 25 are rejected due to there dependency on one of the above independent claims. Response to Arguments Applicant’s arguments, see page 10, filed 12/03/2025, with respect to the rejection(s) of claim(s) 1, 10, and 20 under Katar in view of Vaida have been fully considered and are persuasive. Therefore, the rejection has been withdrawn. However, upon further consideration, a new ground(s) of rejection is made in view of Katar in view of Vaidya and Burr et al. “A Proposed Federal PKI Using X.509 V3 Certificates” (published 1996). Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-3, 5-6, 8-13, 15-16, 18-22, and 24-25 are rejected under 35 U.S.C. 103 as being unpatentable over Katar et al. (U.S. 2015/0189581 A1), hereinafter “Katar”, in view of Vaidya et al. (“Multi-domain Public Key Infrastructure for vehicle-to-Grid Network”, 2015, IEEE), hereinafter “Vaidya”, and Burr et al. “A Proposed Federal PKI Using X.509 V3 Certificates” (published 1996). Referring to claims 1, 20: Katar teaches: A method of validating electric vehicle supply equipment (EVSE) associated with a charge point operator (CPO) (see Katar, fig. 6; [0024] ‘After the matched charging station 106 (e.g., an authentication unit of the matched charging station 106) successfully authenticates and authorizes the electric vehicle 102, the electric vehicle 102 can receive electric power from the matched charging station 106 ...’) having established a trust relationship with a first root certificate authority (CA) performed by an electric vehicle (EV) to be supplied with electric power from the EVSE and trusting a second root CA, the method comprising (see Katar [0045] ‘the root CAs that are authorized to vouch for the legitimacy of the electric vehicle 102.’; [0032] ‘The public key certificate associated with the electric vehicle 102 may be signed by a certificate authority (CA) authorized to issue electric vehicle certificates. The public key certificate associated with the electric vehicle 102 may have one or more attributes that identify the certificate holder (i.e., the electric vehicle 102) as a legitimate electric vehicle. Furthermore, the certificate authority that signed the electric vehicle's certificate may be authorized to vouch for the electric vehicle's identity .... ‘; [0033] ‘The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.’), the method comprising: making a certificate-related request to the EVSE (see Katar, [0019] ‘the association unit 112 of the electric vehicle 102 transmits a request ... to establish a communication line with one of the charging stations 106, 1 08, and 110’); receiving, from the EVSE, a certificate chain of the EVSE including a cross certificate and attached certificate list [i.e. the certificate chain ], and CRLs. The public key certificate associated with the charging station 106 may be signed by a CA authorized to issue charging station certificates…’); and verifying that a last certificate in the certificate chain based on a root CA certificate has been issued and signed by the second root CA (see Katar, [0033] ‘the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110 ....... After the security information is exchanged, subsequent messages transmitted from the electric vehicle 102 to the charging stations 106, 108, and 110 may be signed and/or encrypted ... ‘). Katar suggests the cross-certificate, and the subordinate certificate authority (see Katar, [0045] ‘the root CAs that are authorized to vouch for the legitimacy of the electric vehicle 102.’; [0032] ‘The public key certificate associated with the electric vehicle 102 may be signed by a certificate authority (CA) authorized to issue electric vehicle certificates. The public key certificate associated with the electric vehicle 102 may have one or more attributes that identify the certificate holder (i.e., the electric vehicle 102) as a legitimate electric vehicle. Furthermore, the certificate authority that signed the electric vehicle's certificate may be authorized to vouch for the electric vehicle's identity .... ‘; [0033] ‘The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.’). However, Katar does not disclose: Issued by the second root CA for a first subordinate CA under the first root CA, instead of being issued for the first root CA, and maintained by the EVSE, so as to maintain a length of the certificate chain to be within a predetermined maximum length Vaidya discloses: A method of validating an electric vehicle supply equipment (EVSE) associated with a charge point operator (CPO) having established a trust relationship with a first root certificate authority (CA), performed by an electric vehicle (EV) to be supplied with electric power from the EVSE and trusting a second root CA, the method comprising: (see Vaidya Fig. 2 showing elements of a vehicle charging network and certificate chain thereof. “Each OEM possesses OEM root certificate that is not derived from V2G root certificate.” Vaidya p. 1574) making a certificate-related request to the EVSE; (“Basically V2G system describes a system in which EVs can communicate with the utility and other service providers for various purposes. V2G network, which embraces several stakeholders including charging facility, energy provider, and clearinghouse, would be a key factor to the wide-spread commercialization of EVs as well as to eh extensive deployment of Smart grid technology. To facilitate secure communication in V2G network, use of a Public key infrastructure (PKI) is indispensable that allows authentication, data integrity, and confidentiality [4, 5].” Vaidya p. 1572. “The CA for the EMSP will issue contract certificates to EV for plug-and-charge operation in V2G infrastructure. …. Finally, the end entity can use public verification key of the root CA to authenticate any other entity in the V2G network.” Vaidya p. 1574.) receiving, from the EVSE, (“the end entity can use public verification key of the root CA to authenticate any other entity in the V2G network.” Vaidya p. 1574.) a certificate chain of the EVSE including a cross certificate issued by the second root CA for a and maintained by the EVSE, (“This issue can be addressed by implementing P2P and bridge PKI models, which tend to create a global trust PKI. In [9], P2P PKI model having peer CAs with bidirectional trust relationships is highlighted,” Vaidya p. 1574. “implicit cross-certificates are issued between two CAs” Vaidya p. 1575) so as to maintain a length of the certificate chain to be within a predetermined maximum length; and (“to keep smaller length of certificate chains, the path length constraint of PKI certificate tree is limited to three;” Vaidya p. 1574) verifying that a last certificate in the certificate chain based on a root CA certificate (“Having certification path processing, in which a “chain of certificates” or a certification path between the target certificate and an established trust anchor is established, every certificate within that path is verified. The validation time determines the time for which certificate validation is performed.” Vaidya p. 1577) has been issued and signed by the second root CA. (“Mainly the proposed P2P PKI model can have up to four phases: a) generating self-certified root certificate;” Vaidya p. 1575) It would have been obvious to one of the ordinary skill in the art, before the effective filing date of the claimed invention, to apply the teaching of Vaidya into the system of Katar to use the cross-certificate, and the subordinate certificate authority. Katar teaches "the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.” (see Katar, [0033]). Therefore, Vaidya’s teaching could enhance the system of Katar, because Vaidya discloses “The hierarchical cross-certification model defines trust relationships between CAs inside the same administrative domain, which is the most typical PKI architecture.” (see Vaidya, p. 1573, III ‘Public Key Infrastructure in V2G Network’, 3rd par.) Because Vaida discloses (“implicit cross-certificates are issued between two CAs” Vaidya p. 1575) Katar in view of Vaidya does not explicitly disclose: cross certificate … for first subordinate CA under the first root CA, instead of being issued for the first root CA, Burr discloses: cross certificate … for first subordinate CA under the first root CA, instead of being issued for the first root CA, (Burr discloses a plurality of cross-certifications between subordinate CAs: “Federal CAs may cross-certify each other along paths that do not parallel the hierarchy. OptionalcrossCertificatePairs are shown in Figure 4 as gray double-headed arrows…. Because of the hierarchical cross-certificates, a certification path is guaranteed to exist from her own CA, through the root CA, to every Federal certificate, but there may also be much shorter paths.” Burr § 4) Burr also discloses a path limit: (“number of CAs that may follow in cert. path; 0 indicates that CA may only issue end-entity certs.” Burr Table 1, page 2.) A person of ordinary skill in the art before the effective filing date of the claimed invention would have combined Katar in view of Vaida with Burr by utilizing cross-certification between subordinate CAs (Burr) in addition to, or instead of, cross-certification between root-CAs (Vaida). It would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to combine Katar in view of Vaida with Burr in order to guarantee a validation path from the CA of the validator (EV) to the root CA of the EVSE while potentially providing a ‘much shorter path’, Burr § 4. Thereby, allowing validation between domains and providing acceleration thereof by shortening paths. Referring to claim 10: Katar teaches: A power transfer method performed by an electric vehicle supply equipment (EVSE) associated with a charge point operator (CPO) having established a trust relationship with a first root certificate authority (CA), the power transfer method comprising (see Katar, [0024] ‘After the matched charging station 106 (e.g., an authentication unit of the matched charging station 106) successfully authenticates and authorizes the electric vehicle 102, the electric vehicle 102 can receive electric power from the matched charging station 106 ...’; [0045] ‘the root CAs that are authorized to vouch for the legitimacy of the electric vehicle 102.’; [0032] ‘The public key certificate associated with the electric vehicle 102 may be signed by a certificate authority (CA) authorized to issue electric vehicle certificates. The public key certificate associated with the electric vehicle 102 may have one or more attributes that identify the certificate holder (i.e., the electric vehicle 102) as a legitimate electric vehicle. Furthermore, the certificate authority that signed the electric vehicle's certificate may be authorized to vouch for the electric vehicle's identity .... ‘): receiving a charging request from an electric vehicle (EV) trusting a second root CA (see Katar, [0019] ‘the association unit 112 of the electric vehicle 102 transmits a request ... to establish a communication with one of the charging stations 106, 1 08, and 110’); providing a certificate chain including a cross certificate issued by the second root CA for a subordinate certificate authority under the first root CA and maintained by the EVSE to the EV in response to the charging request (see Katar [0046], ‘ ... the public key certificate associated with the charging station 106 can be an X. 509v3 certificate. The public key certificate can be provided to the electric vehicle 102 as a signed CMS message (e.g., in accordance with RFC 5652) with null content and attached certificate list [i.e. the certificate chain ], and CRLs ....’); receiving a verification result for the certificate chain from the EV when the EV verified that a last certificate in the certificate chain has been signed by the second root CA (see Katar, [0033] ‘the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110 ....... After the security information is exchanged, subsequent messages transmitted from the electric vehicle 102 to the charging stations 106, 108, and 110 may be signed and/or encrypted ... ‘); and supplying electric power to the EV depending on the verification result (see Katar, [0024] ‘After the matched charging station 106 (e.g., an authentication unit of the matched charging station 106) successfully authenticates and authorizes the electric vehicle 102, the electric vehicle 102 can receive electric power from the matched charging station 106 ...’). Katar suggests the cross-certificate, and the subordinate certificate authority (see Katar, [0045] ‘the root CAs that are authorized to vouch for the legitimacy of the electric vehicle 102.’; [0032] ‘The public key certificate associated with the electric vehicle 102 may be signed by a certificate authority (CA) authorized to issue electric vehicle certificates. The public key certificate associated with the electric vehicle 102 may have one or more attributes that identify the certificate holder (i.e., the electric vehicle 102) as a legitimate electric vehicle. Furthermore, the certificate authority that signed the electric vehicle's certificate may be authorized to vouch for the electric vehicle's identity .... ‘; [0033] ‘The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.’). However, Katar does not disclose the term cross-certificate, and the term subordinate certificate authority. However, Katar does not disclose: Issued by the second root CA for a first subordinate CA under the first root CA, instead of being issued for the first root CA, and maintained by the EVSE, so as to maintain a length of the certificate chain to be within a predetermined maximum length Vaidya discloses the cross-certificate, and the subordinate certificate authority (see Vaidya, p.1573, III ‘Public Key Infrastructure in V2G Network’, 3rd par. ‘The hierarchical cross-certification model defines trust relationships between CAs inside the same administrative domain, which is the most typical PKI architecture... And below the root CA, one or more levels of intermediate or subordinate CAs are subsisted …’, 4th par. ‘… In such cross-certifications, root CAs from different PKI domains certify each other, so that any end entities can establish trustworthy paths to the end-entity certificates in remote PKI domains [8].’). In addition, Vaidya further discloses the certificate chain (see Vaidya, p. 1573, section ‘B. V2G PKI’, 5th par. ‘certificate chain’). It would have been obvious to one of the ordinary skill in the art, before the effective filing date of the claimed invention, to apply the teaching of Vaidya into the system of Katar to use the cross-certificate, and the subordinate certificate authority. Katar teaches "the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.” (see Katar, [0033]). Therefore, Vaidyia’s teaching could enhance the system of Katar, because Vaidya discloses “The hierarchical cross-certification model defines trust relationships between CAs inside the same administrative domain, which is the most typical PKI architecture.” (see Vaidya, p. 1573, III ‘Public Key Infrastructure in V2G Network’, 3rd par.) Because Vaida discloses (“implicit cross-certificates are issued between two CAs” Vaidya p. 1575) Katar in view of Vaidya does not explicitly disclose: cross certificate … for first subordinate CA under the first root CA, instead of being issued for the first root CA, Burr discloses: cross certificate … for first subordinate CA under the first root CA, instead of being issued for the first root CA, (Burr discloses a plurality of cross-certifications between subordinate CAs: “Federal CAs may cross-certify each other along paths that do not parallel the hierarchy. OptionalcrossCertificatePairs are shown in Figure 4 as gray double-headed arrows…. Because of the hierarchical cross-certificates, a certification path is guaranteed to exist from her own CA, through the root CA, to every Federal certificate, but there may also be much shorter paths.” Burr § 4) Burr also discloses a path limit: (“number of CAs that may follow in cert. path; 0 indicates that CA may only issue end-entity certs.” Burr Table 1, page 2.) A person of ordinary skill in the art before the effective filing date of the claimed invention would have combined Katar in view of Vaida with Burr by utilizing cross-certification between subordinate CAs (Burr) in addition to, or instead of, cross-certification between root-CAs (Vaida). It would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to combine Katar in view of Vaida with Burr in order to guarantee a validation path from the CA of the validator (EV) to the root CA of the EVSE while potentially providing a ‘much shorter path’, Burr § 4. Thereby, allowing validation between domains and providing acceleration thereof by shortening paths. Referring to claims 2, 21: Katar and Vaidya further disclose: wherein the last certificate in the certificate chain is a cross certificate issued by the second V2G root CA (see Vaidya, p. 1573, III ‘Public Key Infrastructure in V2G Network’, 3rd par. ‘The hierarchical cross-certification model defines trust relationships between CAs inside the same administrative domain, which is the most typical PKI architecture.’). It would have been obvious to one of the ordinary skill in the art, before the effective filing date of the claimed invention, to apply the teaching of Vaidya into the system of Katar to use the cross-certificate. Katar teaches "the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.” (see Katar, [0033]). Therefore, Vaidya’s teaching could enhance the system of Katar, because Vaidya discloses “The hierarchical cross-certification model defines trust relationships between CAs inside the same administrative domain, which is the most typical PKI architecture.” (see Vaidya, p. 1573, III ‘Public Key Infrastructure in V2G Network’, 3rd par.) Referring to claims 3, 13, 22: Katar and Vaidya further disclose: wherein a public key in the cross certificate coincides with a public key corresponding to a private key used to issue the last certificate excluding the cross certificate in the certificate chain (see Katar, [0091] ‘…attached certificate list [i.e. the certificate chain ], and CRLs ....’. And, Vaidya, p. 1573, section ‘B. V2G PKI’, 2nd par. ‘private/public keys’). It would have been obvious to one of the ordinary skill in the art, before the effective filing date of the claimed invention, to apply the teaching of Vaidya into the system of Katar to use private/public keys. Katar teaches "the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.” (see Katar, [0033]). Therefore, Vaidya’s teaching could enhance the system of Katar, because Vaidya discloses “V2G PKI is built on X.509 standard to provide appropriate management of X.509 certificates and corresponding private/public keys [10].” (see Vaidya, p. 1573, section ‘B. V2G PKI’, 2nd par.) Referring to claims 5, 15, 24: Katar and Vaidya further disclose: wherein the second V2G root CA directly issues the cross certificate for the subordinate certificate authority (see Katar, [0032] ‘a certificate authority (CA) authorized to issue electric vehicle certificates.’). Referring to claims 6, 16. 25: Katar and Vaidya further disclose: wherein the second V2G root CA issues the cross certificate for the subordinate certificate authority via a cross certification intermediating device (see Katar, [0032] ‘a certificate authority (CA)’; [0025] ‘a network device’). Referring to claims 8, 18: Katar and Vaidya further disclose: wherein a public key and an identification (ID) in a certificate issued by the first V2G root CA are signed by using a private key corresponding to the cross certificate (see Katar, [0032] ‘a certificate authority (CA)’ ‘identify the certificate holder’. And, Vaidya, p. 1573, section ‘B. V2G PKI’, 2nd par. ‘private/public keys’). It would have been obvious to one of the ordinary skill in the art, before the effective filing date of the claimed invention, to apply the teaching of Vaidya into the system of Katar to use private/public keys. Katar teaches "the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.” (see Katar, [0033]). Therefore, Vaidya’s teaching could enhance the system of Katar, because Vaidya discloses “V2G PKI is built on X.509 standard to provide appropriate management of X.509 certificates and corresponding private/public keys [10].” (see Vaidya, p. 1573, section ‘B. V2G PKI’, 2nd par.) Referring to claims 9, 19: Katar and Vaidya further disclose: wherein a public key and an identification (ID) in a CPO subordinate CA certificate are signed by using a private key corresponding to the cross certificate (see Katar, [0032] ‘The public key certificate associated with the electric vehicle 102 may have one or more attributes that identify the certificate holder’). Referring to claimd 11-12: Katar and Vaidya further disclose: the certificate chain, the cross certificate, the second V2G root CA (see Katar, [0091], ‘ ... attached certificate list [i.e. the certificate chain ], and CRLs ....’. And, see Vaidya, p. 1573, III ‘Public Key Infrastructure in V2G Network’, 3rd par. ‘The hierarchical cross-certification model defines trust relationships between CAs inside the same administrative domain, which is the most typical PKI architecture.’). It would have been obvious to one of the ordinary skill in the art, before the effective filing date of the claimed invention, to apply the teaching of Vaidya into the system of Katar to use the cross-certificate, the second V2G root CA. Katar teaches "the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.” (see Katar, [0033]). Therefore, Vaidyia’s teaching could enhance the system of Katar, because Vaidya discloses “The hierarchical cross-certification model defines trust relationships between CAs inside the same administrative domain, which is the most typical PKI architecture.” (see Vaidya, p. 1573, III ‘Public Key Infrastructure in V2G Network’, 3rd par.) Claim 7 is rejected under 35 U.S.C. 103 as being unpatentable over Katar et al. (U.S. 2015/0189581 A1), in view of Vaidya et al. (“Multi-domain Public Key Infrastructure for vehicle-to-Grid Network”, 2015, IEEE), Burr et al. “A Proposed Federal PKI Using X.509 V3 Certificates” (published 1996) and Liu et al. (U.S. 2011/0154027 A1), hereinafter “Liu”. Referring to claim 7: Katar in view of Vaidya and Burr disclose all the limitations in claims 1 and 2. They further disclose the expiration of the certificate (see Vaidya, p. 1575, section ‘B. Peer-to-Peer PKI Model for V2G Network’, Table I, ‘SN Certificate Serial Number’, ‘Te Validity period’). However, they do not disclose the different between the expiration date of one certificate and the expiration date another certificate. Liu discloses the different between the expiration date of one certificate and the expiration date another certificate (see Liu, [0066] ‘…the first and second digital certificates… The difference between the first expiration date and the second expiration date’) It would have been obvious to one of the ordinary skill in the art, before the effective filing date of the claimed invention, to apply the teaching of Liu into the system of Katar to check the expiration date of a digital certificate. Katar teaches "the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.” (see Katar, [0033]). Therefore, Liu’s teaching could enhance the system of Katar, because Liu discloses “the user is able to replace the original digital certificates with renewed certificates” (see Liu, [0066]) Claim 17 is rejected under 35 U.S.C. 103 as being unpatentable over Katar et al. (U.S. 2015/0189581 A1), in view of Vaidya et al. (“Multi-domain Public Key Infrastructure for vehicle-to-Grid Network”, 2015, IEEE), Burr et al. “A Proposed Federal PKI Using X.509 V3 Certificates” (published 1996) and Bao et al. (“A Threat analysis of the vehicle-to-grid charging protocol ISO 15118”, Computer Science – Research and Development, 33, 3-12 (2018), hereinafter “Bao”. Referring to claim 17: Katar in view of Vaidya and Burr disclose all the limitations in claim 10. However, they do not disclose TLS handshake operation, a Serverhello message. Bao discloses or suggests the TLS handshake operation, a Serverhello message (see Bao, section “5.5.4 Time synchronization”, 1st par. “TLS certificates”). It would have been obvious to one of the ordinary skill in the art, before the effective filing date of the claimed invention, to apply the teaching of Bao into the system of Katar to use TLS handshake operation, a Serverhello message. Katar teaches "the electric vehicle 102 can verify the attributes indicated in the public key certificate to validate the charging station 106 that transmitted the public key certificate. The electric vehicle 102 can keep track of public keys for the root CAs that are authorized to vouch for the legitimacy of the charging stations 106, 108, and 110.” (see Katar, [0033]). Therefore, Bao’s teaching could enhance the system of Katar, because Bao discloses “The communication session is further secured through the application of Transport Layer Security (TLS) with unilateral authentication, where the EVCC checks the authenticity of the SECC. Authenticity of the EV is guaranteed by a digital signature scheme.” (see Bao, p. 9, 1st par.) Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. See PTO-892, particularly: Metke et al., US 2010/0082975, discloses organization path length validation within PKI Epstein et al., US 2009/0210703, disclosing binding digital certificates to multiple trust domains. Any inquiry concerning this communication or earlier communications from the examiner should be directed to MICHAEL W CHAO whose telephone number is (571)272-5165. The examiner can normally be reached M, W-F 8-5. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Rupal Dharia can be reached at (571) 272-3880. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /MICHAEL W CHAO/ Primary Examiner, Art Unit 2492
Read full office action

Prosecution Timeline

Oct 26, 2021
Application Filed
Jun 22, 2023
Response after Non-Final Action
Jul 26, 2023
Non-Final Rejection — §103, §112
Nov 01, 2023
Response Filed
Jan 10, 2024
Final Rejection — §103, §112
Mar 18, 2024
Response after Non-Final Action
May 20, 2024
Notice of Allowance
May 20, 2024
Response after Non-Final Action
Jun 14, 2024
Response after Non-Final Action
Jul 22, 2024
Response after Non-Final Action
Aug 01, 2024
Response after Non-Final Action
Oct 31, 2024
Response after Non-Final Action
Jan 06, 2025
Response after Non-Final Action
Jan 06, 2025
Response after Non-Final Action
Jan 07, 2025
Response after Non-Final Action
Jan 07, 2025
Response after Non-Final Action
Oct 02, 2025
Response after Non-Final Action
Dec 03, 2025
Request for Continued Examination
Dec 16, 2025
Response after Non-Final Action
Mar 06, 2026
Non-Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12604183
SECURE MESSAGING FOR OUTAGE EVENTS
2y 5m to grant Granted Apr 14, 2026
Patent 12592816
COMMUNICATION DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE, AND METHOD EXECUTED BY COMMUNICATION DEVICE FOR AUTHENTICATION
2y 5m to grant Granted Mar 31, 2026
Patent 12581289
METHOD AND DEVICE FOR AUTHENTICATING A MOTOR VEHICLE AT A HYDROGEN FUEL PUMP
2y 5m to grant Granted Mar 17, 2026
Patent 12574736
Detecting and Mitigating Drive-by Home Wi-Fi Hijack Attacks
2y 5m to grant Granted Mar 10, 2026
Patent 12531839
TECHNIQUES FOR SECURELY COMMUNICATING SENSITIVE DATA FOR DISPARATE DATA MESSAGES
2y 5m to grant Granted Jan 20, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
70%
Grant Probability
99%
With Interview (+40.8%)
3y 4m
Median Time to Grant
High
PTA Risk
Based on 538 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month