DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Information Disclosure Statement
The information disclosure statement (IDS) submitted on September 25, 2025 is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner.
Response to Amendment
The amendment filed December 11, 2025 has been entered. Claims 1-12, 14 and 16-22 remain pending in the instant application. Applicant’s amendments to the Claims have overcome each and every objection previously set forth in the Non-Final Office Action mailed September 15, 2025.
Response to Arguments
Applicant’s arguments with respect to claim(s) 1-12, 14, and 16-22 have been considered but are moot because the new ground of rejection, necessitated by Applicant’s amendment, does not rely on any reference applied in the prior rejection of record for any teaching or matter specifically challenged in the argument.
Specification
The title of the invention is not descriptive. A new title is required that is clearly indicative of the invention to which the claims are directed.
The following title is suggested: Method, Medium, and System for Simulating Sensor Data to Test Autonomous Vehicles.
Claim Rejections - 35 USC § 112
The following is a quotation of 35 U.S.C. 112(b):
(b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.
The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph:
The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention.
Claims 1-12, 14, and 16-22 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention.
Regarding Claim 1, the claim recites “a sum of predetermined exposure time and predetermined processing time; or a sum of the exposure time of the original data [and] the predetermined processing time.” The terms “the exposure time of the original data” and “the predetermined processing time” lack antecedent basis. If these terms are intended to refer to the “predetermined exposure time” and “predetermined processing time,” respectively, which are recited previously in the claim, the Examiner notes the use of “or,” and the time delay may be interpreted to not comprise the predetermined exposure time or processing time. Furthermore, regarding the limitation “the exposure time of the original data,” this limitation is unclear as to whether it refers to a “predetermined exposure time” or another exposure time. For the purposes of compact prosecution, “a sum of the exposure time of the original data […] and the predetermined processing time” will be interpreted as “a sum of an exposure time […] and a predetermined processing time.”
Regarding Claims 2-12, 14, and 16-18, the claims require the limitations of Claim 1, on which these claims depend, and the claims are rejected under 35 U.S.C 112(b) for the same reasons.
Regarding Claims 19 and 20, the same rejected to language as in Claim 1, and the claims are rejected under 35 U.S.C 112(b) for the same reasons.
Regarding Claims 21 and 22, the claims require the limitations of Claim 1, on which these claims depend, and the claims are rejected under 35 U.S.C 112(b) for the same reasons.
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows:
1. Determining the scope and contents of the prior art.
2. Ascertaining the differences between the prior art and the claims at issue.
3. Resolving the level of ordinary skill in the pertinent art.
4. Considering objective evidence present in the application indicating obviousness or nonobviousness.
This application currently names joint inventors. In considering patentability of the claims the examiner presumes that the subject matter of the various claims was commonly owned as of the effective filing date of the claimed invention(s) absent any evidence to the contrary. Applicant is advised of the obligation under 37 CFR 1.56 to point out the inventor and effective filing dates of each claim that was not commonly owned as of the effective filing date of the later invention in order for the examiner to consider the applicability of 35 U.S.C. 102(b)(2)(C) for any potential 35 U.S.C. 102(a)(2) prior art against the later invention.
Claim(s) 1, 5, 10-12, 14, and 16-22 is/are rejected under 35 U.S.C. 103 as being unpatentable over Chen et al. (U.S. Pub. No. 2017/0169623 A1), hereinafter Chen, in view of Li (Chinese Pub. No. CN110780608A), hereinafter Li, further in view of Brahmi et al. (Brahmi, Mohamed, Kai Schueler, Sayed Bouzouraa, Markus Maurer, Karl-Heinz Siedersberger, and Ulrich Hofmann. "Timestamping and latency analysis for multi-sensor perception systems." In SENSORS, 2013 IEEE, pp. 1-4. IEEE, 2013.), hereinafter Brahmi.
Regarding Claim 1, Chen teaches a method for a simulation test (“The present invention relates generally to an apparatus, method, and system for providing real-time data to a hardware-in-the-loop simulator for an automotive vehicle system.”) (e.g., paragraph [0002]).
comprising: retrieving, by a first computing device, data in a first format for a first sensor from a database (“With reference now to FIG. 6, the operation of the simulation data server 18 is shown,” wherein the simulation data server 18 is interpreted as a first computing device. “After initiation of the simulation data server 18 at step 80, step 80 proceeds to step 82 where the CPU 66 controls the network interface 60 under program control to receive the sensor data from the World Wide Web 16.” Receiving sensor data form the World Wide Web is interpreted as comprising retrieving data form a database.) (e.g., paragraph [0036]).
processing, by the first computing device, the data in the first format to obtain corresponding data in a second format, the second format being a format of data collection of the first sensor (“This data, furthermore, may be received in single packets or groups of packets which are processed simultaneously […] After the data packets are received from the internet at step 82, the CPU 66 stores the sensor data in a cache at step 84.” The data packets comprise sensor data, wherein reconstructing the sensor data from packets is interpreted as processing the data.) (e.g., paragraphs [0036] and [0037]).
and transmitting, by the first computing device, the data in the second format to a second computing device and performing, by the second computing device, a simulation test based on the data in the second format (“Step 84 then proceeds to step 86 where the processor 66 sends the sensor data to the local area network 22 […] The operation of the [Hardware in the loop (HIL)] simulation interface 26 is shown. The program first starts at step 110 which then proceeds to step 112. At step 112, the processor 90 controls the network interface 98 to receive sensor data from the simulation data server 18 through the local area network 22.” The HIL simulation interface is interpreted as a second computing device performing a simulation test.) (e.g., paragraphs [0037] and [0040]).
However, Chen does not appear to specifically teach wherein the transmitting the data in the second format to the second computing device comprises: determining a corrected timestamp of the data in the second format based on a time delay and a triggering timestamp of original data corresponding to the second format; transmitting, by the first computing device, the data in the second format to the second computing device at a predetermined period or frequency based on the corrected timestamp of the data in the second format; wherein the time delay represents an additional time delay before sending the data and the time delay comprises: a sum of predetermined exposure time and predetermined processing time; or a sum of the exposure time of the original data corresponding to the data in the second format and the predetermined processing time.
On the other hand, Li, which relates similarly as a simulation method and test, does teach wherein the transmitting the data in the second format to the second computing device comprises: determining a corrected timestamp of the data in the second format based on a time delay and a triggering timestamp of original data corresponding to the second format (“for each of the original format data, the data frame after the initial data frame of the original format data is sequentially passed through the corresponding interface through the field programmable logic gate array according to the data frame interval period of the original format data.” The data frame interval is a time delay, and the initial data frame comprises the triggering timestamp. The timestamp for the second data frame is a corrected timestamp, wherein the timestamp for the second data frame is one interval after the initial data frame.) (e.g., paragraph [0057]).
transmitting, by the first computing device, the data in the second format to the second computing device at a predetermined period or frequency based on the corrected timestamp of the data in the second format (“the original format data of the time stamp is input to the control device of the driverless car through a corresponding interface for a simulation test. Through the above preset output mode, the execution subject can precisely control the data output frequency.”) (e.g., paragraphs [0061] and [0062]).
However, neither Chen nor Li teaches wherein the time delay represents an additional time delay before sending the data and the time delay comprises: a sum of predetermined exposure time and predetermined processing time; or a sum of the exposure time of the original data corresponding to the data in the second format and the predetermined processing time.
On the other hand, Brahmi, which relates similarly to analyzing sensor data for driver assistance systems, does teach wherein the time delay represents an additional time delay before sending the data and the time delay comprises: a sum of predetermined exposure time and predetermined processing time; or a sum of the exposure time of the original data corresponding to the data in the second format and the predetermined processing time (“The real measurement timestamp or true sampling timestamp of sensor data Ai is denoted by tAi and the arrival time at the acquisition framework by t’Ai. Whereby, depending on the sensor, the measurement timestamp corresponds to the begin of the measurement tbegin or [equation (1)] where d denotes the duration of the measurement. The delay [Δ τi, given by equation (2)] is called measurement latency. According to [5] and [3] this is caused by the raw measurement acquisition time [and] pre-processing time.” The raw measurement acquisition time is interpreted as an exposure time.) (e.g., page 1, column 2, paragraph 3 to page 2, column 1, first paragraph).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the Applicant's claimed invention to combine Chen with Li. Chen teaches a method for providing data to a hardware-in-the-loop simulator. However, Chen does not appear to specifically teach a method wherein the data comprises GNSS sensor data, the data comprises timestamp information, or the data is reverse processed. On the other hand, Li does teach a method wherein the data comprises GNSS sensor data, the data comprises timestamp information, and the data is reverse processed. Both Chen and Li relate to a simulation test method and device for automotive vehicles. Furthermore, while Chen does not specifically disclose using GPS data, Chen does disclose using other real-time sensor data (e.g., Chen; figure 1); one of ordinary skill in the art would have recognized that other real-time sensor data comprises GPS data, and timestamp information associated with the sensor data could be used to locate a vehicle at a specific time. While Chen does not specifically disclose reverse processing the sensor data after transmission, Chen does disclose acquiring sensor data in packets (e.g., Chen; paragraph [0036]), and one of ordinary skill in the art would have recognized that reverse processing the packets would have been necessary to acquire the original sensor data. Therefore, it would have been obvious to a person of ordinary skill in the art prior to the effective filing date of the Applicant’s claimed invention to combine Chen with Li in order to provide an improved automotive simulation and test.
It would have been obvious to one of ordinary skill in the art before the effective filing date of the Applicant's claimed invention to combine the modified reference of Chen in view of Li with Brahmi. Chen in view of Li teaches a method for providing data to a HIL simulator by transmitting data in a second format based on a corrected timestamp. However, the Chen-Li combination does not appear to specifically teach wherein the corrected timestamp is based on a time delay that is a sum of an exposure time and a processing time. On the other hand, Brahmi, which relates similarly to determining correct timestamps for sensor measurements in driver assistance systems, does teach a corrected timestamp based on a time delay that is a sum of a processing time and exposure time. Furthermore, Brahmi discloses that multi-sensor data fusion requires exact measurement timestamps, as measurement deviations between sensors and a ground-truth system may be erroneously interpreted as the sensors having bad accuracy (e.g., Brahmi; page 1, column 1, paragraph 2). As both Chen and Li relate to testing sensors for autonomous vehicles, one of ordinary skill in the art would have been motivated to use the timestamp correction of Brahmi in the sensor data simulation of Chen and Li, and the results of the combination would have been predictable. Therefore, it would have been obvious to a person of ordinary skill in the art prior to the effective filing date of the Applicant’s claimed invention to combine the modified reference of Chen in view of Li with Brahmi in order to more accurately model data from multiple sensors.
Regarding Claim 5, Chen in view of Li and Brahmi teaches the method of claim 1. Chen further teaches wherein the processing the data in the first format to obtain the corresponding data in the second format comprises: processing, by the first computing device, the data in the first format in accordance with a network transmission protocol corresponding to a type of the first sensor, to obtain the corresponding data in the second format (Figure 1 discloses transmitting sensor data across a 4G cellphone network and receiving the data in the simulation data server, wherein the transmitting is interpreted as processing the data in the first format according to a network transmission protocol, and the data received by the simulation data server corresponds to a second format.) (e.g., figure 1).
Regarding Claim 10, Chen in view of Li and Brahmi teaches the method of claim 5. Chen further teaches the method wherein the network transmission protocol comprises a Transmission Control Protocol (TCP) (“At step 50, the processor packs the sensor data from the various vehicle sensors into data packets with one packet representing the data from a single sensor. Although any conventional type of data packing may be employed, conventionally the data backet includes a start byte and ending byte for the data packet. An identification byte or bytes follow the start byte to identify the sensor and optionally the number of data bytes associated with that sensor.” The disclosed packet method is interpreted as a TCP.) (e.g., paragraph [0030]).
Li further teaches wherein the first sensor comprises a Global Navigation Satellite System (GNSS) sensor (The sensor data is used to characterize the environmental information of the driverless car during driving, including but not limited to […] GPS (Global Positioning System), GPS) data.”) (e.g., paragraph [0043]).
the data in the first format comprises stored GNSS data (“The sensor data may be a sensor data set stored in an execution subject (such as a server in FIG. 1).”) (e.g., paragraph [0044]).
Regarding Claim 11, Chen in view of Li and Brahmi teaches the method of claim 10. Li further teaches the method wherein the processing the data in the first format to obtain the corresponding data in the second format comprises: decoding, by the first computing device, the stored GNSS data to form GNSS information data (“For each sensor data in the sensor data set, the field programmable logic gate array is used to convert the sensor data into the original format to obtain the original format data corresponding to the sensor data.” Converting the sensor data, the sensor data comprising the GPS data, is interpreted as decoding the stored GPS data.) (e.g., paragraph [0047]).
Chen further teaches the method wherein encoding, by the first computing device, the GNSS information data to form one or more GNSS network data packets corresponding to the GNSS sensor (“At step 50, the processor packs the sensor data from the various vehicle sensors into data packets with one packet representing the data from a single sensor. Although any conventional type of data packing may be employed, conventionally the data backet includes a start byte and ending byte for the data packet. An identification byte or bytes follow the start byte to identify the sensor and optionally the number of data bytes associated with that sensor.” The disclosed method may be used on GPS data.) (e.g., paragraph [0030]).
the one or more GNSS network data packets obtained as one or more original GNSS data packets conforming to the TCP (“This data, furthermore, may be received in single packets or groups of packets which are processed simultaneously […] After the data packets are received from the internet at step 82, the CPU 66 stores the sensor data in a cache at step 84.” Receiving packets or groups of packets is interpreted as obtaining packets conforming to a TCP.) (e.g., paragraphs [0036] and [0037]).
Regarding Claim 12, Chen in view of Li and Brahmi teaches the method of claim 1. Chen further teaches wherein said transmitting the data in the second format to the second computing device comprises: transmitting, by the first computing device, the data in the second format to the second computing device via a simulated data transmission line between the first sensor and the second computing device (“Consequently, the HIL test I/O interface 108 controls all of the input and output to the circuit 24 under test under control of the processor 90. The processor in turn receives sensor data from the local area network 22 through the network interface 98 [...] A step 116, the processor 90 receives data from the circuit 24 under test through the HIL test I/O interface 108. This data may be either input data from the circuit 24 under test or output data to the circuit 24 under test.” The HIL test I/O interface is interpreted as a simulated data transmission line.) (e.g., paragraphs [0039] and [0041]).
and wherein the simulated data transmission line is a network bus between any one of the first sensor and additional first sensors and the second computing device (“The simulation data server 18 includes […] a second network interface 64 which communicates between the bus 62 and the local area network 22 […] The HIL simulation interface 26 also includes an HIL test I/O interface 108 which interconnects the bus 96 with the circuit 24 under test. Consequently, the HIL test I/O interface 108 controls all of the input and output to the circuit 24 under test under control of the processor 90.”) (e.g., paragraphs [0034] and [0039]).
or the simulated data transmission line is a network bus having a median length among a plurality of network buses that are between the respective ones of the first sensor and the additional first sensors and the second computing device (The Examiner notes the use of or, and the prior art provides a network bus, above.)
Regarding Claim 14, Chen in view of Li and Brahmi teaches the method of claim 1. Li further teaches the method wherein the corrected timestamp is a sum of the triggering timestamp of the data in the second format and the time delay (“for each of the original format data, the data frame after the initial data frame of the original format data is sequentially passed through the corresponding interface through the field programmable logic gate array according to the data frame interval period of the original format data.” The data frame interval is a time delay, and the initial data frame comprises the triggering timestamp. The timestamp for the second data frame is a corrected timestamp, wherein the timestamp for the second data frame is the sum of the timestamp of the initial data frame plus one interval delay.) (e.g., paragraph [0057]).
Regarding Claim 16, Chen in view of Li and Brahmi teaches the method of claim 1. Chen further teaches the method wherein performing, by the second computing device, the simulated test based on the data in the second format comprises (“At step 118, the processor 90 executes a mathematical model of the plant under control by the circuit 24 stored in the computer memory using data received from the test vehicle 12 through the local area network 22 as well as data from the circuit 24 under test through the HIL test interface 108.”) (e.g., paragraph [0042]).
and performing, by the second computing device, the simulation test (“At step 118, the processor 90 executes a mathematical model of the plant under control by the circuit 24 stored in the computer memory using data received from the test vehicle 12 through the local area network 22 as well as data from the circuit 24 under test through the HIL test interface 108.”) (e.g., paragraph [0042]).
Li further teaches performing, by the computing device reverse processing on the received data in the second format for the first sensor to obtain the corresponding data in the first format (“For each sensor data in the sensor data set, the field programmable logic gate array is used to convert the sensor data into the original format to obtain the original format data corresponding to the sensor data.” Converting the sensor data into the original format is interpreted as reverse processing.) (e.g., paragraph [0047]).
and performing the simulation test based on the data in the first format for the first sensor as obtained from the reverse processing (“In step 203, the field programmable logic gate array is used to input the original format data into the control device of the driverless car through a corresponding interface by using a preset output mode for a simulation test.”) (e.g., paragraph [0050]).
Regarding Claim 17, Chen in view of Li and Brahmi teaches the method of claim 16. Li further teaches the method wherein the performing the simulation test based on the data in the first format of the first sensor as obtained from the reverse processing comprises: retrieving, by the second computing device, the data in the first format for a second sensor from the database (“For each sensor data in the sensor data set, the field programmable logic gate array is used to convert the sensor data into the original format to obtain the original format data corresponding to the sensor data.”) (e.g., paragraph [0047]).
Chen further teaches the method comprising performing, by the second computing device, the simulation test based on the data in the first format for the second sensor from the database in combination with the data in the first format for the first sensor as obtained from the reverse processing (“At step 118, the processor 90 executes a mathematical model of the plant under control by the circuit 24 stored in the computer memory using data received from the test vehicle 12 through the local area network 22 as well as data from the circuit 24 under test through the HIL test interface 108.”) (e.g., paragraph [0042]).
Regarding Claim 18, Chen in view of Li and Brahmi teaches the method of claim 17. Chen further teaches the method wherein the first sensor is a sensor having a known transmission protocol (“At step 50, the processor packs the sensor data from the various vehicle sensors into data packets with one packet representing the data from a single sensor. Although any conventional type of data packing may be employed, conventionally the data backet includes a start byte and ending byte for the data packet. An identification byte or bytes follow the start byte to identify the sensor and optionally the number of data bytes associated with that sensor.” The conventional data packing is interpreted as a known transmission protocol.) (e.g., paragraph [0030]).
and the second sensor is a sensor having an unknown transmission protocol (“At step 112, the processor 90 controls the network interface 98 to receive sensor data from the simulation data server 18 through the local area network 22.” As the processor controls the network interface, the transmission protocol of the sensor data is interpreted as unknown to the network interface.) (e.g., paragraph [0040]).
Regarding Claim 19, Chen teaches a non-transitory computer readable storage medium, comprising a program or instructions which, when executed on a computer, cause the computer to perform a method for simulation test (“Figure 3 discloses the simulation data server 18 with a CPU connected to a memory, wherein the memory is interpreted as comprising program instructions.”) (e.g., figure 3).
The remaining limitations of Claim 19 are substantially similar to Claim 1, and the claim is rejected under 35 U.S.C 103 for the same reasons.
Regarding Claim 20, Chen teaches A computing device comprising a memory and one or more processors communicatively connected to the memory, wherein the memory stores instructions executable by the one or more processors, the instructions, when executed by the one or more processors, causing the one or more processors to perform the method for simulation test (“Figure 3 discloses the simulation data server 18 with a CPU connected to a memory, wherein the memory is interpreted as comprising program instructions.”) (e.g., figure 3).
The remaining limitations of Claim 20 are substantially similar to Claim 1, and the claims are rejected under 35 U.S.C 103 for the same reasons.
Regarding Claim 21, Chen in view of Li and Brahmi teaches The method of claim 1. Li further teaches wherein the time delay is determined based on at least one of exposure time or processing time of the original data corresponding to the data in the second format (The Examiner notes the use of or, and the prior art provides a processing time. “For example, in order to verify the response speed of the control device in the driverless car, the output period of the sensor data can be compressed, and the response speed of the control device can be tested by shortening the response time of the control device.” The output period of the sensor data is interpreted as a time delay, wherein compressing the output period is interpreted as compressing a processing time.) (e.g., paragraph [0053]).
Regarding Claim 22, Chen in view of Li and Brahmi teaches The method of claim 1. Chen further teaches wherein retrieving data in the first format for the first sensor from the database comprises: receiving, by the first computing device, a data switching instruction which indicates switching from retrieving a first data segment to retrieving a second data segment (“[C]onventionally the data packet includes a start byte and ending byte for the data packet […] After initiation of the simulation data server 18 at step 80, step 80 proceeds to step 82 where the CPU 66 controls the network interface 60 under program control to receive the sensor data from the World Wide Web 16. This data, furthermore, may be received in single packets or groups of packets which are processed simultaneously.” An end data byte followed by a start data byte for another packet is interpreted as a data switching instruction, wherein the first packet is a first data segment and the second packet is a second data segment.) (e.g., paragraphs [0030] and [0036]).
and retrieving, by the first computing device, the second data segment from a storage location of sensor data in the database in response to the data switching instruction (“the CPU 66 controls the network interface 60 under program control to receive the sensor data from the World Wide Web 16. This data, furthermore, may be received in single packets or groups of packets which are processed simultaneously.” The World Wide Web is interpreted as comprising a database for sensor data.) (e.g., paragraph [0036]).
Claim(s) 2-4 is/are rejected under 35 U.S.C. 103 as being unpatentable over Chen in view of Li and Brahmi, further in view of IEEE ("IEEE Standards for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks-Specific requirements-Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications," in IEEE Std 802.3, 1998 Edition , vol., no., pp.1-1262, 28 Sept. 1998, doi: 10.1109/IEEESTD.1998.88276.), hereinafter IEEE.
Regarding Claim 2, Chen in view of Li and Brahmi teaches the method of claim 1. Chen further teaches wherein the retrieving the data in the first format for the first sensor from the database comprises […] retrieving, by the first computing device, the data in the first format according to the data control instruction from a storage location of sensor data in the database (“After initiation of the simulation data server 18 at step 80, step 80 proceeds to step 82 where the CPU 66 controls the network interface 60 under program control to receive the sensor data from the World Wide Web 16.” The World Wide Web is interpreted as comprising a database with a storage location for sensor data.) (e.g., paragraph [0036]).
However, neither Chen nor Li nor Brahmi appear to specifically teach the method comprising receiving, by the first computing device, a data control instruction.
On the other hand, IEEE, which provides the 802.3 standard for ethernet, does teach receiving, by the first computing device, a data control instruction (“The [Media access control [MAC] frame structure] clause defines in detail the frame structure for data communication systems using the CSMA/CD_MAC. It defines the syntax and semantics of the various components of the MAC frame.” The MAC frame is interpreted as comprising a data control instruction.) (e.g., page 36, paragraph 1).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the Applicant's claimed invention to combine the modified reference of Chen in view of Li with IEEE. The claimed invention is considered to be merely combining prior art elements according to known methods to yield predictable results, see MPEP § 2143(I)(A). Chen teaches a method for providing data to a hardware-in-the-loop-simulator. However, Chen does not appear to specifically teach the method for providing data comprising a data control instruction. On the other hand, IEEE does teach a method for data transmission comprising a data control instruction. The only difference between the claimed invention and the prior art is a lack of actual combination of the elements into a single prior art reference. Furthermore, Chen discloses the use of a 4G cellphone network (e.g., Chen; figure 1), and IEEE is the 1998 standard for local and metropolitan area networks (e.g., IEEE; page iii, paragraph 1). The standards provided in IEEE were disclosed prior to the widespread adoption of 4G cellphone networks. Thus, the data transmission protocols and methods used in IEEE would have been well known in the art prior to the Applicant’s claimed invention; one of ordinary skill in the art could have combined the elements as claimed by known methods to produce predictable results, and one of ordinary skill in the art would have clearly recognized the results of the combination as predictable. Therefore, it would have been obvious to a person of ordinary skill in the art prior to the effective filing date of the Applicant’s claimed invention to combine Chen with IEEE in order to comply with well-known standards for network communication.
Regarding Claim 3, Chen in view of Li, Brahmi, and IEEE teaches the method of claim 2. IEEE further teaches the method wherein the data control instruction comprises at least one of a target data name, a target data identity, or a target time period (The examiner notes the use of at least one of, and the prior art provides a target data identity. “Figure 3-1 shows the nine fields of a frame: […] the addresses of the frame's source and destination,” wherein the addresses are interpreted as a target data identity.) (e.g., page 36, paragraph 2).
Regarding Claim 4, Chen in view of Li, Brahmi, and IEEE teaches the method of claim 2. IEEE further teaches wherein the data control instruction comprises a start control instruction (“The receiveDataValid signal is the indication to the MAC that the frame reception process should begin,” wherein the receiveDataValid signal is interpreted as a start control instruction.) (e.g., page 59, paragraph 1).
and a pause control instruction (Table 31A-1 discloses a PAUSE control that “Requests that the recipient stop transmitting non-control frames for a period of time indicated by the parameters of this function.”) (e.g., page 1205, table 31A-1).
and the retrieving the data in the first format corresponding to the data control instruction from the storage location of the sensor data in the database comprises: in response to receiving the pause control instruction, pausing, by the first computing device, the retrieving of the data in the first format, and entering a data-not-retrieved state (Table 31A-2 discloses a pause_status, wherein a pause_status of paused “indicates that the PAUSE function is inhibiting transmission of data frames by the MAC client,” wherein the paused state is analogous to a data-not-retrieved state.) (e.g., page 1205, table 31A-2).
and in response to receiving the start control instruction, resuming, by the first computing device, the retrieving of the data in the first format from the storage location of the sensor data in the database, and entering a data-retrieved state (Table 31A-2 discloses a pause_status, wherein a pause_status of not_paused “indicates that the PAUSE function is not inhibiting transmission of data frames by the MAC client,” wherein the not_paused state is analogous to a data-retrieved state.) (e.g., page 1205, table 31A-2).
Claim(s) 6 and 7, is/are rejected under 35 U.S.C. 103 as being unpatentable over Chen in view of Li, Brahmi, and IEEE, further in view of Rahman (Rahman, K. M. "A low complexity image compression algorithm for Bayer color filter array." PhD diss., University of Saskatchewan, 2018.), hereinafter Rahman.
Regarding Claim 6, Chen in view of Li and Brahmi teaches the method of claim 5. Chen further teaches wherein the first sensor comprises an image capturing device (Figure 1 discloses a real-time stereo camera sensor.) (e.g., figure 1).
However, neither Chen nor Li nor Brahmi appear to specifically teach the method wherein the data in the first format comprises compressed image data, and the network transmission protocol comprises a Gigabit Ethernet based image transmission standard protocol.
On the other hand, Rahman, which relates to image compression using a Bayer filter array, does teach a method wherein the data in the first format comprises compressed image data (“Considering the huge number of image applications, the corresponding raw data requires huge storage capacity. For images to be stored or transmitted, they must be compressed.”) (e.g., page 1 paragraph 1).
However, neither Chen nor Li nor Rahman teaches the method wherein the network transmission protocol comprises a Gigabit Ethernet based image transmission standard protocol.
On the other hand, IEEE, which provides the 802.3 standard for ethernet, does teach the network transmission protocol comprises a Gigabit Ethernet based image transmission standard protocol (“Gigabit Ethernet couples an extended version of the ISO/IEC 8802-3 (CSMA/CD MAC) to a family of 1000 Mb/s Physical layers.”) (e.g., page 893, paragraph 1).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the Applicant's claimed invention to combine the modified reference of Chen in view of Li with Rahman. The claimed invention is considered to be merely using a known technique to improve a similar method in the same way, see MPEP § 2143(I)(C). Chen teaches a method for providing image sensor data to a hardware-in-the-loop simulation. However, Chen does not appear to specifically teach the method wherein the image data comprises compressed image data. On the other hand, Rahman does teach a method wherein the transmitted data is compressed image data. Furthermore, Rahman discloses that image compression reduces the required bandwidth and transmission time for image data, and that Bayer CFA images are a popular low-cost method for decreasing transmission bandwidth (e.g., Rahman; page 1, paragraphs 1 and 2). Thus, one of ordinary skill in the art could have applied the image compression method of Rahman to the method of Chen to improve the transmission of image data, and one of ordinary skill in the art would have recognized the results of the improvement as predictable. Therefore, it would have been obvious to a person of ordinary skill in the art prior to the effective filing date of the Applicant’s claimed invention to combine Chen with Rahman in order to more efficiently transmit image data across a network.
It would have been obvious to one of ordinary skill in the art before the effective filing date of the Applicant's claimed invention to combine the modified reference of Chen in view of Li and Brahmi with IEEE for the same reasons as in claim 2, above.
Regarding Claim 7, Chen in view of Li, Brahmi, Rahman, and IEEE teaches the method of claim 6. Rahman further teaches the method wherein the processing the data in the first format to obtain the corresponding data in the second format comprises: decompressing, by the first computing device, the compressed image data to form image data in a Blue, Green, and Red (BGR) format (Figure 2-1 discloses de-mosaicking a color filter array into an RGB image.) (e.g., page 7, figure 2-1).
and performing, by the first computing device, an image format conversion on the image data in the BGR format to form Bayer image data corresponding to the image capturing device (Figure 2-2 discloses decompressing a transmitted image back into the color filter array.) (e.g., page 8, figure 2-2).
Chen further teaches performing an image format conversion as one or more original image data packets conforming to the image transmission standard protocol (“At step 50, the processor packs the sensor data from the various vehicle sensors into data packets with one packet representing the data from a single sensor. Although any conventional type of data packing may be employed, conventionally the data backet includes a start byte and ending byte for the data packet. An identification byte or bytes follow the start byte to identify the sensor and optionally the number of data bytes associated with that sensor.”) (e.g., paragraph [0030]).
Claim(s) 8 and 9 is/are rejected under 35 U.S.C. 103 as being unpatentable over Chen in view of Li and Brahmi, further in view of Wasser (Wasser, Leah A. “The Basics of LiDAR – Light Detection and Ranging – Remote sensing.” Last modified October 7, 2020. https://web.archive.org/web/20201123014810/https://www.neonscience.org/resources/learning-hub/tutorials/lidar-basics.), hereinafter Wasser.
Regarding Claim 8, Chen in view of Li and Brahmi teaches the method of claim 5. Chen further teaches the method wherein the network transmission protocol comprises a User Datagram Protocol (UDP) and a Transmission Control protocol (TCP) (“At step 50, the processor packs the sensor data from the various vehicle sensors into data packets with one packet representing the data from a single sensor. Although any conventional type of data packing may be employed, conventionally the data backet includes a start byte and ending byte for the data packet. An identification byte or bytes follow the start byte to identify the sensor and optionally the number of data bytes associated with that sensor.” The conventional data packing is interpreted as comprising a UDP or TCP.) (e.g., paragraph [0030]).
However, neither Chen nor Li nor Brahmi appear to specifically teach the method wherein the first sensor comprises a lidar, the data in the first format comprises a point cloud data packet group.
On the other hand, Wasser, which relates to the basics of LiDAR, does teach a method wherein the first sensor comprises a lidar (“LiDAR, or light detection ranging (sometimes also referred to as active laser scanning) is one remote sensing method that can be used to map structure including vegetation height, density, and other characteristics across a region.”) (e.g., page 4, paragraph 1).
the data in the first format comprises a point cloud data packet group (“Whether it is collected as discrete points or full waveform, most often LiDAR data are available as discrete points. A collection of discrete return LiDAR points is known as a LiDAR point cloud.”) (e.g., page 10, paragraph 1).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the Applicant's claimed invention to combine the modified reference of Chen in view of Li with Wasser. The claimed invention is considered to be merely a simple substitution of one known element for another to obtain predictable results, see MPEP § 2143(I)(B). Chen teaches a method for providing data to a hardware-in-the-loop simulator comprising a radar sensor. However, Chen does not teach a method comprising a lidar sensor. On the other hand, Wasser does teach a method using lidar. Radar stands for radio detection and ranging, and lidar stands for light detection and ranging. Thus, one of ordinary skill in the art could have substituted the lidar of Wasser for the radar of Chen, and one of ordinary skill in the art would have recognized the substitution as predictable. Therefore, it would have been obvious to a person of ordinary skill in the art prior to the effective filing date of the Applicant’s claimed invention to substitute the radar of Chen with the lidar of Wasser in order to provide more accurate detection and ranging.
Regarding Claim 9, Chen in view of Li, Brahmi, and Wasser teaches the method of claim 8. Chen further teaches the method of claim 8, wherein the processing the data in the first format to obtain the corresponding data in the second format comprises: decomposing, by the first computing device, the point cloud data packet group to form one or more point cloud data packets corresponding to the lidar as one or more original point cloud data packets conforming to the UDP and the TCP (“At step 50, the processor packs the sensor data from the various vehicle sensors into data packets with one packet representing the data from a single sensor. Although any conventional type of data packing may be employed, conventionally the data backet includes a start byte and ending byte for the data packet. An identification byte or bytes follow the start byte to identify the sensor and optionally the number of data bytes associated with that sensor.” The conventional data packing is interpreted as comprising a UDP or TCP, wherein the disclosed method may be used on the point cloud data.) (e.g., paragraph [0030]).
Conclusion
The prior art made of record and not relied upon is considered pertinent to applicant's disclosure.
Hong et al. (U.S. Pub. No. 2020/0339109 A1) teaches a method for simulated sensor data for autonomous machines by transforming sensor data to correspond with a specific simulation test profile.
Sibenac et al. (U.S. Pub. No. 2017/0168494 A1) teaches a method for formatting sensor data in relation to a local clock signal for navigating an autonomous vehicle.
Yang et al. (U.S. Pub. No. 2020/0384998 A1) teaches a method for simulating the operation of an autonomous vehicle based on stored sensor data.
Any inquiry concerning this communication or earlier communications from the examiner should be directed to KYLE HWA-KAI TSENG whose telephone number is (571)272-3731. The examiner can normally be reached M-F 9A-5P PST.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Rehana Perveen can be reached at (571) 272-3676. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/K.H.T./ Examiner, Art Unit 2189
/REHANA PERVEEN/ Supervisory Patent Examiner, Art Unit 2189