Prosecution Insights
Last updated: April 19, 2026
Application No. 17/837,600

ENHANCED WIRELESS TRANSMISSION SYSTEM USING NEIGHBORING RELAY DEVICES

Final Rejection §103§112
Filed
Jun 10, 2022
Examiner
WELTE, BENJAMIN PETER
Art Unit
2477
Tech Center
2400 — Computer Networks
Assignee
Microsoft Technology Licensing, LLC
OA Round
4 (Final)
71%
Grant Probability
Favorable
5-6
OA Rounds
3y 1m
To Grant
99%
With Interview

Examiner Intelligence

Grants 71% — above average
71%
Career Allow Rate
20 granted / 28 resolved
+13.4% vs TC avg
Strong +42% interview lift
Without
With
+42.1%
Interview Lift
resolved cases with interview
Typical timeline
3y 1m
Avg Prosecution
60 currently pending
Career history
88
Total Applications
across all art units

Statute-Specific Performance

§101
0.8%
-39.2% vs TC avg
§103
71.5%
+31.5% vs TC avg
§102
20.3%
-19.7% vs TC avg
§112
6.6%
-33.4% vs TC avg
Black line = Tech Center average estimate • Based on career data from 28 resolved cases

Office Action

§103 §112
DETAILED ACTION The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . The amendment submitted on 08/08/2025 has been received and considered by the examiner. Claims 1, 3, 8, 10, 15, and 17 were amended, and all uncancelled claims remain pending. Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Response to Arguments Applicant’s arguments with respect to claim(s) 1-3, 7-10, and 14-17 have been considered but are moot because the new ground of rejection does not rely on any reference applied in the prior rejection of record for any teaching or matter specifically challenged in the argument. Claim Interpretation Claims 15-17 continue to be interpreted under U.S.C. 112(f), as noted previously. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. Claims 1, 8, and 15, as well as their dependent claims 2-3, 7, 9-10, 14, and 16-17, are rejected under U.S.C. 112(b) because of the claim limitation requiring “the packets not intended to be relayed through the first computing device”. It is unclear how or why the packets can be “not intended to be relayed” when the remainder of the independent claims after this limitation discusses relaying those same packets. Furthermore, it is unclear how a packet can have “intent” – it is not obvious if this intent is inherent to the packet itself, to the sending device, the relay device, or some other source. Therefore, these claims are properly rejected under U.S.C. 112(b). Claim Rejections - 35 USC § 103 The text of those sections of Title 35, U.S. Code not included in this action can be found in a prior Office action. Claim(s) 1, 7, 8, 14, and 15 is/are rejected under 35 U.S.C. 103 as being unpatentable over Wei et al. (US 20220295544 A1, hereinafter “Wei”) in view of Liu et al. (US 20170127344 A1, hereinafter “Liu”). As to Claim 1: Wei describes a method for setting up a UE as a relay node to act as an intermediary between a base station and a destination UE. Specifically, Wei teaches: At a first computing device: determining that a second and third computing devices are within a wireless communication range of the first computing device based upon one or more wireless messages exchanged over a first wireless protocol (“In some examples, the relay node may transmit a relay reference signal (e.g., a channel state information reference signal (CSI-RS)) or a synchronization signal not on the sync raster) to the remote UE for relay discovery.... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).... In the control plane, the Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105” (Wei, 0064, 0074, 0088). Here, “the relay node” which can be one of the “other UEs 115” maps to “a first computing device”, “for relay discovery” maps to “determining ... within a wireless communication range”, “the remote UE” and/or some of the “other UEs 115” map to “a second and third computing devices”, “a relay reference signal” maps to “one or more wireless messages”, “a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over a first wireless protocol”, and “a relay reference signal” sent “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “based upon one or more wireless messages exchanged over a first wireless protocol”). Responsive to determining that the second and third computing devices are within the wireless communication range of the first computing device (“The method may include monitoring a relay reference signal from a relay node, determining a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmitting, to a base station, a downlink relay request based on the determining.... Base station 105-c may also communicate with relay node 105-d and may perform relay communications with one or more of UE 115-b and IE 115-c via relay node 105-d” (Wei, 0023, 0123). Here, “based on the determining” maps to “responsive to determining”, “UE 115-b” maps to “the second ... computing device”, “IE 115-c” maps to “the third computing device”, “a signal strength of the relay reference signal” for “one or more of UE 115-b and IE 115-c” maps to “the second and third computing devices are within the wireless communication range” because here, signal strength is measured to determine if these devices are within wireless communication range, and “relay node 105-d” maps to “the first communication device”). Relaying, over the first wireless protocol, specific ... packets addressed to either the second or third computing devices to the second or third computing devices, respectively, upon request by the second or third computing devices ... for relay of those specific ... packets (“An apparatus for wireless communications at a UE is described.... instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining.... Some examples of the method ... include ... receiving, based on the monitoring, downlink relay transmissions from the relay node ... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0024, 0034, 0064). Here, “relay transmissions” maps to “relaying”, “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over the first wireless protocol”, “downlink relay transmissions” maps to “specific ... packets addressed to either the second or third computing devices” because the fact that these transmissions are “downlink” demonstrates that they are addressed to either the “second or third computing devices” which are both UEs, “receiving ... relay transmissions” at “a UE” maps to “relaying ... to the second or third computing devices, respectively”, “a UE” configured to “transmit ... a downlink relay request” maps to “upon request by the second or third computing devices for relay”, and “downlink relay transmissions” maps to “specific ... packets”). Determining that the second computing device is no longer within the wireless communication range of the first computing device (“Code for wireless communications at a UE is described. The code may include instructions executable by a processor to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining” (Wei, 0026). Here, “a UE” maps to “the second computing device”, “a relay node” maps to “the first computing device”, and “determining a signal strength of the relay reference signal” maps to “determining that the second computing device is no longer within the wireless communication range of the first computing device” because the purpose of the signal strength measurement is to determine if the first device is in range of another device). Receiving, a second wireless broadcast transmission addressed to the second computing device over the second wireless protocol, the second wireless broadcast transmission comprising at least one second packet (“Instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining ... The Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105 or core network 130 supporting radio bearers for user plane data.... UEs 115 and base stations 105 may support retransmissions of data to increase the likelihood that data is received successfully ... The transceiver 2020 may also include a modem to modulate the packets and provide the modulated packets to the antennas for transmission, and to demodulate packets received from the antennas” (Wei, 0034, 0088, 0213). Here, “received” maps to “receiving”, “retransmissions” maps to “a second wireless broadcast transmission”, “downlink relay” maps to “addressed to the second computing device”, “Radio Resource Control (RRC) protocol” maps to “the second wireless protocol”, “retransmissions of data” maps to “the second wireless broadcast transmission”, “packets received” maps to “transmission comprising at least one second packet”). Not relaying the packet to the second computing device over the first wireless protocol based upon the second computing device being determined to not being within the wireless communication range of the first computing device (“An apparatus for wireless communications at a UE is described.... instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining.... Some examples of the method ... include ... receiving, based on the monitoring, downlink relay transmissions from the relay node ... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0024, 0034, 0064). Here, deciding not to “transmit ... a downlink relay ... based on the determining” maps to “not retransmitting relaying”, “downlink relay transmissions” map to “the packet”, one of the “other UEs 115” maps to “the second computing device”, “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over the first wireless protocol”, “based on the determining ... a signal strength of the relay reference signal” maps to “based upon the second computing device being determined to not being within the wireless communication range” because the purpose of measuring the reference signal strength is to determine if the second computing device is within range, and “the relay node” maps to “the first computing device”). Transmission ... over the second wireless protocol (“In the control plane, the Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105” (Wei, 0088). Here, “an RRC connection” maps to “transmission”, and “the Radio Resource Control (RRC) protocol” maps to “the second wireless protocol”). The second or third wireless device (“In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0064). Here, a second of “other UEs 115” maps to “the second ... wireless device”, a third of “other UEs 115” maps to “the third ... wireless device”). Wei does not explicitly disclose: Buffered packets Scanning a wireless medium of a ... wireless protocol by actively monitoring broadcast transmissions for packets addressed to the second or third computing devices The packets not intended to be relayed through the first computing device Buffering any packets addressed to either the second or third computing devices that are received at the first computing device A request by the second or third computing devices sent by the second or third computing devices directly to the first computing device for relay of those specific buffered packets A determination that a transceiver of the first computing device has not received data addressed to the first computing device, or transmitted data to another device within a predetermined period of time However, Liu does describe a method for a proxy device to detect broadcast transmissions and relay them to their destination. Specifically, Liu teaches: Buffered packets (“[A] proxy servier may also cache the broadcast/multicast frames from the access point” (Liu, 0093). Here, “cache ... frames” maps to “buffered packets”). Scanning a wireless medium of a ... wireless protocol by actively monitoring broadcast transmissions for packets addressed to the second or third computing devices (“As illustrated, an access point (e.g., AP 112 [in Fig. 5A]) may periodically transmit beacons (e.g., signals 530) and proxy device 106a may be scheduled to monitor the infra BSS channels and may receive a beacon 542.... Further, beacon 542 may include an indication that the access point has data and/or messages for peer device 106b ... [A] proxy server may also cache the broadcast/multicast frames from the access point and then relay (or push) the broadcast/multicast frames to proxy clients” (Liu, 0088, 0093). Here, “monitor” maps to “scanning”, “the infra BSS channels” maps to “a wireless medium of a ... wireless protocol”, “scheduled to monitor” maps to “actively monitoring”, “broadcast/multicast frames” maps to “broadcast transmissions”, and “data and/or messages for peer device 106b” maps to “packets addressed to the second or third computing devices”). The packets not intended to be relayed through the first computing device (“Further, beacon 542 may include an indication that the access point has data and/or messages for peer device 106b” (Liu, 0088). Here, “data and/or messages for peer device 106b” maps to “the packets not intended to be relayed through the first computing device” because “peer device 106b” is not “the first computing device”). Buffering any packets addressed to either the second or third computing devices that are received at the first computing device (“[A] proxy server may also cache the broadcast/multicast frames from the access point and then relay (or push) the broadcast/multicast frames to proxy clients” (Liu, 0088, 0093). Here, “cache ... frames” maps to “buffering any packets”, “to proxy clients” maps to “addressed to either the second or third computing devices”, and “frames” received by “a proxy server” map to “packets ... that are received at the first computing device”). A request by the second or third computing devices sent by the second or third computing devices directly to the first computing device for relay of those specific buffered packets (“Fig. 7 illustrates a block diagram of an example of a method for receiving relayed messages from an access point via a proxy server ... At 706 [in Fig. 7], transmissions may be received from the neighboring wireless station indicating that the access point has pending data for the wireless station” (Liu, 0102, 0105). Here, “transmissions ... indicating that the access point has pending data” map to “a request”, “the neighboring wireless station” maps to “the second or third computing devices” because this is the recipient of the relayed packets, “received from the neighboring wireless station” maps to “sent by the second or third computing devices”, “via a proxy server” maps to “directly to the first computing device”, and “pending data” maps to “for relay of those specific buffered packets”). A determination that a transceiver of the first computing device has not received data addressed to the first computing device, or transmitted data to another device within a predetermined period of time (“[P]roxy device 106a [in Fig. 5A] may also be scheduled to be present for NAN discovery windows and NAN data cluster windows” (Liu, 0088). Here, “scheduled” maps to “a determination”, “to be present” maps to “a transceiver of the first computing device has not received data addressed to the computing device, or transmitted data to another device”, and “scheduled ... windows” map to “a predetermined period of time”). Thus, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the proxy relay device described in Liu into Wei’s method for configuring a relay UE to conditionally relay packets from a base station to a destination UE. The situational proxy relay described in Liu can extend the range and effectiveness of the inter-protocol relay method described in Wei. As to Claim 7: Wei teaches: Determining that a signal property of a received communication from the second computing device no longer meets a specified threshold (“The method may include monitoring a relay reference signal from a relay node, determining the signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmitting, to a base station, a downlink relay request based on the determining” (Wei, 0023). Here, “determining” maps to “determining”, “signal strength” maps to “a signal property”, “a relay reference signal” maps to “a received communication”, “from the relay node” maps to “from the second computing device” because the strength of a reference signal sent from the relay node to the destination UE will be identical to the strength of the same signal sent from the destination UE to the relay node, and negatively “determining the signal strength” maps to “no longer meets a specified threshold” because this determination clearly involves comparing the signal strength to some kind of threshold to determine if it’s strong enough). As to Claim 8: Wei teaches: The computing device comprising: a processor; a memory device, storing instructions, which when executed by the processor, cause the computing device to perform operations comprising: (“The apparatus may include a processor, memory coupled (e.g., operatively, communicatively, functionally, electronically, or electrically) to the processor, and instructions stored in the memory. The instructions may be executable by the processor to cause the processor to receive ...” (Wei, 0006). Here, “the apparatus” including “a processor” and “memory” maps to “the computing device”, “processor” maps to “a processor”, “memory” maps to “a memory device”, “instructions stored” maps to “storing instructions”, “executable by the processor” maps to “executed by the processor”, and “cause the processor to receive” maps to “cause the processor to perform operations”). At a first computing device: determining that a second and third computing devices are within a wireless communication range of the first computing device based upon one or more wireless messages exchanged over a first wireless protocol (“In some examples, the relay node may transmit a relay reference signal (e.g., a channel state information reference signal (CSI-RS)) or a synchronization signal not on the sync raster) to the remote UE for relay discovery.... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).... In the control plane, the Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105” (Wei, 0064, 0074, 0088). Here, “the relay node” which can be one of the “other UEs 115” maps to “a first computing device”, “for relay discovery” maps to “determining ... within a wireless communication range”, “the remote UE” and/or some of the “other UEs 115” map to “a second and third computing devices”, “a relay reference signal” maps to “one or more wireless messages”, “a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over a first wireless protocol”, and “a relay reference signal” sent “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “based upon one or more wireless messages exchanged over a first wireless protocol”). Responsive to determining that the second and third computing devices are within the wireless communication range of the first computing device (“The method may include monitoring a relay reference signal from a relay node, determining a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmitting, to a base station, a downlink relay request based on the determining.... Base station 105-c may also communicate with relay node 105-d and may perform relay communications with one or more of UE 115-b and IE 115-c via relay node 105-d” (Wei, 0023, 0123). Here, “based on the determining” maps to “responsive to determining”, “UE 115-b” maps to “the second ... computing device”, “IE 115-c” maps to “the third computing device”, “a signal strength of the relay reference signal” for “one or more of UE 115-b and IE 115-c” maps to “the second and third computing devices are within the wireless communication range” because here, signal strength is measured to determine if these devices are within wireless communication range, and “relay node 105-d” maps to “the first communication device”). Relaying, over the first wireless protocol, specific ... packets addressed to either the second or third computing devices to the second or third computing devices, respectively, upon request by the second or third computing devices ... for relay of those specific ... packets (“An apparatus for wireless communications at a UE is described.... instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining.... Some examples of the method ... include ... receiving, based on the monitoring, downlink relay transmissions from the relay node ... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0024, 0034, 0064). Here, “relay transmissions” maps to “relaying”, “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over the first wireless protocol”, “downlink relay transmissions” maps to “specific ... packets addressed to either the second or third computing devices” because the fact that these transmissions are “downlink” demonstrates that they are addressed to either the “second or third computing devices” which are both UEs, “receiving ... relay transmissions” at “a UE” maps to “relaying ... to the second or third computing devices, respectively”, “a UE” configured to “transmit ... a downlink relay request” maps to “upon request by the second or third computing devices for relay”, and “downlink relay transmissions” maps to “specific ... packets”). Determining that the second computing device is no longer within the wireless communication range of the first computing device (“Code for wireless communications at a UE is described. The code may include instructions executable by a processor to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining” (Wei, 0026). Here, “a UE” maps to “the second computing device”, “a relay node” maps to “the first computing device”, and “determining a signal strength of the relay reference signal” maps to “determining that the second computing device is no longer within the wireless communication range of the first computing device” because the purpose of the signal strength measurement is to determine if the first device is in range of another device). Receiving, a second wireless broadcast transmission addressed to the second computing device over the second wireless protocol, the second wireless broadcast transmission comprising at least one second packet (“Instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining ... The Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105 or core network 130 supporting radio bearers for user plane data.... UEs 115 and base stations 105 may support retransmissions of data to increase the likelihood that data is received successfully ... The transceiver 2020 may also include a modem to modulate the packets and provide the modulated packets to the antennas for transmission, and to demodulate packets received from the antennas” (Wei, 0034, 0088, 0213). Here, “received” maps to “receiving”, “retransmissions” maps to “a second wireless broadcast transmission”, “downlink relay” maps to “addressed to the second computing device”, “Radio Resource Control (RRC) protocol” maps to “the second wireless protocol”, “retransmissions of data” maps to “the second wireless broadcast transmission”, “packets received” maps to “transmission comprising at least one second packet”). Not relaying the packet to the second computing device over the first wireless protocol based upon the second computing device being determined to not being within the wireless communication range of the first computing device (“An apparatus for wireless communications at a UE is described.... instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining.... Some examples of the method ... include ... receiving, based on the monitoring, downlink relay transmissions from the relay node ... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0024, 0034, 0064). Here, deciding not to “transmit ... a downlink relay ... based on the determining” maps to “not retransmitting relaying”, “downlink relay transmissions” map to “the packet”, one of the “other UEs 115” maps to “the second computing device”, “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over the first wireless protocol”, “based on the determining ... a signal strength of the relay reference signal” maps to “based upon the second computing device being determined to not being within the wireless communication range” because the purpose of measuring the reference signal strength is to determine if the second computing device is within range, and “the relay node” maps to “the first computing device”). Transmission ... over the second wireless protocol (“In the control plane, the Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105” (Wei, 0088). Here, “an RRC connection” maps to “transmission”, and “the Radio Resource Control (RRC) protocol” maps to “the second wireless protocol”). The second or third wireless device (“In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0064). Here, a second of “other UEs 115” maps to “the second ... wireless device”, a third of “other UEs 115” maps to “the third ... wireless device”). Wei does not explicitly disclose: Buffered packets Scanning a wireless medium of a ... wireless protocol by actively monitoring broadcast transmissions for packets addressed to the second or third computing devices The packets not intended to be relayed through the first computing device Buffering any packets addressed to either the second or third computing devices that are received at the first computing device A request by the second or third computing devices sent by the second or third computing devices directly to the first computing device for relay of those specific buffered packets A determination that a transceiver of the first computing device has not received data addressed to the first computing device, or transmitted data to another device within a predetermined period of time However, Liu does teach: Buffered packets (“[A] proxy servier may also cache the broadcast/multicast frames from the access point” (Liu, 0093). Here, “cache ... frames” maps to “buffered packets”). Scanning a wireless medium of a ... wireless protocol by actively monitoring broadcast transmissions for packets addressed to the second or third computing devices (“As illustrated, an access point (e.g., AP 112 [in Fig. 5A]) may periodically transmit beacons (e.g., signals 530) and proxy device 106a may be scheduled to monitor the infra BSS channels and may receive a beacon 542.... Further, beacon 542 may include an indication that the access point has data and/or messages for peer device 106b ... [A] proxy server may also cache the broadcast/multicast frames from the access point and then relay (or push) the broadcast/multicast frames to proxy clients” (Liu, 0088, 0093). Here, “monitor” maps to “scanning”, “the infra BSS channels” maps to “a wireless medium of a ... wireless protocol”, “scheduled to monitor” maps to “actively monitoring”, “broadcast/multicast frames” maps to “broadcast transmissions”, and “data and/or messages for peer device 106b” maps to “packets addressed to the second or third computing devices”). The packets not intended to be relayed through the first computing device (“Further, beacon 542 may include an indication that the access point has data and/or messages for peer device 106b” (Liu, 0088). Here, “data and/or messages for peer device 106b” maps to “the packets not intended to be relayed through the first computing device” because “peer device 106b” is not “the first computing device”). Buffering any packets addressed to either the second or third computing devices that are received at the first computing device (“[A] proxy server may also cache the broadcast/multicast frames from the access point and then relay (or push) the broadcast/multicast frames to proxy clients” (Liu, 0088, 0093). Here, “cache ... frames” maps to “buffering any packets”, “to proxy clients” maps to “addressed to either the second or third computing devices”, and “frames” received by “a proxy server” map to “packets ... that are received at the first computing device”). A request by the second or third computing devices sent by the second or third computing devices directly to the first computing device for relay of those specific buffered packets (“Fig. 7 illustrates a block diagram of an example of a method for receiving relayed messages from an access point via a proxy server ... At 706 [in Fig. 7], transmissions may be received from the neighboring wireless station indicating that the access point has pending data for the wireless station” (Liu, 0102, 0105). Here, “transmissions ... indicating that the access point has pending data” map to “a request”, “the neighboring wireless station” maps to “the second or third computing devices” because this is the recipient of the relayed packets, “received from the neighboring wireless station” maps to “sent by the second or third computing devices”, “via a proxy server” maps to “directly to the first computing device”, and “pending data” maps to “for relay of those specific buffered packets”). A determination that a transceiver of the first computing device has not received data addressed to the first computing device, or transmitted data to another device within a predetermined period of time (“[P]roxy device 106a [in Fig. 5A] may also be scheduled to be present for NAN discovery windows and NAN data cluster windows” (Liu, 0088). Here, “scheduled” maps to “a determination”, “to be present” maps to “a transceiver of the first computing device has not received data addressed to the computing device, or transmitted data to another device”, and “scheduled ... windows” map to “a predetermined period of time”). Thus, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the proxy relay device described in Liu into Wei’s method for configuring a relay UE to conditionally relay packets from a base station to a destination UE. The situational proxy relay described in Liu can extend the range and effectiveness of the inter-protocol relay method described in Wei. As to Claim 14: Wei teaches: Determining that a signal property of a received communication from the second computing device no longer meets a specified threshold (“The method may include monitoring a relay reference signal from a relay node, determining the signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmitting, to a base station, a downlink relay request based on the determining” (Wei, 0023). Here, “determining” maps to “determining”, “signal strength” maps to “a signal property”, “a relay reference signal” maps to “a received communication”, “from the relay node” maps to “from the second computing device” because the strength of a reference signal sent from the relay node to the destination UE will be identical to the strength of the same signal sent from the destination UE to the relay node, and negatively “determining the signal strength” maps to “no longer meets a specified threshold” because this determination clearly involves comparing the signal strength to some kind of threshold to determine if it’s strong enough). As to Claim 15: Wei teaches: Determining that a second and third computing devices are within a wireless communication range of the first computing device based upon one or more wireless messages exchanged over a first wireless protocol (“In some examples, the relay node may transmit a relay reference signal (e.g., a channel state information reference signal (CSI-RS)) or a synchronization signal not on the sync raster) to the remote UE for relay discovery.... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).... In the control plane, the Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105” (Wei, 0064, 0074, 0088). Here, “the relay node” which can be one of the “other UEs 115” maps to “a first computing device”, “for relay discovery” maps to “determining ... within a wireless communication range”, “the remote UE” and/or some of the “other UEs 115” map to “a second and third computing devices”, “a relay reference signal” maps to “one or more wireless messages”, “a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over a first wireless protocol”, and “a relay reference signal” sent “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “based upon one or more wireless messages exchanged over a first wireless protocol”). Responsive to determining that the second and third computing devices are within the wireless communication range of the first computing device (“The method may include monitoring a relay reference signal from a relay node, determining a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmitting, to a base station, a downlink relay request based on the determining.... Base station 105-c may also communicate with relay node 105-d and may perform relay communications with one or more of UE 115-b and IE 115-c via relay node 105-d” (Wei, 0023, 0123). Here, “based on the determining” maps to “responsive to determining”, “UE 115-b” maps to “the second ... computing device”, “IE 115-c” maps to “the third computing device”, “a signal strength of the relay reference signal” for “one or more of UE 115-b and IE 115-c” maps to “the second and third computing devices are within the wireless communication range” because here, signal strength is measured to determine if these devices are within wireless communication range, and “relay node 105-d” maps to “the first communication device”). Relaying, over the first wireless protocol, specific ... packets addressed to either the second or third computing devices to the second or third computing devices, respectively, upon request by the second or third computing devices ... for relay of those specific ... packets (“An apparatus for wireless communications at a UE is described.... instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining.... Some examples of the method ... include ... receiving, based on the monitoring, downlink relay transmissions from the relay node ... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0024, 0034, 0064). Here, “relay transmissions” maps to “relaying”, “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over the first wireless protocol”, “downlink relay transmissions” maps to “specific ... packets addressed to either the second or third computing devices” because the fact that these transmissions are “downlink” demonstrates that they are addressed to either the “second or third computing devices” which are both UEs, “receiving ... relay transmissions” at “a UE” maps to “relaying ... to the second or third computing devices, respectively”, “a UE” configured to “transmit ... a downlink relay request” maps to “upon request by the second or third computing devices for relay”, and “downlink relay transmissions” maps to “specific ... packets”). Determining that the second computing device is no longer within the wireless communication range of the first computing device (“Code for wireless communications at a UE is described. The code may include instructions executable by a processor to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining” (Wei, 0026). Here, “a UE” maps to “the second computing device”, “a relay node” maps to “the first computing device”, and “determining a signal strength of the relay reference signal” maps to “determining that the second computing device is no longer within the wireless communication range of the first computing device” because the purpose of the signal strength measurement is to determine if the first device is in range of another device). Receiving, a second wireless broadcast transmission addressed to the second computing device over the second wireless protocol, the second wireless broadcast transmission comprising at least one second packet (“Instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining ... The Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105 or core network 130 supporting radio bearers for user plane data.... UEs 115 and base stations 105 may support retransmissions of data to increase the likelihood that data is received successfully ... The transceiver 2020 may also include a modem to modulate the packets and provide the modulated packets to the antennas for transmission, and to demodulate packets received from the antennas” (Wei, 0034, 0088, 0213). Here, “received” maps to “receiving”, “retransmissions” maps to “a second wireless broadcast transmission”, “downlink relay” maps to “addressed to the second computing device”, “Radio Resource Control (RRC) protocol” maps to “the second wireless protocol”, “retransmissions of data” maps to “the second wireless broadcast transmission”, “packets received” maps to “transmission comprising at least one second packet”). Not relaying the packet to the second computing device over the first wireless protocol based upon the second computing device being determined to not being within the wireless communication range of the first computing device (“An apparatus for wireless communications at a UE is described.... instructions may be executable by the processor to cause the apparatus to monitor a relay reference signal from a relay node, determine a signal strength of the relay reference signal and a timing of the relay reference signal based on the monitoring, and transmit, to a base station, a downlink relay request based on the determining.... Some examples of the method ... include ... receiving, based on the monitoring, downlink relay transmissions from the relay node ... In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0024, 0034, 0064). Here, deciding not to “transmit ... a downlink relay ... based on the determining” maps to “not retransmitting relaying”, “downlink relay transmissions” map to “the packet”, one of the “other UEs 115” maps to “the second computing device”, “using a peer-to-peer (P2P) or device-to-device (D2D) protocol” maps to “over the first wireless protocol”, “based on the determining ... a signal strength of the relay reference signal” maps to “based upon the second computing device being determined to not being within the wireless communication range” because the purpose of measuring the reference signal strength is to determine if the second computing device is within range, and “the relay node” maps to “the first computing device”). Transmission ... over the second wireless protocol (“In the control plane, the Radio Resource Control (RRC) protocol layer may provide establishment, configuration, and maintenance of an RRC connection between a UE 115 and a base station 105” (Wei, 0088). Here, “an RRC connection” maps to “transmission”, and “the Radio Resource Control (RRC) protocol” maps to “the second wireless protocol”). The second or third wireless device (“In some cases, a UE 115 may also be able to communicate directly with other UEs 115 (e.g., using a peer-to-peer (P2P) or device-to-device (D2D) protocol).” (Wei, 0064). Here, a second of “other UEs 115” maps to “the second ... wireless device”, a third of “other UEs 115” maps to “the third ... wireless device”). Wei does not explicitly disclose: Buffered packets Scanning a wireless medium of a ... wireless protocol by actively monitoring broadcast transmissions for packets addressed to the second or third computing devices The packets not intended to be relayed through the first computing device Buffering any packets addressed to either the second or third computing devices that are received at the first computing device A request by the second or third computing devices sent by the second or third computing devices directly to the first computing device for relay of those specific buffered packets A determination that a transceiver of the first computing device has not received data addressed to the first computing device, or transmitted data to another device within a predetermined period of time However, Liu does teach: Buffered packets (“[A] proxy servier may also cache the broadcast/multicast frames from the access point” (Liu, 0093). Here, “cache ... frames” maps to “buffered packets”). Scanning a wireless medium of a ... wireless protocol by actively monitoring broadcast transmissions for packets addressed to the second or third computing devices (“As illustrated, an access point (e.g., AP 112 [in Fig. 5A]) may periodically transmit beacons (e.g., signals 530) and proxy device 106a may be scheduled to monitor the infra BSS channels and may receive a beacon 542.... Further, beacon 542 may include an indication that the access point has data and/or messages for peer device 106b ... [A] proxy server may also cache the broadcast/multicast frames from the access point and then relay (or push) the broadcast/multicast frames to proxy clients” (Liu, 0088, 0093). Here, “monitor” maps to “scanning”, “the infra BSS channels” maps to “a wireless medium of a ... wireless protocol”, “scheduled to monitor” maps to “actively monitoring”, “broadcast/multicast frames” maps to “broadcast transmissions”, and “data and/or messages for peer device 106b” maps to “packets addressed to the second or third computing devices”). The packets not intended to be relayed through the first computing device (“Further, beacon 542 may include an indication that the access point has data and/or messages for peer device 106b” (Liu, 0088). Here, “data and/or messages for peer device 106b” maps to “the packets not intended to be relayed through the first computing device” because “peer device 106b” is not “the first computing device”). Buffering any packets addressed to either the second or third computing devices that are received at the first computing device (“[A] proxy server may also cache the broadcast/multicast frames from the access point and then relay (or push) the broadcast/multicast frames to proxy clients” (Liu, 0088, 0093). Here, “cache ... frames” maps to “buffering any packets”, “to proxy clients” maps to “addressed to either the second or third computing devices”, and “frames” received by “a proxy server” map to “packets ... that are received at the first computing device”). A request by the second or third computing devices sent by the second or third computing devices directly to the first computing device for relay of those specific buffered packets (“Fig. 7 illustrates a block diagram of an example of a method for receiving relayed messages from an access point via a proxy server ... At 706 [in Fig. 7], transmissions may be received from the neighboring wireless station indicating that the access point has pending data for the wireless station” (Liu, 0102, 0105). Here, “transmissions ... indicating that the access point has pending data” map to “a request”, “the neighboring wireless station” maps to “the second or third computing devices” because this is the recipient of the relayed packets, “received from the neighboring wireless station” maps to “sent by the second or third computing devices”, “via a proxy server” maps to “directly to the first computing device”, and “pending data” maps to “for relay of those specific buffered packets”). A determination that a transceiver of the first computing device has not received data addressed to the first computing device, or transmitted data to another device within a predetermined period of time (“[P]roxy device 106a [in Fig. 5A] may also be scheduled to be present for NAN discovery windows and NAN data cluster windows” (Liu, 0088). Here, “scheduled” maps to “a determination”, “to be present” maps to “a transceiver of the first computing device has not received data addressed to the computing device, or transmitted data to another device”, and “scheduled ... windows” map to “a predetermined period of time”). Thus, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate the proxy relay device described in Liu into Wei’s method for configuring a relay UE to conditionally relay packets from a base station to a destination UE. The situational proxy relay described in Liu can extend the range and effectiveness of the inter-protocol relay method described in Wei. Claim(s) 2, 9, and 16 is/are rejected under 35 U.S.C. 103 as being unpatentable over Wei
Read full office action

Prosecution Timeline

Jun 10, 2022
Application Filed
Aug 07, 2024
Non-Final Rejection — §103, §112
Oct 07, 2024
Applicant Interview (Telephonic)
Oct 07, 2024
Examiner Interview Summary
Nov 12, 2024
Response Filed
Nov 25, 2024
Final Rejection — §103, §112
Jan 03, 2025
Interview Requested
Jan 21, 2025
Request for Continued Examination
Jan 21, 2025
Applicant Interview (Telephonic)
Jan 21, 2025
Examiner Interview Summary
Jan 26, 2025
Response after Non-Final Action
Jan 29, 2025
Non-Final Rejection — §103, §112
Jul 16, 2025
Examiner Interview Summary
Jul 16, 2025
Applicant Interview (Telephonic)
Aug 08, 2025
Response Filed
Aug 18, 2025
Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12598136
SEGMENT ROUTING: PCE DRIVEN DYNAMIC SETUP OF FORWARDING ADJACENCIES AND EXPLICIT PATH
2y 5m to grant Granted Apr 07, 2026
Patent 12598636
METHOD AND APPARATUS FOR TRANSMITTING SIGNAL IN WIRELESS COMMUNICATION SYSTEM
2y 5m to grant Granted Apr 07, 2026
Patent 12587924
METHODS, APPARATUSES AND SYSTEMS DIRECTED TO A CHANGE OF WTRU TO WTRU RELAY
2y 5m to grant Granted Mar 24, 2026
Patent 12588101
METHOD FOR CONTROLLING SIDELINK COMMUNICATION AND DEVICE THEREFOR
2y 5m to grant Granted Mar 24, 2026
Patent 12542690
MESSAGE HEADER PROCESSING METHOD AND APPARATUS, STORAGE MEDIUM AND ELECTRONIC DEVICE
2y 5m to grant Granted Feb 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

5-6
Expected OA Rounds
71%
Grant Probability
99%
With Interview (+42.1%)
3y 1m
Median Time to Grant
High
PTA Risk
Based on 28 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month