Prosecution Insights
Last updated: April 19, 2026
Application No. 17/989,257

COOPERATIVE NETWORK DEVICES

Non-Final OA §103
Filed
Nov 17, 2022
Examiner
WHITAKER, JUSTIN MICHAEL
Art Unit
2415
Tech Center
2400 — Computer Networks
Assignee
Silicon Laboratories Inc.
OA Round
3 (Non-Final)
89%
Grant Probability
Favorable
3-4
OA Rounds
3y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 89% — above average
89%
Career Allow Rate
8 granted / 9 resolved
+30.9% vs TC avg
Strong +17% interview lift
Without
With
+16.7%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
46 currently pending
Career history
55
Total Applications
across all art units

Statute-Specific Performance

§101
1.1%
-38.9% vs TC avg
§103
71.9%
+31.9% vs TC avg
§102
15.2%
-24.8% vs TC avg
§112
11.5%
-28.5% vs TC avg
Black line = Tech Center average estimate • Based on career data from 9 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Amendment Applicant’s amendment filed on 10/27/2025 has been entered. Independent Claims 1 and 10 have been amended. No dependent claims have been amended. No claims have been cancelled. Claims 19-22 are new and have been entered. Claims 1, 4-10, and 13-22 are still pending in this application. Response to Arguments Applicant’s arguments filed on 10/27/2025 on pages 7-8 of applicant’s remark regarding Claims 1 and 10. The applicant argues that Guberman in view of Chen fails to teach the amended claim wherein one of the resources available for an IoT communication system is wi-fi or ethernet connectivity to another device. However, the wording of the claim is “wi-fi/ethernet connectivity”, which the ability to connect directly through an API through the wired communication system, as seen in Chen ¶0077, that allows the main device to ping the capabilities model and acknowledge that the device is connected. Details and use cases for the application, from the specification can illuminate, but the language of the claim derives the meaning. The applicant’s arguments have been fully considered, but are not persuasive. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1, 4-10, and 13-18 is/are rejected under 35 U.S.C. 103 as being unpatentable over Guberman (Pub. No.: US 20190268310 A1, hereafter “Guberman”) in view of Chen (Pub. No.: US 20190028349 A1, hereafter “Chen”). Regarding Claim 1 and Claim 10 Guberman teaches a Method and Network Comprising A method of sharing resources (Guberman Fig. 1: 34-1-34-N) among network devices in a wireless network (Guberman Fig. 1: 10), the method comprising: querying the network resource ledger (Guberman ¶0198: request shared data) by a first network device, the first network device in need of a resource (Guberman Fig. 11B: 0198; Guberman teaches requesting shared data via a member of a trusted group of computing devices); transmitting a packet from the first network device to the neighboring network device requesting access to the resource (Guberman Fig. 11B: 460; Guberman teaches sending the data to another device); and receiving a second packet from the neighboring device granting access to the resource (Guberman Fig. 11B: 462; Guberman teaches the other device gaining access to the data). Guberman does not explicitly teach creating a network resource ledger, the network resource ledger listing all resources that are available for sharing and an identity of a device possessing each resource wherein the network resource ledger comprises a list of all available resources, a class of resource and their current status and wherein the class of resource is one or more of compute, wi-fi/ethernet connectivity or control; identifying a neighboring network device having the resource; However, Chen teaches creating a network resource ledger (Chen Fig. 3: 320) the network resource ledger listing all resources that are available for sharing (Chen ¶0045: capabilities catalog) and an identity of a device possessing each resource (Chen ¶0045: unique capability identifier) wherein the network resource ledger (Chen Fig. 3: 320) comprises a list of all available resources (Chen ¶0045: each capability), a class of resource (Chen ¶0045: capability) and their current status (Chen ¶0045: data can include battery life) and wherein the class of resource (Chen ¶0045: capability) is one or more of compute (Not given patentable weight due to non-selective option in the claim), wi-fi/ethernet (Chen ¶0077: wired communications) connectivity (Chen ¶0045: API calls to initiate IoT data transfers) or control (Not given patentable weight due to non-selective option in the claim; Chen teaches a resource ledger containing all available capability, including a unique identifier, and one of those ledgers includes a method for connectivity to the IoT device through a wired communication system); identifying a neighboring network device (Chen ¶0054: resource manager can map resources) having the resource (Chen ¶0044: map data fields from IoT devices; Chen teaches identifying resources from multiple network devices); It would have been obvious for one skilled in the art, before the effective filing date of the claimed invention, to modify Guberman by way of Chen, to have an element that teaches a resource ledger containing all available capability, including a unique identifier, and one of those ledgers includes a method for connectivity to the IoT device as well as identifying resources from multiple network devices, as taught by Chen in Fig. 3, and ¶0045-¶0053, to reduce power consumption, have a larger number of devices, shorter bursts of transmissions, device tampering detection, and advanced device authentication. Claim 10 differs by the following limitation, which is also taught by the prior art, a plurality of network devices, each network device comprising: network interface (Guberman Fig. 1: 28-1, 14-4, 18-1-N); a processing unit (Guberman: ¶0207; processor); and a memory device, containing instructions (Guberman: ¶0207: memory; Guberman teaches a memory with instructions), Regarding Claim 4 and Claim 13 Guberman in view of Chen teaches the Method and Network as explained above in Claim 1. Chen further teaches wherein each resource has a sharing model (Chen ¶0066: sharing a device model; Chen teaches implementing sharing data). It would have been obvious for one skilled in the art, before the effective filing date of the claimed invention, to modify Guberman by way of Chen, to share data, as taught by Chen in ¶0066, to reduce power consumption, have a larger number of devices, shorter bursts of transmissions, device tampering detection, and advanced device authentication. Regarding Claim 5 and Claim 14 Guberman in view of Chen teaches the Method and Network as explained above in Claim 4. Chen further teaches wherein the sharing model is 1:1 (Chen ¶0066: OMA Lightweight M2M, e.g. an IoT direct API), 1:many (Not given patentable weight due to non-selective option in the claim) or 1:many (time sliced access) (Not given patentable weight due to non-selective option in the claim; Chen teaches selecting a type of sharing model, such as a direct access API). It would have been obvious for one skilled in the art, before the effective filing date of the claimed invention, to modify Guberman by way of Chen, to directly share data, as taught by Chen in ¶0066, to reduce power consumption, have a larger number of devices, shorter bursts of transmissions, device tampering detection, and advanced device authentication. Regarding Claim 6 and Claim 15 Guberman in view of Chen teaches the Method and Network as explained above in Claim 1. Chen further teaches wherein the network resource ledger is a two stage table (Chen ¶0037: table), wherein a first table lists classes of resource (Chen ¶0037: data) and an associated pointer (Chen ¶0037: registration) to a second table (Chen ¶0038: data model layer), and wherein the second table provides a list of devices having a resource of that class (Chen ¶0038: assemble models in parameters; Chen teaches having multiple tables with the associated data and references). It would have been obvious for one skilled in the art, before the effective filing date of the claimed invention, to modify Guberman by way of Chen, to hold the relevant data and the associated references, as taught by Chen in ¶0037-¶0038, to reduce power consumption, have a larger number of devices, shorter bursts of transmissions, device tampering detection, and advanced device authentication. Regarding Claim 7 and Claim 16 Guberman in view of Chen teaches the Method and Network as explained above in Claim 1. Chen further teaches wherein each network device constructs a device resource ledger (Chen ¶0036: stores data in a repository), based on resources available in the network device and publicizes its respective device resource ledger (Chen ¶0035: adaptor receives raw data from IoT devices), and the network resource ledger is compiled based on all of the device resource ledgers (Chen ¶0036: adaptor collects and stores IoT data; Chen teaches generating a repository from data from IoT devices). It would have been obvious for one skilled in the art, before the effective filing date of the claimed invention, to modify Guberman by way of Chen, to hold the data from IoT devices, as taught by Chen in ¶0035-¶0036, to reduce power consumption, have a larger number of devices, shorter bursts of transmissions, device tampering detection, and advanced device authentication. Regarding Claim 8 and Claim 17 Guberman in view of Chen teaches the Method and Network as explained above in Claim 1. Chen further teaches wherein the first network device uses the resource (Chen ¶0039: data access layer) and subsequently transmits a packet to the neighboring network device relinquishing access to the resource (Chen ¶0039: control access; Chen teaches using the data access layer to control different data models). It would have been obvious for one skilled in the art, before the effective filing date of the claimed invention, to modify Guberman by way of Chen, to access different data layers with different data models, as taught by Chen in ¶0039, to reduce power consumption, have a larger number of devices, shorter bursts of transmissions, device tampering detection, and advanced device authentication. Regarding Claim 9 and Claim 18 Guberman in view of Chen teaches the Method and Network as explained above in Claim 1. Chen further teaches wherein the first network device uses one or more factors to select the neighboring network device (Chen ¶0044: selected capability designations), wherein the one or more factors are reliability (Not given patentable weight due to non-selective option in the claim), highest availability (Not given patentable weight due to non-selective option in the claim), bandwidth (Not given patentable weight due to non-selective option in the claim), quality of service (Not given patentable weight due to non-selective option in the claim), CPU speed (Not given patentable weight due to non-selective option in the claim), memory storage (Not given patentable weight due to non-selective option in the claim), or proximity (Chen ¶0045: latitude and longitude; Chen teaches a capacity designator with latitude and longitude). It would have been obvious for one skilled in the art, before the effective filing date of the claimed invention, to modify Guberman by way of Chen, to allow access to latitude and longitude data, as taught by Chen in ¶0045, to reduce power consumption, have a larger number of devices, shorter bursts of transmissions, device tampering detection, and advanced device authentication. Regarding Claim 19 and Claim 21 Guberman in view of Chen teaches the Method and Network as explained above in Claim 1. Guberman further teaches Wherein the class of resource comprises compute (Guberman ¶0149: device parameters can be queried to the for a Boolean query for the device parameters). Regarding Claim 20 and Claim 22 Guberman in view of Chen teaches the Method and Network as explained above in Claim 1. Guberman further teaches Wherein the class of resource comprises control (Guberman ¶0037: parameters include one or more control information). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to JUSTIN MICHAEL WHITAKER whose telephone number is (703)756-4763. The examiner can normally be reached Monday - Thursday 7:30am - 4:00pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jeffrey Rutkowski can be reached on (571) 270-1215. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /JUSTIN MICHAEL WHITAKER/Examiner, Art Unit 2415 /Sudesh M. Patidar/Primary Examiner, Art Unit 2415
Read full office action

Prosecution Timeline

Nov 17, 2022
Application Filed
Apr 03, 2025
Non-Final Rejection — §103
Jul 07, 2025
Response Filed
Aug 28, 2025
Final Rejection — §103
Oct 27, 2025
Response after Non-Final Action
Nov 24, 2025
Request for Continued Examination
Dec 05, 2025
Response after Non-Final Action
Jan 30, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12563457
CELL RESELECTION
2y 5m to grant Granted Feb 24, 2026
Patent 12562856
INTER PANEL RECEPTION AT UE
2y 5m to grant Granted Feb 24, 2026
Patent 12563597
BLOCK ACKNOWLEDGEMENT AGREEMENT FOR LATENCY SENSITIVE TRAFFIC STREAM
2y 5m to grant Granted Feb 24, 2026
Patent 12445248
TIME DOMAIN COMMUNICATIONS HAVING MULTIPLE MODULATION AND CODING SCHEMES
2y 5m to grant Granted Oct 14, 2025
Patent 12413358
DETERMINING REFERENCE SIGNAL TRANSMISSION TIMES
2y 5m to grant Granted Sep 09, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
89%
Grant Probability
99%
With Interview (+16.7%)
3y 2m
Median Time to Grant
High
PTA Risk
Based on 9 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month