Prosecution Insights
Last updated: April 19, 2026
Application No. 18/003,804

SELECTING AN ACTION TO ACHIEVE A TARGET NETWORK CONFIGURATION

Non-Final OA §101§103
Filed
Dec 29, 2022
Examiner
KOWALIK, SKIELER ALEXANDER
Art Unit
2142
Tech Center
2100 — Computer Architecture & Software
Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
OA Round
1 (Non-Final)
22%
Grant Probability
At Risk
1-2
OA Rounds
3y 3m
To Grant
99%
With Interview

Examiner Intelligence

Grants only 22% of cases
22%
Career Allow Rate
2 granted / 9 resolved
-32.8% vs TC avg
Strong +88% interview lift
Without
With
+87.5%
Interview Lift
resolved cases with interview
Typical timeline
3y 3m
Avg Prosecution
25 currently pending
Career history
34
Total Applications
across all art units

Statute-Specific Performance

§101
41.0%
+1.0% vs TC avg
§103
47.2%
+7.2% vs TC avg
§102
4.5%
-35.5% vs TC avg
§112
6.2%
-33.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 9 resolved cases

Office Action

§101 §103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claim 1-18, 20, and 23 are rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea (Mathematical Concept) without significantly more. Regarding claim 1, in Step 1 of the 101 analysis set forth in MPEP 2106, the claim recites a system for determining a variable. A system is one of the four statutory categories of invention. In Step 2a Prong 1 of the 101 analysis set forth in the MPEP 2106, the examiner has determined that the following limitations recite a process that, under the broadest reasonable interpretation, covers a mental process but for recitation of generic computer components: evaluating each of the plurality of proposed actions compared to the target network configuration using a computational argumentation process; (evaluating an action based on an argument is a process of simply evaluating data and making a decision based on that data and is therefore a mental process.) and selecting the preferred action, based on the results of the evaluating. (selecting an action based on an argument is a process of simply evaluating data and making a decision based on that data and is therefore a mental process.) If claim limitations, under their broadest reasonable interpretation, covers performance of the limitations as a mental process but for the recitation of generic computer components, then it falls within the mental process grouping of abstract ideas. According, the claim “recites” an abstract idea. In Step 2a Prong 2 of the 101 analysis set forth in MPEP 2106, the examiner has determined that the following additional elements do not integrate this judicial exception into a practical application: A method performed by a node in a telecommunications network for selecting a preferred action to take from a plurality of proposed actions in order to achieve a target network configuration in the telecommunications network, the method comprising: (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) obtaining (202) the plurality of proposed actions; (Adding insignificant extra-solution activity (mere data gathering) to the judicial exception (MPEP 2106.05(g)) Since the claim does not contain any other additional elements that are indicative of integration into a practical application, the claim is “directed” to an abstract idea. In Step 2b of the 101 analysis set forth in the 2019 PEG, the examiner has determined that the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above, the additional elements (iii) recite generally linking the use of the judicial exception to a particular technological environment or field of use, (vi) recites mere data gathering which is not indicative of significantly more. Considering the additional elements individually and in combination, and the claim as a whole, the additional elements do not provide significantly more than the abstract idea. Therefore, the claim is not patent eligible. Regarding claim 2, it is dependent upon claim 1, and thereby incorporates the limitations of, and corresponding analysis applied to claim 1. Further, claim 2 recites The method of claim 1, wherein the step of evaluating each of the plurality of proposed actions compared to the target network configuration using a computational argumentation process comprises, for each proposed action: determining, according to the computational argumentation process, one or more arguments for the proposed action, wherein the one or more arguments comprise arguments in favour of the proposed action being likely to achieve the target network configuration, and/or arguments against the proposed action being likely to achieve the target network configuration. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 3, it is dependent upon claim 2, and thereby incorporates the limitations of, and corresponding analysis applied to claim 2. Further, claim 3 recites The method of claim 2, wherein the step of obtaining the plurality of proposed actions further comprises obtaining, for each proposed action of the plurality of proposed actions: a prediction of a change in a value of a key performance indicator, KPI, that is predicted to result from the proposed action, and a confidence value reflecting a confidence in the respective prediction; (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) and wherein the step of determining one or more arguments comprises determining a first argument based on the obtained prediction and the corresponding confidence values. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 4, it is dependent upon claim 3, and thereby incorporates the limitations of, and corresponding analysis applied to claim 3. Further, claim 4 recites The method of claim 3, wherein the first argument comprises: an argument in favor of the proposed action if the obtained prediction of the change in the value of the KPI suggests that the outcome of the proposed action will change the KPI in a direction consistent with the target network configuration; or an argument against the proposed action if the obtained prediction of the change in value of the KPI suggests that the outcome of the proposed action will change the KPI in a direction inconsistent with the target network configuration. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 5, it is dependent upon claim 3, and thereby incorporates the limitations of, and corresponding analysis applied to claim 3. Further, claim 5 recites The method of claim 3, wherein the first argument comprises an argument against the proposed action if the KPI can be shown to be unaffected by the proposed action. (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 6, it is dependent upon claim 2, and thereby incorporates the limitations of, and corresponding analysis applied to claim 2. Further, claim 6 recites The method of claim 2, wherein the step of obtaining the plurality of proposed actions further comprises obtaining, for each proposed action of the plurality of proposed actions: a feasibility parameter related to a feasibility of the proposed action; (Adding insignificant extra-solution activity (mere data gathering) to the judicial exception (MPEP 2106.05(g)) and wherein the step of determining one or more arguments comprises determining a second argument based on the feasibility parameter. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 7, it is dependent upon claim 6, and thereby incorporates the limitations of, and corresponding analysis applied to claim 6. Further, claim 7 recites The method of claim 6, wherein the second argument comprises an argument in favor of the proposed action if the feasibility parameter indicates that the proposal is feasible; or an argument against the proposed action if the feasibility parameter indicates that the proposal is unfeasible. (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 8, it is dependent upon claim 1, and thereby incorporates the limitations of, and corresponding analysis applied to claim 1. Further, claim 8 recites The method of claim 1, wherein the step of obtaining the plurality of proposed actions comprises requesting a model to predict an action that will achieve the target network configuration. (Adding insignificant extra-solution activity (mere data gathering) to the judicial exception (MPEP 2106.05(g)) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 9, it is dependent upon claim 2, and thereby incorporates the limitations of, and corresponding analysis applied to claim 2. Further, claim 9 recites The method of claim 2, wherein the step of obtaining the plurality of proposed actions comprises requesting a model to predict an action that will achieve the target network configuration, obtaining the plurality of proposed actions further comprises obtaining an indication of an accuracy of the model that predicted the proposed action, and; (Adding insignificant extra-solution activity (mere data gathering) to the judicial exception (MPEP 2106.05(g)) the step of determining one or more arguments comprises determining a third argument based on the indication of accuracy of the model. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 10, it is dependent upon claim 9, and thereby incorporates the limitations of, and corresponding analysis applied to claim 9. Further, claim 10 recites The method of claim 9, wherein the third argument comprises an argument in favor of the proposed action if the indication of accuracy suggests that the model that predicted the proposed action historically has an accuracy greater than a threshold accuracy level; (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) or an argument against the proposed action if the indication of accuracy suggests that the model that predicted the proposed action historically has an accuracy less than a threshold accuracy level. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 11, it is dependent upon claim 2, and thereby incorporates the limitations of, and corresponding analysis applied to claim 2. Further, claim 11 recites The method of claim 2 wherein the one or more arguments are hierarchically linked such that the one or more arguments comprise: a first subset of the one or more arguments that directly support the proposed action, and a second subset of the one or more arguments that support the first subset of the one or more arguments; and/or a third subset of the one or more arguments that directly oppose the proposed action, and a fourth subset of the one or more arguments that support the opposition of the proposed action by the third subset of the one or more arguments. (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 12, it is dependent upon claim 11, and thereby incorporates the limitations of, and corresponding analysis applied to claim 11. Further, claim 12 recites The method of claim11, further comprising: generating a visual representation comprising the one or more arguments, wherein the one or more arguments are arranged in the visual representation so as to indicate the first subset of the one or more arguments, the second subset of the one or more arguments, and a manner in which the first subset of the one or more arguments and the second subset of the one or more arguments are hierarchically linked. (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 13, it is dependent upon claim 2, and thereby incorporates the limitations of, and corresponding analysis applied to claim 2. Further, claim 13 recites The method of claim 2 further comprising determining a weighting representing a strength of each of the one or more arguments for each proposed action. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 14, it is dependent upon claim 13, and thereby incorporates the limitations of, and corresponding analysis applied to claim 13. Further, claim 14 recites The method of claim 13, wherein the step of evaluating each of the plurality of proposed actions compared to the target network configuration using a computational argumentation process further comprises: combining the strengths of each of the one or more arguments for each proposed action, to determine an overall strength for the respective proposed action; and selecting the preferred action, based on the overall strengths of the proposed actions. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 15, it is dependent upon claim 1, and thereby incorporates the limitations of, and corresponding analysis applied to claim 1. Further, claim 15 recites The method of claim 13, wherein the step of evaluating each of the plurality of proposed actions compared to the target network configuration using a computational argumentation process further comprises: combining the strengths of each of the one or more arguments for each proposed action, to determine an overall strength for the respective proposed action; and selecting the preferred action, based on the overall strengths of the proposed actions. (In step 2A, prong 1, this recites an abstract idea but for recitation of generic computer components which is not indicative of integration into a practical application.) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 16, it is dependent upon claim 1, and thereby incorporates the limitations of, and corresponding analysis applied to claim 1. Further, claim 16 recites The method of claim1, wherein the target network configuration is expressed in terms of a set of key performance indicators, KPIs, to be met in the telecommunications network. (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 17, it is dependent upon claim 1, and thereby incorporates the limitations of, and corresponding analysis applied to claim 1. Further, claim 17 recites The method of claim1, further comprising: performing the preferred action. (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claim 20, it is dependent upon claim 1, and thereby incorporates the limitations of, and corresponding analysis applied to claim 1. Further, claim 20 recites A computer program product comprising a computer readable medium, the computer readable medium having computer readable code embodied therein, the computer readable code being configured such that, on execution by a suitable computer or processor, the computer or processor is caused to perform the method of claim 1. (Generally linking the use of the judicial exception to a particular technological environment or field of use (MPEP 2106.05(h)) Since the claim does not recite additional elements that either integrate the judicial exception into a practical application, nor provide significantly more than the judicial exception, the claim is not patent eligible. Regarding claims 18 and 23, they comprise of limitations similar to those of claims 1-2 and are therefore rejected for similar rationale. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1-5, 8-9, 15-17, 18, and 23 are rejected under 35 U.S.C. 103 as being unpatentable over TSAGKARIS et al. (E.P. Pub. No. EP 3295611 B1) in view of RIGOTTI et al. (U.S. Pub. No. US 20200394531 A1). Regarding claim 1, TSAGKARIS teaches the invention as substantially claimed, including: A method performed by a node in a telecommunications network for selecting a preferred action to take from a plurality of proposed actions in order to achieve a target network configuration in the telecommunications network, the method comprising: obtaining the plurality of proposed actions; ([0042] In one embodiment, Q-based Reinforcement Learning is used to obtain the Reinforcement Learning data and recommend actions (i.e., changes in network configuration parameters).) and selecting the preferred action, based on the results of the evaluating. ( [0040] The deep neural network provides the Analyzer with an understanding of the distance between Situation states, and this understanding enables the Analyzer to predict how changes in one or more communications network configuration parameters will enable the communications network to move from one state to another. From all the potential actions, the Analyzer selects an optimal action as described below.) While TSAGKARIS does teach selection a preferred action from a plurality of proposed actions it does not explicitly teach: evaluating each of the plurality of proposed actions compared to the target network configuration using a computational argumentation process; However, in analogous art that similar utilizes neural networks to make a decision on an action to be taken, RIGOTTI teaches: evaluating each of the plurality of proposed actions compared to the target network configuration using a computational argumentation process; ([0032] After the agents identification, the trusted protagonist generates arguments to justify the acceptance of its claim in the interest of its manager and sends them, initiating a dialogue, to the connected trusted antagonists. [0033] Each connected trusted antagonist verifies the compliance of the trusted protagonist's arguments with its claim, within its given constraints and limits, in order to decide on its engagement in a negotiation with the trusted protagonist and so, if positive, becoming a trusted engaged antagonist. [0034] The trusted protagonist and the trusted engaged antagonists, through computational argumentation and inference, possibly using and enriching knowledge models available in a dedicated repository, exchange arguments and counterarguments in order to negotiate the handling of distributed ledger objects, required to obtain their claims.) It would have been obvious to a person skilled in the art before the effective filing date of the invention to have combined with RIGOTTI’s teaching of a computational argumentation process and, with TSAGKARIS’ teaching of a method to choose a proposed action, to realize, with a reasonable expectation of success, a method that chooses a proposed action, as in TSAGKARIS, using a computational computation process, as in RIGOTTI. A person of ordinary skill would have been motivated to make this combination to be prepared to increase efficiency (RIGOTTI [0043]). Regarding claim 2, RIGOTTI further teaches: The method of claim1, wherein the step of evaluating each of the plurality of proposed actions compared to the target network configuration using a computational argumentation process comprises, for each proposed action: determining, according to the computational argumentation process, one or more arguments for the proposed action, wherein the one or more arguments comprise arguments in favour of the proposed action being likely to achieve the target network configuration, and/or arguments against the proposed action being likely to achieve the target network configuration. ([0032] After the agents identification, the trusted protagonist generates arguments to justify the acceptance of its claim in the interest of its manager and sends them, initiating a dialogue, to the connected trusted antagonists. [0033] Each connected trusted antagonist verifies the compliance of the trusted protagonist's arguments with its claim, within its given constraints and limits, in order to decide on its engagement in a negotiation with the trusted protagonist and so, if positive, becoming a trusted engaged antagonist. [0034] The trusted protagonist and the trusted engaged antagonists, through computational argumentation and inference, possibly using and enriching knowledge models available in a dedicated repository, exchange arguments and counterarguments in order to negotiate the handling of distributed ledger objects, required to obtain their claims.) Regarding claim 3, TSAGKARIS further teaches: The method of claim 2, wherein the step of obtaining the plurality of proposed actions further comprises obtaining, for each proposed action of the plurality of proposed actions: a prediction of a change in a value of a key performance indicator, KPI, that is predicted to result from the proposed action, and a confidence value reflecting a confidence in the respective prediction; ([0043] An "action" is a change in one or more communications network configuration parameters. Each row in the table indicates how an action taken in a given Situation is expected to affect KPI values. When an action is actually taken in a Situation, the Analyzer is able to assess how well it predicted the corresponding KPI values (immediately and longer-term) and adjust the deep neural network model accordingly. Over time, this increases the degree of confidence the Analyzer has in the effect an action will have on a Situation (immediately and longer term).) RIGOTTI further teaches: and wherein the step of determining one or more arguments comprises determining a first argument based on the obtained prediction and the corresponding confidence values. ([0029] Each agent executes an application to obtain the claim defined by the manager with its given constraints and limits. This application could be selected from a dedicated application repository.) Regarding claim 4, TSAGKARIS further teaches: The method of claim 3, wherein the first argument comprises: an argument in favor of the proposed action if the obtained prediction of the change in the value of the KPI suggests that the outcome of the proposed action will change the KPI in a direction consistent with the target network configuration; ([0046] The table in Figure 4b is a stochastic matrix with the multi-step transition probabilities among Situations (i.e. the sum probabilities for reaching one Situation (column) from another Situation (row), by taking the steps (actions) shown in the corresponding cells in the table in Figure 4a). The higher the value of the cell, the higher the probability of a successful transition. Cells with values smaller than 0.1 indicate a highly improbable transition. It should be noted that a large number of steps does not necessarily mean small probability and vice versa. For Situations associated with KPIs below a specified threshold, the Analyzer eventually identifies an optimal action for the Situation. An optimal action is one that, with a threshold degree of confidence, will move the communications network from such a Situation to an improved Situation (i.e., a state with better KPI values) by changing only one or a "few" communications network configuration parameters, wherein a "few" may be defined by an administrator of the Analyzer or configurable by a communications network operator. In one embodiment, recommended actions are only those in which a Situation can be improved in one step with a threshold degree of confidence.) or an argument against the proposed action if the obtained prediction of the change in value of the KPI suggests that the outcome of the proposed action will change the KPI in a direction inconsistent with the target network configuration. ([0046] The table in Figure 4b is a stochastic matrix with the multi-step transition probabilities among Situations (i.e. the sum probabilities for reaching one Situation (column) from another Situation (row), by taking the steps (actions) shown in the corresponding cells in the table in Figure 4a). The higher the value of the cell, the higher the probability of a successful transition. Cells with values smaller than 0.1 indicate a highly improbable transition. It should be noted that a large number of steps does not necessarily mean small probability and vice versa. For Situations associated with KPIs below a specified threshold, the Analyzer eventually identifies an optimal action for the Situation. An optimal action is one that, with a threshold degree of confidence, will move the communications network from such a Situation to an improved Situation (i.e., a state with better KPI values) by changing only one or a "few" communications network configuration parameters, wherein a "few" may be defined by an administrator of the Analyzer or configurable by a communications network operator. In one embodiment, recommended actions are only those in which a Situation can be improved in one step with a threshold degree of confidence.) Regarding claim 5, TSAGKARIS further teaches: The method of claim 3, wherein the first argument comprises an argument against the proposed action if the KPI can be shown to be unaffected by the proposed action. ([0046] The table in Figure 4b is a stochastic matrix with the multi-step transition probabilities among Situations (i.e. the sum probabilities for reaching one Situation (column) from another Situation (row), by taking the steps (actions) shown in the corresponding cells in the table in Figure 4a). The higher the value of the cell, the higher the probability of a successful transition. Cells with values smaller than 0.1 indicate a highly improbable transition. It should be noted that a large number of steps does not necessarily mean small probability and vice versa. For Situations associated with KPIs below a specified threshold, the Analyzer eventually identifies an optimal action for the Situation. An optimal action is one that, with a threshold degree of confidence, will move the communications network from such a Situation to an improved Situation (i.e., a state with better KPI values) by changing only one or a "few" communications network configuration parameters, wherein a "few" may be defined by an administrator of the Analyzer or configurable by a communications network operator. In one embodiment, recommended actions are only those in which a Situation can be improved in one step with a threshold degree of confidence.) Regarding claim 8, TSAGKARIS further teaches: The method of claim1, wherein the step of obtaining the plurality of proposed actions comprises requesting a model to predict an action that will achieve the target network configuration. ([0039] The Analyzer uses the statistical model created from unsupervised clustering to predict future Situations that will result in non-normal communications network conditions (step 175). In other words, the Analyzer uses the statistical model to determine whether any Situations associated with non-normal network conditions are likely to arise at some future point. Because of the time component in each row and the segmentation of situations clusters based on the communications network state (e.g., "critical," "poor," "normal," etc.), the system can provide incident detection by time series and regression analysis with constraints/thresholds coming from the human operator. For example, it can predict the value of any KPI in some future time point (e.g., in 1 hour, Monday evening) given some particular communications network parameter configuration and environment condition context and produce a warning after comparing that predicted value against an operator's threshold (e.g., drop call rate < 10%). Thereafter, the Analyzer validates this result using standard hypothesis testing techniques for confidence bands. [0040] The Analyzer then combines the re-trained deep neural network model with the reinforcement learning results to identify one or more changes to network configuration parameters that has at least a threshold probability (e.g., 0.8) of changing the state of the predicted Situation to a normal communications network state while having negligible side effects on the longer-term (i.e., beyond the time frame of the Situation) condition of the communications network (step 180). The deep neural network provides the Analyzer with an understanding of the distance between Situation states, and this understanding enables the Analyzer to predict how changes in one or more communications network configuration parameters will enable the communications network to move from one state to another. From all the potential actions, the Analyzer selects an optimal action as described below.) Regarding claim 9, RIGOTTI further teaches: The method of claim 2, wherein the step of obtaining the plurality of proposed actions comprises requesting a model to predict an action that will achieve the target network configuration, obtaining the plurality of proposed actions further comprises obtaining an indication of an accuracy of the model that predicted the proposed action, and; ([0038] The controller may comprise a long short-term memory (LSTM) network. The controller may comprise a number of controller parameters. The controller may operate a policy (e.g., it may perform a selected operation based on functionality set out in the policy). The controller parameters may influence the policy, such that modifying the parameters may modify the outcome of actions taken by the policy. The controller may be trained by updating the controller parameters. For example, a reward may be established which the controller seeks to maximize, e.g., this may be to reduce a variance associated with a baseline average for the controller. [0045] When a loss function is being minimized, stopping criteria may be introduced. For example, stopping criteria may inhibit a model from being over-trained, e.g., trained too specifically to its training data set that the model struggles to generalize to unseen data. The stopping criteria may include use of a validation data set to identify performance of the model on a separate data set being above a threshold level. For example, stopping criteria may be based on an indication of accuracy for the model, e.g., once above a threshold level, the model may be deemed sufficiently trained.) the step of determining one or more arguments comprises determining a third argument based on the indication of accuracy of the model. ([0029] Each agent executes an application to obtain the claim defined by the manager with its given constraints and limits. This application could be selected from a dedicated application repository.) Regarding claim 15, RIGOTTI further teaches: The method of claim 1, wherein the computational argumentation process comprises a quantitative bipolar argumentation method. ([0038] The present invention has a wide level of industrial applicability in the sectors in which high friendly, natural, argumentative and secure relationship between human to machine and machine to machine are necessary and pure computational inference and artificial intelligence are insufficient and/or inadequate. [0039] The envisaged computational argumentation and inference, root of trust and distributed ledger methodology and systems will contribute to a sustainable society supported by the digital economy. ) Regarding claim 16, TSAGKARIS further teaches: The method of claim 1, wherein the target network configuration is expressed in terms of a set of key performance indicators, KPIs, to be met in the telecommunications network. ([0015] The Analyzer receives as input large amounts of data in a data warehouse from disparate sources, wherein the imported data includes: (1) data related to communications network components (e.g., cell ID, cell location, configuration parameters and associated time stamps; (2) KPI indicators for the communications network and associated time stamps; and) Regarding claim 17, TSAGKARIS further teaches: The method of claim 1, further comprising: performing the preferred action. ([0047] As stated above, an action is a change to one or more communications network configuration parameters. An example of an action is adjusting the antenna tilt of a communications network element. The tilt angle is a network configuration parameter. For instance, the value of the parameter may have three discrete values 0, +15, -15. As part of the Reinforcement Learning process, the system observes and explores the effect on communications network performance when the configuration parameter takes on different values under specific time, location, weather, etc. conditions. In this example, the action involves one network configuration parameter, but other actions could involve changes to multiple network configuration parameters. The Analyzer may use a simulator to simulate possible actions and fine tune the deep neural network and the transition probability matrices, thereby further improving its predictions and recommendations.) Regarding claim 20, RIGOTTI further teaches: A computer program product comprising a computer readable medium, the computer readable medium having computer readable code embodied therein, the computer readable code being configured such that, on execution by a suitable computer or processor, the computer or processor is caused to perform the method of claim1 . ([0098] At least one application selection module 22 to handle an application selection phase to select from at least one applications repository 23 the at least one application to be used by the at least one application processing module 5 to obtain the at least one claim defined with its given constraints and limits. According to the present invention and with reference to FIG. 6, it is possible that the agent's at least one application selection module 22 initiates the application selection phase considering applications available in the at least one applications repository 23 that could be stored by the agent or that could be discovered in or retrieved from external directories or repositories. The application repository 23 could be an application container, providing access to a plurality of software applications, that may include a set of executable applications and a set of associated system files required to execute them like runtime components, such as files, environment variables and libraries, necessary to run the desired software. It is worth to point out that the applications used by the agents could be continuously updated by the agents or by other actors managing the agents repositories or directories.) Regarding claim 18 and 23, they comprise of limitations similar to those of claims 1-2 and are therefore rejected for similar rationale. Claim(s) 6-7 and 10 are rejected under 35 U.S.C. 103 as being unpatentable over TSAGKARIS et al. (E.P. Pub. No. EP 3295611 B1), RIGOTTI et al. (U.S. Pub. No. US 20200394531 A1) in view of BRUNO et al. (U.S. Pub. No. US 20220060966 A1). Regarding claim 6, while TSAGKARIS, as modified by RIGOTTI, does teach claim 2 which claim 6 is dependent upon, it does not explicitly teach: The method of claim 2, wherein the step of obtaining the plurality of proposed actions further comprises obtaining, for each proposed action of the plurality of proposed actions: a feasibility parameter related to a feasibility of the proposed action; However, in analogous art that similarly teaches using a neural network to make a decision, BRUNO teaches: The method of claim 2, wherein the step of obtaining the plurality of proposed actions further comprises obtaining, for each proposed action of the plurality of proposed actions: a feasibility parameter related to a feasibility of the proposed action; ([0024] According to examples of the present disclosure, the method may further comprise using the parameter to evaluate the feasibility of a potential new path between microwave nodes in the microwave network in the event of a change in the link topology of the microwave network.) It would have been obvious to a person skilled in the art before the effective filing date of the invention to have combined with BRUNO’s teaching of a feasibility parameter and, with TSAGKARIS’, as modified by RIGOTTI, teaching of a method to choose a proposed action, to realize, with a reasonable expectation of success, a method that chooses a proposed action, as in TSAGKARIS as modified by RIGOTTI, using a feasibility parameter, as in BRUNO. A person of ordinary skill would have been motivated to make this combination to be reduce costs (BRUNO [0003]). RIGOTTI further teaches: and wherein the step of determining one or more arguments comprises determining a second argument based on the feasibility parameter. ([0029] Each agent executes an application to obtain the claim defined by the manager with its given constraints and limits. This application could be selected from a dedicated application repository.) Regarding claim 7, BRUNO further teaches: The method of claim6, wherein the second argument comprises an argument in favor of the proposed action if the feasibility parameter indicates that the proposal is feasible; ([0025] According to examples of the present disclosure, using the parameter quantifying, for a microwave node in the microwave network, the extent to which the microwave path associated with the microwave node is reconfigurable, to evaluate the feasibility of a potential new path between microwave nodes in the microwave network may comprises identifying a change in the link topology of the microwave network. Using the parameter may further comprise identifying a path between first and second microwave nodes in the microwave network, which path is impacted by the change in topology, the path comprising at least one microwave link, identifying a potential new path between the first and second microwave nodes, which path maintains connectivity between the first and second nodes in the changed link topology, and evaluating the feasibility of the potential new path on the basis of parameters quantifying the extent to which the microwave paths associated with the first and second microwave nodes are reconfigurable. [0026] According to examples of the present disclosure, the method may further comprise, if the potential new path between the first and second microwave nodes is evaluated as feasible, instructing the first and second microwave nodes to reconfigure their associated microwave paths to form the potential new path.) or an argument against the proposed action if the feasibility parameter indicates that the proposal is unfeasible. ([0025] According to examples of the present disclosure, using the parameter quantifying, for a microwave node in the microwave network, the extent to which the microwave path associated with the microwave node is reconfigurable, to evaluate the feasibility of a potential new path between microwave nodes in the microwave network may comprises identifying a change in the link topology of the microwave network. Using the parameter may further comprise identifying a path between first and second microwave nodes in the microwave network, which path is impacted by the change in topology, the path comprising at least one microwave link, identifying a potential new path between the first and second microwave nodes, which path maintains connectivity between the first and second nodes in the changed link topology, and evaluating the feasibility of the potential new path on the basis of parameters quantifying the extent to which the microwave paths associated with the first and second microwave nodes are reconfigurable. [0026] According to examples of the present disclosure, the method may further comprise, if the potential new path between the first and second microwave nodes is evaluated as feasible, instructing the first and second microwave nodes to reconfigure their associated microwave paths to form the potential new path.) Regarding claim 10, BRUNO further teaches: The method of claim 9, wherein the third argument comprises an argument in favor of the proposed action if the indication of accuracy suggests that the model that predicted the proposed action historically has an accuracy greater than a threshold accuracy level; ([0025] According to examples of the present disclosure, using the parameter quantifying, for a microwave node in the microwave network, the extent to which the microwave path associated with the microwave node is reconfigurable, to evaluate the feasibility of a potential new path between microwave nodes in the microwave network may comprises identifying a change in the link topology of the microwave network. Using the parameter may further comprise identifying a path between first and second microwave nodes in the microwave network, which path is impacted by the change in topology, the path comprising at least one microwave link, identifying a potential new path between the first and second microwave nodes, which path maintains connectivity between the first and second nodes in the changed link topology, and evaluating the feasibility of the potential new path on the basis of parameters quantifying the extent to which the microwave paths associated with the first and second microwave nodes are reconfigurable. [0026] According to examples of the present disclosure, the method may further comprise, if the potential new path between the first and second microwave nodes is evaluated as feasible, instructing the first and second microwave nodes to reconfigure their associated microwave paths to form the potential new path.) or an argument against the proposed action if the indication of accuracy suggests that the model that predicted the proposed action historically has an accuracy less than a threshold accuracy level. ([0025] According to examples of the present disclosure, using the parameter quantifying, for a microwave node in the microwave network, the extent to which the microwave path associated with the microwave node is reconfigurable, to evaluate the feasibility of a potential new path between microwave nodes in the microwave network may comprises identifying a change in the link topology of the microwave network. Using the parameter may further comprise identifying a path between first and second microwave nodes in the microwave network, which path is impacted by the change in topology, the path comprising at least one microwave link, identifying a potential new path between the first and second microwave nodes, which path maintains connectivity between the first and second nodes in the changed link topology, and evaluating the feasibility of the potential new path on the basis of parameters quantifying the extent to which the microwave paths associated with the first and second microwave nodes are reconfigurable. [0026] According to examples of the present disclosure, the method may further comprise, if the potential new path between the first and second microwave nodes is evaluated as feasible, instructing the first and second microwave nodes to reconfigure their associated microwave paths to form the potential new path.) Claim(s) 11-12 are rejected under 35 U.S.C. 103 as being unpatentable over TSAGKARIS et al. (E.P. Pub. No. EP 3295611 B1), RIGOTTI et al. (U.S. Pub. No. US 20200394531 A1) in view of FILIPPOVA et al. (U.S. Pub. No. US 20190287649 A1). Regarding claim 11, while TSAGKARIS, as modified by RIGOTTI, does teach claim 2 which claim 11 is dependent upon, it does not explicitly teach: The method of claim 2 wherein the one or more arguments are hierarchically linked such that the one or more arguments comprise: a first subset of the one or more arguments that directly support the proposed action, and a second subset of the one or more arguments that support the first subset of the one or more arguments; and/or a third subset of the one or more arguments that directly oppose the proposed action, and a fourth subset of the one or more arguments that support the opposition of the proposed action by the third subset of the one or more arguments. However, in analogous art that similarly teaches using a neural network to make a decision, FILIPPOVA teaches: The method of claim 2 wherein the one or more arguments are hierarchically linked such that the one or more arguments comprise: a first subset of the one or more arguments that directly support the proposed action, and a second subset of the one or more arguments that support the first subset of the one or more arguments; ([0215] As disclosed herein, a cross validation procedure partitions the filtered training data into different pairs of a training subset and a validation subset at a predetermined percentage split. For example, the first training subset and first validation subset depicted at step 410 represent an 80:20 split during one fold of a k-fold cross-validation experiment.) and/or a third subset of the one or more arguments that directly oppose the proposed action, and a fourth subset of the one or more arguments that support the opposition of the proposed action by the third subset of the one or more arguments. It would have been obvious to a person skilled in the art before the effective filing date of the invention to have combined with FILIPOVA’s teaching of subsets of data supporting data used to confirm an argument and, with TSAGKARIS’, as modified by RIGOTTI, teaching of a method to choose a proposed action and computational argumentation processes, to realize, with a reasonable expectation of success, a method that chooses a proposed action, as in TSAGKARIS as modified by RIGOTTI, and verifies that choice with subsets of data, as in FILIPOVA. A person of ordinary skill would have been motivated to make this combination to improve accuracy (FILIPPOVA [0004]). Regarding claim 12, FILIPPOVA further teaches: The method of claim 11, further comprising: generating a visual representation comprising the one or more arguments, wherein the one or more arguments are arranged in the visual representation so as to indicate the first subset of the one or more arguments, the second subset of the one or more arguments, and a manner in which the first subset of the one or more arguments and the second subset of the one or more arguments are hierarchically linked. ([0125] In some embodiments, a user may use I/O module 120 to manipulate data that is available either on a local device or can be obtained via a network connection from a remote service device or another user device. For example, I/O module 120 can allow a user to a keyboard or a touchpad to perform data analysis via a graphical user interface (GUI). In some embodiments, a user can manipulate data via voice control. In some embodiments, user authentication is required before a user is granted access to the data being requested.) Claim(s) 13-14 are rejected under 35 U.S.C. 103 as being unpatentable over TSAGKARIS et al. (E.P. Pub. No. EP 3295611 B1), RIGOTTI et al. (U.S. Pub. No. US 20200394531 A1) in further view of BYRON et al. (U.S. Pub. No. US 10726338 B2). Regarding claim 13, while TSAGKARIS, as modified by RIGOTTI, does teach claim 2 which claim 13 is dependent upon, it does not explicitly teach: The method of claim 2 further comprising determining a weighting representing a strength of each of the one or more arguments for each proposed action. However, in analogous art that similarly teaches using a neural network to make a decision, BYRON teaches: The method of claim 2 further comprising determining a weighting representing a strength of each of the one or more arguments for each proposed action. ((paragraph 35, lines 14-28) In the synthesis stage 360, the large number of scores generated by the various reasoning algorithms are synthesized into confidence scores or confidence measures for the various hypotheses. This process involves applying weights to the various scores, where the weights have been determined through training of the statistical model employed by the QA pipeline 300 and/or dynamically updated. For example, the weights for scores generated by algorithms that identify exactly matching terms and synonym may be set relatively higher than other algorithms that are evaluating publication dates for evidence passages. The weights themselves may be specified by subject matter experts or learned through machine learning processes that evaluate the significance of characteristics evidence passages and their relative importance to overall candidate answer generation.) It would have been obvious to a person skilled in the art before the effective filing date of the invention to have combined with BYRON’s teaching of weighting data and, with TSAGKARIS’, as modified by RIGOTTI, teaching of a method to choose a proposed action and computational argumentation processes, to realize, with a reasonable expectation of success, a method that chooses a proposed action using argumentation computational processes, as in TSAGKARIS as modified by RIGOTTI, and weights the arguments generated as data, as in BYRON. A person of ordinary skill would have been motivated to make this combination to improve accuracy (BYRON, Paragraph 23, lines 4-25). Regarding claim 14, BYRON further teaches: The method of claim 13, wherein the step of evaluating each of the plurality of proposed actions compared to the target network configuration using a computational argumentation process further comprises: combining the strengths of each of the one or more arguments for each proposed action, to determine an overall strength for the respective proposed action; ((paragraph 35, lines 29-38) The weighted scores are processed in accordance with a statistical model generated through training of the QA pipeline 300 that identifies a manner by which these scores may be combined to generate a confidence score or measure for the individual hypotheses or candidate answers. This confidence score or measure summarizes the level of confidence that the QA pipeline 300 has about the evidence that the candidate answer is inferred by the input question, i.e. that the candidate answer is the correct answer for the input question.) and selecting the preferred action, based on the overall strengths of the proposed actions. ((paragraph 35, lines 39-54) The resulting confidence scores or measures are processed by a final confidence merging and ranking stage 370 which compares the confidence scores and measures to each other, compares them against predetermined thresholds, or performs any other analysis on the confidence scores to determine which hypotheses/candidate answers are the most likely to be the correct answer to the input question. The hypotheses/candidate answers are ranked according to these comparisons to generate a ranked listing of hypotheses/candidate answers (hereafter simply referred to as “candidate answers”). From the ranked listing of candidate answers, at stage 380, a final answer and confidence score, or final set of candidate answers and confidence scores, are generated and output to the submitter of the original input question via a graphical user interface or other mechanism for outputting information.) Conclusion /SKIELER ALEXANDER KOWALIK/Examiner, Art Unit 4193 Any inquiry concerning this communication or earlier communications from the examiner should be directed to SKIELER A KOWALIK whose telephone number is (571)272-1850. The examiner can normally be reached 8-5. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Mariela D Reyes can be reached at (571)270-1006. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SKIELER ALEXANDER KOWALIK/Examiner, Art Unit 2142 /Mariela Reyes/Supervisory Patent Examiner, Art Unit 2142
Read full office action

Prosecution Timeline

Dec 29, 2022
Application Filed
Jan 09, 2026
Non-Final Rejection — §101, §103 (current)

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
22%
Grant Probability
99%
With Interview (+87.5%)
3y 3m
Median Time to Grant
Low
PTA Risk
Based on 9 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month