Prosecution Insights
Last updated: April 19, 2026
Application No. 18/008,240

ASSOCIATION OF NETWORK IDENTITIES AND UNIFIED ACCESS CONTROL PARAMETERS

Non-Final OA §103§112
Filed
Dec 05, 2022
Examiner
KWAK, JAEYOUNG
Art Unit
2472
Tech Center
2400 — Computer Networks
Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
OA Round
3 (Non-Final)
82%
Grant Probability
Favorable
3-4
OA Rounds
3y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 82% — above average
82%
Career Allow Rate
9 granted / 11 resolved
+23.8% vs TC avg
Strong +29% interview lift
Without
With
+28.6%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
36 currently pending
Career history
47
Total Applications
across all art units

Statute-Specific Performance

§101
7.4%
-32.6% vs TC avg
§103
61.5%
+21.5% vs TC avg
§102
22.7%
-17.3% vs TC avg
§112
6.7%
-33.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 11 resolved cases

Office Action

§103 §112
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Arguments Applicant’s Amendments and Arguments filed 12/31/2025 have been considered for examination. Claims 1-6, 8-16, 18-20, and 27-28 are pending in the instant application. With regard to the 103 rejections, Applicant’s arguments filed 12/31/2025 (see pages 10-12 of Remarks) in view of the amendments have been fully considered but are not persuasive. However, since Applicant’s amendments changed the scope, the new ground(s) of rejection is presented in the instant Office Action. Regarding claims 1, 11, and 27, Applicant argued: Regarding the amends claim 1, recited as “receiving a broadcast message comprising … transmitting a message to the network node including an index associated with the NPN,” combination of Shih and Peyman (will be replaced by his last name, Talebi Frad) fails to teach “responsive to determining that the one or more access barring parameters … including an index associated with the NPN.” Further, Shih fails to teach or suggest "responsive to determining that the communication device is allowed to access the NPN based on the access barring parameter, transmitting a message to the network node including the index associated with the NPN." Instead, although Talebi Frad teaches that "the UE can determine or configure the access parameters based on the NPN ID or the PLMN ID corresponding to the NPN ID list," Talebi Frad is silent regarding transmitting a message including an index associated with an NPN to a network node in response to determining an access barring parameter being specific to a PLMN which PLMN ID corresponds to a PLMN portion of an ID of the NPN. In response to Applicant’s argument, Examiner respectfully disagrees. Applicant argue that combination of Shih and Peyman fail to teach or suggest the part of the claim 1, recited as “responsive to determining that that the one or more access barring parameters are specific to the PLMN … transmitting a message to the network node including an index associated with the NPN.” However, Examiner respectfully disagrees. First, Shih discloses that “the PLMN ID associated with PLMN … a PLMN portion of an ID of the NPN.” In Paragraphs [0007]-[0008], Shih teaches that NPN ID in NPN ID list includes PLMN ID identifying PLMN and CAG (Cell Access Group) ID identifying the CAG belonging to the PLMN and the NPN information including NPN ID list is received by UE via system information block type 1 (SIB1) broadcasted by a Cell. Thus, Shih disclose the NPN ID includes the PLMN ID and CAG ID and it is broadcasted by a Cell. Further, Talebi Frad in Paragraph [0348], teaches that the access barring information comprises an access category, access class, an access identity associated with CAG ID (CAG ID per PLMN as described in Paragraph [0298]) that is broadcasted by wireless network (the SIB1 message in RRC signaling described in [0323]-[0324]). Further, Talebi Frad, in Paragraph [0348], teaches that wireless device (UE) determines one or more authorized CAG IDs that the wireless device is authorized to access the wireless network and that is associated with PLMN (in Paragraph [0298]). after the wireless device may determine the first CAG ID that is allowed to access the network, the wireless device may send an access request associated with a second CAG ID of the one or more authorized CAG IDs, in response to the barring decision indicating to bar the access attempt associated with the first CAG ID. Here, the access request message is transmitted to wireless network with the associated CAG ID, where the CAG ID is associated with the corresponding PLMN ID in NPN ID (in Paragraphs [0298]. Also, Shih described in the above). Thus, Shih and Talebi Frad clearly disclose “responsive to determining that that the one or more access barring parameters … to the network node including an index associated with the NPN.” Therefore, clearly combination of Shih and Talebi Frad discloses the amended claim 1 and by the similar reasoning, the amended claims 11 and 27 are disclosed by the combination, too. However, since the scopes or limitations of the claim 1, 11, and 27 have been changed by Applicant’s amendments, the new ground(s) of rejection is presented in the instant Office Action. Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 12/31/2025 has been entered. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 3-6, 13-16, and 28 rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Claim 3 the claim recites “a list of PLMN identities”. It is unclear whether the PLMN ID of claim 1 is includes in the list of PLMN identities or they are separate. Further, Claim 3 recites “determining an index associated with an identity of the NPN”. Claim 1 recites “transmitting… an index associated with the NPN”. It is unclear whether this is the same index or a different index. In addition, Claim 3 recites “determining an identity of the PLMN that includes the NPN”. It is unclear whether there is a separate determining step or related to the determination of the PLMN ID that is barring parameters are specific towards. Claim 4 recites “the SIB including access parameters…” It is unclear from the scope of the claim whether these are the same access parameters claimed in claim 1. Further, Claim 4 recites “a list of PLMN identifiers”. It is unclear whether these identifiers are the same as the PLMN identification that is recited in claim 1. Claims 5 and 6 recite “the SIB including access parameters…” it is unclear from the scope of the claim whether these are the same access parameters claimed in claim 1. Claim 13 the claim recites “a list of PLMN identities”. It is unclear whether the PLMN ID of claim 11 is includes in the list of PLMN identities or they are separate. Further, Claim 13 recites “determining an index associated with an identity of the NPN”. Claim 11 recites “transmitting… an index associated with the NPN”. It is unclear whether this is the same index or a different index. In addition, Claim 13 recites “determining an identity of the PLMN that includes the NPN”. It is unclear whether there is a separate determining step or related to the determination of the PLMN ID that is barring parameters are specific towards. Claim 14 recites “the SIB including access parameters…” It is unclear from the scope of the claim whether these are the same access parameters claimed in claim 11. Further, Claim 14 recites “a list of PLMN identifiers”. It is unclear whether these identifiers are the same as the PLMN identification that is recited in claim 11. Claims 15 and 16 recite “the SIB including access parameters…” it is unclear from the scope of the claim whether these are the same access parameters claimed in claim 11. Claim 28 the claim recites “a list of PLMN identities”. It is unclear whether the PLMN ID of claim 27 is includes in the list of PLMN identities or they are separate. Further, Claim 28 recites “determining an index associated with an identity of the NPN”. Claim 27 recites “transmitting… an index associated with the NPN”. It is unclear whether this is the same index or a different index. In addition, Claim 28 recites “determining an identity of the PLMN that includes the NPN”. It is unclear whether there is a separate determining step or related to the determination of the PLMN ID that is barring parameters are specific towards. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-3 and 11-13 are rejected under U.S.C. 103 as being unpatentable over Shih Meiju et. al. (Int. Pub. No.: WO 2021057901 A1, hereinafter “Shih”) in a view of Peyman Talebi Fard et. al. (USPub. No: US 20220369206 A1, hereinafter, “Talebi Frad”). Regarding claim 1, Shih teaches that a method of operating a communication device to connect to a non-public network ("NPN") via a network node, the method comprising: the PLMN ID associated with a PLMN and corresponding to a PLMN portion of an ID of the NPN; (Shih, in Paragraphs [0007] and [0008], teaches that for cell selection or reselection, the UE may be provided by the network node to store allowed NPN information that is in form of a Cell Access Group (CAG) ID or in a form of SNPN (standalone NPN) ID list and UE may receive NPN information and area information associated with the NPN information via a SIB (System Information Block) type 1 (SIB1) broadcasted by a cell. The NPN information includes a NPN ID list and the NPN ID in the NPN ID list includes the PLMN ID identifying the selected PLMN and a CAG ID associated with a CAG belonging to the PLMN. Thus, when connecting to a NPN via a network node, the PLMN ID identifying the PLMN is corresponding to a PLMN of the NPN ID.) However, Shih does not explicitly teach that receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; determining that the one or more access barring parameters are not specific to the NPN; responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, transmitting a message to the network node including an index associated with the NPN. Talebi Frad teaches that receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; (Talebi Frad, in Paragraph [0348], teaches that the access barring information comprises an access category, access class, an access identity associated with CAG ID (CAG ID per PLMN as described in Paragraph [0298] that is corresponding to the PLMN ID) that is broadcasted by wireless network (the SIB1 message in RRC signaling described in [0300] and [0323]-[0324]). Thus, via SIB1 broadcasting message, wireless device receives one or more access barring parameters with the CAG ID of the PLMN and the PLMN is identified by the PLMN ID in NPN ID (as described in the above). determining that the one or more access barring parameters are not specific to the NPN; responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, (Talebi Frad, in Paragraph [0348], teaches that based on the received access barring information with CAG ID, wireless device (UE) determines one or more authorized CAG IDs that the wireless device is authorized to access the wireless network and that is associated with PLMN (in Paragraph [0298] and by Shih, the CAG ID is associated with the PLMN identified by PLMN ID in NPN ID). Namely, the wireless device determines a barring decision based on the CAG ID included in the barring information. Then, the access barring information indicating that access associated with the CAG ID is allowed by the wireless network, where the allowance is based on an indication from a network element of the wireless network that the wireless network is not congested or overloaded. Thus, the wireless device determines one or more access barring parameters based on the CAG ID of the PLMN identified the PLMN ID in NPN ID (specific to the PLMN and not specific to the NPN). transmitting a message to the network node including an index associated with the NPN (Talebi Frad, in Paragraph [0348], teaches that after the wireless device determines the first CAG ID that is allowed to access the network, the wireless device may send an access request associated with a second CAG ID of the one or more authorized CAG IDs, in response to the barring decision indicating to bar the access attempt associated with the first CAG ID. Here, the access request message is transmitted by the wireless device to wireless network node with the associated CAG ID, where the CAG ID is associated with the corresponding PLMN ID in NPN ID (in Paragraphs [0298]). Thus, the access request message can be transmitted to the network node including the CAG ID of the PLMN in NPN ID. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih and Talebi Frad to include the technique of receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; determining that the one or more access barring parameters are not specific to the NPN;responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, transmitting a message to the network node including an index associated with the NPN of Talebi Frad in the system of Shih to provide the efficient control method to reduce the load of signaling to overcome a congestion or an overloaded of the wireless network (Talebi Frad, see Paragraphs [0283])). Regarding claim 2, combination of Shih and Talebi Frad teaches the feature defined in the claim 1, -refer to the indicated claim for reference(s). Shih further teaches that wherein receiving the broadcast message comprises receiving a system information block ("SIB"), from the network node (Shih, in Paragraphs [0007] and [0008], teaches that to connect the NPN, the UE may be provided by the network node to store allowed NPN information that is in a form of SNPN (standalone NPN) ID list, to receive NPN information and area information associated with the NPN information via a SIB 1 broadcast, where the NPN information includes an NPN ID list. Therefore, it is clear that the network node may provide the system information block SIB1.). Regarding claim 3, combination of Shih and Talebi Frad teaches the feature defined in the claim 2, -refer to the indicated claim for reference(s). Shih further teaches that wherein the SIB includes a list of NPN identities and a list of PLMN identities, the method further comprises: determining an index associated with an identity of the NPN based on the list of NPN identities, (Shih, in Paragraphs [0007] and [0008], teaches that when the allowed NPN information can be provided in the form of the SNPN ID list via a SIB 1 broadcast by a network node, UE may determine the NPN ID in the SNPN ID list that includes the corresponding PLMN ID and the NID (Network ID), according to the allowed NPN information. Therefore, it is clear that from the network node, via SIB1, UE may receive the NPN ID list that include the corresponding PLMN ID and the NID and based on this information, UE may determine the index of NPN.) and determining an identity of the PLMN that includes the NPN; and determining an index associated with the identity of the PLMN based on the list of PLMN identities. (Shih, in Paragraphs [0007] and [0008], teaches that based on the SNPN ID list, the corresponding PLMN ID and NID can be determined among the list, too, according to the determined NPN ID or NPN among the SNPN ID list. Therefore, it is clear that the PLMN ID or index corresponding to the determined NPN can be determined by UE, based on the determined NPN ID from the SNPN list, since the SNPN ID list can be configured with SNPN ID and its corresponding PLMN ID and the NID.). Regarding claim 11, Shih teaches that a communication device operating to connect to a non- public network ("NPN"), the communication device comprising: processing circuitry; and memory coupled with the processing circuitry, wherein the memory includes instructions that when executed by the processing circuitry causes the communication device to perform operations, the operations comprising: (Shih, in Fig. 6 and in Paragraphs [00245] and [00246], teaches that Fig. 6 shows the simplified structure of the communication device (UE) and in Paragraph [00245], the memory 602 may include computer storage media in the form of volatile and/or non-volatile memory. The memory 602 may be removable, non-removable, or a combination thereof. As illustrated in Figure 6, the memory 602 may store computer-readable and/or computer-executable instructions 614 (e.g., software codes) that are configured to, when executed, cause the processor 608 to perform various functions. The processor 608 (e.g., having processmg circuitry) may include an intelligent hardware device, a Central Processing Unit (CPU), a microcontroller, an ASIC, etc. The processor 608 may include memory. In addition, Shih, in Paragraphs [0007] and [0008], teaches that to connect the NPN, the UE may be provided by the network node to store allowed NPN information that is in a form of SNPN (standalone NPN) ID list, to receive NPN information and area information associated with the NPN information via a SIB (System Information Block) 1 broadcast, where the NPN information includes an NPN ID list. Therefore, it is clear that a communication device (UE) can be composed of the processing circuitry and the memories to perform its operation and can connect to NPN via a network node.) the PLMN ID associated with a PLMN and corresponding to a PLMN portion of an ID of the NPN; (Shih, in Paragraphs [0007] and [0008], teaches that for cell selection or reselection, the UE may be provided by the network node to store allowed NPN information that is in form of a Cell Access Group (CAG) ID or in a form of SNPN (standalone NPN) ID list and UE may receive NPN information and area information associated with the NPN information via a SIB (System Information Block) type 1 (SIB1) broadcasted by a cell. The NPN information includes a NPN ID list and the NPN ID in the NPN ID list includes the PLMN ID identifying the selected PLMN and a CAG ID associated with a CAG belonging to the PLMN. Thus, when connecting to a NPN via a network node, the PLMN ID identifying the PLMN is corresponding to a PLMN of the NPN ID.) However, Shih does not explicitly teach that receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; determining that the one or more access barring parameters are not specific to the NPN; responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, transmitting a message to the network node including an index associated with the NPN. Talebi Frad teaches that receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; (Talebi Frad, in Paragraph [0348], teaches that the access barring information comprises an access category, access class, an access identity associated with CAG ID (CAG ID per PLMN as described in Paragraph [0298] that is corresponding to the PLMN ID) that is broadcasted by wireless network (the SIB1 message in RRC signaling described in [0300] and [0323]-[0324]). Thus, via SIB1 broadcasting message, wireless device receives one or more access barring parameters with the CAG ID of the PLMN and the PLMN is identified by the PLMN ID in NPN ID (as described in the above). determining that the one or more access barring parameters are not specific to the NPN; responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, (Talebi Frad, in Paragraph [0348], teaches that based on the received access barring information with CAG ID, wireless device (UE) determines one or more authorized CAG IDs that the wireless device is authorized to access the wireless network and that is associated with PLMN (in Paragraph [0298] and by Shih, the CAG ID is associated with the PLMN identified by PLMN ID in NPN ID). Namely, the wireless device determines a barring decision based on the CAG ID included in the barring information. Then, the access barring information indicating that access associated with the CAG ID is allowed by the wireless network, where the allowance is based on an indication from a network element of the wireless network that the wireless network is not congested or overloaded. Thus, the wireless device determines one or more access barring parameters based on the CAG ID of the PLMN identified the PLMN ID in NPN ID (specific to the PLMN and not specific to the NPN). transmitting a message to the network node including an index associated with the NPN (Talebi Frad, in Paragraph [0348], teaches that after the wireless device determines the first CAG ID that is allowed to access the network, the wireless device may send an access request associated with a second CAG ID of the one or more authorized CAG IDs, in response to the barring decision indicating to bar the access attempt associated with the first CAG ID. Here, the access request message is transmitted by the wireless device to wireless network node with the associated CAG ID, where the CAG ID is associated with the corresponding PLMN ID in NPN ID (in Paragraphs [0298]). Thus, the access request message can be transmitted to the network node including the CAG ID of the PLMN in NPN ID. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih and Talebi Frad to include the technique of receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; determining that the one or more access barring parameters are not specific to the NPN; responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, transmitting a message to the network node including an index associated with the NPN of Talebi Frad in the system of Shih to provide the efficient control method to reduce the load of signaling to overcome a congestion or an overloaded of the wireless network (Talebi Frad, see Paragraphs [0283])). Regarding claim 12, combination of Shih and Talebi Frad teaches the feature defined in the claim 11, -refer to the indicated claim for reference(s). Shih further teaches that wherein receiving the broadcast message comprises receiving a system information block ("SIB"), from the network node (Shih, in Paragraphs [0007] and [0008], teaches that to connect the NPN, the UE may be provided by the network node to store allowed NPN information that is in a form of SNPN (standalone NPN) ID list, to receive NPN information and area information associated with the NPN information via a SIB 1 broadcast, where the NPN information includes an NPN ID list. Therefore, it is clear that the network node may provide the system information block SIB1.). Regarding claim 13, combination of Shih and Talebi Frad teaches the feature defined in the claim 12, -refer to the indicated claim for reference(s). Shih further teaches that wherein the SIB includes a list of NPN identities and a list of PLMN identities, the operations further comprises: determining an index associated with an identity of the NPN based on the list of NPN identities, (Shih, in Paragraphs [0007] and [0008], teaches that when the allowed NPN information can be provided in the form of the SNPN ID list via a SIB 1 broadcast by a network node, UE may determine the NPN ID in the SNPN ID list that includes the corresponding PLMN ID and the NID (Network ID), according to the allowed NPN information. Therefore, it is clear that from the network node, via SIB1, UE may receive the NPN ID list that include the corresponding PLMN ID and the NID and based on this information, UE may determine the index of NPN.) determining an identity of the PLMN that includes the NPN; and determining an index associated with the identity of the PLMN based on the list of PLMN identities. (Shih, in Paragraphs [0007] and [0008], teaches that based on the SNPN ID list, the corresponding PLMN ID and NID can be determined among the list, too, according to the determined NPN ID or NPN among the SNPN ID list. Therefore, it is clear that the PLMN ID or index corresponding to the determined NPN can be determined by UE, based on the determined NPN ID from the SNPN list, since the SNPN ID list can be configured with SNPN ID and its corresponding PLMN ID and the NID.) Regarding claim 27, Shih teaches that a non-transitory computer readable medium having instructions stored therein that are executable by processing circuitry of a communication device, operating to connect to a nonpublic network ("NPN"), to cause the communication device to perform operations comprising: the PLMN ID associated with a PLMN and corresponding to a PLMN portion of an ID of the NPN; (Shih, in Fig. 6 and in Paragraphs [00245] and [00246], teaches that Fig. 6 shows the simplified structure of the communication device (UE) and in Paragraph [00245], the memory 602 may include computer storage media in the form of volatile and/or non-volatile memory. The memory 602 may be removable, non-removable, or a combination thereof. As illustrated in Figure 6, the memory 602 may store computer-readable and/or computer-executable instructions 614 (e.g., software codes) that are configured to, when executed, cause the processor 608 to perform various functions. The processor 608 (e.g., having processmg circuitry) may include an intelligent hardware device, a Central Processing Unit (CPU), a microcontroller, an ASIC, etc. The processor 608 may include memory. In addition, Shih, in Paragraphs [0007] and [0008], teaches that for cell selection or reselection, the UE may be provided by the network node to store allowed NPN information that is in form of a Cell Access Group (CAG) ID or in a form of SNPN (standalone NPN) ID list and UE may receive NPN information and area information associated with the NPN information via a SIB (System Information Block) type 1 (SIB1) broadcasted by a cell. The NPN information includes a NPN ID list and the NPN ID in the NPN ID list includes the PLMN ID identifying the selected PLMN and a CAG ID associated with a CAG belonging to the PLMN. Thus, when connecting to a NPN via a network node, the PLMN ID identifying the PLMN is corresponding to a PLMN of the NPN ID.) However, Shih does not explicitly teach that receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; determining that the one or more access barring parameters are not specific to the NPN; responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, transmitting a message to the network node including an index associated with the NPN. Talebi Frad teaches that receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; (Talebi Frad, in Paragraph [0348], teaches that the access barring information comprises an access category, access class, an access identity associated with CAG ID (CAG ID per PLMN as described in Paragraph [0298] that is corresponding to the PLMN ID) that is broadcasted by wireless network (the SIB1 message in RRC signaling described in [0300] and [0323]-[0324]). Thus, via SIB1 broadcasting message, wireless device receives one or more access barring parameters with the CAG ID of the PLMN and the PLMN is identified by the PLMN ID in NPN ID (as described in the above). determining that the one or more access barring parameters are not specific to the NPN; responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, (Talebi Frad, in Paragraph [0348], teaches that based on the received access barring information with CAG ID, wireless device (UE) determines one or more authorized CAG IDs that the wireless device is authorized to access the wireless network and that is associated with PLMN (in Paragraph [0298] and by Shih, the CAG ID is associated with the PLMN identified by PLMN ID in NPN ID). Namely, the wireless device determines a barring decision based on the CAG ID included in the barring information. Then, the access barring information indicating that access associated with the CAG ID is allowed by the wireless network, where the allowance is based on an indication from a network element of the wireless network that the wireless network is not congested or overloaded. Thus, the wireless device determines one or more access barring parameters based on the CAG ID of the PLMN identified the PLMN ID in NPN ID (specific to the PLMN and not specific to the NPN). transmitting a message to the network node including an index associated with the NPN (Talebi Frad, in Paragraph [0348], teaches that after the wireless device determines the first CAG ID that is allowed to access the network, the wireless device may send an access request associated with a second CAG ID of the one or more authorized CAG IDs, in response to the barring decision indicating to bar the access attempt associated with the first CAG ID. Here, the access request message is transmitted by the wireless device to wireless network node with the associated CAG ID, where the CAG ID is associated with the corresponding PLMN ID in NPN ID (in Paragraphs [0298]). Thus, the access request message can be transmitted to the network node including the CAG ID of the PLMN in NPN ID. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih and Talebi Frad to include the technique of receiving a broadcast message comprising a public land mobile network ("PLMN") identification ("ID") and one or more access barring parameters; determining that the one or more access barring parameters are not specific to the NPN;responsive to determining that the one or more access barring parameters are not specific to the NPN, determining that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN; and responsive to determining that that the one or more access barring parameters are specific to the PLMN whose PLMN ID corresponds to the PLMN portion of the ID of the NPN, transmitting a message to the network node including an index associated with the NPN of Talebi Frad in the system of Shih to provide the efficient control method to reduce the load of signaling to overcome a congestion or an overloaded of the wireless network (Talebi Frad, see Paragraphs [0283])). Regarding claim 28, combination of Shih and Talebi Frad teaches the feature defined in the claim 27, -refer to the indicated claim for reference(s). Shih further teaches that wherein the broadcast message comprises receiving a system information block ("SIB") from the network node, the SIB including a list of NPN identities and a list of PLMN identities, the operation further comprises: determining an index associated with an identity of the NPN based on the list of NPN identities, (Shih, in Paragraphs [0007] and [0008], teaches that when the allowed NPN information can be provided in the form of the SNPN ID list via a SIB 1 broadcast by a network node, UE may determine the NPN ID in the SNPN ID list that includes the corresponding PLMN ID and the NID (Network ID), according to the allowed NPN information. Therefore, it is clear that from the network node, via SIB1, UE may receive the NPN ID list that include the corresponding PLMN ID and the NID and based on this information, UE may determine the index of NPN.) and determining an identity of the PLMN that includes the NPN; and determining an index associated with the identity of the PLMN based on the list of PLMN identities. (Shih, in Paragraphs [0007] and [0008], teaches that based on the SNPN ID list, the corresponding PLMN ID and NID can be determined among the list, too, according to the determined NPN ID or NPN among the SNPN ID list. Therefore, it is clear that the PLMN ID or index corresponding to the determined NPN can be determined by UE, based on the determined NPN ID from the SNPN list, since the SNPN ID list can be configured with SNPN ID and its corresponding PLMN ID and the NID.). Claims 4-6, 9-10, 14-16, and 19-20 are rejected under U.S.C. 103 as being unpatentable over Shih Meiju et. al. (Int. Pub. No.: WO 2021057901 A1, hereinafter “Shih”) in a view of Peyman Talebi Fard et. al. (USPub. No: US 20220369206 A1, hereinafter, “Talebi Frad”) and further in a view of Gao, Yuan et. al. (Int. Pub. No: WO 2021109390 A1, hereinafter, “Gao”). Regarding claim 4, combination of Shih and Talebi Frad teaches the feature defined in the claim 2, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the SIB includes access barring parameters associated with entries in a list of NPN identifiers and access barring parameters associated with entries in a list of PLMN identifiers, and the method further comprises: determining an index of the PLMN: determining that the index of the NPN is not associated with any access barring parameters; and responsive to determining that the index of the NPN is not associated with any access barring parameters, determining that the index of the PLMN is associated with the one or more access barring parameter. Gao teaches that wherein the SIB includes access barring parameters associated with entries in a list of NPN identifiers and access barring parameters associated with entries in a list of PLMN identifiers, (Gao, in Page 37, Lines 2-3, teaches that the set of access control parameters can be transmitted in a SIB in the first message. In addition, Gao, in Page 34, Lines 4-15, teaches that the set of access control parameters can include a list of barring information set (e.g., uac (unified access control) -BarringinfoSetList). In each barring information set, a barring factor, barring time and a bit string (each bit indicates whether the access is allowed for a certain access identity) can be included. The set of access control parameters can include a common barring information (e.g., uac-BarringForCommon) applicable for all the networks (including PLMN or/and NPN). In this common barring information, a list of access categories with associated barring information set may be included. The set of access control parameters can include a list of barring information for different networks (e.g., uac-BarringPerPLMN-List or/and uac-BarringPerNPN-List). A list of access categories with associated barring information set may be configured for each network. Therefore, it is clear that the access control parameters associated with the entries in the PLMN ID list or the NPN ID list can be transmitted in SIB.) and the method further comprises: determining an index of the PLMN: determining that the index of the NPN is not associated with any access barring parameters; and responsive to determining that the index of the NPN is not associated with any access barring parameters, determining that the index of the PLMN is associated with the one or more access barring parameter (Gao, in Page 34, Lines 31 and in Page 35, Lines 3-22, teaches that the UAC parameters that include barring information representative of assistance information for access category selection are provided together with a bitmap. In some embodiments, a size of the bitmap equals a number of networks sharing a cell, wherein a first bit indicates whether a first network of the number of networks sharing the cell are associated with the barring information representative of the assistance information for access category selection that is configured for the specific network. The leftmost bit can indicate whether the first PLMN in the PLMN-IdentityinfoList or the first NPN in the NPN IdentityinfoList is associated with UAC (Unified Access Control)-AccessCategory1-SelectionAssistanceinfo or not. If a bit in the bit map is set to "1," it can indicate that the corresponding network is associated with UAC-AccessCategory1- SelectionAssistanceinfo. The first UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the first bit with a value of "1." The second UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the second bit with a value of " 1.". The UAC parameters that include barring information representative of the assistance information for access category selection that is configured for the specific network are provided in a list of the assistance information for access category selection that is configured for the specific network, wherein a size of the list is equal to a number of networks sharing a cell and each entry inside the list is present. Therefore, it is clear that the access barring parameters can be represented by either a PLMN ID or a NPN ID and transmitted to the UE with either a PLMN ID or a NPN ID. To access, the UE can select the index among either the PLMN ID list or the NPN ID list and determine the access barring parameters corresponding to the index. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the SIB includes access barring parameters associated with entries in a list of NPN identifiers and access barring parameters associated with entries in a list of PLMN identifiers, and the method further comprises: determining an index of the PLMN: determining that the index of the NPN is not associated with any access barring parameters; and responsive to determining that the index of the NPN is not associated with any access barring parameters, determining that the index of the PLMN is associated with the one or more access barring parameter of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 5, combination of Shih and Talebi Frad teaches the feature defined in the claim 2, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the SIB includes access barring parameters associated with entries in a list of NPN identifiers and access barring parameters associated with entries in a list of PLMN identifiers, and the method further comprises: determining an index of the PLMN. Gao teaches that wherein the SIB includes access barring parameters associated with entries in a list of NPN identifiers and access barring parameters associated with entries in a list of PLMN identifiers, (Gao, in Page 37, Lines 2-3, teaches that the set of access control parameters can be transmitted in a SIB in the first message. In addition, Gao, in Page 34, Lines 4-15, teaches that the set of access control parameters can include a list of barring information set (e.g., uac (unified access control) -BarringinfoSetList). In each barring information set, a barring factor, barring time and a bit string (each bit indicates whether the access is allowed for a certain access identity) can be included. The set of access control parameters can include a common barring information (e.g., uac-BarringForCommon) applicable for all the networks (including PLMN or/and NPN). In this common barring information, a list of access categories with associated barring information set may be included. The set of access control parameters can include a list of barring information for different networks (e.g., uac-BarringPerPLMN-List or/and uac-BarringPerNPN-List). A list of access categories with associated barring information set may be configured for each network. Therefore, it is clear that the access control parameters associated with the entries in the PLMN ID list or the NPN ID list can be transmitted in SIB.) and the method further comprises: determining an index of the PLMN (Gao, in Page 34, Lines 31 and in Page 35, Lines 3-22, teaches that the UAC parameters that include barring information representative of assistance information for access category selection are provided together with a bitmap. In some embodiments, a size of the bitmap equals a number of networks sharing a cell, wherein a first bit indicates whether a first network of the number of networks sharing the cell are associated with the barring information representative of the assistance information for access category selection that is configured for the specific network. The leftmost bit can indicate whether the first PLMN in the PLMN-IdentityinfoList or the first NPN in the NPN IdentityinfoList is associated with UAC (Unified Access Control)-AccessCategory1-SelectionAssistanceinfo or not. If a bit in the bit map is set to "1," it can indicate that the corresponding network is associated with UAC-AccessCategory1- SelectionAssistanceinfo. The first UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the first bit with a value of "1." The second UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the second bit with a value of " 1.". The UAC parameters that include barring information representative of the assistance information for access category selection that is configured for the specific network are provided in a list of the assistance information for access category selection that is configured for the specific network, wherein a size of the list is equal to a number of networks sharing a cell and each entry inside the list is present. Therefore, it is clear that the access barring parameters can be represented by either a PLMN ID or a NPN ID and transmitted to the UE with either a PLMN ID or a NPN ID. To access, the UE can select the index among either the PLMN ID list or the NPN ID list and determine the access barring parameters corresponding to the index. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the SIB includes access barring parameters associated with entries in a list of NPN identifiers and access barring parameters associated with entries in a list of PLMN identifiers, and the method further comprises: determining an index of the PLMN of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 6, combination of Shih and Talebi Frad teaches the feature defined in the claim 2, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the SIB includes access barring parameters associated with entries in a list of PLMN identifiers, and the method further comprises: determining an index of the PLMN and determining that the index of the PLMN is associated with the one or more access barring parameters. Gao teaches that wherein the SIB includes access barring parameters associated with entries in a list of PLMN identifiers, (Gao, in Page 37, Lines 2-3, teaches that the set of access control parameters can be transmitted in a SIB in the first message. In addition, Gao, in Page 34, Lines 4-15, teaches that the set of access control parameters can include a list of barring information set (e.g., uac (unified access control) -BarringinfoSetList). In each barring information set, a barring factor, barring time and a bit string (each bit indicates whether the access is allowed for a certain access identity) can be included. The set of access control parameters can include a common barring information (e.g., uac-BarringForCommon) applicable for all the networks (including PLMN or/and NPN). In this common barring information, a list of access categories with associated barring information set may be included. The set of access control parameters can include a list of barring information for different networks (e.g., uac-BarringPerPLMN-List or/and uac-BarringPerNPN-List). A list of access categories with associated barring information set may be configured for each network. Therefore, it is clear that the access control parameters associated with the entries in the PLMN ID list can be transmitted in SIB.) and the method further comprises: determining an index of the PLMN and determining that the index of the PLMN is associated with the one or more access barring parameters (Gao, in Page 34, Lines 31 and in Page 35, Lines 3-22, teaches that the UAC parameters that include barring information representative of assistance information for access category selection are provided together with a bitmap. In some embodiments, a size of the bitmap equals a number of networks sharing a cell, wherein a first bit indicates whether a first network of the number of networks sharing the cell are associated with the barring information representative of the assistance information for access category selection that is configured for the specific network. The leftmost bit can indicate whether the first PLMN in the PLMN-IdentityinfoList or the first NPN in the NPN IdentityinfoList is associated with UAC (Unified Access Control)-AccessCategory1-SelectionAssistanceinfo or not. If a bit in the bit map is set to "1," it can indicate that the corresponding network is associated with UAC-AccessCategory1- SelectionAssistanceinfo. The first UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the first bit with a value of "1." The second UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the second bit with a value of " 1.". The UAC parameters that include barring information representative of the assistance information for access category selection that is configured for the specific network are provided in a list of the assistance information for access category selection that is configured for the specific network, wherein a size of the list is equal to a number of networks sharing a cell and each entry inside the list is present. Therefore, it is clear that the access barring parameters can be represented by a PLMN ID and transmitted to the UE with a PLMN ID. To access, the UE can select the index among the PLMN ID list and determine the access barring parameters corresponding to the index. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the SIB includes access barring parameters associated with entries in a list of PLMN identifiers, and the method further comprises: determining an index of the PLMN and determining that the index of the PLMN is associated with the one or more access barring parameters of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 9, combination of Shih and Talebi Frad teaches the feature defined in the claim 1, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the ore or more access barring parameter are unified access control ("UAC") parameter. Gao teaches that wherein the one or more access barring parameter are unified access control ("UAC") parameter (Gao, in Page 34, Lines 4-15, teaches that the set of access control parameters include UAC parameters that include barring information representative of a listing of access categories with an associated barring information set that is configured for a specific network. The set of access control parameters can include a list of barring information set (e.g., uac-BarringinfoSetList). In each barring information set, a barring factor, barring time and a bit string (each bit indicates whether the access is allowed for a certain access identity) can be included. The set of access control parameters can include a common barring information (e.g., uac-BarringForCommon) applicable for all the networks (including PLMN or NPN). In this common barring information, a list of access categories with associated barring information set may be included. The set of access control parameters can include a list of barring information for different networks (e.g., uac-BarringPerPLMN-List or/and uac-BarringPerNPN-List). A list of access categories with associated barring information set may be configured for each network. Therefore, it is clear that the parameters of UAC can include access barring parameters representative of a listing of access categories with barring information set that is configured for a specific network. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the one or more access barring parameter are unified access control ("UAC") parameter of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 10, combination of Shih and Talebi Frad teaches the feature defined in the claim 1, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the network node is a radio access network ("RAN") node operating a cell shared by the NPN and the PLMN. Gao teaches that wherein the network node is a radio access network ("RAN") node operating a cell shared by the NPN and the PLMN (Gao, in Page 9, Lines 25-29, in Page 12, Lines 3-11 and Lines 21-22 teaches that a common uac-AccessCategory1-SelectionAssistanceinfo may be applicable for all the networks. A list of uac-AccessCategory1-SelectionAssistanceinfo may be configured and each entry may be associated with a certain network (e.g., NPN or PLMN). Therefore, it is clear that the parameters of UAC can include access barring parameters representative of a listing of access categories with barring information set that is configured for a specific network. The uac-AccessCategory1-SelectionAssistancelnfo for each network can be provided by the network node to UE via SIB 1. The size of the list of uac-AccessCategory1-SelectionAssistancelnfo may equal the number of networks (PLMNs, NPNs or PLMN+NPNs) sharing the cell. Therefore, it is clear that the network node, RAN may operate a cell shared by the NPN and the PLMN. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the network node is a radio access network ("RAN") node operating a cell shared by the NPN and the PLMN of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 14, combination of Shih and Talebi Frad teaches the feature defined in the claim 12, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the SIB includes a first list of access barring parameters associated with NPNs and a second list of access barring parameters associated with PLMNs, and the operations further comprises: determining an index of the PLMN; determining that the index of the NPN is not associated with any access barring parameters in the first list; and responsive to determining that the index of the NPN is not associated with any access barring parameters in the first list, determining that the index of the PLMN is associated with the one or more access barring parameter in the second list. Gao teaches that wherein the SIB includes a first list of access barring parameters associated with NPNs and a second list of access barring parameters associated with PLMNs, (Gao, in Page 37, Lines 2-3, teaches that the set of access control parameters can be transmitted in a SIB in the first message. In addition, Gao, in Page 34, Lines 4-15, teaches that the set of access control parameters can include a list of barring information set (e.g., uac (unified access control) -BarringinfoSetList). In each barring information set, a barring factor, barring time and a bit string (each bit indicates whether the access is allowed for a certain access identity) can be included. The set of access control parameters can include a common barring information (e.g., uac-BarringForCommon) applicable for all the networks (including PLMN or NPN). In this common barring information, a list of access categories with associated barring information set may be included. The set of access control parameters can include a list of barring information for different networks (e.g., uac-BarringPerPLMN-List or/and uac-BarringPerNPN-List). A list of access categories with associated barring information set may be configured for each network. Therefore, it is clear that the access control parameters associated with the entries in the PLMN ID list or/and the NPN ID list can be transmitted via SIB.) and the operations further comprises: determining an index of the PLMN; determining that the index of the NPN is not associated with any access barring parameters in the first list; and responsive to determining that the index of the NPN is not associated with any access barring parameters in the first list, determining that the index of the PLMN is associated with the one or more access barring parameter in the second list (Gao, in Page 34, Lines 31 and in Page 35, Lines 3-22, teaches that the UAC parameters that include barring information representative of assistance information for access category selection are provided together with a bitmap. In some embodiments, a size of the bitmap equals a number of networks sharing a cell, wherein a first bit indicates whether a first network of the number of networks sharing the cell are associated with the barring information representative of the assistance information for access category selection that is configured for the specific network. The leftmost bit can indicate whether the first PLMN in the PLMN-IdentityinfoList or the first NPN in the NPN IdentityinfoList is associated with UAC (Unified Access Control)-AccessCategory1-SelectionAssistanceinfo or not. If a bit in the bit map is set to "1," it can indicate that the corresponding network is associated with UAC-AccessCategory1- SelectionAssistanceinfo. The first UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the first bit with a value of "1." The second UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the second bit with a value of " 1.". The UAC parameters that include barring information representative of the assistance information for access category selection that is configured for the specific network are provided in a list of the assistance information for access category selection that is configured for the specific network, wherein a size of the list is equal to a number of networks sharing a cell and each entry inside the list is present. Therefore, it is clear that the access barring parameters can be represented by either a PLMN ID or a NPN ID and transmitted to the UE with either a PLMN ID or a NPN ID. To access, the UE can select the index among either the PLMN ID list or the NPN ID list and determine the access barring parameters corresponding to the index. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the SIB includes a first list of access barring parameters associated with NPNs and a second list of access barring parameters associated with PLMNs, and the operations further comprises: determining an index of the PLMN; determining that the index of the NPN is not associated with any access barring parameters in the first list; and responsive to determining that the index of the NPN is not associated with any access barring parameters in the first list, determining that the index of the PLMN is associated with the one or more access barring parameter in the second list of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 15, combination of Shih and Talebi Frad teaches the feature defined in the claim 12, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the SIB includes a first list of access barring parameters associated with NPNs and a second list of access barring parameters associated with PLMNs, and and the operations further comprises: determining an index of the PLMN. Gao teaches that wherein the SIB includes a first list of access barring parameters associated with NPNs and a second list of access barring parameters associated with PLMNs, (Gao, in Page 37, Lines 2-3, teaches that the set of access control parameters can be transmitted in a SIB in the first message. In addition, Gao, in Page 34, Lines 4-15, teaches that the set of access control parameters can include a list of barring information set (e.g., uac (unified access control) -BarringinfoSetList). In each barring information set, a barring factor, barring time and a bit string (each bit indicates whether the access is allowed for a certain access identity) can be included. The set of access control parameters can include a common barring information (e.g., uac-BarringForCommon) applicable for all the networks (including PLMN or NPN). In this common barring information, a list of access categories with associated barring information set may be included. The set of access control parameters can include a list of barring information for different networks (e.g., uac-BarringPerPLMN-List or/and uac-BarringPerNPN-List). A list of access categories with associated barring information set may be configured for each network. Therefore, it is clear that the access control parameters associated with the entries in the PLMN ID list or/and the NPN ID list can be transmitted via SIB.) and the operations further comprises: determining an index of the PLMN; (Gao, in Page 34, Lines 31 and in Page 35, Lines 3-22, teaches that the UAC parameters that include barring information representative of assistance information for access category selection are provided together with a bitmap. In some embodiments, a size of the bitmap equals a number of networks sharing a cell, wherein a first bit indicates whether a first network of the number of networks sharing the cell are associated with the barring information representative of the assistance information for access category selection that is configured for the specific network. The leftmost bit can indicate whether the first PLMN in the PLMN-IdentityinfoList or the first NPN in the NPN IdentityinfoList is associated with UAC (Unified Access Control)-AccessCategory1-SelectionAssistanceinfo or not. If a bit in the bit map is set to "1," it can indicate that the corresponding network is associated with UAC-AccessCategory1- SelectionAssistanceinfo. The first UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the first bit with a value of "1." The second UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the second bit with a value of " 1.". The UAC parameters that include barring information representative of the assistance information for access category selection that is configured for the specific network are provided in a list of the assistance information for access category selection that is configured for the specific network, wherein a size of the list is equal to a number of networks sharing a cell and each entry inside the list is present. Therefore, it is clear that the access barring parameters can be represented by either a PLMN ID or a NPN ID and transmitted to the UE with a PLMN ID or a NPN ID. To access, the UE can select the index among either the PLMN ID list or the NPN ID list and determine the access barring parameters corresponding to the index. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the SIB includes a first list of access barring parameters associated with NPNs and a second list of access barring parameters associated with PLMNs, and the operations further comprises: determining an index of the PLMN; of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 16, combination of Shih and Talebi Frad teaches the feature defined in the claim 12, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the SIB includes a list of access barring parameters associated with PLMNs, and the operations further comprises: determining an index of the PLMN; and determining that the index of the PLMN is associated with the access barring parameters in the list. Gao teaches that wherein the SIB includes a list of access barring parameters associated with PLMNs, (Gao, in Page 37, Lines 2-3, teaches that the set of access control parameters can be transmitted in a SIB in the first message. In addition, Gao, in Page 34, Lines 4-15, teaches that the set of access control parameters can include a list of barring information set (e.g., uac (unified access control) -BarringinfoSetList). In each barring information set, a barring factor, barring time and a bit string (each bit indicates whether the access is allowed for a certain access identity) can be included. The set of access control parameters can include a common barring information (e.g., uac-BarringForCommon) applicable for all the networks (including PLMN or NPN). In this common barring information, a list of access categories with associated barring information set may be included. The set of access control parameters can include a list of barring information for different networks (e.g., uac-BarringPerPLMN-List or/and uac-BarringPerNPN-List). A list of access categories with associated barring information set may be configured for each network. Therefore, it is clear that the access control parameters associated with the entries in the PLMN ID list can be transmitted in SIB.) and the operations further comprises: determining an index of the PLMN; and determining that the index of the PLMN is associated with the access barring parameters in the list (Gao, in Page 34, Lines 31 and in Page 35, Lines 3-22, teaches that the UAC parameters that include barring information representative of assistance information for access category selection are provided together with a bitmap. In some embodiments, a size of the bitmap equals a number of networks sharing a cell, wherein a first bit indicates whether a first network of the number of networks sharing the cell are associated with the barring information representative of the assistance information for access category selection that is configured for the specific network. The leftmost bit can indicate whether the first PLMN in the PLMN-IdentityinfoList or the first NPN in the NPN IdentityinfoList is associated with UAC (Unified Access Control)-AccessCategory1-SelectionAssistanceinfo or not. If a bit in the bit map is set to "1," it can indicate that the corresponding network is associated with UAC-AccessCategory1- SelectionAssistanceinfo. The first UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the first bit with a value of "1." The second UAC-AccessCategory 1-SelectionAssistanceinfo in the list may be associated with the network (a PLMN or a NPN) identified by the second bit with a value of " 1.". The UAC parameters that include barring information representative of the assistance information for access category selection that is configured for the specific network are provided in a list of the assistance information for access category selection that is configured for the specific network, wherein a size of the list is equal to a number of networks sharing a cell and each entry inside the list is present. Therefore, it is clear that the access barring parameters can be represented by a PLMN ID and transmitted to the UE with a PLMN ID. To access, the UE can select the index among the PLMN ID list and determine the access barring parameters corresponding to the index. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the SIB includes a list of access barring parameters associated with PLMNs, and the operations further comprises: determining an index of the PLMN; and determining that the index of the PLMN is associated with the access barring parameters in the list of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 19, combination of Shih and Talebi Frad teaches the feature defined in the claim 11, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the one or more access barring parameter are unified access control ("UAC") parameter. Gao teaches that wherein the one or more access barring parameter are unified access control ("UAC") parameter (Gao, in Page 34, Lines 4-15, teaches that the set of access control parameters include UAC parameters that include barring information representative of a listing of access categories with an associated barring information set that is configured for a specific network. The set of access control parameters can include a list of barring information set (e.g., uac-BarringinfoSetList). In each barring information set, a barring factor, barring time and a bit string (each bit indicates whether the access is allowed for a certain access identity) can be included. The set of access control parameters can include a common barring information (e.g., uac-BarringForCommon) applicable for all the networks (including PLMN or NPN). In this common barring information, a list of access categories with associated barring information set may be included. The set of access control parameters can include a list of barring information for different networks (e.g., uac-BarringPerPLMN-List or/and uac-BarringPerNPN-List). A list of access categories with associated barring information set may be configured for each network. Therefore, it is clear that the parameters of UAC can include access barring parameters representative of a listing of access categories with barring information set that is configured for a specific network. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the one or more access barring parameter are unified access control ("UAC") parameter of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Regarding claim 20, combination of Shih and Talebi Frad teaches the feature defined in the claim 11, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein the network node is a radio access network ("RAN") node operating a cell shared by the NPN and the PLMN. Gao teaches that wherein the network node is a radio access network ("RAN") node operating a cell shared by the NPN and the PLMN (Gao, in Page 9, Lines 25-29, in Page 12, Lines 3-11 and Lines 21-22 teaches that a common uac-AccessCategory1-SelectionAssistanceinfo may be applicable for all the networks. A list of uac-AccessCategory1-SelectionAssistanceinfo may be configured and each entry may be associated with a certain network (e.g., NPN or PLMN). Therefore, it is clear that the parameters of UAC can include access barring parameters representative of a listing of access categories with barring information set that is configured for a specific network. The uac-AccessCategory1-SelectionAssistancelnfo for each network can be provided by the network node to UE via SIB 1. The size of the list of uac-AccessCategory1-SelectionAssistancelnfo may equal the number of networks (PLMNs, NPNs or PLMN+NPNs) sharing the cell. Therefore, it is clear that the network node, RAN may operate a cell shared by the NPN and the PLMN. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Gao to include the technique of wherein the network node is a radio access network ("RAN") node operating a cell shared by the NPN and the PLMN of Gao in the system of combination of Shih and Talebi Frad to provide the efficient technique related to giving UAC parameters to a UE capable of performing a barring check based on the received parameters, to achieve greater throughput to allow more users at the same time. (Gao, see Page 1, Lines 14-15 and Page 7, Lines 8-9)). Claims 8 and 18 are rejected under U.S.C. 103 as being unpatentable over Shih Meiju et. al. (Int. Pub. No.: WO 2021057901 A1, hereinafter “Shih”) in a view of Peyman Talebi Fard et. al. (USPub. No: US 20220369206 A1, hereinafter, “Talebi Frad”) and further in a view of Kundan Tiwari et. al. (USPub. No.: US 20200396788 A1, hereinafter “Tiwari”). Regarding claim 8, combination of Shih and Talebi Frad teaches the feature defined in the claim 1, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein transmitting the message comprises: transmitting a radio resource control ("RRC") setup complete message confirming establishment of a RRC connection between the communication device and the NPN, the RRC setup complete message including the index associated with the NPN. Tiwari teaches that wherein transmitting the message comprises: transmitting a radio resource control ("RRC") setup complete message confirming establishment of a RRC connection between the communication device and the NPN, the RRC setup complete message including the index associated with the NPN (Tiwari, in Fig. 14 and Paragraphs [0003] and [256]-[258], teaches that in Fig. 14, in the step 1, the UE (100) has an Allowed CAG (Closed Access Group) list that includes more than one CAG identifier. The UE (100) camps on the CAG cell broadcasting more than one CAG identifiers of a same Public network integrated NPN (it means, the CAG identifier can be considered as the NPN ID, when using PNiNPN (Public Network Integrated Non-Public Network)). More than one broadcasted CAG identifiers are present in the Allowed CAG list. In Step 2-step 3c, the UE (100) initiates the RRC connection establishment procedure and the UE (100) sends all broadcasted CAG identifiers which are present in the Allowed CAG list of the UE (100) during the RRC connection to the NG (New Generation)-RAN (200). The UE (100) sends the RRCConnectionRequest message including the list of CAG IDs (Identities) to the NG-RAN (200) at step 3a. Based on the RRCConnectionRequest, the NG-RAN (200) sends the RRCSetup message to the UE (100) at step 3b. Based on the RRCSetup, the UE (100) sends the RRCSetupComplete message including the list of CAG IDs and NAS (Non-Access Stratum) message to the NG-RAN (200) at step 3c. In an example embodiment, the NAS message is optional. Therefore, it is clear that the RRC setup complete message can be transmitted by the communication device with the NPN ID (in the example, the CAG ID), to confirm the establishment of a RRC connection. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Tiwari to include the technique of wherein transmitting the message comprises: transmitting a radio resource control ("RRC") setup complete message confirming establishment of a RRC connection between the communication device and the NPN, the RRC setup complete message including the index associated with the NPN of Tiwari in the system of combination of Shih and Talebi Frad to provide a secured core network system for supporting a UE accessing CAG cells to protect or improve the privacy of non-public networks related to CAG cells. (Tiwari, see Paragraph [0022])). Regarding claim 18, combination of Shih and Talebi Frad teaches the feature defined in the claim 11, -refer to the indicated claim for reference(s). However, combination of Shih and Talebi Frad does not teach that wherein transmitting the message comprises: transmitting a radio resource control ("RRC") setup complete message confirming establishment of a RRC connection between the communication device and the NPN, the RRC setup complete message including the index associated with the NPN. Tiwari teaches that wherein transmitting the message comprises: transmitting a radio resource control ("RRC") setup complete message confirming establishment of a RRC connection between the communication device and the NPN, the RRC setup complete message including the index associated with the NPN (Tiwari, in Fig. 14 and Paragraphs [0003] and [256]-[258], teaches that in Fig. 14, in the step 1, the UE (100) has an Allowed CAG (Closed Access Group) list that includes more than one CAG identifier. The UE (100) camps on the CAG cell broadcasting more than one CAG identifiers of a same Public network integrated NPN (it means, the CAG identifier can be considered as the NPN ID, when using PNiNPN (Public Network Integrated Non-Public Network)). More than one broadcasted CAG identifiers are present in the Allowed CAG list. In Step 2-step 3c, the UE (100) initiates the RRC connection establishment procedure and the UE (100) sends all broadcasted CAG identifiers which are present in the Allowed CAG list of the UE (100) during the RRC connection to the NG (New Generation)-RAN (200). The UE (100) sends the RRCConnectionRequest message including the list of CAG IDs (Identities) to the NG-RAN (200) at step 3a. Based on the RRCConnectionRequest, the NG-RAN (200) sends the RRCSetup message to the UE (100) at step 3b. Based on the RRCSetup, the UE (100) sends the RRCSetupComplete message including the list of CAG IDs and NAS (Non-Access Stratum) message to the NG-RAN (200) at step 3c. In an example embodiment, the NAS message is optional. Therefore, it is clear that the RRC setup complete message can be transmitted by the communication device with the NPN ID (in the example, the CAG ID), to confirm the establishment of a RRC connection. It would have been obvious for one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine shih, Talebi Frad and Tiwari to include the technique of wherein transmitting the message comprises: transmitting a radio resource control ("RRC") setup complete message confirming establishment of a RRC connection between the communication device and the NPN, the RRC setup complete message including the index associated with the NPN of Tiwari in the system of combination of Shih and Talebi Frad to provide a secured core network system for supporting a UE accessing CAG cells to protect or improve the privacy of non-public networks related to CAG cells. (Tiwari, see Paragraph [0022])). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to JAEYOUNG KWAK whose telephone number is (703)756-1768. The examiner can normally be reached Monday-Friday 9 AM -5 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Kevin Bates can be reached at 571-272-3980. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /JAEYOUNG KWAK/Examiner, Art Unit 2472 /KEVIN T BATES/Supervisory Patent Examiner, Art Unit 2472
Read full office action

Prosecution Timeline

Dec 05, 2022
Application Filed
Mar 10, 2025
Non-Final Rejection — §103, §112
Jun 19, 2025
Response Filed
Sep 28, 2025
Final Rejection — §103, §112
Dec 31, 2025
Request for Continued Examination
Jan 15, 2026
Response after Non-Final Action
Feb 19, 2026
Non-Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12563627
METHOD AND APPARATUS FOR HANDLING USER PLANE IN WIRELESS COMMUNICATION SYSTEM SUPPORTING MR-MC
2y 5m to grant Granted Feb 24, 2026
Patent 12563487
MANAGING FIXED WIRELESS ACCESS FOR EFFICIENT ENERGY USAGE
2y 5m to grant Granted Feb 24, 2026
Patent 12526241
METHOD AND APPARATUS FOR QUANTUM COMPUTING BASED RESOURCE ALLOCATION IN WIRELESS COMMUNICATION SYSTEM
2y 5m to grant Granted Jan 13, 2026
Patent 12526776
METHOD AND DEVICE FOR HARQ-ACK TRANSMISSION IN WIRELESS COMMUNICATION SYSTEM
2y 5m to grant Granted Jan 13, 2026
Study what changed to get past this examiner. Based on 4 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
82%
Grant Probability
99%
With Interview (+28.6%)
3y 2m
Median Time to Grant
High
PTA Risk
Based on 11 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month