Prosecution Insights
Last updated: April 19, 2026
Application No. 18/061,655

SYSTEMS AND METHODS FOR MULTI-OPERATOR PROFILE MANAGEMENT

Non-Final OA §102§103
Filed
Dec 05, 2022
Examiner
DOUGLAS, MICHELE CAMILLE
Art Unit
2646
Tech Center
2600 — Communications
Assignee
Verizon Patent and Licensing Inc.
OA Round
3 (Non-Final)
100%
Grant Probability
Favorable
3-4
OA Rounds
3y 4m
To Grant
99%
With Interview

Examiner Intelligence

Grants 100% — above average
100%
Career Allow Rate
5 granted / 5 resolved
+38.0% vs TC avg
Minimal +0% lift
Without
With
+0.0%
Interview Lift
resolved cases with interview
Typical timeline
3y 4m
Avg Prosecution
32 currently pending
Career history
37
Total Applications
across all art units

Statute-Specific Performance

§101
2.9%
-37.1% vs TC avg
§103
37.9%
-2.1% vs TC avg
§102
49.3%
+9.3% vs TC avg
§112
8.6%
-31.4% vs TC avg
Black line = Tech Center average estimate • Based on career data from 5 resolved cases

Office Action

§102 §103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Amendment This Office Action is in response to applicant’s amendments submitted on February 12, 2026. Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1, 2, 4-9 and 11-20 are rejected under U.S.C. 102(a)(1) as being anticipated by RALEIGH et al. (CA 2786865 A1, hereinafter RALEIGH). Consider Claim 1, RALEIGH discloses a device, comprising: one or more processors configured to: Maintain a plurality of sets of service parameters associated with a plurality of Networks, wherein the plurality of networks include: (Section 0022, Figure 18 is another functional diagram illustrating the device based service processor and the service controller in which the service processor controls the policy implementation for multiple access network modems and technologies in accordance with some embodiments). A first network that includes a first authentication system and a first admin system, and a second network that includes a second authentication system and a second admin system; (Section 0047, figures 43A through 43B are flow diagrams illustrating a flow diagram for a service processor authorization sequence as shown in Figure 43A and a flow diagram for a service controller authorization sequence as shown in Figure 43B in accordance with some embodiments). Receive a first request to register a User Equipment ("UE") with a first network, of the plurality of networks, wherein the first request includes an identifier of the UE; (Section 00423, in some embodiments, provisioning includes assigning, programming or embedding into the device and/or network the information to define the level of service activity, referred to as a service profile, that the device is authorized to receive. In some embodiments, provisioning also includes establishing the device settings and/or network settings to define an ambient activation experience in which the device user receives a set of services after purchasing or otherwise obtaining or installing the device whether the device has or has not been registered and activated with the device user or device owner). Identify, based on the first request, a first set of service parameter associated with the first network; and (section 00178, in some embodiments for the heartbeat function, the service controller 122 verifies that the scheduled agent reports are being received and that the reports are within expected parameters. Section 00217, in some embodiments, a set of traffic shaping policy parameters are applied to the unidentified traffic flow before the flow is identified, and then the traffic shaping policy for the flow is updated when the flow is tagged). Output a first indication, to the first admin system associated with the first network, indicating the identifier of the UE and the identified first set of service parameters, (section 00261, the service control server link can determine when to transmit based potentially on several parameters, such as one or more of: periodic timer trigger, waiting until a certain amount of service usage or traffic usage has occurred, responding to a service agent message, responding to a service agent request, initiated by one or more servers, initiated by a verification error condition, and/or initiated by some other error condition). Wherein the first admin system selects or generates a set of network credentials based on receiving the first indication, (section 00175, an agent self-check can be included in the agent heartbeat service policy implementation verification message, which includes reporting on agent configuration, agent operation, agent code status, agent communication log, agent error flags, and/or other agent associated information potentially hashed, encrypted, signed or otherwise secured in the message (e.g., using a shared secret unique to that agent)). Wherein the first authentication system authenticates the UE based on the first set of network credentials, and (section 00374, Figure 43A, at 4302, the device is in an offline state. At 4304, the service processor of the device collects device service processor credentials and access control integrity information. At 4306, the service processor of the device selects a best network. At 4308, the device connects to an access network. At 4310, the service processor of the device sends an authorization request to the service controller and also sends the credentials and access control integrity information). Wherein the first network provides service to the UE, based on authenticating the UE in accordance with the first set of service parameters; (Section 00528, there is one intermediate networking device account, there can be multiple options for multi-end point device or multi-user operation in which the number of end point devices, number of users or service capabilities for some of the end point devices or users are selectable. These parameters are accommodated by an intermediate networking device service profile that includes the service capabilities that are to be delivered to a multitude of end point devices or users). Receive, from the first admin system associated with the first network, a second request to register the UE with the second network, wherein the second request includes the identifier of the UE; and (section 00179, the first agent is required to respond back with information regarding the operation, configuration, status or behavior of a second agent that is difficult for the first or second agent to respond properly with if the first or second agent is not properly configured, not operating properly, is partially compromised or is entirely compromised. In some embodiments, the agent is required to respond with a response that includes a shared secret. Section 00282, the network control plane servers detect a network connection change from a first network to a second network and initiate the service policy implementation established for the second network. In other embodiments, the device based adaptive policy control agent (e.g., policy control agent 1692 described herein) detects network connection changes from the first network to the second network and implements the service policies established for the second network). Output a second indication, to the second admin system associated with the second network, indicating the identifier of the UE. (Section 00195, a second device agent can confirm the presence of the ATS with a report to a network based server; the second agent or the network server can initiate a reinstall of the ATS if it is missing or is found to be operating improperly; and/or the ATS can be placed in a secure area of the OS so that it cannot be removed or if removed must be replaced for proper device operation to resume). Wherein the second admin system selects or generates a second set of network credentials based on receiving the second indication. (Section 00210, the device 100 is capable of connecting to more than one network and device service policies are potentially changed based on which network the device is connected to at the time. In some embodiments, the network control plane servers detect a network connection change and initiate the service policy implementation established for the second network (see fig. 18 and 19)). Wherein the second admin system outputs the second set of network credentials to the UE via the first admin system associated with the first network, (Section 00282, the network control plane servers detect a network connection change from a first network to a second network and initiate the service policy implementation established for the second network. In other embodiments, the device based adaptive policy control agent (e.g., policy control agent 1692 described herein) detects network connection changes from the first network to the second network and implements the service policies established for the second network. Section 00407, based on the service provider selection, the device credentials and/or service processor are reprogrammed and/or new software is downloaded/installed to activate the device with the selected service provider). Wherein the second network provides access to the UE based on authenticating the UE. (Section 00375, at 4334, the service controller (e.g., service controller 122) receives a device authorization request, verifies device service plan standing, verifies device access control integrity standing, verifies device access control integrity information, verifies service processor heartbeat, and performs various additional service processor integrity checks. At 4336, the service controller determines ,whether the device integrity checks have all passed(see fig 43B). Consider Claim 2, RALEIGH discloses the device of claim 1, wherein the first request includes a set of query terms, wherein identifying the first set of service parameters includes identifying the first set of service parameters based on the set of query terms. (Section 00477, the device credential information can be determined either through the device identification information associated with the access network connection itself, or with the aid of the device in a pre-arranged query-response sequence). Consider Claim 4, RALEIGH discloses the device of claim 1, wherein the first set of service parameters includes a set of Quality of Service ("QoS") parameters implemented by the first network when the UE accesses the first network, and wherein a second set of service parameters associated with the second network include a second set of QoS parameters implemented by the second network when the UE accesses the second network. (Section 00208, the policy control agent performs a service control algorithm to assist in managing overall network capacity or application QoS (Quality of Service). In some embodiments, the policy control agent performs an access network selection algorithm to determine which access network to connect to base on connection options and determined strengths of available wireless networks, network preference or security settings, service usage cost based network preferences, and/or any other criteria). Consider Claim 5, RALEIGH discloses the device of claim 1, wherein the plurality of networks are associated with a plurality of different network operators, wherein the first network is associated with a first network operator and wherein the second network is associated with a different second network operator. (Section 0022, figure 18 is another functional diagram illustrating the device based service processor and the service controller in which the service processor controls the policy implementation for multiple access network modems and technologies in accordance with some embodiments. Section 00142, a second (or first) service monitor agent 1696 and one or more service usage measurement points can be implemented on a modem processor, and a first (or second) service monitor 1696 with one or more service measurement points can be implemented on the main operating system processor 930 for device 100(see fig 18, 19 and 20)). Consider Claim 6, RALEIGH discloses the device of claim 1, wherein the request is received from a home network associated with the UE, wherein the one or more processors are further configured to: Receive, from the first network, the first set of network credentials; and (section 00408, in some embodiments ATS is implemented entirely in the network as described below. At the time of manufacture or at sometime during device distribution, the device master agent programs a unique credential in the device that cannot be re-programmed or removed and that can be recognized and recorded by the network at the time of activation or at some other time. In this manner, even if other, possibly primary, device credentials are reprogrammed or removed, there will still be a credential that is associated with the device master agent). Output the first set of network credentials to the home network, wherein the home network forwards the first set of network credentials to the UE via an over–the-air(OTA) update. (Section 00463, the term credentials generally refer to the set of information parameters that the network and/or device uses to admit the device onto the network and associate it with the appropriate service profile and/or service plan. The credentials can include one or more of the following: phone number, device ID, hardware security device ID, security signatures, IP or MAC address, signature algorithms, passwords, or other secure authorization processes, service provider, OEM, master agent, device distributor, VSP, service processor settings or version, or other information used/required by the network to authorize network admission or activate service. Wireless communication is the transfer of information over distances without physical wires). Consider Claim 7, RALEIGH discloses the device of claim 1, wherein the UE includes a profile repository that maintains one or more profiles that are each associated with one or more respective network credentials, wherein the UE adds the first set of network credentials to the profile repository and further adds the second set of network credentials to a second profile in the profile repository, wherein the UE uses the first profile when authenticating with the first network, and wherein the UE uses the second profile when authenticating with the second network. (Section 00462, once the service profile is created and activated during the activation process, the device credentials and the associated service profile are communicated throughout the necessary network elements so that each element can implement its part of the network portion of the service profile policies. This process of propagating the service profile settings to all the required network equipment components is a portion of what is referred to herein as activation in accordance with some embodiments. Section 00279, the policy management server transmits policies to the service processor via the service control link. In some embodiments, the policy management server manages policy settings on the device in accordance with a device service profile). Consider Claim 8, RALEIGH discloses a non-transitory computer-readable medium, storing a plurality of processor-executable instructions to: maintain a plurality of sets of service parameters associated with a plurality of networks, wherein the plurality of networks include: A first network that includes a first authentication system and a first admin system, and a second network that includes a second authentication system and a second admin system; (Section 0047, figures 43A through 43B are flow diagrams illustrating a flow diagram for a service processor authorization sequence as shown in Figure 43A and a flow diagram for a service controller authorization sequence as shown in Figure 43B in accordance with some embodiments). Receive a first request to register a User Equipment ("UE") with a first network, of the plurality of networks, wherein the first request includes an identifier of the UE; (Section 00423, in some embodiments, provisioning includes assigning, programming or embedding into the device and/or network the information to define the level of service activity, referred to as a service profile, that the device is authorized to receive. In some embodiments, provisioning also includes establishing the device settings and/or network settings to define an ambient activation experience in which the device user receives a set of services after purchasing or otherwise obtaining or installing the device whether the device has or has not been registered and activated with the device user or device owner). Identify, based on the first request, a first set of service parameters, associated with the first network; (section 00178, in some embodiments for the heartbeat function, the service controller 122 verifies that the scheduled agent reports are being received and that the reports are within expected parameters. Section 00217, in some embodiments, a set of traffic shaping policy parameters are applied to the unidentified traffic flow before the flow is identified, and then the traffic shaping policy for the flow is updated when the flow is tagged). Output a first indication, to the first admin system associated with the particular network, indicating the identifier of the UE and the identified first set of service parameters, (section 00261, the service control server link can determine when to transmit based potentially on several parameters, such as one or more of: periodic timer trigger, waiting until a certain amount of service usage or traffic usage has occurred, responding to a service agent message, responding to a service agent request, initiated by one or more servers, initiated by a verification error condition, and/or initiated by some other error condition). Wherein the first admin system selects or generates a first set of network credentials based on receiving the indication, (section 00175, an agent self-check can be included in the agent heartbeat service policy implementation verification message, which includes reporting on agent configuration, agent operation, agent code status, agent communication log, agent error flags, and/or other agent associated information potentially hashed, encrypted, signed or otherwise secured in the message (e.g., using a shared secret unique to that agent)). Wherein the first authentication system authenticates the UE based on the first set of network credentials, and (section 00374, Figure 43A, at 4302, the device is in an offline state. At 4304, the service processor of the device collects device service processor credentials and access control integrity information. At 4306, the service processor of the device selects a best network. At 4308, the device connects to an access network. At 4310, the service processor of the device sends an authorization request to the service controller and also sends the credentials and access control integrity information). Wherein the first network provides service to the UE, UE, based on authenticating the UE, in accordance with the first set of service parameters; (Section 00528, there is one intermediate networking device account, there can be multiple options for multi-end point device or multi-user operation in which the number of end point devices, number of users or service capabilities for some of the end point devices or users are selectable. These parameters are accommodated by an intermediate networking device service profile that includes the service capabilities that are to be delivered to a multitude of end point devices or users). Receive, from the first admin system associated with the first network a second request to register the UE with the second network, wherein the second request includes the identifier of the UE: and (section 00179, the first agent is required to respond back with information regarding the operation, configuration, status or behavior of a second agent that is difficult for the first or second agent to respond properly with if the first or second agent is not properly configured, not operating properly, is partially compromised or is entirely compromised. In some embodiments, the agent is required to respond with a response that includes a shared secret. Section 00282, the network control plane servers detect a network connection change from a first network to a second network and initiate the service policy implementation established for the second network. In other embodiments, the device based adaptive policy control agent (e.g., policy control agent 1692 described herein) detects network connection changes from the first network to the second network and implements the service policies established for the second network). Output a second indication, to the second admin system associated with the second network, indicating the identifier of the UE, (Section 00195, a second device agent can confirm the presence of the ATS with a report to a network based server; the second agent or the network server can initiate a reinstall of the ATS if it is missing or is found to be operating improperly; and/or the ATS can be placed in a secure area of the OS so that it cannot be removed or if removed must be replaced for proper device operation to resume). Wherein the second admin system selects or generates a second set of network credentials based on receiving the second indication. (Section 00210, the device 100 is capable of connecting to more than one network and device service policies are potentially changed based on which network the device is connected to at the time. In some embodiments, the network control plane servers detect a network connection change and initiate the service policy implementation established for the second network (see fig. 18 and 19)). Wherein the second admin system outputs the second set of network credentials to the UE via the first admin system associated with the first network, (Section 00282, the network control plane servers detect a network connection change from a first network to a second network and initiate the service policy implementation established for the second network. In other embodiments, the device based adaptive policy control agent (e.g., policy control agent 1692 described herein) detects network connection changes from the first network to the second network and implements the service policies established for the second network. Section 00407, based on the service provider selection, the device credentials and/or service processor are reprogrammed and/or new software is downloaded/installed to activate the device with the selected service provider). Wherein the second network authenticates the UE based on the second set of network credentials outputted to the UE, and wherein the second network provides access to the UE based on authenticating the UE. (Section 00375, at 4334, the service controller (e.g., service controller 122) receives a device authorization request, verifies device service plan standing, verifies device access control integrity standing, verifies device access control integrity information, verifies service processor heartbeat, and performs various additional service processor integrity checks. At 4336, the service controller determines ,whether the device integrity checks have all passed(see fig 43B). Consider Claim 9, RALEIGH discloses the non-transitory computer-readable medium of claim 8, wherein the first request includes a set of query terms, wherein identifying the first set of service parameters includes identifying the first set of service parameters based on the set of query terms. (Section 00477, the device credential information can be determined either through the device identification information associated with the access network connection itself, or with the aid of the device in a pre-arranged query-response sequence). Consider Claim 11, RALEIGH discloses the non-transitory computer-readable medium of claim 8, wherein the particular set of service parameters includes a set of Quality of Service ("QoS") parameters implemented by the first network when the UE accesses the first network, and wherein a second set of service parameters associated with the second network include a second set of QoS parameters implemented by the second network when the UE accesses the second network. (Section 00208, the policy control agent performs a service control algorithm to assist in managing overall network capacity or application QoS (Quality of Service). In some embodiments, the policy control agent performs an access network selection algorithm to determine which access network to connect to base on connection options and determined strengths of available wireless networks, network preference or security settings, service usage cost based network preferences, and/or any other criteria). Consider Claim 12, RALEIGH discloses the non-transitory computer-readable medium of claim 8, wherein the plurality of networks is associated with a plurality of different network operators, wherein the first network is associated with a first network operator and wherein the second network is associated with a different second network operator. (Section 0022, Figure 18 is another functional diagram illustrating the device based service processor and the service controller in which the service processor controls the policy implementation for multiple access network modems and technologies in accordance with some embodiments. Section 00142, a second (or first) service monitor agent 1696 and one or more service usage measurement points can be implemented on a modem processor, and a first (or second) service monitor 1696 with one or more service measurement points can be implemented on the main operating system processor 930 for device 100(see fig 18, 19 and 20)). Consider Claim 13, RALEIGH discloses the non-transitory computer-readable medium of claim 8, wherein the first request is received from a home network associated with the UE, wherein the plurality of processor-executable instructions further include processor-executable instructions to: Receive, from the first network, the first set of network credentials; and (Section 00491, in some embodiment, once the activation server has determined the activation information from the device or from a look up based on some aspect of the device credentials, then the activation server initiates the necessary network settings and billing database entries to be programmed by sending the service profile instructions to the network provisioning and activation apparatus and the service plan instructions to the billing system). Output the first set of network credentials to the home network, wherein the master network forwards the first set of network credentials to the UE via an over–the-air(OTA) update. (Section 00494, once the activation server has determined the activation information from the device or from a look up based on son1e aspect of the device credentials, then the activation server causes all the necessary network settings and billing database entries to be configured/programmed by sending the service profile instructions to the network provisioning and activation apparatus and the service plan instructions to the billing system. Wireless communication is the transfer of information over distances without physical wires). Consider Claim 14, RALEIGH discloses the non-transitory computer-readable medium of claim 8, wherein the UE includes a profile repository that maintains one or more profiles that are each associated with one or more respective network credentials, wherein the UE adds the first set of network credentials to the profile repository and further adds the second set of network credentials to a second profile in the profile repository, wherein the UE uses the first profile when authenticating with the first network, and wherein the UE uses the second profile when authenticating with the second network. (Section 00462, once the service profile is created and activated during the activation process, the device credentials and the associated service profile are communicated throughout the necessary network elements so that each element can implement its part of the network portion of the service profile policies. This process of propagating the service profile settings to all the required network equipment components is a portion of what is referred to herein as activation in accordance with some embodiments. Section 00279, the policy management server transmits policies to the service processor via the service control link. In some embodiments, the policy management server manages policy settings on the device in accordance with a device service profile). Consider Claim 15, RALEIGH discloses a method, comprising: maintaining a plurality of sets of service parameters associated with a plurality of networks, wherein the plurality of networks include: A first network that includes a first authentication system and a first admin system, and a second network that includes a second authentication system and a second admin system; (Section 0047, figures 43A through 43B are flow diagrams illustrating a flow diagram for a service processor authorization sequence as shown in Figure 43A and a flow diagram for a service controller authorization sequence as shown in Figure 43B in accordance with some embodiments). Receive a first request to register a User Equipment ("UE") with a first network, of the plurality of networks, wherein the first request includes an identifier of the UE; (Section 00423, in some embodiments, provisioning includes assigning, programming or embedding into the device and/or network the information to define the level of service activity, referred to as a service profile, that the device is authorized to receive. In some embodiments, provisioning also includes establishing the device settings and/or network settings to define an ambient activation experience in which the device user receives a set of services after purchasing or otherwise obtaining or installing the device whether the device has or has not been registered and activated with the device user or device owner). Identify, based on the first request, a first set of service parameters associated with the first network; (section 00178, in some embodiments for the heartbeat function, the service controller 122 verifies that the scheduled agent reports are being received and that the reports are within expected parameters. Section 00217, in some embodiments, a set of traffic shaping policy parameters are applied to the unidentified traffic flow before the flow is identified, and then the traffic shaping policy for the flow is updated when the flow is tagged). Output a first indication, to the first admin system associated with the first network, indicating the identifier of the UE and the identified first set of service parameters, (section 00261, the service control server link can determine when to transmit based potentially on several parameters, such as one or more of: periodic timer trigger, waiting until a certain amount of service usage or traffic usage has occurred, responding to a service agent message, responding to a service agent request, initiated by one or more servers, initiated by a verification error condition, and/or initiated by some other error condition). Wherein the first system selects or generates a set of network credentials based on receiving the first indication, (section 00175, an agent self-check can be included in the agent heartbeat service policy implementation verification message, which includes reporting on agent configuration, agent operation, agent code status, agent communication log, agent error flags, and/or other agent associated information potentially hashed, encrypted, signed or otherwise secured in the message (e.g., using a shared secret unique to that agent)). Wherein the first authentication system authenticates the UE based on the first set of network credentials, and (section 00374, Figure 43A, at 4302, the device is in an offline state. At 4304, the service processor of the device collects device service processor credentials and access control integrity information. At 4306, the service processor of the device selects a best network. At 4308, the device connects to an access network. At 4310, the service processor of the device sends an authorization request to the service controller and also sends the credentials and access control integrity information). Wherein the first network provides service to the UE, UE, based on authenticating the UE, in accordance with the first set of service parameters. (Section 00528, there is one intermediate networking device account, there can be multiple options for multi-end point device or multi-user operation in which the number of end point devices, number of users or service capabilities for some of the end point devices or users are selectable. These parameters are accommodated by an intermediate networking device service profile that includes the service capabilities that are to be delivered to a multitude of end point devices or users). Receiving, from the first admin system associated with the first network, a second request to register the UE with the second network, wherein the second request includes the identifier of the UE; and (section 00179, the first agent is required to respond back with information regarding the operation, configuration, status or behavior of a second agent that is difficult for the first or second agent to respond properly with if the first or second agent is not properly configured, not operating properly, is partially compromised or is entirely compromised. In some embodiments, the agent is required to respond with a response that includes a shared secret. Section 00282, the network control plane servers detect a network connection change from a first network to a second network and initiate the service policy implementation established for the second network. In other embodiments, the device based adaptive policy control agent (e.g., policy control agent 1692 described herein) detects network connection changes from the first network to the second network and implements the service policies established for the second network). Output a second indication, to the second system associated with the second network, indicating the identifier of the UE. (Section 00195, a second device agent can confirm the presence of the ATS with a report to a network based server; the second agent or the network server can initiate a reinstall of the ATS if it is missing or is found to be operating improperly; and/or the ATS can be placed in a secure area of the OS so that it cannot be removed or if removed must be replaced for proper device operation to resume). Wherein the second admin system selects or generates a second set of network credentials based on receiving the second indication. (Section 00210, the device 100 is capable of connecting to more than one network and device service policies are potentially changed based on which network the device is connected to at the time. In some embodiments, the network control plane servers detect a network connection change and initiate the service policy implementation established for the second network (see fig. 18 and 19)). Wherein the UE second admin system outputs the second set of network credentials to the UE via the first admin system associated with the first network: (Section 00282, the network control plane servers detect a network connection change from a first network to a second network and initiate the service policy implementation established for the second network. In other embodiments, the device based adaptive policy control agent (e.g., policy control agent 1692 described herein) detects network connection changes from the first network to the second network and implements the service policies established for the second network. Section 00407, based on the service provider selection, the device credentials and/or service processor are reprogrammed and/or new software is downloaded/installed to activate the device with the selected service provider). Wherein the second network authenticates the UE based on the second set of network credentials outputted to the UE, and wherein the second network provides access to the UE based on authenticating the UE. (Section 00375, at 4334, the service controller (e.g., service controller 122) receives a device authorization request, verifies device service plan standing, verifies device access control integrity standing, verifies device access control integrity information, verifies service processor heartbeat, and performs various additional service processor integrity checks. At 4336, the service controller determines ,whether the device integrity checks have all passed(see fig 43B). Consider Claim 16, RALEIGH discloses the method of claim 15, wherein the first request includes a set of query terms, wherein identifying the first set of service parameters includes identifying the first set of service parameters based on the set of query terms. (Section 00477, the device credential information can be determined either through the device identification information associated with the access network connection itself, or with the aid of the device in a pre-arranged query-response sequence). Consider Claim 17, RALEIGH discloses the method of claim 15, wherein the particular set of service parameters includes a set of Quality of Service ("QoS") parameters implemented by the first network when the UE accesses the first network, and wherein a second set of service parameters associated with the second network include a second set of QoS parameters implemented by the second network when the UE accesses the second network. (Section 00208, the policy control agent performs a service control algorithm to assist in managing overall network capacity or application QoS (Quality of Service). In some embodiments, the policy control agent performs an access network selection algorithm to determine which access network to connect to base on connection options and determined strengths of available wireless networks, network preference or security settings, service usage cost based network preferences, and/or any other criteria). Consider Claim 18, RALEIGH discloses the method of claim 15, wherein the plurality of networks are associated with a plurality of different network operators, wherein the first network is associated with a first network operator and wherein the second network is associated with a different second network operator. (Section 0022, Figure 18 is another functional diagram illustrating the device based service processor and the service controller in which the service processor controls the policy implementation for multiple access network modems and technologies in accordance with some embodiments. Section 00142, a second (or first) service monitor agent 1696 and one or more service usage measurement points can be implemented on a modem processor, and a first (or second) service monitor 1696 with one or more service measurement points can be implemented on the main operating system processor 930 for device 100(see fig 18, 19 and 20)). Consider Claim 19, RALEIGH discloses the method of claim 15, wherein the request is received from a master network associated with the UE, the method further comprising: Receiving, from the first network, the first set of network credentials; and (section 00408, in some embodiments ATS is implemented entirely in the network as described below. At the time of manufacture or at sometime during device distribution, the device n1aster agent programs a unique credential in the device that cannot be re-programmed or removed (or is difficult to re-program or remove) and that can be recognized and recorded by the network at the time of activation or at some other time. In this manner, even if other, possibly primary, device credentials are reprogrammed or removed, there will still be a credential that is associated with the device master agent). Outputting the first set of network credentials to the home network, wherein the home network forwards the first set of network credentials to the UE over–the-air(OTA) update. (Section 00463, the term credentials generally refer to the set of information parameters that the network and/or device uses to admit the device onto the network and associate it with the appropriate service profile and/or service plan. The credentials can include one or more of the following: phone number, device ID, hardware security device ID, security signatures, IP or MAC address, signature algorithms, passwords, or other secure authorization processes, service provider, OEM, master agent, device distributor, VSP, service processor settings or version, or other information used/required by the network to authorize network admission or activate service. Wireless communication is the transfer of information over distances without physical wires). Consider Claim 20, RALEIGH discloses the method of claim 15, wherein the UE includes a profile repository that maintains one or more profiles that are each associated with one or more respective network credentials, wherein the UE adds the set of network credentials to the profile repository and further adds the second set of network credentials to a second profile in the profile repository, wherein the UE uses the first profile when authenticating with the first network, and wherein the UE uses the second profile when authenticating with the second network. (Section 00462, once the service profile is created and activated during the activation process, the device credentials and the associated service profile are communicated throughout the necessary network elements so that each element can implement its part of the network portion of the service profile policies. This process of propagating the service profile settings to all the required network equipment components is a portion of what is referred to herein as activation in accordance with some embodiments. Section 00279, the policy management server transmits policies to the service processor via the service control link. In some embodiments, the policy management server manages policy settings on the device in accordance with a device service profile). Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or non-obviousness. This application currently names joint inventors. In considering patentability of the claims the examiner presumes that the subject matter of the various claims was commonly owned as of the effective filing date of the claimed invention(s) absent any evidence to the contrary. Applicant is advised of the obligation under 37 CFR 1.56 to point out the inventor and effective filing dates of each claim that was not commonly owned as of the effective filing date of the later invention in order for the examiner to consider the applicability of 35 U.S.C. 102(b)(2)(C) for any potential 35 U.S.C. 102(a)(2) prior art against the later invention. Claim 3 and 10 are rejected under U.S.C. 103 as being unpatentable over RALEIGH (CA 2786865 A1, hereinafter RALEIGH) in view of Greene et al. (US 20180376378 A1, hereinafter Greene). Consider Claim 3, the device of claim 2, wherein identifying the particular set of service parameters based on the set of query terms includes utilizing at least one of: Artificial intelligence/machine learning ("AI/ML") techniques, or natural language processing ("NLP") techniques. (Section 00163, it is understood that there are also applications for these various embodiments that do not involve user interfaces. Example of such applications include equipment, apparatus or device for automation, telemetry, sensors, security or surveillance, appliance control, remote machine to machine data connections, certain remote access configurations, two way power metering or control, asset tracking, people tracking or other applications in which a human user interface is not required for device).RALEIGH discloses the invention wherein a human user interface is not required for device in order to provide efficient communication but fail to teach a device that uses artificial intelligence/machine learning techniques, or natural language processing techniques. However, Greene teaches (Section 0070, the system automatically selects at least one resource credential from the one or more resource credentials associated with the generic token based at least on the type of the interaction or the location of the interaction. In one embodiment of the present invention, the system uses an artificial intelligence engine to automatically select the at least one resource credential from the one or more resource credentials associated with the generic token, wherein the artificial intelligence engine may use one or more rules to make the selection). Therefore, it would have been ordinary to one of ordinary skill in the art before the effective filing date of applicant’s claimed invention to have incorporated artificial intelligence utilizing natural language processing teaching of the credential selecting of Greene into the credential selecting of RALEIGH application in order to enable the feature of tracking interactions and dynamically controlling the usage of one or more resource credentials. Additionally, performing interactions via the generic token provides an additional layer of security by preventing misappropriation of resource credentials(see section 0025) of Greene. Consider Claim 10 the non-transitory computer-readable medium of claim 9, wherein identifying the particular set of service parameters based on the set of query terms includes utilizing at least one of: Artificial intelligence/machine learning ("AI/ML") techniques, or natural language processing ("NLP") techniques. (Section 00163, it is understood that there are also applications for these various embodiments that do not involve user interfaces. Example of such applications include equipment, apparatus or device for automation, telemetry, sensors, security or surveillance, appliance control, remote machine to machine data connections, certain remote access configurations, two way power metering or control, asset tracking, people tracking or other applications in which a human user interface is not required for device). RALEIGH discloses the invention but fail to teach a non-transitory computer-readable medium using artificial intelligence/machine learning techniques, or natural language processing techniques. However, Greene teaches (Section 0070, the system automatically selects at least one resource credential from the one or more resource credentials associated with the generic token based at least on the type of the interaction or the location of the interaction. In one embodiment of the present invention, the system uses an artificial intelligence engine to automatically select the at least one resource credential from the one or more resource credentials associated with the generic token, wherein the artificial intelligence engine may use one or more rules to make the selection). Therefore, it would have been ordinary to one of ordinary skill in the art before the effective filing date of applicant’s claimed invention to have incorporated artificial intelligence utilizing natural language processing teaching of the credential selecting of Greene into the credential selecting of RALEIGH application in order to enable the feature of tracking interactions and dynamically controlling the usage of one or more resource credentials. Additionally, performing interactions via the generic token provides an additional layer of security by preventing misappropriation of resource credentials(see section 0025) of Greene. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to MICHELE CAMILLE DOUGLAS whose telephone number is (571)270-0458. The examiner can normally be reached Monday - Friday 6:30 am - 5:00 pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Matthew Anderson can be reached at 571-272-4177. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /MICHELE C DOUGLAS/Examiner, Art Unit 2646 /MATTHEW D. ANDERSON/Supervisory Patent Examiner, Art Unit 2646
Read full office action

Prosecution Timeline

Dec 05, 2022
Application Filed
Jul 01, 2025
Non-Final Rejection — §102, §103
Sep 08, 2025
Interview Requested
Sep 23, 2025
Examiner Interview Summary
Sep 30, 2025
Response Filed
Dec 12, 2025
Final Rejection — §102, §103
Jan 05, 2026
Interview Requested
Feb 03, 2026
Response after Non-Final Action
Feb 12, 2026
Request for Continued Examination
Feb 23, 2026
Response after Non-Final Action
Mar 19, 2026
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12520265
DEVICE DETERMINING METHOD, ELECTRONIC DEVICE,AND COMPUTER-READABLE STORAGE MEDIUM
2y 5m to grant Granted Jan 06, 2026
Study what changed to get past this examiner. Based on 1 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
100%
Grant Probability
99%
With Interview (+0.0%)
3y 4m
Median Time to Grant
High
PTA Risk
Based on 5 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month