Prosecution Insights
Last updated: April 19, 2026
Application No. 18/134,576

Tracking-free chat Connection Mechanism for Use in a Private Communication Architecture

Non-Final OA §112
Filed
Apr 14, 2023
Examiner
SIMITOSKI, MICHAEL J
Art Unit
2493
Tech Center
2400 — Computer Networks
Assignee
Primes Lab Inc.
OA Round
3 (Non-Final)
80%
Grant Probability
Favorable
3-4
OA Rounds
3y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 80% — above average
80%
Career Allow Rate
618 granted / 772 resolved
+22.1% vs TC avg
Strong +29% interview lift
Without
With
+28.6%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
23 currently pending
Career history
795
Total Applications
across all art units

Statute-Specific Performance

§101
9.5%
-30.5% vs TC avg
§103
45.2%
+5.2% vs TC avg
§102
14.7%
-25.3% vs TC avg
§112
20.7%
-19.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 772 resolved cases

Office Action

§112
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION The response filed 12/23/2025 was received and considered. Claims 1-23 are pending. Continued Examination Under 37 CFR 1.114 A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 12/23/2025 has been entered. Response to Arguments Applicant's arguments filed 12/23/2025 have been fully considered but they are not persuasive. Applicant’s remarks (p. 66, a) suggest that the specification supports the term “secure chat portal (SCP)”, citing the specification ¶81 (“The Secure Chat Portal 930 is web accessible on the Public Cloud 900 between any combinations of the user-1 Endpoint 5 devices, a VR goggle 961, a smart phone 963, a Tesla dashboard 964, a pair of AR glasses 965 and user-2 Endpoint devices, a VR goggle 951, a smart phone 953, a Tesla dashboard 954, a pair of AR glasses 955 through the network connection 982 and 981 respectively”), Fig. 9 (“Secure Chat Portal 930”) and that “Wikipedia dated 2007/11/19 states that "Secure messaging is an approach to exchange contents in a protected way partially based on techniques known from the field of secure email." The term "Secure messaging" in Wikipedia corresponds to the term "Secure chat" in the application. "Secure chat" is a term commonly known in the field of online chat rooms and does not require specific definition in the specification”. The Examiner respectfully disagrees. The skill level of an artisan in the art in question is generally high and the prior art comprises separate examples of implementations of, for example, chat programs, P2P communication, authentication, etc. However, the original disclosure provides no specific description of how the claimed secure chat portal is constructed or operated, no protocols or standards used to achieve the claimed SCP, no protocols or standards by which the claimed P2P communication channel “through the SCP” is achieved, no authentication mechanisms used for signing in with the claimed client credential and no examples of existing implementations of those elements such that an ordinarily skilled artisan could make and use the claimed SCP in the context of the claimed invention without undue experimentation. Further, the Examiner respectfully maintains that while “Secure messaging” as a concept was generally taught by Wikipedia and known in the art, such a teaching was not sufficient to enable the claimed SCP to be made and used in the manner claimed. Applicant’s remarks (p. 66, b) argue that the specification supports the term “virtual LAN router” because: “paragraph [0081] recites, "The LAN mode Secure Chatroom-1 927 connects to the Virtual LAN Router-1 902 in the Virtual Private Metaverse-1 950 through the network connection 998, while a Virtual Private Matter Gateway PMG-1 90820 and the Virtual Teleporter-1 928 connecting to the Virtual LAN Router-1 902 through network connection 992, 994 and 996 respectively." and "The Virtual LAN Router-1 902 connects upstream to the Virtual Machine Server-1 931 through the network connection 988." Combined with 902 and 903 in FIG.9, Virtual LAN Router is disclosed to be a role of the intermediary in the connection network. Therefore, Virtual LAN Router is supported by FIG.9 and paragraph [0081]. In addition, Wikipedia dated 2012/07/30 states that " In computer networking, virtual local area network, virtual LAN or VLAN is a concept of partitioning a physical network, so that distinct broadcast domains are created. This is usually achieved on switch or router level." The term "VLAN" corresponds to the term "virtual LAN router" in the application. "Virtual LAN Router" is a term commonly known in the field of online chatrooms and does not require specific definition in the specification”. The Examiner respectfully disagrees. The Examiner appreciates that the term “virtual LAN” was known in the art prior to the invention as a mechanism for organizing network traffic. However, the original disclosure provides no specific description of how the claimed “virtual LAN router” is constructed or operated, does not teach the nature of the linking (“linked”) with the claimed “LAN mode secure chatroom” and “virtual machine server” and no description of how the claimed element functions within the claimed invention such that an ordinarily skilled artisan could make and use the recited virtual LAN router within the invention as a whole without undue experimentation. Applicant’s remarks (p. 67, c) are persuasive. Applicant’s remarks (p. 67, d) argue that the disclosure supports the term “linked” because: “the term "link" described in the Cambridge Dictionary is "a connection between two people, things, or ideas" as a noun and "to make a connection between two or more people, things, or ideas:" as a verb. Therefore, the term "link" may make a connection between two physical or virtual objects, and is not limited by only physical objects (like the term "couple"). Those skilled in the art can understand that the term "link" is used to connect two or more virtual network objects and physical objects, therefore no further explanation is needed for the term "link"”. The Examiner respectfully disagrees. The Examiner appreciates the plain and ordinary definition of “link” and further appreciates the high level of ordinary skill in the instant art. However, the disclosure does not provide description (protocols, prior art examples, published standards, etc.) regarding the steps and structures known in the art that are used to achieve, for example, a physical element such as a virtual local area network (LAN) router being “linked” to intangible elements such as “virtual private metaverse” (VPM) or a “LAN mode secure chatroom”, so that a skilled artisan could achieve the interaction between the elements of the claimed invention. Therefore, the Examiner respectfully maintains that the disclosure does not provide sufficient details regarding the linking of the claimed elements such that an ordinarily skilled artisan could make and use, for example, the recited virtual LAN router linked with the virtual private metaverse and LAN mode secure chatroom in the manner claimed without undue experimentation. Applicant’s remarks (pp. 67-68, e) argue that the disclosure supports the term “LAN mode secure chatroom” because: “paragraph [0020] states, "A LAN mode Secure Chatroom mechanism can be realized to achieve private and secure communication between and among users on the Internet." Combined with 927 and the connection 998 in FIG.9, the term "LAN mode secure chatroom" is disclosed as a chat room for network communication. Therefore, the term "LAN mode secure chatroom" is supported by FIG.9 and paragraph [0020]”. The Examiner respectfully disagrees. The Examiner appreciates the plain and ordinary definition of “chatroom”, local area network (“LAN”) and “secure”, as it applies to the art in question and appreciates the relatively high level of skill and predictability in the art. However, the Examiner respectfully maintains that the disclosure’s recitation that the “LAN mode Secure Chatroom mechanism” is an element that is meant to achieve “private and secure communication between and among users on the Internet” is insufficient in describing the metes and bounds of the claimed LAN mode Secure Chatroom to said ordinarily skilled artisan, so as to enable the artisan to make and use the recited LAN mode Secure Chatroom in the manner claimed without undue experimentation. Applicant’s remarks (p. 68, f) are persuasive. Applicant’s remarks (p. 68, g) are persuasive. Claim Rejections - 35 USC § 112 The following is a quotation of the first paragraph of 35 U.S.C. 112(a): (a) IN GENERAL.—The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor or joint inventor of carrying out the invention. The following is a quotation of the first paragraph of pre-AIA 35 U.S.C. 112: The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor of carrying out his invention. Claims 1-23 are rejected under 35 U.S.C. 112(a) or 35 U.S.C. 112 (pre-AIA ), first paragraph, as failing to comply with the enablement requirement. The claim(s) contains subject matter which was not described in the specification in such a way as to enable one skilled in the art to which it pertains, or with which it is most nearly connected, to make and/or use the invention. Regarding claims 1, 9 and 21, the claims recite “secure chat portal” “(SCP)”. However, the specification does not describe the SCP such that a skilled artisan could make or use the invention. The disclosure does not enable one of ordinary skill in the art to practice the invention without the structure and functionality of the claimed secure chat portal. Claims 2-8, 10-20 and 22-23 inherit the deficiency. Regarding claims 1, 9 and 21, the claims recite “virtual LAN router”. However, the specification does not describe the virtual LAN router such that a skilled artisan could make or use the invention. The disclosure does not enable one of ordinary skill in the art to practice the invention without the structure and functionality of the claimed virtual LAN router. Claims 2-8, 10-20 and 22-23 inherit the deficiency. Regarding claims 1, 9 and 21, the claims recite “LAN mode secure chatroom linked to the virtual LAN router” and “virtual local area network (LAN) router linked to the VMS”. However, the specification does not describe how a physical element such as a virtual local area network (LAN) router is “linked” to intangible elements such as “virtual private metaverse” (VPM) or a “LAN mode secure chatroom”. Regarding claims 1, 9 and 21, the claims recite “LAN mode secure chatroom”. However, the specification does not describe the LAN mode secure chatroom such that a skilled artisan could make or use the invention. The disclosure does not enable one of ordinary skill in the art to practice the invention without the structure and functionality of a LAN mode secure chatroom. Claims 2-8, 10-20 and 22-23 inherit the deficiency. The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 1-8 and 16 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. In claim 1 (p. 53, line 23), “the at least one” should be replaced with “at least one”. Claims 2-8 inherit the deficiency from claim 1. In claim 16 (p. 58, line 12-13), “the virtual private matter gateway” should be replaced with “a virtual private matter gateway”. In claim 16 (p. 58, lines 13), “the virtual teleporter” should be replaced with “a virtual teleporter”. Prior Art The closest prior art: “Peer-to-peer communication in web browsers using WebRTC A detailed overview of WebRTC and what security and network concerns exists” (Jakobsson, Christer) teaches a host (peer) establishing a peer-to-peer (P2P) communication channel between the host and the at least one invitee (another peer) through the SCP (STUN server provides IP and port and a first peer passes connection information to another peer via a signaling server, p. 5, §2.4);the host launching a secure application (peers exchange multimedia information, p. 7, §2.6); the host starting the LAN mode secure application (peers exchange multimedia information, p. 7, §2.6) ; the at least one invitee launching a secure chat application and the at least one invitee signing in the LAN mode secure application with the chatroom credential (peers exchange multimedia information, p. 7, §2.6). US 20130191896 A1 (Adderly; Darryl M. et al.) teaches method for establishing a secure collaboration in a public cloud network (conferencing via clout, Fig. 4, including conferencing system 78, scheduler 80, clients 76 and 90),the public cloud network comprising a an internet ecosystem comprising a secure chat portal (SCP) (conferencing system 78, Fig. 4, N virtual machine servers (VMS) linked to the SCP (virtualization layer uses virtual servers as part of the cloud computing system, ¶53, ¶24), the method comprising: a host sending a client credential (login information sent in a meeting invitation,¶66, ¶¶76-77; credential is required for client to establish a connection, ¶66) to the at least one invitee (sent to output devices, ¶76) through a VMS of the N virtual machine servers (virtualization layer uses virtual servers as part of the cloud computing system, ¶53, ¶24); the host and the at least one invitee signing in with the client credential to the SCP (login information sent in a meeting invitation ,¶66, ¶¶76-77; credential is required for client to establish a connection, ¶66); the host launching a secure chat application (cloud system comprises cloud computing nodes 10, including application programs for their functionality, ¶48); the host starting the LAN mode secure chatroom with a chatroom credential of the LAN mode secure chatroom (start of presentation, ¶67; meeting data includes URL/credential, ¶74); the host sending the chatroom credential to the at least one invitee (login information sent in a meeting invitation, (chatroom identification and chatroom passcode) ¶¶76-77; see also ¶114); the at least one invitee launching a secure chat application (cloud system comprises cloud computing nodes 10, including application programs for their functionality, ¶48); the at least one invitee signing in the LAN mode secure chatroom with the chatroom credential (providing credential for verification, ¶113; URL, credentials and password information is set for an output device/client and a particular meeting, ¶74); and the host authenticating the at least one invitee with the chatroom credential; wherein N is a natural number (verifying credential, ¶113). “Cisco WebEx Meetings” (Verizon) teaches clients logging (using a client credential) into a chat portal (Webex meetings application SignIn, p. 1) and teaches joining a meeting by providing a meeting number to search for a meeting (p. 3, step 2), which can require a password (chatroom credential) to join (p. 5, step 6). US 20230216947 A1 (BERNARDI; ROBERT) teaches establishing a WebRTC P2P connection between peers (Figs. 21-23 and ¶¶451-455). US 8375421 B1 (Shigapov; Andrey et al.) teaches establishing virtual meetings, including a host requesting a virtual meeting room and credentials, the host providing the credentials to a recipient (col. 2, line 50 – col. 3, line 10; see Figs. 1-2 for architecture), where the meeting participants can establish a connection with the virtual meeting room server with using a VPN and virtual IP addresses (col. 6, lines 5-13). Shigapov teaches a public cloud network comprising: a host (master device, col. 2, lines 61-63)); at least one invitee (guest client devices, col. 3, lines 1-2); a public cloud comprising an internet ecosystem comprising: at least one secure chat portal (SCP) (virtual meeting room server, Fig. 2) linked to the host and the at least one invitee (VRS linked to client devices, Fig. 2);; and at least one virtual private metaverse (VPM) comprising: at least one virtual local area network (LAN) router (virtual meeting room server, Fig. 2); and at least one LAN mode secure chatroom linked to the virtual LAN router (virtual meeting room linked to virtual meeting room server, Fig. 2); a peer-to-peer (P2P) communication channel is established between the host and the at least one invitee through the SCP (peer to peer communications through VRS, col. 3, lines 31-36), the host launches a secure chat application, the host starts the LAN mode secure chatroom with a chatroom credential of the LAN mode secure chatroom (master client device requests a virtual meeting room, col. 2, lines 61-63), the host sends the chatroom credential to the at least one invitee (col. 2, line 66 – col. 3, line 2), the at least one invitee launches a secure chat application (guest device receives virtual meeting room client, col. 3, lines 2-5), the at least one invitee signs in the LAN mode secure chatroom with the chatroom credential (devices use credential to authenticate to VRS, col. 3, lines 2-5), and the host authenticates the at least one invitee with the chatroom credential (secure communications are established, col. 3, lines 6-9). US 20210075748 A1 (Agarwal; Pavan et al.) teaches a chat server implemented on a virtual machine server (¶32). US 20230308446 A1 (Tong; Dan et al.) teaches a conferencing server implemented on a virtual machine server (¶37). US 20150092603 A1 (Aguayo; Dan et al.) teaches using virtual LAN routers with a VPN to partition local area networks into VLANs (¶68, ¶¶72-73). Potential Allowable Subject Matter Claims 1-23, as best understood in view of the rejections under 35 U.S.C. 112(a), could be allowable if clarified to overcome the rejections. Particularly, it is suggested that the structure and functionality of the claimed components be recited so as to clarify the metes and bounds of each element of the claims. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to MICHAEL J SIMITOSKI whose telephone number is (571)272-3841. The examiner can normally be reached on Monday - Friday, 7:00-3:00. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Carl Colin can be reached on 571-272-38623862. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /Michael Simitoski/ Primary Examiner, Art Unit 2493 January 14, 2026
Read full office action

Prosecution Timeline

Apr 14, 2023
Application Filed
Mar 04, 2025
Non-Final Rejection — §112
Jun 06, 2025
Response Filed
Jul 24, 2025
Final Rejection — §112
Nov 18, 2025
Response after Non-Final Action
Dec 23, 2025
Request for Continued Examination
Jan 11, 2026
Response after Non-Final Action
Jan 22, 2026
Non-Final Rejection — §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12585782
ENFORCEMENT OF FACTORY-PROVISIONED RESTRICTIONS ON MODIFICATIONS TO IHS HARDWARE
2y 5m to grant Granted Mar 24, 2026
Patent 12585236
SCADA WEB HMI CLIENT DEVICE AND SCADA WEB HMI SYSTEM
2y 5m to grant Granted Mar 24, 2026
Patent 12585768
SYSTEMS AND METHODS FOR TRACKING EXECUTION FLOWS FOR AUTOMATED MALWARE DETECTION
2y 5m to grant Granted Mar 24, 2026
Patent 12579573
SINGLE SIGN-ON THROUGH CUSTOMER AUTHENTICATION SYSTEMS
2y 5m to grant Granted Mar 17, 2026
Patent 12574236
Stateful Hash-Based Signing with a Single Public Key and Multiple Independent Signers
2y 5m to grant Granted Mar 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
80%
Grant Probability
99%
With Interview (+28.6%)
3y 2m
Median Time to Grant
High
PTA Risk
Based on 772 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month