Notice of Pre-AIA or AIA Status
This Non-Final communication is in response to Application No. 18/214,340 filed 06/26/2023. The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claim Rejections - 35 USC § 101
35 U.S.C. 101 reads as follows:
Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.
Claims 1-20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to a
judicial exception (i.e., a law of nature, a natural phenomenon, or an abstract idea) without significantly more.
101 Subject Matter Eligibility Analysis
Step 1: Claims 1-20 are within the four statutory (a process, machine, manufacture or composition of
matter.) Claims 1-10 describe a process and 10-20 describes a machine.
With respect to claim 1:
Step 2A Prong 1: The claim recites an abstract idea enumerated in the 2019 PEG.
sampling the time-series data to generate an anomaly preserving version of the time-series data; (This is an abstract idea of a "Mental Process." The "generate" step under its broadest reasonable interpretation, covers concepts that can be practically performed by a human using a pen and paper.)
generating, …, a reconstructed version of the time- series data based on the anomaly preserving version of the time-series data. (This is an abstract idea of a "Mental Process." The "generating" step under its broadest reasonable interpretation, covers concepts that can be practically performed by a human using a pen and paper.)
Step 2A Prong 2: The judicial exception is not integrated into a practical application
Additional elements:
obtaining a distribution of values of time-series data; (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
via a trained machine learning model (This amounts to no more than mere instructions to “apply” the exception using a generic computer component.)
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly
more than the judicial exception
The additional element “obtaining a distribution of values of time-series data” adds insignificant extra-solution activity to the judicial exception and cannot provide an inventive concept. Storing and retrieving information in memory is directed to a well understood routine conventional activity of data transmission (MPEP 2106.05(d)(II)(iv)).
The additional element “via a trained machine learning model” is recited in a generic level and they represent generic computer components to apply the abstract idea. Mere instructions to apply an exception cannot provide an inventive concept (MPEP 2106.05(f)).
When considered in combination, these additional elements represent insignificant extra-solution activity and mere instructions to apply an expectation, which do not provide an inventive concept.
Therefore, claim 1 is ineligible.
With respect to claim 2:
Step 2A Prong 1: claim 2, which incorporates the rejection of claim 1, does not recite an abstract idea.
Step 2A Prong 2: The judicial exception is not integrated into a practical application.
storing the anomaly preserving version of the time-series data. (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception
The additional element adds insignificant extra-solution activity to the judicial exception and cannot provide an inventive concept. Storing and retrieving information in memory is directed to a well understood routine conventional activity of data transmission (MPEP 2106.05(d)(II)(iv)).
Therefore, claim 2 is ineligible.
With respect to claim 3:
Step 2A Prong 1: claim 3, which incorporates the rejection of claim 1, recites an additional abstract idea:
analyzing a property of the time-series data including by using the reconstructed version of the time-series data. (This is an abstract idea of a "Mental Process." The "analyzing" step under its broadest reasonable interpretation, covers concepts that can be practically performed in the human mind. The analysis could be done manually by an individual.)
Step 2A Prong 2: claim 3 does not recite any additional elements and thus cannot be integrated into a practical application.
Step 2B: claim 3 does not recite an additional element.
Therefore, claim 3 is ineligible.
With respect to claim 4:
Step 2A Prong 1: claim 4, which incorporates the rejection of claim 1, does not recite an abstract idea.
Step 2A Prong 2: The judicial exception is not integrated into a practical application.
the anomaly preserving version of the time-series data is a smaller size than the time-series data. (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception
The additional element adds insignificant extra-solution activity to the judicial exception and cannot provide an inventive concept. Storing and retrieving information in memory is directed to a well understood routine conventional activity of data transmission (MPEP 2106.05(d)(II)(iv)).
Therefore, claim 4 is ineligible.
With respect to claim 5:
Step 2A Prong 1: claim 5, which incorporates the rejection of claim 1, does not recite an abstract idea.
Step 2A Prong 2: The judicial exception is not integrated into a practical application.
generating the reconstructed version of the time-series data includes providing the anomaly preserving version of the time-series data to the trained machine learning model. (This amounts to no more than mere instructions to “apply” the exception using a generic computer component.)
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception
The additional element is recited in a generic level and they represent generic computer components to apply the abstract idea. Mere instructions to apply an exception cannot provide an inventive concept (MPEP 2106.05(f)).
Therefore, claim 5 is ineligible.
With respect to claim 6:
Step 2A Prong 1: claim 6, which incorporates the rejection of claim 1, does not recite an abstract idea.
Step 2A Prong 2: The judicial exception is not integrated into a practical application.
providing the time-series data and the anomaly preserving version of the time-series data to train the trained machine learning model. (This amounts to no more than mere instructions to “apply” the exception using a generic computer component.)
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception
The additional element is recited in a generic level and they represent generic computer components to apply the abstract idea. Mere instructions to apply an exception cannot provide an inventive concept (MPEP 2106.05(f)).
Therefore, claim 6 is ineligible.
With respect to claim 7:
Step 2A Prong 1: claim 7, which incorporates the rejection of claim 1, does not recite an abstract idea.
Step 2A Prong 2: The judicial exception is not integrated into a practical application.
the trained machine learning model is a multi-variate machine learning model. (This amounts to no more than mere instructions to “apply” the exception using a generic computer component.)
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception
The additional element is recited in a generic level and they represent generic computer components to apply the abstract idea. Mere instructions to apply an exception cannot provide an inventive concept (MPEP 2106.05(f)).
Therefore, claim 7 is ineligible.
With respect to claim 8:
Step 2A Prong 1: claim 8, which incorporates the rejection of claim 1, recites an additional abstract idea:
mapping a configuration item type of a plurality of different configuration item types to the pairing of the anomaly preserving version of the time-series data and the trained machine learning model; and (This is an abstract idea of a "Mental Process." The "mapping" step under its broadest reasonable interpretation, covers concepts that can be practically performed in the human mind. The mapping could be made manually by an individual.)
Step 2A Prong 2: The judicial exception is not integrated into a practical application.
pairing the anomaly preserving version of the time-series data and the trained machine learning model; (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
storing the mapping for the configuration item type. (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception
The additional elements add insignificant extra-solution activity to the judicial exception and cannot provide an inventive concept. Storing and retrieving information in memory is directed to a well understood routine conventional activity of data transmission (MPEP 2106.05(d)(II)(iv)).
Therefore, claim 8 is ineligible.
With respect to claim 9:
Step 2A Prong 1: claim 9, which incorporates the rejection of claim 8, does not recite an abstract idea.
Step 2A Prong 2: The judicial exception is not integrated into a practical application.
receiving an identifier of a configuration item of the configuration item type; (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
retrieving the pairing of the anomaly preserving version of the time-series data and the trained machine learning model mapping for the configuration item type; (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
retrieving the anomaly preserving version; and (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
retrieving the trained machine learning model. (this limitation amounts to adding insignificant extra-solution activity to the judicial exception).
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception
The additional elements add insignificant extra-solution activity to the judicial exception and cannot provide an inventive concept. Storing and retrieving information in memory is directed to a well understood routine conventional activity of data transmission (MPEP 2106.05(d)(II)(iv)).
Therefore, claim 9 is ineligible.
With respect to claim 10:
Step 2A Prong 1: claim 10, which incorporates the rejection of claim 1, does not recite an abstract idea.
Step 2A Prong 2: The judicial exception is not integrated into a practical application.
training a multi-variate machine learning model for anomaly detection using at least the reconstructed version of the time-series data as machine learning model training data. (This amounts to no more than mere instructions to “apply” the exception using a generic computer component.)
Step 2B: the claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception
The additional element is recited in a generic level and they represent generic computer components to apply the abstract idea. Mere instructions to apply an exception cannot provide an inventive concept (MPEP 2106.05(f)).
Therefore, claim 10 is ineligible.
With respect to claim 11:
The claim recites similar limitations as corresponding to claim 1. Therefore, the same subject matter analysis that was utilized for claim 1, as described above, is equally applicable to claim 11. Therefore, claim 11 is ineligible.
With respect to claim 12:
The claim recites similar limitations as corresponding to claim 2. Therefore, the same subject matter analysis that was utilized for claim 2, as described above, is equally applicable to claim 12. Therefore, claim 12 is ineligible.
With respect to claim 13:
The claim recites similar limitations as corresponding to claim 3. Therefore, the same subject matter analysis that was utilized for claim 3, as described above, is equally applicable to claim 13. Therefore, claim 13 is ineligible.
With respect to claim 14:
The claim recites similar limitations as corresponding to claim 4. Therefore, the same subject matter analysis that was utilized for claim 4, as described above, is equally applicable to claim 14. Therefore, claim 14 is ineligible.
With respect to claim 15:
The claim recites similar limitations as corresponding to claim 5. Therefore, the same subject matter analysis that was utilized for claim 5, as described above, is equally applicable to claim 15. Therefore, claim 15 is ineligible.
With respect to claim 16:
The claim recites similar limitations as corresponding to claim 6. Therefore, the same subject matter analysis that was utilized for claim 6, as described above, is equally applicable to claim 16. Therefore, claim 16 is ineligible.
With respect to claim 17:
The claim recites similar limitations as corresponding to claim 7. Therefore, the same subject matter analysis that was utilized for claim 7, as described above, is equally applicable to claim 17. Therefore, claim 17 is ineligible.
With respect to claim 18:
The claim recites similar limitations as corresponding to claim 8. Therefore, the same subject matter analysis that was utilized for claim 8, as described above, is equally applicable to claim 18. Therefore, claim 18 is ineligible.
With respect to claim 19:
The claim recites similar limitations as corresponding to claim 10. Therefore, the same subject matter analysis that was utilized for claim 10, as described above, is equally applicable to claim 19. Therefore, claim 19 is ineligible.
With respect to claim 20:
The claim recites similar limitations as corresponding to claim 1. Therefore, the same subject matter analysis that was utilized for claim 1, as described above, is equally applicable to claim 20. Therefore, claim 20 is ineligible.
Claim Rejections - 35 USC § 103
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
Claims 1-7, 10-17, and 19-20 are rejected under 35 U.S.C. 103 as being unpatentable over Horry (US 2024/0362463 A1) in view of Ahmed (NPL: “Semantic and Anomaly Preserving Sampling Strategy for Large-Scale Time Series Data”)
Regarding claim 1, Horry teaches:
A method comprising: ([0008] “We describe a method for training an autoencoder to classify behaviour of an engineering asset based on real-time data, wherein the autoencoder comprises an encoder and a decoder, the method of training comprising:”)
generating, via a trained machine learning model, a reconstructed version of the time- series data based on the anomaly preserving version of the time-series data. ([0020] “The method may further comprise running the training data through the over-arching autoencoder to obtain reconstructed data.”)
Horry does not teach:
obtaining a distribution of values of time-series data;
based on the distribution of the values, sampling the time-series data to generate an anomaly preserving version of the time-series data; and
However, Ahmed does:
obtaining a distribution of values of time-series data; (Section 2. Problem Formulation subsection Data reduction problem “Given a time series dataset D = {(t1,y1), (t2,y2),...(tn,yn)},where ith data point (ti,yi) is a tuple comprising of time ti and the corresponding value of interest yi at that time, the goal of data reduction is to reduce it to a smaller subset S such that the downstream data analyses applied to a time series visualization of S are: (i) cheaper to apply because the size of S is smaller compared to the size of D, and (ii) produce observations that preserve the semantics as if the analyses were applied to D.” and Section 2.2 Semantics and Anomaly Preservation subsection Anomaly Preservation “So, we introduce a composite metric to measure the anomaly preservation capability of a data reduction technique.” The applicant specification describes distribution of values of time-series data as applying a metric to the time-series data to understand the data’s relation to the other values.)
based on the distribution of the values, sampling the time-series data to generate an anomaly preserving version of the time-series data; and (Section 3. PASS Methodology “PASS (Preserving Anomaly and Semantics Sampling) is a specialized data reduction and sampling strategy that reduces data for the visualization of large-scale time series data as a line chart. Given a dataset D, we first split the dataset into a number of windows having similar properties in terms of trend and angular orientation. Figure 2 represents an example line chart of a dataset. This dataset can be split into 7–8 windows depending on angular orientation. This strategy ensures that minimum, maximum, and important anomalous behaviors are not lost from trend while reducing the amount of data.”).
Horry and Ahmed are considered analogous art to the claimed invention because they are in the same field of endeavor being handling anomalous data. It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the anomaly detection system of Horry with the anomaly preserving sampling of Ahmed. One would want to do this to reduce the size of the data (Ahmed Conclusion).
Regarding claim 2, Horry in view of Ahmed teaches claim 1 as outlined above. Horry further teaches:
storing the anomaly preserving version of the time-series data. ([0027] “The training data may be stored on a database which may be separate to the system which implements the prediction.”)
Regarding claim 3, Horry in view of Ahmed teaches claim 1 as outlined above. Horry further teaches:
analyzing a property of the time-series data including by using the reconstructed version of the time-series data. ([0019] “Generating the plurality of data sets may comprise applying a clustering analysis to the obtained encodings and/or applying a KDtree algorithm to the obtained encodings. The KDtree algorithm and the cluster analysis may be applied simultaneously. Applying a clustering analysis may comprise fitting multiple clustering algorithms over the obtained encodings; selecting the best clustering algorithm and obtaining a plurality of clusters by fitting the selected clustering algorithm to the training data; whereby the generated plurality of data sets comprise the plurality of clusters. Applying a KDtree algorithm may comprise fitting the KDtree algorithm on the obtained encodings; selecting an under-represented data set generated by the fitting step; and finding multiple data sets which are most similar to the selected data set; whereby the generated plurality of data sets comprise the selected data set and the multiple data sets.”)
Regarding claim 4, Horry in view of Ahmed teaches claim 1 as outlined above. Ahmed further teaches:
the anomaly preserving version of the time-series data is a smaller size than the time-series data. (Section 3. PASS Methodology “This dataset can be split into 7–8 windows depending on angular orientation. This strategy ensures that minimum, maximum, and important anomalous behaviors are not lost from trend while reducing the amount of data.”).
Regarding claim 5, Horry in view of Ahmed teaches claim 1 as outlined above. Horry further teaches:
generating the reconstructed version of the time-series data includes providing the anomaly preserving version of the time-series data to the trained machine learning model. ([0020] “The method may further comprise running the training data through the over-arching autoencoder to obtain reconstructed data.”)
Regarding claim 6, Horry in view of Ahmed teaches claim 1 as outlined above. Horry further teaches:
providing the time-series data and the anomaly preserving version of the time-series data to train the trained machine learning model. ([0008] “We describe a method for training an autoencoder to classify behaviour of an engineering asset based on real-time data, wherein the autoencoder comprises an encoder and a decoder, the method of training comprising: obtaining training data and test data comprising multiple data records for at least one engineering asset which corresponds to the engineering asset whose behaviour is to be classified, … generating a plurality of data sets from the obtained encodings, wherein the generated plurality of data sets include under-represented data sets;”)
Regarding claim 7, Horry in view of Ahmed teaches claim 1 as outlined above. Horry further teaches:
the trained machine learning model is a multi-variate machine learning model. ([0017] “The autoencoder may be a long short-term memory (LSTM) autoencoder. The encoder may receive an input X comprising a plurality of points x.sup.(i) each of which may be an m-dimensional vector at time instance t.sub.i. The input is a multivariate time-series and each time step is a fixed time-window length cut from the time-series.” The autoencoder takes input of multivariate data).
Regarding claim 10, Horry in view of Ahmed teaches claim 1 as outlined above. Horry further teaches:
training a multi-variate machine learning model for anomaly detection using at least the reconstructed version of the time-series data as machine learning model training data. ([0022] “Once the autoencoder is trained, it may be used to classify behaviour and provide real-time anomaly detection and failure prediction”).
Regarding claim 11, Horry teaches:
A system comprising: one or more processors; and a memory coupled to the one or more processors, wherein the memory is configured to provide the one or more processors with instructions which when executed cause the one or more processors: ([0052] “Some of the internal detail of the display system 10 is shown in FIG. 1. There are standard components of whichever hardware solution is deployed, including for example a display 20, a processor 30, memory 40 and an interface 42 for connecting with the sensors 50, 52, 54, 56, 58.”)
generate, via a trained machine learning model, a reconstructed version of the time- series data based on the anomaly preserving version of the time-series data. ([0020] “The method may further comprise running the training data through the over-arching autoencoder to obtain reconstructed data.”)
Horry does not teach:
obtaining a distribution of values of time-series data;
based on the distribution of the values, sampling the time-series data to generate an anomaly preserving version of the time-series data; and
However, Ahmed does:
obtaining a distribution of values of time-series data; (Section 2. Problem Formulation subsection Data reduction problem “Given a time series dataset D = {(t1,y1), (t2,y2),...(tn,yn)},where ith data point (ti,yi) is a tuple comprising of time ti and the corresponding value of interest yi at that time, the goal of data reduction is to reduce it to a smaller subset S such that the downstream data analyses applied to a time series visualization of S are: (i) cheaper to apply because the size of S is smaller compared to the size of D, and (ii) produce observations that preserve the semantics as if the analyses were applied to D.” and Section 2.2 Semantics and Anomaly Preservation subsection Anomaly Preservation “So, we introduce a composite metric to measure the anomaly preservation capability of a data reduction technique.” The applicant specification describes distribution of values of time-series data as applying a metric to the time-series data to understand the data’s relation to the other values.)
based on the distribution of the values, sampling the time-series data to generate an anomaly preserving version of the time-series data; and (Section 3. PASS Methodology “PASS (Preserving Anomaly and Semantics Sampling) is a specialized data reduction and sampling strategy that reduces data for the visualization of large-scale time series data as a line chart. Given a dataset D, we first split the dataset into a number of windows having similar properties in terms of trend and angular orientation. Figure 2 represents an example line chart of a dataset. This dataset can be split into 7–8 windows depending on angular orientation. This strategy ensures that minimum, maximum, and important anomalous behaviors are not lost from trend while reducing the amount of data.”).
Horry and Ahmed are considered analogous art to the claimed invention because they are in the same field of endeavor being handling anomalous data. It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the anomaly detection system of Horry with the anomaly preserving sampling of Ahmed. One would want to do this to reduce the size of the data (Ahmed Conclusion).
Regarding claim 12, Horry teaches claim 11 as outlined above. Claim 12 recites similar limitations corresponding to claim 2 and is rejected for similar reasons as claim 2 using similar teachings and rationale.
Regarding claim 13, Horry teaches claim 11 as outlined above. Claim 13 recites similar limitations corresponding to claim 3 and is rejected for similar reasons as claim 3 using similar teachings and rationale.
Regarding claim 14, Horry teaches claim 11 as outlined above. Claim 14 recites similar limitations corresponding to claim 4 and is rejected for similar reasons as claim 4 using similar teachings and rationale.
Regarding claim 15, Horry teaches claim 11 as outlined above. Claim 15 recites similar limitations corresponding to claim 5 and is rejected for similar reasons as claim 5 using similar teachings and rationale.
Regarding claim 16, Horry teaches claim 11 as outlined above. Claim 16 recites similar limitations corresponding to claim 6 and is rejected for similar reasons as claim 6 using similar teachings and rationale.
Regarding claim 17, Horry teaches claim 11 as outlined above. Claim 17 recites similar limitations corresponding to claim 7 and is rejected for similar reasons as claim 7 using similar teachings and rationale.
Regarding claim 19, Horry teaches claim 11 as outlined above. Claim 19 recites similar limitations corresponding to claim 10 and is rejected for similar reasons as claim 10 using similar teachings and rationale.
Regarding claim 20, Horry teaches:
A computer program product, the computer program product being embodied in a non- transitory computer readable storage medium and comprising computer instructions for ([0028] “According to another aspect of the invention, there is a non-transitory computer-readable medium comprising processor control code which when running on a system causes the system to carry out the method described above.”)
generating, via a trained machine learning model, a reconstructed version of the time- series data based on the anomaly preserving version of the time-series data. ([0020] “The method may further comprise running the training data through the over-arching autoencoder to obtain reconstructed data.”)
Horry does not teach:
obtaining a distribution of values of time-series data;
based on the distribution of the values, sampling the time-series data to generate an anomaly preserving version of the time-series data; and
However, Ahmed does:
obtaining a distribution of values of time-series data; (Section 2. Problem Formulation subsection Data reduction problem “Given a time series dataset D = {(t1,y1), (t2,y2),...(tn,yn)},where ith data point (ti,yi) is a tuple comprising of time ti and the corresponding value of interest yi at that time, the goal of data reduction is to reduce it to a smaller subset S such that the downstream data analyses applied to a time series visualization of S are: (i) cheaper to apply because the size of S is smaller compared to the size of D, and (ii) produce observations that preserve the semantics as if the analyses were applied to D.” and Section 2.2 Semantics and Anomaly Preservation subsection Anomaly Preservation “So, we introduce a composite metric to measure the anomaly preservation capability of a data reduction technique.” The applicant specification describes distribution of values of time-series data as applying a metric to the time-series data to understand the data’s relation to the other values.)
based on the distribution of the values, sampling the time-series data to generate an anomaly preserving version of the time-series data; and (Section 3. PASS Methodology “PASS (Preserving Anomaly and Semantics Sampling) is a specialized data reduction and sampling strategy that reduces data for the visualization of large-scale time series data as a line chart. Given a dataset D, we first split the dataset into a number of windows having similar properties in terms of trend and angular orientation. Figure 2 represents an example line chart of a dataset. This dataset can be split into 7–8 windows depending on angular orientation. This strategy ensures that minimum, maximum, and important anomalous behaviors are not lost from trend while reducing the amount of data.”).
Horry and Ahmed are considered analogous art to the claimed invention because they are in the same field of endeavor being handling anomalous data. It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the anomaly detection system of Horry with the anomaly preserving sampling of Ahmed. One would want to do this to reduce the size of the data (Ahmed Conclusion).
Claims 8-9 and 18 are rejected under 35 U.S.C. 103 as being unpatentable over Horry
in view of Ahmed and Crotinger (US 2018/0324199 A1).
Regarding claim 8, Horry teaches claim 1 as outlined above. Ahmed teaches the anomaly preserving version of the time-series data and Horry teaches the machine learning model. However Horry nor Ahmed teaches:
pairing the anomaly preserving version of the time-series data and the trained machine learning model; mapping a configuration item type of a plurality of different configuration item types to the pairing of the anomaly preserving version of the time-series data and the trained machine learning model; and storing the mapping for the configuration item type.
However Crotinger does:
pairing the anomaly preserving version of the time-series data and the trained machine learning model; mapping a configuration item type of a plurality of different configuration item types to the pairing of the anomaly preserving version of the time-series data and the trained machine learning model; and storing the mapping for the configuration item type. ([0040] “In some embodiments, the databases 108 may include a configuration management database (CMDB) that may store the data, e.g., time-series data, concerning CIs 110 mentioned above along with data related various IT assets that may be present within the network 112.” A configuration management database is what the claim is describing with using anomaly preserving time-series data and machine learning models.)
Horry, Ahmed and Crotinger are considered analogous art to the claimed invention because they are in the same field of endeavor being anomaly detection. It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the anomaly detection system of Horry with the anomaly preserving sampling of Ahmed with the configuration management database of Crotinger. One would want to do this so that the models and data are easily accessible and linked together.
Regarding claim 9, Worry in view of Crotinger teaches claim 8 as outlined above. Crotinger further teaches:
receiving an identifier of a configuration item of the configuration item type; retrieving the pairing of the anomaly preserving version of the time-series data and the trained machine learning model mapping for the configuration item type; retrieving the anomaly preserving version; and retrieving the trained machine learning model. ([0040] “In some embodiments, the databases 108 may include a configuration management database (CMDB) that may store the data, e.g., time-series data, concerning CIs 110 mentioned above along with data related various IT assets that may be present within the network 112.” A configuration management database is what the claim is describing)
Regarding claim 18, Worry teaches claim 11 as outlined above. Claim 18 recites similar limitations corresponding to claim 8 and is rejected for similar reasons as claim 8 using similar teachings and rationale.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to DANIEL PATRICK GRUSZKA whose telephone number is (571)272-5259. The examiner can normally be reached M-F 9:00 AM - 6:00 PM ET.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Li Zhen can be reached at (571) 272-3768. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/DANIEL GRUSZKA/Examiner, Art Unit 2121
/Li B. Zhen/Supervisory Patent Examiner, Art Unit 2121