Prosecution Insights
Last updated: April 19, 2026
Application No. 18/233,752

CONTROL METHOD AND DEVICE AND ELECTRONIC DEVICE

Final Rejection §103
Filed
Aug 14, 2023
Examiner
ELFERVIG, TAYLOR A
Art Unit
2445
Tech Center
2400 — Computer Networks
Assignee
Lenovo (Beijing) Limited
OA Round
2 (Final)
62%
Grant Probability
Moderate
3-4
OA Rounds
4y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 62% of resolved cases
62%
Career Allow Rate
253 granted / 409 resolved
+3.9% vs TC avg
Strong +38% interview lift
Without
With
+38.5%
Interview Lift
resolved cases with interview
Typical timeline
4y 2m
Avg Prosecution
31 currently pending
Career history
440
Total Applications
across all art units

Statute-Specific Performance

§101
8.4%
-31.6% vs TC avg
§103
57.1%
+17.1% vs TC avg
§102
16.2%
-23.8% vs TC avg
§112
12.2%
-27.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 409 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . General Remarks This communication is considered fully responsive to Applicant’s response filed 01/02/2026. Application filed: 08/14/2023 Applicant’s PgPUB: 2024/0073210 Claims: Claims 1-5, 7-13, 15, 16 and 21 are pending. Claims 1, 9 and 21 are independent. Claims 6 and 14 are canceled. Claim 21 is new. Claim 21 is allowable. Claims 7 and 15 are objected to. Claims 17-20 are non-elected. Continuity/Priority Data: This Application claims priority to Chinese Application No. CN202211059169.5 filed 08/31/2022. Prior Office Action: In the Office Action filed on 10/14/2025, Examiner indicated that claims 6, 7, 14 and 15 would be allowable if they were rolled up into their independent claim along with any intervening claims. Applicant did roll up claim 6 and parts of claims 4 and 5, but not the entire claims. Further Applicant changed the scope of the claim 6 by including the phrase “At least one of” and changing the conjunction “and” to “or”. These changes broaden the scope and meaning of the claims. Therefore, the claims as presented are not in condition for allowance. Response to Arguments Applicant's arguments filed 01/02/2026 have been fully considered but they are not persuasive. Applicant argues that newly amended clam 1 is allowable in light of indications of allowability from the Office Action filed on 10/14/2025. Examiner respectfully disagrees with Applicant’s assertions. See General Remarks : Prior Office Action. Allowable Subject Matter Claims 7 and 15 are objected to as being dependent upon a rejected base claim, but would be allowable if rewritten in independent form including all of the limitations of the base claim and any intervening claims. Claim 21 is allowable over the prior art. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent may not be obtained though the invention is not identically disclosed or described as set forth in section 102 of this title, if the differences between the subject matter sought to be patented and the prior art are such that the subject matter as a whole would have been obvious at the time the invention was made to a person having ordinary skill in the art to which said subject matter pertains. Patentability shall not be negatived by the manner in which the invention was made. Claims 1-5 and 9-13 are rejected under 35 U.S.C. 103 as being unpatentable over U.S. Patent Application Publication No. 2020/0413344 A1 to Jin (“Jin”) in view of U.S. Patent Application Publication No. 2011/0003609 A1 to Sundstrom et al. (“Sundstrom”). As to claim 1, Jin discloses: a control method applied to a first electronic device comprising: in response to obtaining a trigger signal, determining a target component (Fig. 2, target functional component, 212) corresponding to the trigger signal (¶0004 – Jin teaches establishing a connection by a first electronic device with a second electronic device through a connection component in an activated state; and in response to the established connection (i.e., trigger signal)); and sharing the target component to a second electronic device for use to expand performance of the second electronic device corresponding to the target component, the second electronic device being a device that establishes a target connection with the first electronic device (Fig. 2, electronic devices (22, 21); target functional component, 212, ¶0004 – Jin teaches switching, by the first electronic device, a target functional component called by the second electronic device from an inactivated state to an activated state to implement a target function corresponding to the target functional component of the first electronic device), wherein: sharing the target component to the second electronic device including wherein: establishing a first connection channel between the target component and the second electronic device for the second electronic device to send first data to the target component or receive second data sent by the target component through the first connection channel (Fig. 2, electronic devices (22, 21); target functional component, 212, ¶0004 – Jin teaches switching, by the first electronic device, a target functional component called by the second electronic device from an inactivated state to an activated state to implement a target function corresponding to the target functional component of the first electronic device), including at least one of: Sundstrom discloses what Jin does not expressly disclose. However Jin does teach a device architecture between interfaces (i.e., Fig. 6, HDMI, Bluetooth) and components (i.e., Fig. 6, AMP, Speaker) and the potential paths between interfaces and components along with a table that shows the states of each interface and component based on the power state of the first electronic device (Fig. 6, Fig. 7, -¶0084-¶0090) Sundstrom discloses: in response to the first electronic device being in a first power mode, outputting current usage information of each related component to control state of each related component after receiving a selection instruction to complete a path needed for establishing the first connection channel; in response to the first electronic device being in a second power mode, outputting switching information of the target component, and controlling the path between the target interface and the target component to complete the path needed for establishing the first connection channel, the switching information being information that the target component is switched from being used by the first electronic device to being used by the second electronic device; or in response to the first electronic device being in a third power mode, controlling the state of each related component between the target interface and the target component to complete the path needed for establishing the first connection channel (Fig. 4, ¶0035 – Sundstrom teaches selecting different possible bandwidths of the data transmission according to a power efficiency model of the mobile node. Examiner Note, the bandwidth is controlled and therefore the carries/antennaes (i.e., related components) are controlled (i.e., controlled bandwidth)). Jin and Sundstrom are analogous arts because they are from the same field of endeavor with respect to usage of power metrics within a networking framework. Before the effective filing date, it would have been obvious to a person of ordinary skill in the art to incorporate power metrics to determine networking parameters as discussed in Sundstrom with the system of resource access as discussed in Jin by adding the functionality of Sundstrom to the system/method of Jin in order to schedule data transmission using power efficiency (Sundstrom, ¶0005). As to claim 2, Jin and Sundstrom discloses: control method of claim 1, and Jin discloses: wherein the trigger signal is generated based on at least one of: an input operation acting on the first electronic device; an input operation acting on the second electronic device; an establishment of the target connection between the second electronic device and the first electronic device (¶0004 – Jin teaches establishing a connection by a first electronic device with a second electronic device through a connection component in an activated state; and in response to the established connection (i.e., trigger signal)); a target application running on the second electronic device; at least hardware configuration information of the second electronic device; at least space environment where the second electronic device and/or the first electronic device are located; or hardware usage of the second electronic device and/or the first electronic device. As to claim 3, Jin and Sundstrom discloses: control method of claim 1, and Jin discloses: wherein determining the target component corresponding to the trigger signal includes at least one of: in response to the trigger signal carrying first identification information to point to the target component, determining the component that matches the first identification information among the components shared by the first electronic device as the target component (Fig. 2, electronic devices (22, 21); target functional component, 212, ¶0004 – Jin teaches switching, by the first electronic device, a target functional component called by the second electronic device from an inactivated state to an activated state to implement a target function corresponding to the target functional component of the first electronic device); determining the power mode of the first electronic device, and determining the target component from components shared by the first electronic device based on the power mode; determining the power mode of the target component and a component usage parameter of each component of the first electronic device in the power mode, and determining the target component based on the power mode and the component usage parameter; obtaining second identification information of the second electronic device, and determining a component in the first electronic device that matches the second identification information as the target component; or obtaining generation time of the trigger signal, and determining a component in the first electronic device that matches the generation time as the target component. As to claim 4, Jin and Sundstrom discloses: control method of claim 1, and Jin discloses: wherein sharing the target component to the second electronic device further includes: establishing a second connection channel between the first electronic device and the second electronic device to receive a control instruction from the second electronic device for the target component, and performing a control action corresponding to the control instruction (Fig. 2, electronic devices (22, 21); target functional component, 212, ¶0004 – Jin teaches switching, by the first electronic device, a target functional component called by the second electronic device from an inactivated state to an activated state to implement a target function corresponding to the target functional component of the first electronic device). As to claim 5, Jin and Sundstrom discloses: control method of claim 1, and Jin discloses: wherein establishing the first connection channel between the target component and the second electronic device further includes: determining the current power mode of the first electronic device (¶0005, ¶0085-¶0087 – Jin teaches the connection unit is configured to establish a connection with a second electronic device through a connection component in an activated state. The switching unit is configured to switch a target functional component called by the second electronic device from an inactivated state to the activated state, in response to the established connection. Examiner Note: this shows a determination that the first electronic device has different power modes as determined by its components (i.e., connection and functional components) and then switching from inactive to active shows a determination that that a state was inactive.), and As to claim 9, similar rejection as claim 1. As to claim 10, similar rejection as claim 2. As to claim 11, similar rejection as claim 3. As to claim 12, similar rejection as claim 4. As to claim 13, similar rejection as claim 5. Claims 8 and 16 are rejected under 35 U.S.C. 103 as being unpatentable over U.S. Patent Application Publication No. 2020/0413344 A1 to Jin (“Jin”) in view of U.S. Patent Application Publication No. 2011/0003609 A1 to Sundstrom et al. (“Sundstrom”) in further view of U.S. Patent Application Publication No. 2017/0142583 A1 to Zhang (“Zhang”). As to claim 8, Jin and Sundstrom discloses: control method of claim 1, Zhang discloses what Jin and Sundstrom do not expressly disclose. Zhang discloses: further comprising: in response to obtaining a connection request from the second electronic device, outputting a prompt for target authentication (¶0063 - Zhang teaches presenting a prompt for a user to login to access another device); and in response to the second electronic device passing the target authentication, establishing the target connection and/or configuring usage permission of the target component (¶0071 - Zhang teaches presenting a prompt for a user to login and if authorized, process the communication information); or, in response to the second electronic device failing the target authentication, modifying access permission of the second electronic device and/or the usage permission of the target component. Jin, Sundstrom and Zhang are analogous arts because they are from the same field of endeavor with respect to network resource access. Before the effective filing date, it would have been obvious to a person of ordinary skill in the art to incorporate network authorization as discussed in Zhang with power metrics to determine networking parameters as discussed in Sundstrom with the system of resource access as discussed in Jin by adding the functionality of Zhang to the system/method of Jin and Sundstrom in order to demonstrate authorizing a user to access network resources (Zhang, ¶0071). As to claim 16, similar rejection as claim 8. Conclusion Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to TAYLOR A ELFERVIG whose telephone number is (571)270-5687. The examiner can normally be reached Monday (10:00 AM CST) - Friday (4:00 PM CST). Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Oscar Louie can be reached at (571) 270-1684. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /TAYLOR A ELFERVIG/Primary Examiner, Art Unit 2445
Read full office action

Prosecution Timeline

Aug 14, 2023
Application Filed
Oct 09, 2025
Non-Final Rejection — §103
Jan 02, 2026
Response Filed
Mar 05, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603945
SYSTEMS AND METHODS FOR INFERRING USER ACTIVITIES FROM IOT NETWORK TRAFFIC
2y 5m to grant Granted Apr 14, 2026
Patent 12598146
SYSTEMS, METHODS, AND APPARATUSES FOR PREDICTING RESOURCE SHORTAGES USING MACHINE LEARNING
2y 5m to grant Granted Apr 07, 2026
Patent 12592902
CONTEXT-BASED SENSITIVE MESSAGE DETECTION
2y 5m to grant Granted Mar 31, 2026
Patent 12587495
Electronic Message Generation
2y 5m to grant Granted Mar 24, 2026
Patent 12568128
SYSTEM CONFIGURATION AND COMMUNICATION METHOD TO ENABLE POST ACQUIRED ABILITY TO CONTROL AND COMMUNICATE WITH AD-HOC DEVICES
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
62%
Grant Probability
99%
With Interview (+38.5%)
4y 2m
Median Time to Grant
Moderate
PTA Risk
Based on 409 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month