Prosecution Insights
Last updated: April 19, 2026
Application No. 18/241,613

SYSTEMS AND METHODS ON ID SWAPPING DURING DATA FORWARDING

Non-Final OA §102
Filed
Sep 01, 2023
Examiner
PATEL, CHANDRAHAS B
Art Unit
2464
Tech Center
2400 — Computer Networks
Assignee
Huawei Technologies Co., Ltd.
OA Round
1 (Non-Final)
88%
Grant Probability
Favorable
1-2
OA Rounds
2y 8m
To Grant
95%
With Interview

Examiner Intelligence

Grants 88% — above average
88%
Career Allow Rate
780 granted / 885 resolved
+30.1% vs TC avg
Moderate +7% lift
Without
With
+7.3%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
33 currently pending
Career history
918
Total Applications
across all art units

Statute-Specific Performance

§101
7.1%
-32.9% vs TC avg
§103
37.5%
-2.5% vs TC avg
§102
44.6%
+4.6% vs TC avg
§112
5.0%
-35.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 885 resolved cases

Office Action

§102
DETAILED ACTION Specification The lengthy specification has not been checked to the extent necessary to determine the presence of all possible minor errors. Applicant’s cooperation is requested in correcting any errors of which applicant may become aware in the specification. Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1, 2, 4-7, 9, 12-15, 19, 21, 29 and 30 are rejected under 35 U.S.C. 102(a)(2) as being anticipated by Chauhan (US-PGPUB 2020/0112589). Regarding claim 1, Chauhan teaches a method comprising: receiving, by a management function from a policy controller, a first message including a data forwarding policy indicative of a configuration on how to forward data according to a data forwarding requirement from an original data sender [Para 158, receives information about how to forward traffic based on forwarding requirement]; sending, by the management function to a network function, a second message according to the first message [Para 158, additional messages are sent based on the first message for data processing]; and obtaining, by the network function, an indication indicating a request for data forwarding and a corresponding flag indicating an ID swapping rule according to the second message [Para 170-171, based on the second message identity of the traffic is changed based on rules such as privacy rules]. Regarding claim 2, Chauhan teaches determining, by the management function, the second message according to the first message, wherein the second message includes the indication and the corresponding flag [Para 158-159, second message is based on the first message based on the message policies and security rules]. Regarding claim 4, Chauhan teaches the position ID is assigned by the management function to the destination of the data packet [Para 113, position of the packet with regards to geographical location is assigned to the packet]. Regarding claim 5, Chauhan teaches the position ID of the destination is assigned based on an ID of another network function associated with the destination [Para 113, position of the packet with regards to geographical location is assigned to the packet]. Regarding claim 6, Chauhan teaches the second message includes a third message from management function to a second network function and a fourth message from the second network function to the network function [Para 158-159, second message includes multiple messages based on packet processing needed]. Regarding claim 7, Chauhan teaches selecting, by the management function, the second network function from a set of second network functions according to the first message [Para 158, further processing is done on the data based on what needs to be done]; sending the third message to the second network function, wherein the third message includes the data forwarding policy [Para 158-159, further messages are sent based on the type of forwarding]; determining, by the second network function, the indication and the corresponding flag according to the data forwarding policy, and sending, by the second network function to the network function, the indication and the corresponding flag [Para 158-159, further processing is done on the data based on the policy and flags are determined based on the policy]. Regarding claim 9, Chauhan teaches sending, by the network function to an access network (AN) node, a public key associated with the second network function for encrypting a destination ID of a data packet [Para 93, public key is used for encryption]. Regarding claim 12, Chauhan teaches sending, by the network function to the policy controller, a policy request to trigger the policy controller to generate the data forwarding policy, wherein the policy request includes the data forwarding requirement [Para 158-159]. Regarding claim 13, Chauhan teaches obtaining, by the network function from an access network node associated with the original data sender, the data forwarding requirement [Para 158-159]. Regarding claim 14, Chauhan teaches the data forwarding requirement is included in a data packet from the original data sender [Para 158-159]. Regarding claim 15, Chauhan teaches generating, by the policy controller, the data forwarding policy after receiving the policy request [Para 158]; and sending, by the policy controller to the management function, the second message including the data forwarding policy [Para 158-159]. Regarding claim 19, Chauhan teaches a communication system comprising: at least one processor; and non-transient memory storing machine readable instructions which when executed by the least one processor implement a management function, a policy controller and a network function, the management function, policy controller and network function configured for: receiving, by the management function from a policy controller, a first message including a data forwarding policy indicative of a configuration on how to forward data according to a data forwarding requirement from an original data sender [Para 158, receives information about how to forward traffic based on forwarding requirement]; sending, by the management function to a network function, a second message according to the first message [Para 158, additional messages are sent based on the first message for data processing]; and obtaining, by the network function, an indication indicating a request for data forwarding and a corresponding flag indicating an ID swapping rule according to the second message [Para 170-171, based on the second message identity of the traffic is changed based on rules such as privacy rules]. Regarding claim 21, Chauhan teaches a method comprising: receiving, by a network function, a message including a data forwarding policy, the data forwarding policy indicative of a configuration on how to forward data according to a data forwarding requirement from an original data sender [Para 158]; determining, by the network function, an indication indicating a request for data forwarding and a corresponding flag indicating an ID swapping rule according to the data forwarding policy [Para 170-171]; and sending, by the network function to another network function, the indication and the corresponding flag [Para 158-159]; wherein the network function is trusted by the original data sender [Para 158-159]. Regarding claim 29, Chauhan teaches a method comprising: receiving, by a policy controller, a policy request to trigger the policy controller to generate a data forwarding policy, the policy request including a data forwarding requirement from an original data sender [Para 158-159]; generating, by the policy controller, the data forwarding policy after receiving the policy request [Para 158-159]; and sending, by the policy controller, a first message to a management function, the first message including the data forwarding policy indicative of a configuration on how to forward data according to the data forwarding requirement [Para 158-159]. Regarding claim 30, Chauhan teaches the data forwarding policy indicative of a configuration on how to forward data further depends on network traffic information, wherein the network traffic information includes at least one traffic parameter associated with one or more of the network function and another network function associated with the network function [Para 158-159]. Allowable Subject Matter Claims 3, 8, 10, 11 and 22 are objected to as being dependent upon a rejected base claim, but would be allowable if rewritten in independent form including all of the limitations of the base claim and any intervening claims. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Salmela et al. (US-PGPUB 2018/0048462) teaches applying hash function to existing identity. A resulting value is set as identity for a constrained device, where the existing identity comprises a generation hash value in a hash chain formed by applying the hash function to a device public key. The identity is stored in a secure storage in the constrained device. Any inquiry concerning this communication or earlier communications from the examiner should be directed to CHANDRAHAS PATEL whose telephone number is (571)270-1211. The examiner can normally be reached Monday - Thursday 7:30 - 17:30. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Ricky Ngo can be reached at 571-272-3139. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /Chandrahas B Patel/ Primary Examiner, Art Unit 2464
Read full office action

Prosecution Timeline

Sep 01, 2023
Application Filed
Sep 30, 2025
Non-Final Rejection — §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12598054
IN-VEHICLE DEVICE, TIME SYNCHRONIZATION METHOD, AND TIME SYNCHRONIZATION PROGRAM
2y 5m to grant Granted Apr 07, 2026
Patent 12598041
METHOD AND DEVICE IN A NODE USED FOR WIRELESS COMMUNICATION
2y 5m to grant Granted Apr 07, 2026
Patent 12593317
BIT SELECTION FOR MULTI-SLOT UPLINK SHARED CHANNEL TRANSMISSION
2y 5m to grant Granted Mar 31, 2026
Patent 12593201
COMMUNICATION METHOD, COMMUNICATION APPARATUS, AND COMMUNICATION SYSTEM FOR UPDATING USER EQUIPMENT IDENTIFICATION INFORMATION
2y 5m to grant Granted Mar 31, 2026
Patent 12581471
METHODS, APPARATUS AND SYSTEMS FOR PERFORMING MULTI-RADIO ACCESS TECHNOLOGY CARRIER AGGREGATION
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
88%
Grant Probability
95%
With Interview (+7.3%)
2y 8m
Median Time to Grant
Low
PTA Risk
Based on 885 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month