Prosecution Insights
Last updated: April 19, 2026
Application No. 18/272,637

Methods, Network Nodes, and Computer Readable Media for Dynamically Discovering Serving Network Node in Core Network

Non-Final OA §102§103
Filed
Jul 17, 2023
Examiner
BUKHARI, SIBTE H
Art Unit
2449
Tech Center
2400 — Computer Networks
Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
OA Round
1 (Non-Final)
78%
Grant Probability
Favorable
1-2
OA Rounds
3y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 78% — above average
78%
Career Allow Rate
336 granted / 428 resolved
+20.5% vs TC avg
Strong +37% interview lift
Without
With
+37.0%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
19 currently pending
Career history
447
Total Applications
across all art units

Statute-Specific Performance

§101
10.5%
-29.5% vs TC avg
§103
61.9%
+21.9% vs TC avg
§102
9.1%
-30.9% vs TC avg
§112
11.0%
-29.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 428 resolved cases

Office Action

§102 §103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION This action is in response to application filed on 12/31/2025. Claims 29-38 & 40 have been examined and are pending with this action. Election/Restriction Applicant’s election without traverse of Group II, claims 29-38 & 40 in the reply filed on 12/31/2025 is acknowledged. Priority Examiner acknowledges that the Applicant claims a priority benefit of PCT/CN2021/141905 filed on 12/28/2021. Drawings The drawings were received on 7/17/2023 and these drawings are accepted. Information Disclosure Statement The information disclosure statement (IDS) submitted on 7/17/2023 & 8/16/2024 are in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner. Oath/Declaration The OATH was received on 7/17/2023. Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale or otherwise available to the public before the effective filing date of the claimed invention. Claims 1-2, 5-8 & 18-20 are rejected under 35 U.S.C. 102(a)(1) as being anticipated by Chen (CN 110769412 A). As per claim 29, Chen discloses a method at a network exposure function (NEF) for dynamically discovering a Policy Control Function (PCF) for an Ethernet type session (Chen: “the network security, 5G the core network into the Network ExposureFunction (network opening function, NEF) open to the third party service & N5 or Rx interface request message NEF (Network ExposureFunction network capability open function) receives the third party AF (application function) (i.e., AF2) to the BSF and PCF address query session binding information”), the method comprising: Examiner Note: Ethernet type session is defined as a 5G network includes, but not limited to, 5G Local Area Network (LAN) type services, Time Sensitive Network (TSN), etc in [0003] of spec. receiving a service request message for the Ethernet type session from an Application Function (AF), wherein the service request message comprises network related identification information for the Ethernet type session (Chen: “after receiving the application request of the user application function, when the identifier or address unknown session binding function, the application function to the network discovery function sends session binding service discovery request,”), and discovering, based on the network related identification information, a Binding Support Function (BSF) that holds binding information of the PCF for the Ethernet type session (Chen: “when deploying multiple PCF, defining a BSF (Binding Support Function session binding support function) to realize session binding and storing the session binding information. ”), Claim 40 is rejected based on rationale provided for claim 29. As per claim 30, Chen discloses the method of claim 29, wherein the service request message further comprises a User Equipment (UE) Media Access Address (MAC) address of a UE associated with the Ethernet type session (Chen: “session of the UE when a UPF control by a SMF & local area network or local area network mark sub-domain. when the user triggers the application request of the UPF AF, the user plane will detect the Ethernet frame related to the user MAC address. ”). As per claim 31, Chen discloses the method of claim 30, further comprising: discovering the PCF using the UE MAC address received from the AF by querying the BSF (Chen: “AF also sends N5 message to the PCF (which carries the AF and MAC1). sending the upper row data access AF UE2, which carries MAC2, UPF2 detecting the source MAC is an Ethernet frame of MAC2. ”). As per claim 32, Chen discloses the method of claim 29, further comprising: discovering the PCF based on the network related identification information (Chen: “the PCF access by the NEF AF, the AF initiates the application request to the NEF, carry local area network identifier ”). As per claim 33, Chen discloses the method of claim 29, wherein the network related identification information for the Ethernet type session is preconfigured in the AF (Chen: “If the AF can directly access the BSF, PCF, associated user face local area network/local area network sub-domain identifier and the control surface responsible for the mapping relation between the user Non IP PDU session session bound SMF/BSF by an AF. (AF pre-configured region belongs to the local network identifier or the mapping relationship between the domain identifier and SMF/BSF)”). As per claim 36, Chen discloses the method of claim 29, further comprising: transmitting, to the PCF, another service request message to invoke a requested service for the Ethernet type session (Chen: “further transmits AF information to the PCF service response (which carries the PCF address), NEF (which carries MAC1)”).; and receiving, from the PCF, a response indicating whether the requested service is successfully invoked for the Ethernet type session (Chen: “receives the third party AF (application function) (i.e., AF2) to the BSF and PCF address query session binding information. in the AF1 N5 interface request message, inquiring the BSF session binding information. wherein, BSF separately deployed with the SMF fusion with the PCF.”).; Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 34-35 are rejected under 35 U.S.C. 103 as being unpatentable of Chen (CN 110769412 A) in view of Han (CN 114268975 A). As per claim 34, Chen discloses the method of claim 29 wherein the network related identification information for the Ethernet type session (Chen: “the network security, 5G the core network into the Network ExposureFunction (network opening function, NEF) open to the third party service & N5 or Rx interface request message NEF (Network ExposureFunction network capability open function) receives the third party AF (application function) (i.e., AF2) to the BSF and PCF address query session binding information”), comprises at least one of: Chen does not explicitly disclose Data network name and Single-Network Slice Selection Assistance Information. Han however discloses a Data Network Name (DNN) for the Ethernet type session (Han: “ the SMF can according to the S-NSSAI and DNN carried in the session establishing request of the UE.”). ; and a Single-Network Slice Selection Assistance Information (S-NSSAI) for the Ethernet type session (Han: “the UDR can send the 5 G LAN configuration information to the SMF, the S-NSSAI and the DNN, for SMF determining the session associated with the S-NSSAI and the DNN.”). Therefore, it would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Chen in view of Han to figure out Data network name and Single-Network Slice Selection Assistance Information. One would be motivated to do so because this technique advantageously aids in the management efficiency of the 5 G LAN configuration information can be improved.(Han). As per claim 35, Chen discloses the method of claim 29 (Chen: “the network security, 5G the core network into the Network ExposureFunction (network opening function, NEF) open to the third party service & N5 or Rx interface request message NEF (Network ExposureFunction network capability open function) receives the third party AF (application function) (i.e., AF2) to the BSF and PCF address query session binding information”), Chen does not explicitly disclose Data network name and Single-Network Slice Selection Assistance Information. Han however discloses wherein the BSF is discovered by the NEF querying a Network Repository Function (NRF) using the at least one of the DNN for the Ethernet type session and the S-NSSAI for the Ethernet type session (Han: “the UDR may also send a second message to the NRF, the second message is used for indicating the corresponding relationship between the UDR and the S-NSSAI and the DNN. For example, UDR can request NRF to store the corresponding relation between UDR and S-NSSAI and DNN, so that NRF can address UDR according to S-NSSAI and DNN.”). Therefore, it would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Chen in view of Han to figure out Data network name and Single-Network Slice Selection Assistance Information. One would be motivated to do so because this technique advantageously aids in the management efficiency of the 5 G LAN configuration information can be improved.(Han). Claims 37-38 are rejected under 35 U.S.C. 103 as being unpatentable of Chen (CN 110769412 A) in view of Han (CN 114268975 A). As per claim 37, Chen discloses the method of claim 29 (Chen: “the network security, 5G the core network into the Network ExposureFunction (network opening function, NEF) open to the third party service & N5 or Rx interface request message NEF (Network ExposureFunction network capability open function) receives the third party AF (application function) (i.e., AF2) to the BSF and PCF address query session binding information”), Chen does not explicitly disclose QoS request, Li however discloses wherein the service request message comprises a request message for managing required Quality of Service (QoS) for a service data flow of the Ethernet type session, and is received via an Nncf_AFscssionWithQoS Application Programming Interface (API'. (Li: [0060 & 0094 & fig 5 c “An NCE request may comprise for example request for installing UP path selection or reselection policy, request for end-to-end QoS policy, request for changing chargeable party, query for UE location, and query for UE connectivity status & At step 71, the AS sends an API-based request for session QoS setup to the NCEF.”). Therefore, it would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Chen in view of Han to figure out API based request. One would be motivated to do so because this technique advantageously aids in the path selection to the network capability exposure function (Li). As per claim 38, Chen discloses the method of claim 29 (Chen: “the network security, 5G the core network into the Network ExposureFunction (network opening function, NEF) open to the third party service & N5 or Rx interface request message NEF (Network ExposureFunction network capability open function) receives the third party AF (application function) (i.e., AF2) to the BSF and PCF address query session binding information”), Chen does not explicitly disclose API based request, Li however wherein the service request message comprises a request message for managing a chargeable party for the Ethernet type session, and is received via an Nnef_ChargeableParty API (Li: [0060 & 0094 & fig 5 c “An NCE request may comprise for example request for installing UP path selection or reselection policy, request for end-to-end QoS policy, request for changing chargeable party, query for UE location, and query for UE connectivity status & At step 71, the AS sends an API-based request for session QoS setup to the NCEF.”). Therefore, it would have been obvious for one of ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Chen in view of Han to figure out API based request. One would be motivated to do so because this technique advantageously aids in the path selection to the network capability exposure function (Li). Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. This includes: Any inquiry concerning this communication or earlier communications from the examiner should be directed to Sibte Bukhari whose telephone number is (571) 270-7122. The examiner can normally be reached on M-F 9:00 - 6:00. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Vivek Srivastava can be reached on (571) 272-7304. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SIBTE H BUKHARI/Examiner, Art Unit 2449
Read full office action

Prosecution Timeline

Jul 17, 2023
Application Filed
Feb 07, 2026
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12598666
METHOD AND APPARATUS FOR CHO AND FAST MCG LINK RECOVERY
2y 5m to grant Granted Apr 07, 2026
Patent 12592844
OPTIMIZATION OF LINK BANDWIDTH CONSUMPTION IN A LAYER-2 MULTICAST NETWORK
2y 5m to grant Granted Mar 31, 2026
Patent 12587306
DATA TRANSMISSION METHOD AND APPARATUS, CIRCUIT BOARD, STORAGE MEDIUM AND ELECTRONIC APPARATUS
2y 5m to grant Granted Mar 24, 2026
Patent 12587415
LOCAL PORT GROUPING WITH RAILS OF NETWORK LINKS
2y 5m to grant Granted Mar 24, 2026
Patent 12587499
HIGH-AVAILABILITY EGRESS ACCESS WITH CONSISTENT SOURCE IP ADDRESSES FOR WORKLOADS
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
78%
Grant Probability
99%
With Interview (+37.0%)
3y 2m
Median Time to Grant
Low
PTA Risk
Based on 428 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month