Prosecution Insights
Last updated: April 19, 2026
Application No. 18/292,143

ENCRYPTION DEVICE, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM

Non-Final OA §103
Filed
Jan 25, 2024
Examiner
SCOTT, RANDY A
Art Unit
2439
Tech Center
2400 — Computer Networks
Assignee
Kddi Corporation
OA Round
3 (Non-Final)
85%
Grant Probability
Favorable
3-4
OA Rounds
3y 1m
To Grant
82%
With Interview

Examiner Intelligence

Grants 85% — above average
85%
Career Allow Rate
793 granted / 937 resolved
+26.6% vs TC avg
Minimal -3% lift
Without
With
+-2.6%
Interview Lift
resolved cases with interview
Typical timeline
3y 1m
Avg Prosecution
27 currently pending
Career history
964
Total Applications
across all art units

Statute-Specific Performance

§101
11.8%
-28.2% vs TC avg
§103
56.3%
+16.3% vs TC avg
§102
11.9%
-28.1% vs TC avg
§112
10.7%
-29.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 937 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination 1. A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 2/27/2026 has been entered. Claim Status 2. Claims 1 and 5-6 have currently been amended and newly added claims 7-8 have been entered. Claim Objection 3. Claim 5 is objected to because of the following informalities: Line 2 of the claim should be amended to --Advanced Encryption Standard (AES)--. Appropriate correction is required. Response to Arguments 4. The applicant’s arguments have been taken into consideration, but are moot in view of the new grounds of rejection. In response to the applicant’s argument that the cited prior art fails to teach or suggest wherein the grouped round functions are executed in parallel by calling the single prescribed instruction: In light of the claim amendments, see newly cited prior art reference Wassenberg et al (US 2020/0401375), which discloses (fig. 3, ‘306/‘308 & par [0028], lines 1-3 of Wassenberg et al) a plurality of round functions being executed for a plurality of branches of 128 bits (e.g., wherein the instruction has an upper limit on a number of bits that are processable), and parallel processing of round functions for a reduction in latency (e.g., the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called). Claim Rejections – 35 USC 103 5. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office Action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. 6. Claims 1-8 are rejected under 35 USC 103 as being unpatentable over Shibuya et al (JP 2012/215816 A) in view of Gueron et al (US 8,194,854), further in view of Wassenberg et al (US 2020/0401375). Regarding claim 1, Shibuya et al teaches an encryption device that implements an encryption scheme in which Advanced Encryption Standard (AES) round functions (pg. 3, lines 1-10, which discloses scheduling encryption round functions in an environment using AES and other encryption standards) are executed multiple times in order to update each of multiple internal states of a defined bit length (pg. 10, lines 1-20 and pg. 17, lines 1-15, which disclose adjusting bit length-related data upon executing several encryption rounds). Shibuya et al does not explicitly teach a processor that, by calling a single prescribed instruction, collectively processing a group of the round functions that are executed in parallel; and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction. However, Gueron et al teaches a processor that, by calling a single prescribed instruction, collectively processing a group of the round functions that are executed in parallel (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations); and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations, upon execution of an AES round instruction). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Gueron et al within the disclosure of Shibuya et al in order to provide the predictive result of reducing latency in an AES provisioning system by performing cryptographic operations on data blocks in parallel (as disclosed in col. 4, lines 43-52 of Gueron et al), via allowing for processing of data blocks to be performed in parallel by dispatching an AES round instruction in every cycle, without waiting for the previous instruction to be completed. Shibuya et al and Gueron et al do not explicitly teach wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called. However, Wassenberg et al teaches wherein the instruction has an upper limit on a number of bits that are processable (fig. 3, ‘306/‘308, which discloses each round function being executed for a plurality of branches of 128 bits), and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called (par [0028], lines 1-3, which discloses parallel processing of round functions for a reduction in latency). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al in order to provide the predictive result of improving security by preventing potential adversaries from accessing data correlating to previous data samples that may be used to predict future data patterns that may be used to decrypt secure cryptographic data (as disclosed in par [0020] of Wassenberg et al). Regarding claim 2, Shibuya et al does not explicitly teach wherein, among the multiple round functions, those for which subsequent operations are of the same type are grouped. However, Gueron et al teaches wherein, among the multiple round functions, those for which subsequent operations are of the same type are grouped (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations, upon execution of an AES round instruction). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Gueron et al within the disclosure of Shibuya et al according to the motivation disclosed regarding claim 1. Regarding claim 3, Shibuya et al and Gueron et al do not explicitly teach wherein, among the multiple round functions, those for which input values to subsequent operations are at least partially the same are grouped. However, Wassenberg et al teaches wherein, among the multiple round functions, those for which input values to subsequent operations are at least partially the same are grouped (par [0027], lines 27-32). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al according to the motivation disclosed regarding claim 1. Regarding claim 4, Shibuya et al does not explicitly teach wherein the round functions are grouped by multiple instructions having different upper limits on the number of bits that are processable. However, Wassenberg et al teaches wherein the round functions are grouped by multiple instructions having different upper limits on the number of bits that are processable (par [0028], lines 5-8, “8 branches of 32-bits each”). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al according to the motivation disclosed regarding claim 1. Regarding claim 5, Shibuya et al teaches encryption method performed when a computer implements an encryption scheme in which AES round functions (pg. 3, lines 1-10, which discloses scheduling encryption round functions in an environment using AES and other encryption standards) are executed multiple times in order to update each of multiple internal states of a defined bit length (pg. 10, lines 1-20 and pg. 17, lines 1-15, which disclose adjusting bit length-related data upon executing several encryption rounds). Shibuya et al does not explicitly teach collectively processing, by calling a single prescribed instruction, a group of the round functions that are executed in parallel; wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called; and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction. However, Gueron et al teaches collectively, by calling a single prescribed instruction, a group of the round functions that are executed in parallel (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations); and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations, upon execution of an AES round instruction). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Gueron et al within the disclosure of Shibuya et al in order to provide the predictive result of reducing latency in an AES provisioning system by performing cryptographic operations on data blocks in parallel (as disclosed in col. 4, lines 43-52 of Gueron et al), via allowing for processing of data blocks to be performed in parallel by dispatching an AES round instruction in every cycle, without waiting for the previous instruction to be completed. Shibuya et al and Gueron et al do not explicitly teach wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called. However, Wassenberg et al teaches wherein the instruction has an upper limit on a number of bits that are processable (fig. 4, ‘306/‘308, which discloses each round function being executed for a plurality of branches of 128 bits), and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called (par [0028, lines 1-3, which discloses parallel processing of round functions for a reduction in latency). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al in order to provide the predictive result of improving security by preventing potential adversaries from accessing data correlating to previous data samples that may be used to predict future data patterns that may be used to decrypt secure cryptographic data (as disclosed in par [0020] of Wassenberg et al). Regarding claim 6, Shibuya et al teaches non-transitory computer recording medium storing an encryption program (pg. 28, lines 20-30) for making a computer function as an encryption device that implements an encryption scheme in which Advanced Encryption Standard (AES) round functions (pg. 3, lines 1-10, which discloses scheduling encryption round functions in an environment using AES and other encryption standards) are executed multiple times in order to update each of multiple internal states of a defined bit length (pg. 10, lines 1-20 and pg. 17, lines 1-15, which disclose adjusting bit length-related data upon executing several encryption rounds). Shibuya et al does not explicitly teach collectively processing, by calling a single prescribed instruction, a group of the round functions that are executed in parallel; wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called; and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction. However, Gueron et al teaches collectively processing, by calling a single prescribed instruction, a group of the round functions that are executed in parallel (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations); and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations, upon execution of an AES round instruction). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Gueron et al within the disclosure of Shibuya et al in order to provide the predictive result of reducing latency in an AES provisioning system by performing cryptographic operations on data blocks in parallel (as disclosed in col. 4, lines 43-52 of Gueron et al), via allowing for processing of data blocks to be performed in parallel by dispatching an AES round instruction in every cycle, without waiting for the previous instruction to be completed. Shibuya et al and Gueron et al do not explicitly teach wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called. However, Wassenberg et al teaches wherein the instruction has an upper limit on a number of bits that are processable (fig. 4, ‘306/‘308, which discloses each round function being executed for a plurality of branches of 128 bits), and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called (par [0028, lines 1-3, which discloses parallel processing of round functions for a reduction in latency). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al in order to provide the predictive result of improving security by preventing potential adversaries from accessing data correlating to previous data samples that may be used to predict future data patterns that may be used to decrypt secure cryptographic data (as disclosed in par [0020] of Wassenberg et al). Regarding claim 7, and Gueron et al do not explicitly teach wherein, the upper limit on the number of bits for the prescribed instruction is 256 bits, and wherein the grouped round functions include two round functions executed in parallel by calling the single prescribed instruction. However, Wassenberg et al teaches wherein, the upper limit on the number of bits for the prescribed instruction is 256 bits (par [0028], lines 5-8), and wherein the grouped round functions include two round functions executed in parallel by calling the single prescribed instruction (par [0028-0029]). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al according to the motivation disclosed regarding claim 1. Regarding claim 8, and Gueron et al do not explicitly teach wherein, the upper limit on the number of bits for the prescribed instruction is 512 bits, and wherein the grouped round functions include four round functions executed in parallel by calling the single prescribed instruction. However, Wassenberg et al teaches wherein, the upper limit on the number of bits for the prescribed instruction is 512 bits (par [0027], lines 27-28, which discloses executing 4 128-bit round functions in parallel), and wherein the grouped round functions include four round functions executed in parallel by calling the single prescribed instruction (par [0028], “total of four round functions”). It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al according to the motivation disclosed regarding claim 1. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to Randy A. Scott whose telephone number is (571) 272-3797. The examiner can normally be reached on Monday-Thursday 7:30 am-5:00 pm, second Fridays 7:30 am-4pm. If attempts to reach the examiner by telephone are unsuccessful, the examiner's supervisor, Luu Pham can be reached on (571) 270-5002. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /RANDY A SCOTT/Primary Examiner, Art Unit 2439 20260312
Read full office action

Prosecution Timeline

Jan 25, 2024
Application Filed
Jul 24, 2025
Non-Final Rejection — §103
Oct 21, 2025
Response Filed
Oct 28, 2025
Final Rejection — §103
Jan 28, 2026
Response after Non-Final Action
Feb 27, 2026
Request for Continued Examination
Mar 08, 2026
Response after Non-Final Action
Mar 15, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12564764
SYSTEM AND METHOD OF BASKETBALL TESTING
2y 5m to grant Granted Mar 03, 2026
Patent 12556581
Policy based privileged remote access in zero trust private networks
2y 5m to grant Granted Feb 17, 2026
Patent 12549389
DEVICE FOR IMPLEMENTING GATED ARRAY BLOCKCHAIN PROTECTION CODES FOR IOT DEVICES
2y 5m to grant Granted Feb 10, 2026
Patent 12531883
IDENTIFICATION OF MALICIOUS CONTENT IN OPERATING SYSTEM CLIPBOARD
2y 5m to grant Granted Jan 20, 2026
Patent 12531837
VALIDATION ENGINE FOR FIREWALL MIGRATION
2y 5m to grant Granted Jan 20, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
85%
Grant Probability
82%
With Interview (-2.6%)
3y 1m
Median Time to Grant
High
PTA Risk
Based on 937 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month