Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Continued Examination
1. A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 2/27/2026 has been entered.
Claim Status
2. Claims 1 and 5-6 have currently been amended and newly added claims 7-8 have been entered.
Claim Objection
3. Claim 5 is objected to because of the following informalities:
Line 2 of the claim should be amended to --Advanced Encryption Standard (AES)--. Appropriate correction is required.
Response to Arguments
4. The applicant’s arguments have been taken into consideration, but are moot in view of the new grounds of rejection.
In response to the applicant’s argument that the cited prior art fails to teach or suggest wherein the grouped round functions are executed in parallel by calling the single prescribed instruction:
In light of the claim amendments, see newly cited prior art reference Wassenberg et al (US 2020/0401375), which discloses (fig. 3, ‘306/‘308 & par [0028], lines 1-3 of Wassenberg et al) a plurality of round functions being executed for a plurality of branches of 128 bits (e.g., wherein the instruction has an upper limit on a number of bits that are processable), and parallel processing of round functions for a reduction in latency (e.g., the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called).
Claim Rejections – 35 USC 103
5. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office Action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
6. Claims 1-8 are rejected under 35 USC 103 as being unpatentable over Shibuya et al (JP 2012/215816 A) in view of Gueron et al (US 8,194,854), further in view of Wassenberg et al (US 2020/0401375).
Regarding claim 1, Shibuya et al teaches an encryption device that implements an encryption scheme in which Advanced Encryption Standard (AES) round functions (pg. 3, lines 1-10, which discloses scheduling encryption round functions in an environment using AES and other encryption standards) are executed multiple times in order to update each of multiple internal states of a defined bit length (pg. 10, lines 1-20 and pg. 17, lines 1-15, which disclose adjusting bit length-related data upon executing several encryption rounds).
Shibuya et al does not explicitly teach a processor that, by calling a single prescribed instruction, collectively processing a group of the round functions that are executed in parallel; and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction.
However, Gueron et al teaches a processor that, by calling a single prescribed instruction, collectively processing a group of the round functions that are executed in parallel (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations); and
wherein the grouped round functions are executed in parallel by calling the single prescribed instruction (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations, upon execution of an AES round instruction).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Gueron et al within the disclosure of Shibuya et al in order to provide the predictive result of reducing latency in an AES provisioning system by performing cryptographic operations on data blocks in parallel (as disclosed in col. 4, lines 43-52 of Gueron et al), via allowing for processing of data blocks to be performed in parallel by dispatching an AES round instruction in every cycle, without waiting for the previous instruction to be completed.
Shibuya et al and Gueron et al do not explicitly teach wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called.
However, Wassenberg et al teaches wherein the instruction has an upper limit on a number of bits that are processable (fig. 3, ‘306/‘308, which discloses each round function being executed for a plurality of branches of 128 bits), and
the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called (par [0028], lines 1-3, which discloses parallel processing of round functions for a reduction in latency).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al in order to provide the predictive result of improving security by preventing potential adversaries from accessing data correlating to previous data samples that may be used to predict future data patterns that may be used to decrypt secure cryptographic data (as disclosed in par [0020] of Wassenberg et al).
Regarding claim 2, Shibuya et al does not explicitly teach wherein, among the multiple round functions, those for which subsequent operations are of the same type are grouped.
However, Gueron et al teaches wherein, among the multiple round functions, those for which subsequent operations are of the same type are grouped (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations, upon execution of an AES round instruction).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Gueron et al within the disclosure of Shibuya et al according to the motivation disclosed regarding claim 1.
Regarding claim 3, Shibuya et al and Gueron et al do not explicitly teach wherein, among the multiple round functions, those for which input values to subsequent operations are at least partially the same are grouped.
However, Wassenberg et al teaches wherein, among the multiple round functions, those for which input values to subsequent operations are at least partially the same are grouped (par [0027], lines 27-32).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al according to the motivation disclosed regarding claim 1.
Regarding claim 4, Shibuya et al does not explicitly teach wherein the round functions are grouped by multiple instructions having different upper limits on the number of bits that are processable.
However, Wassenberg et al teaches wherein the round functions are grouped by multiple instructions having different upper limits on the number of bits that are processable (par [0028], lines 5-8, “8 branches of 32-bits each”).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al according to the motivation disclosed regarding claim 1.
Regarding claim 5, Shibuya et al teaches encryption method performed when a computer implements an encryption scheme in which AES round functions (pg. 3, lines 1-10, which discloses scheduling encryption round functions in an environment using AES and other encryption standards) are executed multiple times in order to update each of multiple internal states of a defined bit length (pg. 10, lines 1-20 and pg. 17, lines 1-15, which disclose adjusting bit length-related data upon executing several encryption rounds).
Shibuya et al does not explicitly teach collectively processing, by calling a single prescribed instruction, a group of the round functions that are executed in parallel; wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called; and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction.
However, Gueron et al teaches collectively, by calling a single prescribed instruction, a group of the round functions that are executed in parallel (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations); and
wherein the grouped round functions are executed in parallel by calling the single prescribed instruction (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations, upon execution of an AES round instruction).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Gueron et al within the disclosure of Shibuya et al in order to provide the predictive result of reducing latency in an AES provisioning system by performing cryptographic operations on data blocks in parallel (as disclosed in col. 4, lines 43-52 of Gueron et al), via allowing for processing of data blocks to be performed in parallel by dispatching an AES round instruction in every cycle, without waiting for the previous instruction to be completed.
Shibuya et al and Gueron et al do not explicitly teach wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called.
However, Wassenberg et al teaches wherein the instruction has an upper limit on a number of bits that are processable (fig. 4, ‘306/‘308, which discloses each round function being executed for a plurality of branches of 128 bits), and
the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called (par [0028, lines 1-3, which discloses parallel processing of round functions for a reduction in latency).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al in order to provide the predictive result of improving security by preventing potential adversaries from accessing data correlating to previous data samples that may be used to predict future data patterns that may be used to decrypt secure cryptographic data (as disclosed in par [0020] of Wassenberg et al).
Regarding claim 6, Shibuya et al teaches non-transitory computer recording medium storing an encryption program (pg. 28, lines 20-30) for making a computer function as an encryption device that implements an encryption scheme in which Advanced Encryption Standard (AES) round functions (pg. 3, lines 1-10, which discloses scheduling encryption round functions in an environment using AES and other encryption standards) are executed multiple times in order to update each of multiple internal states of a defined bit length (pg. 10, lines 1-20 and pg. 17, lines 1-15, which disclose adjusting bit length-related data upon executing several encryption rounds).
Shibuya et al does not explicitly teach collectively processing, by calling a single prescribed instruction, a group of the round functions that are executed in parallel; wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called; and wherein the grouped round functions are executed in parallel by calling the single prescribed instruction.
However, Gueron et al teaches collectively processing, by calling a single prescribed instruction, a group of the round functions that are executed in parallel (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations); and
wherein the grouped round functions are executed in parallel by calling the single prescribed instruction (col. 10, lines 29-32, which discloses parallel processing of a sequence of AES round operations, upon execution of an AES round instruction).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Gueron et al within the disclosure of Shibuya et al in order to provide the predictive result of reducing latency in an AES provisioning system by performing cryptographic operations on data blocks in parallel (as disclosed in col. 4, lines 43-52 of Gueron et al), via allowing for processing of data blocks to be performed in parallel by dispatching an AES round instruction in every cycle, without waiting for the previous instruction to be completed.
Shibuya et al and Gueron et al do not explicitly teach wherein the instruction has an upper limit on a number of bits that are processable, and the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called.
However, Wassenberg et al teaches wherein the instruction has an upper limit on a number of bits that are processable (fig. 4, ‘306/‘308, which discloses each round function being executed for a plurality of branches of 128 bits), and
the round functions are grouped to minimize a processing load in accordance with a number of times the instruction is called (par [0028, lines 1-3, which discloses parallel processing of round functions for a reduction in latency).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al in order to provide the predictive result of improving security by preventing potential adversaries from accessing data correlating to previous data samples that may be used to predict future data patterns that may be used to decrypt secure cryptographic data (as disclosed in par [0020] of Wassenberg et al).
Regarding claim 7, and Gueron et al do not explicitly teach wherein, the upper limit on the number of bits for the prescribed instruction is 256 bits, and wherein the grouped round functions include two round functions executed in parallel by calling the single prescribed instruction.
However, Wassenberg et al teaches wherein, the upper limit on the number of bits for the prescribed instruction is 256 bits (par [0028], lines 5-8), and wherein the grouped round functions include two round functions executed in parallel by calling the single prescribed instruction (par [0028-0029]).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al according to the motivation disclosed regarding claim 1.
Regarding claim 8, and Gueron et al do not explicitly teach wherein, the upper limit on the number of bits for the prescribed instruction is 512 bits, and wherein the grouped round functions include four round functions executed in parallel by calling the single prescribed instruction.
However, Wassenberg et al teaches wherein, the upper limit on the number of bits for the prescribed instruction is 512 bits (par [0027], lines 27-28, which discloses executing 4 128-bit round functions in parallel), and wherein the grouped round functions include four round functions executed in parallel by calling the single prescribed instruction (par [0028], “total of four round functions”).
It would have been obvious to one of ordinary skill in the art before the effective date of the claimed invention to be motivated to combine the teachings of Wassenberg et al within the disclosure of Shibuya et al and Gueron et al according to the motivation disclosed regarding claim 1.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to Randy A. Scott whose telephone number is (571) 272-3797. The examiner can normally be reached on Monday-Thursday 7:30 am-5:00 pm, second Fridays 7:30 am-4pm.
If attempts to reach the examiner by telephone are unsuccessful, the examiner's supervisor, Luu Pham can be reached on (571) 270-5002. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/RANDY A SCOTT/Primary Examiner, Art Unit 2439 20260312