Prosecution Insights
Last updated: April 19, 2026
Application No. 18/372,430

OFFSHORE EQUIPMENT DESTRUCTION APPARATUS AND METHOD

Non-Final OA §103
Filed
Sep 25, 2023
Examiner
SCOTT, RANDY A
Art Unit
2439
Tech Center
2400 — Computer Networks
Assignee
ØRSTED WIND POWER A/S
OA Round
3 (Non-Final)
85%
Grant Probability
Favorable
3-4
OA Rounds
3y 1m
To Grant
82%
With Interview

Examiner Intelligence

Grants 85% — above average
85%
Career Allow Rate
793 granted / 937 resolved
+26.6% vs TC avg
Minimal -3% lift
Without
With
+-2.6%
Interview Lift
resolved cases with interview
Typical timeline
3y 1m
Avg Prosecution
27 currently pending
Career history
964
Total Applications
across all art units

Statute-Specific Performance

§101
11.8%
-28.2% vs TC avg
§103
56.3%
+16.3% vs TC avg
§102
11.9%
-28.1% vs TC avg
§112
10.7%
-29.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 937 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Continued Examination 1. A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 1/30/2026 has been entered. Claim Status 2. Claims 1 and 12 have currently been amended. Response to Arguments 3. The applicant’s arguments have been taken into consideration, but are moot in view of new grounds of rejection. In response to the applicant’s argument (disclosed on pg. 2 of the remarks segment) that Mostovych fails to teach a security controller for automatically controlling the initiator to trigger the destruction means in response to the identification of an unauthorized attempt to access the enclosure through at least the door: In light of the amended claim language, see newly cited prior art reference Wu et al (CN 111653441 A), which discloses (pg. 2, lines 33-36 of Wu et al), a self-destruction control switch and circuit implemented to destroy the cabin door opening upon detected abnormal opening of the sealed cabin door (e.g., a security controller for automatically controlling the initiator to trigger the destruction means in response to the identification of an unauthorized attempt to access the enclosure through at least the door). Claim Rejections – 35 USC 103 4. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office Action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. 5. Claims 1-3, 5-10, and 12-14 are rejected under 35 USC 103 as being unpatentable over Mostovych (US 2010/0064371) in view of Wu et al (CN 111653441 A). Regarding claim 1, Mostovych teaches an offshore equipment destruction apparatus (fig. 6, ‘505 & par [0042], which discloses destroying physical regions in a secure microdevice) comprising: a secure enclosure for housing equipment (par [0040], lines 1-5, which discloses protective housing in the secure microdevice for securing data); an initiator for triggering a destruction means located within the enclosure to render at least part of the equipment unusable (par [0037], lines 34-44, which discloses a pulse power system for imitating the destruction of a physical information containing region). Mostovych doesn’t explicitly teach the secure enclosure comprising a door for permitting authorized access to an interior and a body surrounding the interior within which the equipment is houseable; and a security controller for automatically controlling the initiator to trigger the destruction means in response to the identification of an unauthorized attempt to access the enclosure through at least the door. However, Wu et al teaches the secure enclosure comprising a door for permitting authorized access to an interior (pg. 2, lines 1-2, which discloses a cabin door of a mechanical device) and a body surrounding the interior within which the equipment is houseable (pg. 2, lines 1-15, pg. 5, lines 8-20, and pg. 6, lines 3-10, which disclose an external cabin cover to protect the internal content also secured using the cabin door); and a security controller for automatically controlling the initiator to trigger the destruction means in response to the identification of an unauthorized attempt to access the enclosure through at least the door (pg. 2, lines 33-36, which discloses a self-destruction control switch and circuit implemented to destroy the cabin door opening upon detected abnormal opening of the sealed cabin door). It would have been obvious to one of ordinary skill in the art, before the effective day of the invention, that one would be motivated to combine the teachings of Wu et al within the concept illustrated by Mostovych in order to improve upon prevention of leaking of secure information stored within a secure unit by implementing automatic destruction of a physical unit storing the secure information upon determining an anomalous access attempt to open the door of the physical unit (as disclosed in pg. 2, lines 1-35 of Wu et al) because implementing a self-destruction circuit within the tampering prevention disclosure of Mostovych would guarantee tampering prevention when completing destroying an entire secure enclosure upon unauthorized access attempts to secure data being detected. Regarding claim 2, Mostovych and Wu et al teach the limitations of claim 1. Mostovych further teaches wherein the destruction means is located within the housing for rendering at least part of the equipment unusable when triggered (par [0037], lines 34-44, which discloses physically destroying the information containing region). Regarding claim 3, Mostovych and Wu et al teach the limitations of claim 1. Mostovych further teaches wherein the destruction means comprises thermite (par [0037], lines 65-75, which discloses one of the destruction features being drawn to using energetic material, including rapidly burning fuel and thermite). Regarding claim 5, Mostovych and Wu et al teach the limitations of claim 1. Mostovych further teaches wherein the secure enclosure comprises a body surrounding the interior for resisting unauthorized access (par [0037], lines 5-7, “housing body”) and containing the effect of the destruction means when triggered (par [0037], lines 72-76, “causing the destruction of the information containing region”). Regarding claim 6, Mostovych and Wu et al teach the limitations of claim 1. Mostovych further teaches wherein the secure enclosure comprises at least one port for connecting the equipment to the exterior (par [0027], lines 1-4, “interface with external control devices”). Regarding claim 7, Mostovych and Wu et al teach the limitations of claim 1. Mostovych further teaches wherein the at least one port is for one or more of providing power to the equipment, connecting the equipment to exterior sensors, connecting the equipment to a communications interface (par [0027], lines 1-5, “interface with external control devices”), and providing a coolant medium for cooling the equipment. Regarding claim 8, Mostovych and Wu et al teach the limitations of claim 1. Mostovych further teaches an uninterruptable power supply for powering the security controller (par [0029], lines 11-15, which discloses using an internal power source when external power isn’t available). Regarding claim 9, Mostovych and Wu et al teach the limitations of claim 1. Mostovych further teaches wherein the security controller is configured to receive one or more breach indicators, each associated with a different security layer related to the equipment (par [0027], lines 24-28 & claim 5, “signals interpreted to be indicators of tampering”), and wherein the security controller triggers the initiator in response to receiving one or more of the breach indicators (par [0027], lines 18-20, “control signal for the controller to initiate the procedures of obliteration”). Regarding claim 10, Mostovych and Wu et al teach the limitations of claim 1. Mostovych further teaches wherein the security controller is configured to automatically control the initiator to trigger the destruction means after a predetermined time delay after the identification of an unauthorized attempt to access the enclosure (par [0028], which discloses the obliteration process beginning after the expiration of a preset time period). Regarding claim 12, Mostovych teaches an offshore equipment destruction method comprising the steps of: housing equipment in a secure enclosure (fig. 6, ‘505 & par [0042], which discloses destroying physical regions in a secure microdevice); providing an initiator for triggering a destruction means located within the enclosure to render at least part of the equipment unusable (par [0037], lines 34-44, which discloses a pulse power system for imitating the destruction of a physical information containing region); and identifying an unauthorized attempt to access the enclosure (par [0027], lines 18-28, which discloses a tamper detector detecting unauthorized data extraction). Mostovych doesn’t explicitly teach the secure enclosure comprising a door for permitting authorized access to an interior and a body surrounding the interior within which the equipment is housed; and controlling, using a security controller, the initiator to automatically trigger the destruction means in response to the identification of an unauthorized attempt through at least the door. However, Wu et al teaches the secure enclosure comprising a door for permitting authorized access to an interior (pg. 2, lines 1-2, which discloses a cabin door of a mechanical device) and a body surrounding the interior within which the equipment is houseable (pg. 2, lines 1-15, pg. 5, lines 8-20, and pg. 6, lines 3-10, which disclose an external cabin cover to protect the internal content also secured using the cabin door); and a security controller for automatically controlling the initiator to trigger the destruction means in response to the identification of an unauthorized attempt to access the enclosure through at least the door (pg. 2, lines 33-36, which discloses a self-destruction control switch and circuit implemented to destroy the cabin door opening upon detected abnormal opening of the sealed cabin door). It would have been obvious to one of ordinary skill in the art, before the effective day of the invention, that one would be motivated to combine the teachings of Wu et al within the concept illustrated by Mostovych in order to improve upon prevention of leaking of secure information stored within a secure unit by implementing automatic destruction of a physical unit storing the secure information upon determining an anomalous access attempt to open the door of the physical unit (as disclosed in pg. 2, lines 1-35 of Wu et al) because implementing a self-destruction circuit within the tampering prevention disclosure of Mostovych would guarantee tampering prevention when completing destroying an entire secure enclosure upon unauthorized access attempts to secure data being detected. Regarding claim 13, Mostovych and Wu et al teach the limitations of claim 12. Mostovych further teaches receiving one or more breach indicators, each associated with a different security layer related to the equipment (par [0027], lines 24-28 & claim 5, “signals interpreted to be indicators of tampering”), and wherein the step of controlling the initiator comprises triggering in response to receiving one or more of the breach indicators (par [0027], lines 18-20, “control signal for the controller to initiate the procedures of obliteration”). Regarding claim 14, Mostovych and Wu et al teach the limitations of claim 12. Mostovych further teaches wherein the step of controlling the initiator comprises triggering the destruction means after a predetermined time delay after the identification of an unauthorized attempt to access the enclosure (par [0028], which discloses the obliteration process beginning after the expiration of a preset time period). 6. Claims 4, 11, and 15 are rejected under 35 USC 103 as being unpatentable over Mostovych (US 2010/0064371) in view of Wu et al (CN 111653441 A), further in view of Gral (US 6,701,854). Regarding claim 4, Mostovych and Wu et al do not explicitly teach wherein the initiator comprises a pyrotechnic initiator for triggering the destruction means. However, Gral further teaches wherein the initiator comprises a pyrotechnic initiator for triggering the destruction means (col. 2, lines 51-56, which discloses implementing a pyrotechnic charge using a device’s detonator in the event that the device has been tampered with). It would have been obvious to one of ordinary skill in the art, before the effective day of the invention, that one would be motivated to combine the teachings of Gral within the teachings of Mostovych and Wu et al in order to improve tamper prevention by implementing a detonation cord to destroy contents in a device upon determining a device breach (as disclosed in col. 2, lines 50-60 of Gral) because this method would allow Mostovych and Wu et al to immediately prevent secure data within the device from being compromised upon any external edge of the device determined to have been opened in an unauthorized manner. Regarding claim 11, Mostovych and Wu et al do not explicitly teach wherein the security controller is configured to abort the triggering of the destruction means in response to the receipt of a reset signal. However, Gral further teaches wherein the security controller is configured to abort the triggering of the destruction means in response to the receipt of a reset signal (col. 1, lines 51-56, which discloses implementing a pyrotechnic charge using a device’s detonator in the event that the device has been tampered with). It would have been obvious to one of ordinary skill in the art, before the effective day of the invention, that one would be motivated to combine the teachings of Gral within the concepts illustrated by Mostovych and Wu et al, according to the motivation disclosed regarding claim 4. Regarding claim 15, Mostovych and Wu et al do not explicitly teach aborting the triggering of the destruction means in response to the receipt of a reset signal. However, Gral further teaches aborting the triggering of the destruction means in response to the receipt of a reset signal (col. 4, lines 20-25, which discloses preventing powering of pyrotechnic initiation). It would have been obvious to one of ordinary skill in the art, before the effective day of the invention, that one would be motivated to combine the teachings of Gral within the concepts illustrated by Mostovych and Wu et al, according to the motivation disclosed regarding claim 4. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to Randy A. Scott whose telephone number is (571) 272-3797. The examiner can normally be reached on Monday-Thursday 7:30 am-5:00 pm, second Fridays 7:30 am-4pm. If attempts to reach the examiner by telephone are unsuccessful, the examiner's supervisor, Luu Pham can be reached on (571) 270-5002. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /RANDY A SCOTT/Primary Examiner, Art Unit 2439 20250730
Read full office action

Prosecution Timeline

Sep 25, 2023
Application Filed
Apr 16, 2025
Non-Final Rejection — §103
Jul 16, 2025
Response Filed
Jul 31, 2025
Final Rejection — §103
Jan 30, 2026
Request for Continued Examination
Feb 09, 2026
Response after Non-Final Action
Feb 24, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12564764
SYSTEM AND METHOD OF BASKETBALL TESTING
2y 5m to grant Granted Mar 03, 2026
Patent 12556581
Policy based privileged remote access in zero trust private networks
2y 5m to grant Granted Feb 17, 2026
Patent 12549389
DEVICE FOR IMPLEMENTING GATED ARRAY BLOCKCHAIN PROTECTION CODES FOR IOT DEVICES
2y 5m to grant Granted Feb 10, 2026
Patent 12531883
IDENTIFICATION OF MALICIOUS CONTENT IN OPERATING SYSTEM CLIPBOARD
2y 5m to grant Granted Jan 20, 2026
Patent 12531837
VALIDATION ENGINE FOR FIREWALL MIGRATION
2y 5m to grant Granted Jan 20, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
85%
Grant Probability
82%
With Interview (-2.6%)
3y 1m
Median Time to Grant
High
PTA Risk
Based on 937 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month