Prosecution Insights
Last updated: April 19, 2026
Application No. 18/432,504

RANDOM ACCESS METHOD AND APPARATUS

Non-Final OA §103§112
Filed
Feb 05, 2024
Examiner
PATEL, MAHENDRA R
Art Unit
2645
Tech Center
2600 — Communications
Assignee
Huawei Technologies Co., Ltd.
OA Round
1 (Non-Final)
89%
Grant Probability
Favorable
1-2
OA Rounds
2y 10m
To Grant
99%
With Interview

Examiner Intelligence

Grants 89% — above average
89%
Career Allow Rate
803 granted / 906 resolved
+26.6% vs TC avg
Strong +18% interview lift
Without
With
+18.5%
Interview Lift
resolved cases with interview
Typical timeline
2y 10m
Avg Prosecution
16 currently pending
Career history
922
Total Applications
across all art units

Statute-Specific Performance

§101
6.5%
-33.5% vs TC avg
§103
58.7%
+18.7% vs TC avg
§102
11.3%
-28.7% vs TC avg
§112
14.6%
-25.4% vs TC avg
Black line = Tech Center average estimate • Based on career data from 906 resolved cases

Office Action

§103 §112
DETAILED ACTION This communication is in response to the claims filed on 02/23/2024. Application No: 18/432,504 The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Notice of Pre-AIA or AIA Status In the event the determination of the status of the application as subject to AIA 35 U. S. C. 102 and 103 (or as subject to pre-AIA 35 U. S. C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. Claim Objections Claim 1 (and similarly other independent claims) is objected. Claim is generally narrative, failing to conform to current U.S. practice. Method claim requires smaller steps ending with a semi-colon. The claim is in one long paragraph, combing two or three different elements in to one limitation. It is recommended to separate different elements in to separate smaller steps limitations (ending with a semi-colon) for better clarity of the invention. Further, claims is not clearly disclosing outcome of the sentence: “a first random access configuration of N first features, wherein at least one first feature of the N first features is one feature or one feature combination, wherein the first random access configuration comprises M first configurations and N second configurations, wherein there is a correspondence between the M first configurations and the N second configurations”. However, if “N” and “M” are number 1, then what is the outcome of the invention is not clearly disclosed. Also recommended to define first and second features first in the claim before using variables “N” and “M". Appropriate correction is required for further review. Claim 2 (and similarly other dependent claims) is objected. Claim is generally narrative, failing to conform to current U.S. practice. Claim states that “ wherein the correspondence existing between the M first configurations and the N second configurations comprises the system information comprising M pieces of first information, wherein the M pieces of first information indicate the M first configurations, and wherein each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features“. The claim is in one long paragraph, combing two or three different elements in to one limitation. It is recommended to separate different elements in to separate smaller steps limitations (ending with a semi-colon) for better clarity of the invention. Also recommended to define first and second configuration first in the claim before using variables “N” and “M". Appropriate correction is required for further review. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claim 1-20 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Claim 1 (and similarly other independent claims) recites the limitation “ … “a first random access configuration of N first features, wherein at least one first feature of the N first features is one feature or one feature combination, wherein the first random access configuration comprises M first configurations and N second configurations, wherein there is a correspondence between the M first configurations and the N second configurations”. However, if “N” and “M” are number 1. then what is the outcome of the invention is not clearly disclosed. Also recommended to define first and second features and configurations in the claim before using variables “N” and “M". Dependent claims are rejected for the same reasons as corresponding independent claims. Appropriate correction is required in all claims for further review. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U. S. C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U. S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U. S. C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1-3, 6-8, 11-13 and 16-20 are rejected under 35 U. S. C. 103 as being unpatentable over JIANG et al. (US 20190223227 A1) in view of ZHAO et al. ( WO 2021087929 A1). Regarding claim 1, JIANG teaches a random access method ([0066], e.g. the embodiment provides a random access method, applicable to a network device, such as a gNB (a base station in NR). FIG. 3 is a flowchart of the method. [0006] It was found by the inventors that a concept of bandwidth part (BWP) is introduced into a new radio (NR) system, and a DL (downlink)/UL (uplink) bandwidth may contain a plurality of BWPs. Each UE may be configured with one or more DL/UL BWPs, and receive/transmit uplink/downlink data using one of the configured DL/UL BWPs at the same time), comprising: receiving, by a terminal device, system information of a network device, wherein the system information indicates a first random access configuration of N first feature ([0100], e.g. in the case where the network device triggers the UE to initiate the random access, the network device may further indicate the UE of a DL BWP for transmitting msg.2 (such as a DL BWP index). Hence, the UE may determine a DL BWP receiving msg.2, and monitor and receive msg.2 on the DL BWP (i.e. receiving, by a terminal device, system information of a network device). [0095] If DL BWPs that may be used for transmitting msg.2 are indicated in system information and/or RRC signaling, time-frequency resources and/or preambles that may be used for transmitting msg.1 and the DL BWPs that may be used for transmitting msg.2 may be indicated in one RRC IE of the same message (such as system information/group-specific RRC/UE-specific RRC (i.e. the system information indicates a first random access configuration of N first feature)). [0095] For example, one message contains one or more RRC IEs (such as CSI-MeasConfig) indicating an SSB or CSI-RS configuration, each IE indicating the CSI-RS configuration containing corresponding time-frequency resources and/or preambles (such as RACH-ConfigCommon, RACH-ConfigDedicated) and corresponding DL BWPs used for transmitting msg.2 (i.e. the system information indicates a first random access configuration of N first feature). [0006] Each UE may be configured with one or more DL/UL BWPs, and receive/transmit uplink/downlink data using one of the configured DL/UL BWPs at the same time), wherein at least one first feature of the N first features is one feature or one feature combination ([0006], e.g. a base station informs the UE of such information as an initial PRB index (or referred to as a value of offset from an initial PRB to a first PRB in a downlink bandwidth) of each DL/UL BWP, a subcarrier spacing, the number of physical resource blocks (PRBs) (or bandwidths), and a cyclic prefix (CP) length, etc. (i.e. at least one first feature of the N first features is one feature or one feature combination). DL/UL BWP configurations of different UE may be different), wherein the first random access configuration comprises M first configurations and N second configurations ([0006], e.g. a base station informs the UE of such information as an initial PRB index (or referred to as a value of offset from an initial PRB to a first PRB in a downlink bandwidth) of each DL/UL BWP, a subcarrier spacing, the number of physical resource blocks (PRBs) (or bandwidths), and a cyclic prefix (CP) length, etc. DL/UL BWP configurations of different UE may be different (i.e. the first random access configuration comprises M first configurations and N second configurations)), wherein there is a correspondence between the M first configurations and the N second configurations, wherein M and N are positive integers ([0006], e.g. DL/UL BWP configurations of different UE may be different (i.e. is a correspondence between the M first configurations and the N second configurations. Assume N=1, M=1)). JIANG teaches that a random access method and apparatus and a communication system. With this method, according to a time-frequency resource and/or a preamble used by a random access request transmitted by the UE and/or indication information carried by the random access request, the base station may determine a DL BWP feeding back an RAR, thereby ensuring normal access of the UE. However JIANG differs from the claimed invention in not specifically and clearly describing wherein initiating random access based on the first random access configuration. However, in the analogous field of endeavor, ZHAO teaches wherein initiating random access based on the first random access configuration ([ 1. Four-step random access process paragraph ], e.g. The network device configures the terminal device with the priority value of the parameter #1 in the random access process through the information #1. The terminal device judges whether the network device is configured with the priority value of parameter #1 before initiating the random access process (i.e. initiating random access based on the first random access configuration). When the network device configures the terminal device with the priority value of parameter #1, the terminal device initiates according to the priority value of parameter #1 In the random access process). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to implement the method of ZHAO within the method of JIANG. The motivation to combine references is that the combined system provides that the terminal device is enabled to preferentially select, according to the priority value of the first parameter, a two-step random access process or use higher power to send a message in the random access process, so as to achieve the purposes of quickly accessing a network and reducing access delay (See ZHAO [abstract]). Regarding claim 2, JIANG in view of ZHAO teaches all the limitations of claim 1. JIANG further teaches wherein the correspondence existing between the M first configurations and the N second configurations comprises the system information comprising M pieces of first information, wherein the M pieces of first information indicate the M first configurations, and wherein each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features ([0079], e.g. In the above two implementations, the above first UE and second UE may be identical or different, that is, it is possible that the same UE uses identical or different time-frequency resources (i.e. resource identification) to transmit different preambles (i.e. each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features)). Regarding claim 3, JIANG in view of ZHAO teaches all the limitations of claim 1. JIANG further teaches wherein the correspondence existing between the M first configurations and the N second configurations comprises the system information comprising N pieces of second information, wherein the N pieces of second information indicate the N second configurations, and wherein each piece of second information of the N pieces of second information comprises an identifier of at least one first feature of the N first features and an index of at least one first configuration of the M first configurations ([0079], e.g. In the above two implementations, the above first UE and second UE may be identical or different (I.e. UE identification), that is, it is possible that the same UE uses identical or different time-frequency resources (i.e. resource identification) to transmit different preambles (i.e. each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features)). Regarding claim 6, JIANG teaches a data transmission apparatus ([0066], e.g. the embodiment provides a random access method (i.e. method steps executed by an apparatus), applicable to a network device, such as a gNB (a base station in NR). FIG. 3 is a flowchart of the method. [0006] It was found by the inventors that a concept of bandwidth part (BWP) is introduced into a new radio (NR) system, and a DL (downlink)/UL (uplink) bandwidth may contain a plurality of BWPs. Each UE may be configured with one or more DL/UL BWPs, and receive/transmit uplink/downlink data using one of the configured DL/UL BWPs at the same time), comprising: one or more processors; and at least one non-transitory computer readable memory connected to the one or more processors and including computer program code, wherein the at least one non-transitory computer readable memory and the computer program code are configured, with the one or more processors ([0203], e.g. FIG. 14 is a schematic diagram of a structure of a UE 1400 of the embodiment. As shown in FIG. 14, the UE 1400 may include a central processing unit 1401 and a memory 1402, the memory 1402 being coupled to the central processing unit 1401.), to cause the apparatus to at least: receive system information of a network device, wherein the system information indicates a first random access configuration of N first features ([0100], e.g. in the case where the network device triggers the UE to initiate the random access, the network device may further indicate the UE of a DL BWP for transmitting msg.2 (such as a DL BWP index). Hence, the UE may determine a DL BWP receiving msg.2, and monitor and receive msg.2 on the DL BWP (i.e. receiving, by a terminal device, system information of a network device). [0095] If DL BWPs that may be used for transmitting msg.2 are indicated in system information and/or RRC signaling, time-frequency resources and/or preambles that may be used for transmitting msg.1 and the DL BWPs that may be used for transmitting msg.2 may be indicated in one RRC IE of the same message (such as system information/group-specific RRC/UE-specific RRC (i.e. the system information indicates a first random access configuration of N first feature)). [0095] For example, one message contains one or more RRC IEs (such as CSI-MeasConfig) indicating an SSB or CSI-RS configuration, each IE indicating the CSI-RS configuration containing corresponding time-frequency resources and/or preambles (such as RACH-ConfigCommon, RACH-ConfigDedicated) and corresponding DL BWPs used for transmitting msg.2 (i.e. the system information indicates a first random access configuration of N first feature). [0006] Each UE may be configured with one or more DL/UL BWPs, and receive/transmit uplink/downlink data using one of the configured DL/UL BWPs at the same time), wherein at least one first feature of the N first features is one feature or one feature combination ([0006], e.g. a base station informs the UE of such information as an initial PRB index (or referred to as a value of offset from an initial PRB to a first PRB in a downlink bandwidth) of each DL/UL BWP, a subcarrier spacing, the number of physical resource blocks (PRBs) (or bandwidths), and a cyclic prefix (CP) length, etc. (i.e. at least one first feature of the N first features is one feature or one feature combination). DL/UL BWP configurations of different UE may be different), wherein the first random access configuration comprises M first configurations and N second configurations ([0006], e.g. a base station informs the UE of such information as an initial PRB index (or referred to as a value of offset from an initial PRB to a first PRB in a downlink bandwidth) of each DL/UL BWP, a subcarrier spacing, the number of physical resource blocks (PRBs) (or bandwidths), and a cyclic prefix (CP) length, etc. DL/UL BWP configurations of different UE may be different (i.e. the first random access configuration comprises M first configurations and N second configurations)), wherein there is a correspondence between the M first configurations and the N second configurations, M and N are positive integers ([0006], e.g. DL/UL BWP configurations of different UE may be different (i.e. is a correspondence between the M first configurations and the N second configurations. Assume N=1, M=1)). JIANG teaches that a random access method and apparatus and a communication system. With this method, according to a time-frequency resource and/or a preamble used by a random access request transmitted by the UE and/or indication information carried by the random access request, the base station may determine a DL BWP feeding back an RAR, thereby ensuring normal access of the UE. However JIANG differs from the claimed invention in not specifically and clearly describing wherein initiate random access based on the first random access configuration. However, in the analogous field of endeavor, ZHAO teaches wherein initiating random access based on the first random access configuration ([ 1. Four-step random access process paragraph ], e.g. The network device configures the terminal device with the priority value of the parameter #1 in the random access process through the information #1. The terminal device judges whether the network device is configured with the priority value of parameter #1 before initiating the random access process (i.e. initiating random access based on the first random access configuration). When the network device configures the terminal device with the priority value of parameter #1, the terminal device initiates according to the priority value of parameter #1 In the random access process). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to implement the method of ZHAO within the method of JIANG. The motivation to combine references is that the combined system provides that the terminal device is enabled to preferentially select, according to the priority value of the first parameter, a two-step random access process or use higher power to send a message in the random access process, so as to achieve the purposes of quickly accessing a network and reducing access delay (See ZHAO [abstract]). Regarding claim 7 JIANG in view of ZHAO teaches all the limitations of claim 6. JIANG further teaches wherein the correspondence existing between the M first configurations and the N second configurations comprises the system information comprising M pieces of first information, wherein the M pieces of first information indicate the M first configurations, and wherein each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features ([0079], e.g. In the above two implementations, the above first UE and second UE may be identical or different, that is, it is possible that the same UE uses identical or different time-frequency resources (i.e. resource identification) to transmit different preambles (i.e. each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features)). Regarding claim 8, JIANG in view of ZHAO teaches all the limitations of claim 6. JIANG further teaches wherein the correspondence existing between the M first configurations and the N second configurations comprises the system information 0079], e.g. In the above two implementations, the above first UE and second UE may be identical or different, that is, it is possible that the same UE uses identical or different time-frequency resources (i.e. resource identification) to transmit different preambles (i.e. each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features)). Regarding claim 11, JIANG I teaches a non-transitory computer readable medium storing instructions that are executable by a computer a first communication apparatus ([0203], e.g. FIG. 14 is a schematic diagram of a structure of a UE 1400 of the embodiment. As shown in FIG. 14, the UE 1400 may include a central processing unit 1401 and a memory 1402 (i.e. a non-transitory computer readable medium), the memory 1402 being coupled to the central processing unit 1401.), and wherein the instructions comprise instructions for causing the first communications apparatus ([0066], e.g. the embodiment provides a random access method (i.e. method steps executed by an apparatus), applicable to a network device, such as a gNB (a base station in NR). FIG. 3 is a flowchart of the method. [0006] It was found by the inventors that a concept of bandwidth part (BWP) is introduced into a new radio (NR) system, and a DL (downlink)/UL (uplink) bandwidth may contain a plurality of BWPs. Each UE may be configured with one or more DL/UL BWPs, and receive/transmit uplink/downlink data using one of the configured DL/UL BWPs at the same time), to perform: receiving system information of a network device, wherein the system information indicates a first random access configuration of N first features ([0100], e.g. in the case where the network device triggers the UE to initiate the random access, the network device may further indicate the UE of a DL BWP for transmitting msg.2 (such as a DL BWP index). Hence, the UE may determine a DL BWP receiving msg.2, and monitor and receive msg.2 on the DL BWP (i.e. receiving, by a terminal device, system information of a network device). [0095] If DL BWPs that may be used for transmitting msg.2 are indicated in system information and/or RRC signaling, time-frequency resources and/or preambles that may be used for transmitting msg.1 and the DL BWPs that may be used for transmitting msg.2 may be indicated in one RRC IE of the same message (such as system information/group-specific RRC/UE-specific RRC (i.e. the system information indicates a first random access configuration of N first feature)). [0095] For example, one message contains one or more RRC IEs (such as CSI-MeasConfig) indicating an SSB or CSI-RS configuration, each IE indicating the CSI-RS configuration containing corresponding time-frequency resources and/or preambles (such as RACH-ConfigCommon, RACH-ConfigDedicated) and corresponding DL BWPs used for transmitting msg.2 (i.e. the system information indicates a first random access configuration of N first feature). [0006] Each UE may be configured with one or more DL/UL BWPs, and receive/transmit uplink/downlink data using one of the configured DL/UL BWPs at the same time), wherein at least one first feature of the N features is one feature or one feature combination ([0006], e.g. a base station informs the UE of such information as an initial PRB index (or referred to as a value of offset from an initial PRB to a first PRB in a downlink bandwidth) of each DL/UL BWP, a subcarrier spacing, the number of physical resource blocks (PRBs) (or bandwidths), and a cyclic prefix (CP) length, etc. (i.e. at least one first feature of the N first features is one feature or one feature combination). DL/UL BWP configurations of different UE may be different), the first random access configuration comprises M first configurations and N second configurations ([0006], e.g. a base station informs the UE of such information as an initial PRB index (or referred to as a value of offset from an initial PRB to a first PRB in a downlink bandwidth) of each DL/UL BWP, a subcarrier spacing, the number of physical resource blocks (PRBs) (or bandwidths), and a cyclic prefix (CP) length, etc. DL/UL BWP configurations of different UE may be different (i.e. the first random access configuration comprises M first configurations and N second configurations)), wherein there is a correspondence between the M first configurations and the N second configurations, and wherein M and N are positive integers ([0006], e.g. DL/UL BWP configurations of different UE may be different (i.e. is a correspondence between the M first configurations and the N second configurations. Assume N=1, M=1)). JIANG teaches that a random access method and apparatus and a communication system. With this method, according to a time-frequency resource and/or a preamble used by a random access request transmitted by the UE and/or indication information carried by the random access request, the base station may determine a DL BWP feeding back an RAR, thereby ensuring normal access of the UE. However JIANG differs from the claimed invention in not specifically and clearly describing wherein initiating random access based on the first random access configuration. However, in the analogous field of endeavor, ZHAO teaches wherein initiating random access based on the first random access configuration ([ 1. Four-step random access process paragraph ], e.g. The network device configures the terminal device with the priority value of the parameter #1 in the random access process through the information #1. The terminal device judges whether the network device is configured with the priority value of parameter #1 before initiating the random access process (i.e. initiating random access based on the first random access configuration). When the network device configures the terminal device with the priority value of parameter #1, the terminal device initiates according to the priority value of parameter #1 In the random access process). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to implement the method of ZHAO within the method of JIANG. The motivation to combine references is that the combined system provides that the terminal device is enabled to preferentially select, according to the priority value of the first parameter, a two-step random access process or use higher power to send a message in the random access process, so as to achieve the purposes of quickly accessing a network and reducing access delay (See ZHAO [abstract]). Regarding claim 12, JIANG in view of ZHAO teaches all the limitations of claim 11. JIANG further teaches wherein the correspondence existing between the M first configurations and the N second configurations comprises the system information 0079], e.g. In the above two implementations, the above first UE and second UE may be identical or different, that is, it is possible that the same UE uses identical or different time-frequency resources (i.e. resource identification) to transmit different preambles (i.e. each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features)). Regarding claim 13, JIANG in view of ZHAO teaches all the limitations of claim 11. JIANG further teaches wherein the correspondence existing between the M first configurations and the N second configurations comprises the system information comprising N pieces of second information, wherein the N pieces of second information indicate the N second configurations, and wherein each piece of second information of the N pieces of second information comprises an identifier of at least one first feature of the N first features and an index of at least one first configuration one of the M first configurations ([0079], e.g. In the above two implementations, the above first UE and second UE may be identical or different, that is, it is possible that the same UE uses identical or different time-frequency resources (i.e. resource identification) to transmit different preambles (i.e. each piece of first information of the M pieces of first information comprises an identifier of one or more first features of the N first features)). Regarding claim 16, JIANG in view of ZHAO teaches all the limitations of claim 1. JIANG further teaches wherein there is a different correspondence between a first configuration of the M first configurations and two or more second configurations of the N second configurations ([0006], e.g. DL/UL BWP configurations of different UE may be different (i.e. is a correspondence between the M first configurations and the N second configurations. Assume N=1, M=1)). Regarding claim 17, JIANG in view of ZHAO teaches all the limitations of claim 4. ZHAO further teaches wherein the paging message further carries priority information about the second feature ([ 1. Four-step random access process paragraph ], e.g. The network device configures the terminal device with the priority value of the parameter #1 in the random access process through the information #1. The terminal device judges whether the network device is configured with the priority value of parameter #1 before initiating the random access process (i.e. initiating random access based on the first random access configuration). When the network device configures the terminal device with the priority value of parameter #1, the terminal device initiates according to the priority value of parameter #1 In the random access process). The motivation to combine reference of ZHAO within the method of JIANG before the effective filing date of the invention is that the new method provides that the priority value is an optional configuration parameter, and the terminal device adopts the priority value to initiate a random access process when the priority value is configured, which can quickly access the network to reduce time delay (See ZHAO [summary of the invention]). Regarding claim 18, JIANG in view of ZHAO teaches all the limitations of claim 6. JIANG further teaches wherein there is a different correspondence between a first configuration of the M first configurations and two or more second configurations of the N second configurations ([0006], e.g. DL/UL BWP configurations of different UE may be different (i.e. is a correspondence between the M first configurations and the N second configurations. Assume N=1, M=1)). Regarding claim 19, JIANG in view of ZHAO teaches all the limitations of claim 9. ZHAO further teaches wherein the paging message further carries priority information about the second feature ([ 1. Four-step random access process paragraph ], e.g. The network device configures the terminal device with the priority value of the parameter #1 in the random access process through the information #1. The terminal device judges whether the network device is configured with the priority value of parameter #1 before initiating the random access process (i.e. initiating random access based on the first random access configuration). When the network device configures the terminal device with the priority value of parameter #1, the terminal device initiates according to the priority value of parameter #1 In the random access process). The motivation to combine reference of ZHAO within the method of JIANG before the effective filing date of the invention is that the new method provides that the priority value is an optional configuration parameter, and the terminal device adopts the priority value to initiate a random access process when the priority value is configured, which can quickly access the network to reduce time delay (See ZHAO [summary of the invention]). Regarding claim 20, JIANG in view of ZHAO teaches all the limitations of claim 10. JIANG further teaches wherein there is a different correspondence between a first configuration of the M first configurations and two or more second configurations of the N second configurations ([0006], e.g. DL/UL BWP configurations of different UE may be different (i.e. is a correspondence between the M first configurations and the N second configurations. Assume N=1, M=1)). Allowable Subject Matter Claims 4-5, 9-10 and 14-15 are objected to as being dependent upon a rejected base claim, but would be allowable, if rewritten in independent form including all of the limitations of the base claim and any intervening claims, and amending claims to overcome any objection(s) and /or rejection(s) set forth in this Office action. Prior Art Record The prior art made of record and not relied upon is considered pertinent to applicant’s disclosure. Vajapeyam; Madhavan Srinivasan (US-20160295609-A1) - . SHI; Yulong (US-20190335512-A1) - . Islam; Muhammad Nazmul (US-11330639-B2) - . Yang; Ning (US-11690097-B2) - . YOU, Chunhua (WO-2020164527-A1) - . Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to Mahendra Patel whose telephone number is (571) 270-7499. The examiner can normally be reached on 9:30 AM to 5:30 PM (EST) . Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, Applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Anthony Addy can be reached on (571) 272-7795(571) 272-7795. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free) ? If you would like assistance from a USPTO customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /MAHENDRA R PATEL/ Primary Examiner, Art Unit 2645
Read full office action

Prosecution Timeline

Feb 05, 2024
Application Filed
Jan 16, 2026
Examiner Interview (Telephonic)
Jan 27, 2026
Non-Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12604263
SYSTEMS AND METHODS TO CONTROL ACCESS IN AIR-TO-GROUND NETWORKS OPERATING IN UNLICENSED SPECTRUM
2y 5m to grant Granted Apr 14, 2026
Patent 12603700
SPACE COMMUNICATION PROTOCOLS
2y 5m to grant Granted Apr 14, 2026
Patent 12597993
DEVICE SETTINGS FOR SATELLITE NETWORKS
2y 5m to grant Granted Apr 07, 2026
Patent 12598651
MESSAGE TRANSMISSION METHOD AND APPARATUS, SIGNAL SENDING METHOD AND APPARATUS, AND COMMUNICATION DEVICE
2y 5m to grant Granted Apr 07, 2026
Patent 12587945
USER EQUIPMENT POLICY RULE INCONSISTENCY DETERMINATION USING DETECTION CODES
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
89%
Grant Probability
99%
With Interview (+18.5%)
2y 10m
Median Time to Grant
Low
PTA Risk
Based on 906 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month