Prosecution Insights
Last updated: April 19, 2026
Application No. 18/448,258

SIM AUTHENTICATION SERVICE

Final Rejection §103
Filed
Aug 11, 2023
Examiner
MILLER, BRANDON J
Art Unit
2647
Tech Center
2600 — Communications
Assignee
T-Mobile Innovations LLC
OA Round
2 (Final)
88%
Grant Probability
Favorable
3-4
OA Rounds
2y 5m
To Grant
96%
With Interview

Examiner Intelligence

Grants 88% — above average
88%
Career Allow Rate
929 granted / 1062 resolved
+25.5% vs TC avg
Moderate +9% lift
Without
With
+8.6%
Interview Lift
resolved cases with interview
Typical timeline
2y 5m
Avg Prosecution
34 currently pending
Career history
1096
Total Applications
across all art units

Statute-Specific Performance

§101
5.2%
-34.8% vs TC avg
§103
39.4%
-0.6% vs TC avg
§102
16.1%
-23.9% vs TC avg
§112
23.1%
-16.9% vs TC avg
Black line = Tech Center average estimate • Based on career data from 1062 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status I. The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Amendment II. This action is in response to applicants amendment/arguments filed on December 31, 2025. This action is made FINAL. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. III. Claims 1-5, 8-10, and 13-19 are rejected under 35 U.S.C. 103 as being unpatentable over Hancock et al. (US 10,136,318 B1) in view of Sperling et al. (US 2021/0084187 A1) and Akgun et al. (US 2006/0073840 A1). Regarding claim 1 Hancock teaches a method comprising: receiving, form a Wi-Fi access point, a first request to authenticate a first wireless device for access via the Wi-Fi access point (see col. 4, lines 52-67; col. 5, lines 1-5 and claim 1, Receiving an authentication request form a UE, wherein the authentication request seeks to authenticate the subscriber identity of the UE to a service capable of being provided by a network. The UE transmits the authentication request via a Wi-Fi access point. The UE authentication request is passed to an AAA server. This reads on receiving, form a Wi-Fi access point, a first request to authenticate a first wireless device for access via the Wi-Fi access point). Hancock does not specifically teach transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device. Sperling teaches transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device (see paragraph [0039] and Fig. 1, An authentication of a user credential for hotspot access may be performed. The mobile hotspot may transmit the credential to central billing server for authentication. This reads on transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to make the authentication in Hancock adapt to include transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device because it would allow for an efficient mechanism for managing billing for hotspot network access (see Sperling, paragraph [0003]). Hancock and Sperling do not specifically mention wherein the record is associated with an identifier for the Wi-Fi access point. Akgun teaches mention wherein the record is associated with an identifier for the Wi-Fi access point (see paragraphs [0044] – [0045], The mobile station inserts the access point identifier into a mobile registration message. The mobile registration message is a request by the mobile station to access the wireless network via the access point. The mobile device sends the mobile registration with the access point identifier to a network agent via the access point. The network agent receives the access point identifier and sends the access point identifier to the AAA server in for example an accounting record. This reads on wherein the record is associated with an identifier for the Wi-Fi access point). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to make the record in the Hancock and Sperling combination adapt to include being associated with an identifier for the Wi-Fi access point because it would allow for a well known mechanism for identifying the particular access point via which the mobile station will use to access the network so that various services can be provided to the mobile station (see Akgun, paragraph [0045]). Regarding claim 2 Hancock teaches transmitting to the Wi-Fi access point, an indicator of that the first wireless device is to be allowed access via the Wi-Fi access point (see col. 7, lines 1-7, The UE can comprise a subscriber identity module (SIM) card. The authentication request can comprise a MAC address and subscriber identity. This reads on transmitting to the Wi-Fi access point, an indicator of that the first wireless device is to be allowed access via the Wi-Fi access point). Regarding claim 3 Hancock teaches wherein the indicator that the first wireless device is to be allowed access via the Wi-Fi access point is based on a first subscriber identity module (SIM) associated with the first wireless device (see col. 7, lines 1-7, The UE can comprise a subscriber identity module (SIM) card. The authentication request can comprise a MAC address and subscriber identity. This reads on wherein the indicator that the first wireless device is to be allowed access via the Wi-Fi access point is based on a first subscriber identity module (SIM) associated with the first wireless device). Regarding claim 4 Hancock teaches searching for an indicator that the first wireless device is associated with being allowed access via the Wi-Fi access point (see col. 6, lines 54-65, A correlation component determines source device identifying information. This identifying information can be correlated to an authentication device that has record of a subscriber identity. This reads on searching for an indicator that the first wireless device is associated with being allowed access via the Wi-Fi access point). Regarding claim 5 Hancock teaches wherein searching for an indicator that the first wireless device is associated with being allowed access via the Wi-Fi access point comprises searching a database stored in a radio access network (RAN) point (see col. 6, lines 7-16 & 54-65, A correlation component determines source device identifying information. This identifying information can be correlated to an authentication device that has record of a subscriber identity. The correlation component can be included in the ARDD. The ARDD can be located at a Wi-Fi access point at a radio access network (RAN) device. This reads wherein searching for an indicator that the first wireless device is associated with being allowed access via the Wi-Fi access point comprises searching a database stored in a radio access network (RAN) point). Regarding claim 8 Hancock teaches a system for recording authentication request for access to a Wi-Fi network (see col. 5, lines 52-55 & 65-67), the system comprising: a processing node; and a processor coupled to the processing node, the processor being configured to perform operations (see col. 17, lines 20-28 & 49-51 and col. 19, lines 58-67) comprising: receiving, form a Wi-Fi access point, a first request to authenticate a first wireless device for access via the Wi-Fi access point (see col. 4, lines 52-67; col. 5, lines 1-5 and claim 1, Receiving an authentication request form a UE, wherein the authentication request seeks to authenticate the subscriber identity of the UE to a service capable of being provided by a network. The UE transmits the authentication request via a Wi-Fi access point. The UE authentication request is passed to an AAA server. This reads on receiving, form a Wi-Fi access point, a first request to authenticate a first wireless device for access via the Wi-Fi access point). Hancock does not specifically teach transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device. Sperling teaches transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device (see paragraph [0039] and Fig. 1, An authentication of a user credential for hotspot access may be performed. The mobile hotspot may transmit the credential to central billing server for authentication. This reads on transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to make the authentication in Hancock adapt to include transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device because it would allow for an efficient mechanism for managing billing for hotspot network access (see Sperling, paragraph [0003]). Hancock and Sperling do not specifically mention wherein the record is associated with an identifier for the Wi-Fi access point. Akgun teaches mention wherein the record is associated with an identifier for the Wi-Fi access point (see paragraphs [0044] – [0045], The mobile station inserts the access point identifier into a mobile registration message. The mobile registration message is a request by the mobile station to access the wireless network via the access point. The mobile device sends the mobile registration with the access point identifier to a network agent via the access point. The network agent receives the access point identifier and sends the access point identifier to the AAA server in for example an accounting record. This reads on wherein the record is associated with an identifier for the Wi-Fi access point). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to make the record in the Hancock and Sperling combination adapt to include being associated with an identifier for the Wi-Fi access point because it would allow for a well known mechanism for identifying the particular access point via which the mobile station will use to access the network so that various services can be provided to the mobile station (see Akgun, paragraph [0045]). Regarding claim 9 Hancock, Sperling, and Akgun teach limitations as recited in claim 2 and therefore claim 9 is rejected for the same reasons given above. Regarding claim 10 Hancock, Sperling, and Akgun teach limitations as recited in claim 3 and therefore claim 10 is rejected for the same reasons given above. Regarding claim 13 Hancock, Sperling, and Akgun teach limitations as recited in claim 4 and therefore claim 13 is rejected for the same reasons given above. Regarding claim 14 Hancock, Sperling, and Akgun teach limitations as recited in claim 5 and therefore claim 14 is rejected for the same reasons given above. Regarding claim 15 Hancock teaches a non-transitory computer-readable medium, storing instructions executed by a processor to perform operations (see col. 17, lines 20-28 & 49-51 and col. 19, lines 58-67) comprising: receiving, form a Wi-Fi access point, a first request to authenticate a first wireless device for access via the Wi-Fi access point (see col. 4, lines 52-67; col. 5, lines 1-5 and claim 1, Receiving an authentication request form a UE, wherein the authentication request seeks to authenticate the subscriber identity of the UE to a service capable of being provided by a network. The UE transmits the authentication request via a Wi-Fi access point. The UE authentication request is passed to an AAA server. This reads on receiving, form a Wi-Fi access point, a first request to authenticate a first wireless device for access via the Wi-Fi access point). Hancock does not specifically teach transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device. Sperling teaches transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device (see paragraph [0039] and Fig. 1, An authentication of a user credential for hotspot access may be performed. The mobile hotspot may transmit the credential to central billing server for authentication. This reads on transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to make the authentication in Hancock adapt to include transmitting, to a billing processing node, a record of the first request to authenticate the first wireless device because it would allow for an efficient mechanism for managing billing for hotspot network access (see Sperling, paragraph [0003]). Hancock and Sperling do not specifically mention wherein the record is associated with an identifier for the Wi-Fi access point. Akgun teaches mention wherein the record is associated with an identifier for the Wi-Fi access point (see paragraphs [0044] – [0045], The mobile station inserts the access point identifier into a mobile registration message. The mobile registration message is a request by the mobile station to access the wireless network via the access point. The mobile device sends the mobile registration with the access point identifier to a network agent via the access point. The network agent receives the access point identifier and sends the access point identifier to the AAA server in for example an accounting record. This reads on wherein the record is associated with an identifier for the Wi-Fi access point). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to make the record in the Hancock and Sperling combination adapt to include being associated with an identifier for the Wi-Fi access point because it would allow for a well known mechanism for identifying the particular access point via which the mobile station will use to access the network so that various services can be provided to the mobile station (see Akgun, paragraph [0045]). Regarding claim 16 Hancock, Sperling, and Akgun teach limitations as recited in claim 2 and therefore claim 16 is rejected for the same reasons given above. Regarding claim 17 Hancock, Sperling, and Akgun teach limitations as recited in claim 3 and therefore claim 17 is rejected for the same reasons given above. Regarding claim 18 Hancock, Sperling, and Akgun teach limitations as recited in claim 4 and therefore claim 18 is rejected for the same reasons given above. Regarding claim 19 Hancock, Sperling, and Akgun teach limitations as recited in claim 5 and therefore claim 19 is rejected for the same reasons given above. IV. Claims 6-7, 11-12, and 20 are rejected under 35 U.S.C. 103 as being unpatentable over Hancock et al (US 10,136,318 B1) in view of Sperling et al. (US 2012/0084187 A1), Akgun et al. (US 2006/0073840 A1) and Singla et al. (US 2017/0272317 A1). Regarding claim 6 Hancock, Sperling, and Akgun teach the method of claim 1 except for associating the record of the first request to authenticate the first wireless device with an operator of the Wi-Fi access point. Singla teaches associating the record of the first request to authenticate the first wireless device with an operator of the Wi-Fi access point (see paragraph [0133], The Wi-Fi node’s credentials are transmitted by a parent access point to the authentication service. There, the connecting device’s credentials are verified. In case of successful authentication, the Wi-Fi node is allowed to connect. This reads on associating the record of the first request to authenticate the first wireless device with an operator of the Wi-Fi access point). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to make the Hancock, Sperling, and Akgun combination adapt to include associating the record of the first request to authenticate the first wireless device with an operator of the Wi-Fi access point because it would allow for an efficient mechanism for determining and providing device authentication (see Singla above). Regarding claim 7 Hancock, Sperling, and Akgun teach the method of claim 4 including receiving, form a Wi-Fi access point, a second request to authenticate a second wireless device for access via the Wi-Fi access point (see Hancock, col. 4, lines 52-67 & 1-5 and claim 1, Receiving an authentication request form a UE, wherein the authentication request seeks to authenticate the subscriber identity of the UE to a service capable of being provided by a network. The UE transmits the authentication request via a Wi-Fi access point. The UE authentication request is passed to an AAA server. The authentication request for network access can comprise network access for multiple devices (see Sperling, paragraphs [0010] & [0073]). This reads on receiving, form a Wi-Fi access point, a second request to authenticate a second wireless device for access via the Wi-Fi access point); transmitting, to the billing processing node, a record of the second request to authenticate the second wireless device (see Sperling, paragraph [0039] and Fig. 1, An authentication of a user credential for hotspot access may be performed. The authentication request for network access can comprise network access for multiple devices (see Sperling, paragraphs [0010] & [0073]). The mobile hotspot may transmit the credential to central billing server for authentication. This reads on transmitting, to the billing processing node, a record of the second request to authenticate the second wireless device), wherein the record is associated with the identifier for the Wi-Fi access point (see Akgun, paragraphs [0044] – [0045], The mobile station inserts the access point identifier into a mobile registration message. The mobile registration message is a request by the mobile station to access the wireless network via the access point. The mobile device sends the mobile registration with the access point identifier to a network agent via the access point. The network agent receives the access point identifier and sends the access point identifier to the AAA server in for example an accounting record. This reads on wherein the record is associated with an identifier for the Wi-Fi access point) and except for transmitting to the W-Fi access point, an indicator of that the second wireless device is not to be allowed access via the Wi-Fi access point. Singla teaches transmitting to the W-Fi access point, an indicator of that the second wireless device is not to be allowed access via the Wi-Fi access point (see paragraph [0133], The Wi-Fi node’s credentials are transmitted by a parent access point to the authentication service. There, the connecting device’s credentials are verified. In case of failed authentication, the Wi-Fi node is backlisted and denied a connection. The WiFi node being blacklist and denied access to the parent access point indicates that an indication is transmitted notifying the blacklisted status and denied status and reads on transmitting to the W-Fi access point, an indicator of that the second wireless device is not to be allowed access via the Wi-Fi access point). It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to make the Hancock, Sperling, and Akgun combination adapt to include transmitting to the W-Fi access point, an indicator of that the second wireless device is not to be allowed access via the Wi-Fi access point because it would allow for an efficient mechanism for determining and providing device authentication (see Singla above). Regarding claim 11 Hancock, Sperling, Akgun and Singla teach limitations as recited in claim 7 and therefore claim 11 is rejected for the same reasons given above. Regarding claim 12 Hancock, Sperling, Akgun and Singla teach the system of claim 11 including wherein the second wireless device is not to be allowed access via the Wi-Fi access point is based on a second SIM associated with the second device (see Hancock, col. 3, lines 40-42 and Sperling, paragraphs [0010] & [0073], The SIM card can comprise a subscriber identity to be used to authenticate a terminal for access (Hancock). The authentication request for network access can comprise network access for multiple devices (Sperling). This reads on wherein the second wireless device is not to be allowed access via the Wi-Fi access point is based on a second SIM associated with the second device). Regarding claim 20 Hancock, Sperling, Akgun and Singla teach limitations as recited in claim 7 and therefore claim 20 is rejected for the same reasons given above. Response to Arguments V. Applicant’s arguments with respect to claims 1-20 have been considered but are moot in view of the new grounds of rejection. Conclusion VI. The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Fiorillo Pub. No.: US 2017/0223061 A1 discloses method and entity in a LI system for positioning of a target connected to a Wi-Fi network including an Accounting request message including the SSID of the Wi-Fi network and transmitting the Accounting request message to the AAA server (see paragraphs [0034] & [0042]). Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to BRANDON J MILLER whose telephone number is (571)272-7869. The examiner can normally be reached M-F. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Alison Slater can be reached at 571-270-0375. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /BRANDON J MILLER/Primary Examiner, Art Unit 2647 February 27, 2026
Read full office action

Prosecution Timeline

Aug 11, 2023
Application Filed
Sep 30, 2025
Non-Final Rejection — §103
Dec 31, 2025
Response Filed
Feb 27, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12587939
TECHNIQUES FOR MOBILITY OF REDUCED CAPABILITY DEVICES IN WIRELESS COMMUNICATIONS
2y 5m to grant Granted Mar 24, 2026
Patent 12556606
SYSTEM AND METHOD FOR SERVER BASED CONTROL
2y 5m to grant Granted Feb 17, 2026
Patent 12550098
INITIAL ATTACH PRIORITIZATION METHOD AND SYSTEM
2y 5m to grant Granted Feb 10, 2026
Patent 12538188
INTERWORKING BETWEEN FIFTH GENERATION CORE (5GC) AND EVOLVED PACKET CORE (EPC) IN WIRELESS COMMUNICATION NETWORKS
2y 5m to grant Granted Jan 27, 2026
Patent 12532286
METHOD AND APPARATUS FOR POLICY-BASED ACCESS TO NETWORKS
2y 5m to grant Granted Jan 20, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
88%
Grant Probability
96%
With Interview (+8.6%)
2y 5m
Median Time to Grant
Moderate
PTA Risk
Based on 1062 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month