Prosecution Insights
Last updated: April 19, 2026
Application No. 18/479,739

STORAGE DEVICE PREDICTING FAILURE USING MACHINE LEARNING AND METHOD OF OPERATING THE SAME

Non-Final OA §101§103
Filed
Oct 02, 2023
Examiner
MEHRMANESH, ELMIRA
Art Unit
2113
Tech Center
2100 — Computer Architecture & Software
Assignee
Samsung Electronics Co., Ltd.
OA Round
3 (Non-Final)
84%
Grant Probability
Favorable
3-4
OA Rounds
2y 11m
To Grant
90%
With Interview

Examiner Intelligence

Grants 84% — above average
84%
Career Allow Rate
612 granted / 732 resolved
+28.6% vs TC avg
Moderate +7% lift
Without
With
+6.8%
Interview Lift
resolved cases with interview
Typical timeline
2y 11m
Avg Prosecution
20 currently pending
Career history
752
Total Applications
across all art units

Statute-Specific Performance

§101
15.1%
-24.9% vs TC avg
§103
30.2%
-9.8% vs TC avg
§102
30.9%
-9.1% vs TC avg
§112
12.6%
-27.4% vs TC avg
Black line = Tech Center average estimate • Based on career data from 732 resolved cases

Office Action

§101 §103
DETAILED ACTION This action is in response to an amendment filed on August 11, 2025 for the application of Kwon et al., for a “Storage device predicting failure using machine learning and method of operating the same” filed on October 2, 2023. The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claims 1-20 are pending in the application. Claims 1, 5, 8, and 15-16 have been amended. Claims 1-20 are rejected under 35 USC § 101. Claims 1-20 are rejected under 35 USC § 103. Claim Rejections - 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-20 are rejected under 35 U.S.C. 101 because the claimed invention is directed to an abstract idea without significantly more. The claim(s) recite(s) mental processes-concepts performed in human mind. As per claim 1, with the exception of the recitation of the limitation(s) “a storage device”, the limitations “identifying risk data from at least a portion of telemetry information, stored in a memory, based on a first criterion; inputting first data of a first attribute, from among the risk data, to a machine learning model; obtaining a first anomaly score output from the machine learning model; detecting whether an anomaly is present in the first attribute, based on a determination of whether the first anomaly score satisfies a second criterion; transmitting an alert, associated with the first attribute, to a host in response to the anomaly being detected, the alert enabling the host to determine whether the anomaly will cause the failure and to output feedback based on the determination; and controlling an operation of the storage device in response to receiving the feedback, corresponding to the alert, from the host, wherein the machine learning model is configured to be trained on the risk data, to learn a pattern of data from the risk data, and to output anomaly scores based on the learned pattern of the data, and wherein the controlling the operation of the storage device includes training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure, and controlling the operation of the storage device such that the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure.” can be performed by a human mind or with the aid of pen and paper. (MPEP 2106.04(a)(2)). The limitations reciting steps to identify risk data, input first data into a model, obtaining a first anomaly score, detecting whether an anomaly is present based on the score, and adjusting the first attribute in which the anomaly is detected, merely require a person looking at collected data and thinking/analyzing the collected data by comparing the data and calculating a score. It is therefore a simple matter of a person looking at the data and thinking about the characteristics of the data to accomplish the above steps. Step 2A. This judicial exception is not integrated into a practical application because the additional element(s) “a storage device” is/are directed to generic computer components recited at a high-level of generality such that they amount to nothing more than mere instructions to apply the exception using generic computer components (MPEP 2106.05(f)). The limitation(s) of “transmitting an alert” is/are mere data gathering recited at a high level of generality, and thus are insignificant extra-solution activity (MPEP 2106.05(g). The limitation(s) of “controlling an operation of the storage device in response to receiving feedback” and “the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure” recite(s) steps that merely apply controlling operations, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). The limitation(s) of “wherein the machine learning model is configured to be trained on the risk data” and “training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure” recite(s) steps that merely apply a machine learning model for generic training, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). Step 2B. The claim(s) does/do not include additional elements that are sufficient to amount to significantly more than the judicial exception. The additional element(s) “a storage device” does/do not provide significantly more than the recited judicial exception because the additional elements are mere instructions to implement an abstract idea or other exception on a computer and in this case generic computer components (MPEP 2106.05(f)). The limitation(s) of “transmitting an alert” is/are mere data gathering recited at a high level of generality, and thus are insignificant extra-solution activity. These limitations amount to transmitting data over a network and are well-understood, routine, conventional activity (MPEP 2106.05(d)). The limitation(s) of “controlling an operation of the storage device in response to receiving feedback” and “the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure” recite(s) steps that merely apply controlling operations, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). The limitation(s) of “wherein the machine learning model is configured to be trained on the risk data” and “training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure” recite(s) steps that merely apply a machine learning model for generic training, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). As for the limitations recited in claims 2-7, when considering each of the claims as a whole these additional elements do not integrate the exception into a practical application, using one or more of the considerations laid out by the Supreme Court and the Federal Circuit. The additional elements do not reflect an improvement in the functioning of a computer, or an improvement to other technology or technical field. The additional elements do not implement a judicial exception with, or use a judicial exception in conjunction with, a particular machine or manufacture that is integral to the claim. The additional element do not apply or use the judicial exception in some other meaningful way beyond generally linking the use of the judicial exception to a particular technological environment, such that the claim as a whole is more than a drafting effort designed to monopolize the exception. As per claim 8, with the exception of the recitation of the limitation(s) “A storage device comprising: a nonvolatile memory; and a controller comprising a memory configured to store telemetry information on the storage device, the controller including processing circuitry”, the limitations “identify risk data from at least a portion of telemetry information, stored in at least one of the memory or the nonvolatile memory, based on a first criterion; input first data of a first attribute, from among the risk data, to a machine learning model; obtain a first anomaly score output from the machine learning model; detect whether an anomaly is present in the first attribute, based on a determination of whether the first anomaly score satisfies a second criterion; transmit an alert, associated with the first attribute, to a host in response to the anomaly being detected, the alert enabling the host to determine whether the anomaly will cause a failure and to output feedback based on the determination; and control an operation of the storage device in response to receiving the feedback from the host, wherein the machine learning model is configured to be trained on the risk data, to learn a pattern of data from the risk data, and to output anomaly scores based on the learned pattern of the data, and wherein the control the operation of the storage device includes training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure, and controlling the operation of the storage device such that the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure.” can be performed by a human mind or with the aid of pen and paper. (MPEP 2106.04(a)(2)). Step 2A. This judicial exception is not integrated into a practical application because the additional element(s) “A storage device comprising: a nonvolatile memory; and a controller comprising a memory configured to store telemetry information on the storage device, the controller including processing circuitry” is/are directed to generic computer components recited at a high-level of generality such that they amount to nothing more than mere instructions to apply the exception using generic computer components (MPEP 2106.05(f)). The limitation(s) of “transmit an alert” is/are mere data gathering recited at a high level of generality, and thus are insignificant extra-solution activity (MPEP 2106.05(g). The limitation(s) of “control an operation of the storage device in response to receiving feedback” and “the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure” recite(s) steps that merely apply controlling operations, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). The limitation(s) of “wherein the machine learning model is configured to be trained on the risk data” and “training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure” recite(s) steps that merely apply a machine learning model for generic training, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). Step 2B. The claim(s) does/do not include additional elements that are sufficient to amount to significantly more than the judicial exception. The additional element(s) “A storage device comprising: a nonvolatile memory; and a controller comprising a memory configured to store telemetry information on the storage device, the controller including processing circuitry” does/do not provide significantly more than the recited judicial exception because the additional elements are mere instructions to implement an abstract idea or other exception on a computer and in this case generic computer components (MPEP 2106.05(f)). The limitation(s) of “transmit an alert” is/are mere data gathering recited at a high level of generality, and thus are insignificant extra-solution activity. These limitations amount to transmitting data over a network and are well-understood, routine, conventional activity (MPEP 2106.05(d)). The limitation(s) of “control an operation of the storage device in response to receiving feedback” and “the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure” recite(s) steps that merely apply controlling operations, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). The limitation(s) of “wherein the machine learning model is configured to be trained on the risk data” and “training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure” recite(s) steps that merely apply a machine learning model for generic training, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). As per claim 15, with the exception of the recitation of the limitation(s) “A storage device comprising: a nonvolatile memory; and a controller comprising a memory configured to store telemetry information on the storage device, and processing circuitry configured to store risk data identified from the telemetry information, store a debug dump based on detection of an anomaly”, the limitations “identify risk data from at least a portion of telemetry information, stored in the memory, based on a first criterion, detect whether an anomaly is present in at least a portion of attributes, among the stored risk data, through a machine learning model trained using the identified risk data, transmit an alert, associated with an attribute in which the anomaly is detected, to a host in response to an anomaly being detected, the alert enabling the host to determine whether the anomaly will cause a failure and to output feedback based on the determination, and control an operation of the storage device in response to receiving the feedback from the host, wherein the machine learning model is configured to learn a pattern from received data and to output anomaly scores based on the learned pattern, and wherein the control the operation of the storage device includes training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure, and controlling the operation of the storage device such that the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure.” can be performed by a human mind or with the aid of pen and paper. (MPEP 2106.04(a)(2)). Step 2A. This judicial exception is not integrated into a practical application because the additional element(s) “A storage device comprising: a nonvolatile memory; and a controller comprising a memory configured to store telemetry information on the storage device, and processing circuitry configured to store risk data identified from the telemetry information, store a debug dump based on detection of an anomaly” is/are directed to generic computer components recited at a high-level of generality such that they amount to nothing more than mere instructions to apply the exception using generic computer components (MPEP 2106.05(f)). The limitation(s) of “transmit an alert” is/are mere data gathering recited at a high level of generality, and thus are insignificant extra-solution activity (MPEP 2106.05(g). The limitation(s) of “control an operation of the storage device in response to receiving feedback” and “the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure” recite(s) steps that merely apply controlling operations, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). The limitation(s) of “wherein the machine learning model is configured to be trained on the risk data” and “training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure” recite(s) steps that merely apply a machine learning model for generic training, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). Step 2B. The claim(s) does/do not include additional elements that are sufficient to amount to significantly more than the judicial exception. The additional element(s) “A storage device comprising: a nonvolatile memory; and a controller comprising a memory configured to store telemetry information on the storage device, and processing circuitry configured to store risk data identified from the telemetry information, store a debug dump based on detection of an anomaly” does/do not provide significantly more than the recited judicial exception because the additional elements are mere instructions to implement an abstract idea or other exception on a computer and in this case generic computer components (MPEP 2106.05(f)). The limitation(s) of “transmit an alert” is/are mere data gathering recited at a high level of generality, and thus are insignificant extra-solution activity. These limitations amount to transmitting data over a network and are well-understood, routine, conventional activity (MPEP 2106.05(d)). The limitation(s) of “control an operation of the storage device in response to receiving feedback” and “the first attribute in which the anomaly is detected is adjusted when the feedback received from the host is based on a determination that the anomaly will cause the failure” recite(s) steps that merely apply controlling operations, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). The limitation(s) of “wherein the machine learning model is configured to be trained on the risk data” and “training the machine learning model when the feedback received from the host is based on a determination that the anomaly will not cause the failure” recite(s) steps that merely apply a machine learning model for generic training, which represents merely adding the words “apply it”, or an equivalent, which are not indicative of an inventive concept (MPEP 2106.05(f)). As per claims 9-14 and 16-20, please refer to analysis section for claims 2-7. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1-4, 8-12, and 14 are rejected under 35 U.S.C. 103 as being unpatentable over Mcguinness et al. (U.S. PGPUB 20210342205) in view of Elmtalab et al. (U.S. PGPUB 20210200654). As per claims 1 and 8, Mcguinness discloses a failure prediction method of predicting a failure of a storage device ([0014]), the failure prediction method comprising/a storage device comprising: a nonvolatile memory; and a controller comprising a memory configured to store telemetry information on the storage device ([0004]), the controller including processing circuitry configured to: identifying risk data from at least a portion of telemetry information, stored in a memory, based on a first criterion ([0014], “telemetry data that is obtained from the storage device 134 and/or (ii) a failure risk score that is calculated based on the telemetry data”); inputting first data of a first attribute, from among the risk data, to a machine learning model (Fig. 1, “predictive failure model 120”); obtaining a first anomaly score output from the machine learning model ([0014], “The predictive failure model may receive, as input, telemetry data that is produced by a storage device 134 (which is part of the field system 120) and calculate, based on the telemetry data, a failure risk score that indicates the likelihood of the storage device 134 failing”); detecting whether an anomaly is present in the first attribute, based on a determination of whether the first anomaly score satisfies a second criterion ([0025], “if the failure risk score is above a threshold (or within a first range), the risk score analyzer 116 may determine that the storage device 134 is at risk of failing”); transmitting an alert, associated with the first attribute, to a host in response to the anomaly being detected ([0026], “As a result of executing the predictive failure model, the failure inference engine 122 may calculate a failure risk score for the storage device 134, which indicates the likelihood of the storage device 134 failing. After the failure risk score is calculated, the failure inference engine 122 may provide the failure risk score to the risk score analyzer 116.” and [0045]) and (Fig. 6), the alert enabling the host to determine whether the anomaly will cause the failure and to output feedback based on the determination (Fig. 2, elements 270, 280, and 210); and controlling an operation of the storage device in response to receiving feedback, corresponding to the alert, from the host ([0026], “Upon receiving the failure risk score for the storage device 134, the risk score analyzer 116 may execute a preemptive maintenance action for the storage device 134.” and [0045]) and (Fig. 6), wherein the machine learning model is configured to be trained on the risk data, to learn a pattern of data from the risk data, and to output anomaly scores based on the learned pattern of the data ([0027], “The predictive failure model may be trained by using a supervised learning algorithm and/or any other suitable type of training algorithm, such as an unsupervised anomaly detection algorithm that is arranged to detect anomalous behavior of storage devices by training on historic non-anomalous processed data of manufacturer-specific storage devices. The predictive failure model may be arranged to learn the behavior of a storage device telemetry and to detect major degradation patterns of the storage device that result in failure or imminent failure.”), and wherein the controlling the operation of the storage device includes training the machine learning model when the feedback (Fig. 2) and ([0032]-[0035]) received from the host is based on a determination that the anomaly will not cause the failure (Fig. 2, elements 270 and 210), and Mcguinness fails to explicitly disclose adjusting the first attribute in which the anomaly is detected. Elmtalab of analogous art teaches controlling the operation of the storage device such that the first attribute in which the anomaly is detected is adjusted ([0028], “In response to determining the failure prediction 224, the NVDIMM 100 may execute remedial operations to lower the current temperatures of the controller 132 and/or the NV memory 130”) when the feedback received from the host is based on a determination that the anomaly will cause the failure ([0027], “The NVDIMM 100 can determine the failure prediction 224 when the temperature predictions exceed the temperature threshold 222.”). All of the claimed elements were known in Mcguinness and Elmtalab and could have been combined by known methods with no change in their respective functions. It therefore would have been obvious to a person of ordinary skill in the art before the time of effective filing language to combine their storage failure detection methods. One would be motivated to make this combination since Elmtalab’s adjusting attributes is a mere example of Mcguinness’s preemptive maintenance action. As per claims 2 and 9, Mcguinness discloses generating first variance data from the first data of the first attribute; inputting the first variance data to the machine learning model (Fig. 2); and obtaining a second anomaly score from the machine learning model based on the first variance data (Figs. 2 and 5); and determining whether an anomaly has occurred in the first attribute, in response to the second anomaly score satisfying a third criterion (Fig. 6) and ([0025]). As per claims 3 and 11, Mcguinness discloses monitoring the telemetry information during a first period ([0014], “telemetry data that is produced by a storage device 134”) to identify the at least the portion of the telemetry information as the risk data; and storing the identified risk data in at least one of a nonvolatile memory or the memory ([0014] and [0034]). As per claims 4 and 12, Mcguinness discloses the machine learning model is trained to output criteria modulated for at least one of the first criterion, the second criterion, and the third criterion (Fig. 3), based on at least one of the risk data or the feedback received from the host, and the failure prediction method further comprises at least one of identifying the risk data or determining whether an anomaly has occurred in the risk data, based on the modulated criteria (Figs. 2-6). As per claim 10, Mcguinness discloses the controller is configured to infer a causal factor of the anomaly in response to the detection of the anomaly ([0028]-[0029]), and the alert transmitted to the host comprises the inferred causal factor ([0026], “As a result of executing the predictive failure model, the failure inference engine 122 may calculate a failure risk score for the storage device 134, which indicates the likelihood of the storage device 134 failing. After the failure risk score is calculated, the failure inference engine 122 may provide the failure risk score to the risk score analyzer 116.” and [0045]) and (Fig. 6). As per claim 14, Mcguinness discloses the feedback comprises a control signal enabling the storage device to prevent the failure ([0029], “The preemptive maintenance action (that is executed based on the failure risk score) may include any suitable type of action for preventing a data loss that might result from a failure of the storage device 134.”), and the processing circuitry is further configured to control an operation of the storage device based on the control signal (Fig. 6, element 606, “EXECUTE THE PREEMPTIVE MAINTENANCE ACTION”). Claims 5-7, 13 and 15-20 are rejected under 35 U.S.C. 103 as being unpatentable over Mcguinness et al. (U.S. PGPUB 20210342205) in view of Elmtalab et al. (U.S. PGPUB 20210200654) and in further view of Karuppiah et al. (U.S. Patent No. 11422921). As per claims 5 and 13, Mcguinness fails to explicitly disclose a debug feature. Karuppiah of analogous art teaches enabling a debug feature, associated with the first attribute, in response to detecting the anomaly in the first attribute (col. 7, lines 14-35); determining whether the failure in the storage device has occurred, based on a failure criterion (col. 7, lines 29-35, “The debug HW 160 may be configured to receive a stream of FW events from the data storage device 120 and compare a FW event ID of each FW event to the ID of the triggering FW event. In response to detecting a match, the debug HW 160 may transmit a general purpose input/output (GPIO) signal to the cross feature hardware 170”); and storing a debug dump (col. 7, lines 23-29, “One or more memory devices of the debug HW 160 may comprise a controller read-only memory and/or a controller volatile memory (e.g., DRAM) in which the ID of a triggering firmware (FW) event may be stored along with firmware (FW) events written by the data storage device 120”), corresponding to the enabled debug feature in response to a determination that the failure has occurred in the storage device (Figs. 1B-1C). All of the claimed elements were known in Mcguinness and Karuppiah and could have been combined by known methods with no change in their respective functions. It therefore would have been obvious to a person of ordinary skill in the art before the time of effective filing language to combine their storage failure detection methods. One would be motivated to make this combination for the purpose of improving validation of solid state drives (Karuppiah, col. 1, lines 19-25). As per claim 6, Karuppiah discloses transmitting the stored debug dump to the host in response to receiving an information request for the debug dump from the host (col. 7, line 14 through col. 8, line 18). As per claim 7, Mcguinness discloses the feedback comprises a control signal enabling the storage device to prevent the failure from occurring ([0029], “The preemptive maintenance action (that is executed based on the failure risk score) may include any suitable type of action for preventing a data loss that might result from a failure of the storage device 134.”), and the failure predicting method further comprises controlling the operation of the storage device based on the control signal (Fig. 6, element 606, “EXECUTE THE PREEMPTIVE MAINTENANCE ACTION”). As per claim 15, Mcguinness discloses a storage device comprising: a nonvolatile memory ([0015]); and a controller comprising a memory configured to store telemetry information on the storage device ([0004]), and processing circuitry configured to store risk data identified from the telemetry information ([0014], “The database 114 may be arranged to store one or more of: (i) telemetry data that is obtained from the storage device 134 and/or (ii) a failure risk score that is calculated based on the telemetry data”), and identify risk data from at least a portion of telemetry information, stored in the memory, based on a first criterion ([0014], “telemetry data that is obtained from the storage device 134 and/or (ii) a failure risk score that is calculated based on the telemetry data”), detect whether an anomaly is present in at least a portion of attributes, among the stored risk data ([0025], “if the failure risk score is above a threshold (or within a first range), the risk score analyzer 116 may determine that the storage device 134 is at risk of failing”), through a machine learning model trained using the identified risk data([0014], “The model provider 112 may include logic that is arranged to train a predictive failure model and provide the predictive failure model to the field system 120. The predictive failure model may receive, as input, telemetry data that is produced by a storage device 134 (which is part of the field system 120) and calculate, based on the telemetry data, a failure risk score that indicates the likelihood of the storage device 134 failing”), transmit an alert, associated with an attribute in which the anomaly is detected, to a host in response to an anomaly being detected ([0026], “As a result of executing the predictive failure model, the failure inference engine 122 may calculate a failure risk score for the storage device 134, which indicates the likelihood of the storage device 134 failing. After the failure risk score is calculated, the failure inference engine 122 may provide the failure risk score to the risk score analyzer 116.” and [0045]) and (Fig. 6), the alert enabling the host to determine whether the anomaly will cause a failure and to output feedback based on the determination (Fig. 2, elements 270, 280, and 210); and control an operation of the storage device in response to receiving feedback, corresponding to the alert, from the host ([0026], “Upon receiving the failure risk score for the storage device 134, the risk score analyzer 116 may execute a preemptive maintenance action for the storage device 134.” and [0045]) and (Fig. 6), wherein the machine learning model is configured to learn a pattern from received data and to output anomaly scores based on the learned pattern ([0027], “The predictive failure model may be trained by using a supervised learning algorithm and/or any other suitable type of training algorithm, such as an unsupervised anomaly detection algorithm that is arranged to detect anomalous behavior of storage devices by training on historic non-anomalous processed data of manufacturer-specific storage devices. The predictive failure model may be arranged to learn the behavior of a storage device telemetry and to detect major degradation patterns of the storage device that result in failure or imminent failure.”), and wherein the controlling the operation of the storage device includes training the machine learning model based on the feedback (Fig. 2) and ([0032]-[0035]) received from the host being based on a determination that the anomaly will not cause the failure (Fig. 2, elements 270 and 210), Mcguinness fails to explicitly disclose a debug dump. Karuppiah of analogous art teaches store a debug dump based on detection of an anomaly (col. 7, lines 14-35). All of the claimed elements were known in Mcguinness and Karuppiah and could have been combined by known methods with no change in their respective functions. It therefore would have been obvious to a person of ordinary skill in the art before the time of effective filing language to combine their storage failure detection methods. One would be motivated to make this combination for the purpose of improving validation of solid state drives (Karuppiah, col. 1, lines 19-25). Mcguinness fails to explicitly disclose adjusting the first attribute in which the anomaly is detected. Elmtalab of analogous art teaches controlling the operation of the storage device such that the first attribute in which the anomaly is detected is adjusted ([0028], “In response to determining the failure prediction 224, the NVDIMM 100 may execute remedial operations to lower the current temperatures of the controller 132 and/or the NV memory 130”) when the feedback received from the host is based on a determination that the anomaly will cause the failure ([0027], “The NVDIMM 100 can determine the failure prediction 224 when the temperature predictions exceed the temperature threshold 222.”). All of the claimed elements were known in Mcguinness and Elmtalab and could have been combined by known methods with no change in their respective functions. It therefore would have been obvious to a person of ordinary skill in the art before the time of effective filing language to combine their storage failure detection methods. One would be motivated to make this combination since Elmtalab’s adjusting attributes is a mere example of Mcguinness’s preemptive maintenance action. As per claim 16, please refer to analysis section for claim 5. As per claim 17, Mcguinness discloses the nonvolatile memory comprises a risk data area, in which the risk data is stored ([0014], “The database 114 may be arranged to store one or more of: (i) telemetry data that is obtained from the storage device 134 and/or (ii) a failure risk score that is calculated based on the telemetry data”), and Karuppiah discloses a debug dump area in which the debug dump corresponding to the enabled debug feature is stored (col. 7, lines 14-35). As per claim 18, Mcguinness discloses the processing circuitry is configured to store the risk data in the risk data area of the nonvolatile memory ([0014]-[0015]) according to a preset cycle ([0034]). As per claim 19, please refer to analysis section for claim 5. As per claim 20, please refer to analysis section for claim 2. Response to Arguments Applicant’s amendments filed on August 11, 2025 necessitated a new ground(s) of rejection in this Office action. Accordingly, Applicant’s arguments have been fully considered but are moot in view of the new ground(s) of 35 U.S.C. 103 rejection, as set forth in this office action. With respect to the 35 U.S.C. 101 rejection, applicant's arguments have been fully considered but they are not persuasive. As per claims 1, 8, and 15, applicant argues that amended claims are not directed to an abstract idea and that “the present claims are specifically directed towards a solution for preemptively preventing failure in storage device, and therefore provides a "practical solution" to a problem in "computer technology." Applicants further note that Example 37 of the Subject Matter Eligibility examples indicates that a step accessing computer memory "is not practically performed in the human mind, at least because it requires a processor accessing computer memory" and that Example 39 provides that training a neural network includes steps that are not practically performed in the human mind. The present claims include elements which should be considered eligible for similar reasons as provided in these examples. Applicants further remind the Office that "the claim ... does not need to explicitly recite the improvement described in the specification." In view of the above, Applicants note that it has been established that the claims, when viewed in their entirety, as directed towards a "practical solution" for an issue in computer technology, and are not practically performed in the human mind, and therefore include subject matter which is eligible for patentability under the Subject Matter Eligibility.” The Examiner respectfully disagrees. As stated in MPEP 2106.05(h), “limitations that amount to merely indicating a field of use or technological environment in which to apply a judicial exception do not amount to significantly more than the exception itself, and cannot integrate a judicial exception into a practical application.” Applicant argues there is an improvement to the functioning of a computer or other technology, but does not identify such an improvement to the computer or the technology itself. Assuming, arguendo, that there is an improvement represented by the claims, the improvement is not to the functioning of a computer, nor to the functioning of any other technology. Any improvement is to the abstract idea itself, a mental process that is per formed using a generically recited computer as a tool. The general linking of the use of a judicial exception to a particular technological environment, such as linking the mental process to data centers and network management disciplines herein, does not meaningfully limit the claim. MPEP 2106.04(d)(1) and MPEP 2106.05(a). The limitations reciting steps to identify risk data, input first data into a model, obtaining a first anomaly score, detecting whether an anomaly is present based on the score, and adjusting the first attribute in which the anomaly is detected, merely require a person looking at collected data and thinking/analyzing the collected data by comparing the data and calculating a score. It is therefore a simple matter of a person looking at the data and thinking about the characteristics of the data to accomplish the above steps. The direction to perform the mental process on a generic computer does not alter the fact that the claim recites a mental process. Further, a recitation at a high level of generality that a computer performs a step “wherein the machine learning model is configured to be trained on the risk data, to learn a pattern of data from the risk data, and to output anomaly scores based on the learned pattern of the data” does not provide more than a generic indication to use a computer as a tool to perform the action. Using a machine learning model with no indication of how the training/learning is performed is directed to a recitation at a high level of generality where uses a computer as a tool to perform a step that is readily performed mentally. If the process can be performed mentally even though the claimed procedures can be performed using a computer as a tool to perform them, the process is a mental process. See MPEP 2106.04(a)(2)(III)(C). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to Elmira Mehrmanesh whose telephone number is (571)272-5531. The examiner can normally be reached on M-F from 10-6. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Bryce Bonzo, can be reached at telephone number (571) 272-3655. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from Patent Center. Status information for published applications may be obtained from Patent Center. Status information for unpublished applications is available through Patent Center for authorized users only. Should you have questions about access to Patent Center, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) Form at https://www.uspto.gov/patents/uspto-automated- interview-request-air-form. /Elmira Mehrmanesh/ Primary Examiner, Art Unit 2113
Read full office action

Prosecution Timeline

Oct 02, 2023
Application Filed
Dec 13, 2024
Non-Final Rejection — §101, §103
Jan 08, 2025
Interview Requested
Jan 15, 2025
Applicant Interview (Telephonic)
Jan 15, 2025
Examiner Interview Summary
Mar 10, 2025
Response Filed
Jun 10, 2025
Final Rejection — §101, §103
Jun 23, 2025
Interview Requested
Jun 30, 2025
Applicant Interview (Telephonic)
Jun 30, 2025
Examiner Interview Summary
Aug 11, 2025
Response after Non-Final Action
Sep 12, 2025
Request for Continued Examination
Sep 23, 2025
Response after Non-Final Action
Jan 28, 2026
Non-Final Rejection — §101, §103
Feb 20, 2026
Interview Requested
Feb 27, 2026
Applicant Interview (Telephonic)
Feb 27, 2026
Examiner Interview Summary

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602276
DYNAMIC REGISTRATION OF SOFTWARE COMPONENTS FOR DIAGNOSIS OF ROOT CAUSE OF FAILURE
2y 5m to grant Granted Apr 14, 2026
Patent 12585519
DATABASE SYSTEM INCIDENT EVALUATION, CLASSIFICATION, AND RESOLUTION SYSTEM
2y 5m to grant Granted Mar 24, 2026
Patent 12585518
ELECTRONIC APPARATUS FOR LOGGING, NON-TRANSITORY COMPUTER-READABLE RECORD MEDIUM FOR LOGGING, AND LOGGING METHOD
2y 5m to grant Granted Mar 24, 2026
Patent 12566691
SYSTEMS AND METHODS FOR TESTING APPLICATION RESILIENCY
2y 5m to grant Granted Mar 03, 2026
Patent 12566668
SYSTEM AND METHOD FOR APPLICATION ORCHESTRATION, OBSERVATION, AND FAULT REMEDIATION
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
84%
Grant Probability
90%
With Interview (+6.8%)
2y 11m
Median Time to Grant
High
PTA Risk
Based on 732 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month