Prosecution Insights
Last updated: April 19, 2026
Application No. 18/481,537

COMMUNICATION METHOD AND APPARATUS

Final Rejection §103
Filed
Oct 05, 2023
Examiner
BEYEN, ZEWDU A
Art Unit
2461
Tech Center
2400 — Computer Networks
Assignee
Huawei Technologies Co., Ltd.
OA Round
2 (Final)
83%
Grant Probability
Favorable
3-4
OA Rounds
2y 11m
To Grant
98%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
697 granted / 836 resolved
+25.4% vs TC avg
Moderate +14% lift
Without
With
+14.5%
Interview Lift
resolved cases with interview
Typical timeline
2y 11m
Avg Prosecution
39 currently pending
Career history
875
Total Applications
across all art units

Statute-Specific Performance

§101
4.4%
-35.6% vs TC avg
§103
59.0%
+19.0% vs TC avg
§102
20.1%
-19.9% vs TC avg
§112
10.4%
-29.6% vs TC avg
Black line = Tech Center average estimate • Based on career data from 836 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Amendment Applicant’s amendment filled on 02/10/2026 has been entered. Claims 1, 9, 13-14, and 16-19 are amended. Claims 1-20 are pending. Response to Arguments Applicant arguments filed on 02/10/2026 have been fully considered and but are moot in view of the new ground of rejection(s) Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claim(s) 1-2,7-10,13,18,20 is/are rejected under 35 U.S.C. 103 as being unpatentable over GRIOT to (US20150281966) in view of BEN HENDA to (WO 2022144222 A1) Regarding claims 1,9,13,18 Griot teaches a communication method, applied to a first network element and comprising: ([0101]: SGW/PGW 110 can include a network communicating component 816 for establishing the session for the UE for provisioning credentials to access the network) receiving first network information of a terminal device, (([0101]: SGW/PGW … establishing the session for the UE ) wherein the first network information comprises network information of a first non-public network NPN and/or network information corresponding to a first provisioning server PVS;( [0101]: "network communicating component 816 may receive the request from one or more network components, such as network entity 304, and the request may include a session request sent by gateway communicating component 812 (e.g., at Block 1008). In one example, the request may indicate a provisioning server, a related subscription provider, other indication that the session is for provisioning credentials to a UE, additional specific information regarding the network service provider, and/or the like") and sending a first identifier of the first PVS to the terminal device, wherein the first identifier corresponds to the first network information([0102]: "determining specific information regarding a provisioning server"; [0103]: "indicating activation of the one or more data bearers to the UE 106 when the packet data context is established (e.g., based on receiving the create session response to the session request message transmitted to the SGW/PGW 110 that indicates establishment of the packet data context)";… [0104]: "credential requesting component 810 can transmit a request for credentials to credential provisioning server 802 over the one or more bearers"; the credential requesting component 810 being part of the UE 106, see [0090], this requires a preliminary sending of an identifier of the PVS to the terminal device) GRIOT does not explicitly teach the first PVS corresponds to the first NPN, and the first NPN is a non-public network to be accessed by the terminal device However, BEN HENDA teaches first PVS corresponds to the first NPN, and the first NPN is a non-public network to be accessed by the terminal device(abstract discloses a user equipment, UE (510, 1010, 1100), to obtain security credentials for accessing a non-public network, NPN. Such methods include performing (610) a primary authentication procedure to, obtain a key KAUSF for secure communication between the UE and an onboarding network ON. Such methods also include receiving (620), from a unified data management, UDM, function, encrypted UE credentials for accessing the NPN, and decrypting (630) the encrypted UE credentials based on KAUSF. Other embodiments include complementary methods for UDM functions, authentication server functions (AUSF), and NPN provisioning servers, PVS, as well as UEs or network nodes configured to perform the exemplary methods) Therefore, it would have been obvious to one ordinarily skilled in the art before the effective filing date of the claimed invention to enable the system of Griot include the first PVS corresponds to the first NPN, and the first NPN is a non-public network to be accessed by the terminal device, as suggested by BEN HENDA. This modification would benefit the system to establish a reliable network connection. Regarding claims 2,10,20 Griot teaches wherein the first network element is a session management network element; ([0101]: SGW/PGW … establishing the session for the UE ) and the receiving first network information of a terminal device comprises: receiving the network information of the first NPN or the network information corresponding to the first PVS from an access management network element([0104]: "credential requesting component 810 can transmit a request for credentials to credential provisioning server 802 over the one or more bearers"; the credential requesting component 810 being part of the UE 106, see [0090], this requires a preliminary sending of an identifier of the PVS to the terminal device). Regarding claim 7, Griot teaches wherein the first network element has a first correspondence between the first identifier and the first network information([0057] discloses UE 106 can request attachment from MME 112 (e.g., using EAP), via eNB 108, by specifying the credentials received from the service provider network 104. In one example, UE 106 can indicate an authentication type as well. MME 112 can provide the credentials (and/or requested authentication type) to AAA server 122. The AAA server 122 can authenticate the UE 106 to access one or more services on service provider network 104. It is to be appreciated that verifying credentials by the AAA server 122 can additionally include verifying the credentials for a particular usage or service indicated by eNB 108 for UE 106 based on one or more policies for the UE 106 in policy server 126. In any case, once the UE 106 is authenticated, MME 112 can trigger a PDN establishment procedure to the service provider network 104 via SGW/PGW 110 to facilitate providing the requested service to UE 106 over an authenticated connection). Regarding claims 8, Griot teaches wherein the first correspondence is obtained by the first network element from an application server and/or a default credentials server([0056] eNB 108 can communicate the registration information to the OSU server 130, which can approve the registration information and obtain credentials and/or a certificate, from certificate authority 132, for the UE 106. OSU server 130 can update the AAA server 122 with the credentials for subsequent authentication of the UE 1). Claim(s) 3-6 ,11-12,14-17,19 is/are rejected under 35 U.S.C. 103 as being unpatentable over GRIOT to (US20150281966) in view of BEN HENDA to (WO 2022144222 A1) further in view of Kolekar to (US 20220330022 A1) Regarding claims 3,11,12,14,19 Griot does not explicitly teach wherein when the network information corresponding to the first PVS is received from the access management network element, the network information corresponding to the first PVS is obtained by the access management network element based on the network information of the first NPN from the terminal device, wherein a second correspondence between the network information of the first NPN and the network information corresponding to the first PVS is configured for the access management network element However, Kolekar teaches wherein when the network information corresponding to the first PVS is received from the access management network element, ([0044] discloses The AMF 132 can be used to manage access control and mobility and can also include network slice selection functionality. The AMF 132 may provide UE-based authentication, authorization, mobility management, etc., and may be independent of the access technologies. The SMF 136 can be configured to set up and manage various sessions according to network policy) the network information corresponding to the first PVS is obtained by the access management network element based on the network information of the first NPN from the terminal device,( [0080] … UE obtains limited connectivity to the Provisioning Server using a Configuration PDU Session Establishment Request. In the Configuration PDU Session Establishment Request, the UE includes the DCS identity and may also include the provisioning server (PS) identity and/or SO-SNPN identity. When the UE provides the SO-SNPN identity, the SMF in the O-SNPN may decide to override the PS identity provided by the UE and send a new PS identity to the UE in a packet data unit (PDU) Session Establishment Accept as a Protocol Configuration Option (PCO) parameter) wherein a second correspondence between the network information of the first NPN and the network information corresponding to the first PVS is configured for the access management network element([0103] Once remote provisioning of SO-SNPN credentials is completed, the UE may initiate deregistration from the ON-SNPN. Based on ON-SNPN policies, the AMF may start an implementation specific timer once the UE has registered to the ON-SNPN for the purpose of onboarding. Expiry of this timer triggers the AMF to deregister the onboarding registered UE from the ON-SNPN. The AMF may also deregister the UE when the AMF determines that the restricted PDU Session has been released by the SMF) Therefore it would have been obvious to one ordinarily skilled in the art before the effective filing date of the claimed invention to enable the system of Griot include when the network information corresponding to the first PVS is received from the access management network element, the network information corresponding to the first PVS is obtained by the access management network element based on the network information of the first NPN from the terminal device, wherein a second correspondence between the network information of the first NPN and the network information corresponding to the first PVS is configured for the access management network element, as suggested by Kolekar. This modification would benefit the system to establish a reliable network connection. Regarding claims 4,15 Griot does not explicitly teach wherein after the receiving first network information of a terminal device, and before the sending a first identifier of the first PVS to the terminal device, the method further comprises: sending a first authentication request message, wherein the first authentication request message requests to perform authentication on the terminal device; and receiving a first authentication response message, wherein the first authentication response message indicates that the authentication on the terminal device fails However, Kolekar teaches wherein after the receiving first network information of a terminal device, and before the sending a first identifier of the first PVS to the terminal device, the method further comprises: sending a first authentication request message, wherein the first authentication request message requests to perform authentication on the terminal device;( [0254] 17. The SEAF forwards EAP-Request/EAP-TLS message from step 16 to the UE with Authentication Request message. This message also includes the ngKSI and the ABBA parameter. The SEAF shall set the ABBA parameter as defined in Annex A.7.1) and receiving a first authentication response message, wherein the first authentication response message indicates that the authentication on the terminal device fails([0255] 18. The UE sends an empty EAP-TLS message to the SEAF in Authentication Response message) Therefore it would have been obvious to one ordinarily skilled in the art before the effective filing date of the claimed invention to enable the system of Griot include wherein after the receiving first network information of a terminal device, and before the sending a first identifier of the first PVS to the terminal device, the method further comprises: sending a first authentication request message, wherein the first authentication request message requests to perform authentication on the terminal device; and receiving a first authentication response message, wherein the first authentication response message indicates that the authentication on the terminal device fails, as suggested by Kolekar. This modification would benefit the system to establish a reliable network connection. Regarding claims 5, 16 Griot teaches The communication method according to claim 4, wherein the sending a first identifier of the first PVS to the terminal device comprises: determining, based on the first authentication response message, that the authentication on the terminal device fails, and sending the first identifier of the first PVS to the terminal device([0110] discloses when MME 112 releases the connection, MME 112 may request the UE 106 to detach and reattach so that the UE 106 uses the provisioned credentials. Alternatively, the timer expiration may be interpreted as UE 106 failure to obtain credentials with the OSU server 130. If the provisioning was done through the use of an OSU service provider specific APN, the MME 112 may reject connection requests to such APN after a number of attempts. In any case, UE 106 can identify itself in the attach message, even if it is not using an identifier that is valid for registration in this network). Regarding claims 6,17 Griot teaches The communication method according to claim 4, wherein the first authentication response message carries the first identifier( [0101]: "network communicating component 816 may receive the request from one or more network components, such as network entity 304, and the request may include a session request sent by gateway communicating component 812 (e.g., at Block 1008). In one example, the request may indicate a provisioning server, a related subscription provider, other indication that the session is for provisioning credentials to a UE, additional specific information regarding the network service provider, and/or the like"). Conclusion Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to ZEWDU A BEYEN whose telephone number is (571)270-7157. The examiner can normally be reached M-F 9:00-6:00. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Huy D Vu can be reached at 571-272-3155. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /ZEWDU A BEYEN/Primary Examiner, Art Unit 2461
Read full office action

Prosecution Timeline

Oct 05, 2023
Application Filed
Dec 05, 2023
Response after Non-Final Action
Nov 10, 2025
Non-Final Rejection — §103
Feb 10, 2026
Response Filed
Mar 07, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603726
ENHANCED FAST CRS RATE MATCHING SELECTION IN DSS
2y 5m to grant Granted Apr 14, 2026
Patent 12580702
COMMUNICATION METHOD AND APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM
2y 5m to grant Granted Mar 17, 2026
Patent 12574829
ACCESS CONTROL METHOD AND COMMUNICATIONS APPARATUS
2y 5m to grant Granted Mar 10, 2026
Patent 12574894
Signalling Framework for Virtual Transmission-Reception Point Localization in Wireless Networks
2y 5m to grant Granted Mar 10, 2026
Patent 12562876
Method and Apparatus Including Search Space Switching for Ultra-Reliable Low-Latency Communication
2y 5m to grant Granted Feb 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
83%
Grant Probability
98%
With Interview (+14.5%)
2y 11m
Median Time to Grant
Moderate
PTA Risk
Based on 836 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month