Prosecution Insights
Last updated: April 19, 2026
Application No. 18/506,840

NF CONSUMER AUTHENTICATION WITH MODEL-D INDIRECT COMMUNICATION

Non-Final OA §103§112
Filed
Nov 10, 2023
Examiner
BROWN, CHRISTOPHER J
Art Unit
2439
Tech Center
2400 — Computer Networks
Assignee
Cisco Technology Inc.
OA Round
3 (Non-Final)
75%
Grant Probability
Favorable
3-4
OA Rounds
3y 6m
To Grant
88%
With Interview

Examiner Intelligence

Grants 75% — above average
75%
Career Allow Rate
533 granted / 707 resolved
+17.4% vs TC avg
Moderate +13% lift
Without
With
+12.6%
Interview Lift
resolved cases with interview
Typical timeline
3y 6m
Avg Prosecution
36 currently pending
Career history
743
Total Applications
across all art units

Statute-Specific Performance

§101
12.7%
-27.3% vs TC avg
§103
54.6%
+14.6% vs TC avg
§102
10.4%
-29.6% vs TC avg
§112
11.1%
-28.9% vs TC avg
Black line = Tech Center average estimate • Based on career data from 707 resolved cases

Office Action

§103 §112
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Arguments Applicant's arguments have been fully considered but they are not persuasive. Applicant has incorporated the details of claims 2-5 into the independent claims. Applicant argues that the access tokens and identifiers are used for authentication consistency and not for the profile based token reuse mechanism. Examiner points to Khare [0045] which states that an access token for an Nfp service is cached for “re-use” in a subsequent service request. Examiner argues this is the point of the profile based reuse in the current claim set. Examiner points to Kuravangi-Thammaiah [0044] which states that the SCP may “cache the access token” which enables “subsequent service requests without having transmit token requests to the NRF, thus conserving resources. Examiner argues again that the prior art teaches reuse of the access token. Examiner has interpreted the ““NF Set ID” in Khare as the “TokenProfileID” Khare teaches the request for access includes this as part of the CCA request. Khare and Kuravangi-Thammaiah both clearly teach reuse of access tokens in appropriate situations, meaning only for approved consumers and for the proper producers, and thus the “profile” limitation is met. The access token would be unable to be used if there was no method to map the CCA identifiers onto the profile and associated token. Claim Rejections - 35 USC § 112 The following is a quotation of the first paragraph of pre-AIA 35 U.S.C. 112: The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor of carrying out his invention. Claims 22, 25, 28 are rejected under 35 U.S.C. 112(a) or 35 U.S.C. 112 (pre-AIA ), first paragraph, as failing to comply with the written description requirement. The claim(s) contains subject matter which was not described in the specification in such a way as to reasonably convey to one skilled in the relevant art that the inventor or a joint inventor, or for applications subject to pre-AIA 35 U.S.C. 112, the inventor(s), at the time the application was filed, had possession of the claimed invention. Claims 22, 25, 28 state “without storing the set of Access of “storing the AccessTokenProfile without storing the set of AccessTokenRequest parameters”. This is a negative limitation and Examiner failed to find support in the instant specification. Examiner welcomes Applicant to point out support to overcome this rejection. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1, 6-8, 13-15, 20-29 is/are rejected under 35 U.S.C. 103 as being unpatentable over Khare US 2022/0217127 in view of Kuravangi-Thammaiah US 2024/0236080 in view of Khare US 2023/0030315. As per claims 1, 8, 15. Khare teaches A method comprising: generating, by a Network Function (NF) consumer, a token profile identifier (TokenProfileId) parameter for a set of access token request (AccessTokenRequest) parameters; sending, by the NF consumer, a service request for a NF producer to a service communication proxy (SCP), wherein the service request includes a set of network repository function (NRF) discovery parameters, the set of AccessTokenRequest parameters, and the TokenProfileId parameter; receiving, by the SCP, an access token (AccessToken) for the NF producer from a NRF based on the set of NRF discovery parameters and the set of AccessTokenRequest parameters; storing, in the SCP, the AccessToken for the NF consumer and an access token profile (AccessTokenProfile) for the NF producer; [0033]-[0047] [0060](teaches that a NFc a CCA, including sending a service request for a NFp to an SCP, the SCP issues request to NRF based on discovery, and storing the access token for the NFc to access the NFp) Kuravangi-Thammaiah teaches receiving, by the SCP, a subsequent service request from the NF consumer to the NF producer; and retrieving, by the SCP, the AccessToken for the subsequent service request based on the AccessTokenProfile. [0028]-[0032], [0042]-[0044][0048][0050] (teaches a subsequent request from NFc to the SCP, and using the cached token for NFc for subsequent requests until token expires; therefore there is a profile associated with the NFc consumer based on the CCA requests and identity of the consumer mapped to the access token.) Kuravangi-Thammaiah teaches wherein the AccessTokenProfile includes a consumer identifier (Consumerld) parameter, a producer identifier (Producerld) parameter, and the TokenProfileId. (CCA authentication request for access token) [0028]-[0032], [0042]-[0044][0048][0050] (teaches a subsequent request from NFc to the SCP, and using the cached token for NFc for subsequent requests until token expires; therefore there is a profile associated with the NFc consumer based on the CCA requests and identity of the consumer mapped to the access token.) Kuravangi-Thammaiah teaches the subsequent service request includes a same set of AccessTokenRequest parameters as the service request. [0042]-[0044][0048][0049][0050] (subsequent access to same provider, same CCA, same token usage) Kuravangi-Thammaiah teaches storing the AccessToken for the NF consumer and the AccessTokenProfile for the NF producer further comprise: mapping the AccessTokenProfile for the NF Producer to the AccessToken for the NF consumer. [0028]-[0032], [0042]-[0044][0048[0050] (teaches a subsequent request from NFc to the SCP, and using the cached token for NFc for subsequent requests until token expires; therefore there is a profile associated with the NFc consumer based on the CCA requests and identity of the consumer mapped to the access token.) It would have been obvious to one of ordinary skill in the art at the time the invention was filed to use the teaching of Kuravangi-Thammaiah with the prior art because it conserves resources [0044] Khare“315” teaches the mapping reflects a consumer identifier (Consumerld) parameter, a producer identifier (Producerld) parameter, and the TokenProfileId parameter for the NF Producer to the AccessToken and an asccoiated expiry for the NF Consumer. [0034]-[0042] (more explicitly teaches access token parameters) It would have been obvious to one of ordinary skill in the art to use the teaching of Khare “315“ with the prior art because it more explicitly teaches the access parameters as used in the prior art. As per claims 6, 13, 20 Kuravangi-Thammaiah teaches The method of claim 1, wherein the SCP stores a different AccessTokenProfile for each different NF Producer. [0028]-[0032], [0042]-[0044][0050] (teaches a subsequent request from NFc to the SCP, and using the cached token for specific NFp so the NFp is of a different profile.) As per claims 7, 14. Kuravangi-Thammaiah teaches The method of claim 1, further comprising: receiving, by the SCP , a second subsequent service request from the NF consumer to the NF producer, wherein the second subsequent servicer requests includes a same AccessTokenRequest parameters as the service request; and retrieving, by the SCP , the AccessToken for the subsequent service request based on the AccessTokenProfile. [0028]-[0032], [0042]-[0044] (teaches a subsequent request from NFc to the SCP, and using the cached token for NFc for subsequent requests until token expires) As per claims 21, 24, 27 Khare teaches the subsequent service request corresponds to a different session than the service request and wherein the SCP retrieves the Access Token for the subsequent service request from the mapping without sending an additional access token request to the NRF. [0041] [0043][0045][0060] (teaches a service request and a cached access token for subsequent use for access where the service request includes a Consumer ID Producer ID and “NF Set ID” interpreted as a profile ID. The token is cached in association with the Producer ID and NF profile obtained by the SCP.) Kuravangi-Thammaiah additionally teaches the subsequent service request corresponds to a different session than the service request and wherein the SCP retrieves the Access Token for the subsequent service request from the mapping without sending an additional access token request to the NRF. [0043][0044] [0048] (caches the access token for use in subsequent service requests, conserves resources) (access token includes a plurality of identifiers including NF instance identifier and scope) As per claims 22, 25, 28 Khare teaches the SCP stores the AccessTokenProfile without storing the set of Access Token Request parameters [0041] [0043][0045][0060] (teaches a service request and a cached access token for subsequent use for access where the service request includes a Consumer ID Producer ID and “NF Set ID” interpreted as a profile ID. The token is cached in association with the Producer ID and NF profile obtained by the SCP.) Kuravangi-Thammaiah additionally teaches teaches the SCP stores the AccessTokenProfile without storing the set of Access Token Request parameters[0043][0044] [0048] (caches the access token for use in subsequent service requests, conserves resources) (access token includes a plurality of identifiers including NF instance identifier and scope) As per claims 23, 26, 29, Khare teaches retrieving the Access Token comprises identifying the mapping entry using the ConsumerId and the ProducerID in combination with the TokenProfileID [0041] [0043][0045][0060] (teaches a service request and a cached access token for subsequent use for access where the service request includes a Consumer ID Producer ID and “NF Set ID” interpreted as a profile ID. The token is cached in association with the Producer ID and NF profile obtained by the SCP.) Kuravangi-Thammaiah additionally teaches retrieving the Access Token comprises identifying the mapping entry using the ConsumerId and the ProducerID in combination with the TokenProfileID [0043][0044] [0048] (caches the access token for use in subsequent service requests, conserves resources) (access token includes a plurality of identifiers including NF instance identifier and scope) Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to CHRISTOPHER BROWN whose telephone number is (571)272-3833. The examiner can normally be reached M-F 8-5. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Luu Pham can be reached at (571) 270-5002. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /CHRISTOPHER J BROWN/Primary Examiner, Art Unit 2439
Read full office action

Prosecution Timeline

Nov 10, 2023
Application Filed
May 19, 2025
Non-Final Rejection — §103, §112
Aug 22, 2025
Response Filed
Sep 04, 2025
Final Rejection — §103, §112
Jan 08, 2026
Request for Continued Examination
Jan 25, 2026
Response after Non-Final Action
Mar 10, 2026
Non-Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603822
SOFTWARE AS A SERVICE (SaaS) USER INTERFACE (UI) FOR DISPLAYING USER ACTIVITIES IN AN ARTIFICIAL INTELLIGENCE (AI)-BASED CYBER THREAT DEFENSE SYSTEM
2y 5m to grant Granted Apr 14, 2026
Patent 12574725
METHODS, APPARATUSES, COMPUTER PROGRAMS AND CARRIERS FOR SECURITY MANAGEMENT BEFORE HANDOVER FROM 5G TO 4G SYSTEM
2y 5m to grant Granted Mar 10, 2026
Patent 12563390
AUTHENTICATING A DEVICE IN A COMMUNICATION NETWORK OF AN AUTOMATION INSTALLATION
2y 5m to grant Granted Feb 24, 2026
Patent 12563056
SYSTEM AND METHOD FOR MONITORING AND MANAGING COMPUTING ENVIRONMENT
2y 5m to grant Granted Feb 24, 2026
Patent 12537828
ON-DEMAND SOFTWARE-DEFINED SECURITY SERVICE ORCHESTRATION FOR A 5G WIRELESS NETWORK
2y 5m to grant Granted Jan 27, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
75%
Grant Probability
88%
With Interview (+12.6%)
3y 6m
Median Time to Grant
High
PTA Risk
Based on 707 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month