Prosecution Insights
Last updated: April 19, 2026
Application No. 18/540,745

ELECTRONIC SUBSCRIBER IDENTITY MODULE SERVICE SEGREGATION AND CONVEYANCE

Non-Final OA §103
Filed
Dec 14, 2023
Examiner
OLALEYE, OLADIRAN GIDEON
Art Unit
2472
Tech Center
2400 — Computer Networks
Assignee
AT&T Intellectual Property I, L.P.
OA Round
1 (Non-Final)
75%
Grant Probability
Favorable
1-2
OA Rounds
3y 1m
To Grant
91%
With Interview

Examiner Intelligence

Grants 75% — above average
75%
Career Allow Rate
76 granted / 101 resolved
+17.2% vs TC avg
Strong +15% interview lift
Without
With
+15.4%
Interview Lift
resolved cases with interview
Typical timeline
3y 1m
Avg Prosecution
65 currently pending
Career history
166
Total Applications
across all art units

Statute-Specific Performance

§101
0.9%
-39.1% vs TC avg
§103
62.2%
+22.2% vs TC avg
§102
21.6%
-18.4% vs TC avg
§112
11.8%
-28.2% vs TC avg
Black line = Tech Center average estimate • Based on career data from 101 resolved cases

Office Action

§103
DETAILED ACTION Notice of AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-20 are rejected under 35 U.S.C. 103 as being unpatentable over LI et al. (US 20220022028 A1), hereinafter referenced as Li, in view of Jones et al. (US 20090019118 A1), hereinafter referenced as Jones. Regarding claims 1 and 19-20 Li teaches a method (Figs. 1-3, Para. [0005]-Li discloses techniques for profile, e.g., subscriber identity module (SIM) and electronic SIM (eSIM), and cellular wireless service subscription management for a wireless device. Para. [0041]-Li discloses implementations or features … implemented by software, hardware or a combination of hardware and software ... as computer readable code on a non-transitory computer readable medium. The non-transitory computer readable medium is any data storage device that can store data which can thereafter be read by a computer system. Examples of the non-transitory computer readable medium include read-only memory, random-access memory, CD-ROMs, HDDs, DVDs, magnetic tape, and optical data storage devices. Para. [0023]-Li discloses the mobile wireless device 102 can include processing circuitry, which can include one or more processor(s) 104 and a memory 106, an embedded Universal Integrated Circuit Card (eUICC) 108) comprising: detecting, by a first integrated circuit of a mobile computing device, at least a first condition for enabling a utilization of at least one subscriber identity module credential stored on the first integrated circuit by a second computing device (Fig. 7B, Para. [0032]-Li discloses at a second step “B”, UIM1 starts initialization after detecting the UICC 118 (pSIM card), and UIM2 (Server) starts initialization after detecting the eUICC 108 ... user (via an application executing on the application processor 802) selects which two profiles (combination of pSIM and/or eSIMs) to register with their respective cellular wireless networks. At an eighth step “H”, corresponding cellular wireless service subscriptions are registered with their respective cellular wireless networks based on the user's selection via the application processor 802. Para. [0026]-Li discloses access to cellular wireless services can be authorized using credentials included in profiles, e.g., using a SIM on a UICC 118 (physical SIM card) or an eSIM 208 on an eUICC 108, on the mobile wireless device 102); selecting, by the first integrated circuit, the at least one subscriber identity module credential for transmission based upon the at least the first condition (Fig. 7B, Para. [0032]-Li discloses at a second step “B”, UIM1 starts initialization after detecting the UICC 118 (pSIM card), and UIM2 (Server) starts initialization after detecting the eUICC 108 ... user (via an application executing on the application processor 802) selects which two profiles (combination of pSIM and/or eSIMs) to register with their respective cellular wireless networks. At an eighth step “H”, corresponding cellular wireless service subscriptions are registered with their respective cellular wireless networks based on the user's selection via the application processor 802); establishing, by the first integrated circuit, a communication channel with a second integrated circuit of the second computing device (Fig. 2, Para. [0025]-Li discloses the baseband wireless circuitry 110 can implement a baseband manager 216 that is configured to interface with the eUICC 108 to establish a secure channel with an MNO provisioning server 116). Li fails to teach transmitting … the at least one subscriber identity module credential. However, Jones teaches transmitting, by the first integrated circuit to the second integrated circuit via the communication channel, the at least one subscriber identity module credential to enable the utilization of the at least one subscriber identity module credential by the second computing device (Fig. 1, Para. [0017]-Jones discloses the Authentication Credentials 21 entered by Participant B 32 are then sent through the Communication Network 22 to an Authentication Server 23). Li and Jones are both considered to be analogous to the claimed invention because they are in the same field of computer based communication and collaboration applications, dealing with method and system for verifying the identity of a chat partner during an instant messaging session. Therefore, it would have been obvious to someone of ordinary skill in the art before the effective filing date of the claimed invention to have modified the Li to incorporate the teachings of Jones on SIM credentials, with a motivation to transmit SIM credentials, and guarantee systems that enables a participant in an instant messaging session to verify the identity of another participant at any given time during a session, that provides configurable levels of verification requirements, and that can log the resulting status of the verification into a saved history file for the instant messaging session, (Jones, Para. [0004]). Regarding claim 2, Li in view of Jones teaches the method of claim 1, Li further teaches detecting, by the first integrated circuit, at least a second condition for disabling of the utilization of the at least one subscriber identity module credential by the second computing device (Fig. 5, Para. [0028]-Li discloses initially, both eSIM A and eSIM B are active, with eSIM A using the basic channel, and eSIM B using the non-basic channel (channel X). The LPA {Local Profile Assistant} 602 then sends to the eUICC 108 a command to disable eSIM A (e.g., DisableProfile(A) command). The eUICC 108 remaps eSIM B to use the basic channel. Para. [0033]-Li discloses receiving, from a processor of the wireless device 102 external to the eUICC 108, a command to disable a first eSIM profile); and performing, by the first integrated circuit in response to the detecting the at least the second condition, at least one action that disables the utilization of the at least one subscriber identity module credential by the second computing device (Para. [0033]-Li discloses receiving, from a processor of the wireless device 102 external to the eUICC 108, a command to disable a first eSIM profile 208 that is associated with a basic logical channel; ii) remapping a second eSIM profile 208 from association with a non-basic logical channel to associate with the basic logical channel; and iii) responsive to a query from the processor, providing an updated logical channel mapping to the processor ... disablement of the first eSIM profile). Regarding claim 3, Li in view of Jones teaches the method of claim 2, Li further teaches transmitting a periodic status request to the second integrated circuit via the communication channel for enabling the utilization of the at least one subscriber identity module credential by the second computing device (Para. [0033]-Li discloses responsive to a query from the processor, providing an updated logical channel mapping to the processor ... prior to disablement of the first eSIM profile 208, the first eSIM profile 208 uses the basic logical channel for SIM toolkit (STK) event communication. Fig. 5, Para. [0028]-Li discloses the LPA {Local Profile Assistant} 602 then sends to the eUICC 108 a command to disable eSIM A (e.g., DisableProfile(A) command). The eUICC 108 remaps eSIM B to use the basic channel. Subsequent commands can confirm acceptance of the disable command, and the LPA {Local Profile Assistant} 602 can retrieve the channel mapping, e.g., using the Fetch command after the DisableProfile command, or later using a GetProfilesInfo command, and the eUICC 108 can provide the updated channel mapping to the LPA 602). Regarding claim 4, Li in view of Jones teaches the method of claim 3, Li fails to teach a failure to obtain a response to the periodic status request; or an improper response. However, Jones further teaches the at least the second condition comprises: a failure to obtain a response to the periodic status request; or an improper response from the second integrated circuit (Para. [0020]-Jones discloses iIf the authentication based on Authentication Credentials 21 is unsuccessful, or if no authentication credentials are received for Participant B 32 within a predetermined time period, then the returned Authentication Status 25 (e.g. "Participant B Failed Authentication Challenge--Sensitivity Level High") and indication of the authentication challenge command itself and its sensitivity level and/or specific challenge type (e.g. Participant A Challenged Participant B--Sensitivity Level High"), are displayed to the session participants in the current session transcript, ... in the case of a failed authentication challenge, one or more predetermined actions may be taken with regard to the current instant messaging session. For example, in one embodiment, an authentication failure causes the current instant messaging session to be disabled, such that no further messages can be added to the session, and/or such that the display of the current session is erased). Jones is considered to be analogous because it is in the same field of computer based communication and collaboration applications, dealing with method and system for verifying the identity of a chat partner during an instant messaging session. Therefore, it would have been obvious to someone of ordinary skill in the art before the effective filing date of the claimed invention to have modified the Li to incorporate the teachings of Jones on status request, with a motivation to detect failure or improper response to status request, and guarantee systems that enables a participant in an instant messaging session to verify the identity of another participant at any given time during a session, that provides configurable levels of verification requirements, and that can log the resulting status of the verification into a saved history file for the instant messaging session, (Jones, Para. [0004]). Regarding claim 5, Li in view of Jones teaches the method of claim 2, Li further teaches the at least one action comprises: transmitting a notification to a cellular network (Para. [0028]-Li discloses using a GetProfilesInfo command, and the eUICC 108 can provide the updated channel mapping to the LPA 602), the cellular network rewrites the second integrated circuit via at least one remote command to the second integrated circuit (Fig. 5, Para. [0028]-Li discloses the LPA {Local Profile Assistant} 602 then sends to the eUICC 108 a command to disable eSIM A (e.g., DisableProfile(A) command). The eUICC 108 remaps eSIM B to use the basic channel. Para. [0020]-Li discloses a local profile assistant (LPA) executing on a processor external to the eUICC can be adjusted automatically as eSIMs on the eUICC are enabled, disabled, and/or reset). Regarding claim 6, Li in view of Jones teaches the method of claim 1, Li further teaches the communication channel comprises: a network-based channel via a cellular network infrastructure; a cellular side-link; or a peer-to-peer non-cellular wireless channel (Fig. 3, Para. [0026]-Li discloses display screen 300 for cellular wireless service subscription settings for a mobile wireless device 102. A user can subscribe to one or more cellular wireless services provided by one or more MNOs. Access to cellular wireless services can be authorized using credentials included in profiles, e.g., using a SIM on a UICC 118 (physical SIM card) or an eSIM 208 on an eUICC 108, on the mobile wireless device 102). Regarding claim 7, Li in view of Jones teaches the method of claim 1, Li further teaches the first integrated circuit comprises: a subscriber identity module card; an integrated subscriber identity module; a universal integrated circuit card; or an integrated universal integrated circuit card (Fig. 3, Para. [0026]-Li discloses display screen 300 for cellular wireless service subscription settings for a mobile wireless device 102. A user can subscribe to one or more cellular wireless services provided by one or more MNOs. Access to cellular wireless services can be authorized using credentials included in profiles, e.g., using a SIM on a UICC 118 (physical SIM card) or an eSIM 208 on an eUICC 108, on the mobile wireless device 102). Regarding claim 8, Li in view of Jones teaches the method of claim 1, Li further teaches the detecting the at least the first condition is in accordance with a subscriber identity module applet operating on the first integrated circuit (Fig. 2, Para. [0024]-Li discloses each eSIM 208 can include a number of applets 212 that define the manner in which the eSIM 208 operates. For example, one or more of the applets 212, when implemented in conjunction with baseband wireless circuitry 110 and the eUICC 108, can be configured to enable the mobile wireless device 102 to communicate with an MNO 114 and provide useful features (e.g., phone calls and internet access) to a user of the mobile wireless device 102. Para. [0032]-Li discloses UIM1 starts initialization after detecting the UICC 118 (pSIM card), and UIM2 (Server) starts initialization after detecting the eUICC 108). Regarding claim 9, Li in view of Jones teaches the method of claim 8, Li further teaches the subscriber identity module applet subscribes to events via a subscriber identity module application toolkit command (Fig. 5, Para. [0028]-Li discloses when two eSIMs 208 are enabled on an eUICC 108 at the same time, communication between the eUICC 108 and a local profile assistant (LPA) 602 executing on a processor external to the eUICC 108, e.g., processor 104, can be extended to use both a basic channel and an additional non-basic channel (labeled as channel X) for SIM toolkit (STK) events. Para. [0025]-Li discloses the baseband manager 216 can be configured to implement services 218, which represents a collection of software modules that are instantiated by way of the various applets 212 of enabled eSIMs 208 that are included in the eUICC 108). Regarding claim 10, Li in view of Jones teaches the method of claim 1, Li further teaches the at least one subscriber identity module credential comprises at least one subscriber identity module file component (Fig. 3, Para. [0026]-Li discloses access to cellular wireless services can be authorized using credentials included in profiles, e.g., using a SIM on a UICC 118 (physical SIM card) or an eSIM 208 on an eUICC 108, on the mobile wireless device 102. Para. [0023]-Li discloses communication of eSIM data between an MNO provisioning server 116 and the eUICC 108 (or between the MNO provisioning server 116 and processing circuitry of the mobile wireless device 102 external to the eUICC 108). Regarding claim 11, Li in view of Jones teaches the method of claim 10, Li further teaches the at least one subscriber identity module credential comprises at least one of: an international mobile subscriber identity; a subscriber identity module access code; or a subscriber identity module unblocking key (Para. [0029]-Li discloses the LPA 602 sends a command, e.g., ProfileReset(ICCID_A){ISD-R}, which identifies eSIM A by its international integrated circuit card identifier (ICCID) value). Regarding claim 12, Li in view of Jones teaches the method of claim 10, Li further teaches the at least one subscriber identity module credential comprises at least one of: a subscriber identity module fundamental file; a subscriber identity module elemental file; a subscriber identity module applet; or network operation information for at least one cellular network operator (Fig. 2, Para. [0024]-Li discloses each eSIM 208 can include a number of applets 212 that define the manner in which the eSIM 208 operates. For example, one or more of the applets 212, when implemented in conjunction with baseband wireless circuitry 110 and the eUICC 108, can be configured to enable the mobile wireless device 102 to communicate with an MNO 114 and provide useful features (e.g., phone calls and internet access) to a user of the mobile wireless device 102. Para. [0032]-Li discloses UIM1 starts initialization after detecting the UICC 118 (pSIM card), and UIM2 (Server) starts initialization after detecting the eUICC 108). Regarding claim 13, Li in view of Jones teaches the method of claim 1, Li further teaches the at least the first condition comprises a gesture by a user of the mobile computing device (Fig. 8, Para. [0036]-Li discloses the computing device 900 can also include a user input device 908 that allows a user of the computing device 900 to interact with the computing device 900. For example, the user input device 908 can take a variety of forms, such as a button, keypad, dial, touch screen, audio input interface, visual/image capture input interface, input in the form of sensor data, etc). Regarding claim 14, Li in view of Jones teaches the method of claim 13, Li further teaches the gesture is of a first gesture type of a plurality of gesture types (Fig. 8, Para. [0036]-Li discloses the computing device 900 can also include a user input device 908 that allows a user of the computing device 900 to interact with the computing device 900. For example, the user input device 908 can take a variety of forms, such as a button, keypad, dial, touch screen, audio input interface, visual/image capture input interface, input in the form of sensor data, etc), each of the plurality of gesture types is associated with enabling an access to a different set of one or more subscriber identity module credentials (Para. [0026]-Li discloses access to cellular wireless services can be authorized using credentials included in profiles, e.g., using a SIM on a UICC 118 (physical SIM card) or an eSIM 208 on an eUICC 108, on the mobile wireless device 102. Fig. 8, Para. [0036]-Li discloses various components that can be included in the mobile wireless device 102 ... the computing device 900 can include a processor 902 that represents a microprocessor or controller for controlling the overall operation of computing device 900. The computing device 900 can also include a user input device 908 that allows a user of the computing device 900 to interact with the computing device 900. For example, the user input device 908 can take a variety of forms, such as a button, keypad, dial, touch screen, audio input interface, visual/image capture input interface, input in the form of sensor data, etc. Para. [0003]-Li discloses mobile wireless devices are configured to use removable Universal Integrated Circuit Cards (UICCs) that enable the mobile wireless devices to access services provided by Mobile Network Operators (MNOs). In particular, each UICC includes at least a microprocessor and a read-only memory (ROM), where the ROM is configured to store an MNO profile that the wireless device can use to register and interact with an MNO to obtain wireless services via a cellular wireless network. A profile may also be referred to as subscriber identity module (SIM)). Regarding claim 15, Li in view of Jones teaches the method of claim 13, Li further teaches the gesture comprises: an input via a graphical user interface by the user of the mobile computing device; or a gesture by the user of the mobile computing device that is detected via at least one camera of the mobile computing device (Fig. 8, Para. [0036]-Li discloses the computing device 900 can also include a user input device 908 that allows a user of the computing device 900 to interact with the computing device 900. For example, the user input device 908 can take a variety of forms, such as a button, keypad, dial, touch screen, audio input interface, visual/image capture input interface, input in the form of sensor data, etc). Regarding claim 16, Li in view of Jones teaches the method of claim 1, Li further teaches disabling a utilization of the at least one subscriber identity module credential by the mobile computing device (Para. [0033]-Li discloses receiving, from a processor of the wireless device 102 external to the eUICC 108, a command to disable a first eSIM profile 208 that is associated with a basic logical channel; ii) remapping a second eSIM profile 208 from association with a non-basic logical channel to associate with the basic logical channel; and iii) responsive to a query from the processor, providing an updated logical channel mapping to the processor ... disablement of the first eSIM profile). Regarding claim 17, Li in view of Jones teaches the method of claim 16, Li fails to teach the disabling is performed in response to the transmitting. However, Jones teaches the disabling is performed in response to the transmitting (Para. [0031]-Jones discloses after the instant messaging session is disabled in such circumstances, the ability of participants that failed authentication to save the contents of the session into a log file is disabled. Para. [0020]-Jones discloses an authentication failure causes the current instant messaging session to be disabled, such that no further messages can be added to the session, and/or such that the display of the current session is erased. Fig. 1, Para. [0017]-Jones discloses the Authentication Credentials 21 entered by Participant B 32 are then sent through the Communication Network 22 to an Authentication Server 23). Jones is considered to be analogous because it is in the same field of computer based communication and collaboration applications, dealing with method and system for verifying the identity of a chat partner during an instant messaging session. Therefore, it would have been obvious to someone of ordinary skill in the art before the effective filing date of the claimed invention to have modified the Li to incorporate the teachings of Jones on disabling SIM credentials, with a motivation to perform the disabling based on SIM credentials transmission, and guarantee systems that enables a participant in an instant messaging session to verify the identity of another participant at any given time during a session, that provides configurable levels of verification requirements, and that can log the resulting status of the verification into a saved history file for the instant messaging session, (Jones, Para. [0004]). Regarding claim 18, Li in view of Jones teaches the method of claim 16, Li further teaches detecting, by the first integrated circuit, at least a second condition for disabling of the utilization of the at least one subscriber identity module credential by the second computing device (Fig. 5, Para. [0028]-Li discloses initially, both eSIM A and eSIM B are active, with eSIM A using the basic channel, and eSIM B using the non-basic channel (channel X). The LPA {Local Profile Assistant} 602 then sends to the eUICC 108 a command to disable eSIM A (e.g., DisableProfile(A) command). The eUICC 108 remaps eSIM B to use the basic channel. Para. [0033]-Li discloses receiving, from a processor of the wireless device 102 external to the eUICC 108, a command to disable a first eSIM profile); and re-enabling, by the first integrated circuit in response to the detecting the at least the second condition, the utilization of the at least one subscriber identity module credential by the mobile computing device (Fig. 5, Para. [0028]-Li discloses switching an STK logical channel for an eSIM 208 when only one eSIM 208 is active and can be mapped to the basic channel for best backward compatibility. Initially, both eSIM A and eSIM B are active, with eSIM A using the basic channel, and eSIM B using the non-basic channel (channel X). The LPA {Local Profile Assistant} 602 then sends to the eUICC 108 a command to disable eSIM A (e.g., DisableProfile(A) command). The eUICC 108 remaps eSIM B to use the basic channel. Subsequent commands can confirm acceptance of the disable command, and the LPA 602 can retrieve the channel mapping, e.g., using the Fetch command after the DisableProfile command, or later using a GetProfilesInfo command, and the eUICC 108 can provide the updated channel mapping to the LPA 602). Conclusion Listed below are the prior arts made of record and not relied upon but are considered pertinent to applicant`s disclosure. Matolia et al. (US 20220312306 A1)-discloses (in Para. [0023]) the 5G NR-RAN 120 may be associated with a particular cellular service provider where the UE 110 and/or the user thereof has a contract and credential information (e.g., stored on a subscriber identify module (SIM) card). Upon detecting the presence of the 5G NR-RAN 120, the UE 110 may transmit the corresponding credential information to associate with the 5G NR-RAN 120. More specifically, the UE 110 may associate with a specific cell (e.g., the gNB 120A of the 5G NR-RAN 120) … Fig. 1-3; Collins et al. (US 20140011478 A1)-discloses wireless device comprising a Subscriber Identity Module (SIM) further comprising a memory for storing program code for performing a plurality of operations, and a processor for processing the program code to execute the plurality of operations, the operations including receiving over-the-air instructions via a wireless network from a control center to create a rules set in the SIM, wherein the rules set defines an acceptable behavior of the wireless device, monitoring requests from a wireless modem of the wireless device for access files stored in the SIM, detecting an aggressive behavior of the wireless device based on the rules set, and blocking the wireless modem from generating traffic in the wireless network…. …Fig. 1-3; II Charles M. Link (US 20170272945 A1)-discloses Following UICC/SIM activation and corresponding “Answer To Reset” (“ATR”) messaging, the Master File (“MF”) in the UICC/SIM is automatically selected by default and becomes the current directory. Other ADFs may then be selected by using the SELECT function by entering, choosing, accepting, or otherwise using a SELECT command followed by File Identifier, which is described in European Telecommunications Standards Institute (“ETSI”) Technical Specification 102_221 v 11.0.0 section 8.4.1. Such entering, choosing, accepting, or otherwise using a SELECT command may be triggered by the need for updating security credentials as determined, for example, by the expiration of a timer as discussed above. Such updated credentials may be required before a secure communication channel may be established or a subsequent secure communication channel may be established after the current secure session terminates, for secure communication by an application running on user equipment 110, or by a machine-to-machine device that needs to authenticate to an application server according to a predetermined schedule or upon the detecting of a condition, such as low inventory in a vending machine, loss-of-power, health alert from a wearable device, an alarm condition in an industrial facility such as a manufacturing plant or a power generation plant, an intrusion alarm as part of a burglar alarm, or upon an event in a vehicle, such as a crash, a user operating a certain control or equipment, selecting a particular entertainment channel, program, or communications session, or upon the vehicle detecting a maintenance or safety condition. Selecting a dedicated file (“DF”), an ADF, or the MF sets the current operative directory of the UICC/SIM. After such a selection there is usually no currently selected Elementary File (“EF”). Selecting an EF sets the selected EF as a current EF; the current directory remains the DF, ADF, or MF, which may be (typically will be) the hierarchical parent of the selected EF… …Fig. 1-5 Daoura et al. (US 20220165146 A1)-discloses Logic conditions in which the cellular modem is in SLEEP mode are those, for example, in which (a) the radiotag 10 is in a familiar “safe” location, such as at home or at an office, and not moving away from that location; or (b) is receiving a familiar BT radio tether signal from a hub or companion smartphone 30. Also, when accelerometry and motion sensing indicate that the device is stationary, the processor may shut down the cellular module until movement is detected. If movement is detected, the cellular wakes up to CALL HOME if at all, only according to a regular schedule, the periodicity of which is selected by the user or by the requirements of the network to keep the cellular device authenticated on the network... …Fig. 1-5 Jain et al. (US 20210320908 A1)-discloses method, system, and computer program product for implementing computer resource provisioning is provided. The method includes receiving a first request for identification credentials associated with a user. In response, resource identification credentials for the user are generated and a second request for generating a first computer resource is received in response to analyzing the resource identification credentials. The resource identification credentials are validated with respect to a local ID cache structure and it is determined if the resource identification credentials are available for usage by the user…. …Fig. 1-5 Any inquiry concerning this communication or earlier communications from the examiner should be directed to OLADIRAN GIDEON OLALEYE whose telephone number is (571)272-5377. The examiner can normally be reached Monday - Friday: 07:30am - 05:30pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s SPE, NICHOLAS A. JENSEN can be reached on (571) 270-5443. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /OO/ Examiner, Art Unit 2472 /NICHOLAS A JENSEN/Supervisory Patent Examiner, Art Unit 2472
Read full office action

Prosecution Timeline

Dec 14, 2023
Application Filed
Jan 05, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12593249
MOBILE STATION, BASE STATION, RECEPTION METHOD, AND TRANSMISSION METHOD
2y 5m to grant Granted Mar 31, 2026
Patent 12574928
UPLINK CONTROL INFORMATION TRANSMISSION METHOD AND DEVICE, TERMINAL AND BASE STATION
2y 5m to grant Granted Mar 10, 2026
Patent 12567894
MULTIPLE-TRANSMISSION-RECEPTION-POINT MEASUREMENT AND TRANSMISSION IN WIRELESS COMMUNICATION SYSTEM
2y 5m to grant Granted Mar 03, 2026
Patent 12563609
SOLUTION FOR PDU SESSION GRACEFUL LEAVING STATUS INDICATION
2y 5m to grant Granted Feb 24, 2026
Patent 12538324
METHOD AND DEVICE FOR TRANSMITTING AND RECEIVING WIRELESS SIGNAL IN WIRELESS COMMUNICATION SYSTEM
2y 5m to grant Granted Jan 27, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
75%
Grant Probability
91%
With Interview (+15.4%)
3y 1m
Median Time to Grant
Low
PTA Risk
Based on 101 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month