Prosecution Insights
Last updated: April 19, 2026
Application No. 18/569,656

TERMINAL APPARATUS, MANAGEMENT APPARATUS, COMMUNICATION SYSTEM, COMMUNICATION METHOD, MANAGEMENT METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

Non-Final OA §103§112
Filed
Dec 13, 2023
Examiner
SARKER, SANCHIT K
Art Unit
2495
Tech Center
2400 — Computer Networks
Assignee
NEC Platforms Ltd.
OA Round
1 (Non-Final)
78%
Grant Probability
Favorable
1-2
OA Rounds
2y 8m
To Grant
99%
With Interview

Examiner Intelligence

Grants 78% — above average
78%
Career Allow Rate
305 granted / 391 resolved
+20.0% vs TC avg
Strong +50% interview lift
Without
With
+49.5%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
19 currently pending
Career history
410
Total Applications
across all art units

Statute-Specific Performance

§101
10.9%
-29.1% vs TC avg
§103
56.5%
+16.5% vs TC avg
§102
6.1%
-33.9% vs TC avg
§112
17.9%
-22.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 391 resolved cases

Office Action

§103 §112
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION This Office Action is in response to the Amendment filed on 12/03/2025. Claims 8-18 and 20 have been examined and are pending. This Action is made Non-FINAL. Election/Restrictions Applicant elects, without traverse, Group 2, comprising claims 8-18 and 20, for prosecution of this patent application in the reply filed on 12/03/2025 is acknowledged. Information Disclosure Statement The information disclosure statement (IDS), submitted on 12/13/2023, is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(d): (d) REFERENCE IN DEPENDENT FORMS.—Subject to subsection (e), a claim in dependent form shall contain a reference to a claim previously set forth and then specify a further limitation of the subject matter claimed. A claim in dependent form shall be construed to incorporate by reference all the limitations of the claim to which it refers. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), fourth paragraph: Subject to the [fifth paragraph of 35 U.S.C. 112 (pre-AIA )], a claim in dependent form shall contain a reference to a claim previously set forth and then specify a further limitation of the subject matter claimed. A claim in dependent form shall be construed to incorporate by reference all the limitations of the claim to which it refers. Claim 18 is rejected under 35 U.S.C. 112(d) or pre-AIA 35 U.S.C. 112, 4th paragraph, as being of improper dependent form for failing to further limit the subject matter of the claim upon which it depends, or for failing to include all the limitations of the claim upon which it depends. Regarding claim 18; claim 18 rejected under 35 U.S.C. 112(d) or pre-AIA 35 U.S.C. 112, 4th paragraph, as being of improper dependent form for failing to further limit the subject matter of the claim upon which it depends, or for failing to include all the limitations of the claim upon which it depends. “[A] proper dependent claim must be narrower than the claim upon which it depends and must not be broader in any respect.” D. Chisum, Chisum on Patents § 8.06[5] (2011) (citing Pfizer Inc. v. Ranbaxy Laboratories Ltd., 457 F3d 1284 (Fed. Cir. 2006) (claim held invalid for failing to comply with 35 U.S.C. 112(d)). NA communication system claim 18 relies on apparatus claim 1. However, claim 18 fails to specify a further limitation of the subject matter of the claim 1 to which it refers, because is complete outside the scope of claim 1 and also claim 1 is non-elected claim. Applicant may cancel the claim(s), amend the claim(s) to place the claim(s) in proper dependent form, rewrite the claim(s) in independent form, or present a sufficient showing that the dependent claim(s) complies with the statutory requirements. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 8-18 and 20 are rejected under 35 U.S.C. 103 as being unpatentable over Maeda (US 2009/0316910) and in view of Zheng (US 2016/0315765). Regarding claim 8, Maeda discloses a management apparatus comprising: at least one memory storing instructions, and at least one processor configured to execute the instructions stored in the at least one memory to (Maeda par. 0047; The control section 203 carries out generation of shared random numbers, encryption/decryption using a part of the shared random numbers, and the like with the center node 10. The control section 203 can be a program-controlled processor, and the above-mentioned shared random number generation function and encryption/decryption function can be implemented by reading respective programs from a memory (not shown) and executing them on the program-controlled processor); manage a plurality of cryptographic keys distributed by using a QKD technology (Maeda par. 0043; For example, in a N:M QKD network, cryptographic key management for each remote node can be easily performed only by monitoring the amounts of quantum keys stored at a center node 10. See also par. 0082 and 0122); and distribute a cryptographic key to a terminal apparatus, the terminal apparatus being to perform cryptographic communication with another terminal apparatus, the cryptographic key being specified from among the plurality of managed cryptographic keys based on a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated (Maeda abstract, par. 0102-0103 and claim 15; A cryptographic key management method and device are provided by which cryptographic keys of multiple nodes can be managed easily and stably. A system includes at least one first node and a plurality of second nodes connected to the first node, and the first node individually generates and consumes a cryptographic key with each of the second nodes connected to the first node itself. Upon receipt of this request for a remote key, the key management server 30 checks stored key amounts (remaining amounts) with respect to all the remote nodes present along a path between the remote nodes RN-A1 and RN-C (Step S302). In the present exemplary embodiment, checked are the stored key amounts (remaining amounts) of random number sequences K1a, K2a, and Kc of the remote nodes RN-A1, RN-A2, and RN-C. If at least one of the remaining amounts of the random number sequences K1a, K2a, and Kc is not larger than a required amount of a remote key (Step 302: NO), the key management server 30 instructs the center node 10a/10c to start a key generation process for the remote node corresponding to the insufficient stored key amount (Step S303). At this instruction, the control section 105 of the center node 10a/10c carries out the key generation process for the remote node in question. Wherein the first node notifies the one of the different second nodes of information identifying the to-be-shared cryptographic key, and transmits the other of the different second nodes the to-be-shared cryptographic key encrypted using a cryptographic key generated with the other of the different second nodes. See also par. 0035, 0039-0040 and 0122). Maeda teaches, upon receipt of this request for a remote key, the key management server 30 checks stored key amounts (remaining amounts) with respect to all the remote nodes and the first node notifies the one of the different second nodes of information identifying the to-be-shared cryptographic key, and transmits the other of the different second nodes the to-be-shared cryptographic key encrypted using a cryptographic key generated with the other of the different second nodes (Maeda par. 0102-0103). However, Maeda does not explicitly disclose a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated. However, in an analogous art, Zheng teaches a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated (Zheng par. 0060 and 0085; A cryptographic key that begins at step 70 where a cryptographic client issues a request to access a cryptographic key of the cryptographic keys stored in the key store section 50. The request should be in a specific format that includes, in this example, a read/write indication, an address of the at least a portion of the cryptographic key, a source or destination of the cryptographic result. The method continues at step 165 where the arbitration module 54 accesses the rule set section 162 based on the interpreted request to retrieve a rule of the set of rules. Note that a rule of the set of rules includes an algorithm section that identifies one or more valid algorithms, a destination section that identifies a valid destination, and a content section that identifies a valid privileged data type. See also par. 0073). Therefore, it would have been obvious to one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine the teachings of Zheng with the method and system of Maeda, wherein a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated to provide users with a means for securing data and, more particularly, techniques for storing and providing access to cryptographic keys and other secret values used to secure data (Zheng par. 0004). Regarding claim 9, Maeda and Zheng disclose the management apparatus according to claim 8, Zheng further discloses wherein the communication source identification information and the communication destination identification information include identification information of either or both of the management apparatus and the terminal apparatus (Zheng par. 0085; The method continues at step 165 where the arbitration module 54 accesses the rule set section 162 based on the interpreted request to retrieve a rule of the set of rules. Note that a rule of the set of rules includes an algorithm section that identifies one or more valid algorithms, a destination section that identifies a valid destination, and a content section that identifies a valid privileged data type. See also par. 0073). Therefore, it would have been obvious to one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine the teachings of Zheng with the method and system of Maeda, wherein a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated to provide users with a means for securing data and, more particularly, techniques for storing and providing access to cryptographic keys and other secret values used to secure data (Zheng par. 0004). Regarding claim 10, Maeda and Zheng disclose the management apparatus according to claim 8, Maeda further discloses wherein the at least one processor is further configured to execute the instructions stored in the at least one memory to manage the cryptographic key management information in which the cryptographic key is associated with the communication source identification information and the communication destination identification information (Maeda abstract, par. 0102-0103 and claim 15; A cryptographic key management method and device are provided by which cryptographic keys of multiple nodes can be managed easily and stably. A system includes at least one first node and a plurality of second nodes connected to the first node, and the first node individually generates and consumes a cryptographic key with each of the second nodes connected to the first node itself. Upon receipt of this request for a remote key, the key management server 30 checks stored key amounts (remaining amounts) with respect to all the remote nodes present along a path between the remote nodes RN-A1 and RN-C (Step S302). In the present exemplary embodiment, checked are the stored key amounts (remaining amounts) of random number sequences K1a, K2a, and Kc of the remote nodes RN-A1, RN-A2, and RN-C. If at least one of the remaining amounts of the random number sequences K1a, K2a, and Kc is not larger than a required amount of a remote key (Step 302: NO), the key management server 30 instructs the center node 10a/10c to start a key generation process for the remote node corresponding to the insufficient stored key amount (Step S303). At this instruction, the control section 105 of the center node 10a/10c carries out the key generation process for the remote node in question. Wherein the first node notifies the one of the different second nodes of information identifying the to-be-shared cryptographic key, and transmits the other of the different second nodes the to-be-shared cryptographic key encrypted using a cryptographic key generated with the other of the different second nodes. See also par. 0035, 0039-0040 and 0122). Regarding claim 11, Maeda and Zheng disclose the management apparatus according to claim 10, Maeda further discloses wherein the at least one processor is further configured to execute the instructions stored in the at least one memory to, when there is, in the cryptographic key management information, no cryptographic key corresponding to the communication source identification information and the communication destination identification information designated in the request, specify (Maeda par. 0043; For example, in a N:M QKD network, cryptographic key management for each remote node can be easily performed only by monitoring the amounts of quantum keys stored at a center node 10. See also par. 0082 and 0122). Zheng further discloses a cryptographic key to be distributed to the terminal apparatus by associating the communication source identification information and the communication destination identification information with a cryptographic key selected from the plurality of cryptographic keys (Zheng par. 0085; The method continues at step 165 where the arbitration module 54 accesses the rule set section 162 based on the interpreted request to retrieve a rule of the set of rules. Note that a rule of the set of rules includes an algorithm section that identifies one or more valid algorithms, a destination section that identifies a valid destination, and a content section that identifies a valid privileged data type. See also par. 0073). Therefore, it would have been obvious to one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine the teachings of Zheng with the method and system of Maeda, wherein a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated to provide users with a means for securing data and, more particularly, techniques for storing and providing access to cryptographic keys and other secret values used to secure data (Zheng par. 0004). Regarding claim 12, Maeda and Zheng disclose the management apparatus according to claim 10, Maeda further discloses wherein the at least one processor is further configured to execute the instructions stored in the at least one memory to, when there is, in the cryptographic key management information, a cryptographic key corresponding to the communication source identification information and the communication destination identification information designated in the request, specify the corresponding cryptographic key as a cryptographic key to be distributed to the terminal apparatus (Maeda par. 0043; For example, in a N:M QKD network, cryptographic key management for each remote node can be easily performed only by monitoring the amounts of quantum keys stored at a center node 10. See also par. 0082 and 0122). Zheng further discloses a cryptographic key to be distributed to the terminal apparatus by associating the communication source identification information and the communication destination identification information with a cryptographic key selected from the plurality of cryptographic keys (Zheng par. 0085; The method continues at step 165 where the arbitration module 54 accesses the rule set section 162 based on the interpreted request to retrieve a rule of the set of rules. Note that a rule of the set of rules includes an algorithm section that identifies one or more valid algorithms, a destination section that identifies a valid destination, and a content section that identifies a valid privileged data type. See also par. 0073). Therefore, it would have been obvious to one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine the teachings of Zheng with the method and system of Maeda, wherein a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated to provide users with a means for securing data and, more particularly, techniques for storing and providing access to cryptographic keys and other secret values used to secure data (Zheng par. 0004). Regarding claim 13, Maeda and Zheng disclose the management apparatus according to claim 10, Maeda further discloses wherein the at least one processor is further configured to execute the instructions stored in the at least one memory to share the cryptographic key management information with another management apparatus accommodating another terminal apparatus (Maeda abstract; A cryptographic key management method and device are provided by which cryptographic keys of multiple nodes can be managed easily and stably. A system includes at least one first node and a plurality of second nodes connected to the first node, and the first node individually generates and consumes a cryptographic key with each of the second nodes connected to the first node itself). Regarding claim 14, Maeda and Zheng disclose the management apparatus according to claim 13, Maeda further discloses wherein the at least one processor is further configured to execute the instructions stored in the at least one memory to, when the cryptographic key management information is updated, notify the other management apparatus of the updating of the cryptographic key management information (Maeda par. 0009; It is required to update a cryptographic key shared between a sending side and a receiving side. When updating a key, it is absolutely necessary that the key to be updated should not be intercepted or broken. To this end, there are two broad types of methods: (1) a method by which a key is encrypted by means of public key encryption and then transmitted, and (2) a method by which a key is encrypted by using a master key, which is a common key preset for key update, and then transmitted). Regarding claim 15, Maeda and Zheng disclose the management apparatus according to claim 14, Maeda further discloses wherein in the cryptographic key management information, the cryptographic key is associated with cryptographic key identification information, and the at least one processor is further configured to execute the instructions stored in the at least one memory to transmit, as the notification, the cryptographic key identification information ((Maeda par. 0043; For example, in a N:M QKD network, cryptographic key management for each remote node can be easily performed only by monitoring the amounts of quantum keys stored at a center node 10. See also par. 0082 and 0122). Zheng further discloses the communication source identification information, and the communication destination identification information (Zheng par. 0085; The method continues at step 165 where the arbitration module 54 accesses the rule set section 162 based on the interpreted request to retrieve a rule of the set of rules. Note that a rule of the set of rules includes an algorithm section that identifies one or more valid algorithms, a destination section that identifies a valid destination, and a content section that identifies a valid privileged data type. See also par. 0073). Therefore, it would have been obvious to one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine the teachings of Zheng with the method and system of Maeda, wherein a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated to provide users with a means for securing data and, more particularly, techniques for storing and providing access to cryptographic keys and other secret values used to secure data (Zheng par. 0004). Regarding claim 16, Maeda and Zheng disclose the management apparatus according to claim 15, Maeda further discloses wherein the at least one processor is further configured to execute the instructions stored in the at least one memory to, when the sharing means receives the notification, update the cryptographic key management information according to the cryptographic key identification information (Maeda par. 0009; It is required to update a cryptographic key shared between a sending side and a receiving side. When updating a key, it is absolutely necessary that the key to be updated should not be intercepted or broken. To this end, there are two broad types of methods: (1) a method by which a key is encrypted by means of public key encryption and then transmitted, and (2) a method by which a key is encrypted by using a master key, which is a common key preset for key update, and then transmitted). Zheng further discloses the communication source identification information, and the communication destination identification information (Zheng par. 0085; The method continues at step 165 where the arbitration module 54 accesses the rule set section 162 based on the interpreted request to retrieve a rule of the set of rules. Note that a rule of the set of rules includes an algorithm section that identifies one or more valid algorithms, a destination section that identifies a valid destination, and a content section that identifies a valid privileged data type. See also par. 0073). Therefore, it would have been obvious to one of ordinary skill in the art, before the effective filing date of the claimed invention, to combine the teachings of Zheng with the method and system of Maeda, wherein a request for the cryptographic key issued from the terminal apparatus, in which request, communication source identification information and communication destination identification information are designated to provide users with a means for securing data and, more particularly, techniques for storing and providing access to cryptographic keys and other secret values used to secure data (Zheng par. 0004). Regarding claim 17, Maeda and Zheng disclose the management apparatus according to claim 10, Maeda further discloses wherein in the cryptographic key management information, the cryptographic key is associated with a history of distribution of a communication source and a communication destination to the terminal apparatus (Maeda par. 0037; Alternatively, with a key management table storing the stored key amounts monitored by the stored key amount monitor 31, the key management control section 32 may perform key generation control while referring to the key management table). Regarding claim 18; claim 18 is directed to a system associated with the apparatus claimed in claim 8. Claim 18 is similar in scope to claim 8, and is therefore rejected under similar rationale respectively. Regarding claim 20; claim 20 is directed to a method associated with the apparatus claimed in claim 8. Claim 20 is similar in scope to claim 8, and is therefore rejected under similar rationale respectively. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to SANCHIT K SARKER whose telephone number is (571)270-7907. The examiner can normally be reached M-F 8:30 AM-5:30 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, FARID HOMAYOUNMEHR can be reached at 571-272-3739. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SANCHIT K SARKER/Primary Examiner, Art Unit 2495
Read full office action

Prosecution Timeline

Dec 13, 2023
Application Filed
Jan 23, 2026
Non-Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12579285
CENTRAL DATA GOVERNANCE AND ACCESS CONTROL FOR ENTERPRISE DATA
2y 5m to grant Granted Mar 17, 2026
Patent 12579291
SYSTEMS AND METHODS FOR ADAPTIVE DIGITAL REINFORCEMENT LEARNING
2y 5m to grant Granted Mar 17, 2026
Patent 12579305
DATA SECURITY FOR MACHINE LEARNING SYSTEMS
2y 5m to grant Granted Mar 17, 2026
Patent 12566870
COMMUNICATION METHOD, DEVICE, AND SYSTEM FOR OBTAINING AUTHORIZATION INFORMATION OF USER-RELATED DATA
2y 5m to grant Granted Mar 03, 2026
Patent 12561471
METHOD AND SYSTEM FOR DATA COMMUNICATION WITH DIFFERENTIALLY PRIVATE SET INTERSECTION
2y 5m to grant Granted Feb 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
78%
Grant Probability
99%
With Interview (+49.5%)
2y 8m
Median Time to Grant
Low
PTA Risk
Based on 391 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month