Prosecution Insights
Last updated: April 19, 2026
Application No. 18/577,196

RANDOM ACCESS METHOD AND APPARATUS, AND STORAGE MEDIUM

Non-Final OA §102§103
Filed
Jan 05, 2024
Examiner
SEN, ANINDITA
Art Unit
2478
Tech Center
2400 — Computer Networks
Assignee
BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.
OA Round
1 (Non-Final)
83%
Grant Probability
Favorable
1-2
OA Rounds
2y 11m
To Grant
87%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
62 granted / 75 resolved
+24.7% vs TC avg
Minimal +4% lift
Without
With
+3.9%
Interview Lift
resolved cases with interview
Typical timeline
2y 11m
Avg Prosecution
51 currently pending
Career history
126
Total Applications
across all art units

Statute-Specific Performance

§101
0.3%
-39.7% vs TC avg
§103
78.5%
+38.5% vs TC avg
§102
14.7%
-25.3% vs TC avg
§112
1.9%
-38.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 75 resolved cases

Office Action

§102 §103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claim(s) 9-13,20,22 are rejected under 35 U.S.C. 102(a)(2) as being anticipated by Wang et al. (US20230209542A1) Regarding Claim 9, Wang teaches, A random access method, applied to a network device, comprising: configuring a first initial bandwidth part and a second initial bandwidth part; and sending first information; [40]- To transmit SIB 1 for RedCap UEs, configurations of CORESET 0 and search space 0 for RedCap UEs are disclosed. In the following, CORESET 0(=first bandwidth) and search space 0 for RedCap UEs are denoted as CORESET 0-RC=(second bandwidth) and search space 0-RC [41-42]- Since reserved bits in MIB are limited, some parameters may need to be implicitly determined, for example, by using the same value as that of CORESET 0 and search space 0. Alternatively, SSB and MIB for RedCap UEs are disclosed, denoted as SSB-RC and MIB-RC, respectively. wherein the first information indicates that synchronous signal block (SSB) information has a mapping relationship with second random access resource information configured in the second initial bandwidth part; and [43]- To configure CORESET 0-RC (=mapping relationship with second random access resource information ) and search space 0-RC by SSB, the following bits of MIB may be utilized. The spare bit in MIB (=first information indicates) specified in 3GPP TS 38.331 may be used, as shown in Table 2. [45]- The spare bit of MIB and the reserved bits (e.g., a A+6, a A+7) are used to indicate the configuration of CORESET 0-RC and search space 0-RC. (=mapping relationship with second random access resource information ) Regarding Claim 10, Wang teaches,The random access method of claim 9, wherein the first information indicates that the second random access resource information has a mapping relationship with first SSB information, and the first SSB information is SSB information configured in the first initial bandwidth part. [32]- A second initial DL BWP may be configured by SIB1, which fully contains the first initial DL BWP configured by MIB and may have a larger bandwidth than the first initial DL BWP, and may be used after receiving message 4 (Msg4) and before a dedicated DL BWP is configured by a gNB. Regarding Claim 11, Wang teaches,The random access method of claim 10, wherein the first information is indicates that a second common control resource set in a second random access resource has a mapping relationship with the first SSB information. [42-43]- Method 1: Configure CORESET 0-RC and Search Space 0-RC by SSB for Legacy NR UEs.To configure CORESET 0-RC and search space 0-RC by SSB, the following bits of MIB may be utilized. Regarding Claim 12, Wang teaches,The random access method of claim 10, wherein the first information is indicates that a second physical random access channel (PRACH) resource set in a second random access resource has a mapping relationship with the first SSB information. [97]- the UL BWPs and the corresponding PRACH resource in each UL BWP that is used for a random access procedure are configured via SIB 1-RC. In some examples, the UL BWPs and the corresponding PRACH resource in each UL BWP that is used for a random-access procedure are configured via SIB1 if SIB1-RC is not provided to RedCap UEs. Regarding Claim 13, Wang teaches, The random access method of claim 9, wherein the first information is indicates that a second common control resource set in a second random access resource has a mapping relationship with first SSB information, and[43]- To configure CORESET 0-RC and search space 0-RC by SSB, the following bits of MIB may be utilized. The spare bit in MIB specified in 3GPP TS 38.331 may be used, as shown in Table 2. a second physical random access channel (PRACH) resource set in the second random access resource has a mapping relationship with second SSB information; [97]- the UL BWPs and the corresponding PRACH resource in each UL BWP that is used for a random access procedure are configured via SIB 1-RC. In some examples, the UL BWPs and the corresponding PRACH resource in each UL BWP that is used for a random-access procedure are configured via SIB1 if SIB1-RC is not provided to RedCap UEs. wherein the first SSB information is SSB information configured in the first initial bandwidth part, and the second SSB information is SSB information configured in the second initial bandwidth part. See [32] Regarding Claim 20, Wang teaches, A random access device, comprising: a processor; and a memory for storing instructions executable by the processor; wherein the processor is configured to perform the random access method of claim 9. See Fig 4 Regarding Claim 22, Wang teaches,A non-transitory storage medium having stored therein instructions that, when executed by a processor of a terminal, cause the terminal to perform the random access method of claim 9any one of claims 9 See Fig 4 Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1,2,6-8,15,19,21 are rejected under 35 U.S.C. 103 as being unpatentable over Wang et al. (US20230209542A1) in view of Lei et al. (US20220417997A1 ) Regarding Claim 1, Wang teaches, A random access method, applied to a terminal, comprising: determining first information, in response to the terminal having a first initial bandwidth part and a second initial bandwidth part; [40]- To transmit SIB 1 for RedCap UEs, configurations of CORESET 0 and search space 0 for RedCap UEs are disclosed. In the following, CORESET 0(=first bandwidth) and search space 0 for RedCap UEs are denoted as CORESET 0-RC=(second bandwidth) and search space 0-RC [41-42]- Since reserved bits in MIB are limited, some parameters may need to be implicitly determined, for example, by using the same value as that of CORESET 0 and search space 0. Alternatively, SSB and MIB for RedCap UEs are disclosed, denoted as SSB-RC and MIB-RC, respectively. wherein the first information indicates that synchronous signal block (SSB) information has a mapping relationship with second random access resource information configured in the second initial bandwidth part; and [43]- To configure CORESET 0-RC (=mapping relationship with second random access resource information ) and search space 0-RC by SSB, the following bits of MIB may be utilized. The spare bit in MIB (=first information indicates) specified in 3GPP TS 38.331 may be used, as shown in Table 2. [45]- The spare bit of MIB and the reserved bits (e.g., a A+6, a A+7) are used to indicate the configuration of CORESET 0-RC and search space 0-RC. (=mapping relationship with second random access resource information ) Wang does not teach, performing random access based on the first information. Lei teaches, performing random access based on the first information. [39]- As a result, the UE may not have sufficient time to transition to a transmit mode to transmit a random-access preamble in the RO in response to the selected SSB, and the random-access procedure at the UE may be delayed. [40]- These techniques may allow half-duplex RedCap UEs to efficiently perform random-access procedures to establish or reestablish a connection with a base station. It would have been obvious to a person having an ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Wang, performing random access based on the first information as taught by Lei to add perform random access using reduced capability BWP. Regarding Claim 2, Wang teaches, The random access method of claim 1, wherein the first information indicates that the second random access resource information has a mapping relationship with first SSB information, and the first SSB information is SSB information configured in the first initial bandwidth part; [32]- A second initial DL BWP may be configured by SIB1, which fully contains the first initial DL BWP configured by MIB and may have a larger bandwidth than the first initial DL BWP, and may be used after receiving message 4 (Msg4) and before a dedicated DL BWP is configured by a gNB. Wang does not teach, wherein performing the random access based on the first information comprises: monitoring the first SSB information in the first initial bandwidth part, determining the second random access resource information according to monitored the monitoring of the first SSB information, and performing the random access based on the second random access resource information. Lei teaches, wherein performing the random access based on the first information comprises: monitoring the first SSB information in the first initial bandwidth part, determining the second random access resource information according to monitored the monitoring of the first SSB information, and [82]- the base station 105-a may ensure that the PRACH resources allocated for RedCap UEs 115 (e.g., half-duplex and full-duplex RedCap UEs) may be mapped to all SSBs indicated in system information (e.g., by ssb-PositionsInBurst in a system information block one (SIB1) or in ServingCellConfigCommon) performing the random access based on the second random access resource information.[88]- In another aspect, half-duplex and full-duplex RedCap UEs 115 may follow the same rules in selecting the RO 520. In this aspect, a half-duplex or full-duplex RedCap UE 115 may transmit a RACH preamble on a valid RO if the RO is at least Ngap,RC symbols after a last downlink symbol. It would have been obvious to a person having an ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Wang, wherein performing the random access based on the first information comprises: monitoring the first SSB information in the first initial bandwidth part, determining the second random access resource information according to monitored the monitoring of the first SSB information, and performing the random access based on the second random access resource information as taught by Lei to add perform random access using reduced capability BWP. Regarding Claim 6,Wang teaches, The random access method of claim 1, wherein the first information is indicates that the second random access resource information has a mapping relationship with second SSB information, and the second SSB information is SSB information configured in the second initial bandwidth part; [42]- Alternatively, SSB and MIB for RedCap UEs are disclosed, denoted as SSB-RC and MIB-RC, respectively. Configurations of CORESET 0-RC and search space 0-RC may be provided by the MIB-RC and SSB-RC. Wang does not teach, wherein performing the random access based on the first information comprises: monitoring the second SSB information, in response to meeting a monitoring condition for monitoring a second SSB; determining the second random access resource information according to-monitored the monitoring of the second SSB information, and performing the random access based on the second random access resource information. Lei teaches, wherein performing the random access based on the first information comprises: monitoring the second SSB information, in response to meeting a monitoring condition for monitoring a second SSB, [138]- irst mapping of a set of synchronization signal blocks to a first set of random-access channel occasions and a second mapping of the set of synchronization signal blocks to a second set of random-access channel occasions. determining the second random access resource information according to-monitored the monitoring of the second SSB information, and performing the random access based on the second random access resource information. [146]- The system information manager 1325 may be configured as or otherwise support a means for transmitting system information to a set of multiple UEs indicating a first mapping of a set of synchronization signal blocks to a first set of random-access channel occasions and a second mapping of the set of synchronization signal blocks to a second set of random-access channel occasions. It would have been obvious to a person having an ordinary skill in the art of Wang in view of Lei before the effective filing date of the claimed invention to modify the system of Wang, wherein performing the random access based on the first information comprises: monitoring the second SSB information, in response to meeting a monitoring condition for monitoring a second SSB; determining the second random access resource information according to-monitored the monitoring of the second SSB information, and performing the random access based on the second random access resource information as taught by Cirik to add perform random access using reduced capability BWP. Regarding Claim 7, Wang in view of Lei does not teach, The random access method of claim 6, wherein the monitoring condition comprises at least one of: a mapping relationship condition between a first SSB and the second SSB. Cirik teaches, The random access method of claim 6, wherein the monitoring condition comprises at least one of: a mapping relationship condition between a first SSB and the second SSB. [145]- In an example, a first SS/PBCH block may be transmitted in a first spatial direction using a first beam, and a second SS/PBCH block may be transmitted in a second spatial direction using a second beam. It would have been obvious to a person having an ordinary skill in the art of before the effective filing date of the claimed invention to modify the system of Wang in view of Lei, The random access method of claim 6, wherein the monitoring condition comprises at least one of: a mapping relationship condition between a first SSB and the second SSB as taught by Cirik to add perform random access using reduced capability BWP. Regarding Claim 8, Wang does not teach, The random access method of claim 6 , wherein the monitoring condition is determined in one or a combination of the following ways: determining in a predefined way; determining based on a notification message carried in the first SSB information, wherein the notification message is indicates the monitoring condition. Lei teaches, The random access method of claim 6 , wherein the monitoring condition is determined in one or a combination of the following ways: determining in a predefined way; determining based on a notification message carried in the first SSB information, wherein the notification message is indicates the monitoring condition.[101]- In some examples, the communications manager 720 may be configured to perform various operations (e.g., receiving, monitoring, transmitting) using or otherwise in cooperation with the receiver 710, the transmitter 715, or both. It would have been obvious to a person having an ordinary skill in the art of before the effective filing date of the claimed invention to modify the system of Wang, The random access method of claim 6 , wherein the monitoring condition is determined in one or a combination of the following ways: determining in a predefined way; determining based on a notification message carried in the first SSB information, wherein the notification message is indicates the monitoring condition as taught by Lei to add perform random access using reduced capability BWP. Regarding Claim 15, Wang does not teach, The random access method of claim 14, further comprising: carrying a notification message in the first SSB information, wherein the notification message is configured to indicate a monitoring condition for monitoring a second SSB. Lei teaches, The random access method of claim 14, further comprising: carrying a notification message in the first SSB information, wherein the notification message is configured to indicate a monitoring condition for monitoring a second SSB. [101]- In some examples, the communications manager 720 may be configured to perform various operations (e.g., receiving, monitoring, transmitting) using or otherwise in cooperation with the receiver 710, the transmitter 715, or both. It would have been obvious to a person having an ordinary skill in the art of before the effective filing date of the claimed invention to modify the system of Wang, The random access method of claim 14, further comprising: carrying a notification message in the first SSB information, wherein the notification message is configured to indicate a monitoring condition for monitoring a second SSB as taught by Lei to add perform random access using reduced capability BWP. Regarding Claim 19, Wang teaches, A random access device, comprising: a processor; and a memory for storing instructions executable by the processor; wherein the processor is configured to determine first information, in response to a terminal being configured with a first initial bandwidth part and a second initial bandwidth part; [40]- To transmit SIB 1 for RedCap UEs, configurations of CORESET 0 and search space 0 for RedCap UEs are disclosed. In the following, CORESET 0(=first bandwidth) and search space 0 for RedCap UEs are denoted as CORESET 0-RC=(second bandwidth) and search space 0-RC [41-42]- Since reserved bits in MIB are limited, some parameters may need to be implicitly determined, for example, by using the same value as that of CORESET 0 and search space 0. Alternatively, SSB and MIB for RedCap UEs are disclosed, denoted as SSB-RC and MIB-RC, respectively. wherein the first information indicates that synchronous signal block (SSB) information has a mapping relationship with second random access resource information configured in the second initial bandwidth part; and [43]- To configure CORESET 0-RC (=mapping relationship with second random access resource information ) and search space 0-RC by SSB, the following bits of MIB may be utilized. The spare bit in MIB (=first information indicates) specified in 3GPP TS 38.331 may be used, as shown in Table 2. [45]- The spare bit of MIB and the reserved bits (e.g., a A+6, a A+7) are used to indicate the configuration of CORESET 0-RC and search space 0-RC. (=mapping relationship with second random access resource information ) Wang does not teach, perform random access based on the first information. Lei teaches, perform random access based on the first information. [39]- As a result, the UE may not have sufficient time to transition to a transmit mode to transmit a random-access preamble in the RO in response to the selected SSB, and the random-access procedure at the UE may be delayed. [40]- These techniques may allow half-duplex RedCap UEs to efficiently perform random-access procedures to establish or reestablish a connection with a base station. It would have been obvious to a person having an ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Wang, perform random access based on the first information as taught by Lei to add perform random access using reduced capability BWP. Regarding Claim 21, Wang teaches, A non-transitory storage medium having stored therein instructions that, when executed by a processor of a terminal, cause the terminal to perform the random access method of claim 1 See Fig 4 Claim(s) 3-5 are rejected under 35 U.S.C. 103 as being unpatentable over Wang et al. (US20230209542A1) in view of Lei et al. (US20220417997A1 ) in further view of Cirik et al. (US20220159733A1) Regarding Claim 3, Wang teaches, The random access method of claim 2, wherein the first information is configured to indicate that a second common control resource set in a second random access resource has a mapping relationship with the first SSB information; [42-43]- Method 1: Configure CORESET 0-RC and Search Space 0-RC by SSB for Legacy NR UEs. To configure CORESET 0-RC and search space 0-RC by SSB, the following bits of MIB may be utilized. Wang does not teach, wherein determining the second random access resource information according to the monitoring of the first SSB information comprises: determining spatial beam information of a first SSB according to the monitoring of the first SSB information; and taking the spatial beam information of the first SSB as spatial beam information of the second common control resource set. wherein determining the second random access resource information according to the monitoring of the first SSB information comprises: Cirik teaches determining spatial beam information of a first SSB according to the monitoring of the first SSB information; and [39]- Because the UE may receive each SSB on a different beam, the selection of the SSB may correspond to selecting a beam for communications with the base station[145]- In an example, a first SS/PBCH block may be transmitted in a first spatial direction using a first beam, and a second SS/PBCH block may be transmitted in a second spatial direction using a second beam. taking the spatial beam information of the first SSB as spatial beam information of the second common control resource set.[225]- In an example, the wireless device may receive the PDCCH scheduling/indicating the random-access response via the second coreset with an error based on the first and second TRP using different beams. It would have been obvious to a person having an ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Wang in view of Lei, wherein determining the second random access resource information according to the monitoring of the first SSB information comprises:determining spatial beam information of a first SSB according to the monitoring of the first SSB information; and taking the spatial beam information of the first SSB as spatial beam information of the second common control resource set as taught by Cirik to add perform random access using reduced capability BWP. Regarding Claim 4, Wang teaches, The random access method of claim 2 , wherein the first information indicates that a second physical random access channel (PRACH) resource set in a second random access resource has a mapping relationship with the first SSB information; [97]- the UL BWPs and the corresponding PRACH resource in each UL BWP that is used for a random access procedure are configured via SIB 1-RC. In some examples, the UL BWPs and the corresponding PRACH resource in each UL BWP that is used for a random-access procedure are configured via SIB1 if SIB1-RC is not provided to RedCap UEs. Wang in view of Lei does not teach, wherein determining the second random access resource information according to the monitoring of the first SSB information comprises: determining time-frequency domain information of a first PRACH resource set according to the monitoring of the first SSB information; and taking the time-frequency domain information of the first PRACH resource as time- frequency domain information of the second PRACH resource set. Cirik teaches, wherein determining the second random access resource information according to the monitoring of the first SSB information comprises: determining time-frequency domain information of a first PRACH resource set according to the monitoring of the first SSB information; and [340]- The one or more configuration parameters may comprise physical random-access channel (PRACH) transmission parameters (e.g., PRACH preamble format, time resources, and frequency resources for PRACH transmission).See also [365] taking the time-frequency domain information of the first PRACH resource as time- frequency domain information of the second PRACH resource set.[145]- SS/PBCH block may be transmitted in a first spatial direction using a first beam, and a second SS/PBCH block may be transmitted in a second spatial direction using a second beam. It would have been obvious to a person having an ordinary skill in the art before the effective filing date of the claimed invention to modify the system of Wang in view of Lei, wherein determining the second random access resource information according to the monitoring of the first SSB information comprises: determining time-frequency domain information of a first PRACH resource set according to the monitoring of the first SSB information; and taking the time-frequency domain information of the first PRACH resource as time- frequency domain information of the second PRACH resource set as taught by Cirik to add perform random access using reduced capability BWP. Regarding Claim 5, Wang teaches, The random access method of claim 1, wherein the first information is indicates that a second common control resource set in a second random access resource has a mapping relationship with first SSB information, a [43]- To configure CORESET 0-RC and search space 0-RC by SSB, the following bits of MIB may be utilized. The spare bit in MIB specified in 3GPP TS 38.331 may be used, as shown in Table 2. wherein the first SSB information is SSB information configured in the first initial bandwidth part, and the second SSB information is SSB information configured in the second initial bandwidth part. See [32] Wang in view of lei does not teach, and a second physical random access channel (PRACH) resource set in the second random access resource has a mapping relationship with second SSB information; Cirik teaches, and a second physical random access channel (PRACH) resource set in the second random access resource has a mapping relationship with second SSB information; [145-146]- base station may transmit a plurality of SS/PBCH blocks. In an example, a first PCI of a first SS/PBCH block of the plurality of SS/PBCH blocks may be different from a second PCI of a second SS/PBCH block of the plurality of SS/PBCH blocks. It would have been obvious to a person having an ordinary skill in the a inview of Leirt before the effective filing date of the claimed invention to modify the system of Wang, and a second physical random access channel (PRACH) resource set in the second random access resource has a mapping relationship with second SSB information as taught by Cirik to add perform random access using reduced capability BWP. Claim(s) 14,16 are rejected under 35 U.S.C. 103 as being unpatentable over Wang et al. (US20230209542A1) in view of Cirik et al. (US20220159733A1) Regarding Claim 14, Wang teaches, and the second SSB information is SSB information configured in the second initial bandwidth part See [32] Wang does not teach, The random access method of claim 9, wherein the first information is configured to indicate indicates that the second random access resource information has a mapping relationship with second SSB information. Cirik teaches, The random access method of claim 9, wherein the first information is configured to indicate indicates that the second random access resource information has a mapping relationship with second SSB information [145-146]- base station may transmit a plurality of SS/PBCH blocks. In an example, a first PCI of a first SS/PBCH block of the plurality of SS/PBCH blocks may be different from a second PCI of a second SS/PBCH block of the plurality of SS/PBCH blocks. It would have been obvious to a person having an ordinary skill in the art of before the effective filing date of the claimed invention to modify the system of Wang, The random access method of claim 9, wherein the first information is configured to indicate indicates that the second random access resource information has a mapping relationship with second SSB information. as taught by Cirik to add perform random access using reduced capability BWP. Regarding Claim 16, Wang does not teach, The random access method of claim 15, wherein the monitoring condition comprises at least one of: a time condition for monitoring the second SSB information; a mapping relationship condition between a first SSB and the second SSB. Cirik teaches, The random access method of claim 15, wherein the monitoring condition comprises at least one of: a time condition for monitoring the second SSB information; a mapping relationship condition between a first SSB and the second SSB. [145]- In an example, a first SS/PBCH block may be transmitted in a first spatial direction using a first beam, and a second SS/PBCH block may be transmitted in a second spatial direction using a second beam. It would have been obvious to a person having an ordinary skill in the art of before the effective filing date of the claimed invention to modify the system of Wang, The random access method of claim 15, wherein the monitoring condition comprises at least one of:a time condition for monitoring the second SSB information; a mapping relationship condition between a first SSB and the second SSB as taught by Lei to add perform random access using reduced capability BWP. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to Anindita Sen whose telephone number is (571) -272-2390. The examiner can normally be reached 7:30am-5:30pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Joseph Avellino can be reached on (571)-272-3905. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /ANINDITA SEN/ Examiner, Art Unit 2478 /JOSEPH E AVELLINO/Supervisory Patent Examiner, Art Unit 2478
Read full office action

Prosecution Timeline

Jan 05, 2024
Application Filed
Jan 06, 2026
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12547166
METHOD AND SYSTEM FOR TELEOPERATIONS AND SUPPORT SERVICES
2y 5m to grant Granted Feb 10, 2026
Patent 12543075
METHOD AND MULTI SIM UE FOR MANAGING DATA SESSION IN WIRELESS NETWORK
2y 5m to grant Granted Feb 03, 2026
Patent 12526771
OFDMA TRIGGER BASED PEER TO PEER OPERATIONS WITH DUAL-STAGE TRIGGERING
2y 5m to grant Granted Jan 13, 2026
Patent 12526789
COMMUNICATION METHOD AND APPARATUS
2y 5m to grant Granted Jan 13, 2026
Patent 12490205
METHODS AND DEVICES OF INFORMATION TRANSMISSION AND INFORMATION RECEPTION, AND TERMINAL
2y 5m to grant Granted Dec 02, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
83%
Grant Probability
87%
With Interview (+3.9%)
2y 11m
Median Time to Grant
Low
PTA Risk
Based on 75 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month