DETAILED ACTION
This communication is in response to the claims filed on 01/24/2024.
Application No: 18/578, 572
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Notice of Pre-AIA or AIA Status
In the event the determination of the status of the application as subject to AIA 35 U. S. C. 102 and 103 (or as subject to pre-AIA 35 U. S. C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
Claim Objections
Claim 18 is objected to because of the following informalities. Claim states that “providing the AC information received using an access stratum AS of the UE to a non-access stratum NAS of the UE”. This limitation includes both, access stratum and non-access stratum in the same limitation, and is not clearly disclosing inventive concept. Appropriate correction is recommended for further review.
Claim Rejections - 35 USC § 112
The following is a quotation of 35 U.S.C. 112(b):
(b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.
The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph:
The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention.
Claims 1 and (similarly dependent claims 2-4, 6-7, 9-13, 15-16, 18-21) are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention.
Claim 1 recites the limitation “ An access control processing method, executed by a first network device and comprising: sending access control AC information, wherein the AC information is able to control access of a user equipment UE group.”
The claim 1 recites only a single, functionally-defined step—“sending access control AC information, wherein the AC information is able to control access of a user equipment UE group”—without specifying any particular acts, details, or limitations as to how the access control is actually performed. As such, the claim constitutes a “single means” (or “single step”) claim, which is indefinite because it merely states a desired result or intended capability, rather than reciting specific steps or acts for achieving that result. Claim(s) that provide only a single means or step for accomplishing a result are considered indefinite under 35 U.S.C. § 112(b). See MPEP 2172.01 and Halliburton Oil Well Cementing Co. v. Walker, 329 U.S. 1 (1946).
Therefore, claim 1 fails to particularly point out and distinctly claim the subject matter regarded as the invention.
Therefore, independent claim 1 is rejected under 35 USC 112(b). Similarly dependent claims 2-4, 6-7, 9-13, 15-16, 18-21 are rejected under the same reasoning as in the corresponding independent claim.
Claim 15 is rejected under 35 USC 112(b) as being indefinite. It appears that the Claim has three limitations to receive information simultaneously. This is not practical. Looks like there is missing “at least one of” phrase (See reference claim 6).
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U. S. C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
The factual inquiries set forth in Graham v. John Deere Co., 383 U. S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U. S. C. 103 are summarized as follows:
1. Determining the scope and contents of the prior art.
2. Ascertaining the differences between the prior art and the claims at issue.
3. Resolving the level of ordinary skill in the pertinent art.
4. Considering objective evidence present in the application indicating obviousness or nonobviousness.
Claims 1-4, 6-7, 9-13, 15-16, 18, 20-21, 43and 45 are rejected under 35 U. S. C. 103 as being unpatentable over ZHANG1 et al. (WO 2017020553 A1) in view of Zongzhao et al. (WO 2015101100 A1).
Regarding claim 1, ZHANG1 teaches an access control processing method, executed by a first network device ([Summary of the invention], e.g. FIG. 6 is a flow chart showing a method for establishing a wireless connection at a user equipment end and a network equipment end according to another preferred embodiment of the present application ), and comprising:
sending access control AC information ([Summary of the invention], e.g. Sending the access information to the user equipment),
wherein the AC information is able to control access of a user equipment ([Summary of the invention], e.g. The establishing may also be to present the access information of the target access point to the user corresponding to the user equipment 1, for example, sending the access information to the user equipment 1 by using a short message, and, for example, using the access information as a device. Sending the information to the user equipment 1 in the manner of the prompt information in the application, and then the corresponding user performs a wireless connection based on the obtained access information (i.e. able to control access of a user equipment), and the user sends a connection request to the target wireless access point by manually in able to control access of a user equipment putting the connection password information, thereby Establishing a connection between the user equipment 1 and the target wireless access point).
ZHANG1 teaches a method and apparatus for establishing a wireless connection. However ZHANG1 differs from the claimed invention in not specifically and clearly describing wherein
the AC information is able to control access of a user equipment UE group.
However, in the analogous field of endeavor, Zongzhao teaches wherein
the AC information is able to control access of a user equipment UE group ([Summary of the invention], e.g. The first working group (501) is configured to process a service between the connected terminal device and the network side under the control of the main control unit (504). [Embodiment 1] As shown in FIG. 1, the network device can be connected to multiple terminal devices (i.e. a Group of UE), and the network device provided includes an uplink interface unit 503 and a main control unit 504) [Embodiment 2] The first working group and the second working group respectively connect different users, and the business requirements of different users are provided by their respective control units due to the service configuration parameters of the two working groups, so that the first The working group and the second working group perform corresponding types of services according to the service configuration parameters of the respective control units (i.e. the AC information is able to control access of a user equipment UE group)).
Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to implement the method of Zongzhao within the method of ZHANG1. The motivation to combine references is that the combined system provides a network device and a service processing method in the network, so as that the network device can support multiple different types of services (See Zongzhao [Summary of the invention]).
Regarding claim 2, ZHANG1 in view of Zongzhao teaches all the limitations of claim 1. Zongzhao further teaches wherein the AC information comprises at least one of: first type of AC information for the UE group; second type of AC information for all UEs in the cell ([Summary of the invention], e.g. The first working group (501) is configured to process a service between the connected terminal device and the network side under the control of the main control unit (i.e. first type of AC information for the UE group)).
The motivation to combine reference of Zongzhao within the method of ZHANG1 before the effective filing date of the invention is that the new method provides that the network device and the service processing method in the network in the embodiment of the present invention divide the network device into at least two working groups each including one control unit, and control the corresponding working groups to run different types through the control units in different working groups (See Zongzhao [Summary of the invention]).
Regarding claim 3, ZHANG1 in view of Zongzhao teaches all the limitations of claim 1. Zongzhao further teaches wherein the AC information comprises at least one of: a control indication, indicating whether access control is required; first group information, indicating the UE group that requires access control; second group information, indicating the UE group that does not require access control; a status indication, indicating a UE status on which the control indication applies, wherein the UE status comprises: at least one of radio resource control RRC connected state, RRC idle state RRC inactive state; a first service indication, indicating a service that requires access control; a second service indication, indicating a service that does not require access control; a first level indication, indicating an access level of the UE group that requires access control; a second level indication, indicating an access level of the UE group that does not require access control; a duration indication, indicating a barring duration of a service ([Summary of the invention] (e.g. The first working group (501) is configured to process a service between the connected terminal device and the network side under the control of the main control unit (i.e. first group information, indicating the UE group that requires access control)).
The motivation to combine reference of Zongzhao within the method of ZHANG1 before the effective filing date of the invention is that the new method provides that the network device and the service processing method in the network in the embodiment of the present invention divide the network device into at least two working groups each including one control unit, and control the corresponding working groups to run different types through the control units in different working groups (See Zongzhao [Summary of the invention]).
Regarding claim 4, ZHANG1 in view of Zongzhao teaches all the limitations of claim 1. ZHANG1 further teaches wherein the first network device comprises: a base station or a core network device ([detailed description], e.g. FIG. 3 shows a system diagram of a user equipment 1 and a network device 2 for establishing a wireless connection in accordance with another preferred embodiment of the present application. The user equipment 1 includes a first device 301, a second device 302, and a third device 303. The network device 2 includes an eighth device 304, a ninth device 305, and a tenth device 306 (i.e. the first network device comprises: a core network device)).
Regarding claim 6, ZHANG1 in view of Zongzhao teaches all the limitations of claim 1. ZHANG1 further teaches wherein the sending access control AC information comprises at least one of: sending the AC information to a UE during an attachment process of the UE: sending the AC information to the UE through a broadcast signaling; or sending the AC information to the UE through a dedicated signaling ([detailed description], e.g. (FIG. 1 Transmitting an access request for the target wireless access point; in step S402, the user equipment 1 acquires the connection of the target wireless access point returned by the network device 2 based on the access request In step S403, the user equipment 1 establishes a wireless connection between the user equipment 1 and the target wireless access point based on the access information (i.e. sending the AC information to the UE through a dedicated wireless signaling)).
Regarding claim 7, ZHANG1 in view of Zongzhao teaches all the limitations of claim 6. ZHANG1 further teaches wherein the sending the AC information to the UEat least one of: sending the AC information to the UE through a broadcast paging message; sending the AC information to the UE through a reconfiguration message; sending the AC information to the UE through a connection release message; or sending the AC information to the UE through a cell handover message ([detailed description], e.g. Here, the user equipment 1 may obtain the one or more wireless access point information by means of active scanning. For example, the user equipment 1 sequentially sends a sounding signal, such as a probe request frame, on a channel it supports. Obtaining the wireless access point information. Here, the user equipment 1 may also obtain the one or more wireless access point information by means of passive scanning, for example, by scanning a beacon frame periodically sent by a wireless access point existing around, and acquiring the Wireless access point information. Here, the wireless access feedback information, such as the beacon frame, may include wireless access point information such as SSID, connection speed information, and access security information of the access point (I.e. scanning involves listening for broadcasts, while receiving can mean parsing those broadcast messages. Connect when you need more than a beacon’s small broadcast payload, such as streaming sensor data, control, or secure reads and writes)).
Regarding claim 9, ZHANG1 in view of Zongzhao teaches all the limitations of claim 1. ZHANG1 further teaches wherein the sending access control AC information comprises: sending the AC information to a second network device ([detailed description], e.g. Specifically, the eighth device 304 of the network device 2 receives an access request for the target wireless access point sent by the user equipment 1. Here, the network device 2 includes various cloud servers, and the network device 2 may be a single device or a device cluster. Here, preferably, the network device 2 stores a large number of wireless access points of each region, and their respective access information, or also includes wireless access point information corresponding to the wireless access point. The access information includes, but is not limited to, connection password information for accessing the wireless access point. Next, the ninth device 305 determines access information of the target wireless access point based on the access request. Here, preferably, each wireless access point stored in the network device 2 is uniquely determined with its corresponding network SSID and device MAC address. At this time, the access request of the target access point includes information such as a network SSID and a device MAC corresponding to the target wireless access point, and is used to identify the target wireless access point, based on the target. The identification information of the line access point searches for the access information of the target wireless access point that matches the network device 2. Furthermore, the tenth device 306 feeds back the determined access information to the corresponding user equipment 1 (i.e. sending the first AC information to 305, and a second network device to 306)).
Regarding claim 10, ZHANG1 teaches an access control processing method, executed by a user equipment UE ([Summary of the invention], e.g. FIG. 6 is a flow chart showing a method for establishing a wireless connection at a user equipment end and a network equipment end according to another preferred embodiment of the present application), and comprising:
receiving access control AC information ([Summary of the invention], e.g. Sending the access information to the user equipment (i.e. receiving access control AC information at the UE)); and
performing access control of the UE according to the AC information ([Summary of the invention], e.g. The establishing may also be to present the access information of the target access point to the user corresponding to the user equipment 1, for example, sending the access information to the user equipment 1 by using a short message, and, for example, using the access information as a device. Sending the information to the user equipment 1 in the manner of the prompt information in the application, and then the corresponding user performs a wireless connection based on the obtained access information (i.e. able to control access of a user equipment), and the user sends a connection request to the target wireless access point by manually in able to control access of a user equipment putting the connection password information, thereby Establishing a connection between the user equipment 1 and the target wireless access point).
ZHANG1 teaches a method and apparatus for establishing a wireless connection. However ZHANG1 differs from the claimed invention in not specifically and clearly describing wherein
according to the AC information and a UE group to which the UE belongs.
However, in the analogous field of endeavor, Zongzhao teaches wherein
according to the AC information and a UE group to which the UE belongs ([Summary of the invention], e.g. The first working group (501) is configured to process a service between the connected terminal device and the network side under the control of the main control unit (504). [Embodiment 1] As shown in FIG. 1, the network device can be connected to multiple terminal devices (i.e. a Group of UE), and the network device provided includes an uplink interface unit 503 and a main control unit 504.) [Embodiment 2] The first working group and the second working group respectively connect different users, and the business requirements of different users are provided by their respective control units due to the service configuration parameters of the two working groups, so that the first The working group and the second working group perform corresponding types of services according to the service configuration parameters of the respective control units (i.e. according to the AC information and a UE group to which the UE belongs)).
Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to implement the method of Zongzhao within the method of ZHANG1. The motivation to combine references is that the combined system provides a network device and a service processing method in the network, so as that the network device can support multiple different types of services (See Zongzhao [Summary of the invention]).
Regarding claim 11, ZHANG1 in view of Zongzhao teaches all the limitations of claim 10. Zongzhao further teaches wherein the AC information comprises at least one of: first type of AC information for the UE group; second type of AC information for all UEs in the cell([Summary of the invention], e.g. The first working group (501) is configured to process a service between the connected terminal device and the network side under the control of the main control unit (504)).
The motivation to combine reference of Zongzhao within the method of ZHANG1 before the effective filing date of the invention is that the new method provides that the network device and the service processing method in the network in the embodiment of the present invention divide the network device into at least two working groups each including one control unit, and control the corresponding working groups to run different types through the control units in different working groups (See Zongzhao [Summary of the invention]).
Regarding claim 12, ZHANG1 in view of Zongzhao teaches all the limitations of claim 10. ZHANG1 further teaches wherein the AC information comprises at least one of: a control indication, indicating whether access control is required; first group information, indicating the UE group that requires access control; second group information, indicating the UE group that does not require access control; a status indication, indicating a UE status on which the control indication applies, wherein the UE status comprises: at least one of radio resource control RRC connected state, RRC idle state or RRC inactive state; a first service indication, indicating a service that requires access control; a second service indication, indicating a service that does not require access control; a first level indication, indicating an access level of the UE group that requires access control; a second level indication, indicating an access level of the UE group that does not require access control; Summary of the invention] (e.g. The first working group (501) is configured to process a service between the connected terminal device and the network side under the control of the main control unit (i.e. first group information, indicating the UE group that requires access control)).
Regarding claim 13, ZHANG1 in view of Zongzhao teaches all the limitations of claim 10. ZHANG1 further teaches wherein the receiving access control AC information comprises one of: receiving the AC information sent by a core network device; and receiving the AC information sent by a base station ([detailed description], e.g. FIG. 3 shows a system diagram of a user equipment 1 and a network device 2 for establishing a wireless connection in accordance with another preferred embodiment of the present application. The user equipment 1 includes a first device 301, a second device 302, and a third device 303. The network device 2 includes an eighth device 304, a ninth device 305, and a tenth device 306 (i.e. the first network device comprises: a core network device)).
Regarding claim 15, ZHANG1 in view of Zongzhao teaches all the limitations of claim 10. ZHANG1 further teaches wherein the receiving access control AC information comprises: receiving the AC information during an attachment process of the UE; receiving the AC information through a broadcast signaling; and receiving the AC information through a dedicated signaling ([detailed description], e.g. (FIG. 1 Transmitting an access request for the target wireless access point; in step S402, the user equipment 1 acquires the connection of the target wireless access point returned by the network device 2 based on the access request In step S403, the user equipment 1 establishes a wireless connection between the user equipment 1 and the target wireless access point based on the access information (i.e. sending the AC information to the UE through a dedicated wireless signaling)).
Regarding claim 16, ZHANG1 in view of Zongzhao teaches all the limitations of claim 15. ZHANG1 further teaches wherein the receiving the AC information through comprises at least one of: receiving the AC information through a broadcast paging message, receiving the AC information through a reconfiguration message; receiving the AC information through a release message; or receiving the AC information through a handover message ([detailed description], e.g. Here, the user equipment 1 may obtain the one or more wireless access point information by means of active scanning. For example, the user equipment 1 sequentially sends a sounding signal, such as a probe request frame, on a channel it supports. Obtaining the wireless access point information. Here, the user equipment 1 may also obtain the one or more wireless access point information by means of passive scanning, for example, by scanning a beacon frame periodically sent by a wireless access point existing around, and acquiring the Wireless access point information. Here, the wireless access feedback information, such as the beacon frame, may include wireless access point information such as SSID, connection speed information, and access security information of the access point (I.e. scanning involves listening for broadcasts, while receiving can mean parsing those broadcast messages. Connect when you need more than a beacon’s small broadcast payload, such as streaming sensor data, control, or secure reads and writes)).
Regarding claim 18, ZHANG1 in view of Zongzhao teaches all the limitations of claim 10. ZHANG1 further teaches wherein providing the AC information received using an access stratum AS of the UE to a non-access stratum NAS of the UE ([detailed description], e.g. At this time, the user equipment 1 performs network condition determination through the network status detection function, for example, by The target domain name or the target IP (Internet Protocol, the protocol interconnected between the networks), … the user equipment 1 completes the transmission of the access request based on the currently existing data communication manner, for example, based on the opened mobile communication network, such as GSM (Global System for Mobile Communication). Network, CDMA (Code Division Multiple Access) network, 3G (3rd Generation, third generation digital communication) network, 4G (4th Generation, fourth generation digital communication) network, etc., complete the transmission of the access request
(i.e. the Access Stratum (AS) is a protocol used in the UMTS and LTE wireless telecom protocol stacks, responsible for transporting data over the wireless connection and managing radio resources. Ordinary skills in the art can easily use different protocol(s) based on the network type (e.g. UMTS or LTE ) as defined in the 3GPP standards)).
Regarding claim 20, ZHANG1 in view of Zongzhao teaches all the limitations of claim 10. ZHANG1 further teaches wherein storing the AC information in the AS of the UE ([detailed description], e.g. the user equipment 1 shares the access information of the wireless access point that it knows and has the right to share through the corresponding operation of the user, and can enrich and update the storage in the network device 2 corresponding to the user equipment 1 (i.e. UE shares the stored AC information)).
Regarding claim 21, ZHANG1 in view of Zongzhao teaches all the limitations of claim 10. Zongzhao further teaches wherein in response to the UE obtaining the second type of AC information for the cell and the first type of AC information for the UE group, performing access control of the UE based on the first type of AC information preferentially ([Summary of the invention], e.g. The first working group (501) is configured to process a service between the connected terminal device and the network side under the control of the main control unit (i.e. performing access control of the UE based on the first type of AC information preferentially)).
The motivation to combine reference of Zongzhao within the method of ZHANG1 before the effective filing date of the invention is that the new method provides that the network device and the service processing method in the network in the embodiment of the present invention divide the network device into at least two working groups each including one control unit, and control the corresponding working groups to run different types through the control units in different working groups (See Zongzhao [Summary of the invention]).
Regarding claim 43, ZHANG1 n view of Zongzhao teaches all the limitations of claim 1. ZHANG1 further teaches wherein a first network device ([Summary of the invention], e.g. FIG. 6 is a flow chart showing a method for establishing a wireless connection at a user equipment end and a network equipment end (i.e. first network device) according to another preferred embodiment of the present application ), comprising:
a processor, and memory for storing instructions executable by the processor ([detailed description], e.g. in a typical configuration of the present application, the terminal, the device of the service network (i.e. a part of the first network device), and the trusted party each include one or more processors (i.e. CPUs running the executable instructions), input/output interfaces, network interfaces, and memory);
wherein, the processor is configured to implement the access control processing method according to claim 1 when running the executable instructions ([see citation of claim 1 above]).
Regarding claim 45, ZHANG1 n view of Zongzhao teaches all the limitations of claim 10. ZHANG1 further teaches wherein a user equipment UE [Summary of the invention], e.g. FIG. 6 is a flow chart showing a method for establishing a wireless connection at a user equipment end and a network equipment end according to another preferred embodiment of the present application ), comprising:
a processor, and memory for storing instructions executable by the processor ([detailed description], e.g. in a typical configuration of the present application, the terminal (i.e. a user equipment UE), the device of the service network, and the trusted party each include one or more processors (i.e. CPUs running the executable instructions), input/output interfaces, network interfaces, and memory);
wherein, the processor is configured to implement the access control processing method according to claim 10 when running the executable instructions ([see citation of claim 10 above]).
Allowable Subject Matter
Claim 19 is objected to as being dependent upon a rejected base claim, but would be allowable, if rewritten in independent form including all of the limitations of the base claim and any intervening claims (e.g. 10 plus 18 plus 19), and amending claims to overcome any objection(s) and /or rejection(s) set forth in this Office action.
Prior Art Record
The prior art made of record and not relied upon is considered pertinent
to applicant’s disclosure.
Johansson; Nicklas (US-20160262130-A1) - SIGNALING OF CORE NETWORK RESTART TO WIRELESS DEVICES.
Pinheiro; Ana Lucia A. (US-10003972-B2) - Systems, methods, and devices for application aware access control for communication on a mobile network.
Patil; Sudhakar Reddy (US-11864026-B2) - . Systems and methods for access barring based on slice information
Klatt; Axel (US-12127104-B2) - Controlling the use and/or access of user plane radio communication resources of a telecommunications network.
LARMO ANNA (WO-2013025148-A1) - Access control method for regulating access of user equipment (UE) to wireless communication network involves controlling timing of attempt by UE to access cell in wireless communication network based on determined access delay.
ZHU, GUANGYONG (WO-2017076255-A1) - METHOD FOR BALANCING LOAD OF WIRELESS NETWORK, NETWORK EQUIPMENT, AND TERMINAL EQUIPMENT.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to Mahendra Patel whose telephone number is (571) 270-7499. The examiner can normally be reached on 9:30 AM to 5:30 PM (EST) .
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, Applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Anthony Addy can be reached on (571) 272-7795(571) 272-7795. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free) ? If you would like assistance from a USPTO customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/MAHENDRA R PATEL/ Primary Examiner, Art Unit 2645