Prosecution Insights
Last updated: April 19, 2026
Application No. 18/588,870

VERIFICATION OF USER EQUIPMENT COMPLIANCE IN COMMUNICATION NETWORK ENVIRONMENT

Non-Final OA §103
Filed
Feb 27, 2024
Examiner
ANDERSON, MICHAEL D
Art Unit
2433
Tech Center
2400 — Computer Networks
Assignee
Nokia Technologies Oy
OA Round
2 (Non-Final)
80%
Grant Probability
Favorable
2-3
OA Rounds
3y 6m
To Grant
96%
With Interview

Examiner Intelligence

Grants 80% — above average
80%
Career Allow Rate
559 granted / 700 resolved
+21.9% vs TC avg
Strong +16% interview lift
Without
With
+15.7%
Interview Lift
resolved cases with interview
Typical timeline
3y 6m
Avg Prosecution
33 currently pending
Career history
733
Total Applications
across all art units

Statute-Specific Performance

§101
7.3%
-32.7% vs TC avg
§103
58.5%
+18.5% vs TC avg
§102
21.6%
-18.4% vs TC avg
§112
8.3%
-31.7% vs TC avg
Black line = Tech Center average estimate • Based on career data from 700 resolved cases

Office Action

§103
DETAILED ACTION Information Disclosure Statement 1. The information disclosure statement (IDS) submitted on 10/08/2024 was filed. The submission is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. 2. Claim(s) 1-19 are rejected under 35 U.S.C. 103 as being unpatentable over Pub.No.: US 2023/0308866 A1 to YAN et al(hereafter referenced as Yan) in further view of Pub.No.: US 2020/0169877 A1 to Kim. Regarding claim 1, Yan discloses “an apparatus comprising: at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the apparatus at least to: compute a secure identifier (permanent identifier [par.0007]) for the apparatus comprising an equipment identifier of the apparatus(IGS. 1A-1F are diagrams of an example 100 associated with network-based encryption of a UE identifier also see par[0011]). Yan does not explicitly disclose “and send the secure identifier comprising the equipment identifier in a request message to a communication network to which the apparatus is attempting to connect.” However, Kim in an analogous art discloses "and send the secure identifier comprising the equipment identifier (a PMSI may mean a user equipment identifier used for V2X communication instead of an IMSI Kim[par.0261]) in a request message to a communication network to which the apparatus is attempting to connect." (receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]). Therefore, it would have been obvious to one of ordinary skill in the art at the time the invention was filed to modify Yan’s secure user equipment identifier process with Kim’s secure connection identifier of user equipment in order to provide additional security. One of ordinary skill in the art would have been motivated to combine because Yan teaches a secured user equipment identifier, Kim discloses a secure identifier process, and both are from the same field of endeavor. Regarding claim 2 in view of claim 1, the references combined discloses “wherein the secure identifier comprises a subscription concealed identifier adapted to comprise a permanent equipment identifier” (3GPP standard for fifth-generation (5G) networks attempts to correct this issue by encrypting a permanent identifier (e.g., a subscription permanent identifier or SUPI Yan[par.0007]). Regarding claim 3 in view of claim 1, the references combined discloses “wherein the apparatus is part of user equipment and the secure identifier is computed in one of a universal subscriber identity module or a mobile equipment module of the user equipment”(subscriber identification module ( SIM ) card 1825 Kim[par.0333]) Regarding claim 4 in view of claim 1, the references combined discloses “wherein the at least one memory stores instructions that, when executed by the at least one processor, further cause the apparatus to: receive a message from the communication network indicating that a compliance verification check based at least in part on the equipment identifier has failed” ( If a UE context is not present in a network, the Attach Procedure is not integrity protected, or identification of integrity is failed, the Authentication and NAS security setup for activating the integrity protection and the NAS ciphering may be essentially performed Kim[par.0151]) Regarding claim 5 in view of claim 4, the references combined discloses “wherein the compliance verification check verifies compliance of the apparatus with one or more standards associated with the communication network.” (the UE checks on the data that is delivered by PDSCH , which is addressed by the PDCCH Kim[par.0141]). Regarding claim 6, Yan discloses “a method comprising: computing, via user equipment, a secure identifier for the user equipment comprising an equipment identifier of the user equipment” (IGS. 1A-1F are diagrams of an example 100 associated with network-based encryption of a UE identifier also see par[0011]). Yan does not explicitly disclose “ and sending the secure identifier comprising the equipment identifier in a request message from the user equipment to a communication network to which the user equipment is attempting to connect.” However, Kim in an analogous art discloses " and sending the secure identifier comprising the equipment identifier (a PMSI may mean a user equipment identifier used for V2X communication instead of an IMSI Kim[par.0261]) in a request message from the user equipment to a communication network to which the user equipment is attempting to connect.”(receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]). Therefore, it would have been obvious to one of ordinary skill in the art at the time the invention was filed to modify Yan’s secure user equipment identifier process with Kim’s secure connection identifier of user equipment in order to provide additional security. One of ordinary skill in the art would have been motivated to combine because Yan teaches a secured user equipment identifier, Kim discloses a secure identifier process, and both are from the same field of endeavor. Regarding claim 7 in view of claim 6, the references combined discloses “a n article of manufacture comprising a non-transitory computer-readable storage medium having embodied therein executable program code that when executed by a processor causes the processor to perform the steps of claim 6” (see claim 6 rejection) Regarding claim 8, Yan discloses “an apparatus comprising: at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the apparatus at least to: receive an authentication request for user equipment attempting to connect to a communication network, wherein the authentication request comprises a secure identifier (permanent identifier [par.0007]) for the user equipment comprising an equipment identifier of the user equipment(IGS. 1A-1F are diagrams of an example 100 associated with network-based encryption of a UE identifier also see par[0011]) identify the equipment identifier of the user equipment(IGS. 1A-1F are diagrams of an example 100 associated with network-based encryption of a UE identifier also see par[0011]). Yan does not explicitly disclose “send a compliance verification request to a network entity to perform a compliance verification of the user equipment based at least in part on the equipment identifier; and permit authentication to proceed when the compliance verification of the user equipment is successful” However, Kim in an analogous art discloses " send a compliance verification request to a network entity to perform a compliance verification of the user equipment based at least in part on the equipment identifier (a PMSI may mean a user equipment identifier used for V2X communication instead of an IMSI Kim[par.0261]) and permit authentication to proceed when the compliance verification of the user equipment is successful." (receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]). Therefore, it would have been obvious to one of ordinary skill in the art at the time the invention was filed to modify Yan’s secure user equipment identifier process with Kim’s secure connection identifier of user equipment in order to provide additional security. One of ordinary skill in the art would have been motivated to combine because Yan teaches a secured user equipment identifier, Kim discloses a secure identifier process, and both are from the same field of endeavor. Regarding claim 9 in view of claim 8, the references combined disclose “wherein the secure identifier comprises a subscription concealed identifier computed by the user equipment to comprise a permanent equipment identifier” (3GPP standard for fifth-generation (5G) networks attempts to correct this issue by encrypting a permanent identifier (e.g., a subscription permanent identifier or SUPI Yan[par.0007]). Regarding claim 10 in view of claim 8, the references combined disclose “wherein the compliance verification verifies compliance of the user equipment with one or more standards associated with the communication network” (the UE checks on the data that is delivered by PDSCH , which is addressed by the PDCCH Kim[par.0141]). Regarding claim 11 in view of claim 8, the references combined disclose “wherein the at least one memory stores instructions that, when executed by the at least one processor, further cause the apparatus to: request a compliance certificate for the user equipment; receive the compliance certificate for the user equipment; send a request to verify the compliance certificate to a network entity; and authorize the user equipment when the compliance certificate of the user equipment is verified by the network entity” (receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]). Regarding claim 12 in view of claim 11, the references combined disclose “wherein the compliance certificate is requested during a parameter update procedure associated with the user equipment” (receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]). Regarding claim 13 in view of claim 11, the references combined disclose “wherein the compliance certificate is requested following successful authentication of the user equipment” (receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]). Regarding claim 14 in view of claim 8, the references combined disclose “wherein the apparatus is part of a unified data management function” (network device (e.g., a unified data management (UDM) device) that provides network-based encryption of a UE identifier Yan[par.0009]). Regarding claim 15, Yan discloses “an apparatus comprising: at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the apparatus at least to: receive a compliance verification request from a network entity to perform a compliance verification of user equipment attempting to connect to a communication network” (IGS. 1A-1F are diagrams of an example 100 associated with network-based encryption of a UE identifier also see par[0011]). Yan does not explicitly disclose “perform the compliance verification based on an equipment identifier of the user equipment received by the network entity as part of a secure identifier for the user equipment; and send a compliance verification response to the network entity to enable the network entity to permit an authentication to proceed when the compliance verification of the user equipment is successful. However, Kim in an analogous art discloses “perform the compliance verification based on an equipment identifier of the user equipment received by the network entity as part of a secure identifier for the user equipment(the UE checks on the data that is delivered by PDSCH , which is addressed by the PDCCH Kim[par.0141]); and send a compliance verification response to the network entity to enable the network entity to permit an authentication to proceed when the compliance verification of the user equipment is successful. (receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]). Therefore, it would have been obvious to one of ordinary skill in the art at the time the invention was filed to modify Yan’s secure user equipment identifier process with Kim’s secure connection identifier of user equipment in order to provide additional security. One of ordinary skill in the art would have been motivated to combine because Yan teaches a secured user equipment identifier, Kim discloses a secure identifier process, and both are from the same field of endeavor. Regarding claim 16 in view of claim 15, the references combined discloses “wherein the secure identifier comprises a subscription concealed identifier computed by the user equipment to comprise a permanent equipment identifier.” (3GPP standard for fifth-generation (5G) networks attempts to correct this issue by encrypting a permanent identifier (e.g., a subscription permanent identifier or SUPI Yan[par.0007]). Regarding claim 17 in view of claim 15, the references combined discloses “wherein the compliance verification verifies compliance of the user equipment with one or more standards associated with the communication network.” (the UE checks on the data that is delivered by PDSCH , which is addressed by the PDCCH Kim[par.0141]). Regarding claim 18 in view of claim 15, the references combined discloses “wherein the at least one memory stores instructions that, when executed by the at least one processor, further cause the apparatus to: receive a request from the network entity to verify a compliance certificate received from the user equipment” (receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]); “perform the compliance certificate verification based on the equipment identifier of the user equipment; and send a compliance certificate verification response to the network entity to enable the network entity to authorize the user equipment when the compliance certificate verification of the user equipment is successful” (receives message to request first ticket that authenticates access authorization for identifier in serving network of user equipment Kim[Fig.16/item s1605]). Regarding claim 19 in view of claim 15, the references combined discloses “wherein the apparatus is part of an equipment identity register”(the AMF may continue with the registration process for registering the UE 105. For example, the AMF and AUSF may continue with the registration process to authenticate the UE 105 and the network (e.g., the RAN 110 and/or the core network 115) to be utilized by the UE 105 Yan[par.0020]). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to MICHAEL D ANDERSON whose telephone number is (571)270-5159. The examiner can normally be reached Mon-Fri 9am-6pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jeffrey Pwu can be reached at (571) 272-6798. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /MICHAEL D ANDERSON/Examiner, Art Unit 2433 /JEFFREY C PWU/Supervisory Patent Examiner, Art Unit 2433
Read full office action

Prosecution Timeline

Feb 27, 2024
Application Filed
Sep 18, 2025
Non-Final Rejection — §103
Dec 02, 2025
Response Filed
Feb 11, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603865
SYSTEMS AND METHODS FOR REMOTE ACCESS LATENCY REDUCTION
2y 5m to grant Granted Apr 14, 2026
Patent 12581295
TECHNIQUES TO GENERATE WIRELESS LOCAL AREA ACCESS NETWORK FAST TRANSITION KEY MATERIAL BASED ON AUTHENTICATION TO A PRIVATE WIRELESS WIDE AREA ACCESS NETWORK
2y 5m to grant Granted Mar 17, 2026
Patent 12579228
METHOD AND SYSTEM FOR INVESTIGATING RESILIENCY OF A SOFTWARE APPLICATION
2y 5m to grant Granted Mar 17, 2026
Patent 12568367
ROUTING INDICATOR RETRIVAL FOR AKMA
2y 5m to grant Granted Mar 03, 2026
Patent 12547679
ENFORCING EULA VERSION AWARE APPLICATION RESPONSE
2y 5m to grant Granted Feb 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

2-3
Expected OA Rounds
80%
Grant Probability
96%
With Interview (+15.7%)
3y 6m
Median Time to Grant
Moderate
PTA Risk
Based on 700 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month