DETAILED ACTION
The instant application having Application No. 18/590,716 filed on 02/28/2024 is presented for examination by the Examiner.
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claim Rejections - 35 USC § 112
The following is a quotation of 35 U.S.C. 112(b):
(b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.
The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph:
The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention.
Claims 1, 6, 9 13, 15 and 17 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention.
Claim 1 recites the limitations “..the generated encrypted key..” and “..the encrypted data..” There are lack of antecedent basis for these limitations in the claim.
Claim 6 recites the limitation “generate one or more seeds from the health data and the random number;” It is unclear if one or more seeds are generated from health data and one or more seeds are generated from the random number, or that one or more seeds are generated from the combination of health data and the random number.
Claim 9 recites the limitation “..the read data..” “..the decrypted data..” and “..the data encrypted “ in lines 5, 7 and 8 respectively. There are lack of antecedent basis for these limitations in the claim.
Claim 13 recites “..the generation..” in line 6. There is a lack of antecedent basis for this limitation in the claim.
Claim 15 recites “..the read data..” and “..the generation..” in lines 4 & 6 respectively. There are lack of antecedent basis for these limitations in the claim.
Claim 17 recites “..the read health data..” “..the generated encryption key..” and “..the encrypted data..” There are lack of antecedent basis for these limitations in the claim
Claim Rejections - 35 USC § 103
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
Claims 1-2, 4-5, 7, 12, 17-18 and 20 are rejected under 35 U.S.C. 103 as being unpatentable over Umesawa et al. (US 2021/0223968 A1-hereinafter Ume) and in view of Gorobets et al. (US 2007/0266200 A1-hereinafter Gorobets).
Regarding claim 1, Ume discloses a memory system comprising:
a nonvolatile memory (at least figure 1, element 5, [0031], i.e.: NAND flash memory); and
a controller (at least element 4, i.e.: memory controller) configured to:
generate an encryption key using key information (at least elements 12 & 123, [0061][0064], i.e.: generates data encryption key using key information);
encrypt data with the generated encryption key (at least [0057], data is encrypted); and
write the encrypted data into the nonvolatile memory (at least [0057], the data encrypted is written into the NAND flash memory).
Ume does not explicitly disclose the key information is health data indicating a deterioration state of the nonvolatile memory and time data.
However, Gorobets discloses information is health data indicating a deterioration state of the nonvolatile memory and time data (at least figures 2-7, i.e.: number of erases per block per day).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to include the information discloses in Otter into the system of Ume to allow keys to be generated using different information.
Regarding claim 2, Ume and Gorobets disclose the memory system according to claim 1. Gorobets also discloses the time data includes an absolute time output from a real-time clock or a relative time from a certain reference time output from the real-time clock (at least [0050][0054]-[0055], system clock).
Regarding claim 4, Ume and Gorobets disclose the memory system according to claim 1. Gorobets also discloses the health data includes a number of erase operations that has been performed with respect to the nonvolatile memory (at least figures 2-3 and 6).
Regarding claim 5, Ume and Gorobets disclose the memory system according to claim 4. Gorobets also discloses the nonvolatile memory includes a memory cell array including a plurality of blocks (at least figure 1b, Block 0-block N), and the health data includes a minimum value, a maximum value, and an average value among numbers of erase operations that have been performed with respect to the plurality of blocks, respectively (at least [0034][0042], minimum, maximum and average number of block erases).
Regarding claim 7, Ume and Gorobets disclose the memory system according to claim 1. Ume and Gorobets also disclose the nonvolatile memory includes a storage area that is divided into a plurality of address ranges (Ume-at least [0050]-[0051], physical address of NAND; Gorobets-at least [0035], addresses of page/block), and the controller is configured to generate one or more encryption keys for each of the plurality of address ranges (Ume-at least elements 12 & 123, [0061][0064], i.e.: generates data encryption key using key information).
Regarding claim 12, Ume and Gorobets disclose the memory system according to claim 1. Ume also discloses the controller performs the generation of the encryption key in response to a write request received from a host (at least [0038][0054], data encryption key is generated in response to write command received), and the data encrypted using the encryption key is data corresponding to the write request (at least [0038][0054], data is encrypted using the data encryption key corresponding to the write command received).
Claim 17 is rejected for the same rationale as claim 1 above.
Claim 18 is rejected for the same rationale as claim 2 above.
Claim 20 is rejected for the same rationale as claim 4 above.
Claims 3 and 19 are rejected under 35 U.S.C. 103 as being unpatentable over Umesawa, Gorobets and further in view of Snyder et al. (US 2013/0031304 A1-hereinafter Snyder).
Regarding claim 3, Ume and Gorobets disclose the memory system according to claim 1. Ume and Gorobets do not explicitly disclose the health data includes a total size of data that has been written into the nonvolatile memory or a total size of data that has been read from the nonvolatile memory.
However, Snyder discloses a total size of data that has been written into nonvolatile memory (at least [0031]).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to include the teachings of Snyder into the system of Ume & Otter to allow keys to be generated using different types of state information of NVM.
Claim 19 is rejected for the same rationale as claim 3 above.
ALLOWABLE SUBJECT MATTER
Claims 6, 8, 13 and 15 are objected to as being dependent upon rejected based claim, but would be allowable if rewritten in independent form including all of the limitations of the base claim and any intervening claims.
Claims 9-11, 14 and16 directly or indirectly dependent on the objected claims, as such are also objected for the same rationale as claims 6, 8 13 & 15 above.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to PHY ANH TRAN VU whose telephone number is (571)270-7317. The examiner can normally be reached Monday-Friday 7 am-1 pm.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Taghi T Arani can be reached at (571) 272-3787. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/PHY ANH T VU/Primary Examiner, Art Unit 2438