Prosecution Insights
Last updated: April 19, 2026
Application No. 18/608,688

APPARATUS, SYSTEM, AND METHOD OF DATA ARRAY TRANSFORMATION

Non-Final OA §103
Filed
Mar 18, 2024
Examiner
LI, ZHUO H
Art Unit
2133
Tech Center
2100 — Computer Architecture & Software
Assignee
Mobileye Vision Technologies Ltd.
OA Round
2 (Non-Final)
89%
Grant Probability
Favorable
2-3
OA Rounds
2y 8m
To Grant
92%
With Interview

Examiner Intelligence

Grants 89% — above average
89%
Career Allow Rate
512 granted / 575 resolved
+34.0% vs TC avg
Minimal +3% lift
Without
With
+3.3%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
18 currently pending
Career history
593
Total Applications
across all art units

Statute-Specific Performance

§101
5.6%
-34.4% vs TC avg
§103
52.8%
+12.8% vs TC avg
§102
16.5%
-23.5% vs TC avg
§112
9.2%
-30.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 575 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Response to Amendment Applicant's request for reconsideration of the rejection of the last Office action is persuasive and, therefore, the 102 rejection of that action is withdrawn. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-2, 8-9, 15, 20-21 and 23-25 are rejected under 35 U.S.C. 103 as being unpatentable over Neoh (US 2020/0125335 A1) in view of Dulong et al. (US 5,815,421, hereinafter Dulong). Regarding claim 1, Neoh discloses an apparatus as shown in figure 3 comprising: a Data Mover and Transformer (DMT) configured to transform a first data array retrieved from a first memory into a second data array to be stored in a second memory as shown in figure 1, the DMT comprising: a Row to Column (R2C) transformer configured to transform a data sub-array into a transformed data sub-array by transforming one or more rows of the data sub-array into one or more respective columns of the transformed data sub-array ([0014], first local X-Y transpose operation transposes the rows of the matrices 101 in the first FFT dimension, in the X-dimension, to columns of the matrices 102 in the second FFT dimension, in the Y-dimension). Neoh differs from the claimed invention in not specifically teaching a memory reader to populate the data sub-array with data retrieved from the first memory according to a memory read pattern, wherein the memory read pattern is based on a predefined transformation from the first data array to the second data array; and a memory writer to write data from the transformed data sub-array to the second memory according to a memory write pattern, wherein the memory write pattern is based on the predefined transformation from the first data array to the second data array. However, Dulong teaches a method of transposing an array comprising an unpack operation to perform an unpack of the low-order data elements (read as memory read pattern) of Source 201, within register 204, and Source 200, within register 203, to generate Result 202, within register 205 (figure 2 and col. 6 lines 13-28, read on to populate the data sub-array with data retrieved from the first memory according to a memory read pattern, wherein the memory read pattern is based on a predefined transformation from the first data array to the second data array), and data element a(1) of Source 201, which resides in the lowest-order location within register 204, is stored in the second lowest-order location of result register 205, data element b(0) of Source 200, which resides in the second lowest-order location within register 203, is stored in the third lowest-order location of result register 205, and so forth, such that interleaving of Source 201 and Source 200 continues in this manner until register 205 is filled (col. 6 lines 18-34, read as to write data from the transformed data sub-array to the second memory according to a memory write pattern, wherein the memory write pattern is based on the predefined transformation from the first data array to the second data array) in order to easily manipulate data in memory array. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify Neoh in having a memory reader to populate the data sub-array with data retrieved from the first memory according to a memory read pattern, wherein the memory read pattern is based on a predefined transformation from the first data array to the second data array; and a memory writer to write data from the transformed data sub-array to the second memory according to a memory write pattern, wherein the memory write pattern is based on the predefined transformation from the first data array to the second data array, as per teaching of Dulong, in order to easily manipulate data in memory array. Regarding claim 2, Neoh teaches that two transpose engines may, for example, generate the memory access patterns to write/read to/from memory block 410 in order to provide a transposed matrix that feeds into 2 FFT engines that implement the functions of a multi-dimensional fast Fourier transform ([0025]), as well as Dulong teaches that unpack operation manipulates data elements by interleaving data from a first source with data from a second source to generate a result, i.e., the first source, second source, and result are given distinct address locations within the computer system memory; or each operation is performed by a corresponding instruction (col. 5 line 58 through col. 6 line 2) such that the unpack operation obviously includes an address pattern input to input read pattern information and write pattern information, wherein the memory reader is configured to determine the memory read pattern based on the read pattern information, wherein the memory writer is configured to determine the memory write pattern based on the write pattern information in order to easily manipulate data in memory array. Regarding claim 8, Neoh teaches that the DMT is configured to transform the first data array into the second data array by performing a sequence of read/write cycles, a read/write cycle of the sequence of read/write cycles comprising: populating the one or more rows of the data sub-array by one or more respective memory entries retrieved by the memory reader from the first memory according to the memory read pattern; transforming the one or more rows of the data sub-array into the one or more respective columns of the transformed data sub-array; and writing data from one or more rows of the transformed data sub-array to one or more respective memory entries of the second memory according to the memory write pattern ([0014] and [0025], the first local X-Y transpose operation transposes the rows of the matrices 101 in the first FFT dimension to columns of the matrices 102 in the second FFT dimension, and two transpose engines may, for example, generate the memory access patterns to write/read to/from memory block 410 in order to provide a transposed matrix that feeds into 2 FFT engines that implement the functions of a multi-dimensional fast Fourier transform). Regarding claim 9, Neoh teaches that the DMT is configured to configure at least one of a count of the rows in the data sub-array or a count of the columns in the data sub-array based on input R2C configuration information ([0018], matrix 200 can be transposed by writing the columns of the matrix in columns of a memory block, and then reading rows of matrix 200 from rows of the memory block). Regarding claim 15, Neoh discloses that each of the first data array and the second data array comprises two or more dimensions (figure 1). Regarding claim 20, the limitations are rejected as the same reasons as set forth in claim 1. Regarding claim 21, the limitations are rejected as the same reasons as set forth in claim 2. Regarding claim 23, the limitations are rejected as the same reasons as set forth in claim 8. Regarding claim 24, the limitations are rejected as the same reasons as set forth in claim 1. Regarding claim 25, the limitations are rejected as the same reasons as set forth in claim 8. Claims 10-14 are rejected under 35 U.S.C. 103 as being unpatentable over Neoh (US 2020/0125335 A1) in view of Dulong et al. (US 5,815,421, hereinafter Dulong) as applied in claim 1 above and further in view of Mansell (WO 2021/229229 A1). Regarding claims 10-14, the combination of Neoh and Dulong differs from the claimed invention in not specifically teaching that a count of the rows in the data sub-array and a count of the columns in the data sub-array are based on an element size of a data element in the first data array, wherein a count of the rows in the data sub-array is based on a memory entry size of the first memory, wherein a count of the rows in the data sub-array is based on a count of data elements of the first data array per memory entry of the first memory, wherein a count of the columns in the data sub-array is based on a memory entry size of the second memory, and wherein a count of the columns in the data sub-array is based on a count of data elements of the second data array per memory entry of the second memory. However, Mansell discloses that a count of the rows in the data sub-array and a count of the columns in the data sub-array are based on an element size of a data element in the first data array, wherein a count of the rows in the data sub-array is based on a memory entry size of the first memory, wherein a count of the rows in the data sub-array is based on a count of data elements of the first data array per memory entry of the first memory, wherein a count of the columns in the data sub-array is based on a memory entry size of the second memory, and wherein a count of the columns in the data sub-array is based on a count of data elements of the second data array per memory entry of the second memory (page 12 line 34 through page 13 line 13, provides sub-portion selection information to select which sub-portion of the portion of the matrix data structure in memory identified based on the addressing information is to be loaded to the operand storage circuitry when loading a given target row or column, and the sub-portion selection information can be used to narrow down which sub-portion of a row or column should be processed for a given operation as the layout of matrix data in memory may include rows or columns of a greater size than the block of matrix data to be operated on by a given set of matrix processing instructions). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the combination of Neoh and Dulong, in having that a count of the rows in the data sub-array and a count of the columns in the data sub-array are based on an element size of a data element in the first data array, wherein a count of the rows in the data sub-array is based on a memory entry size of the first memory, wherein a count of the rows in the data sub-array is based on a count of data elements of the first data array per memory entry of the first memory, wherein a count of the columns in the data sub-array is based on a memory entry size of the second memory, and wherein a count of the columns in the data sub-array is based on a count of data elements of the second data array per memory entry of the second memory, as per teaching of Mansell, in order to support more efficient 2D convolution operations. Claims 16-19 are rejected under 35 U.S.C. 103 as being unpatentable over Neoh (US 2020/0125335 A1) in view of Dulong et al. (US 5,815,421, hereinafter Dulong) as applied in claim 1 above and further in view of Yi et al. (CN 103048644A as recited in Applicant’s IDS). Regarding claims 16-19, the combination of Neoh and Dulong differs from the claimed invention in not specifically teaching a processor configured to generate radar information based on the second data array in the second memory, wherein the first data array in the first memory comprises first processed radar data arranged in the first data array according to a first radar-processing dimension, wherein the second data array is arranged according to a second radar-processing dimension to be processed by the processor, wherein the processor is configured to generate second processed radar data by processing data from the second data array according to the second radar-processing dimension, to store the second processed radar data in a third data array in the first memory, and to configure the DMT to transform the third data array from the first memory into a fourth data array to be stored in the second memory, the fourth data array is arranged according to a third radar-processing dimension to be processed by the processor, and wherein the second radar-processing dimension is different from the first radar-processing dimension, and the third radar-processing dimension is different from the second radar-processing dimension. However, Yi teaches a synthetic matrix transposition method of the synthetic aperture radar imaging system comprising synthetic aperture radar echo input matrix data, echo data matrix division and generation of read-write address, the echo matrix data in SDRAM, echo matrix transpose output of output cache unit and echo matrix data to configure the size of the sub matrix block, and perform optimal segmentation according to input echo raw data matrix of size in the transposition process ([0006]-[0013]) in order to improve the requirement of the data capacity of a memory and matrix transposition efficiency. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to modify the combination of Neoh and Dulong in having a processor configured to generate radar information based on the second data array in the second memory, wherein the first data array in the first memory comprises first processed radar data arranged in the first data array according to a first radar-processing dimension, wherein the second data array is arranged according to a second radar-processing dimension to be processed by the processor, wherein the processor is configured to generate second processed radar data by processing data from the second data array according to the second radar-processing dimension, to store the second processed radar data in a third data array in the first memory, and to configure the DMT to transform the third data array from the first memory into a fourth data array to be stored in the second memory, the fourth data array is arranged according to a third radar-processing dimension to be processed by the processor, and wherein the second radar-processing dimension is different from the first radar-processing dimension, and the third radar-processing dimension is different from the second radar-processing dimension, as per teaching of Yi, in order to improve the requirement of the data capacity of a memory and matrix transposition efficiency. Allowable Subject Matter Claims 3-7 and 22 are objected to as being dependent upon a rejected base claim, but would be allowable if rewritten in independent form including all of the limitations of the base claim and any intervening claims. The following is a statement of reasons for the indication of allowable subject matter: The prior art of record fails to teach nor suggest “wherein the read pattern information comprises read sub-address information to define a plurality of read sub-address sequences, the memory read pattern is based on a combination of the plurality of read sub-address sequences, wherein the write pattern information comprises write sub-address information to define a plurality of write sub-address sequences, the memory write pattern is based on a combination of the plurality of write sub-address sequences” as recited in claim 3; and “wherein the read pattern information comprises read sub-address information to define a plurality of read sub-address sequences, the memory read pattern is based on a combination of the plurality of read sub-address sequences, wherein the write pattern information comprises write sub-address information to define a plurality of write sub-address sequences, the memory write pattern is based on a combination of the plurality of write sub-address sequences” as recited in claim 22. Claims 4-7, are also objected because of depending on claim 3, containing the same allowable subject matter. Response to Arguments Applicant’s arguments with respect to claim(s) 1-25 have been considered but are moot because the new ground of rejection does not rely on any reference applied in the prior rejection of record for any teaching or matter specifically challenged in the argument. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to ZHUO H LI whose telephone number is (571)272-4183. The examiner can normally be reached Mon. Tue. and Thurs. 8:00-4:00 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Rocio Del Mar Perez-Velez can be reached at (571)-270-5935. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /ZHUO H LI/Primary Examiner, Art Unit 2133
Read full office action

Prosecution Timeline

Mar 18, 2024
Application Filed
Jun 13, 2025
Non-Final Rejection — §103
Nov 06, 2025
Applicant Interview (Telephonic)
Nov 14, 2025
Examiner Interview Summary
Nov 16, 2025
Response Filed
Feb 17, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12592292
EFUSE UNIT AND APPLICATION CIRCUIT THEREOF
2y 5m to grant Granted Mar 31, 2026
Patent 12578880
MEMORY MANAGEMENT METHOD TO SAVE ENERGY
2y 5m to grant Granted Mar 17, 2026
Patent 12578872
DYNAMIC SENSING SCHEME TO COMPENSATE FOR THRESHOLD VOLTAGE SHIFT DURING SENSING IN A MEMORY DEVICE
2y 5m to grant Granted Mar 17, 2026
Patent 12578863
LOW LATENCY DYNAMIC RANDOM ACCESS MEMORY (DRAM) ARCHITECTURE WITH DEDICATED READ-WRITE DATA PATHS
2y 5m to grant Granted Mar 17, 2026
Patent 12561281
REDUCING STABLE DATA EVICTION WITH SYNTHETIC BASELINE SNAPSHOT AND EVICTION STATE REFRESH
2y 5m to grant Granted Feb 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

2-3
Expected OA Rounds
89%
Grant Probability
92%
With Interview (+3.3%)
2y 8m
Median Time to Grant
Moderate
PTA Risk
Based on 575 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month