Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claim Objections
Claim 67 is objected to because of the following informalities: Claim 67 states it is dependent on claim 66, but also “when dependent on claim 23”. This appears to be left from a prior claim set. The claims no longer contain claim 23. Appropriate correction is required.
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
Claim(s) 43-50, 53-57, 59-65, 68, 69 is/are rejected under 35 U.S.C. 103 as being unpatentable over Pokhrel US 10,848,515 in view of Ramarao US 2023/0123132
As per claim 43. (New) Pokhrel teaches generating a security metric for a target system comprising a plurality of logical components, and wherein the security metric comprises a quantitative representation of the security of the target system, which representation is non-specific to any given component of the system or point of attack, the method comprising: (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches an directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
Pokhrel teaches for each of a plurality of reference systems, and for each of a plurality of training systems: generating an analogical model of the system, the analogical model comprising a plurality of vulnerability resistance elements, each vulnerability resistance element corresponding to a security vulnerability of the modelled system; (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches an directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
Pokhrel teaches and mapping the generated analogical model to a directed graph of the modelled system; wherein for each of the plurality of training systems, a value of the security metric is available; (Column 2 lines 18-60) (teaches a directed attack graph of the target system or network)
Pokhrel teaches and to provide an output comprising a value of the security metric. (Column 3 lines 42-60)
Pokhrel fails to explicitly teach ML, or calculated distance.
Ramarao teaches a machine learning model having a plurality of trainable parameters, the method further comprising, for each of the plurality of training systems: calculating a distance metric between the directed graph of the training system and the directed graph of each of the plurality of reference systems; ; [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
Ramarao teaches and adding to a training data set the calculated distance metrics and the security metric value for the training system; [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
Ramarao teaches and the method further comprising: using the training data set to update values of the trainable parameters of the ML model, wherein the ML model is operable to receive an input comprising a plurality of distance metrics; [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Ramarao with the method/system of Pokhrel because it increases accuracy of the model [Ramarao: par. 0046]
As per claim 44. (New) Pokhrel and Ramarao disclose the method of claim 43, Pokhrel further teaches wherein generating the analogical model of the system comprises: obtaining configuration information for the system, the configuration information comprising a system topology and an identification of security vulnerabilities of the system; generating from the configuration information a plurality of system security states, wherein each system security state comprises at least one of a pre or post condition of an identified vulnerability; and for a physical domain of the analogical model, representing: each identified security vulnerability of the system as a vulnerability resistance element of the analogical model; each generated system security state as a node between two or more vulnerability resistance elements of the analogical model; and attack paths traversing vulnerabilities between system security states as flow conduits for a flow variable in the analogical model. (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches an directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk) (Column 8 lines 11-20) (teaches scores including post condition impact and score)
As per claim 45. (New) Pokhrel and Ramarao disclose the method of claim 44, Pokhrel further teaches wherein a precondition of a security vulnerability comprises prerequisites for the system and for an attacker that are required for an attack on the security vulnerability to be successful; and wherein a post condition of a security vulnerability comprises the consequences for the system and for the attacker of successfully executing an attack on the security vulnerability. (Column 3 lines 14-25) (Column 8 lines 11-20) (teaches software vulnerabilities and scores of impact and consequences via CVSS).
As per claim 46. (New) Pokhrel and Ramarao disclose the method of claim 43. Pokhrel further discloses wherein, for generating the analogical model of a system, the method further comprises adding a one-way flow gate to each vulnerability resistance element to direct flow of a flow variable around the model in a direction consistent with the flow of attacks in the system. (Column 3 lines 25-35) (constructing an attack graph directional chain of exploits)
As per claim 47. (New) Pokhrel and Ramarao disclose the method of claim 43. Pokhrel further teaches wherein a magnitude of the resistance provided by each vulnerability resistance element is based on a severity of the corresponding security vulnerability. (Column 2 lines 50-67) (CVSS framework provides exploitability and impact metrics) (Column 7 lines 40-50)
As per claim 48. (New) Pokhrel and Ramarao disclose the method of claim 43. Pokhrel further teaches wherein, for each system security state represented in the analogical model, the method includes generating an importance score, wherein a magnitude of the importance score represents a magnitude of a consequence for the modelled system of an attacker reaching that state. (Column 2 lines 50-67) (CVSS framework provides exploitability and impact metrics) (Column 7 lines 40-50)
As per claim 49. (New) Pokhrel and Ramarao disclose the method of claim 43. Pokhrel further teaches wherein, for generating the analogical model of the system, the method includes, for each potential attack entry point in the modelled system, adding a source of the analogical model flow variable to the analogical model. (Column 3 lines 26-34) (attack graph with attack paths) (Column 7 lines 10-20) (attacker source node/entry)
As per claim 50. (New) Pokhrel and Ramarao disclose the method of claim 49. Pokhrel further discloses setting a magnitude of each source such that a potential energy provided by the source increases with decreasing importance score of a system security state represented by a node that is adjacent to the source. (Column 2 lines 50-67) (Column 7 lines 40-50) (Column 3 1-15) (CVSS framework provides exploitability and impact metrics, scores can be formed and adjusted by an analyst as desired.)
As per claim 53. (New) Pokhrel and Ramarao disclose the method of claim 43. Pokhrel further teaches wherein at least one of the plurality of reference systems or the plurality of training systems comprises a subsystem for which a value of the security metric is available, and wherein generating the analogical model of the system includes: representing the subsystem in the analogical model with a number of vulnerability resistance elements corresponding to a number of potential attack entry points in the subsystem; representing a system security state of the subsystem at which the subsystem connects to the rest of the modelled system as a node in the analogical model; and determining a resistance value of the vulnerability resistance elements such that a difference between the available value of the security metric for the subsystem and a predicted value of the security metric for the subsystem is minimized. (Column 3 lines 25-35) (constructing an attack graph directional chain of exploits)
(Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches a directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
As per claim 54. (New) Pokhrel and Ramarao disclose the method of claim 43. Pokhrel further teaches wherein mapping a generated analogical model to a directed graph of a modelled system comprises: mapping each node in the analogical model to a node in the directed graph; determining a magnitude of flow of the flow variable of the analogical model through each of the vulnerability resistance elements; and for each pair of nodes connected by a single vulnerability resistance element in the analogical model: if the vulnerability resistance element has a non-zero flow magnitude, mapping the vulnerability resistance element to an edge between the nodes in the directed graph. (Column 3 lines 25-35) (constructing an attack graph directional chain of exploits) (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches a directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
As per claim 55. (New) Pokhrel and Ramarao disclose the method of claim 54. Pokhrel further teaches wherein mapping the vulnerability resistance element to an edge between the nodes in the directed graph comprises: setting a direction of the edge to be the direction of flow through the vulnerability resistance element; and setting a magnitude of the edge to be the magnitude of the flow through the vulnerability resistance element. (Column 3 lines 25-35) (constructing an attack graph directional chain of exploits)
(Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches a directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
As per claim 56. (New) Pokhrel and Ramarao disclose the method of claim 43. Ramarao further teaches wherein calculating the distance metric between the directed graph of the training system and the directed graph of each of the plurality of reference systems comprises: calculating a measure of similarity between the directed graph of the training system and the directed graph of each of the plurality of reference systems. [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models).
The motivation is the same that of claim 43 above.
As per claim 57. (New) Pokhrel and Ramarao disclose the method of claim 43, Ramarao further teaches wherein the ML model comprises a regression model. [0052] (regression model).
The motivation is the same that of claim 43 above.
As per claim 59. (New) Pokhrel teaches a computer implemented method for generating a security metric for a target system comprising a plurality of logical components, wherein the security metric comprises a quantitative representation of the security of the target system, which representation is non-specific to any given component of the system or point of attack, the method comprising: generating an analogical model of the target system, the analogical model comprising a plurality of vulnerability resistance elements, each vulnerability resistance element corresponding to a security vulnerability of the target system; (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches an directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
Pokhrel teaches mapping the generated analogical model to a directed graph of the target system; (Column 2 lines 18-60) (teaches a directed attack graph of the target system or network)
Pokhrel teaches generate an output comprising a value of the security metric for the target system.
Pokhrel fails to explicitly teach ML, or calculated distance. . (Column 3 lines 42-60)
Ramarao teaches calculating a distance metric between the directed graph of the target system and a directed graph of each of a plurality of reference systems; and inputting a tensor comprising the calculated distance metrics to a trained Machine Learning (ML) model; ; [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
Ramarao teaches wherein the ML model has been trained using a training data set that is based on the same plurality of reference systems; and wherein the ML model is operable to process the input tensor and to ; [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Ramarao with the system/method of Pokhrel because it increases accuracy of the model. [Ramarao: par. 0046]
As per claim 60. (New) Pokhrel and Ramarao disclose the method of claim 59, Pokhrel further teaches wherein generating the analogical model of the target system comprises: obtaining configuration information for the target system, the configuration information comprising a system topology and an identification of security vulnerabilities of the target system; generating from the configuration information a plurality of system security states, wherein each system security state comprises at least one of a pre or post condition of an identified vulnerability; and for a physical domain of the analogical model, representing: each identified security vulnerability of the target system as a vulnerability resistance element of the analogical model; each generated system security state as a node between two or more vulnerability resistance elements of the analogical model; and attack paths traversing vulnerabilities between system security states as flow conduits for a flow variable in the analogical model. (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches a directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk) (Column 8 lines 11-20) (teaches scores including post condition impact and score)
As per claim 61. (New) Pokhrel and Ramarao disclose the method of claim 59, Pokhrel further teaches wherein a precondition of a security vulnerability comprises prerequisites for the system and for an attacker that are required for an attack on the security vulnerability to be successful; and wherein a post condition of a security vulnerability comprises the consequences for the system and for the attacker of successfully executing an attack on the security vulnerability. (Column 3 lines 14-25) (Column 8 lines 11-20) (teaches software vulnerabilities and scores of impact and consequences via CVSS)
As per claim 62. (New) Pokhrel and Ramarao disclose the method of claim 59, Pokhrel further teaches wherein, for generating an analogical model of the target system, the method includes further comprises adding a one-way flow gate to each vulnerability resistance element to direct flow of the flow variable around the model in a direction consistent with the flow of attacks in the target system. (Column 3 lines 25-35) (constructing an attack graph directional chain of exploits)
As per claim 63. (New) Pokhrel and Ramarao disclose the method of claim 59, Pokhrel further teaches wherein a magnitude of the resistance provided by each vulnerability resistance element is based on a severity of the corresponding security vulnerability. (Column 2 lines 50-67) (CVSS framework provides exploitability and impact metrics) (Column 7 lines 40-50)
As per claim 64. (New) Pokhrel and Ramarao disclose the method of claim 59, Pokhrel further teaches wherein, for generating the analogical model of the target system, the method includes, for each system security state represented in the analogical model, generating an importance score, wherein a magnitude of the importance score represents a magnitude of a consequence for the target system of an attacker reaching that state. (Column 2 lines 50-67) (CVSS framework provides exploitability and impact metrics) (Column 7 lines 40-50)
As per claim 65. (New) Pokhrel and Ramarao disclose the method of claim 59, Pokhrel further teaches wherein, for generating the analogical model of the target system, the method includes, for each potential attack entry point in the target system, adding a source of the analogical model flow variable to the analogical model. (Column 3 lines 26-34) (attack graph with attack paths) (Column 7 lines 10-20) (attacker source node/entry)
As per claim 68. (New) Pokhrel teaches a Training module for training a Machine Learning (ML) model having a plurality of trainable parameters, wherein the ML model is for generating a security metric for a target system comprising a plurality of logical components, and wherein the security metric comprises a quantitative representation of the security of the target system, which representation is non-specific to any given component of the system or point of attack, the training module comprising processing circuitry configured to: for each of a plurality of reference systems, and for each of a plurality of training systems: generate an analogical model of the system, the analogical model comprising a plurality of vulnerability resistance elements, each vulnerability resistance element corresponding to a security vulnerability of the modelled system; (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches an directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
Pokhrel teaches and map the generated analogical model to a directed graph of the modelled system; (Column 2 lines 18-60) (teaches a directed attack graph of the target system or network)
Pokhrel teaches wherein for each of the plurality of training systems, a value of the security metric is available; (Column 3 lines 42-60) (teaches a security metric as risk of entire system)
Pokhrel teaches to provide an output comprising a value of the security metric. ; (Column 3 lines 42-60)
Pokhrel fails to explicitly teach ML, or calculated distance.
Ramarao teaches the processing circuitry being further configured to, for each of the plurality of training systems: calculate a distance metric between the directed graph of the training system and the directed graph of each of the plurality of reference systems; [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
Ramarao teaches and add to a training data set the calculated distance metrics and the security metric value for the training system; [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
Ramarao teaches the processing circuitry being further configured to use the training data set to update values of the trainable parameters of the ML model, wherein the ML model is operable to receive an input comprising a plurality of distance metrics, [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine teaching of Ramarao with the method of Pokhrel because it increases accuracy of the model [Ramarao: par. 0046]
As per claim 69. (New) Pokhrel teaches a prediction module for generating a security metric for a target system comprising a plurality of logical components, wherein the security metric comprises a quantitative representation of the security of the target system, which representation is non- specific to any given component of the system or point of attack, the prediction module comprising processing circuitry configured to: generate an analogical model of the target system, the analogical model comprising a plurality of vulnerability resistance elements, each vulnerability resistance element corresponding to a security vulnerability of the target system; (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches an directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
Pokhrel teaches map the generated analogical model to a directed graph of the target system; (Column 2 lines 18-60) (teaches a directed attack graph of the target system or network)
Pokhrel teaches generate an output comprising a value of the security metric for the target system. (Column 2 lines 18-60; Column 3 lines 42-60; Column 5 lines 4-28; Column 5 lines 57- Column 6 line 34) (teaches an directed attack graph of a system; including CVSS scores of vulnerability resistance elements, which is used to create a predictive model of the system; teaches using the sub-scores and summing them to get an overall security metric of risk)
Pokhrel fails to explicitly teach ML, or calculated distance.
Ramarao teaches calculate a distance metric between the directed graph of the target system and a directed graph of each of a plurality of reference systems; and input a tensor comprising the calculated distance metrics to a trained ML model; [0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
Ramarao teaches wherein the ML model has been trained using a training data set that is based on the same plurality of reference systems, and wherein the ML model is operable to process the input tensor[0048][0052][0088][0089] (teaches calculating a distance metric between reference and current model and using the tensor/vector as feedback to improve the ML model, teaches that the model may be a combination of multiple models)
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine teaching of Ramarao with the method of Pokhrel because it increases accuracy of the model [Ramarao: par. 0046]
Claim(s) 58, is/are rejected under 35 U.S.C. 103 as being unpatentable over Pokhrel US 10,848,515 in view of Ramarao US 2023/0123132 in view of DiMaggio US 2019/0258807
As per claim 58. Pokhrel and Ramarao the method of claim 43.
Pokhrel and Ramarao fail to teach a diversity metric.
DiMaggio teaches selecting at least the plurality of reference systems such that the plurality fulfils a diversity criterion with respect to the domain of systems for which the trained ML model is to be used; and such that individual systems in the plurality fulfil: a significance criterion with respect to the domain of systems for which the trained ML model is to be used; and a consensus criterion with respect to the value of a security metric that is available for the system [0077][0078] (teaches using a diversity score in order to cluster entities in order to improve a predictive machine learning model to detect vulnerabilities)
It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to combine the teachings of DiMaggio with the method of Pokhrel and Ramarao because it improves accuracy and efficiency.
Claim(s) 51, 52, 66, 67 is/are rejected under 35 U.S.C. 103 as being unpatentable over Pokhrel US 10,848,515 in view of Ramarao US 2023/0123132 in view of Tripp US 2014/0123293
As per claim 51. (New) Pokhrel and Ramarao disclose the method of claim 43.
Pokhrel and Ramarao fail to teach sink elements.
Tripp teaches wherein, for each system security state represented by a node in the analogical model, the method includes adding a sink resistance element and a sink of the analogical model flow variable downstream of the node. [0047]-[0051] (teaches security analysis including vulnerability analysis of a flow from a source to a sink and weighing the values of the flow/sink appropriately for the vulnerability metric)
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Tripp with the method/system of Pokhrel and Ramarao because it further narrows the field of security analysis.
As per claim 52. (New) Pokhrel, Ramarao and Tripp disclose the method of claim 51.
Tripp teaches further comprising setting a resistance of each sink resistance element such that the resistance to flow of the flow variable provided by the sink resistance element increases with decreasing importance score of a system security state represented by the node that is adjacent to the sink resistance element. [0047]-[0051] (teaches security analysis including vulnerability analysis of a flow from a source to a sink and weighing the values of the flow/sink appropriately for the vulnerability metric).
The motivation is the same that of claim 51 above.
As per claim 66. (New) Pokhrel and Ramarao disclose the method of claim 59.
Pokhrel and Ramarao fail to teach sink elements.
Tripp teaches wherein, for generating the analogical model of the target system, the method includes, for each system security state represented by a node in the analogical model, adding a sink resistance element and a sink of the analogical model flow variable downstream of the node. [0047]-[0051] (teaches security analysis including vulnerability analysis of a flow from a source to a sink and weighing the values of the flow/sink appropriately for the vulnerability metric)
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Tripp with the method/system of Pokhrel and Ramarao because it further narrows the field of security analysis.
As per claim 67. (New) Pokhrel and Ramarao disclose the method of claim 66,
Pokhrel and Ramarao fail to teach sink elements.
Tripp teaches setting a resistance of each sink resistance element such that the resistance to flow of the flow variable provided by the sink resistance element increases with decreasing importance score of a system security state represented by the node that is adjacent to the sink resistance element. [0047]-[0051] (teaches security analysis including vulnerability analysis of a flow from a source to a sink and weighing the values of the flow/sink appropriately for the vulnerability metric).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the teachings of Tripp with the method/system of Pokhrel and Ramarao because it further narrows the field of security analysis.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to CHRISTOPHER BROWN whose telephone number is (571)272-3833. The examiner can normally be reached M-F 8-5.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Luu Pham can be reached at (571) 270-5002. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/CHRISTOPHER J BROWN/Primary Examiner, Art Unit 2439