Prosecution Insights
Last updated: April 19, 2026
Application No. 18/765,514

DYNAMICALLY PROVISIONING COMPUTING PODS IN A COMPUTING RESOURCE CLUSTER

Non-Final OA §101§DP
Filed
Jul 08, 2024
Examiner
DAO, TUAN C.
Art Unit
2198
Tech Center
2100 — Computer Architecture & Software
Assignee
Commvault Systems Inc.
OA Round
1 (Non-Final)
82%
Grant Probability
Favorable
1-2
OA Rounds
3y 1m
To Grant
98%
With Interview

Examiner Intelligence

Grants 82% — above average
82%
Career Allow Rate
642 granted / 782 resolved
+27.1% vs TC avg
Strong +16% interview lift
Without
With
+15.6%
Interview Lift
resolved cases with interview
Typical timeline
3y 1m
Avg Prosecution
38 currently pending
Career history
820
Total Applications
across all art units

Statute-Specific Performance

§101
18.3%
-21.7% vs TC avg
§103
51.8%
+11.8% vs TC avg
§102
18.6%
-21.4% vs TC avg
§112
5.3%
-34.7% vs TC avg
Black line = Tech Center average estimate • Based on career data from 782 resolved cases

Office Action

§101 §DP
DETAILED ACTION The instant application having Application No. 18/765,514 filed on 07/08/2024 is presented for examination by the examiner. Claim 1- is/are pending in the application. Claims 1, 8 and 15 is/are independent claims. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Examiner Notes Examiner cites particular columns and line numbers in the references as applied to the claims below for the convenience of the applicant. Although the specified citations are representative of the teachings in the art and are applied to the specific limitations within the individual claim, other passages and figures may apply as well. It is respectfully requested that, in preparing responses, the applicant fully consider the references in entirety as potentially teaching all or part of the claimed invention, as well as the context of the passage as taught by the prior art or disclosed by the examiner. Drawings The applicant’s drawings submitted are acceptable for examination purposes. Information Disclosure Statement As required by M.P.E.P. 609, the applicant’s submissions of the Information Disclosure Statement dated 07/08/2024 are acknowledged by the examiner and the cited references have been considered in the examination of the claims now pending. Specification Objections The disclosure is objected to because of the following informalities: under “Cross-reference to related applications” section, the status of U.S Patent Application No. 17/508822 now is patented need to be updated. Appropriate correction is required. Double Patenting The nonstatutory double patenting rejection is based on a judicially created doctrine grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or improper timewise extension of the “right to exclude” granted by a patent and to prevent possible harassment by multiple assignees. A nonstatutory obviousness-type double patenting rejection is appropriate where the conflicting claims are not identical, but at least one examined application claim is not patentably distinct from the reference claim(s) because the examined application claim is either anticipated by, or would have been obvious over, the reference claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); and In re Thorington, 418 F.2d 528, 163 USPQ 644 (CCPA 1969). A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may be used to overcome an actual or provisional rejection based on a nonstatutory double patenting ground provided the conflicting application or patent either is shown to be commonly owned with this application, or claims an invention made as a result of activities undertaken within the scope of a joint research agreement. Effective January 1, 1994, a registered attorney or agent of record may sign a terminal disclaimer. A terminal disclaimer signed by the assignee must fully comply with 37 CFR 3.73(b). Initially, it should be noted that the present application and Application No. 17/508822, have the same inventive entity. The assignee for both applications is Commvault System, INC. Claims 1-20 are rejected on the ground of nonstatutory obviousness-type double patenting as being unpatentable over claims 1-20 of patent #12033004. Although the conflicting claims are not identical, they are not patentably distinct from each other. Claims 1-20 are compared to claim 1-20 of patent #12033004 in the following table: Instant Application US patent #12033004 1. A system for providing on-demand computing resources to an information management system that manages backup and restore operations to a plurality of client computing devices, the system comprising: one or more non-transitory, computer-readable media having computer-executable instructions stored thereon; and one or more processors that, having executed the computer-executable instructions, configure the system to perform a plurality of operations comprising: receiving a computing resource request for computing resources from an information management system; provisioning a plurality of computing pods based on the computing resource request; selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system; applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; and applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods. 2.The system of claim 1, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system. 3. The system of claim 1, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source. 4.The system of claim 1, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated. 5.The system of claim 1, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds; and provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds. 6.The system of claim 1, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods. 7.The system of claim 1, wherein the plurality of operations further comprises: updating a database of provisioned computing pods to identify those computing pods that have been provisioned as the provisioned plurality of computing pods; monitoring a status of one or more computing pods of the provisioned plurality of computing pods; and updating the database of provisioned computing pods to identify that a provisioned computing pod of the provisioned plurality of computing pods has become available based on a change in the status of the provisioned computing pod. 8.A method for providing on-demand computing resources to an information management system that manages backup and restore operations to a plurality of client computing devices, the method comprising: receiving a computing resource request for computing resources from an information management system; provisioning a plurality of computing pods based on the computing resource request; selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system; applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; and applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system. 9.The method of claim 8, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system. 10.The method of claim 8, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source. 11.The method of claim 8, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated. 12.The method of claim 8, wherein the method further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds; and provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds. 13.The method of claim 8, wherein the method further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods. 14.The method of claim 8, wherein the method further comprises: updating a database of provisioned computing pods to identify those computing pods that have been provisioned as the provisioned plurality of computing pods; monitoring a status of one or more computing pods of the provisioned plurality of computing pods; and updating the database of provisioned computing pods to identify that a provisioned computing pod of the provisioned plurality of computing pods has become available based on a change in the status of the provisioned computing pod. 15.A non-transitory, computer-readable media having computer-executable instructions stored thereon that, when executed by one or more processors, cause a system to perform a plurality of operations comprising: receiving a computing resource request for computing resources an information management system; provisioning a plurality of computing pods based on the computing resource request; selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system; applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; and applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system. 16. The non-transitory, computer-readable media of claim 15, wherein each pre- configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system. 17.The non-transitory, computer-readable media of claim 15, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source. 18. The non-transitory, computer-readable media of claim 15, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated. 19.The non-transitory, computer-readable media of claim 15, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds; and provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds. 20.The non-transitory, computer-readable media of claim 15, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods. 1. A system for providing on-demand computing resources to an information management system that manages backup and restore operations to a plurality of client computing devices, the system comprising: one or more non-transitory, computer-readable media having computer-executable instructions stored thereon; and one or more processors that, having executed the computer-executable instructions, configure the system to perform a plurality of operations comprising: receiving a computing resource request for computing resources from a storage manager of an information management system; provisioning a plurality of computing pods based on the computing resource request; selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system; applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system; and communicating a response to the storage manager that informs the storage manager of availability of the provisioned plurality of computing pods. 2. The system of claim 1, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system. 3. The system of claim 1, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source. 4. The system of claim 1, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated. 5. The system of claim 1, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds; provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds; and communicating to the storage manager that the one or more additional computing pods are available for satisfying the computing resource request. The system of claim 1, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods. 7. The system of claim 1, wherein the plurality of operations further comprises: updating a database of provisioned computing pods to identify those computing pods that have been provisioned as the provisioned plurality of computing pods; monitoring a status of one or more computing pods of the provisioned plurality of computing pods; updating the database of provisioned computing pods to identify that a provisioned computing pod of the provisioned plurality of computing pods has become available based on a change in the status of the provisioned computing pod; and communicating a message to the storage manager that the provisioned computing pod is available for performing one or more operations assignable by the storage manager. 8. A method for providing on-demand computing resources to an information management system that manages backup and restore operations to a plurality of client computing devices, the method comprising: receiving a computing resource request for computing resources from a storage manager of an information management system; provisioning a plurality of computing pods based on the computing resource request; selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system; applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system; and communicating a response to the storage manager that informs the storage manager of availability of the provisioned plurality of computing pods. 9. The method of claim 8, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system. 10. The method of claim 8, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source. 11. The method of claim 8, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated. 12. The method of claim 8, wherein the method further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds; provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds; and communicating to the storage manager that the one or more additional computing pods are available for satisfying the computing resource request. 13. The method of claim 8, wherein the method further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods. 14. The method of claim 8, wherein the method further comprises: updating a database of provisioned computing pods to identify those computing pods that have been provisioned as the provisioned plurality of computing pods; monitoring a status of one or more computing pods of the provisioned plurality of computing pods; updating the database of provisioned computing pods to identify that a provisioned computing pod of the provisioned plurality of computing pods has become available based on a change in the status of the provisioned computing pod; and communicating a message to the storage manager that the provisioned computing pod is available for performing one or more operations assignable by the storage manager. 15. A non-transitory, computer-readable media having computer-executable instructions stored thereon that, when executed by one or more processors, cause a system to perform a plurality of operations comprising: receiving a computing resource request for computing resources from a storage manager of an information management system; provisioning a plurality of computing pods based on the computing resource request; selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system; applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system; and communicating a response to the storage manager that informs the storage manager of availability of the provisioned plurality of computing pods. 16. The non-transitory, computer-readable media of claim 15, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system. 17. The non-transitory, computer-readable media of claim 15, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source. 18. The non-transitory, computer-readable media of claim 15, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated. 19. The non-transitory, computer-readable media of claim 15, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds; provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds; and communicating to the storage manager that the one or more additional computing pods are available for satisfying the computing resource request. 20. The non-transitory, computer-readable media of claim 15, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods. It is clear that all the elements of the application claim 1-20 are to be found in patent claim 1-20. The difference between the application claim 1-20 and the patent claim 1-20 lies in the fact that the patent claim includes many more elements and is thus much more specific. Thus the invention of claim 1-20 of the patent is in effect a “species” of the “generic” invention of the application claim 1-20. It has been held that the generic invention is “anticipated” by the “species”. See In re Goodman, 29 USPQ2d 2010 (Fed. Cir. 1993). Since application claim 1-20 is anticipated by claim 1-20 the patent, it is not patentably distinct from claim 1-20 of the patent. Claim Rejections - 35 USC §101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-20, the claims are within at least one of the four categories of patent eligible subject matter as it is directing to a system/method/non-transitory computer readable media claims under Step 1. However, claim 1-3, 5-10, 12-17 and 19-20 are/is rejected under 35 USC 101 because the claims are/is directed to an abstract idea without being integrated into a practical application nor being significantly more. Per claims 1, 8 and 15, the limitations “selecting a pre-configured container image …”, as drafted, recite functions that, under its broadest reasonable interpretation, covers functions that could reasonably be performed in the mind, including with the aid of pen and paper, but for the recitation of generic computer components. That is, the limitation “selecting a pre-configured container image …” as drafted, are functions that, under its broadest reasonable interpretation, recite the abstract idea of a mental process. The limitations encompass a human mind carrying out the functions through observation, evaluation, judgment and /or opinion, or even with the aid of pen and paper. Thus, these limitations recite and fall within the “Mental Processes” grouping of abstract ideas under Prong 1 Step 2A. Under Prong 2 Step 2A, this judicial exception is not integrated into a practical application. The claim recites the following additional elements “one or more non-transitory computer readable media”, “one or more processors”, “providing on-demand resources”, “receiving a computing resource request …”, “provisioning a plurality or computing pods …”, “applying the selected pre-configured container image …” and “applying a computing pod …” “one or more non-transitory computer readable media”, and “one or more processors” are recited at a high-level of generality such that it amounts no more than mere instructions to apply the exception using a generic computer component, or merely a generic computer or generic computer components to perform the judicial exception. The addition element providing on-demand resources”, “receiving a computing resource request …”, and “provisioning a plurality or computing pods …” amount to a data gathering step and a mere generic transmission and presentation of collected and analyzed data which is considered to be insignificant extra solution activity (see MPEP 2106.05(g)). The additional limitations “applying the selected pre-configured container image …” and “applying a computing pod …” fails to meaningfully limit the claim because it does not require any particular application of the recited “applying” and is at best the equivalent of merely adding the words “apply it” to the judicial exception. Accordingly, the additional elements do not integrate the recited judicial exception into a practical application, and the claim is therefore directed to the judicial exception. See MPEP 2106.05(f). Under Step 2B, the claims do not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea as discussed above, the additional limitations “providing on-demand resources”, “receiving a computing resource request …”, “provisioning a plurality or computing pods …”, “applying the selected pre-configured container image …” and “applying a computing pod …” which do not amount to significantly more, thus, not an inventive concept, and the courts have identified gathering data, storing data, and outputting the result is well-understood, routine and conventional activity (Berkheimer v. HP, Inc., 881 F.3d 1360, 1368, 125 USPQ2d 1649, 1654 (Fed. Cir. 2018)), thus, cannot amount to an inventive concept.. Accordingly, the claim does not appear to be patent eligible under 35 USC 101. See MPEP 2106.05(d). Regarding claims 2, 9 and 16, under prong 2, the “wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above. Regarding claims 3, 10, and 17, under prong 2, the “wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above. Regarding claims 5, 12, and 19, the limitation “monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods”, and “determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds” is an additional metal process under prong 1. Under prong 2, the “provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above. Regarding claims 6, 13, and 20, the limitation “monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods”, and “determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time” is an additional metal process under prong 1. Under prong 2, the “deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above. Regarding claims 7, and 14, the limitation “monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods”, and “determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time” is an additional metal process under prong 1. Under prong 2, the “deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above. Allowable Subject Matter Claims 1-20 would be allowable if rewritten to overcome the rejection(s) under 101, set forth in this Office action. The following prior art made of record and not relied upon is cited to establish the level of skill in the applicant’s art and those arts considered reasonably pertinent to applicant’s disclosure. See MPEP 707.05(c). Prior arts: US 2021/0311762 to Shepheard Image service 218 is configured to download and extract container images to shared storage 170 such that the container images can be mounted by pod VMs 130. Image service 218 is also responsible for managing the storage available for container images within shared storage 170. This includes managing authentication with image registry 190, assuring providence of container images by verifying signatures, updating container images when necessary, and garbage collecting unused container images. US 2018/0341449 to Yoshimura The control unit 12 includes an image registration unit 121, a container association unit 122, a container-usage recording unit 123, an image transmission unit 124, an image changing unit 125, and an analysis unit 126. The container association unit 122 is an example of a reception unit. A container management table 131 is an example of a storage unit. The image transmission unit 124 and the image changing unit 125 are examples of a display unit. US 2020/0320189 to Zhang When publishing the container image to the container repository, the first computer may send an identifier of the container image to the container repository. After receiving the container image, the container repository stores the container image, and records a mapping relationship between the identifier of the container image and a storage address of the container image in the container repository. US 2021/0326658 to Swaroop this algorithm, the moving RSV that is slowing down in front of the container 130 records a video, which can include a sequence of images, which are pre-processed at 406K. In some implementations, the sequence of images can be a video stream. Training at 408K on sampled sequences of such images, with different resolutions, can enable better recognition of the type, depth and shape of objects in the image. US 2022/0114392 to Chen the target data 331 related to each target image 120 within each training image TI in the training image database 33 through the target-recording module 51. The target data 331 may include the target category and/or the target position of the target image in the container image. US 2023/0066058 to Yadav a register or store of a plurality of different pre-configured container images may be created. When an author creates a new guided project, the image configuration controller 128 may select an appropriate, corresponding container image to use in conjunction therewith. US 2024/0028382 to Tang when a container image is added into a secure container, the container image is mounted on an image directory of the secure container by means of a file system or a block device, and a path of an image directory of the container image is recorded. During aggregation, a path of a read-write layer of a first container is merged with the path of the image directory of the container image to obtain a path of a file system of the first container. The prior art of record does not disclose and/or fairly suggest at least claimed limitations recited in such manners in independent claim 1 "... selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system; applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; and applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods.” and similarly recited in such manners in other independent claims 8 and 15. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to Tuan Dao whose telephone number is (571) 270 3387. The examiner can normally be reached on Monday to Friday from 09am to 05pm. The examiner can also be reached on alternate Fridays. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Pierre Vital, can be reached at telephone number (571) 272 4215. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) Form at https://www.uspto.gov/patents/uspto-automated- interview-request-air-form. /TUAN C DAO/ Primary Examiner, Art Unit 2198
Read full office action

Prosecution Timeline

Jul 08, 2024
Application Filed
Mar 07, 2026
Non-Final Rejection — §101, §DP (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602257
ELECTRONIC DEVICE AND OPERATING METHOD WITH MODEL CO-LOCATION
2y 5m to grant Granted Apr 14, 2026
Patent 12566648
METHOD OF PROCESSING AGREEMENT TASK
2y 5m to grant Granted Mar 03, 2026
Patent 12566627
PREDICTING THE NEXT BEST COMPRESSOR IN A STREAM DATA PLATFORM
2y 5m to grant Granted Mar 03, 2026
Patent 12561173
METHOD FOR DATA PROCESSING AND APPARATUS, AND ELECTRONIC DEVICE
2y 5m to grant Granted Feb 24, 2026
Patent 12561591
CLASSIFICATION AND TRANSFORMATION OF SEQUENTIAL EVENT DATA
2y 5m to grant Granted Feb 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
82%
Grant Probability
98%
With Interview (+15.6%)
3y 1m
Median Time to Grant
Low
PTA Risk
Based on 782 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month