DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
EXAMINER’S COMMENT
Regarding the claimed invention, the independent claims recite “in response to a first indication that a first consumer is trustworthy, provide a first data set of the processed sensor data to the first consumer” and “and in response to a second indication that a second consumer is untrustworthy, negotiate one or more conditions in which the second consumer is permitted to receive a second data set of the processed sensor data” such as in Claim 1. This suggests a concept of asymmetry in which trusted consumers, i.e. the first consumer, receive sensor data while untrusted consumers, i.e. the second consumer, require further negotiation of conditions to receive the sensor data. It is noted by the Examiner however that the scope of the claims encompasses this negotiation also being performed with trusted consumers; i.e. while this negotiation is required of untrusted consumers, this negotiation can be enforced on all consumers equally and still read on the claims under the broadest reasonable interpretation.
Claim Rejections - 35 USC § 112
The following is a quotation of 35 U.S.C. 112(b):
(b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.
The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph:
The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention.
Claim 19 is rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention.
Claim 19 recites the limitation "and restrict the secure pipeline from accessing memory addresses outside of the set" in line 6 of Claim 19. There is insufficient antecedent basis for this limitation in the claim, regarding the recitation of the limitation “the set”. While Claim 19 previously recites “set of memory addresses designated as being accessible to the secure pipeline” beforehand, Claim 19 depends upon Claim 18 which recites multiple sets including “a first data set”, “a second data set”, and “a set of security criteria”. Therefore, a recitation of merely “the set” is ambiguous as to what set is being referred to, rendering the claim indefinite. It is recommended by the Examiner to amend the limitation to read as “the set of memory addresses designated as being accessible to the secure pipeline” instead for clarity.
Claim Rejections - 35 USC § 103
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
Claims 1-3, 5-6, 12, 16, 18 is/are rejected under 35 U.S.C. 103 as being unpatentable over Dewan et al. (U.S. Pub. No. 2017/0180386 A1) hereinafter referred to as “Dewan”, and further in view of Wade et al. (U.S. Pub. No. 2023/0367908 A1) hereinafter referred to as “Wade”.
Regarding Claim 1:
Dewan teaches the following limitations:
A computing device, comprising: a sensor; and sensor processor circuitry coupled to the sensor and configured to: process sensor data received from a sensor of the computing device (Fig. 2, Par. [0002], Par. [0016], Par. [0019], Par. [0023], Par. [0024], Par. [0025], Par. [0039]). Dewan teaches collecting and processing sensor data using a sensor hub/microcontroller trusted execution environment (TEE).
in response to a first indication that a first consumer is trustworthy [trusted agent], provide a first data set of the processed sensor data to the first consumer (Fig. 2, Par. [0023]-[0028], Par. [0033], Par. [0034], Par. [0036], Par. [0039]). Dewan teaches securely providing sensor data to trusted agents/applications in other TEEs, such as a host TEE in the same system.
(taught by Wade below)
Wade teaches the following limitations:
and in response to a second indication that a second consumer is untrustworthy [non-trusted application], negotiate one or more conditions in which the second consumer is permitted to receive a second data set of the processed sensor data [user-defined permissions] (Par. [0036], Par. [0068]-[0071]). Wade teaches sharing sensor data with untrusted applications while maintaining privacy by allowing users to define permissions of what they desire to share with the application, i.e. negotiate conditions.
Dewan teaches a system providing sensor data to applications within a trusted execution environment. Dewan also makes mention of providing sensor data to applications in unsecure areas (Par. [0020], Par. [0022], Par. [0030]), but does not teach negotiating conditions for how these applications are permitted to receive the sensor data. Wade however teaches that privacy concerns associated with sharing sensor data with untrusted applications can be mitigated by allowing users to define permissions of what they share, i.e. negotiate conditions (Par. [0001], Par. [0007]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan with the data sharing of Wade in order to gain the benefit of improved user privacy. One of ordinary skill in the art would have recognized that such permission-based data sharing of Wade is compatible with the system of Dewan, as both teach sharing data with untrusted applications, with Wade further noting that users themselves may desire to share this data with these non-trusted applications (Wade, Par. [0002]). Therefore, by combining the system of Dewan with the permission-based data sharing of Wade, this gains the benefit of data sharing with untrusted applications while respecting user privacy.
Regarding Claim 2:
Dewan teaches the following limitations:
wherein the first indication identifies the first consumer as residing in a secure environment in which a set of security criteria is enforced for the first data set (Fig. 2, Par. [0023]-[0029], Par. [0033], Par. [0034], Par. [0036], Par. [0039]). Dewan teaches securely providing sensor data to trusted agents, and this includes authentication, i.e. enforced security criteria.
(Par. [0020], Par. [0022], Par. [0030]). Dewan teaches untrusted applications as residing outside the secure environment.
Wade teaches the following limitations:
and wherein the second indication identifies the second consumer (Par. [0036], Par. [0068]-[0071]). Wade teaches the untrusted application requesting access to the sensor data, and this can be considered an indication of the consumer residing outside the secure environment, as Wade was combined with Dewan in such a manner that the permissions-based sharing of Wade modified the separate communication channel of Dewan with regards to sensor data and untrusted applications.
The reasons for motivation/combination of references remain the same as in Claim 1 above.
Regarding Claim 3:
Dewan teaches the following limitations:
further comprising: one or more processors; and memory having program instructions stored therein that are executable by one or more processors to: implement a secure execution environment of the secure environment, wherein the first consumer is a first process executing within the secure execution environment (Fig. 2, Par. [0023]-[0028], Par. [0033], Par. [0034], Par. [0036], Par. [0039]). Dewan teaches the trusted agents belonging to and executing within TEEs.
and wherein the second consumer is a second process executing external to the secure execution environment (Par. [0020], Par. [0022], Par. [0030]). Dewan teaches untrusted applications operating outside of a TEE.
Regarding Claim 5:
Dewan teaches the following limitations:
wherein the sensor processor circuitry is an image signal processor configured to process sensor data received from a camera (Par. [0015], Par. [0046], Par. [0061]). Dewan teaches the sensor data being received from a camera.
Regarding Claim 6:
Dewan teaches the following limitations:
wherein the sensor processor circuitry is an audio processor configured to process sensor data received from a microphone (Par. [0015], Par. [0046], Par. [0062]). Dewan teaches the sensor data being received from a microphone.
Regarding Claim 12:
Dewan teaches the following limitations:
wherein the sensor processor circuitry includes: a secure pipeline configured to: process sensor data to produce the first data set for the first consumer (Fig. 2, Par. [0023]-[0028], Par. [0033], Par. [0034], Par. [0036], Par. [0039]). Dewan teaches a secure pathway of data for providing sensor data to trusted agents.
and an unsecure pipeline configured to: process sensor data to produce the second data set for the second consumer (Fig. 2, Par. [0020], Par. [0022], Par. [0030]). Dewan teaches a non-secure pathway of data for providing sensor data to untrusted applications, and this pathway is different from the secure pathway.
Regarding Claim 16:
Dewan teaches the following limitations:
A method, comprising: processing, by sensor processor circuitry of a computing device, sensor data received from a sensor of the computing device (Fig. 2, Par. [0002], Par. [0016], Par. [0019], Par. [0023], Par. [0024], Par. [0025], Par. [0039]).
in response to a first indication that a first consumer resides in a secure environment, the sensor processor circuitry providing a first data set of the processed sensor data to the first consumer (Fig. 2, Par. [0023]-[0028], Par. [0033], Par. [0034], Par. [0036], Par. [0039]).
(taught by Wade below)
Wade teaches the following limitations:
and in response to a second indication that a second consumer resides outside of the secure environment, the sensor processor circuitry negotiating one or more conditions in which the second consumer is permitted to receive a second data set of the processed sensor data (Par. [0036], Par. [0068]-[0071]).
Dewan teaches a system providing sensor data to applications within a trusted execution environment. Dewan also makes mention of providing sensor data to applications in unsecure areas (Par. [0020], Par. [0022], Par. [0030]), but does not teach negotiating conditions for how these applications are permitted to receive the sensor data. Wade however teaches that privacy concerns associated with sharing sensor data with untrusted applications can be mitigated by allowing users to define permissions of what they share, i.e. negotiate conditions (Par. [0001], Par. [0007]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan with the data sharing of Wade in order to gain the benefit of improved user privacy. One of ordinary skill in the art would have recognized that such permission-based data sharing of Wade is compatible with the system of Dewan, as both teach sharing data with untrusted applications, with Wade further noting that users themselves may desire to share this data with these non-trusted applications (Wade, Par. [0002]). Therefore, by combining the system of Dewan with the permission-based data sharing of Wade, this gains the benefit of data sharing with untrusted applications while respecting user privacy.
Regarding Claim 18:
Dewan teaches the following limitations:
An integrated circuit, comprising: one or more processors configured to: co-execute trusted processes and untrusted processes in an isolated manner that includes enforcing a set of security criteria (Fig. 2, Par. [0002], Par. [0016], Par. [0019], Par. [0023], Par. [0024], Par. [0025], Par. [0039], Par. [0065]). Dewan teaches the system being a system on a chip, i.e. an integrated circuit.
and sensor processor circuitry configured to: process sensor data received from a sensor (Fig. 2, Par. [0002], Par. [0016], Par. [0019], Par. [0023], Par. [0024], Par. [0025], Par. [0039]).
in response to a first indication that a first process is one of the trusted processes, provide a first data set of the processed sensor data to the first process (Fig. 2, Par. [0023]-[0028], Par. [0033], Par. [0034], Par. [0036], Par. [0039]).
(taught by Wade below)
Wade teaches the following limitations:
and in response to a second indication that a second process is one of the untrusted processes, restrict, based on one or more of the set of security criteria, access of the second process to a second data set of the processed sensor data (Par. [0036], Par. [0068]-[0071]).
Dewan teaches a system providing sensor data to applications within a trusted execution environment. Dewan also makes mention of providing sensor data to applications in unsecure areas (Par. [0020], Par. [0022], Par. [0030]), but does not teach negotiating conditions for how these applications are permitted to receive the sensor data. Wade however teaches that privacy concerns associated with sharing sensor data with untrusted applications can be mitigated by allowing users to define permissions of what they share, i.e. negotiate conditions (Par. [0001], Par. [0007]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan with the data sharing of Wade in order to gain the benefit of improved user privacy. One of ordinary skill in the art would have recognized that such permission-based data sharing of Wade is compatible with the system of Dewan, as both teach sharing data with untrusted applications, with Wade further noting that users themselves may desire to share this data with these non-trusted applications (Wade, Par. [0002]). Therefore, by combining the system of Dewan with the permission-based data sharing of Wade, this gains the benefit of data sharing with untrusted applications while respecting user privacy.
Claims 4 is rejected under 35 U.S.C. 103 as being unpatentable over Dewan/Wade as applied to Claim 2 above, and further in view of Volos et al. (U.S. Pub. No. 2020/0125772 A1) hereinafter referred to as “Volos”.
Regarding Claim 4:
Volos teaches the following limitations:
wherein the sensor processor circuitry includes: one or more configuration registers configured to: store configuration information controlling operation of the sensor [sensitive data] (Par. [0048], Par. [0049], Par. [0067], Par. [0123]). Volos teaches that a trusted execution environment can have registers storing sensitive data in which external access can be restricted. In combination with the system of Dewan/Wade teaching trusted execution environments which store sensitive sensor data, this teaches the claimed limitation.
wherein the one or more configuration registers are addressable only by entities within the secure environment [secure mode] (Par. [0048], Par. [0049], Par. [0067], Par. [0123]).
Dewan/Wade teaches a system providing sensor data within a trusted execution environment, but does not teach registers with restricted access. Volos however teaches that a trusted execution environment can have registers in which external access is restricted in a secure mode, thereby improving security. (Par. [0048]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the registers of Volos in order to gain the benefit of additional security. One of ordinary skill in the art would have recognized that the registers of Volos are compatible with the system of Dewan/Wade, as both are directed towards trusted execution environments, and that such restricted registers would provide additional security by preventing external entities from accessing sensitive data/functionality.
Claims 7, 17 are rejected under 35 U.S.C. 103 as being unpatentable over Dewan/Wade as applied to Claims 1 and 16 above respectively, and further in view of Pundak et al. (U.S. Pub. No. 2025/0124893 A1) hereinafter referred to as “Pundak”.
Regarding Claim 7:
Pundak teaches the following limitations:
wherein the sensor processor circuitry is configured to: provide an indication that the sensor is active (Par. [0032], Par. [0063]). Pundak teaches that an indicator light can be illuminated to indicate a sensor is active for privacy concerns.
wherein the one or more conditions include the sensor processor circuitry receiving confirmation that a user is being notified that the sensor is active (Par. [0032], Par. [0063]).
Dewan/Wade teaches a system providing sensor data, in particular Wade is directed towards privacy concerns with sharing sensor data and requiring permissions/conditions for sensor usage. Dewan/Wade however does not teach notifying a sensor being active. Pundak however teaches that this active sensor notification, such as through an indicator light, is a method for mitigating privacy concerns with regards to sensor usage. (Par. [0032], Par. [0063]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the indicator light of Pundak in order to gain the benefit of additional privacy. One of ordinary skill in the art would have recognized that the indicator light of Pundak is compatible with the system of Dewan/Wade, as both are directed towards privacy concerns regarding sensors, and that additionally requiring such an indicator light would provide additional security/privacy by alerting the user of sensor usage.
Regarding Claim 17:
Pundak teaches the following limitations:
wherein the negotiated one or more conditions includes a condition that a user is notified about the sensor’s use (Par. [0032], Par. [0063]).
Dewan/Wade teaches a system providing sensor data, in particular Wade is directed towards privacy concerns with sharing sensor data and negotiating permissions/conditions for sensor usage. Dewan/Wade however does not teach notifying a sensor being active. Pundak however teaches that this active sensor notification, such as through an indicator light, is a method for mitigating privacy concerns with regards to sensor usage. (Par. [0032], Par. [0063]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the indicator light of Pundak in order to gain the benefit of additional privacy. One of ordinary skill in the art would have recognized that the indicator light of Pundak is compatible with the system of Dewan/Wade, as both are directed towards privacy concerns regarding sensors, and that using such an indicator light would provide additional security/privacy by alerting the user of sensor usage.
Claim 8 is rejected under 35 U.S.C. 103 as being unpatentable over Dewan/Wade/Pundak as applied to Claim 7 above, and further in view of Ugale et al. (U.S. Pub. No. 2022/0261475 A1) hereinafter referred to as “Ugale”.
Regarding Claim 8:
Ugale teaches the following limitations:
further comprising: display pipeline circuitry configured to: in response to the provided indication, insert pixel data in a frame being presented on a display [visual icon] to notify the user is being notified that the sensor is active (Par. [0037], Par. [0060]). Ugale teaches that an active sensor notification can alternatively comprise displaying an icon on a visual user interface.
Dewan/Wade/Pundak teaches a system providing sensor data with an indicator of active sensor usage, but do teach this being pixel data in a display. Ugale however teaches that this active sensor notification can alternatively be implemented using a visual icon on a display screen. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to substitute the active sensor notification of Dewan/Wade/Pundak with the visual icon of Ugale in order to gain the predictable result of the provided indication being pixel data in a display. One of ordinary skill in the art would have recognized that the visual icon of Ugale and the indicator light of Dewan/Wade/Pundak are alternative substitutes of providing an active sensor notification, and that using such a visual icon instead would gain the predictable result of the active sensor notification being done through pixel data on a display.
Claims 9-11 are rejected under 35 U.S.C. 103 as being unpatentable over Dewan/Wade as applied to Claim 1 above, and further in view of Vedula et al. (U.S. Pub. No. 2022/0094833 A1) hereinafter referred to as “Vedula”.
Regarding Claim 9:
Vedula teaches the following limitations:
wherein the sensor processor circuitry is configured to: in response to determining to provide the second data set to the second consumer: periodically receive a heartbeat signal indicating that the one or more conditions have been satisfied (Par. [0024]-[0027], Par. [0041]-[0043], Par. [0047]-[0050]). Vedula teaches that an indicator light combined with a light sensor can be used as an anti-tampering privacy measure, in which the amount of light is periodically collected and verified as being above a certain threshold. This can be considered a type of heartbeat signal in the sense under the broadest reasonable interpretation.
and discontinue providing the second data set in response to determining that the heartbeat signal is no longer being received (Par. [0024]-[0027], Par. [0041]-[0043], Par. [0047]-[0050]). Vedula teaches that blocking this light sensor results in disabling the camera, i.e. discontinuing sensor data.
Dewan/Wade teaches a system providing sensor data, in particular Wade is directed towards privacy concerns with sharing sensor data and requiring permissions/conditions for sensor usage. Dewan/Wade however does not teach a heartbeat signal. Vedula however teaches that a light sensor can provide a heartbeat signal in the form of measuring the light amount, and is a method for mitigating privacy concerns with regards to sensor usage and tampering with an indicator light. (Par. [0016], Par. [0022]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the indicator light/light sensor of Vedula in order to gain the benefit of additional privacy. One of ordinary skill in the art would have recognized that the indicator light and light sensor of Vedula is compatible with the system of Dewan/Wade, as both are directed towards privacy concerns regarding sensors, and that additionally requiring such an indicator light/light sensor would provide additional security/privacy by alerting the user of sensor usage through the indicator light while detecting tampering through the light sensor.
Regarding Claim 10:
Vedula teaches the following limitation:
wherein the sensor processor circuitry includes: a switch configured to: in response to the one or more conditions being violated, interrupt a data path through which the second data set is being provided to the second consumer (Par. [0041]-[0043], Par. [0048]). Vedula teaches switching/powering off a camera from transmitting sensor data in response to a light sensor being tampered with, i.e. a violation of conditions. This is an interruption of a data path under the broadest reasonable interpretation.
Dewan/Wade teaches a system providing sensor data, in particular Wade is directed towards privacy concerns with sharing sensor data and requiring permissions/conditions for sensor usage. Dewan/Wade do not explicitly teach a switch upon detecting conditions being violated. Vedula however teaches that an indicator light/light sensor can be used to mitigate privacy concerns by alerting the user of sensor usage while detecting tampering (Par. [0016], Par. [0022]), and blocking this light sensor invokes a switch for disabling sensor data collection. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the system of Vedula in order to gain the benefit of additional privacy. One of ordinary skill in the art would have recognized that the system of Vedula is compatible with the system of Dewan/Wade, as both are directed towards privacy concerns regarding sensors, and that additionally requiring such an indicator light/light sensor would provide additional security/privacy by alerting the user of sensor usage through the indicator light and preventing undesired sensor usage upon detection of tampering by using a switch.
Regarding Claim 11:
Vedula teaches the following limitations:
wherein the sensor processor circuitry is configured to: power gate the sensor in response to determining that the one or more conditions have been violated (Par. [0042], Par. [0043], Par. [0048]). Vedula teaches switching/powering off a camera from transmitting sensor data in response to a light sensor being tampered with, i.e. a violation of conditions.
Dewan/Wade teaches a system providing sensor data, in particular Wade is directed towards privacy concerns with sharing sensor data and requiring permissions/conditions for sensor usage. Dewan/Wade do not explicitly teach a power gate/switch upon detecting conditions being violated. Vedula however teaches that an indicator light/light sensor can be used to mitigate privacy concerns by alerting the user of sensor usage while detecting tampering (Par. [0016], Par. [0022]), and blocking this light sensor invokes a switch for disabling sensor data collection by preventing the sensor from receiving power. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the system of Vedula in order to gain the benefit of additional privacy. One of ordinary skill in the art would have recognized that the system of Vedula is compatible with the system of Dewan/Wade, as both are directed towards privacy concerns regarding sensors, and that additionally requiring such an indicator light/light sensor would provide additional security/privacy by alerting the user of sensor usage through the indicator light and preventing undesired sensor usage upon detection of tampering by using a switch/power gate.
Claims 13-14 are rejected under 35 U.S.C. 103 as being unpatentable over Dewan/Wade as applied to Claim 12 above, and further in view of Rhelimi et al. (U.S. Pub. No. 2018/0097781 A1) hereinafter referred to as “Rhelimi”.
Regarding Claim 13:
Rhelimi teaches the following limitations:
wherein the sensor processor circuitry includes: an input-output memory management unit (IOMMU) configured to: store a first set of memory addresses designated as being accessible to the secure pipeline and a second set of memory addresses designated as being accessible to the unsecure pipeline (Par. [0027], Par. [0029], Par. [0031]). Rhelimi teaches a memory management unit (MMU) which assigns address ranges to a non-secure area and a secure area.
and restrict the secure pipeline from accessing memory addresses outside of the first set and the unsecure pipeline from accessing memory addresses outside of the second set (Par. [0027], Par. [0029], Par. [0031]). Rhelimi further teaches the MMU checking permissions for access to the associated ranges. In combination with the environment isolation of Dewan/Wade, this teaches the claimed limitation.
Dewan/Wade teaches a system providing sensor data within a trusted execution environment, but does not teach a memory management unit. Rhelimi however teaches that the isolation between a non-secure and secure area can have a memory management unit which acts as a memory protection unit to enforce isolation, thereby improving security (Par. [0029], Par. [0031]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the memory management unit in order to gain the benefit of additional security. One of ordinary skill in the art would have recognized that the memory management unit of Rhelimi is compatible with the system of Dewan/Wade, as both are directed towards isolating non-secure and secure environments, and that such a memory management unit would provide additional security by checking permissions for protected memory ranges.
Regarding Claim 14:
Rhelimi teaches the following limitation:
wherein the memory addresses are stored as virtual to physical address translations (Par. [0027], Par. [0029], Par. [0030], Par. [0031]). Rhelimi further teaches translating virtual to physical addresses.
The reasons for motivation/combination of references remain the same as in Claim 13.
Claim 15 is rejected under 35 U.S.C. 103 as being unpatentable over Dewan/Wade as applied to Claim 1 above, and further in view of Pedersen et al. (U.S. Pub. No. 2016/0321472 A1) hereinafter referred to as “Pedersen”.
Regarding Claim 15:
Pedersen teaches the following limitation:
wherein the sensor processor circuitry includes: a first direct memory access (DMA) engine configured to write the first data set to a portion of memory accessible to the first consumer (Par. [0008], Par. [0013]). Pedersen teaches that direct memory access controllers can be used to implement data communication to secure and non-secure memory regions. In the context of the data pathways of Dewan/Wade, this teaches a first and second direct memory access engine for the first and second consumer respectively.
and a second DMA engine configured to write the second data to another portion of memory accessible to the second consumer (Par. [0008], Par. [0013]).
Dewan/Wade teaches a system providing sensor data to a trusted execution environment and untrusted execution environment, but does not teach direct memory access engines. Pedersen however teaches that direct memory access (DMA) engines can be used to implement such data communication. (Par. [0013]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the direct memory access engines of Pedersen in order to gain the predictable result of using DMA engines to write to memory for the first and second consumers. One of ordinary skill in the art would have recognized that the DMA engines of Pedersen are compatible with the system of Dewan/Wade, as both are directed towards microcontroller systems, and that such DMA engines would have been a predictable implementation of the data pathways for delivering data to the first and second consumers.
Claim 19 is rejected under 35 U.S.C. 103 as being unpatentable over Dewan/Wade as applied to Claim 18 above, and further in view of Rhelimi.
Regarding Claim 19:
Dewan teaches the following limitation:
wherein the sensor processor circuitry includes: a secure pipeline configured to: process sensor data to produce the first data set for the first process (Fig. 2, Par. [0023]-[0028], Par. [0033], Par. [0034], Par. [0036], Par. [0039]).
(taught by Rhelimi below)
(taught by Rhelimi below)
Rhelimi teaches the following limitations:
and an input-output memory management unit (IOMMU) configured to: store a set of memory addresses designated as being accessible to the secure pipeline (Par. [0027], Par. [0029], Par. [0031]).
and restrict the secure pipeline from accessing memory addresses outside of the set (Par. [0027], Par. [0029], Par. [0031]).
Dewan/Wade teaches a system providing sensor data within a trusted execution environment, but does not teach a memory management unit. Rhelimi however teaches that the isolation between a non-secure and secure area can have a memory management unit which acts as a memory protection unit to enforce isolation, thereby improving security (Par. [0029], Par. [0031]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the memory management unit in order to gain the benefit of additional security. One of ordinary skill in the art would have recognized that the memory management unit of Rhelimi is compatible with the system of Dewan/Wade, as both are directed towards isolating non-secure and secure environments, and that such a memory management unit would provide additional security by checking permissions for protected memory ranges.
Claim 20 is rejected under 35 U.S.C. 103 as being unpatentable over Dewan/Wade as applied to Claim 18 above, and further in view of Pundak, and further in view of Ugale.
Regarding Claim 20:
Wade teaches the following limitations:
(taught by Pundak/Ugale below)
and wherein the sensor processor circuitry is configured to: based on (Par. [0036], Par. [0068]-[0071]). Wade was shown to teach satisfying permissions/rules to grant untrusted applications access to sensor data.
Pundak teaches the following limitations:
(Par. [0032], Par. [0063]). Pundak was previously shown to teach an indicator for a sensor being active to mitigate privacy concerns.
Dewan/Wade teaches a system providing sensor data, in particular Wade is directed towards privacy concerns with sharing sensor data and requiring permissions/conditions for sensor usage. Dewan/Wade however does not teach notifying a sensor being active. Pundak however teaches that this active sensor notification, such as through an indicator light, is a method for mitigating privacy concerns with regards to sensor usage. (Par. [0032], Par. [0063]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine the sensor data system of Dewan/Wade with the indicator light of Pundak in order to gain the benefit of additional privacy. One of ordinary skill in the art would have recognized that the indicator light of Pundak is compatible with the system of Dewan/Wade, as both are directed towards privacy concerns regarding sensors, and that additionally requiring such an indicator light would provide additional security/privacy by alerting the user of sensor usage.
Ugale teaches the following limitation:
further comprising: user interface pipeline circuitry configured to: insert, into an output provided to a user interface, an indicator that the sensor is active (Par. [0037], Par. [0060]). Ugale was shown to previously teach that an indicator of a sensor being active can alternatively be implemented using a visual icon on a display user interface.
Dewan/Wade/Pundak teaches a system providing sensor data with an indicator of active sensor usage, but do teach this being pixel data in a display. Ugale however teaches that this active sensor notification can alternatively be implemented using a visual icon on a display screen. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to substitute the active sensor notification of Dewan/Wade/Pundak with the visual icon of Ugale in order to gain the predictable result of the provided indication being pixel data in a display. One of ordinary skill in the art would have recognized that the visual icon of Ugale and the indicator light of Dewan/Wade/Pundak are alternative substitutes of providing an active sensor notification, and that using such a visual icon instead would gain the predictable result of the active sensor notification being done through pixel data on a display.
Related Art
The following prior art made of record and cited on PTO-892, but not relied upon, is considered pertinent to applicant’s disclosure:
Madar III et al. (U.S. Pub. No. 2022/0335945 A1) – Includes methods regarding sensor privacy
Martel et al. (U.S. Pub. No. 2018/0349649 A1) – Includes methods regarding disabling sensors
Chapier et al. (U.S. Pub. No. 2015/0032976 A1) – Includes methods regarding memory management
Weaver (U.S. Pub. No. 2020/0020493 A1) – Includes methods regarding a sensor kill switch
Yu et al. (U.S. Pub. No. 2023/0024628 A1) – Includes methods regarding notifying a user of sensor usage with different permission areas
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to ETHAN V VO whose telephone number is (571)272-2505. The examiner can normally be reached M-F 8am-5pm.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Lynn Feild can be reached on (571)272-2092. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/E.V.V./Examiner, Art Unit 2431 /LYNN D FEILD/Supervisory Patent Examiner, Art Unit 2431