Prosecution Insights
Last updated: April 19, 2026
Application No. 18/791,554

Method and Apparatus for Automatically Switching Between Virtual Private Networks

Non-Final OA §103§112
Filed
Aug 01, 2024
Examiner
ZHAO, DON GORDON
Art Unit
2493
Tech Center
2400 — Computer Networks
Assignee
Charter Communications Operating LLC
OA Round
1 (Non-Final)
87%
Grant Probability
Favorable
1-2
OA Rounds
2y 5m
To Grant
99%
With Interview

Examiner Intelligence

Grants 87% — above average
87%
Career Allow Rate
674 granted / 774 resolved
+29.1% vs TC avg
Strong +17% interview lift
Without
With
+16.9%
Interview Lift
resolved cases with interview
Typical timeline
2y 5m
Avg Prosecution
21 currently pending
Career history
795
Total Applications
across all art units

Statute-Specific Performance

§101
11.0%
-29.0% vs TC avg
§103
41.0%
+1.0% vs TC avg
§102
4.5%
-35.5% vs TC avg
§112
27.8%
-12.2% vs TC avg
Black line = Tech Center average estimate • Based on career data from 774 resolved cases

Office Action

§103 §112
DETAILED ACTION Claims 1-20 are presented on 08/01/2024 for examination on merits. Claims 1, 9, and 17 are independent base claims. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Examiner's Instructions for filing Response to this Office Action When the Applicant submits amendments regarding to the claims in response the Office Action, the Examiner would appreciate Applicant if a clean copy of the claims is provided to facilitate the prosecution which otherwise requires extra time for editing the marked-up claims from OCR. Please submit two sets of claims: Set #1 as in a typical filing which includes indicators for the status of claim and all marked amendments to the claims; and Set #2 as an appendix to the Arguments/Remarks for a clean version of the claims which has all the markups removed for entry by the Examiner. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (B) CONCLUSION—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 1-20 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor, or for pre-AIA the applicant regards as the invention. The rejection(s) under 35 U.S.C. 112(b) is/are determined by the following reasons: Claims 1, 9, and 17 each recite a limitation “automatically disconnecting … a first virtual private network type when the connectable entity status indicates an active connectable entity” unclearly, because a network type cannot be disconnected. The meaning and scope of limitation is unclear. It appears that it is reasonable to specify: automatically disconnecting [the user device] from a first virtual private network [based on] a first virtual private network type. Clarification is required. Claim 7 recites “the automatically disconnecting, by the switching application, a first virtual private network type” unclearly for the aforementioned reason. Claim 20 also recites “the automatically disconnecting, by the switching application, a first virtual private network type” unclearly for the aforementioned reason. Claims 2-8, 10-16, and 18-20 are also rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, because they depend from the rejected base claims 1, 9, and 17, respectively. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. Claims 1-5, 8-13, and 16-20 are rejected under 35 U.S.C. 103 as being unpatentable over Cole (US 7978691 B1) in view of Hill (US 20180014340 A1). As per claim 1, Cole teaches a method for virtual private network switching, the method comprising: receiving, by a switching application, a selection of a virtual private network type for each designated connectable entity in the switching application (Cole, col. 5, lines 3-41: a network connectivity manager 156 [receives] and manage the connectivity 200 of a mobile device 202 to a plurality of wireless networks 210, 216… comprising connectivity policies 160, network location and connectivity information 170, and user credentials 162. Note that the network type selection includes predetermined type of wireless network, e.g., IEEE 802.11 WLAN, EDGE WWAN, etc.); automatically obtaining, by the switching application, connectable entity status for a user device (Cole, col. 5, lines 23-49: Network connectivity manager 156 monitors the operational status of each wireless modem to determine which type of network connectivity is available…for an optimal connection); automatically disconnecting [the user device], by the switching application, [based on] a first virtual private network type when the connectable entity status indicates an active connectable entity which is listed in the switching application, [the active connectable entity associated with a second virtual private network type] (Cole, col. 9, lines 10-31: If it is determined that connectivity to the LAN 340 does not comply with predetermined connectivity policies, then the network connectivity manager 156 discontinues connectivity efforts; col. 11, lines 1-23: network connectivity that fails to comply with the current network connectivity policy is automatically discontinued and the network connection is dropped.); and automatically establishing a virtual private network connection for the active connectable entity with the second virtual private network type upon acceptance of credentials provided by the switching application (Cole, col. 2, lines 44-54 and col. 11, lines 53-63: a second predetermined subset of the network connectivity management information is then used by the network connectivity manager to discover the presence of a second network, the network connectivity manager then manages the transfer of the mobile device's connectivity from the first network to the second network; col. 3, lines 50-53: transfer of connectivity from the first network to the second network is dependent upon successful submission and acceptance of predetermined user credentials and each network's compliance with predetermined connectivity policies. see also col. 12, lines 3-25). However, Cole’s technique of automatically disconnecting from a first virtual private network does not determine whether the active connectable entity associated with a second virtual private network type. This aspect of the claim is identified as a difference. In a related art, Hill teaches: automatically disconnecting the first virtual private network when the connectable entity status indicates the active connectable entity associated with a second virtual private network type (Hill, par. 0075: the UE 402 terminates one or more VPN tunnels that were used by the UE 402 to access one or more network associated with another communication system; the one or more VPN tunnels are terminated automatically or without action from the UE 402; see also par. 0118 for examples). Cole and Hill are analogous art, because they are in a similar field of endeavor in improving network accesses over virtual private network (VPN) tunnels. Thus, it would have been obvious to one of ordinary in the art, before the effective filing date of the claimed invention, to modify Cole’s system with Hill’s teaching on network rollover techniques which enables automatically disconnecting the first virtual private network and switching to a VPN tunnel that is associated with. For this combination, the motivation would have been to improve the level of security with auto-disconnection of old/previous networks. As per claim 2, the references as combined above teach the method of claim 1, wherein the automatically establishing further comprising: automatically requesting, by the switching application, to open a virtual private network client associated with the second virtual private network type (Cole, col. 9, lines 55-65: the network connectivity manager 156 uses connectivity policies 160, user credentials 162, and location and connectivity information 170 to perform VPN; col. 2, lines 10-19: the user [requests] to manually enter network connectivity information; automatically update a master location database); and automatically providing, by the switching application, credentials associated with the virtual private network client (Cole, col. 9, lines 61-67 and col. 10, lines 1-14: the network connectivity manager 156 using connectivity policies 160 automatically provides user credentials 162 stored in user credential repository 314). As per claim 3, the references as combined above teach the method of claim 1, wherein the automatically establishing further comprising: automatically sending, by the switching application to a task manager, a request to open a virtual private network client associated with the second virtual private network type (Cole, col. 9, lines 14-31: the network connectivity manager 156 [captures] location information and corresponding network connectivity information, i.e., the network type information, request to open a network connection with, predetermined network location and connectivity information automatically; col. 12, lines 58-67); and automatically sending, by the switching application to the task manager, credentials associated with the virtual private network client (Cole, col. 9, lines 61-67 and col. 10, lines 1-14: the network connectivity manager 156 using connectivity policies 160 automatically provides user credentials 162 stored in user credential repository 314). As per claim 4, the references as combined above teach the method of claim 1, wherein the receiving further comprising: receiving, by the switching application, credentials for each virtual private network type for each designated connectable entity (Cole, col. 5, lines 32-41: the appropriate user credentials 162 [retrieved by] the network connectivity manager 156; col. 2, lines 44-54: the network connectivity manager uses a first predetermined subset of the network connectivity management information to discover the presence of a first network, the references as combined above teach the network connectivity manager then manages the transfer of the mobile device's connectivity from the first network to the second network; see the Abstract: a network connectivity manager accesses a repository of predetermined network connectivity management information stored on a network host). As per claim 5, the references as combined above teach the method of claim 1, further comprising: automatically disconnecting, by the switching application, a connected virtual private network type when the connectable entity status for an associated connectable entity is inactive (Cole, col. 13, lines 60-64: Otherwise – meaning the associated connectable entity is inactive, it is determined in step 462 whether to discontinue network connectivity management. If it is…, network connectivity management is discontinued in step 494. See FIG. 4d, steps 462 ad 494). As per claim 8, the references as combined above teach the method of claim 1, wherein the selection is received from a user (Cole, FIG. 4b, Steps 424 and 426: in step 424 it is to determine whether to manually select the wireless network connectivity option - the user manually enter network connectivity information and is responsible to manually connect to WWAN 216; col. 6, lines 1-4 and col. 7, lines 14-29). Regarding base claims 9 and 17, they are similar to claim 1 in terms of recited features, and thus, are rejected for the same reasons as discussed in claim 1 above. Regarding claims 10-13 and 16, they are similar to claims 2-5 and 8 in terms of respective features thereof, and thus are rejected for the same reasons. Regarding claims 18-20, they are similar to claims 2, 4, and 6 in terms of respective features thereof, and thus are rejected for the same reasons. Claims 6-7 and 14-15 are rejected under 35 U.S.C. 103 as being unpatentable over Cole and Hill, as applied to claim 1, and further in view of Oakley (US 20220400100 A1). As per claim 6, the references of Cole and Hill as combined above teach the method of claim 5, but do not explicitly disclose the automatically disconnecting a connected virtual private network comprising automatically closing the associated connectable entity. This aspect of the claim is identified as a further difference. In a related art, Oakley teaches: wherein the automatically disconnecting, by the switching application, a connected virtual private network type when the connectable entity status for an associated connectable entity is inactive further comprising: automatically closing, by the switching application, the associated connectable entity (Oakley, par. 0069 and 0080: automatically stop or terminate the VPN tunnel and/or the VPN application… when the UI transitions from the foreground 825 to the background 830 or after the user has locked his/her device or the device has been put to sleep). Oakley is analogous art in a similar field of endeavor in improving network accesses over virtual private network (VPN) tunnels or reasonably pertinent to the problem faced by the inventor, which may be in a different field. Thus, it would have been obvious to one of ordinary in the art, before the effective filing date of the claimed invention, to modify the Cole-Hill system with Oakley’s teaching on automatically the associated connectable entity. For this combination, the motivation would have been to improve the level of security with automated disconnection of old/previous VPN tunnels. As per claim 7, the references as combined above teach the method of claim 1, but do not explicitly disclose the automatically disconnecting a first virtual private network type further comprising automatically closing, by the switching application, a connectable entity associated with the first virtual private network type. This aspect of the claim is identified as a further difference. In a related art, Oakley teaches: wherein the automatically disconnecting, by the switching application, a first virtual private network type further comprising: automatically closing, by the switching application, a connectable entity associated with the first virtual private network type (Oakley, par. 0021 and 0069: automatically stop or terminate the VPN tunnel and/or the VPN application… when the UI transitions from the foreground 825 to the background 830 or after the user has locked his/her device or the device has been put to sleep; par. 0080-0083: causing the VPN application to terminate the VPN tunnel at some point in time … as a result of a determination that the MAM-controlled application has been closed). Oakley is analogous art in a similar field of endeavor in improving network accesses over virtual private network (VPN) tunnels or reasonably pertinent to the problem faced by the inventor, which may be in a different field. Thus, it would have been obvious to one of ordinary in the art, before the effective filing date of the claimed invention, to modify the Cole-Hill system with Oakley’s teaching on automatically the associated connectable entity. For this combination, the motivation would have been to improve the level of security with automated disconnection of old/previous VPN tunnels. Regarding claims 14-15, the claims are similar to claims 6 and 7, respectively, and as such, claims 14-15 are rejected using a similar rationale aforementioned in claims 6 and 7. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure as the prior art additionally discloses certain parts of the claim features (See “PTO-892 Notice of Reference Cited”). Any inquiry concerning this communication or earlier communications from the examiner should be directed to DON ZHAO whose telephone number is (571)272.9953. The examiner can normally be reached on Monday to Friday, 7:30 A.M to 5:00 P.M EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Carl G Colin can be reached on 571.272.3862. The fax phone number for the organization where this application or proceeding is assigned is 571.273.8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866.217.9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800.786.9199 (IN USA OR CANADA) or 571.272.1000. /Don G Zhao/Primary Examiner, Art Unit 2493 01/15/2026
Read full office action

Prosecution Timeline

Aug 01, 2024
Application Filed
Jan 16, 2026
Non-Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603879
PROGRESSIVELY INCREASING A LOGIN INFORMATION LENGTH
2y 5m to grant Granted Apr 14, 2026
Patent 12598209
DEVICE VULNERABILITY RISK ASSESSMENT SYSTEM
2y 5m to grant Granted Apr 07, 2026
Patent 12596801
METHOD AND APPARATUS FOR DETECTING COMMAND CONTROL SERVER OF MALICIOUS APPLICATION
2y 5m to grant Granted Apr 07, 2026
Patent 12596802
MALWARE DETECTION TECHNIQUES
2y 5m to grant Granted Apr 07, 2026
Patent 12585735
SYSTEMS AND METHODS FOR GENERATING AND DISTRIBUTING NFTs BASED ON USER INTERACTION
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
87%
Grant Probability
99%
With Interview (+16.9%)
2y 5m
Median Time to Grant
Low
PTA Risk
Based on 774 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month