Prosecution Insights
Last updated: April 19, 2026
Application No. 18/810,668

VEHICLE CONTROL SYSTEM, ACCESS CONTROL DEVICE, AND ACCESS CONTROL METHOD

Non-Final OA §102
Filed
Aug 21, 2024
Examiner
HOFFMAN, BRANDON S
Art Unit
2433
Tech Center
2400 — Computer Networks
Assignee
DENSO CORPORATION
OA Round
1 (Non-Final)
91%
Grant Probability
Favorable
1-2
OA Rounds
2y 9m
To Grant
97%
With Interview

Examiner Intelligence

Grants 91% — above average
91%
Career Allow Rate
1125 granted / 1238 resolved
+32.9% vs TC avg
Moderate +6% lift
Without
With
+6.3%
Interview Lift
resolved cases with interview
Typical timeline
2y 9m
Avg Prosecution
31 currently pending
Career history
1269
Total Applications
across all art units

Statute-Specific Performance

§101
7.7%
-32.3% vs TC avg
§103
34.7%
-5.3% vs TC avg
§102
33.8%
-6.2% vs TC avg
§112
5.2%
-34.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 1238 resolved cases

Office Action

§102
herNotice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION Claims 1-9 are pending in this office action. Priority Acknowledgment is made of applicant’s claim for foreign priority under 35 U.S.C. 119 (a)-(d). Receipt is acknowledged of certified copies of papers required by 37 CFR 1.55. Information Disclosure Statement The information disclosure statement (IDS) submitted on August 21, 2024, is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner. Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. Claims 1-9 are rejected under 35 U.S.C. 102(a)(1) as being anticipated by Zhang et al. (U.S. Patent Pub. No. 2020/0211301). Regarding claims 1 and 8, Zhang et al. teaches a vehicle control system comprising a plurality of electronic control units that are mounted in a vehicle and connected to an in-vehicle network, wherein the plurality of electronic control units include (fig. 3, ref. num 330): a plurality of functional blocks each configured to execute a predetermined process and at least in part configured to provide a function for controlling motion of a vehicle (paragraph 0035); and a coordination controller configured to implement coordination between the plurality of functional blocks (fig. 3, ref. num 320), at least a part of the plurality of functional blocks includes a functional interface that is an interface configured to provide an own function to a different functional block (paragraph 0065), the coordination controller includes: a policy storage configured to store an authorization policy indicating a rule for authorizing access of an access request from at least one of the plurality of functional blocks to at least one of the functional interface (paragraph 0120); and an access controller configured to, upon receiving an access request from one of the plurality of functional blocks, determine whether to authorize access from a request source block to a request destination interface according the authorization policy (paragraph 0107), and transmit the access request to the request destination interface when the access is authorized (paragraph 0091), the request source block is one of the plurality of functional blocks and is an access request source of the access request (paragraph 0074), the request destination interface is the functional interface and is an access request destination of the access request (paragraph 0074), the authorization policy is set using a provision level and a request level (paragraph 0063 and 0068), the provision level is a safety level indicating safety of the function guaranteed by the request source block (paragraph 0068), and the request level is the safety level requested by the request destination interface to the request source block (paragraph 0120). Regarding claim 2, Zhang et al. teaches wherein the authorization policy is set to authorize access when the provision level is equal to or higher than the request level and deny the access when the provision level is lower than the request level (paragraph 0079). Regarding claim 3, Zhang et al. teaches wherein an automotive safety integrity level is used as the safety level (paragraph 0032 and 0039). Regarding claim 4, Zhang et al. teaches wherein the functional block incudes at least one micro functional block, and the provision level of the functional block is configured to achieve a highest level among the safety level requested for each of the at least one micro functional block (paragraph 0078). Regarding claim 5, Zhang et al. teaches comprising a correspondence table indicating the provision level of the request source block and the request level of the request destination interface, and the access controller is configured to refer to the correspondence table according to the request source block and the request destination interface extracted from the access request to extract the provision level of the request source block and the request level of the request destination interface, and determine whether to authorize access from the request source block to the request destination interface using the authorization policy from the extracted provision level and the extracted request level (table 1). Regarding claim 6, Zhang et al. teaches comprising a correspondence table indicating the provision level of the request source block and the request level of the request destination interface, and whether to permit access for all combinations of the request source block and the request destination interface according to the authorization policy, wherein the access controller is configured to determine whether to authorize access from the request source block to the request destination interface by referring to the correspondence table according to the request source block and the request destination interface extracted from the access request (paragraph 0038). Regarding claim 7, Zhang et al. teaches wherein the functional block and the functional interface are identified by a process ID provided by an operating system at activation of the vehicle control system, and the correspondence table is generated by the operating system after the process ID is provided, and is configured to identify the request source block and the request destination interface by the process ID (paragraph 0066). Regarding claim 9, Zhang et al. teaches an access control method comprising: determining whether to authorize access from a request source block to a request destination interface according to an authorization policy in response to an access request to the request destination interface (paragraph 0107), wherein the request destination interface is a request destination of the access request and is a functional interface (paragraph 0107), at least a part of a plurality of functional blocks each configured to execute a predetermined process includes the functional interface that is an interface for providing an own function to a different functional block (paragraph 0065), the request source block is at least one of the functional blocks and is an access request source of the access request (paragraph 0074); and transmitting the access request to the request destination interface when the access is authorized (paragraph 0091), wherein the authorization policy is set using a provision level and a request level (paragraph 0063 and 0068), the provision level is a safety level indicating safety of the function provided by the request source block (paragraph 0068), and the request level is the safety level requested by the request destination interface to the request source block (paragraph 0120). Any inquiry concerning this communication or earlier communications from the examiner should be directed to BRANDON HOFFMAN whose telephone number is (571)272-3863. The examiner can normally be reached Monday-Friday 8:30AM-5:00PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jeffrey Pwu can be reached at (571)272-6798. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /BRANDON HOFFMAN/Primary Examiner, Art Unit 2433
Read full office action

Prosecution Timeline

Aug 21, 2024
Application Filed
Jan 26, 2026
Non-Final Rejection — §102
Mar 30, 2026
Examiner Interview Summary
Mar 30, 2026
Applicant Interview (Telephonic)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12598185
DESCENDENT CASE ROLE ALIAS
2y 5m to grant Granted Apr 07, 2026
Patent 12597311
Access Control System for Electric Vehicle Charging
2y 5m to grant Granted Apr 07, 2026
Patent 12579293
SYSTEMS AND METHODS FOR API GATEWAY SYNCHRONIZATION WITH CLOUD STORAGE
2y 5m to grant Granted Mar 17, 2026
Patent 12579295
SYSTEMS AND METHODS FOR ELECTRONIC DEVICE ACCESS
2y 5m to grant Granted Mar 17, 2026
Patent 12566878
DATA SANITIZER
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
91%
Grant Probability
97%
With Interview (+6.3%)
2y 9m
Median Time to Grant
Low
PTA Risk
Based on 1238 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month