Prosecution Insights
Last updated: April 19, 2026
Application No. 18/823,943

SYSTEMS AND METHODS FOR PROVIDING A CONSISTENT MEDIA ACCESS USER EXPERIENCE

Non-Final OA §102§103
Filed
Sep 04, 2024
Examiner
CHOY, KA SHAN
Art Unit
2435
Tech Center
2400 — Computer Networks
Assignee
Universal Electronics Inc.
OA Round
1 (Non-Final)
94%
Grant Probability
Favorable
1-2
OA Rounds
2y 3m
To Grant
99%
With Interview

Examiner Intelligence

Grants 94% — above average
94%
Career Allow Rate
246 granted / 263 resolved
+35.5% vs TC avg
Moderate +10% lift
Without
With
+10.0%
Interview Lift
resolved cases with interview
Typical timeline
2y 3m
Avg Prosecution
13 currently pending
Career history
276
Total Applications
across all art units

Statute-Specific Performance

§101
7.1%
-32.9% vs TC avg
§103
42.0%
+2.0% vs TC avg
§102
17.5%
-22.5% vs TC avg
§112
20.2%
-19.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 263 resolved cases

Office Action

§102 §103
DETAILED ACTION This office action is in response to the correspondence filed on 09/04/2024. Claims 1-19 are pending and are examined. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Priority Applicant's claim for the benefit of a prior-filed application under 35 U.S.C. 119(e) or under 35 U.S.C. 120, 121, 365(c), or 386(c) is acknowledged. Information Disclosure Statement The information disclosure statement (IDS) was submitted on 09/13/2024, 04/21/2025, and 12/04/2025. The submission is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner. Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale or otherwise available to the public before the effective filing date of the claimed invention. (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1-2, 4, and 6 are rejected under 35 U.S.C. 102(a)(1) as being anticipated by Robbin et al. (US Pub No. 2003/0079038 A1, referred to as Robbin). Regarding claim 1, Robbin anticipates, 1. A method for synchronizing a first smart device with a second smart device, comprising: causing a first setting of the second smart device to be stored in a datastore in association with a unique identifier; and (Robbin: Fig. 2; [0031]; media content can be played by a media player (first smart device with a unique identifier) in accordance with quality settings established for the media content at the host computer (first settings are established and stored). In one implementation, the quality settings can be established for the media content on a media item by media item basis. [0070]; a synchronized device identifier (unique identifier), which is stored at the host computer (second smart device).) in response to determining a presence of the first smart device: (Robbin: Fig. 8; [0070]; determines whether a media player (first smart device) is connected.) determining via use of the unique identifier that an authorization exists to synchronize the first smart device; (Robbin: Fig. 8; [0070]; once the decision 802 determines that a media player has been connected, a media player identifier is retrieved 804 from the media player. Then, a synchronized device identifier (unique identifier), which is stored at the host computer, is compared 806 with the media player identifier (authorization).) determining that a second setting of the first smart device is to be synchronized with the first setting of the second smart device; and synchronizing the second setting of the first smart device to match the first setting of the second smart device. (Robbin: Fig. 8; [0071]; a decision 808 determines whether the synchronized device identifier matches the media player identifier. When the decision 808 determines that the synchronized device identifier does match the media player identifier, the media items are synchronized 810 between the host computer (second smart device) and the media player (first smart device). [0031]; media content can be played by a media player in accordance with quality settings established for the media content at the host computer (settings are synchronized from the second device). In one implementation, the quality settings can be established for the media content on a media item by media item basis.) Regarding claim 2, Robbin further anticipates, 2. The method as recited in claim 1, wherein a device discovery process is utilized to determine the presence of the first smart device. (Robbin: Fig. 8; [0071]; when the decision 802 determines that a media player is not connected, then the decision 802 causes the automatic synchronization processing 800 to wait for a media player to be connected (discovery process).) Regarding claim 4, Robbin further anticipates, 4. The method as recited in claim 1, wherein a device identifier associated with the first smart device is used when determining that the authorization exists to synchronize the first smart device. (Robbin: Fig. 8; [0070]; a synchronized device identifier, which is stored at the host computer, is compared 806 with the media player identifier (device identifier authorization).) Regarding claim 6, Robbin further anticipates, 6. The method as recited in claim 1, wherein a device identifier associated with the second smart device is used when determining that the authorization exists to synchronize the first smart device. (Robbin: Fig. 8; [0070]; a synchronized device identifier (device identifier), which is stored at the host computer (second smart device), is compared 806 with the media player identifier (authorization).) Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 3 and 7 are rejected under 35 U.S.C. 103 as being unpatentable over Robbin in view of Shahbazi (US Pub No. 2007/0143824 A1, referred to as Shahbazi). Regarding claim 3, Robbin discloses, 3. The method as recited in claim 1, Robbin does not explicitly disclose, however Shahbazi teaches, wherein a user manually indicated the presence of the first smart device. (Shahbazi: [0003]; generally, the synchronization process is activated either by detecting a mobile device on a cradle or by the manual press of a button. The synchronization process proceeds to synchronize data for several different applications that run on the mobile devices with data for corresponding application on other computers.) It would have been obvious to one ordinary skill in the art before the effective filing date of the claimed invention to implement the teachings of Shahbazi into the teachings of Robbin with a motivation to make a simple substitution of one known element for another to obtain predictable results, i.e. synchronization process manual activation instead of activation by detection. Regarding claim 7, Robbin discloses, 7. The method as recited in claim 1, Robbin does not explicitly disclose, however Shahbazi teaches, wherein a user identifier associated with the second smart device is used when determining that the authorization exists to synchronize the first smart device. (Shahbazi: [0034]; the information contained in the node security profile 208 can include information that alone or in combination identifies an authorized or unauthorized computing node, an authorized or unauthorized user, an authorized or unauthorized mobile device, an authorized or unauthorized central station, or an authorized or unauthorized network or resource, such as storage devices or a camera. The identity of the mobile device and computing node may be specified by physical address, serial number, model number, device type, server, network resource ID, software license number (registration number), user ID, etc. The authorized or unauthorized computing node can be specified relative to mobile device parameters, such as device type, etc. For example, certain computing nodes 102 may be authorized to synchronize data with certain specified mobile device types, but not authorized to synchronize data with other device types, and vice versa.) It would have been obvious to one ordinary skill in the art before the effective filing date of the claimed invention to implement the teachings of Shahbazi into the teachings of Robbin with a motivation to enforce necessary security parameters to mobile devices by determining mobile devices with unique identity (Shahbazi: abstract and [0034]). Claim 5 is rejected under 35 U.S.C. 103 as being unpatentable over Robbin in view of Kiang et al. (US Pub No. 2013/0268999 A1, referred to as Kiang). Regarding claim 5, Robbin discloses, 5. The method as recited in claim 1, Robbin does not explicitly disclose, however Kiang teaches, wherein a user identifier associated with the first smart device is used when determining that the authorization exists to synchronize the first smart device. (Kiang: [0056]; when a content access or synchronization request is detected by the host server 500, the security enforcement engine 515 enforces security mechanisms by determining whether the requested device has been authorized or can be authorized. The request can include a device identifier (e.g., CPU ID, or any hardware or software ID uniquely identifying a device) retrieved from a synchronization or mobile client/application which can be used by the engine 515 to determine whether the device has been authorized. The user identifier 518 (user identifier), which can also be included in the access request or synchronization request to identify the associated account/ enterprise to determine the relevant security settings (e.g., via the account manager 505).) It would have been obvious to one ordinary skill in the art before the effective filing date of the claimed invention to implement the teachings of Kiang into the teachings of Robbin with a motivation to facilitate device pinning capabilities for cloud-based services by including various identifiers to authorize synchronization (Kiang abstract and [0056]). Claims 8-14, and 16 are rejected under 35 U.S.C. 103 as being unpatentable over Robbin in view of Mityagin et al. (US Pub No. 2017/0214668 A1, referred to as Mityagin). Regarding claim 8, Robbin discloses, 8. The method as recited in claim 1, Robbin does not explicitly disclose, however Mityagin teaches, wherein the datastore resides on a third smart device adapted to communicate with both the first smart device and the second smart device. (Mityagin: Fig. 2; [0064]; client devices 102s (third smart device). [0011]: shared folders.) It would have been obvious to one ordinary skill in the art before the effective filing date of the claimed invention to implement the teachings of Mityagin into the teachings of Robbin with a motivation to allow synchronization of a plurality of client devices by using shared folders to communicate over a local area network (Mityagin abstract). Regarding claim 9, Robbin discloses, 9. The method as recited in claim 1, Robbin does not explicitly disclose, however Mityagin teaches, wherein the datastore resides on a remote server associated with a third smart device adapted to communicate with both the first smart device and the second smart device. (Mityagin: Fig. 2; [0064]; gateway 204 (remote server), client devices 102s (third smart device). [0011]: shared folders.) The same motivation that was utilized for combining Robbin and Mityagin as set forth in claim 8 is equally applicable to claim 9. Regarding claim 10, the combination of Robbin and Mityagin discloses, 10. The method as recited in claim 8, Robbin does not explicitly disclose, however Mityagin teaches, wherein the third smart device comprises a smart watch. (Mityagin: Fig. 2; [0038]; a variety of different client devices, such as desktop computers; mobile computers; mobile communications devices, e.g. mobile phones, smartphones, tablets; smart televisions; set-top boxes; and/or any other network enabled computing devices.) The same motivation that was utilized for combining Robbin and Mityagin as set forth in claim 8 is equally applicable to claim 10. Regarding claim 11, the combination of Robbin and Mityagin discloses, 11. The method as recited in claim 8, Robbin does not explicitly disclose, however Mityagin teaches, wherein the third smart device comprises a smart phone. (Mityagin: Fig. 2; [0038]; a variety of different client devices, such as desktop computers; mobile computers; mobile communications devices, e.g. mobile phones, smartphones, tablets; smart televisions; set-top boxes; and/or any other network enabled computing devices.) The same motivation that was utilized for combining Robbin and Mityagin as set forth in claim 8 is equally applicable to claim 11. Regarding claim 12, the combination of Robbin and Mityagin discloses, 12. The method as recited in claim 9, Robbin does not explicitly disclose, however Mityagin teaches, wherein the third smart device comprises a smart watch. (Mityagin: Fig. 2; [0038]; a variety of different client devices, such as desktop computers; mobile computers; mobile communications devices, e.g. mobile phones, smartphones, tablets; smart televisions; set-top boxes; and/or any other network enabled computing devices.) The same motivation that was utilized for combining Robbin and Mityagin as set forth in claim 8 is equally applicable to claim 12. Regarding claim 13, the combination of Robbin and Mityagin discloses, 13. The method as recited in claim 10, Robbin does not explicitly disclose, however Mityagin teaches, wherein the third smart device comprises a smart phone. (Mityagin: Fig. 2; [0038]; a variety of different client devices, such as desktop computers; mobile computers; mobile communications devices, e.g. mobile phones, smartphones, tablets; smart televisions; set-top boxes; and/or any other network enabled computing devices.) The same motivation that was utilized for combining Robbin and Mityagin as set forth in claim 8 is equally applicable to claim 13. Regarding claim 14, the combination of Robbin and Mityagin discloses, 14. The method as recited in claim 8, Robbin further discloses, wherein a device identifier associated with the third smart device is used when determining that the authorization exists to synchronize the first smart device. (Robbin: Fig. 8; [0070]; a synchronized device identifier, which is stored at the host computer, is compared 806 with the media player identifier (device identifier authorization).) Regarding claim 16, the combination of Robbin and Mityagin discloses, 16. The method as recited in claim 9, Robbin further discloses, wherein a device identifier associated with the third smart device is used when determining that the authorization exists to synchronize the first smart device. (Robbin: Fig. 8; [0070]; a synchronized device identifier, which is stored at the host computer, is compared 806 with the media player identifier (device identifier authorization).) Claims 15 and 17 are rejected under 35 U.S.C. 103 as being unpatentable over Robbin, in view of Mityagin and further in view of Kiang. Regarding claim 15, the combination of Robbin and Mityagin discloses, 15. The method as recited in claim 8, The combination of Robbin and Mityagin does not explicitly disclose, however Kiang teaches, wherein a user identifier associated with the third smart device is used when determining that the authorization exists to synchronize the first smart device. (Kiang: [0056]; when a content access or synchronization request is detected by the host server 500, the security enforcement engine 515 enforces security mechanisms by determining whether the requested device has been authorized or can be authorized. The request can include a device identifier (e.g., CPU ID, or any hardware or software ID uniquely identifying a device) retrieved from a synchronization or mobile client/application which can be used by the engine 515 to determine whether the device has been authorized. The user identifier 518 (user identifier), which can also be included in the access request or synchronization request to identify the associated account/ enterprise to determine the relevant security settings (e.g., via the account manager 505).) It would have been obvious to one ordinary skill in the art before the effective filing date of the claimed invention to implement the teachings of Kiang into the combination of Robbin and Mityagin with a motivation to facilitate device pinning capabilities for cloud-based services by including various identifiers to authorize synchronization (Kiang abstract and [0056]). Regarding claim 17, the combination of Robbin and Mityagin discloses, 17. The method as recited in claim 9, The combination of Robbin and Mityagin does not explicitly disclose, however Kiang teaches, wherein a user identifier associated with the third smart device is used when determining that the authorization exists to synchronize the first smart device. (Kiang: [0056]; when a content access or synchronization request is detected by the host server 500, the security enforcement engine 515 enforces security mechanisms by determining whether the requested device has been authorized or can be authorized. The request can include a device identifier (e.g., CPU ID, or any hardware or software ID uniquely identifying a device) retrieved from a synchronization or mobile client/application which can be used by the engine 515 to determine whether the device has been authorized. The user identifier 518 (user identifier), which can also be included in the access request or synchronization request to identify the associated account/ enterprise to determine the relevant security settings (e.g., via the account manager 505).) It would have been obvious to one ordinary skill in the art before the effective filing date of the claimed invention to implement the teachings of Kiang into the combination of Robbin and Mityagin with a motivation to facilitate device pinning capabilities for cloud-based services by including various identifiers to authorize synchronization (Kiang abstract and [0056]). Claims 18-19 are rejected under 35 U.S.C. 103 as being unpatentable over Robbin in view of Park (US Pub No. 2017/0139664 A1, referred to as Park). Regarding claim 18, Robbin discloses, 18. The method as recited in claim 1, Robbin does not explicitly disclose, however Park teaches, further comprising subsequently updating the first setting of the second smart device stored in the datastore in response to a change in the synchronized second setting of the first smart device. (Park: [0094]; first, if at operation S1300 the controller 403 detects that the external display apparatuses 1a, 1b, 1c and 1d are connected to the output ports 201a, 201b, 201e and 201d, the controller 403 determines the connected external display apparatuses 1a, 1b, 1c and 1d as the slave display apparatuses 1a, 1b, 1c and 1d, and at operation S1301 transmits the master setting information to the stored setting information. At operation S1302 it is determined whether the error information is received from the slave display apparatuses 1a, 1b, 1c and 1d. If it is determined that the error information is received from the slave display apparatuses 1a, 1b, 1c and 1d, at operation S1303 the controller 403 updates the stored setting information with the received error information. [0095]; as described above, according to an exemplary embodiment, the setting information received from the master display apparatus is used to update the stored setting information, and the setting information is transmitted to the slave display apparatus based on the stored setting information, thereby easily and accurately synchronizing the setting information between the plurality of display apparatuses that are sequentially connected together (use master device information to update stored settings and synchronize with slave devices).) It would have been obvious to one ordinary skill in the art before the effective filing date of the claimed invention to implement the teachings of Park into the teachings of Robbin with a motivation to allow synchronization of setting information among the devices easily and accurately by implementing the master and slave scheme (Park abstract and [0094-0095]). Regarding claim 19, the combination of Robbin and Park discloses, 19. The method as recited in claim 18, Robbin does not explicitly disclose, however Park teaches, further comprising determining that the second smart device is a master smart device before updating the first setting of the second smart device stored in the datastore in response to the change in the synchronized second setting of the first smart device. (Park: [0095]; as described above, according to an exemplary embodiment, the setting information received from the master display apparatus is used to update the stored setting information, and the setting information is transmitted to the slave display apparatus based on the stored setting information, thereby easily and accurately synchronizing the setting information between the plurality of display apparatuses that are sequentially connected together.) The same motivation that was utilized for combining Robbin and Park as set forth in claim 18 is equally applicable to claim 19. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Sheehan; John Michael et al. US-PGPUB US 20130066832 A1 Application state synchronization Shimizu; Masahiro USPAT US 8527076 B2 Control apparatus for music system comprising a plurality of equipments connected together via network, and integrated software for controlling the music system Any inquiry concerning this communication or earlier communications from the examiner should be directed to KA SHAN CHOY whose telephone number is (571) 272-1569. The examiner can normally be reached on MON - FRI: 9AM-5:30PM EST Alternate Fridays. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Joseph Hirl can be reached on (571) 272-3685. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /KA SHAN CHOY/Primary Examiner, Art Unit 2435
Read full office action

Prosecution Timeline

Sep 04, 2024
Application Filed
Jan 08, 2026
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603916
SYSTEMS AND METHODS FOR INCREASED SECURITY USING CLIENT ADDRESS MANIPULATION
2y 5m to grant Granted Apr 14, 2026
Patent 12596829
DATABASE PROCESSING METHOD, APPARATUS, DEVICE, AND MEDIUM
2y 5m to grant Granted Apr 07, 2026
Patent 12591656
METHOD FOR REGISTERING DIGITAL KEYS OF A VEHICLE IN A VIRTUAL WALLET, AND ASSOCIATED DEVICES
2y 5m to grant Granted Mar 31, 2026
Patent 12592923
AUTHENTICATION AND ENFORCEMENT OF DIFFERENTIATED POLICIES FOR A BRIDGE MODE VIRTUAL MACHINE BEHIND A WIRELESS HOST IN A MAC BASED AUTHENTICATION NETWORK
2y 5m to grant Granted Mar 31, 2026
Patent 12587556
SERVER AND METHOD FOR STORING AND MANAGING ONLINE THREAT DATA
2y 5m to grant Granted Mar 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
94%
Grant Probability
99%
With Interview (+10.0%)
2y 3m
Median Time to Grant
Low
PTA Risk
Based on 263 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month