Prosecution Insights
Last updated: April 19, 2026
Application No. 18/840,423

BATTERY ENCRYPTION CIRCUIT, BATTERY VERIFICATION METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM

Non-Final OA §102
Filed
Aug 21, 2024
Examiner
AVERY, JEREMIAH L
Art Unit
2431
Tech Center
2400 — Computer Networks
Assignee
BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.
OA Round
1 (Non-Final)
83%
Grant Probability
Favorable
1-2
OA Rounds
2y 11m
To Grant
98%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
571 granted / 690 resolved
+24.8% vs TC avg
Strong +16% interview lift
Without
With
+15.7%
Interview Lift
resolved cases with interview
Typical timeline
2y 11m
Avg Prosecution
18 currently pending
Career history
708
Total Applications
across all art units

Statute-Specific Performance

§101
13.2%
-26.8% vs TC avg
§103
32.2%
-7.8% vs TC avg
§102
26.3%
-13.7% vs TC avg
§112
17.7%
-22.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 690 resolved cases

Office Action

§102
DETAILED ACTION Claims 14-17 were cancelled in a preliminary amendment. Claims 20-24 were added in a preliminary amendment. Claims 1-13 and 18-24 have been examined. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. Priority The current application is a National Stage entry of PCT/CN2022/096001, International Filing Date: 05/30/2022. Information Disclosure Statement The information disclosure statements (IDS) submitted on 09/04/2024 and 10/20/2025 have been considered by the examiner. Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1-13 and 18-24 are rejected under 35 U.S.C. 102(a)(2) as being anticipated by United States Patent No. US 12095920 B2 to Visvesha et al., hereinafter Visvesha. Regarding claim 1, Visvesha discloses a battery encryption circuit, comprising an encryption part and a communication part, wherein the encryption part comprises a storage unit and an encryption unit (column 6, lines 36-42, “The primary battery 102 may be further configured to receive an encrypted battery status from each of the secondary batteries 104, 106, and 108 via the CAN bus 114. The encrypted battery status includes at least the first random number, the second random number, and an authentication status associated with each of the secondary batteries 104, 106, and 108.”); the communication part is configured to send, to the encryption unit, first information stored in the storage unit (column 11, lines 39-53, “Further, in an embodiment, the primary battery 102 may be configured to communicate the encrypted authentication message to the secondary batteries 104, 106, and 108 and the vehicle controller 110 via the CAN bus 114. The encrypted authentication message may include at least the first random number, the second random number, and the authentication status. The encrypted authentication message may further include the primary battery identifier of the primary battery 102. The primary battery identifier may be a unique identification number that identifies the primary battery 102 in the electric vehicle 112. The primary battery identifier may be a symbol, a numerical string, an alphabetical string, an alphanumerical string, or any combination thereof that is used to identify the primary battery 102.”); the encryption unit is configured to generate encryption information based on the first information sent by the storage unit (column 19, lines 35-50, “a battery status (generated by each of the secondary batteries 104, 106, and 108) may be encrypted using one or more encryption techniques that are well known in the art without deviating from scope of the disclosure. The one or more encryption techniques may be based on AES, 3DES, Twofish, or the like. In an embodiment, each of the secondary batteries 104, 106, and 108 may be configured to generate the battery status based on at least the verification of the first random number and the vehicle identifier and perform the encryption of the battery status to generate the encrypted battery status. The encrypted battery status may be a data packet having a size of 128 bits. The encrypted battery status may be communicated periodically by each of the secondary batteries 104, 106, and 108 to the primary battery 102 of the electric vehicle 112.”); and the communication part is further configured to transmit, to a processor electrically connected to the battery encryption circuit, verification information stored in the storage unit, and the encryption information generated by the encryption unit, thereby completing battery verification (column 6, lines 16-20, “the primary battery 102 may be further configured to communicate with the secondary batteries 104, 106, and 108 and the vehicle controller 110 for performing data communication and data verification for executing the authentication of each battery.”). Regarding claim 2, Visvesha discloses wherein the storage unit comprises at least one of a first coulombmeter or a first encryption chip (column 12, lines 60-67, column 12, lines 1-13). Regarding claim 3, Visvesha discloses wherein the communication part comprises an integrated circuit bus, the storage unit is electrically connected to the encryption unit via the integrated circuit bus, and the storage unit and the encryption unit are electrically connected to the processor via the integrated circuit bus (column 3, lines 5-11, and column 4, lines 21-36). Regarding claim 4, Visvesha discloses wherein the communication part comprises at least one of: a first communication unit, wherein the first communication unit is configured to send, to the encryption unit, the first information stored in the storage unit; or a second communication unit and a third communication unit, wherein the second communication unit is configured to transmit, to the processor, the verification information stored in the storage unit, and the third communication unit is configured to transmit, to the processor, the encryption information generated by the encryption unit (column 6, lines 21-33, and column 7, lines 21-32). Regarding claim 5, Visvesha discloses wherein: the first information comprises setting battery information, and the verification information comprises first identification information and the setting battery information; the first information comprises setting battery information and first identification information, and the verification information comprises the setting battery information; or the first information comprises setting battery information and first identification information, and the verification information comprises the setting battery information and the first identification information (column 15, lines 31-52). Regarding claim 6, Visvesha discloses a battery, comprising a battery cell and a protection circuit board, wherein the protection circuit board comprises the battery encryption circuit according to claim 1 (column 5, lines 18-23 and column 12, lines 17-23). Regarding claim 7, Visvesha discloses a terminal, comprising a processor and a battery, wherein the battery comprises a battery cell and a protection circuit board, and the protection circuit board comprises the battery encryption circuit according to claim 1, wherein the battery encryption circuit of the protective circuit board of the battery is electrically connected to the processor of the terminal (column 12, lines 17-23 and 57-67, and column 13, lines 1-10). Regarding claim 8, Visvesha teaches a verification method for a battery, performed by a verification device for the battery, and comprising: sending an information request instruction to the battery (column 6, lines 36-42, “The primary battery 102 may be further configured to receive an encrypted battery status from each of the secondary batteries 104, 106, and 108 via the CAN bus 114. The encrypted battery status includes at least the first random number, the second random number, and an authentication status associated with each of the secondary batteries 104, 106, and 108.”); receiving verification information sent by a storage unit of the battery, and encryption information sent by an encryption unit (column 11, lines 39-53, “Further, in an embodiment, the primary battery 102 may be configured to communicate the encrypted authentication message to the secondary batteries 104, 106, and 108 and the vehicle controller 110 via the CAN bus 114. The encrypted authentication message may include at least the first random number, the second random number, and the authentication status. The encrypted authentication message may further include the primary battery identifier of the primary battery 102. The primary battery identifier may be a unique identification number that identifies the primary battery 102 in the electric vehicle 112. The primary battery identifier may be a symbol, a numerical string, an alphabetical string, an alphanumerical string, or any combination thereof that is used to identify the primary battery 102.”); and performing verification on the battery based on pre-stored information stored in the verification device, the verification information and the encryption information (column 6, lines 16-20, “the primary battery 102 may be further configured to communicate with the secondary batteries 104, 106, and 108 and the vehicle controller 110 for performing data communication and data verification for executing the authentication of each battery.”). Regarding claim 9, Visvesha teaches wherein the encryption information is determined by encrypting first information based on first configuration information preset in the encryption unit (column 17, lines 8-30); and the performing the verification on the battery comprises: obtaining decryption information by decrypting the encryption information based on preset second configuration information, wherein the second configuration information is preset and corresponds to the first configuration information (column 17, lines 34-47); and performing the verification on the battery based on the decryption information, the verification information and the pre-stored information (column 19, lines 58-67, column 20, lines 1-5). Regarding claim 10, Visvesha teaches wherein the performing the verification on the battery based on the decryption information, the verification information and the pre-stored information comprises: verifying a source of the battery based on the decryption information, the verification information and the pre-stored information, thereby determining whether the source of the battery is reliable (column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5). Regarding claim 11, Visvesha teaches wherein the first information comprises setting battery information, the verification information comprises first identification information and the setting battery information, and the pre-stored information comprises second identification information (column 15, lines 31-52); and the verifying the source of the battery comprises: determining the source of the battery is reliable in response to that the decryption information matches the setting battery information of the verification information, and the second identification information of the pre-stored information matches the first identification information of the verification information (column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5). Regarding claim 12, Visvesha teaches wherein the first information comprises setting battery information and first identification information, the verification information comprises the setting battery information, and the pre-stored information comprises second identification information; and the verifying the source of the battery comprises: determining the source of the battery is reliable in response to that the decryption information comprises information matching the setting battery information of the verification information, and comprises information matching the second identification information of the pre-stored information (column 15, lines 31-52, column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5). Regarding claim 13, Visvesha teaches wherein the first information comprises setting battery information and first identification information, the verification information comprises the setting battery information and the first identification information, and the pre-stored information comprises second identification information; and the verifying the source of the battery comprises: determining the source of the battery is reliable in response to that the decryption information comprises information matching the setting battery information of the verification information, and at least one of the decryption information or the verification information comprises information matching the second identification information of the pre-stored information (column 15, lines 31-52, column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5). Regarding claim 18, Visvesha discloses a verification device for a battery, comprising: a processor (column 13, lines 1-8, “processor 202”); and a memory storing an instruction executable by the processor (column 13, lines 14-18, and column 14, lines 39-42, “The memory 206 may include suitable logic, circuitry, interfaces, and/or code, executable by the circuitry, that may be configured to store one or more instructions that are executed by the processor 202 and the authentication engine 204 to perform their operations”); wherein the processor is configured to: send an information request instruction to the battery (column 11, lines 39-53, “Further, in an embodiment, the primary battery 102 may be configured to communicate the encrypted authentication message to the secondary batteries 104, 106, and 108 and the vehicle controller 110 via the CAN bus 114. The encrypted authentication message may include at least the first random number, the second random number, and the authentication status. The encrypted authentication message may further include the primary battery identifier of the primary battery 102. The primary battery identifier may be a unique identification number that identifies the primary battery 102 in the electric vehicle 112. The primary battery identifier may be a symbol, a numerical string, an alphabetical string, an alphanumerical string, or any combination thereof that is used to identify the primary battery 102.”); receive verification information sent by a storage unit of the battery, and encryption information sent by an encryption unit of the battery (column 19, lines 35-50, “a battery status (generated by each of the secondary batteries 104, 106, and 108) may be encrypted using one or more encryption techniques that are well known in the art without deviating from scope of the disclosure. The one or more encryption techniques may be based on AES, 3DES, Twofish, or the like. In an embodiment, each of the secondary batteries 104, 106, and 108 may be configured to generate the battery status based on at least the verification of the first random number and the vehicle identifier and perform the encryption of the battery status to generate the encrypted battery status. The encrypted battery status may be a data packet having a size of 128 bits. The encrypted battery status may be communicated periodically by each of the secondary batteries 104, 106, and 108 to the primary battery 102 of the electric vehicle 112.”); and perform verification on the battery based on pre-stored information stored in the verification device, the verification information and the encryption information (column 6, lines 16-20, “the primary battery 102 may be further configured to communicate with the secondary batteries 104, 106, and 108 and the vehicle controller 110 for performing data communication and data verification for executing the authentication of each battery.”). Regarding claim 19, Visvesha discloses a non-transitory computer-readable storage medium storing an instruction that (column 27, lines 42-45, “non-transitory computer readable media having instructions stored thereon”, column 28, lines 27-32, “non-transitory computer readable mediums that may provide data that enables the computer system 800 to implement the offline battery authentication methods”, and column 29, lines 56-60, “a non-transitory computer readable medium having stored thereon, computer executable instructions, which when executed by a computer, cause the computer to execute operations for the offline battery authentication.”), when executed by a processor of a verification device for a battery, causes the verification device to perform the verification method for the battery according to claim 8 (column 6, lines 16-20). Regarding claim 20, Visvesha discloses wherein the encryption unit comprises at least one of a second coulombmeter or a second encryption chip (column 12, lines 60-67, column 12, lines 1-13). Regarding claim 21, Visvesha teaches the verification method according to claim 9, wherein the performing the verification on the battery based on the decryption information, the verification information and the pre-stored information comprises: verifying a quality of the battery based on setting battery information of the decryption information or setting battery information of the verification information, thereby determining whether the battery is qualified (column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5). Regarding claim 22, Visvesha discloses wherein the encryption information is determined by encrypting first information based on first configuration information preset in the encryption unit (column 17, lines 8-30); and the processor is further configured to: obtain decryption information by decrypting the encryption information based on second configuration information, wherein the second configuration information is preset and corresponds to the first configuration information (column 17, lines 34-47); and perform the verification on the battery based on the decryption information, the verification information and the pre-stored information (column 19, lines 58-67, column 20, lines 1-5). Regarding claim 23, Visvesha discloses wherein the processor is further configured to: verify a source of the battery based on the decryption information, the verification information and the pre-stored information, thereby determining whether the source of the battery is reliable (column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5). Regarding claim 24, Visvesha discloses wherein the first information comprises setting battery information, the verification information comprises first identification information and the setting battery information, and the pre-stored information comprises second identification information; and the processor is further configured to: determine the source of the battery is reliable in response to determining that the decryption information matches the setting battery information of the verification information, and the second identification information of the pre-stored information matches the first identification information of the verification information (column 15, lines 31-52). Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. The references cited on form PTO-892 are cited to further show the state of the art with respect to battery verification. Any inquiry concerning this communication or earlier communications from the examiner should be directed to JEREMIAH L AVERY whose telephone number is (571)272-8627. The examiner can normally be reached M-F 8:30am -5:00pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Lynn Feild can be reached at 571-272-2092. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /JEREMIAH L AVERY/Primary Examiner, Art Unit 2431
Read full office action

Prosecution Timeline

Aug 21, 2024
Application Filed
Feb 21, 2026
Non-Final Rejection — §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12591674
RANSOMWARE DETECTION AND MITIGATION
2y 5m to grant Granted Mar 31, 2026
Patent 12574210
ENCRYPTED DATA PROCESSING
2y 5m to grant Granted Mar 10, 2026
Patent 12574240
PROTECTING CONTENT FROM GENERATIVE ARTIFICIAL INTELLIGENCE
2y 5m to grant Granted Mar 10, 2026
Patent 12572638
Spatially-Configurable Localized Illumination for Biometric Authentication
2y 5m to grant Granted Mar 10, 2026
Patent 12567957
ONE-TIME PAD SYSTEM AND METHOD FOR SECURED AND PRIVATE ON-CLOUD MACHINE LEARNING SERVICES
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
83%
Grant Probability
98%
With Interview (+15.7%)
2y 11m
Median Time to Grant
Low
PTA Risk
Based on 690 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month