DETAILED ACTION
Claims 14-17 were cancelled in a preliminary amendment.
Claims 20-24 were added in a preliminary amendment.
Claims 1-13 and 18-24 have been examined.
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
Priority
The current application is a National Stage entry of PCT/CN2022/096001, International Filing Date: 05/30/2022.
Information Disclosure Statement
The information disclosure statements (IDS) submitted on 09/04/2024 and 10/20/2025 have been considered by the examiner.
Claim Rejections - 35 USC § 102
The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action:
A person shall be entitled to a patent unless –
(a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention.
Claims 1-13 and 18-24 are rejected under 35 U.S.C. 102(a)(2) as being anticipated by United States Patent No. US 12095920 B2 to Visvesha et al., hereinafter Visvesha.
Regarding claim 1, Visvesha discloses a battery encryption circuit, comprising an encryption part and a communication part, wherein the encryption part comprises a storage unit and an encryption unit (column 6, lines 36-42, “The primary battery 102 may be further configured to receive an encrypted battery status from each of the secondary batteries 104, 106, and 108 via the CAN bus 114. The encrypted battery status includes at least the first random number, the second random number, and an authentication status associated with each of the secondary batteries 104, 106, and 108.”);
the communication part is configured to send, to the encryption unit, first information stored in the storage unit (column 11, lines 39-53, “Further, in an embodiment, the primary battery 102 may be configured to communicate the encrypted authentication message to the secondary batteries 104, 106, and 108 and the vehicle controller 110 via the CAN bus 114. The encrypted authentication message may include at least the first random number, the second random number, and the authentication status. The encrypted authentication message may further include the primary battery identifier of the primary battery 102. The primary battery identifier may be a unique identification number that identifies the primary battery 102 in the electric vehicle 112. The primary battery identifier may be a symbol, a numerical string, an alphabetical string, an alphanumerical string, or any combination thereof that is used to identify the primary battery 102.”);
the encryption unit is configured to generate encryption information based on the first information sent by the storage unit (column 19, lines 35-50, “a battery status (generated by each of the secondary batteries 104, 106, and 108) may be encrypted using one or more encryption techniques that are well known in the art without deviating from scope of the disclosure. The one or more encryption techniques may be based on AES, 3DES, Twofish, or the like. In an embodiment, each of the secondary batteries 104, 106, and 108 may be configured to generate the battery status based on at least the verification of the first random number and the vehicle identifier and perform the encryption of the battery status to generate the encrypted battery status. The encrypted battery status may be a data packet having a size of 128 bits. The encrypted battery status may be communicated periodically by each of the secondary batteries 104, 106, and 108 to the primary battery 102 of the electric vehicle 112.”);
and the communication part is further configured to transmit, to a processor electrically connected to the battery encryption circuit, verification information stored in the storage unit, and the encryption information generated by the encryption unit, thereby completing battery verification (column 6, lines 16-20, “the primary battery 102 may be further configured to communicate with the secondary batteries 104, 106, and 108 and the vehicle controller 110 for performing data communication and data verification for executing the authentication of each battery.”).
Regarding claim 2, Visvesha discloses wherein the storage unit comprises at least one of a first coulombmeter or a first encryption chip (column 12, lines 60-67, column 12, lines 1-13).
Regarding claim 3, Visvesha discloses wherein the communication part comprises an integrated circuit bus, the storage unit is electrically connected to the encryption unit via the integrated circuit bus, and the storage unit and the encryption unit are electrically connected to the processor via the integrated circuit bus (column 3, lines 5-11, and column 4, lines 21-36).
Regarding claim 4, Visvesha discloses wherein the communication part comprises at least one of: a first communication unit, wherein the first communication unit is configured to send, to the encryption unit, the first information stored in the storage unit; or a second communication unit and a third communication unit, wherein the second communication unit is configured to transmit, to the processor, the verification information stored in the storage unit, and the third communication unit is configured to transmit, to the processor, the encryption information generated by the encryption unit (column 6, lines 21-33, and column 7, lines 21-32).
Regarding claim 5, Visvesha discloses wherein: the first information comprises setting battery information, and the verification information comprises first identification information and the setting battery information; the first information comprises setting battery information and first identification information, and the verification information comprises the setting battery information; or the first information comprises setting battery information and first identification information, and the verification information comprises the setting battery information and the first identification information (column 15, lines 31-52).
Regarding claim 6, Visvesha discloses a battery, comprising a battery cell and a protection circuit board, wherein the protection circuit board comprises the battery encryption circuit according to claim 1 (column 5, lines 18-23 and column 12, lines 17-23).
Regarding claim 7, Visvesha discloses a terminal, comprising a processor and a battery, wherein the battery comprises a battery cell and a protection circuit board, and the protection circuit board comprises the battery encryption circuit according to claim 1, wherein the battery encryption circuit of the protective circuit board of the battery is electrically connected to the processor of the terminal (column 12, lines 17-23 and 57-67, and column 13, lines 1-10).
Regarding claim 8, Visvesha teaches a verification method for a battery, performed by a verification device for the battery, and comprising:
sending an information request instruction to the battery (column 6, lines 36-42, “The primary battery 102 may be further configured to receive an encrypted battery status from each of the secondary batteries 104, 106, and 108 via the CAN bus 114. The encrypted battery status includes at least the first random number, the second random number, and an authentication status associated with each of the secondary batteries 104, 106, and 108.”);
receiving verification information sent by a storage unit of the battery, and encryption information sent by an encryption unit (column 11, lines 39-53, “Further, in an embodiment, the primary battery 102 may be configured to communicate the encrypted authentication message to the secondary batteries 104, 106, and 108 and the vehicle controller 110 via the CAN bus 114. The encrypted authentication message may include at least the first random number, the second random number, and the authentication status. The encrypted authentication message may further include the primary battery identifier of the primary battery 102. The primary battery identifier may be a unique identification number that identifies the primary battery 102 in the electric vehicle 112. The primary battery identifier may be a symbol, a numerical string, an alphabetical string, an alphanumerical string, or any combination thereof that is used to identify the primary battery 102.”);
and performing verification on the battery based on pre-stored information stored in the verification device, the verification information and the encryption information (column 6, lines 16-20, “the primary battery 102 may be further configured to communicate with the secondary batteries 104, 106, and 108 and the vehicle controller 110 for performing data communication and data verification for executing the authentication of each battery.”).
Regarding claim 9, Visvesha teaches wherein the encryption information is determined by encrypting first information based on first configuration information preset in the encryption unit (column 17, lines 8-30);
and the performing the verification on the battery comprises: obtaining decryption information by decrypting the encryption information based on preset second configuration information, wherein the second configuration information is preset and corresponds to the first configuration information (column 17, lines 34-47);
and performing the verification on the battery based on the decryption information, the verification information and the pre-stored information (column 19, lines 58-67, column 20, lines 1-5).
Regarding claim 10, Visvesha teaches wherein the performing the verification on the battery based on the decryption information, the verification information and the pre-stored information comprises: verifying a source of the battery based on the decryption information, the verification information and the pre-stored information, thereby determining whether the source of the battery is reliable (column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5).
Regarding claim 11, Visvesha teaches wherein the first information comprises setting battery information, the verification information comprises first identification information and the setting battery information, and the pre-stored information comprises second identification information (column 15, lines 31-52);
and the verifying the source of the battery comprises: determining the source of the battery is reliable in response to that the decryption information matches the setting battery information of the verification information, and the second identification information of the pre-stored information matches the first identification information of the verification information (column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5).
Regarding claim 12, Visvesha teaches wherein the first information comprises setting battery information and first identification information, the verification information comprises the setting battery information, and the pre-stored information comprises second identification information; and the verifying the source of the battery comprises: determining the source of the battery is reliable in response to that the decryption information comprises information matching the setting battery information of the verification information, and comprises information matching the second identification information of the pre-stored information (column 15, lines 31-52, column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5).
Regarding claim 13, Visvesha teaches wherein the first information comprises setting battery information and first identification information, the verification information comprises the setting battery information and the first identification information, and the pre-stored information comprises second identification information; and the verifying the source of the battery comprises: determining the source of the battery is reliable in response to that the decryption information comprises information matching the setting battery information of the verification information, and at least one of the decryption information or the verification information comprises information matching the second identification information of the pre-stored information (column 15, lines 31-52, column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5).
Regarding claim 18, Visvesha discloses a verification device for a battery, comprising: a processor (column 13, lines 1-8, “processor 202”);
and a memory storing an instruction executable by the processor (column 13, lines 14-18, and column 14, lines 39-42, “The memory 206 may include suitable logic, circuitry, interfaces, and/or code, executable by the circuitry, that may be configured to store one or more instructions that are executed by the processor 202 and the authentication engine 204 to perform their operations”);
wherein the processor is configured to:
send an information request instruction to the battery (column 11, lines 39-53, “Further, in an embodiment, the primary battery 102 may be configured to communicate the encrypted authentication message to the secondary batteries 104, 106, and 108 and the vehicle controller 110 via the CAN bus 114. The encrypted authentication message may include at least the first random number, the second random number, and the authentication status. The encrypted authentication message may further include the primary battery identifier of the primary battery 102. The primary battery identifier may be a unique identification number that identifies the primary battery 102 in the electric vehicle 112. The primary battery identifier may be a symbol, a numerical string, an alphabetical string, an alphanumerical string, or any combination thereof that is used to identify the primary battery 102.”);
receive verification information sent by a storage unit of the battery, and encryption information sent by an encryption unit of the battery (column 19, lines 35-50, “a battery status (generated by each of the secondary batteries 104, 106, and 108) may be encrypted using one or more encryption techniques that are well known in the art without deviating from scope of the disclosure. The one or more encryption techniques may be based on AES, 3DES, Twofish, or the like. In an embodiment, each of the secondary batteries 104, 106, and 108 may be configured to generate the battery status based on at least the verification of the first random number and the vehicle identifier and perform the encryption of the battery status to generate the encrypted battery status. The encrypted battery status may be a data packet having a size of 128 bits. The encrypted battery status may be communicated periodically by each of the secondary batteries 104, 106, and 108 to the primary battery 102 of the electric vehicle 112.”);
and perform verification on the battery based on pre-stored information stored in the verification device, the verification information and the encryption information (column 6, lines 16-20, “the primary battery 102 may be further configured to communicate with the secondary batteries 104, 106, and 108 and the vehicle controller 110 for performing data communication and data verification for executing the authentication of each battery.”).
Regarding claim 19, Visvesha discloses a non-transitory computer-readable storage medium storing an instruction that (column 27, lines 42-45, “non-transitory computer readable media having instructions stored thereon”, column 28, lines 27-32, “non-transitory computer readable mediums that may provide data that enables the computer system 800 to implement the offline battery authentication methods”, and column 29, lines 56-60, “a non-transitory computer readable medium having stored thereon, computer executable instructions, which when executed by a computer, cause the computer to execute operations for the offline battery authentication.”), when executed by a processor of a verification device for a battery, causes the verification device to perform the verification method for the battery according to claim 8 (column 6, lines 16-20).
Regarding claim 20, Visvesha discloses wherein the encryption unit comprises at least one of a second coulombmeter or a second encryption chip (column 12, lines 60-67, column 12, lines 1-13).
Regarding claim 21, Visvesha teaches the verification method according to claim 9, wherein the performing the verification on the battery based on the decryption information, the verification information and the pre-stored information comprises: verifying a quality of the battery based on setting battery information of the decryption information or setting battery information of the verification information, thereby determining whether the battery is qualified (column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5).
Regarding claim 22, Visvesha discloses wherein the encryption information is determined by encrypting first information based on first configuration information preset in the encryption unit (column 17, lines 8-30);
and the processor is further configured to: obtain decryption information by decrypting the encryption information based on second configuration information, wherein the second configuration information is preset and corresponds to the first configuration information (column 17, lines 34-47);
and perform the verification on the battery based on the decryption information, the verification information and the pre-stored information (column 19, lines 58-67, column 20, lines 1-5).
Regarding claim 23, Visvesha discloses wherein the processor is further configured to: verify a source of the battery based on the decryption information, the verification information and the pre-stored information, thereby determining whether the source of the battery is reliable (column 17, lines 34-47, column 19, lines 58-67, and column 20, lines 1-5).
Regarding claim 24, Visvesha discloses wherein the first information comprises setting battery information, the verification information comprises first identification information and the setting battery information, and the pre-stored information comprises second identification information; and the processor is further configured to: determine the source of the battery is reliable in response to determining that the decryption information matches the setting battery information of the verification information, and the second identification information of the pre-stored information matches the first identification information of the verification information (column 15, lines 31-52).
Conclusion
The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. The references cited on form PTO-892 are cited to further show the state of the art with respect to battery verification.
Any inquiry concerning this communication or earlier communications from the examiner should be directed to JEREMIAH L AVERY whose telephone number is (571)272-8627. The examiner can normally be reached M-F 8:30am -5:00pm.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Lynn Feild can be reached at 571-272-2092. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/JEREMIAH L AVERY/Primary Examiner, Art Unit 2431