DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . This office action is in response to an application filed on 08/30/2024. The applicant submits an Information Disclosure Statement dated 08/30/2024. The applicant does not make a claim for Foreign priority. The applicant does make a claim for Domestic priority to an application filed on 03/01/2022.
Claim Rejections - 35 USC § 103
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows:
1. Determining the scope and contents of the prior art.
2. Ascertaining the differences between the prior art and the claims at issue.
3. Resolving the level of ordinary skill in the pertinent art.
4. Considering objective evidence present in the application indicating obviousness or nonobviousness.
This application currently names joint inventors. In considering patentability of the claims the examiner presumes that the subject matter of the various claims was commonly owned as of the effective filing date of the claimed invention(s) absent any evidence to the contrary. Applicant is advised of the obligation under 37 CFR 1.56 to point out the inventor and effective filing dates of each claim that was not commonly owned as of the effective filing date of the later invention in order for the examiner to consider the applicability of 35 U.S.C. 102(b)(2)(C) for any potential 35 U.S.C. 102(a)(2) prior art against the later invention.
Claim(s) 1 – 6, 9 – 14, 16, 17, 19, and 20 are rejected under 35 U.S.C. 103 as being unpatentable over Bielby US 2022/0017044 in view of Herman US 2022/0243521.
As per claim 1, A method comprising:
processing a transmission for an operation of a remote keyless system of a vehicle, the remote keyless system having a behavioral security layer; (Herman paragraph 0030 teaches, “The method includes the step of receiving one of a motion input and an automatic mode initiation input to control movement of the closure member in a powered assist mode in response to receiving the motion input and in an automatic mode in response to receiving the automatic mode initiation input.” And paragraph 0118 teaches, “which may receive a wireless command to control the door opening based on a signal such as a wireless signal received from the key fob 60,”)
determining whether the transmission is associated with behavior of a legitimate user of the vehicle, by using the behavioral security layer; (Bielby paragraph 0019 discloses, “collecting data corresponding to a person that is approaching a vehicle; determining, based on the collected data, whether the person is associated with the vehicle; in response to determining that the person is a first user associated with the vehicle, determining a security risk (e.g., the presence of a stranger near the driver) based on monitoring an environment of the vehicle; and in response to determining the security risk, performing at least one action for the vehicle.”) and
performing an action based on a determination that the transmission is not associated with the behavior of the legitimate user of the vehicle. (Bielby paragraph 0035 discloses, “The opening of the selected door can be conditional on the stranger being at least a predetermined distance away from the selected door and/or the vehicle.” And paragraph 0052 discloses, “Vehicle 102 may take one or more action(s) 136 based on the risk score 134. For example, if the risk score 134 is below a predetermined threshold, vehicle 102 may take actions 136, such as, unlock one or more doors, and/or open one or more doors,”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 2, The method of claim 1, wherein the action includes at least one of: generating an alert regarding the transmission; (Bielby paragraph 0024 discloses, “ In one embodiment, the actions that are performed can include one or more of delaying the unlocking of one or more doors, delaying the starting of the vehicle, disabling the starting of the vehicle, activating an alarm, or notifying an owner of the vehicle by sending a wireless communication to a computing device”) and refraining from performing the operation. (Bielby paragraph 0024 discloses, “ In one embodiment, the actions that are performed can include one or more of delaying the unlocking of one or more doors, delaying the starting of the vehicle, disabling the starting of the vehicle, activating an alarm, or notifying an owner of the vehicle by sending a wireless communication to a computing device”)
As per claim 3, The method of claim 1, wherein the behavioral security layer includes an artificial intelligence model that has been trained using one or more behavioral parameters associated with behaviors corresponding with transmissions for operations of the remote keyless system. (Bielby paragraph 0029 discloses, “an artificial neural network (ANN)-based recognizer analyzes the way that a person approaches the vehicle in connection with other inputs (e.g., time, location, routing) to make a determination regarding an identity (e.g., driver or stranger) of the person. In one embodiment, the ANN is trained using data obtained from a period of usage of the vehicle.” And paragraph 0032 discloses, “an artificial neural network may be configured as an ANN or as a convolutional neural network (CNN) that is trained using reinforcement learning. For example, the ANN may gather images, voice recordings, and other sensor data for persons approaching the vehicle and store the data in a database during a training period. When a person enters the driver's seat during the training period, the person is identified in the database as an authorized user and the data for that person is reinforced in the ANN.”)
As per claim 4, The method of claim 3, wherein the behavioral parameters include at least a predetermined number of parameters selected from a set of parameters including: a time of day of the transmission; a date of the transmission; a location of the vehicle; a distance between the vehicle and a customer identification device (CID) that transmitted the transmission; a number of times per day of operation of the CID; a time taken to open a door of the vehicle; a time taken to close the door; a force of opening the door; a force of closing the door; a temperature inside the vehicle; a temperature outside the vehicle; and a humidity. (Bielby paragraph 0029 discloses, “In one example, an artificial neural network (ANN)-based recognizer analyzes the way that a person approaches the vehicle in connection with other inputs (e.g., time, location, routing) to make a determination regarding an identity (e.g., driver or stranger) of the person.”) and (Herman paragraph 124 teaches, “The body control module 52 may also be in communication with an environmental sensor (e.g., temperature sensor 80). The controller 50 is also configured to modify the at least one stored motion control parameter in response to detecting the user interface input.” And paragraph 0129 teaches, “Specifically, the at least one environmental sensor 80, 81 can be at least one of a temperature sensor 80 or a rain sensor 81.” And paragraph 0152 teaches, “shows adjustments to force profiles related to the force experienced by the closure member (e.g., measured at a handle of the closure member) for each of the plurality of closure member angles.” and paragraph 0192 teaches, “environmental data as a function of the provided current GPS positional information, such as temperature, wind speed, precipitation, humidity, pressure, and the like.” And paragraph 0234 teaches, “the method proceeds with the step 2108 of verifying motion of door within a predetermined period of time (e.g. seconds) by the controller 50.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 5, The method of claim 4, wherein the behavioral parameters include all parameters of the set of parameters. (Herman paragraph 0224 teaches, “the controller 50 can learn and incorporate user patterns to anticipate and optimize the interaction (e.g., if a user always opens the door 12 on hot days to cool the vehicle 10, the system 20 may choose to lower a window and/or open a door 12 before operator physically reaches the vehicle 10, thus saving time). If, for example, an operator continually overrides the power close at 5 pm (i.e., in a rush), the system 20 may choose to implement a higher speed power close at 5 pm as compared to other times.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 6, The method of claim 1, wherein the behavioral security layer is one of a plurality of security layers of the remote keyless system. (Herman paragraph 0030 teaches, “The method includes the step of receiving one of a motion input and an automatic mode initiation input to control movement of the closure member in a powered assist mode in response to receiving the motion input and in an automatic mode in response to receiving the automatic mode initiation input.” And paragraph 0118 discloses, “which may receive a wireless command to control the door opening based on a signal such as a wireless signal received from the key fob 60,” )
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 9, The method of claim 1, wherein the remote keyless system includes at least one of: a remote keyless entry system; (Herman paragraph 0226 teaches, “The method 1500 begins by the controller 50 monitoring for a user or human originating indication of their intent to close the door 12, for example by the controller 50 monitoring for an automatic close command at step 1502 such as from an inside door handle switch, or key FOB button, or remote device input,”) and
a remote keyless ignition system. (Bielby paragraph 0054 discloses, “The actions 136 can include, for example, unlocking only the door closest to the location 142 of the first user, locking all other doors, activating an alarm, delaying starting a component of the vehicle 102 until the first user is inside the vehicle and all the doors are locked,”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 10, The method of claim 1, wherein the operation is selected from a group including: a door lock operation; a door unlock operation; an engine start operation; an engine stop operation; an activate antitheft alarm operation; a deactivate antitheft alarm operation; and a panic-signal operation. (Bielby paragraph 0024 discloses, “the actions that are performed can include one or more of delaying the unlocking of one or more doors, delaying the starting of the vehicle, disabling the starting of the vehicle, activating an alarm, or notifying an owner of the vehicle by sending a wireless communication to a computing device”)
As per claim 11, The method of claim 1, wherein the transmission is received over one of: a radio frequency (RF) based link; or an infrared (IR) based link. (Bielby paragraph 0055 discloses, “In one embodiment, vehicle 102 uses a wireless communication interface (not shown) (e.g., a radio that implements 5G communications) to communicate with social network server 252 in response to identifying first person 146.”)
As per claim 12, A method of securing access to a vehicle, the method comprising:
receiving a transmission to access a function of a remote keyless system of the vehicle, the remote keyless system having a plurality of security layers including a behavioral security layer; (Herman paragraph 0030 teacehs, “The method includes the step of receiving one of a motion input and an automatic mode initiation input to control movement of the closure member in a powered assist mode in response to receiving the motion input and in an automatic mode in response to receiving the automatic mode initiation input.” And paragraph 0118 teaches, “which may receive a wireless command to control the door opening based on a signal such as a wireless signal received from the key fob 60,”)
analyzing a behavior corresponding with the transmission using a behavioral analytics model; (Bielby paragraph 0042 discloses, “vehicle 102 uses a machine-learning model 130 to identify one or more security risks 132 associated with a person that is detected as approaching the vehicle 102 (e.g., a first person 146 and/or a second person 150) (e.g., a user of the vehicle 102).”) and (Herman paragraph 0134 teaches, “the historical operation monitored and analyzed by the controller 50 using the artificial intelligence learning algorithm 61 can include the at least one environmental condition of the vehicle 10.”) and
performing an action based on the step of analyzing the behavior to detect an anomaly in the behavior, wherein the behavioral analytics model has been trained using one or more parameters associated with behaviors corresponding with transmissions to access functions of the remote keyless system. (Bielby paragraph 0035 discloses, “The opening of the selected door can be conditional on the stranger being at least a predetermined distance away from the selected door and/or the vehicle.” And paragraph 0052 discloses, “Vehicle 102 may take one or more action(s) 136 based on the risk score 134. For example, if the risk score 134 is below a predetermined threshold, vehicle 102 may take actions 136, such as, unlock one or more doors, and/or open one or more doors,” and paragraph 0031 discloses, “The ANN can be trained to classify an item into a plurality of categories, or data points into clusters. Multiple training algorithms can be employed for a sophisticated machine learning/training paradigm.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 13, The method of securing access to the vehicle of claim 12, wherein the action includes at least one of: generating an alert regarding the transmission; (Bielby paragraph 0024 discloses, “ In one embodiment, the actions that are performed can include one or more of delaying the unlocking of one or more doors, delaying the starting of the vehicle, disabling the starting of the vehicle, activating an alarm, or notifying an owner of the vehicle by sending a wireless communication to a computing device”) and refraining from performing the function. (Bielby paragraph 0024 discloses, “In one embodiment, the actions that are performed can include one or more of delaying the unlocking of one or more doors, delaying the starting of the vehicle, disabling the starting of the vehicle, activating an alarm, or notifying an owner of the vehicle by sending a wireless communication to a computing device”)
As per claim 14, The method of securing access to the vehicle of claim 12, wherein the parameters associated with behaviors include at least a predetermined number of parameters selected from a set of parameters including: a time of day of the transmission; a date of the transmission; a location of the vehicle; a distance between the vehicle and a customer identification device (CID) that transmitted the transmission; a number of times per day of operation of the CID; a time taken to open a door of the vehicle; a time taken to close the door; a force of opening the door; a force of closing the door; a temperature inside the vehicle; a temperature outside the vehicle; and a humidity. (Bielby paragraph 0029 discloses, “In one example, an artificial neural network (ANN)-based recognizer analyzes the way that a person approaches the vehicle in connection with other inputs (e.g., time, location, routing) to make a determination regarding an identity (e.g., driver or stranger) of the person.”) and (Herman paragraph 124 teaches, “The body control module 52 may also be in communication with an environmental sensor (e.g., temperature sensor 80). The controller 50 is also configured to modify the at least one stored motion control parameter in response to detecting the user interface input.” And paragraph 0129 teaches, “Specifically, the at least one environmental sensor 80, 81 can be at least one of a temperature sensor 80 or a rain sensor 81.” And paragraph 0152 teaches, “shows adjustments to force profiles related to the force experienced by the closure member (e.g., measured at a handle of the closure member) for each of the plurality of closure member angles.” and paragraph 0192 teaches, “environmental data as a function of the provided current GPS positional information, such as temperature, wind speed, precipitation, humidity, pressure, and the like.” And paragraph 0234 teaches, “the method proceeds with the step 2108 of verifying motion of door within a predetermined period of time (e.g. seconds) by the controller 50.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 16, A remote keyless system for a vehicle, comprising:
one or more processors; (Bielby paragraph 0043 discloses, “The processing device 104 may be, for example, a microprocessor, graphics processor, embedded processor, embedded computer, system on a chip, ASIC, FPGA, or other processing device.”) and
a non-transitory memory having executable instructions that, when executed, cause the one or more processors to:
receive a transmission for an operation of the remote keyless system; (Bielby paragraph 0085 discloses, “a non-transitory computer-readable medium (e.g., memory 106) stores instructions which, when executed on a computing device, cause the computing device to at least: collect data corresponding to a person that is approaching a vehicle; determine, based on the collected data, whether the person is a driver of the vehicle; in response to determining that the person is a driver of the vehicle, determine a security risk based on monitoring an environment of the vehicle;”) and (Herman paragraph 0226 teaches, “The method 1500 begins by the controller 50 monitoring for a user or human originating indication of their intent to close the door 12, for example by the controller 50 monitoring for an automatic close command at step 1502 such as from an inside door handle switch, or key FOB button, or remote device input,”)
conduct an analysis of a behavior associated with the transmission using a behavioral analytics model, and based on a set of parameters of the behavior;
determine, based on the analysis of the behavior, whether the behavior is not associated with a legitimate user of the vehicle; (Bielby paragraph 0029 discloses, “an artificial neural network (ANN)-based recognizer analyzes the way that a person approaches the vehicle in connection with other inputs (e.g., time, location, routing) to make a determination regarding an identity (e.g., driver or stranger) of the person.”) and
perform an action, based on determination that the behavior is not associated with the legitimate user of the vehicle, including at least one of:
generate an alert regarding the operation; (Bielby paragraph 0024 discloses, “ In one embodiment, the actions that are performed can include one or more of delaying the unlocking of one or more doors, delaying the starting of the vehicle, disabling the starting of the vehicle, activating an alarm, or notifying an owner of the vehicle by sending a wireless communication to a computing device”) and
refrain from performing the operation, wherein the behavioral analytics model has been trained using at least a predetermined number of the following behavioral parameters: a time of day of the transmission; a date of the transmission; a location of the vehicle; a distance between the vehicle and a customer identification device (CID) that transmitted the transmission; a number of times per day of operation of the CID; a time taken to open a door of the vehicle; a time taken to close the door; a force of opening the door; a force of closing the door; a temperature inside the vehicle; a temperature outside the vehicle; and a humidity. (Bielby paragraph 0029 discloses, “In one example, an artificial neural network (ANN)-based recognizer analyzes the way that a person approaches the vehicle in connection with other inputs (e.g., time, location, routing) to make a determination regarding an identity (e.g., driver or stranger) of the person.”) and (Herman paragraph 124 teaches, “The body control module 52 may also be in communication with an environmental sensor (e.g., temperature sensor 80). The controller 50 is also configured to modify the at least one stored motion control parameter in response to detecting the user interface input.” And paragraph 0129 teaches, “Specifically, the at least one environmental sensor 80, 81 can be at least one of a temperature sensor 80 or a rain sensor 81.” And paragraph 0152 teaches, “shows adjustments to force profiles related to the force experienced by the closure member (e.g., measured at a handle of the closure member) for each of the plurality of closure member angles.” and paragraph 0192 teaches, “environmental data as a function of the provided current GPS positional information, such as temperature, wind speed, precipitation, humidity, pressure, and the like.” And paragraph 0234 teaches, “the method proceeds with the step 2108 of verifying motion of door within a predetermined period of time (e.g. seconds) by the controller 50.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 17, The remote keyless system of claim 16, wherein the one or more processors include at least one electronic control unit (ECU) of the vehicle; (Bielby paragraph 0099 discloses, “the computing device is a system including one or more processing devices. Examples of the processing device can include a microcontroller, a central processing unit (CPU),”) and
wherein the non-transitory memory includes one or more non-volatile storage devices. (Bielby paragraph 0085 discloses, “a non-transitory computer-readable medium (e.g., memory 106) stores instructions which, when executed on a computing device, cause the computing device to at least: collect data corresponding to a person that is approaching a vehicle; determine, based on the collected data, whether the person is a driver of the vehicle; in response to determining that the person is a driver of the vehicle, determine a security risk based on monitoring an environment of the vehicle;”)
As per claim 19, The remote keyless system of claim 16, wherein the remote keyless system is integrated in an in-vehicle computing system. (Bielby paragraph 0085 discloses, “a non-transitory computer-readable medium (e.g., memory 106) stores instructions which, when executed on a computing device, cause the computing device to at least: collect data corresponding to a person that is approaching a vehicle; determine, based on the collected data, whether the person is a driver of the vehicle; in response to determining that the person is a driver of the vehicle, determine a security risk based on monitoring an environment of the vehicle;”)
As per claim 20, The remote keyless system of claim 19, wherein the in-vehicle computing system includes various portions of a vehicle receiver for receiving transmissions from at least one external device. (Bielby paragraph 0043 discloses, “The processing device 104 may be, for example, a microprocessor, graphics processor, embedded processor, embedded computer, system on a chip, ASIC, FPGA, or other processing device.” paragraph 0085 discloses, “a non-transitory computer-readable medium (e.g., memory 106) stores instructions which, when executed on a computing device, cause the computing device to at least: collect data corresponding to a person that is approaching a vehicle; determine, based on the collected data, whether the person is a driver of the vehicle; in response to determining that the person is a driver of the vehicle, determine a security risk based on monitoring an environment of the vehicle;”) and (Herman paragraph 0226 teaches, “The method 1500 begins by the controller 50 monitoring for a user or human originating indication of their intent to close the door 12, for example by the controller 50 monitoring for an automatic close command at step 1502 such as from an inside door handle switch, or key FOB button, or remote device input,”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a remote keyless device. Herman teaches of a remote keyless device to gain entry into a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Herman et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
Claims 7, 8, 15, and 18 are rejected under 35 U.S.C. 103 as being unpatentable over Bielby US 2022/0017044 in view of Herman US 2022/0243521 in view of Patne US 2020/0334357.
As per claim 7, The method of claim 6, wherein the plurality of security layers includes one or more cryptographic security layers. (Patne paragraph 0058 teaches, “The communication module 230, in one or more approaches, encrypts the code using one key of an asymmetric key pair, a private key, a rolling session key, or according to another encryption ) scheme. In either case, the communication module 230 is effectively including a secure authentication mechanism within the challenge message that is designed to only be decrypted by a valid device such as the fob transceiver 270. In further aspects, the communication module 230 digitally signs the challenge message, generates a message authentication code that is based, at least in part, on the code, or performs another secure cryptographic routine to provide the challenge message with a means to authenticate the access system 170 and the fob transceiver 270.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a cryptographic security layers. Patne teaches of a cryptographic security layer in a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Patne et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 8, The method of claim 7, wherein the one or more cryptographic security layers are used to determine whether the transmission is legitimate after determining whether the transmission is associated with anomalous behavior. (Patne paragraph 0058) and (Bielby paragraph 0003 discloses, “The mobile device has a facial recognition sensor that projects infrared dots onto the user's face and then reads the pattern. The pattern is evaluated by a processor of the mobile device to confirm a match with the phone owner's face.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a cryptographic security layers. Patne teaches of a cryptographic security layer in a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Patne et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 15, The method of securing access to the vehicle of claim 12, wherein the plurality of security layers includes one or more cryptographic security layers; (Patne paragraph 0058) and
wherein the one or more cryptographic security layers are used to determine whether the transmission is legitimate after determining whether the transmission is associated with anomalous behavior. (Patne paragraph 0058) and (Bielby paragraph 0003 discloses, “The mobile device has a facial recognition sensor that projects infrared dots onto the user's face and then reads the pattern. The pattern is evaluated by a processor of the mobile device to confirm a match with the phone owner's face.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a cryptographic security layers. Patne teaches of a cryptographic security layer in a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Patne et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
As per claim 18, The remote keyless system of claim 16, wherein a plurality of security layers includes one or more cryptographic security layers; (Patne paragraph 0058) and
wherein the one or more cryptographic security layers are used to determine whether the transmission is legitimate after determining whether the transmission is associated with anomalous behavior. (Patne paragraph 0058) and (Bielby paragraph 0003 discloses, “The mobile device has a facial recognition sensor that projects infrared dots onto the user's face and then reads the pattern. The pattern is evaluated by a processor of the mobile device to confirm a match with the phone owner's face.”)
Bielby discloses an activating a security mode for vehicle based upon identification. Bielby does not disclose a cryptographic security layers. Patne teaches of a cryptographic security layer in a vehicle. Therefore, at the time of filing it would have been obvious to one of ordinary skill in the art to incorporate the teachings of Patne et.al. into the invention of Bielby. Such incorporation is motivated to ensure the correct person is authorized to operate the vehicle.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to TYLER D PAIGE whose telephone number is (571)270-5425. The examiner can normally be reached M-F 7:00am - 6:00pm (mst).
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Kito Robinson can be reached at 5712703921. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/TYLER D PAIGE/Primary Examiner, Art Unit 3664