Prosecution Insights
Last updated: April 19, 2026
Application No. 18/864,350

Home Network-Triggered Authentication Procedure

Non-Final OA §102
Filed
Nov 08, 2024
Examiner
MCNALLY, MICHAEL S
Art Unit
2432
Tech Center
2400 — Computer Networks
Assignee
Apple Inc.
OA Round
1 (Non-Final)
90%
Grant Probability
Favorable
1-2
OA Rounds
2y 8m
To Grant
98%
With Interview

Examiner Intelligence

Grants 90% — above average
90%
Career Allow Rate
950 granted / 1060 resolved
+31.6% vs TC avg
Moderate +9% lift
Without
With
+8.7%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
17 currently pending
Career history
1077
Total Applications
across all art units

Statute-Specific Performance

§101
11.2%
-28.8% vs TC avg
§103
36.8%
-3.2% vs TC avg
§102
22.5%
-17.5% vs TC avg
§112
13.7%
-26.3% vs TC avg
Black line = Tech Center average estimate • Based on career data from 1060 resolved cases

Office Action

§102
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Priority Applicant’s claim for the benefit of a prior-filed application under 35 U.S.C. 119(e) or under 35 U.S.C. 120, 121, 365(c), or 386(c) is acknowledged. Information Disclosure Statement The information disclosure statement (IDS) submitted on 8 November 2024 has been considered by the examiner. Response to Amendment The preliminary amendment fled on 8 November 2024 concurrent with the filing of the application has been entered and is of record. Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1-5 and 9-11 are rejected under 35 U.S.C. 102(a)(2) as being anticipated by U.S. Patent Application Publication No. 2024/0244432 by Li et al. As to claim 1, Li discloses a processor of an Authentication Server Function (AUSF) configured to perform operations comprising: determining to trigger an authentication procedure (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”); and transmitting, to an Access and Mobility Management Function (AMF), a request for the authentication procedure (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”). As to claim 2, Li further discloses wherein determining to trigger the authentication procedure comprises: in accordance with a determination that there is a need for refresh of a key for the AUSF, or UE Parameter Update (UPU) or Steering of Roaming (SoR) count wrap around occurs, determining to trigger the authentication procedure (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”). As to claim 3, Li discloses a processor of a home network entity configured to perform operations comprising: determining to trigger an authentication procedure (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”); and transmitting, towards an Access and Mobility Management Function (AMF), a request for the authentication procedure via an Authentication Server Function (AUSF) (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”). As to claim 4, Li further discloses wherein determining to trigger the authentication procedure comprises: in accordance with a determination that there is a need for refresh of a key for the AUSF, or UE Parameter Update (UPU) or Steering of Roaming (SoR) count wrap around occurs, determining to trigger the authentication procedure (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”). As to claim 5, Li further discloses wherein the home network entity comprises at least one of: a Unified Data Management (UDM) function, an Authentication Credential Repository and Processing Function (ARPF), or a Subscription Identifier De- concealing Function (SIDF) (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”). As to claim 9, Li discloses a processor of user equipment (UE) configured to perform operations comprising: receiving, from an Access and Mobility Management Function (AMF), a message comprising an indication to initiate an authentication procedure (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”); and initiating the authentication procedure (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”). As to claim 10, Li further discloses wherein the indication indicates that the authentication procedure is triggered by at least one of: an Authentication Server Function (AUSF), a Unified Data Management (UDM) function, an Authentication Credential Repository and Processing Function (ARPF), or a Subscription Identifier De-concealing Function (SIDF) (Li: Page 8, Sec 125: “It may be understood that the second AUSF has executed an authentication procedure on the terminal device. Therefore, the second AUSF stores a security context of the terminal device, for example, the SUPI of the terminal device and a corresponding K.sub.AUSF and SoR Counter. When the SoR Counter is about to wrap around, the second AUSF determines to trigger the primary authentication procedure on the terminal device. As described above, the second AUSF may directly send the first authentication request message to the AMF, or first send a message to the UDM, and the UDM forwards the first authentication request message or sends the second authentication request message to the AMF”). As to claim 11, Li further discloses wherein the message is a non- access stratum (NAS) message (Li: Page 4, Sec 64; “To ensure communication security, an AKA procedure is executed between the terminal device and the network. In an implementation, the AMF determines whether to trigger the AKA procedure. In a triggering method, the terminal device sends an initial NAS message, for example, a registration request message, and the AMF may determine, based on the initial NAS message, whether to trigger authentication”). Prior Art The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. U.S. Patent Application Publication No. 2022/0103540 by Prasad et al. discloses authencation in 5G systems using an AUSF and AMF U.S. Patent Application Publication No. 2023/0224704 by Atarius et al. discloses AUSF initiated authentication U.S. Patent Application Publication No. 2023/0262457 by Baskaran et al. discloses 5G authentication Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to MICHAEL S MCNALLY whose telephone number is (571)270-1599. The examiner can normally be reached Monday-Friday, 8:30 AM - 5:00 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jeffrey L Nickerson can be reached at (469)295-9235. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. MICHAEL S. MCNALLY Primary Examiner Art Unit 2432 /Michael S McNally/Primary Examiner, Art Unit 2432
Read full office action

Prosecution Timeline

Nov 08, 2024
Application Filed
Jan 23, 2026
Non-Final Rejection — §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12597369
CRYPTO RECOVERY SEED PHRASE STORAGE DEVICE
2y 5m to grant Granted Apr 07, 2026
Patent 12579243
PROVIDING DYNAMIC AUTHENTICATION AND AUTHORIZATION AN ON ELECTRONIC DEVICE
2y 5m to grant Granted Mar 17, 2026
Patent 12572676
AUTHENTICATED DOCUMENT STORAGE VAULT
2y 5m to grant Granted Mar 10, 2026
Patent 12561422
SYSTEM FOR AUTHENTICATING DATA
2y 5m to grant Granted Feb 24, 2026
Patent 12563401
Hash Function and Lawful Interception
2y 5m to grant Granted Feb 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
90%
Grant Probability
98%
With Interview (+8.7%)
2y 8m
Median Time to Grant
Low
PTA Risk
Based on 1060 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month