DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claims 1-15 have been examined and are pending.
Priority
Receipt is acknowledged of certified copies of papers required by 37 CFR 1.55.
Examiner' s Amendments
An examiner's amendment to the record appears below. Should the changes and/or additions be unacceptable to applicant, an amendment may be filed as provided by 37 CFR 1.312. To ensure consideration of such an amendment, it MUST be submitted no later than the payment of the issue fee.
Please replace claim 1 with:
3. (Currently Amended) The method of claim 2, wherein the PIN update notification includes an indication of the PIN role change, contact information of the PINE a time duration the PINE [[will]] performs the PEMC functionality, profile information of the PINE, or a combination thereof.
Information Disclosure Statement
The information disclosure statement (IDS) submitted on 03/20/2025 was filed. The submission is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner.
Claim Rejections - 35 USC § 112
The following is a quotation of 35 U.S.C. 112(b):
(b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.
The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph:
The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention.
Claim 1 is rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor, or for pre-AIA the applicant regards as the invention.
Claim 1 recites the limitation "…initiating, by a Personal IoT Network (PIN) Element with Management Capability (PEMC) of a PIN, a PIN role change procedure; determining, by the PEMC, a PIN element (PINE) to transfer a PEMC functionality to; sending, by the PEMC, a PIN role change request to the PINE" in lines 2, 4, and 6 there appears to be ambiguity with respects to the first and/or second PINE elements; a PIN element (i.e. 1st instance of PINE) with management capability initiate a PIN role change, the management capability (within the 1st PINE) determines a PINE (i.e. must be a second PINE: a PIN element (PINE)) to send a functionality to and sends a role change request to that 2nd instance PINE. It appears that the 2nd instance of “a PINE” should be different from the 1st instance for the claim to make sense; please review and make appropriate corrections. There is insufficient antecedent basis for this limitation in the claim.
Dependent claims 2-5 are also rejected under 35 U.S.C. 112, second paragraph, for the same reason addressed above.
Allowable Subject Matter
Claims 1-5 would be in condition for allowance if the 112(b) was obviated.
Claims 6-15 are allowed.
Regarding Claim 1, the newly cited closest prior art of record, Sharma et al 20210092597 A1, Zhang et al 20250159589 A1, Liang et al 20250219837 A1 and Zaveksy et al 20210084043 A1 teach a method comprising: [Sharma Fig. 11 {a non-PIN network} and ¶0096 a method of operation in a wireless telecommunication system comprising a terminal device, a first network access node and a second network access node. Zhang ¶0004 improved methods, systems, devices, and apparatuses that support a personal Internet of Things (IoT) network (PIN) architecture with management capability (PEMC), at least one PIN element with gateway capability (PEGC), and at least one PIN element (PINE). Liang Abstract: information processing method is performed by a first network element that include: a Personal Internet of Things Network Element (PINE) and a PIN Element with Gateway Capability (PEGC) to perform decryption to obtain the operator credential ]; initiating, by a Personal IoT Network (PIN) Element with Management Capability (PEMC) of a PIN, a PIN role; [Sharma ¶¶0097 0100 0106 method includes configuring the second network access node to act a master network access node for the dual connectivity mode of operation for the terminal device using the new master network access node security key. Liang ¶¶0067-0068 a device with a management function (PIN Element with Management Capability, PEMC), and an ordinary PINE without gateway and management functions. ¶¶0149 0191 0214 0247 message exchange from first to second/third network element for proposed functions to be reused]; determining, by the PEMC, a PIN element (PINE); [Zaveksy 20210084043 A1 ¶¶0067-0068 a device with a management function (PIN Element with Management Capability, PEMC), and an ordinary PINE without gateway and management functions.]; sending, by the PEMC, request to the PINE; [Zaveksy ¶0024 20210084043 A1 0024 automated method to give or modify roles and take away later (including an audit log of all role transactions in public blockchain). ¶¶0047 and 0049 IoT devices and IoT access. Liang ¶¶0067-0068 a device with a management function (PIN Element with Management Capability, PEMC), and an ordinary PINE without gateway and management functions. ¶¶0149 0191 0214 0247 message exchange from first to second/third network element for proposed functions to be reused]; sending, by the PEMC, a PIN policy notification. [Zhang ¶0119 PIN application server 205 may transmit a registration message 276 to the PEMC 210 (e.g., a registration message 276-a) and/or the PEGC 215 (e.g., a registration message 276-b) that enables nodes to join the PIN; the registration message 276 may include registration information or management policy information. Zaveksy ¶¶0149 0191 0214 and 0247 message exchange from first to second/third network element for proposed functions to be reused].
However, the references Sharma, Zhang, Liang and Zaveksy do not explicitly teach nor suggest in detail, determining, by the PEMC, a PIN element (PINE) to transfer a PEMC functionality to; sending, by the PEMC, a PIN role change request to the PINE; sending, by the PEMC, a PIN policy update notification indicating the PINE performs the PEMC functionality, in view of other limitations of the intervening claims.
Regarding Claim 6, the newly cited closest prior art of record, Shi et al 20240314534 A1 and Zaveksy et al 20210084043 A1 teaches a method, comprising: receiving, by a Personal IoT Network (PIN) server and from a wireless transmit/receive unit (WTRU), a request; [Shi et al 20240314534 A1 ¶¶0003 0092 0173 The PDU session establishment accept message, or a PDU session modification command, may be sent to the PEMC. The PIN enabler client may receive the PINEs' PIN bootstrap information from an PIN enabler server; when the PIN enabler server receives a notification that a PINE is linked to the PEMC's subscription. See also ¶¶0073 and 0076. Zaveksy et al 20210084043 A1 ¶¶0067-0068 a device with a management function (PIN Element with Management Capability, PEMC), and an ordinary PINE without gateway and management functions.]; and sending, by the PIN server and to a PIN element (PINE), a PIN; [Shi et al 20240314534 A1 ¶0091 PIN GW and PEGC may be used interchangeably herein. A PEGC may be a PINE that is capable of acting as a gateway in the PIN].
However, the references Shi and Zaveksy do not explicitly teach nor suggest in detail, sending, by the PIN server and to a PIN element (PINE), a PIN role change request indicative of a request for the PINE to perform a PIN Element Management Capability (PEMC) or a PIN Element Gateway Capability (PEGC) functionality; receiving, by the PIN server and from the PINE, a message accepting the PIN role change request; and sending, by the PIN server and to the WTRU, a response to the PIN modification request comprising updated PIN policy information according to the PIN role change, in view of other limitations of the intervening claims.
Regarding Claim 11, the newly cited closest prior art of record, Shi et al 20240314534 A1 teaches a method, comprising: determining, by a personal IoT network (PIN) Element Management Capability (PEMC) of a PIN, a PIN Element Gateway Capability (PEGC) of the PIN is not within a coverage area of the PIN; [Shi et al 20240314534 A1 ¶¶0092 0094-0095 a wireless transmit/receive unit (WTRU) may be and/or may comprise a PINE, a PEGC, a PEMC, a combination thereof; where multiple IoT devices may be deployed in a private environment managed by a residential gateway. The Proximity services (ProSe) may be provided by a 3GPP system (e.g., a 5G network) where the ProSe discovery procedure determines if WTRUs are within proximity of each other].
However, the reference Shi do not explicitly teach nor suggest in detail, sending, by the PEMC and to a PIN server, a request for the PIN server to perform a PEGC role change; and receiving, by the PEMC and from the PIN server, a response that a PIN element (PINE) of the PIN is selected to perform PEGC functions for the PIN, in view of other limitations of the intervening claims.
Thus the prior arts of record taking singly or in combination do not teach or suggest the above-stated limitations taking wholly in combination with all the elements of each independent claim.
Any comments considered necessary by applicant must be submitted no later than the payment of the issue fee and, to avoid processing delays, should preferably accompany the issue fee. Such submissions should be clearly labeled “Comments on Statement of Reasons for Allowance.”
Closest prior art of record:
Shi et al 20240314534-A1 teaches systems, methods, and instrumentalities may be provided to discover a personal Internet of Things (IoT) network (PIN). A discovery policy configuration information associated with a PIN may be determined. The discovery policy configuration information may comprise a PIN identification (ID) and may indicate that discovery for the PIN may be enabled. A first message may be sent to a second WTRU if discovery for the PIN is enabled. The first message may be based on the discovery policy configuration information and may indicate the PIN ID. A second message may be received from the second WTRU. The second message may indicate the PIN ID and may indicate a request for information associated with the PIN. A third message may be sent to the second WTRU. The third message may indicate the PIN ID and may indicate the requested information that may be associated with the PIN.
Zhang et al 20250159589 A1 teaches a methods, systems, and devices for wireless communications are described. A person Internet of Things (IoT) network (PIN) architecture may support configuration and management of a PIN. The PIN architecture may include a first network node configured to establish the PIN, a second network node configured as a network gateway for the PIN, a third network node configured as a network management element for the PIN, and a PINE. The first network node may receive, via a user plane of a network, information from the second network node that triggers the first network node to establish the PIN. The first network node may transmit information that identifies and configures the second network node and the third network node as the network gateway and the network management element, respectively. The second network node may relay communications between the PINE and the network.
Liang et al 20250219837 A1 teaches an information processing method is performed by a first network element, and includes: receiving an operator credential configured by a second network element for a Personal Internet of Things Network Element (PINE); encrypting the operator credential to obtain an encrypted credential; and sending the encrypted credential to the second network element, wherein the encrypted credential is used for a PIN Element with Gateway Capability (PEGC) to perform decryption to obtain the operator credential.
Sharma 20210092597 A1 teaches a method of operating a second network access node comprises configuring the second network access node to act as a secondary network access node for a dual connectivity mode for a terminal device in which a first network access node acts as a master network access node. The method further comprises establishing, while acting as a secondary network access node for the dual connectivity mode, that the second network access node should switch to acting as a master network access node, deriving a new master network access node security key for use by the second network access node when switched to acting as a master network access node for the dual connectivity mode, and configuring the second network access node to act a master network access node for the dual connectivity mode using the new master network access node security key.
Zavesky et al 20210084043 A1 teaches a data and context based role management system comprising: a community, the community including at least one data source having plural roles stored therein, the plural roles including an identity including at least one of a credential, a function, a capability, and a historic response data; a discovery module configured to identify an alert associated with an event requiring a response, the discovery module being further configured to search the community for a responder based on the event, wherein the discovery module is configured to compare a criteria based on the event to the identity associated with each of the plural roles to identify the responder; and when the responder is identified, the community promotes the responder to transform at least one device of the responder to provide at least access to data associated with the event.
Seed et al 20170063931 A1 teaches an extensible policy-based service layer dynamic authorization framework can allow a service layer to determine whether or not to grant or deny a registrant access to a resource or service hosted by the service layer for which the registrant currently lacks the proper privileges to access. This method can also enable a service layer to dynamically update its statically configured authorization privileges (by leveraging its dynamic authorization results) such that future requests from the same registrant and to the same resource and service do not require dynamic authorization to be performed.
Xu CN 119732028 A teaches methods and apparatus for service continuity. A method performed by a first service enabler server includes receiving context information of a second service enabler server from a second service enabler server. The method further includes storing context information of the second service enabler server. The method further includes sending the endpoint information of the first service enabler server to the service enabler client and/or initiating a service impact procedure with the network to request replacement of the endpoint information of the second service enabler server with the endpoint information of the first service enabler server.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to SAKINAH WHITE-TAYLOR whose telephone number is (571)270-0682. The examiner can normally be reached Monday-Friday, 10:45a-6:45p.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, CATHERINE THIAW can be reached at 571-270-1138. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
SAKINAH WHITE-TAYLOR
Primary Examiner
Art Unit 2407
/Sakinah White-Taylor/Primary Examiner, Art Unit 2407