Prosecution Insights
Last updated: April 19, 2026
Application No. 18/874,776

MANAGING ROLE CHANGES IN PERSONAL IOT NETWORKS

Non-Final OA §112
Filed
Dec 13, 2024
Examiner
TAYLOR, SAKINAH W
Art Unit
2407
Tech Center
2400 — Computer Networks
Assignee
Ipla Holdings Inc.
OA Round
1 (Non-Final)
87%
Grant Probability
Favorable
1-2
OA Rounds
2y 8m
To Grant
99%
With Interview

Examiner Intelligence

Grants 87% — above average
87%
Career Allow Rate
316 granted / 365 resolved
+28.6% vs TC avg
Strong +23% interview lift
Without
With
+23.2%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
24 currently pending
Career history
389
Total Applications
across all art units

Statute-Specific Performance

§101
12.0%
-28.0% vs TC avg
§103
53.0%
+13.0% vs TC avg
§102
7.8%
-32.2% vs TC avg
§112
12.0%
-28.0% vs TC avg
Black line = Tech Center average estimate • Based on career data from 365 resolved cases

Office Action

§112
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claims 1-15 have been examined and are pending. Priority Receipt is acknowledged of certified copies of papers required by 37 CFR 1.55. Examiner' s Amendments An examiner's amendment to the record appears below. Should the changes and/or additions be unacceptable to applicant, an amendment may be filed as provided by 37 CFR 1.312. To ensure consideration of such an amendment, it MUST be submitted no later than the payment of the issue fee. Please replace claim 1 with: 3. (Currently Amended) The method of claim 2, wherein the PIN update notification includes an indication of the PIN role change, contact information of the PINE a time duration the PINE [[will]] performs the PEMC functionality, profile information of the PINE, or a combination thereof. Information Disclosure Statement The information disclosure statement (IDS) submitted on 03/20/2025 was filed. The submission is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claim 1 is rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor, or for pre-AIA the applicant regards as the invention. Claim 1 recites the limitation "…initiating, by a Personal IoT Network (PIN) Element with Management Capability (PEMC) of a PIN, a PIN role change procedure; determining, by the PEMC, a PIN element (PINE) to transfer a PEMC functionality to; sending, by the PEMC, a PIN role change request to the PINE" in lines 2, 4, and 6 there appears to be ambiguity with respects to the first and/or second PINE elements; a PIN element (i.e. 1st instance of PINE) with management capability initiate a PIN role change, the management capability (within the 1st PINE) determines a PINE (i.e. must be a second PINE: a PIN element (PINE)) to send a functionality to and sends a role change request to that 2nd instance PINE. It appears that the 2nd instance of “a PINE” should be different from the 1st instance for the claim to make sense; please review and make appropriate corrections. There is insufficient antecedent basis for this limitation in the claim. Dependent claims 2-5 are also rejected under 35 U.S.C. 112, second paragraph, for the same reason addressed above. Allowable Subject Matter Claims 1-5 would be in condition for allowance if the 112(b) was obviated. Claims 6-15 are allowed. Regarding Claim 1, the newly cited closest prior art of record, Sharma et al 20210092597 A1, Zhang et al 20250159589 A1, Liang et al 20250219837 A1 and Zaveksy et al 20210084043 A1 teach a method comprising: [Sharma Fig. 11 {a non-PIN network} and ¶0096 a method of operation in a wireless telecommunication system comprising a terminal device, a first network access node and a second network access node. Zhang ¶0004 improved methods, systems, devices, and apparatuses that support a personal Internet of Things (IoT) network (PIN) architecture with management capability (PEMC), at least one PIN element with gateway capability (PEGC), and at least one PIN element (PINE). Liang Abstract: information processing method is performed by a first network element that include: a Personal Internet of Things Network Element (PINE) and a PIN Element with Gateway Capability (PEGC) to perform decryption to obtain the operator credential ]; initiating, by a Personal IoT Network (PIN) Element with Management Capability (PEMC) of a PIN, a PIN role; [Sharma ¶¶0097 0100 0106 method includes configuring the second network access node to act a master network access node for the dual connectivity mode of operation for the terminal device using the new master network access node security key. Liang ¶¶0067-0068 a device with a management function (PIN Element with Management Capability, PEMC), and an ordinary PINE without gateway and management functions. ¶¶0149 0191 0214 0247 message exchange from first to second/third network element for proposed functions to be reused]; determining, by the PEMC, a PIN element (PINE); [Zaveksy 20210084043 A1 ¶¶0067-0068 a device with a management function (PIN Element with Management Capability, PEMC), and an ordinary PINE without gateway and management functions.]; sending, by the PEMC, request to the PINE; [Zaveksy ¶0024 20210084043 A1 0024 automated method to give or modify roles and take away later (including an audit log of all role transactions in public blockchain). ¶¶0047 and 0049 IoT devices and IoT access. Liang ¶¶0067-0068 a device with a management function (PIN Element with Management Capability, PEMC), and an ordinary PINE without gateway and management functions. ¶¶0149 0191 0214 0247 message exchange from first to second/third network element for proposed functions to be reused]; sending, by the PEMC, a PIN policy notification. [Zhang ¶0119 PIN application server 205 may transmit a registration message 276 to the PEMC 210 (e.g., a registration message 276-a) and/or the PEGC 215 (e.g., a registration message 276-b) that enables nodes to join the PIN; the registration message 276 may include registration information or management policy information. Zaveksy ¶¶0149 0191 0214 and 0247 message exchange from first to second/third network element for proposed functions to be reused]. However, the references Sharma, Zhang, Liang and Zaveksy do not explicitly teach nor suggest in detail, determining, by the PEMC, a PIN element (PINE) to transfer a PEMC functionality to; sending, by the PEMC, a PIN role change request to the PINE; sending, by the PEMC, a PIN policy update notification indicating the PINE performs the PEMC functionality, in view of other limitations of the intervening claims. Regarding Claim 6, the newly cited closest prior art of record, Shi et al 20240314534 A1 and Zaveksy et al 20210084043 A1 teaches a method, comprising: receiving, by a Personal IoT Network (PIN) server and from a wireless transmit/receive unit (WTRU), a request; [Shi et al 20240314534 A1 ¶¶0003 0092 0173 The PDU session establishment accept message, or a PDU session modification command, may be sent to the PEMC. The PIN enabler client may receive the PINEs' PIN bootstrap information from an PIN enabler server; when the PIN enabler server receives a notification that a PINE is linked to the PEMC's subscription. See also ¶¶0073 and 0076. Zaveksy et al 20210084043 A1 ¶¶0067-0068 a device with a management function (PIN Element with Management Capability, PEMC), and an ordinary PINE without gateway and management functions.]; and sending, by the PIN server and to a PIN element (PINE), a PIN; [Shi et al 20240314534 A1 ¶0091 PIN GW and PEGC may be used interchangeably herein. A PEGC may be a PINE that is capable of acting as a gateway in the PIN]. However, the references Shi and Zaveksy do not explicitly teach nor suggest in detail, sending, by the PIN server and to a PIN element (PINE), a PIN role change request indicative of a request for the PINE to perform a PIN Element Management Capability (PEMC) or a PIN Element Gateway Capability (PEGC) functionality; receiving, by the PIN server and from the PINE, a message accepting the PIN role change request; and sending, by the PIN server and to the WTRU, a response to the PIN modification request comprising updated PIN policy information according to the PIN role change, in view of other limitations of the intervening claims. Regarding Claim 11, the newly cited closest prior art of record, Shi et al 20240314534 A1 teaches a method, comprising: determining, by a personal IoT network (PIN) Element Management Capability (PEMC) of a PIN, a PIN Element Gateway Capability (PEGC) of the PIN is not within a coverage area of the PIN; [Shi et al 20240314534 A1 ¶¶0092 0094-0095 a wireless transmit/receive unit (WTRU) may be and/or may comprise a PINE, a PEGC, a PEMC, a combination thereof; where multiple IoT devices may be deployed in a private environment managed by a residential gateway. The Proximity services (ProSe) may be provided by a 3GPP system (e.g., a 5G network) where the ProSe discovery procedure determines if WTRUs are within proximity of each other]. However, the reference Shi do not explicitly teach nor suggest in detail, sending, by the PEMC and to a PIN server, a request for the PIN server to perform a PEGC role change; and receiving, by the PEMC and from the PIN server, a response that a PIN element (PINE) of the PIN is selected to perform PEGC functions for the PIN, in view of other limitations of the intervening claims. Thus the prior arts of record taking singly or in combination do not teach or suggest the above-stated limitations taking wholly in combination with all the elements of each independent claim. Any comments considered necessary by applicant must be submitted no later than the payment of the issue fee and, to avoid processing delays, should preferably accompany the issue fee. Such submissions should be clearly labeled “Comments on Statement of Reasons for Allowance.” Closest prior art of record: Shi et al 20240314534-A1 teaches systems, methods, and instrumentalities may be provided to discover a personal Internet of Things (IoT) network (PIN). A discovery policy configuration information associated with a PIN may be determined. The discovery policy configuration information may comprise a PIN identification (ID) and may indicate that discovery for the PIN may be enabled. A first message may be sent to a second WTRU if discovery for the PIN is enabled. The first message may be based on the discovery policy configuration information and may indicate the PIN ID. A second message may be received from the second WTRU. The second message may indicate the PIN ID and may indicate a request for information associated with the PIN. A third message may be sent to the second WTRU. The third message may indicate the PIN ID and may indicate the requested information that may be associated with the PIN. Zhang et al 20250159589 A1 teaches a methods, systems, and devices for wireless communications are described. A person Internet of Things (IoT) network (PIN) architecture may support configuration and management of a PIN. The PIN architecture may include a first network node configured to establish the PIN, a second network node configured as a network gateway for the PIN, a third network node configured as a network management element for the PIN, and a PINE. The first network node may receive, via a user plane of a network, information from the second network node that triggers the first network node to establish the PIN. The first network node may transmit information that identifies and configures the second network node and the third network node as the network gateway and the network management element, respectively. The second network node may relay communications between the PINE and the network. Liang et al 20250219837 A1 teaches an information processing method is performed by a first network element, and includes: receiving an operator credential configured by a second network element for a Personal Internet of Things Network Element (PINE); encrypting the operator credential to obtain an encrypted credential; and sending the encrypted credential to the second network element, wherein the encrypted credential is used for a PIN Element with Gateway Capability (PEGC) to perform decryption to obtain the operator credential. Sharma 20210092597 A1 teaches a method of operating a second network access node comprises configuring the second network access node to act as a secondary network access node for a dual connectivity mode for a terminal device in which a first network access node acts as a master network access node. The method further comprises establishing, while acting as a secondary network access node for the dual connectivity mode, that the second network access node should switch to acting as a master network access node, deriving a new master network access node security key for use by the second network access node when switched to acting as a master network access node for the dual connectivity mode, and configuring the second network access node to act a master network access node for the dual connectivity mode using the new master network access node security key. Zavesky et al 20210084043 A1 teaches a data and context based role management system comprising: a community, the community including at least one data source having plural roles stored therein, the plural roles including an identity including at least one of a credential, a function, a capability, and a historic response data; a discovery module configured to identify an alert associated with an event requiring a response, the discovery module being further configured to search the community for a responder based on the event, wherein the discovery module is configured to compare a criteria based on the event to the identity associated with each of the plural roles to identify the responder; and when the responder is identified, the community promotes the responder to transform at least one device of the responder to provide at least access to data associated with the event. Seed et al 20170063931 A1 teaches an extensible policy-based service layer dynamic authorization framework can allow a service layer to determine whether or not to grant or deny a registrant access to a resource or service hosted by the service layer for which the registrant currently lacks the proper privileges to access. This method can also enable a service layer to dynamically update its statically configured authorization privileges (by leveraging its dynamic authorization results) such that future requests from the same registrant and to the same resource and service do not require dynamic authorization to be performed. Xu CN 119732028 A teaches methods and apparatus for service continuity. A method performed by a first service enabler server includes receiving context information of a second service enabler server from a second service enabler server. The method further includes storing context information of the second service enabler server. The method further includes sending the endpoint information of the first service enabler server to the service enabler client and/or initiating a service impact procedure with the network to request replacement of the endpoint information of the second service enabler server with the endpoint information of the first service enabler server. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to SAKINAH WHITE-TAYLOR whose telephone number is (571)270-0682. The examiner can normally be reached Monday-Friday, 10:45a-6:45p. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, CATHERINE THIAW can be reached at 571-270-1138. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. SAKINAH WHITE-TAYLOR Primary Examiner Art Unit 2407 /Sakinah White-Taylor/Primary Examiner, Art Unit 2407
Read full office action

Prosecution Timeline

Dec 13, 2024
Application Filed
Mar 16, 2026
Non-Final Rejection — §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12592964
SYSTEMS AND METHODS FOR EFFICIENTLY PROCESSING COMMUNICATIONS FOR MALICIOUS HYPERLINKS
2y 5m to grant Granted Mar 31, 2026
Patent 12585828
INJECTABLE HARDWARE AND SOFTWARE ATTESTATION OF SENSORY INPUT DATA
2y 5m to grant Granted Mar 24, 2026
Patent 12580959
Counter Adversary Large Language Models
2y 5m to grant Granted Mar 17, 2026
Patent 12563065
MONITORING AND PREVENTING SPOOFING, TAMPERING, AND DENIAL OF SERVICE ATTACKS ON CLOUD CONTAINERS
2y 5m to grant Granted Feb 24, 2026
Patent 12563080
ATTACK ESTIMATION VERIFICATION DEVICE, ATTACK ESTIMATION VERIFICATION METHOD, AND STORAGE MEDIUM STORING ATTACK ESTIMATION VERIFICATION PROGRAM
2y 5m to grant Granted Feb 24, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
87%
Grant Probability
99%
With Interview (+23.2%)
2y 8m
Median Time to Grant
Low
PTA Risk
Based on 365 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month