DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claim Status
This Office Action is in response to communications filed on 9/11/2024. Claims 1-20 are pending for examination.
Claim Rejections - 35 USC § 102
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action:
A person shall be entitled to a patent unless –
(a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention.
Claims 1-11, 15--20 are rejected under 35 U.S.C. 102(a)(1) as being anticipated by unpatentable over Jakes et al. (U.S. Patent Application Pub. U.S. 2022/0301369).
Regarding claim 1, Jakes teaches a method for enabling unlocking an ultra-wide band (UWB) device in a communication system (para. 003; techniques for unlocking a lock on a device based on ultra-wideband (UWB) location tracking), comprising:
receiving a set of location parameters from a user (par. 003; . track a location of a second device different from the first device using one or more UWB signals received from the second device via the UWB transceiver.", par. 047; ...an ultra-wideband (UWB) transceiver 191 configured to transmit and receive data using UWB signals and UWB communication protocol(s)...);
determining an unlockable range based on the set of location parameters and a map (par. 027; ...UWB-enabled devices such as smartphones with UWB transceivers may be used to not only validate that an authorized user is present in proximity to the locking device, but that the user is at a specific expected position such as at the keyboard for the locking device when activating the locking device...", par. 048];...various UWB algorithms, time difference of arrival (TDoA) algorithms, and/or angle of arrival (AoA) algorithms may be used for system 100 to determine the distance to and location of another UWB transceiver on another device that is in communication with the UWB transceiver on the system 100 to thus track the real-time location of the other device.", see also par. 054;:...the device 306 (or phone 304) determines that the phone 304 has entered a predetermined area 310 in front of the device 306, the device 306 may unlock the hardware lock 309...", see also par. 084; ...determine a bearing 806 to a second device 804 using UWB signal exchange, which may be accurate to plus/minus three degrees 808 or even less. Depth (distance) between the first device 802 and second device 804 may also be determined using UWB to plus/minus ten centimeters 810 or even less.", see also fig. 3 and 8);
receiving, in a lock mode, one or more location-indicative signals from an infrastructure of the communication system (par. 053; an end-user 302 is holding his or her smartphone 304 in one hand while walking toward a device 306 that is sitting on a table 308 and has a hardware lock 309 such as a UWB-enabled smart door lock, deadbolt lock, barrel bolt lock, cam lock, or padlock. Based on UWB signals transmitted by the phone 304 to the device 306...track the location of the phone 304 in real time using UWB as the phone 304 moves about the environment to determine whether to unlock the lock 309.", see also par. 084; ..the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles);
computing a self-position on the map based on the one or more location-indicative signals (see citations above, particularly, par. 027; …not only validate that an authorized user is present in proximity to the locking device, but that the user is at a specific expected position...", see also par. 055; ...only when the user 302 approaches the device 306 from a particular direction relative to the front of the device 306 and enters the three-dimensional cone-shaped area 310 does the device 306 unlock its hardware lock 309.", see also par. 083; ...the first device has locked its hardware lock. Accordingly, as shown the GUI 700 may include a prompt 702 indicating that the first device has locked its hardware lock...Orientation of the other device may also be determined based on UWB location tracking itself as the first device might determine based on the angle of arrival of UWB signals from the other device and the known location of UWB transceiver on the other device.", determine par. 084; "So, for example, whether the second device the device 802 may 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles.", see also fig. 7 and 8); and
determining whether the self-position is within the unlockable range (par.
027; These things may be done based on use of UWB by the locking device to detect both direction and distance to the user's personal device such as their smartphone.", par.048; ...track the real-time location of the other device.", see also par. 056; ...using UWB location tracking, the device 306 may track the real-time current location of the phone 304 to identify a motion vector from the smartphone 304 toward the device 306 that indicates motion of the phone 304 with respect to the front of the device 306 bearing the lock 309.", see also par. 084; "So, for example, the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles.", see also fig. 7 and 8).
Regarding claim 2, Jakes teaches the method of claim 1, and Jakes further teaches comprising, in response to the self-position being in the unlockable range, obtaining, in the lock mode, a distance from a second UWB device (par. 003, 047-048).
Regarding claim 3, Jakes teaches the method of claim 2, and Jakes further teaches wherein the obtaining of the distance from the second UWB device comprises: transmitting an uplink time-difference of arrival (UL-TDoA) signal to an infrastructure; and receiving the distance from the infrastructure (par. 048).
Regarding claim 4, Jakes teaches the method of claim 3, and Jakes further teaches wherein the obtaining of the distance from the second UWB device comprises computing the distance using Bluetooth ranging (par. 048, 068).
Regarding claim 5, Jakes teaches the method of claim 2, and Jakes further teaches further comprising: in response to the distance being less than a predetermined activation distance that is less than the unlockable range, entering an activation mode by displaying non-confidential features on a locked screen (par. 084).
Regarding claim 6, Jakes teaches the method of claim 5, and Jakes further teaches comprising turning on at least one of Bluetooth, UWB, or an angle-of-arrival (AoA) (par. 048, 068, 083).
Regarding claim 7, Jakes teaches the method of claim 6, and Jakes further teaches comprising: monitoring the distance or a relative angular position of the second UWB device using the at least one of Bluetooth, UWB, or AoA; and in response to the distance being less than a predetermined unlock distance, entering an unlock mode by unlocking non-confidential features and confidential features (Fig 7 with par. 048, 068, 083).
Regarding claim 8, Jakes teaches the method of claim 5, and Jakes further teaches comprising: receiving, from the user, a set of second location parameters corresponding to an unlock perimeter; determining, in the activation mode, whether the second UWB device is within the unlock perimeter using at least one of the Bluetooth, UWB, or AoA;in response to the second UWB device being within the unlock perimeter, entering an unlock mode by unlocking the locked screen; and in response to the second UWB device being beyond the unlock perimeter, maintaining the activation mode (Figs 3, 7 & 8, with par. 048, 083-084).
Regarding claim 9, Jakes teaches the method of claim 8, and Jakes further teaches wherein the set of second location parameters comprise an unlock distance range and an unlock angle (Fig 8, with par. 048, 083-084).
Regarding claim 10, Jakes teaches the method of claim 6, and Jakes further teaches comprising: receiving, from the user, a set of configuration parameters corresponding to a trigger movement and a time period; determining, in the activation mode, whether the trigger movement is received in the time period (par. 053-056).; in response to receiving the trigger movement in the time period, entering an unlock mode by unlocking the locked screen; and in response to not receiving the trigger movement in the time period, maintaining the activation mode (par. 083-084)..
Regarding claim 11, Jakes teaches the method of claim 10, w and Jakes further teaches wherein the trigger movement comprises physical contact from the user (par. 053-056).
Regarding claim 15, Jakes teaches the method of claim 1, and Jakes further teaches comprising, in response to the self-position being beyond the unlockable range, maintaining the lock mode (Figs 3, 7 & 8, with par. 048, 083-084).
Regarding claim 16, Jakes teaches a method for enabling unlocking an ultra-wide band (UWB) device in a communication system (para. 003; techniques for unlocking a lock on a device based on ultra-wideband (UWB) location tracking), comprising:
receiving a first signal indicating a first location of a first ultra-wideband (UWB) device (par. 053; an end-user 302 is holding his or her smartphone 304 in one hand while walking toward a device 306 that is sitting on a table 308 and has a hardware lock 309 such as a UWB-enabled smart door lock, deadbolt lock, barrel bolt lock, cam lock, or padlock. Based on UWB signals transmitted by the phone 304 to the device 306...track the location of the phone 304 in real time using UWB as the phone 304 moves about the environment to determine whether to unlock the lock 309.", see also par. 084; ..the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles); and a second signal indicating a second location of a second UWB device (par. 003, 027, 048, 083-084);
determining a distance between the first UWB device and the second UWB device based on the first signal and the second signal (par. 027; ...UWB-enabled devices such as smartphones with UWB transceivers may be used to not only validate that an authorized user is present in proximity to the locking device, but that the user is at a specific expected position such as at the keyboard for the locking device when activating the locking device...", par. 048];...various UWB algorithms, time difference of arrival (TDoA) algorithms, and/or angle of arrival (AoA) algorithms may be used for system 100 to determine the distance to and location of another UWB transceiver on another device that is in communication with the UWB transceiver on the system 100 to thus track the real-time location of the other device.", see also par. 054;:...the device 306 (or phone 304) determines that the phone 304 has entered a predetermined area 310 in front of the device 306, the device 306 may unlock the hardware lock 309...", see also par. 084; ...determine a bearing 806 to a second device 804 using UWB signal exchange, which may be accurate to plus/minus three degrees 808 or even less. Depth (distance) between the first device 802 and second device 804 may also be determined using UWB to plus/minus ten centimeters 810 or even less.", see also fig. 3 and 8); and
in response to the distance being less than a predetermined activation range, transmitting respective signals to the first UWB device and the second UWB device to turn on at least one of Bluetooth or UWB (par.027; These things may be done based on use of UWB by the locking device to detect both direction and distance to the user's personal device such as their smartphone.", par.048; ...track the real-time location of the other device.", see also par. 056; ...using UWB location tracking, the device 306 may track the real-time current location of the phone 304 to identify a motion vector from the smartphone 304 toward the device 306 that indicates motion of the phone 304 with respect to the front of the device 306 bearing the lock 309.", see also par. 084; "So, for example, the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles.", see also fig. 7 and 8).
Regarding claim 17, Jakes teaches the method of claim 16, and Jakes further teaches wherein the first signal comprises time of flight (TOF) information of the first UWB device, and the second signal comprises TOF information of the second UWB device (par. 048];...various UWB algorithms, time difference of arrival (TDoA) algorithms, and/or angle of arrival (AoA) algorithms may be used for system 100 to determine the distance to and location of another UWB transceiver on another device that is in communication with the UWB transceiver on the system 100 to thus track the real-time location of the other device.").
Regarding claim 18, Jakes teaches a ultra-wideband (UWB) device (para. 003; techniques for unlocking a lock on a device based on ultra-wideband (UWB) location tracking), comprising:
a transceiver operable to perform a UWB communication (par. 053; an end-user 302 is holding his or her smartphone 304 in one hand while walking toward a device 306 that is sitting on a table 308 and has a hardware lock 309 such as a UWB-enabled smart door lock, deadbolt lock, barrel bolt lock, cam lock, or padlock. Based on UWB signals transmitted by the phone 304 to the device 306...track the location of the phone 304 in real time using UWB as the phone 304 moves about the environment to determine whether to unlock the lock 309.", see also par. 084; ..the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles);
a memory (Fig 1) for storing program instructions, a map of an area covered by a wireless network, a table of strengths of WiFi signals in the area, distances, angle-of-arrivals, and device information from the ranging operations (par. 003, 027, 048, 083-084); and
a processor (Fig 1) coupled to the transceiver and to the memory (see (Fig 1) for connections also), wherein the processor is operable to execute the program instructions, which, when executed by the processor, cause the UWB device to perform the following operations to enable unlocking the UWB device in the wireless local network (para. 003; techniques for unlocking a lock on a device based on ultra-wideband (UWB) location tracking):
receiving a set of location parameters from a user (par. 053; an end-user 302 is holding his or her smartphone 304 in one hand while walking toward a device 306 that is sitting on a table 308 and has a hardware lock 309 such as a UWB-enabled smart door lock, deadbolt lock, barrel bolt lock, cam lock, or padlock. Based on UWB signals transmitted by the phone 304 to the device 306...track the location of the phone 304 in real time using UWB as the phone 304 moves about the environment to determine whether to unlock the lock 309.", see also par. 084; ..the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles);
determining an unlockable range based on the set of location parameters and a map (par. 027; ...UWB-enabled devices such as smartphones with UWB transceivers may be used to not only validate that an authorized user is present in proximity to the locking device, but that the user is at a specific expected position such as at the keyboard for the locking device when activating the locking device...", par. 048];...various UWB algorithms, time difference of arrival (TDoA) algorithms, and/or angle of arrival (AoA) algorithms may be used for system 100 to determine the distance to and location of another UWB transceiver on another device that is in communication with the UWB transceiver on the system 100 to thus track the real-time location of the other device.", see also par. 054;:...the device 306 (or phone 304) determines that the phone 304 has entered a predetermined area 310 in front of the device 306, the device 306 may unlock the hardware lock 309...", see also par. 084; ...determine a bearing 806 to a second device 804 using UWB signal exchange, which may be accurate to plus/minus three degrees 808 or even less. Depth (distance) between the first device 802 and second device 804 may also be determined using UWB to plus/minus ten centimeters 810 or even less.", see also fig. 3 and 8);
receiving, in a lock mode, one or more location-indicative signals from an infrastructure of the communication system (par. 053; an end-user 302 is holding his or her smartphone 304 in one hand while walking toward a device 306 that is sitting on a table 308 and has a hardware lock 309 such as a UWB-enabled smart door lock, deadbolt lock, barrel bolt lock, cam lock, or padlock. Based on UWB signals transmitted by the phone 304 to the device 306...track the location of the phone 304 in real time using UWB as the phone 304 moves about the environment to determine whether to unlock the lock 309.", see also par. 084; ..the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles);
computing a self-position on the map based on the one or more location-indicative signals (see citations above, particularly, par. 027; …not only validate that an authorized user is present in proximity to the locking device, but that the user is at a specific expected position...", see also par. 055; ...only when the user 302 approaches the device 306 from a particular direction relative to the front of the device 306 and enters the three-dimensional cone-shaped area 310 does the device 306 unlock its hardware lock 309.", see also par. 083; ...the first device has locked its hardware lock. Accordingly, as shown the GUI 700 may include a prompt 702 indicating that the first device has locked its hardware lock...Orientation of the other device may also be determined based on UWB location tracking itself as the first device might determine based on the angle of arrival of UWB signals from the other device and the known location of UWB transceiver on the other device.", determine par. 084; "So, for example, whether the second device the device 802 may 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles.", see also fig. 7 and 8); and
determining whether the self-position is within the unlockable range (par.
027; These things may be done based on use of UWB by the locking device to detect both direction and distance to the user's personal device such as their smartphone.", par.048; ...track the real-time location of the other device.", see also par. 056; ...using UWB location tracking, the device 306 may track the real-time current location of the phone 304 to identify a motion vector from the smartphone 304 toward the device 306 that indicates motion of the phone 304 with respect to the front of the device 306 bearing the lock 309.", see also par. 084; "So, for example, the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles.", see also fig. 7 and 8).
Regarding claim 19, Jakes teaches the UWB device of claim 18, and Jakes further teaches wherein the operations further comprise, in response to the self-position being in the unlockable range, obtaining, in the lock mode, a distance from a second UWB device (par. 003, 047-048).
Regarding claim 20, Jakes teaches the UWB device of claim 19, and Jakes further teaches wherein the obtaining of the distance from the second UWB device comprises: transmitting an uplink time-difference of arrival (UL-TDoA) signal to an infrastructure; and receiving the distance from the infrastructure (par. 048).
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows:
1. Determining the scope and contents of the prior art.
2. Ascertaining the differences between the prior art and the claims at issue.
3. Resolving the level of ordinary skill in the pertinent art.
4. Considering objective evidence present in the application indicating obviousness or nonobviousness.
This application currently names joint inventors. In considering patentability of the claims the examiner presumes that the subject matter of the various claims was commonly owned as of the effective filing date of the claimed invention(s) absent any evidence to the contrary. Applicant is advised of the obligation under 37 CFR 1.56 to point out the inventor and effective filing dates of each claim that was not commonly owned as of the effective filing date of the later invention in order for the examiner to consider the applicability of 35 U.S.C. 102(b)(2)(C) for any potential 35 U.S.C. 102(a)(2) prior art against the later invention.
Claims 12 is rejected under 35 U.S.C. 103 as being unpatentable over Jakes et al. (U.S. Patent Application Pub. U.S. 2022/0301369) in view of Markhovsky et al. (EP 2739986)
Regarding claim 12, Jakes teaches the method of claim 1, but Jakes is silent on claim 12. Markhovsky from an analogous art teaches the concept wherein:the one or more location-indicative signals comprise a plurality of downlink-time difference of arrival (DL-TDoA) signals; and the computing of the self-position comprises performing trilateration on the plurality of DL-TDoA signals with respect to the map (par. 027, 320, 345).
Therefore, it would have been obvious for one of ordinary skill in the art at the time of filing the invention to combine the method of Jakes with the concept wherein: the one or more location-indicative signals comprise a plurality of downlink-time difference of arrival (DL-TDoA) signals; and the computing of the self-position comprises performing trilateration on the plurality of DL-TDoA signals with respect to the map, as taught by Markhovsky in order for performing trilateration on signals.
Claims 13-14 are rejected under 35 U.S.C. 103 as being unpatentable over Jakes et al. (U.S. Patent Application Pub. U.S. 2022/0301369) in view of Lee et al. (U.S. Patent Application Pub. U.S. US 20190239078).
Regarding claim 13, Jakes teaches the method of claim 1, but Jakes is silent on claim 13. Lee from an analogous art teaches the concept wherein: the one or more location-indicative signals comprise a plurality of WiFi signals; and the computing of the self-position comprises comparing strengths of the plurality of WiFi signals with a pre-recorded signal strength table to determine the self-position with respect to the map (par. 092).
Therefore, it would have been obvious for one of ordinary skill in the art at the time of filing the invention to combine the method of Jakes with the concept wherein: the one or more location-indicative signals comprise a plurality of WiFi signals; and the computing of the self-position comprises comparing strengths of the plurality of WiFi signals with a pre-recorded signal strength table to determine the self-position with respect to the map, as taught by Lee in order for an executing screen of a predetermined application, or a predetermined image to be displayed on the display.
Regarding claim 14, Jakes teaches the method of claim 1, and Jakes further teaches wherein: the one or more location-indicative signals comprise a WiFi signal or a cellular signal that comprises an IP address see also par. 054:...the device 306 determines that the phone 304 has entered a predetermined area 310 in front of the device 306.
Jakes is silent on and the computing of the self-location comprises determining the self-location based on the IP address. Lee from an analogous art teaches the concept wherein the computing of the self-location comprises determining the self-location based on the IP address (par. 082; If there is no designated wireless device, a wireless device (or ID information of the wireless device) corresponding to the screen unlock mode using a wireless device 1540 may be designated via the UI 1650. For example, the UI 1650 may display a list of arbitrary names or the purposes 1655 respectively corresponding to ID information of at least one wireless device detected by the mobile terminal 100. An arbitrary name may be allocated to a wireless device based on the user input 1660 or a purpose (e.g., ID TAG) corresponding to the wireless device (or ID information of the wireless device) may be allocated to the wireless device. Here, the ID information is unique information for distinguishing a wireless device from other devices and may include a tag ID, a device name, a serial number, a Media Access Control (MAC) address, etc., for example. The arbitrary name or the purpose 1715 may be arbitrarily designated or named by a user or an application using a corresponding wireless device, such that the mobile terminal 100 distinguishes detected wireless devices from one another. For example, the ‘ID TAG’ may be designated from among purposes provided by a UI based on a user input in consideration of purposes related to personal information for controlling screen lock or security. Furthermore, for convenience, wireless devices may be distinguished from one another by different colors, patterns, icons, texts, etc. For example, even if different wireless devices detected by the mobile terminal 100 are categorized into a same purpose, the mobile terminal 100 may display wireless devices having different ID information by using different visual effects or texts).
Therefore, it would have been obvious for one of ordinary skill in the art at the time of filing the invention to combine the method of Jakes with the concept wherein the computing of the self-location comprises determining the self-location based on the IP address, as taught by Lee in order for distinguishing a wireless device from other devices.
Conclusion
The prior art made of record and not relied upon is considered pertinent to Applicant's disclosure.
Golsch et al. (U.S. Patent Application Pub. U.S. 2023/0234538), teaches a sensor configured to receive connection information from a portable device via a communication gateway in a vehicle and to communicate with a portable device using impulse radio (IR) ultra-wide band (UWB) communication based on the connection information. A location of the portable device is determined based on ranging using IR UWB communication.
Any inquiry concerning this communication or earlier communications from the examiner should be directed to MANCIL H LITTLEJOHN JR whose telephone number is (571)270-3718. The examiner can normally be reached M-F 8:30-5 (CST).
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Quan-Zhen Wang can be reached at (571) 272-3114. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/MANCIL LITTLEJOHN JR/Examiner, Art Unit 2685
/QUAN ZHEN WANG/Supervisory Patent Examiner, Art Unit 2685