DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claims 1-18 have been presented for examination and are rejected.
Information Disclosure Statement
The information disclosure statements (IDS) submitted on 09/22/2024. The submission is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner.
Double Patenting
A rejection based on double patenting of the “same invention” type finds its support in the language of 35 U.S.C. 101 which states that “whoever invents or discovers any new and useful process... may obtain a patent therefor...” (Emphasis added). Thus, the term “same invention,” in this context, means an invention drawn to identical subject matter. See Miller v. Eagle Mfg. Co., 151 U.S. 186 (1894); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); In re Ockert, 245 F.2d 467, 114 USPQ 330 (CCPA 1957).
A statutory type (35 U.S.C. 101) double patenting rejection can be overcome by canceling or amending the claims that are directed to the same invention so they are no longer coextensive in scope. The filing of a terminal disclaimer cannot overcome a double patenting rejection based upon 35 U.S.C. 101.
The USPTO internet Web site contains terminal disclaimer forms which may be used. Please visit http://www.uspto.gov/forms/. The filing date of the application will determine what form should be used. A web-based eTerminal Disclaimer may be filled out completely online using web-screens. An eTerminal Disclaimer that meets all requirements is auto-processed and approved immediately upon submission. For more information about eTerminal Disclaimers, refer to http://www.uspto.gov/patents/process/file/efs/guidance/eTD-info-I.jsp.
Claims 1-18 are rejected under 35 U.S.C. 101 as claiming the same invention as that of claims 1-20 of prior U.S. Patent No. US 12101325, hereinafter ‘325. This is a statutory double patenting rejection since the claims directed to the same invention have not in fact been patented.
The Instant application - 18/890,227
Patent No.- US 12101325
Claim 1. A method, comprising:
receiving, with a computing system and from a first user, a request to access at least one network-accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identifying, with the computing system, a user identification associated with the first user;
determining, with the computing system, whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network-accessible resource, denying, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 1. A method, comprising:
receiving, with a computing system and from a first user, a request to access at least one network-accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identifying, with the computing system, a user identification associated with the first user;
determining, with the computing system, whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network-accessible resource, denying, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 2. The method of claim 1, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 2. The method of claim 1, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 3. The method of claim 1, wherein the at least one network-accessible resource associated with the second user each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of 38 things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 3. The method of claim 1, wherein the at least one network-accessible resource associated with the second user each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of 38 things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 4. The method of claim 3, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 4. The method of claim 3, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 5. The method of claim 3, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network- accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 5. The method of claim 3, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network- accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 6. The method of claim 1, further comprising:
receiving, with the computing system and from the second user, one or more instructions to set, modify, or update the at least one resource record associated with the second user to set, modify, or update use permissions for the one or more resources associated with the second user.
Claim 6. The method of claim 1, further comprising:
receiving, with the computing system and from the second user, one or more instructions to set, modify, or update the at least one resource record associated with the second user to set, modify, or update use permissions for the one or more resources associated with the second user.
Claim 7. The method of claim 1, wherein providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access to the at least one network-accessible resource associated with the second user, based at least in part on configuration settings provided by the second user.
Claim 8. The method of claim 1, wherein providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access to the at least one network-accessible resource associated with the second user, based at least in part on configuration settings provided by the second user.
Claim 8. The method of claim 1, wherein providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user comprises: providing, with a host computing system, the first user with access and control of a wireless service set identifier ("SSID") for the at least one network-accessible resource, the wireless SSID having been previously setup by the second user as enabled by the host computing system, wherein the wireless SSID enables the user to access and control the at least one network-accessible resource.
Claim 9. The method of claim 1, wherein providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access and control of a wireless service set identifier ("SSID") for the at least one network- accessible resource, the wireless SSID having been previously setup by the second user as enabled by the host computing system, wherein the wireless SSID enables the user to access and control the at least one network- accessible resource.
Claim 9. An apparatus, comprising:
at least one processor; and
a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to:
receive, from a first user, a request to access at least one network- accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identify at least one of a user identification associated with the first user;
determine whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, provide the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network-accessible resource, deny, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 10. An apparatus, comprising:
at least one processor; and
a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to:
receive, from a first user, a request to access at least one network- accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identify at least one of a user identification associated with the first user;
determine whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, provide the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network-accessible resource, deny, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 10. The apparatus of claim 10, wherein the apparatus comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 11. The apparatus of claim 10, wherein the apparatus comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 11. The apparatus of claim 10, wherein the at least one network-accessible resource associated with the customer each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 12. The apparatus of claim 10, wherein the at least one network-accessible resource associated with the customer each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 12. The apparatus of claim 12, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 13. The apparatus of claim 12, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 13. The apparatus of claim 12, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network-accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 14. The apparatus of claim 12, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network-accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 14. The apparatus of claim 10, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to:
receive, from the second user of the service provider, one or more instructions to set, modify, or update the at least one resource record associated with the second user to set, modify, or update use permissions for the one or more resources associated with the second user.
Claim 15. The apparatus of claim 10, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to:
receive, from the second user of the service provider, one or more instructions to set, modify, or update the at least one resource record associated with the second user to set, modify, or update use permissions for the one or more resources associated with the second user.
Claim 15. The apparatus of claim 10, wherein providing the first user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access to the at least one network-accessible resource associated with the second user, based at least in part on configuration settings provided by the second user.
Claim 17. The apparatus of claim 10, wherein providing the first user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access to the at least one network-accessible resource associated with the second user, based at least in part on configuration settings provided by the second user.
Claim 16. The apparatus of claim 10, wherein providing the user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access and control of a wireless service set identifier ("SSID") for the at least one network- accessible resource, the wireless SSID having been previously setup by the customer as enabled by the host computing system, wherein the wireless SSID enables the first user to access and control the at least one network-accessible resource.
Claim 18. The apparatus of claim 10, wherein providing the user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access and control of a wireless service set identifier ("SSID") for the at least one network- accessible resource, the wireless SSID having been previously setup by the customer as enabled by the host computing system, wherein the wireless SSID enables the first user to access and control the at least one network-accessible resource.
Claim 17. A system, comprising: a computing system, comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to:
receive, from a first user, a request to access at least one network- accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identify at least one of a user identification associated with the first user;
determine whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, provide the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network- accessible resource, deny, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 19. A system, comprising: a computing system, comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to:
receive, from a first user, a request to access at least one network- accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identify at least one of a user identification associated with the first user;
determine whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, provide the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network- accessible resource, deny, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 18. The system of claim 19, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 20. The system of claim 19, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
The nonstatutory double patenting rejection is based on a judicially created doctrine grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or improper timewise extension of the “right to exclude” granted by a patent and to prevent possible harassment by multiple assignees. A nonstatutory double patenting rejection is appropriate where the claims at issue are not identical, but at least one examined application claim is not patentably distinct from the reference claim(s) because the examined application claim is either anticipated by, or would have been obvious over, the reference claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); and In re Thorington, 418 F.2d 528, 163 USPQ 644 (CCPA 1969).
A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may be used to overcome an actual or provisional rejection based on a nonstatutory double patenting ground provided the reference application or patent either is shown to be commonly owned with this application, or claims an invention made as a result of activities undertaken within the scope of a joint research agreement. A terminal disclaimer must be signed in compliance with 37 CFR 1.321(b).
The USPTO internet Web site contains terminal disclaimer forms which may be used. Please visit http://www.uspto.gov/forms/. The filing date of the application will determine what form should be used. A web-based eTerminal Disclaimer may be filled out completely online using web-screens. An eTerminal Disclaimer that meets all requirements is auto-processed and approved immediately upon submission. For more information about eTerminal Disclaimers, refer to http://www.uspto.gov/patents/process/file/efs/guidance/eTD-info-I.jsp.
Claims 1- 18 are rejected on the ground of nonstatutory double patenting as being unpatentable over claim 1 of U.S. Patent No. 11757889 hereinafter ‘889. Although the claims at issue are not identical, they are not patentably distinct from each other because claim 1 of the present application is an obvious variation of claim 1 of patent ‘889. The difference between the instant application and the patent ‘889 is, the instant application discloses additional elements, “substituting a customer of a service provider for a second user as claimed” would be an obvious variation in the claims for the purpose of achieving the same end results.
Similar reasoning applies to claims 9 and 17 of the instant application. See, the table below which shows both application claims on limitation bases.
Please see the table below that provides a mapping between the limitations of the present application and the patent ‘889 above.
The Instant application - 18/890,227
Patent No.- US 11757889
Claim 1. A method, comprising:
receiving, with a computing system and from a first user, a request to access at least one network-accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identifying, with the computing system, a user identification associated with the first user;
determining, with the computing system, whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network-accessible resource, denying, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 1. A method, comprising:
receiving, with a computing system and from a user, a request to access at least one network-accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer;
identifying, with the computing system, at least one of a user identification associated with the user, a company represented by the user, or a class of user associated with the user;
determining, with the computing system, whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based at least in part on the identified at least one of the user identification associated with the user, the company represented by the user, or the class of user associated with the user;
based on a determination that the at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, providing, with the computing system, the user with access to the at least one network-accessible resource associated with the customer; and
based on a determination that the at least one resource record associated with the customer indicates that the user does not have permission to access the at least one network-accessible resource, denying, to the user, access to the at least one network-accessible resource associated with the customer.
Claim 2. The method of claim 1, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 2. The method of claim 1, wherein the computing system comprises one of a gateway device, an Internet of things (“IoT”) gateway device, a host device, a host computing system, a host server system, a customer resource use as a service (“CRUaaS”) platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service (“IaaS”) platform, or a distributed computing system.
Claim 3. The method of claim 1, wherein the at least one network-accessible resource associated with the second user each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of 38 things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 3. The method of claim 1, wherein the at least one network-accessible 2 resource associated with the customer each comprises one or more of at least one network 3 resource, at least one edge network resource, at least one compute resource, at least one 4 data storage resource, at least one telemetry resource, at least one Internet of things (“IoT”) resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 4. The method of claim 3, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 4. The method of claim 3, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 5. The method of claim 3, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network- accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 5. The method of claim 3, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network- accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 6. The method of claim 1, further comprising:
receiving, with the computing system and from the second user, one or more instructions to set, modify, or update the at least one resource record associated with the second user to set, modify, or update use permissions for the one or more resources associated with the second user.
Claim 6. The method of claim 1, further comprising: receiving, with the computing system and from the customer of the service provider, one or more instructions to set, modify, or update the at least one resource record associated with the customer to set, modify, or update use permissions for the one or more resources associated with the customer.
Claim 7. The method of claim 1, wherein providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access to the at least one network-accessible resource associated with the second user, based at least in part on configuration settings provided by the second user.
Claim 8. The method of claim 1, wherein providing, with the computing system, the user with access to the at least one network-accessible resource associated with the customer comprises: providing, with a host computing system, the user with access to the at least one network-accessible resource associated with the customer, based at least in part on configuration settings provided by the customer.
Claim 8. The method of claim 1, wherein providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access and control of a wireless service set identifier ("SSID") for the at least one network- accessible resource, the wireless SSID having been previously setup by the second user as enabled by the host computing system, wherein the wireless SSID enables the user to access and control the at least one network- accessible resource.
Claim 9. The method of claim 1, wherein providing, with the computing system, the user with access to the at least one network-accessible resource associated with the customer comprises:
providing, with a host computing system, the user with access and control of a wireless service set identifier (“SSID”) for the at least one network-accessible resource, the wireless SSID having been previously setup by the customer as enabled by the host computing system, wherein the wireless SSID enables the user to access and control the at least one network-accessible resource.
Claim 9. An apparatus, comprising:
at least one processor; and
a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to:
receive, from a first user, a request to access at least one network- accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identify at least one of a user identification associated with the first user;
determine whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, provide the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network-accessible resource, deny, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 10. An apparatus, comprising:
at least one processor; and
a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to:
receive, from a user, a request to access at least one network-accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer;
identify at least one of a user identification associated with the user, a company represented by the user, or a class of user associated with the user;
determine whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based at least in part on the identified at least one of the user identification associated with the user, the company represented by the user, or the class of user associated with the user;
based on a determination that the at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, provide the user with access to the at least one network-accessible resource associated with the customer; and
based on a determination that the at least one resource record associated with the customer indicates that the user does not have permission to access the at least one network-accessible resource, deny, to the user, access to the at least one network-accessible resource associated with the customer.
Claim 10. The apparatus of claim 10, wherein the apparatus comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 11. The apparatus of claim 10, wherein the apparatus comprises one of a gateway device, an Internet of things (“IoT”) gateway device, a host device, a host computing system, a host server system, a customer resource use as a service (“CRUaaS”) platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service (“IaaS”) platform, or a 6 distributed computing system.
Claim 11. The apparatus of claim 10, wherein the at least one network-accessible resource associated with the customer each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 12. The apparatus of claim 10, wherein the at least one network-accessible resource associated with the customer each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 12. The apparatus of claim 12, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 13. The apparatus of claim 12, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 13. The apparatus of claim 12, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network-accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 14. The apparatus of claim 12, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network-accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 14. The apparatus of claim 10, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to:
receive, from the second user of the service provider, one or more instructions to set, modify, or update the at least one resource record associated with the second user to set, modify, or update use permissions for the one or more resources associated with the second user.
Claim 15. The apparatus of claim 10, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to:
receive, from the customer of the service provider, one or more instructions to set, modify, or update the at least one resource record associated with the customer to set, modify, or update use permissions for the one or more resources associated with the customer.
Claim 15. The apparatus of claim 10, wherein providing the first user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access to the at least one network-accessible resource associated with the second user, based at least in part on configuration settings provided by the second user.
Claim 17. The apparatus of claim 10, wherein providing the user with access to the at least one network-accessible resource associated with the customer comprises:
providing, with a host computing system, the user with access to the at least one network-accessible resource associated with the customer, based at least in part on configuration settings provided by the customer.
Claim 16. The apparatus of claim 10, wherein providing the user with access to the at least one network-accessible resource associated with the second user comprises:
providing, with a host computing system, the first user with access and control of a wireless service set identifier ("SSID") for the at least one network- accessible resource, the wireless SSID having been previously setup by the customer as enabled by the host computing system, wherein the wireless SSID enables the first user to access and control the at least one network-accessible resource.
Claim 18. The apparatus of claim 10, wherein providing the user with access to the at least one network-accessible resource associated with the customer comprises:
providing, with a host computing system, the user with access and control of a wireless service set identifier ("SSID") for the at least one network-accessible resource, the wireless SSID having been previously setup by the customer as enabled by the host computing system, wherein the wireless SSID enables the user to access and control the at least one network-accessible resource.
Claim 17. A system, comprising: a computing system, comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to:
receive, from a first user, a request to access at least one network- accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identify at least one of a user identification associated with the first user;
determine whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, provide the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network- accessible resource, deny, to the first user, access to the at least one network-accessible resource associated with the second user.
Clam 19. A system, comprising: a computing system, comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to:
receive, from a user, a request to access at least one network- accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer;
identify at least one of a user identification associated with the user, a company represented by the user, or a class of user associated with the user;
determine whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based at least in part on the identified at least one of the user identification associated with the user, the company represented by the user, or the class of user associated with the user;
based on a determination that the at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, provide the user with access to the at least one network-accessible resource associated with the customer; and
based on a determination that the at least one resource record associated with the customer indicates that the user does not have permission to access the at least one network-accessible resource, deny, to the user, access to the at least one network-accessible resource associated with the customer.
Claim 18. The system of claim 19, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 20. The system of claim 19, wherein the computing system comprises one of a 2 gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a 6 distributed computing system.
Claims 1- 18 are rejected on the ground of nonstatutory double patenting as being unpatentable over claim 1 of U.S. Patent No. 11516218 hereinafter ‘218. Although the claims at issue are not identical, they are not patentably distinct from each other because claim 1 of the present application is an obvious variation of claim 1 of patent ‘218. The difference between the instant application and the patent ‘218 is, the instant application discloses additional elements, “substituting a customer of a service provider for a second user as claimed” would be an obvious variation in the claims for the purpose of achieving the same end results.
Similar reasoning applies to claims 9 and 17 of the instant application. See, the table below which shows both application claims on limitation bases.
Please see the table below that provides a mapping between the limitations of the present application and the patent ‘218 above.
The Instant application - 18/890,227
Patent No.- US 11516218
Claim 1. A method, comprising:
receiving, with a computing system and from a first user, a request to access at least one network-accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identifying, with the computing system, a user identification associated with the first user;
determining, with the computing system, whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, providing, with the computing system, the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network-accessible resource, denying, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 1. A method, comprising:
receiving, with a computing system and from a user, a request to access at least one network-accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer;
identifying, with the computing system, at least one of a user identification associated with the user, a company represented by the user, or a class of user associated with the user;
determining, with the computing system, whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based at least in part on the identified at least one of the user identification associated with the user, the company represented by the user, or the class of user associated with the user;
based on a determination that the at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, providing, with the computing system, the user with access to the at least one network-accessible resource associated with the customer, based at least in part on configuration settings provided by the customer;
based on a determination that the at least one resource record associated with the customer indicates that the user does not have permission to access the at least one network-accessible resource, denying, to the user, access to the at least one network-accessible resource associated with the customer;
receiving, with the computing system and from the customer of the service provider, one or more instructions to set, modify, or update the at least one resource record associated with the customer to set, modify, or update use permissions for the one or more resources associated with the customer; and
providing, with the computing system, a user interface that provides the customer of the service provider with at least
options to select any information brokers or agents with whom to share information and amount of information to share,
wherein providing, with the computing system, the user with access to the at least one network-accessible resource associated with the customer comprises:
providing, with a host computing system, the user with access and control of a wireless service set identifier (“SSID”) for the at least one network-accessible resource, the wireless SSID having been previously setup by the customer as enabled by the host computing system, wherein the wireless SSID enables the user to access and control the at least one network-accessible resource, the at least one network-accessible resource is separate from a gateway device for a network associated with the wireless SSID, and the user interface further provides the customer of the service provider with at least one of:
options to set, modify, or update the at least one resource record associated with the customer;
options to set, modify, or update the use permissions for the one or more resources associated with the customer;
options to set, modify, or update privacy settings associated with services provided to the customer;
options to purchase one or more services provided by the service provider;
options to request customer resource use as a service (“CRUaaS”) for at least one service provided by the service provider; or
options to select amount of resources to share with third parties and corresponding compensation to the customer for such sharing of resources.
Claim 2. The method of claim 1, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 2 . The method of claim 1, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 3. The method of claim 1, wherein the at least one network-accessible resource associated with the second user each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of 38 things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 3 . The method of claim 1, wherein the at least one network-accessible resource associated with the customer each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 4. The method of claim 3, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 4. The method of claim 3, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 5. The method of claim 3, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network- accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 5. The method of claim 3, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network-accessible resource, at least one datastore containing metrics data associated with the at least one network- accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 9. An apparatus, comprising:
at least one processor; and
a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to:
receive, from a first user, a request to access at least one network- accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identify at least one of a user identification associated with the first user;
determine whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, provide the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network-accessible resource, deny, to the first user, access to the at least one network-accessible resource associated with the second user.
Claim 6. An apparatus, comprising:
at least one processor; and
a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to:
receive, from a user, a request to access at least one network-accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer;
identify at least one of a user identification associated with the user, a company represented by the user, or a class of user associated with the user;
determine whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based at least in part on the identified at least one of the user identification associated with the user, the company represented by the user, or the class of user associated with the user;
based on a determination that the at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, provide the user with access to the at least one network-accessible resource associated with the customer, based at least in part on configuration settings provided by the customer;
based on a determination that the at least one resource record associated with the customer indicates that the user does not have permission to access the at least one network-accessible resource, deny, to the user, access to the at least one network-accessible resource associated with the customer;
receive, from the customer of the service provider, one or more instructions to set, modify, or update the at least one resource record associated with the customer to set, modify, or update use permissions for the one or more resources associated with the customer; and
provide a user interface that provides the customer of the service provider with at least
options to select any information brokers or agents with whom to share information and amount of information to share, wherein providing the user with access to the at least one network-accessible resource associated with the customer comprises:
providing, with a host computing system, the user with access and control of a wireless service set identifier (“SSID”) for the at least one network-accessible resource, the wireless SSID having been previously setup by the customer as enabled by the host computing system, wherein the wireless SSID enables the user to access and control the at least one network-accessible resource, the at least one network-accessible resource is separate from a gateway device for a network associated with the wireless SSID, and the user interface further provides the customer of the service provider with at least one of:
options to set, modify, or update the at least one resource record associated with the customer;
options to set, modify, or update the use permissions for the one or more resources associated with the customer;
options to set, modify, or update privacy settings associated with services provided to the customer;
options to purchase one or more services provided by the service provider;
options to request customer resource use as a service (“CRUaaS”) for at least one service provided by the service provider; or options to select amount of resources to share with third parties and corresponding compensation to the customer for such sharing of resources.
Claim 10. The apparatus of claim 10, wherein the apparatus comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 7. The apparatus of claim 10, wherein the apparatus comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 11. The apparatus of claim 10, wherein the at least one network-accessible resource associated with the customer each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 8. The apparatus of claim 10, wherein the at least one network-accessible resource associated with the customer each comprises one or more of at least one network resource, at least one edge network resource, at least one compute resource, at least one data storage resource, at least one telemetry resource, at least one Internet of things ("IoT") resource, at least one network-accessible household resource, at least one customer premises security resource, at least one wireless device resource, at least one microservice resource, or at least one customer record resource.
Claim 12. The apparatus of claim 12, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 9. The apparatus of claim 8, wherein the at least one edge network resource comprises one or more of at least one agricultural device, at least one healthcare device, at least one vehicle, at least one home appliance, at least one office device, at least one entertainment device, at least one surveillance device, at least one lighting device, at least one gas-operated device, at least one solar-powered device, at least one battery-powered device, or at least one building system.
Claim 13. The apparatus of claim 12, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network-accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 10. The apparatus of claim 8, wherein one or more of the at least one telemetry resource or the at least one customer record resource comprises one or more of at least one datastore containing state information associated with the at least one network-accessible resource, at least one datastore containing metrics data associated with the at least one network-accessible resource, or at least one datastore containing one or more attributes associated with the at least one network-accessible resource.
Claim 17. A system, comprising: a computing system, comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to:
receive, from a first user, a request to access at least one network- accessible resource associated with a second user, the first user being unassociated and unrelated with the second user;
identify at least one of a user identification associated with the first user;
determine whether at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, based at least in part on the identified user identification;
based on a determination that the at least one resource record associated with the second user indicates that the first user has permission to access the at least one network-accessible resource, provide the first user with access to the at least one network-accessible resource associated with the second user; and
based on a determination that the at least one resource record associated with the second user indicates that the first user does not have permission to access the at least one network- accessible resource, deny, to the first user, access to the at least one network-accessible resource associated with the second user.
Clam 11. A system, comprising: a computing system, comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to:
receive, from a user, a request to access at least one network-accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer;
identify at least one of a user identification associated with the user, a company represented by the user, or a class of user associated with the user;
determine whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based at least in part on the identified at least one of the user identification associated with the user, the company represented by the user, or the class of user associated with the user;
based on a determination that the at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, provide the user with access to the at least one network-accessible resource associated with the customer, based at least in part on configuration settings provided by the customer;
based on a determination that the at least one resource record associated with the customer indicates that the user does not have permission to access the at least one network-accessible resource, deny, to the user, access to the at least one network-accessible resource associated with the customer;
receive, from the customer of the service provider, one or more instructions to set, modify, or update the at least one resource record associated with the customer to set, modify, or update use permissions for the one or more resources associated with the customer; and provide a user interface that provides the customer of the service provider with at least options to select any information brokers or agents with whom to share information and amount of information to share, wherein providing, with the computing system, the user with access to the at least one network-accessible resource associated with the customer comprises:
providing the user with access and control of a wireless service set identifier (“SSID”) for the at least one network-accessible resource, the wireless SSID having been previously setup by the customer as enabled by the host computing system, wherein the wireless SSID enables the user to access and control the at least one network-accessible resource, the at least one network-accessible resource is separate from a gateway device for a network associated with the wireless SSID, and the user interface further provides the customer of the service provider with at least one of:
options to set, modify, or update the at least one resource record associated with the customer; options to set, modify, or update the use permissions for the one or more resources associated with the customer;
options to set, modify, or update privacy settings associated with services provided to the customer; options to purchase one or more services provided by the service provider;
options to request customer resource use as a service (“CRUaaS”) for at least one service provided by the service provider; or options to select amount of resources to share with third parties and corresponding compensation to the customer for such sharing of resources.
Claim 18. The system of claim 19, wherein the computing system comprises one of a gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a distributed computing system.
Claim 12. The system of claim 19, wherein the computing system comprises one of a 2 gateway device, an Internet of things ("IoT") gateway device, a host device, a host computing system, a host server system, a customer resource use as a service ("CRUaaS") platform, a server computer over a network, a cloud-based computing system over a network, a cloud infrastructure as a service ("IaaS") platform, or a 6 distributed computing system.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to ELIZABETH KASSA whose telephone number is (571)270-0567. The examiner can normally be reached on Monday -Friday 9 AM -6 PM.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Ario Etienne can be reached on 517-272-4001. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see https://ppair-my.uspto.gov/pair/PrivatePair. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
01/23/2026
/ELIZABETH KASSA/Examiner, Art Unit 2457
/ARIO ETIENNE/Supervisory Patent Examiner, Art Unit 2457