Prosecution Insights
Last updated: April 19, 2026
Application No. 18/892,128

VIRTUAL NETWORK VERIFICATION SERVICE

Non-Final OA §103§DP
Filed
Sep 20, 2024
Examiner
TURRIATE GASTULO, JUAN CARLOS
Art Unit
2446
Tech Center
2400 — Computer Networks
Assignee
Amazon Technologies, Inc.
OA Round
1 (Non-Final)
72%
Grant Probability
Favorable
1-2
OA Rounds
3y 2m
To Grant
99%
With Interview

Examiner Intelligence

Grants 72% — above average
72%
Career Allow Rate
270 granted / 376 resolved
+13.8% vs TC avg
Strong +36% interview lift
Without
With
+35.9%
Interview Lift
resolved cases with interview
Typical timeline
3y 2m
Avg Prosecution
28 currently pending
Career history
404
Total Applications
across all art units

Statute-Specific Performance

§101
13.8%
-26.2% vs TC avg
§103
55.4%
+15.4% vs TC avg
§102
14.3%
-25.7% vs TC avg
§112
8.4%
-31.6% vs TC avg
Black line = Tech Center average estimate • Based on career data from 376 resolved cases

Office Action

§103 §DP
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . DETAILED ACTION This action is in response to application filed 09/23/2024. Claims 21-40 are pending in this application. Information Disclosure Statement The information disclosure statement (IDS) submitted on 09/20/2024 has been placed in record and considered by the examiner. Double Patenting The nonstatutory double patenting rejection is based on a judicially created doctrine grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or improper timewise extension of the "right to exclude" granted by a patent and to prevent possible harassment by multiple assignees. A nonstatutory obviousness-type double patenting rejection is appropriate where the conflicting claims are not identical, but at least one examined application claim is not patentably distinct from the reference claim(s) because the examined application claim is either anticipated by, or would have been obvious over, the reference claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937,214 USPQ 761 (CCPA 1982); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); and In re Thorington, 418 F.2d 528, 163 USPQ 644 (CCPA 1969). A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may be used to overcome an actual or provisional rejection based on a nonstatutory double patenting ground provided the conflicting application or patent either is shown to be commonly owned with this application, or claims an invention made as a result of activities undertaken within the scope of a joint research agreement. Effective January 1, 1994, a registered attorney or agent of record may sign a terminal disclaimer. A terminal disclaimer signed by the assignee must fully comply with 37 CFR 3.73(b). Claims 21-40 are rejected on the ground of nonstatutory obviousness-type double patenting as being unpatentable over claims 1-21 of U.S. Patented Case No. 10,469,324 B2. Although the conflicting claims are not identical, they are not patentably distinct from each other because claims 21-40 of the current application perform the same steps or limitations recited by claims 1-21 of U.S. Patented Case No. 10,469,324 B2 as detailed below by the examiner. Claim 21-40 Current Application Claim 1-21 Patent Case No. 10,469,324 B2 Claim 21: A system, comprising: one or more computing devices comprising one or more processors and memory configured to implement a service to: receive a query from a client about a virtual network; obtain a specification for networking primitives for the virtual network; obtain an encoded description of the virtual network and one or more encoded virtual networking rules for the virtual network that are distinct from the query, wherein: said obtain an encoded description of the virtual network comprises generate, according to a declarative logic programming language, the encoded description of the virtual network based at least in part on the specified networking primitives, or said obtain one or more encoded virtual networking rules comprises generate, according to the declarative logic programming language, the one or more encoded virtual networking rules for the virtual network based at least in part on the specified networking primitives; resolve the query, for the encoded description of the virtual network according to the encoded virtual networking rules for the virtual network, using a constraint solver; and send results of the query resolution for the virtual network to the client. Claim 1. A computer system including a processor coupled to a memory, the memory including instructions for a virtual network verification service that upon execution causes the system to: receive a query about a virtual network of a plurality of virtual networks from a particular client of a plurality of clients via a client device, wherein the query is expressed as a constraint problem, wherein the virtual network is instantiated for the particular client in a provider network and includes virtual machines, and wherein the provider network hosts the plurality of virtual networks for respective clients of the plurality of clients on a substrate network of the provider network; obtain rules for the particular client's virtual network, wherein one or more different rules apply to different individual ones of the plurality of virtual networks; encode the rules for the particular client's virtual network according to a declarative logic programming language to generate encoded virtual networking rules for the particular client's virtual network; and in response to the query: obtain descriptive information for the particular client's virtual network; encode the descriptive information for the particular client's virtual network according to the declarative logic programming language to generate an encoded description of the particular client's virtual network; resolve the query for the encoded description of the particular client's virtual network according to the encoded virtual networking rules using a constraint solver program, wherein the constraint solver program is configured to resolve constraint problems according to the declarative logic programming language and according to the encoded virtual networking rules; and provide results of the query resolution about the particular client's virtual network to the client device Claim 4: The system as recited in claim 1, wherein the descriptive information comprises one or more of information identifying instances of networking primitives that are implemented in the particular client's virtual network, descriptions of the virtual machines in the particular client's virtual network, descriptions of relationships among the virtual machines in the particular client's virtual network, or descriptions of interfaces to entities external to the particular client's virtual network. Claims 21-40 are rejected on the ground of nonstatutory double patenting as being unpatentable over claims 1-20 of U.S. Patent No. 11,095,523 B2 in view of Monahan et al. (US 2007/0136788 A1). Regarding claim 21, US Patent ‘523 discloses a system, comprising: one or more computing devices comprising one or more processors and memory (claim 1, lines 1-4) configured to implement a service to: receive a query from a client about a virtual network (claim 1, 11-14); obtain a specification for networking primitives for the virtual network (claim 1, 5-6); obtain an encoded description of the virtual network and one or more encoded virtual networking rules for the virtual network that are distinct from the query (claim 1, 11-14), wherein: said obtain an encoded description of the virtual network comprises generate, according to a declarative logic programming language, the encoded description of the virtual network based at least in part on the specified networking primitives, or said obtain one or more encoded virtual networking rules comprises generate, according to the declarative logic programming language, the one or more encoded virtual networking rules for the virtual network based at least in part on the specified networking primitives (claim 1, 7-14); resolve the query, for the encoded description of the virtual network according to the encoded virtual networking rules for the virtual network, using a constraint solver (claim 1, 19-24). However, ‘523 does not disclose send results of the query resolution for the virtual network to the client. In an analogous art, Monahan discloses send results of the query resolution for the virtual network to the client ([0249]: an overall process for compiling and solving path queries. Any solutions found are to be displayed graphically in this example. Infrastructure Path Queries 510 are formulated as structured textual objects from a text file description or potentially via some Graphical User Interface). Therefore, it would have been obvious to a person of ordinary skill at the time the invention was made to modify ‘523 to comprise of “send results of the query resolution for the virtual network to the client” taught by Monahan. One of ordinary skilled in the art would have been motivated because it would have enabled to determine what parts of the network are reachable from a given point or part of the network if the configuration is altered and what security controls exist in new paths created between given points or regions of the network if the configuration is altered (Monahan, [0022]). Claims 21-40 are rejected on the ground of nonstatutory obviousness-type double patenting as being unpatentable over claims 1-20 of U.S. Patented Case No. 12,126,495 B2. Although the conflicting claims are not identical, they are not patentably distinct from each other because claims 21-40 of the current application perform the same steps or limitations recited by claims 1-20 of U.S. Patented Case No. 12,126,495 B2. as detailed below by the examiner. Claim 21-40 Current Application Claim 1-20 Patent Case No. 12,126,495 B2 Claim 21: A system, comprising: one or more computing devices comprising one or more processors and memory configured to implement a service to: receive a query from a client about a virtual network; obtain a specification for networking primitives for the virtual network; obtain an encoded description of the virtual network and one or more encoded virtual networking rules for the virtual network that are distinct from the query, wherein: said obtain an encoded description of the virtual network comprises generate, according to a declarative logic programming language, the encoded description of the virtual network based at least in part on the specified networking primitives, or said obtain one or more encoded virtual networking rules comprises generate, according to the declarative logic programming language, the one or more encoded virtual networking rules for the virtual network based at least in part on the specified networking primitives; resolve the query, for the encoded description of the virtual network according to the encoded virtual networking rules for the virtual network, using a constraint solver; and send results of the query resolution for the virtual network to the client. Claim 1: A system, comprising: one or more computing devices comprising one or more processors and memory configured to implement virtual network verification service configured to: receive a query for a virtual network from a client, wherein the query is expressed as one or more constraint problems regarding the virtual network; obtain encoded virtual networking rules for the virtual network, wherein the virtual networking rules are encoded according to a declarative logic programming language, the encoded virtual networking rules distinct from the query expressed as one or more constraint problems; obtain an encoded description of the virtual network; resolve the query, expressed as one or more constraint problems, for the encoded description of the virtual network according to the declarative-logic-encoded virtual networking rules for the virtual network using a constraint solver engine; and provide results of the query resolution for the virtual network to the client. Claim 7: The system as recited claim 1, wherein the virtual network verification service is further configured to: obtain a specification for networking primitives for the virtual network; wherein to obtain the encoded virtual networking rules for the virtual network, the virtual network verification service is further configured to: generate, according to a declarative logic programming language, the encoded virtual networking rules for the virtual network based at least in part on the specified networking primitives; wherein to obtain the encoded description of the virtual network, the virtual network verification service is further configured to: generate, according to the declarative logic programming language, the encoded description of the virtual network based at least in part on the specified networking primitives. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. This application currently names joint inventors. In considering patentability of the claims the examiner presumes that the subject matter of the various claims was commonly owned as of the effective filing date of the claimed invention(s) absent any evidence to the contrary. Applicant is advised of the obligation under 37 CFR 1.56 to point out the inventor and effective filing dates of each claim that was not commonly owned as of the effective filing date of the later invention in order for the examiner to consider the applicability of 35 U.S.C. 102(b)(2)(C) for any potential 35 U.S.C. 102(a)(2) prior art against the later invention. Claims 21-22, 24-25, 27, 29-30, 32-33, 35-37, 40 are rejected under 35 U.S.C. 103 as being unpatentable over Monahan et al. (US 2007/0136788 A1) in view of Zadka et al. (US 2015/0006458 A1). Regarding claim 21, Monahan discloses system, comprising: one or more computing devices comprising one or more processors and memory configured to implement a service ([0023]: The security properties comprising any of the following; what parts of the network are reachable from a given point or part of the network with an existing configuration, what parts of the network are reachable from a given point or part of the network if the configuration is altered. [0084]: the infrastructure may also preferentially incorporate virtualization technology (e.g. VMware, MS Virtual Server) that can permit multiple operating system instances (in the form of virtual machines) to run potentially concurrently and simultaneously on processing hardware) to: receive a query from a client about a virtual network ([0187]-[0190]: There are two kinds of queries that will be used: [0188] Node queries that select particular sets of nodes. [0189] Path queries that show that two sets of nodes are linked together by paths satisfying certain constraints. This kind of query naturally involves reachability over the graph of associations. As a result of this expressiveness of linkage, we can impose semantic constraints on the routing connectivity between different classes of nodes); obtain a specification for networking primitives for the virtual network ([0194]: These special connectivity properties are defined by connection predicates for particular classes and link-classes. For example, each router instance will typically have a "rules" attribute whose value could define the permitted VLAN connections. The linkages permitted via the router instance then depend upon these rules and the attributes of the respective associations and their link-classes); obtain an encoded description of the virtual network ([0082]: The model can be generated or maintained by receiving and classifying information about the network infrastructure or application services, to add to the model, and normalizing a path query with reference to class definitions of the model. [0240]: a model 300 of the network (here in the form of a utility description, including descriptions of nodes and links, perhaps part built by hand, part built automatically), is used by a reasoning engine 310 using a conventional language such as prolog) and one or more encoded virtual networking rules for the virtual network that are distinct from the query ([0194]: For example, each router instance will typically have a "rules" attribute whose value could define the permitted VLAN connections. The linkages permitted via the router instance then depend upon these rules and the attributes of the respective associations and their link-classes); wherein: resolve the query, for the encoded description of the virtual network according to the encoded virtual networking rules for the virtual network, using a constraint solver; and send results of the query resolution for the virtual network to the client ([0249]: an overall process for compiling and solving path queries. Any solutions found are to be displayed graphically in this example. Infrastructure Path Queries 510 are formulated as structured textual objects from a text file description or potentially via some Graphical User Interface). However, Monahan does not disclose said obtain an encoded description of the virtual network comprises generate, according to a declarative logic programming language, the encoded description of the virtual network based at least in part on the specified networking primitives, or said obtain one or more encoded virtual networking rules comprises generate, according to the declarative logic programming language, the one or more encoded virtual networking rules for the virtual network based at least in part on the specified networking primitives. In an analogous art, Zadka discloses said obtain an encoded description of the virtual network comprises generate, according to a declarative logic programming language, the encoded description of the virtual network based at least in part on the specified networking primitives, or said obtain one or more encoded virtual networking rules comprises generate, according to the declarative logic programming language, the one or more encoded virtual networking rules for the virtual network based at least in part on the specified networking primitives ([0044]: encoding of configuration information, there are many different possible ways for expressing configuration rules or hypotheses, including in any of various programming languages, in first-order logic expressions or Prolog programs, and in many other ways….encodings that can be used for generating, storing, evaluating, and optimizing hypotheses). Therefore, it would have been obvious before the effective filed date of the claimed invention to a person having ordinary skill in the art to modify Monahan to comprise “said obtain an encoded description of the virtual network comprises generate, according to a declarative logic programming language, the encoded description of the virtual network based at least in part on the specified networking primitives, or said obtain one or more encoded virtual networking rules comprises generate, according to the declarative logic programming language, the one or more encoded virtual networking rules for the virtual network based at least in part on the specified networking primitives” taught by Zadka. One of ordinary skilled in the art would have been motivated because it would have enabled configuration rules, or logical expressions represented in hypothesis language to be evaluated with respect to configuration data for one or more components automatically, using theorem provers or resolvers (Zadka, [0048]). Regarding claim 22, Monahan-Zadka discloses the system of claim 21, wherein one or more of the processors and memory are configured to: generate, based on the results of the query resolution for the virtual network, a configuration for the virtual network that satisfies the constraints specified by the query (Monahan, [0249]-[0250]: compiling and solving path queries. Any solutions found are to be displayed graphically in this example. Infrastructure Path Queries 510 are formulated as structured textual objects from a text file description or potentially via some Graphical User Interface. These are passed to the Path Query Normalization processor 520 which consolidates this information with the Infrastructure Class Definitions 440. [0251]: Any path solutions found are passed to the Solution Path Rendering Engine 550 where this information is rendered into a suitable graphical format 560 ready for display by the external graphics display components). Regarding claim 24, Monahan-Zadka discloses the system of claim 21, further comprising: a service provider network configured to provide a plurality of provider network services to a plurality of clients, the service provider network comprising the one or more computing devices; wherein one or more of the processors and memory are configured to: obtain descriptive information for the virtual network, comprising: obtain permission from the client to get the descriptive information for the virtual network from one or more of the provider network services of the service provider network, and obtain the descriptive information for the virtual network from the one or more provider network services; or receive the descriptive information for the virtual network from the client (Monahan, [0118]-[0121]: Service Providers and End Customers can obtain, under contract, outsourced IT resources from Utility Providers upon demand. They don't need to concern themselves about systems availability or the cost of running and maintaining all of these systems--this is the responsibility of the Utility Provider. There are several ways in which customers may choose interact with the resources put at their disposal. Here are two ways: Customers have direct access to the computational resources they have rented and utilize them directly on tasks of their own choosing. The software deployed and the data resources used may be owned and provided by the customer. Customers require a standard commodity service using standard infrastructure and configurations); wherein said obtain an encoded description of the virtual network comprises generate the encoded description of the virtual network based at least in part on the obtained descriptive information (Monahan, [0132], [0138]: consider the following scenario: a corporate business customer outsources an important part of their IT operations to a Utility Provider, subject to an appropriate Service-Level Agreement and contract. However, to run the service effectively, the customer will need to provide direct access to significant IP such as confidential commercial data. The present inventors have appreciated that constructing some kind of model of the utility system that is accessible to customer and provider alike allows for practical answers to many of these questions. The goal is then to represent the security aspects of a deployed utility, in a form permitting exploration of interesting and relevant "what-if" consequences). Regarding claim 25, Monahan-Zadka discloses the system of claim 21, wherein: the query is expressed as a constraint problem; and the constraint solver is configured to resolve constraint problems according to the declarative logic programming language (Monahan, [0188]: Node queries that select particular sets of nodes. [0189] Path queries that show that two sets of nodes are linked together by paths satisfying certain constraints. This kind of query naturally involves reachability over the graph of associations). Regarding claim 27, Monahan-Zadka discloses the system of claim 21, wherein one or more of the processors and memory are configured to: responsive to another query, obtain one or more other encoded virtual networking rules for another virtual network (Monahan, [0081]: the searching can comprise making a recursive query of the database. [0084]: the infrastructure may also preferentially incorporate virtualization technology (e.g. VMware, MS Virtual Server) that can permit multiple operating system instances (in the form of virtual machines) to run potentially concurrently and simultaneously on processing hardware. These virtual machines will themselves contain other systems and user programs that can then internally execute as multi-tasking processes, within each virtual machine), and resolve the other query according to the one or more other encoded virtual networking rules for the other virtual network (Monahan, [0249]: an overall process for compiling and solving path queries. Any solutions found are to be displayed graphically in this example). Regarding claims 29 and 36; the claims are interpreted and rejected for the same reason as set forth in claim 21. Regarding claims 30 and 37; the claims are interpreted and rejected for the same reason as set forth in claim 22. Regarding claim 32; the claim is interpreted and rejected for the same reason as set forth in claim 24. Regarding claim 33; the claim is interpreted and rejected for the same reason as set forth in claim 25. Regarding claims 35 and 40; the claims are interpreted and rejected for the same reason as set forth in claim 27. Claims 23, 31, 38-39 are rejected under 35 U.S.C. 103 as being unpatentable over Monahan in view of Zadka, as applied to claim 21, in further view of Shilmover et al. (US 2015/0324217 A1). Regarding claim 23, Monahan-Zadka discloses the system of claim 21. However, Monahan-Zadka does not disclose wherein: the virtual network includes two peered virtual networks; one or more of the processors and memory are configured to provide an API for receipt of verification queries from requesting clients comprising the client; and the received query comprises a verification query, received via the API, to verify that a virtual machine in a first peered virtual network of the two peered virtual networks can communicate with another virtual machine in a second peered virtual network of the two peered virtual networks via a peering connection between the two peered virtual networks. In an analogous art, Shilmover discloses wherein: the virtual network includes two peered virtual networks; one or more of the processors and memory are configured to provide an API for receipt of verification queries from requesting clients comprising the client ([0065]: he shift server via the universal API or client interface 230 and allow a user to pass input parameters along with the credentials of the destination hypervisor 135. Validation operations are performed for the destination hypervisor 135 at block 708. Using the universal API, the validation operations may include, but not limited to, determining the accuracy of the credentials, determining if the destination hypervisor 135 is online or active, and/or other validation techniques); and the received query comprises a verification query, received via the API, to verify that a virtual machine in a first peered virtual network of the two peered virtual networks can communicate with another virtual machine in a second peered virtual network of the two peered virtual networks via a peering connection between the two peered virtual networks ([0073]: both the request to shift the virtual machine and the existence of the virtual machine on the source hypervisor is validated at block 908. Validation operations are performed for the destination hypervisor 135 at block 708. Using the universal API, the validation operations may include, but not limited to, determining the accuracy of the credentials, determining if the destination hypervisor 135 is online or active, and/or other validation techniques.). Therefore, it would have been obvious before the effective filed date of the claimed invention to a person having ordinary skill in the art to modify Monahan-Zadka to comprise “wherein: the virtual network includes two peered virtual networks; one or more of the processors and memory are configured to provide an API for receipt of verification queries from requesting clients comprising the client; and the received query comprises a verification query, received via the API, to verify that a virtual machine in a first peered virtual network of the two peered virtual networks can communicate with another virtual machine in a second peered virtual network of the two peered virtual networks via a peering connection between the two peered virtual networks” taught by Shilmover. One of ordinary skilled in the art would have been motivated because it would have enabled a universal application interface (API) to be used with the shifting reconfiguring of the VM onto the destination hypervisor (Shilmover, [0036]). Regarding claims 31 and 38; the claims are interpreted and rejected for the same reason as set forth in claim 23. Regarding claim 39, Monahan-Zadka-Shilmover discloses the one or more non-transitory computer-readable media of claim 38, wherein the program instructions are executable to perform: receiving the query about the virtual network, the query expressed as a constraint problem (Monahan, [0188]: Node queries that select particular sets of nodes. [0189] Path queries that show that two sets of nodes are linked together by paths satisfying certain constraints. This kind of query naturally involves reachability over the graph of associations). Claims 26 and 34 are rejected under 35 U.S.C. 103 as being unpatentable over Monahan in view of Zadka, as applied to claim 21, in further view of Borthakur (US 2015/0324215 A1). Regarding claim 26, Monahan-Zadka discloses the system of claim 21. However, Monahan-Zadka does not disclose further comprising: a service provider network configured to provide a plurality of provider network services to a plurality of clients, the service provider network comprising the one or more computing devices; wherein the virtual network is instantiated in the provider network and includes virtual machines; and wherein the provider network hosts a plurality of virtual networks for respective clients of the plurality of clients on a substrate network of the provider network. In an analogous art, Borthakur discloses further comprising: a service provider network configured to provide a plurality of provider network services to a plurality of clients, the service provider network comprising the one or more computing devices ([0037]: remote clients creating and configuring private computer networks that support migration of applications. FIG. 2A is a network diagram illustrating an example embodiment of a Compute Service Provider 205 that enables remote clients to create and configure computer networks for use by the clients); wherein the virtual network is instantiated in the provider network and includes virtual machines; and wherein the provider network hosts a plurality of virtual networks for respective clients of the plurality of clients on a substrate network of the provider network ([0028]: environment 100 may use one of the API requests 190 to obtain private subnet information 150, which may indicate if the host 175a and one or more of the VMIs 180a-180c are in a private sub-network (or subnet) of the client private network 170. [0075]: one of the virtual machine computing nodes 307a on computing system 305a may be part of a particular provided virtual computer network (e.g., provided computer network 220A of FIG. 2B) for a client, along with one of the virtual machine computing nodes 307d on computing system 305d). Therefore, it would have been obvious before the effective filed date of the claimed invention to a person having ordinary skill in the art to modify Monahan-Zadka to comprise “further comprising: a service provider network configured to provide a plurality of provider network services to a plurality of clients, the service provider network comprising the one or more computing devices; wherein the virtual network is instantiated in the provider network and includes virtual machines; and wherein the provider network hosts a plurality of virtual networks for respective clients of the plurality of clients on a substrate network of the provider network.” taught by Borthakur. One of ordinary skilled in the art would have been motivated because it would have enabled for a client to specify particular types of networking devices or nodes to be part of the provided computer network (Borthakur, [0048]). Regarding claim 34; the claim is interpreted and rejected for the same reason as set forth in claim 26. Claim 28 is rejected under 35 U.S.C. 103 as being unpatentable over Monahan in view of Zadka, as applied to claim 1, in further view of Yazir et al. (US 2017/0078409 A1). Regarding claim 28, Monahan-Zadka discloses the system of claim 21. However, Monahan-Zadka does not disclose wherein one or more of the processors and memory are configured to: provide an API for clients to submit constraint problem queries to the service; and receive, via the API, constraint problem queries comprising the query. In an analogous art, Yazir discloses wherein one or more of the processors and memory are configured to: provide an API for clients to submit constraint problem queries to the service; and receive, via the API, constraint problem queries comprising the query ([0060]: accurately determine whether the particular corresponding service request may or may not be fulfilled, can identify a complete set of possible placements for the service that satisfies the stated resource requirements and satisfies any constraints placed upon the service or individual components. [0074]: a client 102 issues a request via a web portal or Application Programming Interface (API) (such as a Web Service), and the service request 120 can thus be provided to the root agent 104 by the web portal or API endpoint). Therefore, it would have been obvious before the effective filed date of the claimed invention to a person having ordinary skill in the art to modify Monahan-Zadka to comprise “wherein one or more of the processors and memory are configured to: provide an API for clients to submit constraint problem queries to the service; and receive, via the API, constraint problem queries comprising the query” taught by Yazir. One of ordinary skilled in the art would have been motivated because it would have enabled to determine whether the particular corresponding service request may or may not be fulfilled (Yazir, [0060]). Additional References The prior art made of record and not relied upon is considered pertinent to applicants disclosure. Tan et al., US 2020/0067962 A1: Model Based Methology for Translating High Level Cyber Treat Descriptions Into System Specific Actionable Defense Tactics. Amies et al., US 2014/0189125 A1.: Querying and Managing Computing Resources in a Networked Computing Environment. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to JUAN C TURRIATE GASTULO whose telephone number is (571)272-6707. The examiner can normally be reached Monday - Friday 8 am-4 pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Brian J Gillis can be reached at 571-272-7952. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /J.C.T/Examiner, Art Unit 2446 /BRIAN J. GILLIS/Supervisory Patent Examiner, Art Unit 2446
Read full office action

Prosecution Timeline

Sep 20, 2024
Application Filed
Jan 08, 2026
Non-Final Rejection — §103, §DP
Mar 24, 2026
Applicant Interview (Telephonic)
Apr 04, 2026
Examiner Interview Summary

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603795
INFORMATION PROCESSING TERMINAL, INFORMATION PROCESSING DEVICE, AND SYSTEM
2y 5m to grant Granted Apr 14, 2026
Patent 12587432
Visual Map for Network Alerts
2y 5m to grant Granted Mar 24, 2026
Patent 12574436
BLOCKCHAIN MACHINE BROADCAST PROTOCOL WITH LOSS RECOVERY
2y 5m to grant Granted Mar 10, 2026
Patent 12566427
Method and System for Synchronizing Configuration Data in a Plant
2y 5m to grant Granted Mar 03, 2026
Patent 12568059
UPDATING COMMUNICATIONS WITH MACHINE LEARNING AND PLATFORM CONTEXT
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
72%
Grant Probability
99%
With Interview (+35.9%)
3y 2m
Median Time to Grant
Low
PTA Risk
Based on 376 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month