Prosecution Insights
Last updated: April 19, 2026
Application No. 18/898,172

USER EQUIPMENT PARAMETER UPDATE HEADER PROTECTION

Non-Final OA §102
Filed
Sep 26, 2024
Examiner
LESNIEWSKI, VICTOR D
Art Unit
2493
Tech Center
2400 — Computer Networks
Assignee
LENOVO (SINGAPORE) PTE. LTD.
OA Round
1 (Non-Final)
58%
Grant Probability
Moderate
1-2
OA Rounds
3y 4m
To Grant
99%
With Interview

Examiner Intelligence

Grants 58% of resolved cases
58%
Career Allow Rate
275 granted / 476 resolved
At TC average
Strong +56% interview lift
Without
With
+55.7%
Interview Lift
resolved cases with interview
Typical timeline
3y 4m
Avg Prosecution
26 currently pending
Career history
502
Total Applications
across all art units

Statute-Specific Performance

§101
7.8%
-32.2% vs TC avg
§103
54.5%
+14.5% vs TC avg
§102
18.1%
-21.9% vs TC avg
§112
11.3%
-28.7% vs TC avg
Black line = Tech Center average estimate • Based on career data from 476 resolved cases

Office Action

§102
DETAILED ACTION The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claims 1-20 are presented for examination. The IDS filed 12/28/2024 and the IDS filed 4/12/2025 have been considered. Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claims 1-20 are rejected under 35 U.S.C. 102(a)(2) as being anticipated by Palanigounder et al. (U.S. Patent Application Publication Number 2024/0171978), hereinafter referred to as Palanigounder. Regarding claim 1, Palanigounder discloses a user equipment (UE) for wireless communication, comprising: at least one memory; and at least one processor coupled with the at least one memory and configured to cause the UE to: receive a non-access stratum (NAS) message that includes an indication of UE parameter update (UPU) header protection (paragraph 102, receives DL NAS transport message, and paragraph 98, UDM is performing UPU); compute a UPU message authentication code (MAC) using a UPU header as at least one input for UPU protection (paragraph 102, calculates UPU-MAC-IAUSF); and transmit an acknowledgement that indicates a UPU header verification is successful (paragraph 103, sends UL NAS transport message as acknowledgement). Regarding claim 2, Palanigounder discloses wherein the at least one processor is configured to cause the UE to: determine to perform the UPU header verification; and compute the UPU MAC based at least in part on the determination to perform the UPU header verification (paragraph 102, calculates UPU-MAC-IAUSF). Regarding claim 3, Palanigounder discloses wherein the at least one processor is configured to cause the UE to compute the UPU MAC as UPU-MAC-IAUSF using the UPU header as the at least one input for the UPU protection (paragraph 102, calculates UPU-MAC-IAUSF). Regarding claim 4, Palanigounder discloses wherein the at least one processor is configured to cause the UE to determine that the UPU header verification is successful (paragraph 103, successfully verified). Regarding claim 5, Palanigounder discloses wherein the at least one processor is configured to cause the UE to generate a MAC UPU-MAC-IUE that indicates the UPU header verification is successful (paragraph 103, generates UPU-MAC-IUE). Regarding claim 6, Palanigounder discloses wherein the at least one processor is configured to cause the UE to: determine successful verification of the UPU header protection; and transmit a verification indication to unified data management (UDM) via an access and mobility management function (AMF) that verification of the UPU header protection is successful (paragraph 103, successfully verified, and paragraph 104, transport container sent to UDM via AMF). Regarding claim 7, Palanigounder discloses wherein the at least one processor is configured to cause the UE to: receive a capability request as to whether the UE supports the UPU header protection; and transmit a capability response that the UE supports the UPU header protection (paragraph 115, UE with capability verifies UPU header information). Regarding claim 8, Palanigounder discloses wherein the capability response is transmitted to an access and mobility management function (AMF) in a NAS message as at least one of an initial registration request message or a registration update request message, the NAS message forwarded by the AMF to unified data management (UDM) to indicate that the UE supports the UPU header protection (paragraph 104, transport container sent to UDM via AMF, and paragraph 109, UPU header includes re-registration field). Regarding claim 9, Palanigounder discloses a processor for wireless communication, comprising: at least one controller coupled with at least one memory and configured to cause the processor to: receive a non-access stratum (NAS) message that includes an indication of UE parameter update (UPU) header protection (paragraph 102, receives DL NAS transport message, and paragraph 98, UDM is performing UPU); compute a UPU message authentication code (MAC) using a UPU header as at least one input for UPU protection (paragraph 102, calculates UPU-MAC-IAUSF); and transmit an acknowledgement that indicates a UPU header verification is successful (paragraph 103, sends UL NAS transport message as acknowledgement). Regarding claim 10, Palanigounder discloses wherein the at least one controller is configured to cause the processor to: determine to perform the UPU header verification; and compute the UPU MAC based at least in part on the determination to perform the UPU header verification (paragraph 102, calculates UPU-MAC-IAUSF). Regarding claim 11, Palanigounder discloses wherein the at least one controller is configured to cause the processor to compute the UPU MAC as UPU-MAC-IAUSF using the UPU header as the at least one input for the UPU protection (paragraph 102, calculates UPU-MAC-IAUSF). Regarding claim 12, Palanigounder discloses wherein the at least one controller is configured to cause the processor to determine that the UPU header verification is successful (paragraph 103, successfully verified). Regarding claim 13, Palanigounder discloses wherein the at least one controller is configured to cause the processor to generate a MAC UPU-MAC-IUE that indicates the UPU header verification is successful (paragraph 103, generates UPU-MAC-IUE). Regarding claim 14, Palanigounder discloses wherein the at least one controller is configured to cause the processor to: determine successful verification of the UPU header protection; and transmit a verification indication to unified data management (UDM) via an access and mobility management function (AMF) that verification of the UPU header protection is successful (paragraph 103, successfully verified, and paragraph 104, transport container sent to UDM via AMF). Regarding claim 15, Palanigounder discloses wherein the at least one controller is configured to cause the processor to: receive a capability request as to whether the UE supports the UPU header protection; and transmit a capability response that the UE supports the UPU header protection (paragraph 115, UE with capability verifies UPU header information). Regarding claim 16, Palanigounder discloses wherein the capability response is transmitted to an access and mobility management function (AMF) in a NAS message as at least one of an initial registration request message or a registration update request message, the NAS message forwarded by the AMF to unified data management (UDM) to indicate that the UE supports the UPU header protection (paragraph 104, transport container sent to UDM via AMF, and paragraph 109, UPU header includes re-registration field). Regarding claim 17, Palanigounder discloses a method performed by a user equipment (UE), the method comprising: receiving a non-access stratum (NAS) message that includes an indication of UE parameter update (UPU) header protection (paragraph 102, receives DL NAS transport message, and paragraph 98, UDM is performing UPU); computing a UPU message authentication code (MAC) using a UPU header as at least one input for UPU protection (paragraph 102, calculates UPU-MAC-IAUSF); and transmitting an acknowledgement that indicates a UPU header verification is successful (paragraph 103, sends UL NAS transport message as acknowledgement). Regarding claim 18, Palanigounder discloses determining to perform the UPU header verification; and computing the UPU MAC based at least in part on the determination to perform the UPU header verification (paragraph 102, calculates UPU-MAC-IAUSF). Regarding claim 19, Palanigounder discloses computing the UPU MAC as UPU-MAC-IAUSF using the UPU header as the at least one input for the UPU protection (paragraph 102, calculates UPU-MAC-IAUSF). Regarding claim 20, Palanigounder discloses a network equipment (NE) for wireless communication, comprising: at least one memory; and at least one processor coupled with the at least one memory and configured to cause the NE to: transmit a request to an authentication server function (AUSF) to apply user equipment parameter update (UPU) header protection (paragraph 99, provides UPU protection request message to AUSF); and transmit at least one of a UPU transparent container or UPU header information to a user equipment (UE), the at least one UPU transparent container or the UPU header information including an indication that a UPU header is protected (paragraphs 100 and 101, transmits UPU transparent container to UE). Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. Mavureddi Dhanasekaran et al. (U.S. Patent Application Publication Number 2025/0386197) disclosed techniques for providing protection scheme configuration data to a UE using a user equipment parameter update procedure. Any inquiry concerning this communication or earlier communications from the examiner should be directed to Victor Lesniewski whose telephone number is (571)272-2812. The examiner can normally be reached Monday thru Friday, 9am to 5pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Carl Colin can be reached at 571-272-3862. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /Victor Lesniewski/Primary Examiner, Art Unit 2493
Read full office action

Prosecution Timeline

Sep 26, 2024
Application Filed
Jan 05, 2026
Non-Final Rejection — §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12579276
Application Vulnerability Score Based on Stack Traces
2y 5m to grant Granted Mar 17, 2026
Patent 12580945
SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS
2y 5m to grant Granted Mar 17, 2026
Patent 12568378
SYSTEM AND METHOD FOR VALIDATING AUTHORITY OF DEVICE BASED ON IP ADDRESS
2y 5m to grant Granted Mar 03, 2026
Patent 12567970
METHOD FOR MANAGING A ONE-TIME-PASSWORD
2y 5m to grant Granted Mar 03, 2026
Patent 12566854
METHOD FOR DETECTING MOBILE MALICIOUS APPLICATION BASED ON IMPLEMENTATION FEATURES, RECORDING MEDIUM, AND DEVICE FOR PERFORMING THE METHOD
2y 5m to grant Granted Mar 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
58%
Grant Probability
99%
With Interview (+55.7%)
3y 4m
Median Time to Grant
Low
PTA Risk
Based on 476 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month