Prosecution Insights
Last updated: April 19, 2026
Application No. 18/900,406

DEPLOYMENT OF DIGITAL SECURITY CREDENTIALS FOR JUST-IN-TIME PROVISIONING OF NETWORKED DEVICES

Non-Final OA §103
Filed
Sep 27, 2024
Examiner
TRAN, TRI MINH
Art Unit
2432
Tech Center
2400 — Computer Networks
Assignee
Nagravision Sàrl
OA Round
1 (Non-Final)
82%
Grant Probability
Favorable
1-2
OA Rounds
2y 7m
To Grant
99%
With Interview

Examiner Intelligence

Grants 82% — above average
82%
Career Allow Rate
456 granted / 556 resolved
+24.0% vs TC avg
Strong +34% interview lift
Without
With
+33.8%
Interview Lift
resolved cases with interview
Typical timeline
2y 7m
Avg Prosecution
10 currently pending
Career history
566
Total Applications
across all art units

Statute-Specific Performance

§101
14.2%
-25.8% vs TC avg
§103
46.0%
+6.0% vs TC avg
§102
20.6%
-19.4% vs TC avg
§112
9.4%
-30.6% vs TC avg
Black line = Tech Center average estimate • Based on career data from 556 resolved cases

Office Action

§103
DETAILED ACTION Claims 1-20 are pending. This is in response to the application filed on September 27, 2024 which claims priority to a foreign application filed on September 29, 2023. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claims 1-20 are rejected under 35 U.S.C. 103 as being unpatentable over Pub 20210352051 (hereinafter Schmitt) in view of Pub 20220159461 (hereinafter Maass). Regarding claim 1, Schmitt discloses a method for provisioning a networked device with digital security credentials, comprising: receiving, by processing circuitry of a security server, a first digital certificate of a secure component, the secure component being associated with the networked device (Fig. 2, par. [0064] discloses “a secure communication to a target device 200 over a network …The OPC UA Server 220 of the target device 200 opens an unsecured OPC UA Endpoint 222 … indicating the presence of an initial device certificate stored in the secure storage 250 of the target device… retrieve the initial device certificate from the secure storage 250…”); extracting, by the processing circuitry of the security server, a public key from the first digital certificate, the public key and a corresponding private key being stored in the secure component for asymmetric cryptography (par. [0064] discloses “The first device 100, respectively the commissioning tool 110… accessing the internal PKI 400 for integrating the device certificate … encrypts at least the device certificate using an initial device public key of the initial device certificate”); Schmitt does not expressly disclose receiving, by the processing circuitry of the security server, a product identifier and a vendor identifier associated with the secure component from a first user device. Maass discloses this feature (Fig. 15A, par. [0144] discloses a certificate provisioning service obtaining from device serial number and manufacture name). Therefore, it would have been obvious before the effective filing date of the claimed invention to modify Schmitt with Maass to further teach the claimed invention. One would have done so for the benefits of certificate provisioning as disclosed by Maass with the use refreshed cryptographic keys and associated certificates, increasing the security of the vehicle/device (par. [0048]); The combination of Schmitt and Maass discloses generating, by the processing circuitry of the security server, a second digital certificate based on the public key of the secure component, the product identifier, and the vendor identifier (Schmitt, par. [0032] discloses integrating the initial certificate into a second PKI, whereas Maass, as presented above, discloses a certificate provisioning uses a device serial number and a manufacture/vendor name); and Schmitt discloses transmitting, by the processing circuitry of the security server, the second digital certificate to the networked device associated with the secure component (par. [0032] discloses a second PKI to transform the initial device certificate into the device certificate that is based on the second PKI), the networked device being configured to generate a device commissioning request based on the second digital certificate and the private key of the secure component (par. [0051] and [0064] discloses the target device is configured to receive a request for the initial device certificate from an OPC UA Client over the network and a commissioning tool to manage the networked device for certificates and keys for decryption and encryption). Regarding claim 2, the combination of Schmitt and Maass discloses wherein the second digital certificate includes a device attestation certificate and a product attestation intermediate certificate (as presented in claim 1 rejection, the certificate can contain device and manufacture information). Regarding claim 3, Schmitt discloses authenticating the public key of the secure component based on authentication data received from a second user device (par. [0042] discloses certificate validation). Regarding claim 4, Schmitt discloses receiving a device identifier and verifying that the device identifier is associated with the secure component prior to generating the second digital certificate (par. [0033] discloses the device certificate may include data relating to a network identification of the target device within the network). Regarding claim 5, Schmitt discloses receiving ownership data associated with the secure component prior to generating the second digital certificate (par. [0032]-[0033] discloses the data relating to the network identification may include, or allow the determination of, a unique identification of the target device within the network. The data relating to the network identification of the target device may be signed by the signature of the device certificate). Regarding claim 6, Schmitt discloses receiving a request for the second digital certificate prior to generating the second digital certificate (par. [0042]). Regarding claim 7, Schmitt discloses receiving a digital signature of the second digital certificate from a certificate authority (par. [0032]). Claims 8-14 are rejected in view of claims 1-7 rejections respectively. Claims 15-20 are rejected in view of claims 1-4 and 6-7 rejections respectively. Inquiry communication Any inquiry concerning this communication or earlier communications from the examiner should be directed to TRI M TRAN whose telephone number is (571)270-1994. The examiner can normally be reached Mon-Fri: 9am-5pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jeffrey Nickerson can be reached at (469)295-9235. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /TRI M TRAN/Primary Examiner, Art Unit 2432
Read full office action

Prosecution Timeline

Sep 27, 2024
Application Filed
Jan 29, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12593208
METHOD, APPARATUS AND SYSTEM FOR NETWORK CONNECTION, AND SERVER AND MEDIUM
2y 5m to grant Granted Mar 31, 2026
Patent 12585772
MALICIOUS ACTIVITY DETECTION BY MODELING END-POINT EVENTS AS SEQUENCES
2y 5m to grant Granted Mar 24, 2026
Patent 12585773
USING APPROXIMATE MEMBERSHIP QUERY FILTERS FOR EFFICIENT CONTROL FLOW INTEGRITY PROTECTION
2y 5m to grant Granted Mar 24, 2026
Patent 12580960
METADATA-BASED DETECTION AND PREVENTION OF PHISHING ATTACKS
2y 5m to grant Granted Mar 17, 2026
Patent 12579268
SYSTEMS AND METHODS OF DATA SELECTION FOR ITERATIVE TRAINING USING ZERO KNOWLEDGE CLUSTERING
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
82%
Grant Probability
99%
With Interview (+33.8%)
2y 7m
Median Time to Grant
Low
PTA Risk
Based on 556 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month