Prosecution Insights
Last updated: April 19, 2026
Application No. 18/905,952

IMAGE PROCESSING APPARATUS, METHOD FOR CONTROLLING IMAGE PROCESSING APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM

Non-Final OA §102§103
Filed
Oct 03, 2024
Examiner
PICH, PONNOREAY
Art Unit
2495
Tech Center
2400 — Computer Networks
Assignee
Canon Kabushiki Kaisha
OA Round
1 (Non-Final)
87%
Grant Probability
Favorable
1-2
OA Rounds
3y 1m
To Grant
98%
With Interview

Examiner Intelligence

Grants 87% — above average
87%
Career Allow Rate
311 granted / 358 resolved
+28.9% vs TC avg
Moderate +11% lift
Without
With
+11.1%
Interview Lift
resolved cases with interview
Typical timeline
3y 1m
Avg Prosecution
13 currently pending
Career history
371
Total Applications
across all art units

Statute-Specific Performance

§101
15.2%
-24.8% vs TC avg
§103
31.7%
-8.3% vs TC avg
§102
21.7%
-18.3% vs TC avg
§112
20.1%
-19.9% vs TC avg
Black line = Tech Center average estimate • Based on career data from 358 resolved cases

Office Action

§102 §103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claims1-10 as submitted on 10/3/24 were examined. Information Disclosure Statement The IDS submitted on 10/3/24 was considered. Claim Rejections - 35 USC § 102 The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claim(s) 1, 9, and 10 is/are rejected under 35 U.S.C. 102(a)(1) and (a)(2) as being anticipated by Lin (US 2017/0279823). Claims 1, 9, and 10: As per claim 1, Lin discloses an image processing apparatus capable of performing Domain Name System (DNS) name resolution using encrypted communication (paragraphs 16, 18, 22 and 109; Proxy server which does DNS name resolution and fetch webpages based on a user’s encrypted webpage requests), the image processing apparatus comprising: a relay unit configured to relay the encrypted communication between an external system and the image processing apparatus (paragraphs 15-16 and 111; The proxy server performs encrypted communication with a user’s computer and a web/target server, where based on a encrypted requests from the user for webpages, the proxy server decrypts the requests, fetch the webpages based on the request, and returns the requested webpages to the user’s computer in encrypted format); a detection unit configured to detect a failure in the name resolution by monitoring contents of communication data based on a decryption of the encrypted communication by the relay unit (paragraphs 11, 16-17 and 22; If the name resolution results in an illegal IP address or another attack rule gets triggered, it is considered an error/failure and the domain name resolution information is dropped); and a control unit configured to perform control associated with security measures based on detection of the failure in the name resolution (paragraphs 17 and 116-117; Domain name resolution being dropped is considered control associated with security measures). The rejection of claim 1 applies, mutatis mutandis, to claims 9 and 10. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 2-4 is/are rejected under 35 U.S.C. 103 as being unpatentable over Lin (US 2017/0279823) in view of Torres et al (US 2018/0191672). Claim 2: Lin further discloses wherein, in a case where a triggered attack rule is detected, the control unit restricts execution of the name resolution as the control associated with the security measures (paragraphs 10-11, 17, and 21; Domain name resolution information is dropped in response to an attack rule being triggered). Lin does not disclose, but Torres discloses the triggered attack rule detected is a predetermined number or more of failures in the name resolution (paragraph 49). Before the effective filing date of applicant's claimed invention, it would have been obvious to one of ordinary skill in the art to modify Lin’s invention using Torres’s teachings discussed. The rationale for why it would be obvious is that doing so is nothing more than simple substitution of one known element (i.e. monitored attack rule) for another (i.e. different attack rule based on Torres’s teachings) to achieve predictable results, see KSR Int'l Co. v. Teleflex, Inc., 550 U.S. 398 (2007). Claim 3: Torres further discloses wherein the restriction of the execution of the name resolution includes not performing the name resolution using communication that does not satisfy a predetermined condition (paragraph 49; Returning a name failure does not satisfy successful name resolution/lookup). Claim 4: Lin further discloses wherein communication that satisfies the predetermined condition includes at least one of DNS communication including a preliminarily registered Fully Qualified Domain Name (FQDN) (paragraphs 119 and 123; m.baidu.com is a FQDM and until it was hijacked by the 360 website, was a preliminary registered FQDN), DNS communication including a FQDN for which the name resolution has previously succeeded (paragraphs 119 and 123), DNS communication including a domain of the image processing apparatus (paragraphs 16-17; The user’s computer contacts the proxy server first when requesting a webpage, which means DNS communication includes the domain of the proxy server), or DNS communication including a domain permitted in cross-origin resource sharing (CORS). Claim(s) 5-6 is/are rejected under 35 U.S.C. 103 as being unpatentable over Lin (US 2017/0279823) in view of Torres et al (US 2018/0191672) in further view of Selvaraj et al (US 2019/0188385). Claim 5: Lin further discloses wherein, in a case where a situation in which a triggered attack rule is detected occurs (paragraphs 10-11, 17, and 21; Domain name resolution information is dropped in response to an attack rule being triggered)., the control unit performs mitigation steps (paragraph 17; Domain name resolution information dropped). Lin does not disclose, but Torres discloses the triggered attack rule detected is a predetermined number or more of failures in the name resolution occurs a predetermined number of times (paragraph 49). Before the effective filing date of applicant's claimed invention, it would have been obvious to one of ordinary skill in the art to modify Lin’s invention using Torres’s teachings discussed. The rationale for why it would be obvious is that doing so is nothing more than simple substitution of one known element (i.e. monitored attack rule) for another (i.e. different attack rule based on Torres’s teachings) to achieve predictable results, see KSR Int'l Co. v. Teleflex, Inc., 550 U.S. 398 (2007). Lin also does not disclose, but Selvaraj discloses the mitigation steps in are processing of restoring a program to be used for an operation of the image processing apparatus as the control associated with the security measures (paragraphs 5, 16-17, 20, and 60-61). Before the effective filing date of applicant's claimed invention, it would have been obvious to one of ordinary skill in the art to further modify Lin’s invention using Selvaraj’s teachings discussed so that instead of merely drooping name resolution information, backup restoration as taught by Selvaraj was also implemented. The rationale for why it would be obvious to use another or additional mitigation teaching within Lin’s modified invention is that doing so is nothing more than combining prior art elements according to known methods to yield predictable results, see KSR Int'l Co. v. Teleflex, Inc., 550 U.S. 398 (2007). In this case, the result is mitigation efforts which does both name resolution information dropping and restore from backup, which should hopefully fix whatever caused the attack rules to be triggered by removing the source. Claim 6: Selvarj further discloses wherein the control associated with the security measures includes notification about suspected malware infection (paragraphs 16-17, 44, and 60-61). Claim(s) 7 is/are rejected under 35 U.S.C. 103 as being unpatentable over Lin (US 2017/0279823) in view of Sichevoy et al (US 2020/0213266). Claim 7: Lin further discloses wherein the DNS name resolution using the encrypted communication includes DNS name resolution (paragraph 16), and wherein, in a case where contents of the communication data indicate communication error, the detection unit detects whether the name resolution using the communication associated with the communication data has failed (paragraphs 11, 16-17 and 22; If the name resolution results in an illegal IP address or another attack rule gets triggered, it is considered/determined that an error/failure has occurred and the domain name resolution information is dropped). Lin does not disclose, but Sichevoy discloses the DNS name resolution is using Domain Name System over Transport Layer Security (DoT), wherein the communication data indicate Transport Layer Security (TLS) communication and indicate communication with a specific port number (paragraphs 32 and 54-55). Before the effective filing date of applicant's claimed invention, it would have been obvious one of ordinary skill in the art to modify Lin’s invention using Sichevoy’s teachings discussed. Lin does not place any limits on the particular encryption algorithms used in his invention, thus it would be obvious to one of ordinary skill in the art to incorporate Sichevoy’s teachings of DoT in the manner discuss for encryption. The rationale for why it would be obvious is that doing so is nothing more than simple substitution of one known element (i.e. encryption algorithm) for another (i.e. encryption by using DoT) to yield predictable results, see KSR Int'l Co. v. Teleflex, Inc., 550 U.S. 398 (2007). Claim(s) 8 is/are rejected under 35 U.S.C. 103 as being unpatentable over Lin (US 2017/0279823) in view of Sichevoy et al (US 2020/0213266) in further view of Zhu et al CN 113438332). Note that citations to Zhu will be made to the English translation of the document provided with this Office action. Claim 8: Lin further discloses wherein the DNS name resolution using the encrypted communication includes DNS name resolution (paragraph 16), and wherein, in a case where contents of the communication data indicate a response to the communication, the detection unit detects whether the name resolution using the communication associated with the communication data has failed (paragraphs 11, 16-17 and 22; If the name resolution results in an illegal IP address or another attack rule gets triggered, it is considered/determined that an error/failure has occurred and the domain name resolution information is dropped). Lin does not disclose, but Sichevoy discloses the DNS name resolution is using Domain Name System over Hypertext Transfer Protocol over Transport Layer Security (DoH) (paragraphs 23 and 29). Before the effective filing date of applicant's claimed invention, it would have been obvious one of ordinary skill in the art to modify Lin’s invention using Sichevoy’s teachings discussed. Lin does not place any limits on the particular encryption algorithms used in his invention, thus it would be obvious to one of ordinary skill in the art to incorporate Sichevoy’s teachings of DoH in the manner discuss for encryption. The rationale for why it would be obvious is that doing so is nothing more than simple substitution of one known element (i.e. encryption algorithm) for another (i.e. encryption by using DoH) to yield predictable results, see KSR Int'l Co. v. Teleflex, Inc., 550 U.S. 398 (2007). Lin and Sichevoy also do not explicitly disclose, but Zhu discloses the communication data indicate Hypertext Transfer Protocol over Transport Layer Security (HTTPS) communication and include application/dns-message as a content type that is interpretable as a response to the communication (p6, last paragraph: “… for the above three parameters, combining multiple (domain name number * path number * port number) DoH request; the request message head is https: // server: port/path; the content-type and the accept field are set as " application/dns-message "; The DoH protocol specification document RFC8484 requires all the DoH servers to support the return type of the "application/dns-message", and the request content is a complete DNS data packet; The DNS data packet can be constructed optionally in advance in accordance with the DNS message specification. IP address of a certain DoH flow, the IP address generally will reversely analyze a plurality of domain names, then combined with the common service port, service path, generally will generate about 100 DoH request. In order to reduce the time required for verification, multi-thread mode can be used, and multiple DoH requests are sent at the same time…”). Before the effective filing date of applicant's claimed invention, it would have been obvious one of ordinary skill in the art to modify Lin and Sichevoy’s combination invention using Zhu’s teachings discussed. One of ordinary skill in the art would have been motivated to do so because it would be using DoH in compliance with the DoH protocol specification document (Zhu: p6, last paragraph, as quoted above). Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to PONNOREAY PICH whose telephone number is (571)272-7962. The examiner can normally be reached M-F 9am-5pm EST, 10am-6pm during Daylight Savings Time. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Farid Homayounmehr can be reached at 571-272-3739. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /PONNOREAY PICH/Primary Examiner, Art Unit 2495
Read full office action

Prosecution Timeline

Oct 03, 2024
Application Filed
Jan 10, 2026
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603782
INTEGRITY PROTECTION SCHEMES IN MOBILE COMMUNICATION
2y 5m to grant Granted Apr 14, 2026
Patent 12596803
SYSTEMS AND METHODS FOR FORENSIC RESOLUTION OF RANSOMWARE ATTACKS
2y 5m to grant Granted Apr 07, 2026
Patent 12556406
COMMUNICATION SYSTEM, SERVER, AND FUNCTION EXECUTING DEVICE
2y 5m to grant Granted Feb 17, 2026
Patent 12549550
Decentralized Trust Establishment Using Sentiment
2y 5m to grant Granted Feb 10, 2026
Patent 12526130
CRYPTOGRAPHIC HASH DIGESTS FROM QUANTUM INFORMATION
2y 5m to grant Granted Jan 13, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
87%
Grant Probability
98%
With Interview (+11.1%)
3y 1m
Median Time to Grant
Low
PTA Risk
Based on 358 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month