Prosecution Insights
Last updated: April 19, 2026
Application No. 18/936,588

METHODS AND APPARATUSES FOR UNMANNED AERIAL SYSTEM (UAS) IDENTIFICATION, BINDING AND PAIRING

Non-Final OA §103§112§DP
Filed
Nov 04, 2024
Examiner
ALMAGHAYREH, KHALID M
Art Unit
2492
Tech Center
2400 — Computer Networks
Assignee
InterDigital Patent Holdings, Inc.
OA Round
1 (Non-Final)
84%
Grant Probability
Favorable
1-2
OA Rounds
2y 8m
To Grant
99%
With Interview

Examiner Intelligence

Grants 84% — above average
84%
Career Allow Rate
208 granted / 248 resolved
+25.9% vs TC avg
Strong +25% interview lift
Without
With
+25.2%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
13 currently pending
Career history
261
Total Applications
across all art units

Statute-Specific Performance

§101
6.2%
-33.8% vs TC avg
§103
47.5%
+7.5% vs TC avg
§102
18.8%
-21.2% vs TC avg
§112
22.1%
-17.9% vs TC avg
Black line = Tech Center average estimate • Based on career data from 248 resolved cases

Office Action

§103 §112 §DP
DETAILED ACTION This communication responsive to the Application No. 18/936,588 filed on November 04, 2024. Claims 1-16 are pending and are directed towards METHODS AND APPARATUSES FOR UNMANNED AERIAL SYSTEM (UAS) IDENTIFICATION, BINDING AND PAIRING. Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Information Disclosure Statement The information disclosure statements (IDS) submitted on 11/05/2024, 04/09/2025 and 05/31/2025 were Acknowledge. The submission is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statements are being considered by the examiner. Specification The use of the term “WI-FI”, which is a trade name or a mark used in commerce, has been noted in this application. The term should be accompanied by the generic terminology; furthermore the term should be capitalized wherever it appears or, where appropriate, include a proper symbol indicating use in commerce such as ™, SM , or ® following the term. Although the use of trade names and marks used in commerce (i.e., trademarks, service marks, certification marks, and collective marks) are permissible in patent applications, the proprietary nature of the marks should be respected and every effort made to prevent their use in any manner which might adversely affect their validity as commercial marks. Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. Claims 7-8 and 15 rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Claims 7 and 15 recite “a PDU session”, the acronym PDU should be defined. Claim 7 and 15 recite the limitation " receiving the response indicating acceptance of the C2 communication authorization". There is insufficient antecedent basis for this limitation in the claim. Claims 8 recites “a UAV WTRU”, the acronym WTRU should be defined. Double Patenting The nonstatutory double patenting rejection is based on a judicially created doctrine grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or improper timewise extension of the “right to exclude” granted by a patent and to prevent possible harassment by multiple assignees. A nonstatutory double patenting rejection is appropriate where the conflicting claims are not identical, but at least one examined application claim is not patentably distinct from the reference claim(s) because the examined application claim is either anticipated by, or would have been obvious over, the reference claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); In re Thorington, 418 F.2d 528, 163 USPQ 644 (CCPA 1969). A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may be used to overcome an actual or provisional rejection based on nonstatutory double patenting provided the reference application or patent either is shown to be commonly owned with the examined application, or claims an invention made as a result of activities undertaken within the scope of a joint research agreement. See MPEP § 717.02 for applications subject to examination under the first inventor to file provisions of the AIA as explained in MPEP § 2159. See MPEP § 2146 et seq. for applications not subject to examination under the first inventor to file provisions of the AIA . A terminal disclaimer must be signed in compliance with 37 CFR 1.321(b). The filing of a terminal disclaimer by itself is not a complete reply to a nonstatutory double patenting (NSDP) rejection. A complete reply requires that the terminal disclaimer be accompanied by a reply requesting reconsideration of the prior Office action. Even where the NSDP rejection is provisional the reply must be complete. See MPEP § 804, subsection I.B.1. For a reply to a non-final Office action, see 37 CFR 1.111(a). For a reply to final Office action, see 37 CFR 1.113(c). A request for reconsideration while not provided for in 37 CFR 1.113(c) may be filed after final for consideration. See MPEP §§ 706.07(e) and 714.13. The USPTO Internet website contains terminal disclaimer forms which may be used. Please visit www.uspto.gov/patent/patents-forms. The actual filing date of the application in which the form is filed determines what form (e.g., PTO/SB/25, PTO/SB/26, PTO/AIA /25, or PTO/AIA /26) should be used. A web-based eTerminal Disclaimer may be filled out completely online using web-screens. An eTerminal Disclaimer that meets all requirements is auto-processed and approved immediately upon submission. For more information about eTerminal Disclaimers, refer to www.uspto.gov/patents/apply/applying-online/eterminal-disclaimer. Claims 1-16 rejected on the ground of nonstatutory double patenting as being unpatentable over claims 1-3, 6-8, 10-13, 16-18 and 20 of U.S. Patent No. 12,170,903 B2 in view of Zhang et al. US 2021/0345117 A1 (hereinafter “Zhang”). Although some of the conflicting claims are not identical, they are not patentably distinct from each other. The only difference between the instant application and the parent patent when combining claim 2 and claim is that the indicating rejection of authorization for C2 communication is sent as a NAS response message (the function indication information may be carried in an NAS message, and is parallel to the registration request. Optionally, the registration request may be carried in the NAS message, the NAS message further includes an authorization request of the terminal, and the authorization request is parallel to the registration request. Optionally, the registration request and the authorization request may be carried in the NAS message, and the authorization request may further include the function indication information. Zhang, para [0218-0220]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention, to include the limitation of using NAS messaging to send and receive commands. Furthermore, the omission of an element with a corresponding loss of function is an obvious expedient. See In re Karlson, 136 USPQ 184 and Ex parte Rainu, 168 USPQ 375. In particular, all limitations of dependent claim 2 were omitted, which when added to independent claim 1, render claim 1 allowable over prior art. Instant Application: 18/936,588 U.S. Patent No. 12,170,903 B2 Claim 1: A method comprising: transmitting, to a network node, after receipt of pairing authorization indicating that an unmanned aerial vehicle (UAV) is paired with a UAV-controller (UAV-C), a request for command and control (C2) communication authorization between the UAV and the UAV-C; and receiving, from the network node, based on the request for the C2 communication authorization, a response indicating rejection of the C2 communication authorization. Claim 2: The method of claim 1, further comprising: transmitting, to the network node, a first non-access stratum (NAS) request message that includes a registration request indication, a UAV identification (UAV ID) and a unmanned aerial system (UAS) service supplier (USS) identification (USS ID); receiving, from the network node, a first NAS response message that indicates that registration was accepted; transmitting, to the network node, a second NAS request message comprising pairing information for the UAV and the UAV-C to be paired with the UAV, wherein transmitting the second NAS request message is performed after receipt of the first NAS response message; and receiving, from the network node, a second NAS response message comprising the pairing authorization indicating that pairing was accepted Claim 1: A method for use in an unmanned aerial vehicle (UAV) having a UAV wireless transmit/receive unit (WTRU) for cellular communication, the method comprising: transmitting, to a network node, a first non-access stratum (NAS) request message that includes a registration request indication, a UAV identification (UAV ID), and a USS identification (USS ID); receiving, from the network node, a first NAS response message that indicates that registration was accepted; transmitting, to the network node, a second NAS request message comprising pairing information for the UAV and a UAV-controller (UAV-C) to be paired with the UAV, wherein transmitting the second NAS request message is performed after receipt of the first NAS response message; receiving, from the network node, a second NAS response message that indicates that pairing was accepted; transmitting, to the network node, after receipt of the indication that pairing was accepted, a request for command and control (C2) communication authorization between the UAV and the UAV-C; and receiving, from the network node, based on the request for C2 authorization, a third NAS response message indicating rejection of authorization for C2 communication. Claim 3: The method of claim 2, wherein the second NAS request message is a protocol data unit (PDU) session request message and the second NAS response message is a PDU session response message. Claim 2: The method of claim 1, wherein the second NAS request message is a protocol data unit (PDU) session request message and the second NAS response message is a PDU session response message. Claim 4: The method of claim 2, wherein the second NAS response message further comprises an unmanned aerial system (UAS) identification (UAS ID), wherein an UAS associated with the UAS ID includes the UAV and the UAV-C. Claim 10: The method of claim 1, wherein the second NAS request message includes a UAV ID associated with the UAV and a UAV-C ID associated with the UAV-C, and wherein an UAS comprises the UAV and the UAV-C. Claim 5: The method of claim 2, wherein, based on the USS ID, the UAV ID is carried in a binding request to an unmanned aerial system (UAS) service supplier (USS)/UAS traffic management (USS/UTM) for binding authorization of a UAV wireless transmit/receive unit (UAV WTRU) with the UAV associated with the UAV ID; wherein a binding response indication is determined by the USS/UTM; and wherein transmitting the second NAS request message is performed responsive to receipt of the binding response indication. Claim 6: The method of claim 1, wherein, based on the USS ID, the UAV ID is carried in a binding request to an unmanned aerial system (UAS) service supplier (USS)/UAS traffic management (UTM) for binding authorization of the UAV WTRU with the UAV associated with the UAV ID; wherein the binding response indication is determined by the USS/UTM; and wherein transmitting the second NAS request message is performed responsive to receipt of the binding response indication. Claim 6: The method of claim 5, wherein the second NAS request message is transmitted based on that the UAV is bound with the UAV WTRU, wherein the second NAS request message includes an UAV-C ID. Claim 7: The method of claim 6, wherein the second NAS request message is transmitted on a condition that the UAV is bound with the UAV WTRU, wherein the second NAS request message includes the UAV-C ID. Claim 7: The method of claim 1, further comprising: based on receiving the response indicating acceptance of the C2 communication authorization, establishing, via a network node performing a session management function (SMF), a PDU session between the UAV and the UAV-C for C2 communication. Claim 3: The method of claim 1, further comprising: upon receiving the second NAS response message, establishing, via a network node performing a session management function (SMF), a PDU session with the UAV-C for the C2 communication. Claim 8: The method of claim 1, further comprising: transmitting, to the network node, another NAS request message that includes an authentication and authorization request that includes a UAV WTRU identification (UAV WTRU ID) and one or more UAV WTRU capabilities for cellular communication; and receiving, from the network node, another NAS response message that includes an authentication and authorization response indicating whether the UAV WTRU is authenticated and authorized for access to a cellular network for the cellular communication. Claim 8: The method of claim 6, further comprising: transmitting, to the network node, another NAS request message that includes an authentication and authorization request that includes a UAV WTRU identification (UAV WTRU ID) and one or more UAV WTRU capabilities for the cellular communication; and receiving, from the network node, another NAS response message that includes an authentication and authorization response indicating whether the UAV WTRU is authenticated and authorized for access to the cellular network. Claim 9: An unmanned aerial vehicle (UAV) comprising: a UAV wireless transmit/receive unit (WTRU); and a processor, the UAV WTRU and the processor configured to: transmit, to a network node, after receipt of pairing authorization indicating that the UAV is paired with a UAV-controller (UAV-C), a request for command and control (C2) communication authorization between the UAV and the UAV-C; and receive, from the network node, based on the request for the C2 communication authorization, a response indicating rejection of the C2 communication authorization. Claim 10: The UAV of claim 9, wherein the UAV WTRU and the processor are further configured to: transmit, to the network node, a first non-access stratum (NAS) request message that includes a registration request indication, a UAV identification (UAV ID) and an unmanned aerial system (UAS) service supplier (USS) identification (USS ID); receive, from the network node, a first NAS response message that indicates that registration was accepted; transmit, to the network node, a second NAS request message comprising pairing information for the UAV and the UAV-C to be paired with the UAV, wherein transmitting the second NAS request message is performed after receipt of the first NAS response message; and receive, from the network node, a second NAS response message comprising the pairing authorization indicating that pairing was accepted. Claim 11: An unmanned aerial vehicle (UAV) comprising: a UAV wireless transmit/receive unit (WTRU) for cellular communication; and a processor, the UAV WTRU and the processor configured to: transmit, to a network node, a first non-access stratum (NAS) request message that includes a registration request indication, a UAV identification (UAV ID), and a USS identification (USS ID); receive, from the network node, a first NAS response message that indicates that registration was accepted; transmit, to the network node, a second NAS request message comprising pairing information for the UAV and a UAV-controller (UAV-C) to be paired with the UAV, wherein transmitting the second NAS request message is performed after receipt of the first NAS response message; receive, from the network node, a second NAS response message that indicates that pairing was accepted; transmit, to the network node, after receipt of the indication that pairing was accepted, a request for command and control (C2) communication authorization between the UAV and the UAV-C; and receive, from the network node, a third NAS response message indicating rejection of authorization for C2 communication. Claim 11: The UAV of claim 10, wherein the second NAS request message is a protocol data unit (PDU) session request message and the second NAS response message is a PDU session response message. Claim 12: The UAV of claim 11, wherein the second NAS request message is a protocol data unit (PDU) session request message and the second NAS response message is a PDU session response message. Claim 12: The UAV of claim 10, wherein the second NAS response message further comprises an unmanned aerial system (UAS) identification (UAS ID), wherein an UAS associated with the UAS ID includes the UAV and the UAV-C. Claim 20: The UAV of claim 11, wherein the second NAS request message includes a UAV ID associated with the UAV and a UAV-C ID associated with the UAV-C, and wherein an UAS comprises the UAV and the UAV-C. Claim 13: The UAV of claim 10, wherein, based on the USS ID, the UAV ID is carried in a binding request to an unmanned aerial system (UAS) service supplier (USS)/UAS traffic management (USS/UTM) for binding authorization of a UAV wireless transmit/receive unit (UAV WTRU) with the UAV associated with the UAV ID; wherein a binding response indication is determined by the USS/UTM; and wherein transmitting the second NAS request message is performed responsive to receipt of the binding response indication Claim 16: The UAV of claim 11, wherein, based on the USS ID, the UAV ID is carried in a binding request to an unmanned aerial system (UAS) service supplier (USS)/UAS traffic management (UTM) for binding authorization of the UAV WTRU with the UAV associated with the UAV ID; wherein the binding response indication is determined by the USS/UTM; and wherein transmitting the second NAS request message is performed responsive to receipt of the binding response indication. Claim 14: The UAV of claim 13, wherein the second NAS request message is transmitted based on that the UAV is bound with the UAV WTRU, wherein the second NAS request message includes an UAV-C ID. Claim 17: The UAV of claim 16, wherein the second NAS request message is transmitted on a condition that the UAV is bound with the UAV WTRU, wherein the second NAS request message includes the UAV-C ID. Claim 15: The UAV of claim 9, wherein the UAV WTRU and the processor are further configured to, establish, based on receiving the response indicating acceptance of the C2 communication authorization, via a network node performing a session management function (SMF), a PDU session between the UAV and the UAV-C for C2 communication. Claim 13: The UAV of claim 11, wherein the UAV WTRU and the processor are further configured to, upon receiving the second NAS response message, establish, via a network node performing a session management function (SMF), a PDU session with the UAV-C for the C2 communication. Claim 16: The UAV of claim 9, wherein the UAV WTRU and the processor are further configured to: transmit, to the network node, another NAS request message that includes an authentication and authorization request that includes a UAV WTRU identification (UAV WTRU ID) and one or more UAV WTRU capabilities for cellular communication; and receive, from the network node, another NAS response message that includes an authentication and authorization response indicating whether the UAV WTRU is authenticated and authorized for access to a cellular network for the cellular communication. Claim 18: The UAV of claim 16, wherein the UAV WTRU and the processor are further configured to: transmit, to the network node, another NAS request message that includes an authentication and authorization request that includes a UAV WTRU identification (UAV WTRU ID) and one or more UAV WTRU capabilities for the cellular communication; and receive, from the network node, another NAS response message that includes an authentication and authorization response indicating whether the UAV WTRU is authenticated and authorized for access to the cellular network. Allowable Subject Matter Claims 2 and 10 objected to as being dependent upon a rejected base claim, but would be allowable if rewritten in independent form including all of the limitations of the base claim and any intervening claims. Claims 3-6 and 11-14 are objected by dependency. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claim(s) 1, 7, 9 and 15 are rejected under 35 U.S.C. 103 as being unpatentable over Hong US 2022/0022154 A1 (hereinafter “Hong”) in view of Zhang et al. US 2021/0345117 A1 (hereinafter “Zhang”) As per claims 1 and 9, Hong teaches a method comprising: transmitting, to a network node, after receipt of pairing authorization indicating that an unmanned aerial vehicle (UAV) is paired with a UAV-controller (UAV-C), a request for command and control (C2) communication authorization between the UAV and the UAV-C (the embodiment provides the implementation solution in which the UAV or the UAV controller registers pairing to a mobile cellular network, thereby facilitating subsequent communication between the UAV or the UAV controller through the mobile cellular network. Hong, para [0006]), (the first NAS signaling is sent to a core network, to request registration of pairing information of the UAV and the UAV controller.. Hong, para [0153]); (second NAS signaling fed back by the core network and indicating a registration success is received. Hong, para [0154]) (the core network may feed registration success information back to the first user device…a notification message indicating the registration success is sent to the second user device. Hong, para [0012] [0013]); (establishing a corresponding relationship between the first identity and the second identity. Hong, para [0025]) (The core network may perform the pairing registration on the UAV and the UAV controller upon the reception of the first NAS signaling, and may allow that the UAV and the UAV controller communicate subsequently through the mobile cellular network. Hong, para [0115]). Hong does not explicitly teach receiving, from the network node, based on the request for the C2 communication authorization, a response indicating rejection of the C2 communication authorization. However, Zhang teaches receiving, from the network node, based on the request for the C2 communication authorization, a response indicating rejection of the C2 communication authorization (The authorization response corresponding to the uncrewed aerial vehicle controller may include information about an uncrewed aerial vehicle that the uncrewed aerial vehicle controller is allowed to control, for example, an identifier or an identifier list of the uncrewed aerial vehicle that the UTM allows the uncrewed aerial vehicle controller to control. It may be understood as meaning that the UTM allows the uncrewed aerial vehicle controller to control a specified uncrewed aerial vehicle. The authorization response corresponding to the uncrewed aerial vehicle controller may include information about an uncrewed aerial vehicle that the uncrewed aerial vehicle controller is rejected to control, for example, an identifier or an identifier list of the uncrewed aerial vehicle that the UTM rejects the uncrewed aerial vehicle controller to control. Zhang, para [0165]-[0166])( the UTM may generate the authorization response based on the subscription information of the terminal. For example, if the subscription information does not include related information of a function of the uncrewed aerial vehicle controller (or the uncrewed aerial vehicle), the terminal is rejected, in the authorization response, to use the function of the uncrewed aerial vehicle controller (or the uncrewed aerial vehicle). If the subscription information includes related information of the function of the uncrewed aerial vehicle controller (or the uncrewed aerial vehicle), the UTM may determine information about an uncrewed aerial vehicle that the uncrewed aerial vehicle controller is allowed to control (or information about an uncrewed aerial vehicle controller that the uncrewed aerial vehicle is allowed to be paired with), and the like, and include the information in the authorization response. Zhang, para [0204]) Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention, to modify the teaching of Hong in view of Zhang. One would be motivated to do so, mange controlling of UAVs by rejecting or allowing C2 as needed. As per claims 7 and 15, Hong and Zhang teach the method of claim 1. Hong does not explicitly teach the method further comprising: based on receiving the response indicating acceptance of the C2 communication authorization, establishing, via a network node performing a session management function (SMF), a PDU session between the UAV and the UAV-C for the C2 communication. However, Zhang teaches based on receiving the response indicating acceptance of the C2 communication authorization, establishing, via a network node performing a session management function (SMF), a PDU session between the UAV and the UAV-C for the C2 communication. (the authorization request corresponding to the terminal may be carried in a service request message, a protocol data unit (PDU) session establishment message, a PDU session modification message, or a non-access-stratum (NAS) message; and may also be carried in newly added signaling or another message. Correspondingly, an authorization response corresponding to the terminal may be carried in a service accept message, a PDU session establishment accept message, a PDU session modification accept message, newly added signaling, or another message. For example, if the authorization request is carried in the PDU session establishment message or the PDU session modification message, the terminal may send the authorization request to the SMF, and the SMF forwards the authorization request or the information in the authorization request to the UTM. Alternatively, the SMF may further parse out the information in the authorization request to automatically generate a new message, and sends the new message to the UTM. The new message is used to request authorization from the UTM.. Zhang, para [0191-0193]). Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention, to modify the system of Hong in view of Zhang. One would be motivated to do so, to exchange and manage data between a UAV and a UAV controller. Claim(s) 8 and 16 are rejected under 35 U.S.C. 103 as being unpatentable over Hong US 2022/0022154 A1 (hereinafter “Hong”) in view of Zhang et al. US 2021/0345117 A1 (hereinafter “Zhang”) and further in view of Liao US 2022/0086741 A1 (hereinafter “Liao”) As per claims 8 and 16, Hong and Zhang teach the method of claim 6. Hong does not explicitly teach the method further comprising: transmitting, to the network node, another NAS request message that includes an authentication and authorization request that includes a UAV WTRU identification (UAV WTRU ID) and one or more UAV WTRU capabilities for cellular communication; and receiving, from the network node, another NAS response message that includes an authentication and authorization response indicating whether the UAV WTRU is authenticated and authorized for access to a cellular network for the cellular communication. However, Liao teaches transmitting, to the network node, another NAS request message that includes an authentication and authorization request that includes a UAV WTRU identification (UAV WTRU ID) and one or more UAV WTRU capabilities for cellular communication (The 3rd party SCS/AS sends a C-UTM Service Request (SCS/AS Identifier, TTRI, External Identifiers/External Group Identifier of the UAV/UAV controller, external Application Identifiers, UAS operation authorization for each Application Identifier) message to the SCEF… The SCEF sends a UAS Operation Service Authorization Request message (Application Identifier(s), one or more sets of UAS operation information for each Application Identifier, External identifiers/External Group identifiers or IMSI) to the C-UTMF. Liao, para [0125]-[0131]); and receiving, from the network node, another NAS response message that includes an authentication and authorization response indicating whether the UAV WTRU is authenticated and authorized for access to a cellular network for the cellular communication (The SCEF sends a UAS Operation Service Authorization Request message (If UAS operation authorization is done successfully, it continues to create the list of UAS operation policies for each Application Identifier into the C-UTM function as requested by the respective UAS operation. If any of the authorization fails, the C-UTM function sends UAS Operation Service Authorization Response (Application Identifier(s), Cause) message to provide the feedback of the handling result for the C-UTM Service Request, whereby the cause can indicates the failure reasons for the authorization per Application ID, e.g. service suspend, service expiration, service unavailable…The SCEF sends a UAS Operation Service Response (TTRI, Result) message to the 3rd party SCS/AS to provide the feedback of the handling result for UAS Operation Service Request. Liao, para [0132]-[0134]) Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention, to modify the teaching of Hong in view of Liao. One would be motivated to do so, to identify communication capabilities between communicating entities. Conclusion The prior art made of record and not relied upon is considered pertinent to applicant's disclosure. A. Hong US 2022/0070949 A1 directed to user device pairing for unmanned aerial vehicle and an unmanned aerial vehicle controller. B. Yi et al. US 2021/0208602 A1 directed to aerial control system. Any inquiry concerning this communication or earlier communications from the examiner should be directed to KHALID M ALMAGHAYREH whose telephone number is (571)272-0179. The examiner can normally be reached Monday - Thursday 8AM-5PM EST & Friday variable. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, RUPAL DHARIA can be reached at (571)272-3880. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. Respectfully Submitted /KHALID M ALMAGHAYREH/Primary Examiner, Art Unit 2492
Read full office action

Prosecution Timeline

Nov 04, 2024
Application Filed
Jan 17, 2026
Non-Final Rejection — §103, §112, §DP (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12596848
METHOD OF VERIFYING INTEGRITY OF DATA FROM A DEVICE UNDER TEST
2y 5m to grant Granted Apr 07, 2026
Patent 12587840
AUTHENTICATION MANAGEMENT IN A WIRELESS NETWORK ENVIRONMENT
2y 5m to grant Granted Mar 24, 2026
Patent 12587386
CHECKOUT WITH MAC
2y 5m to grant Granted Mar 24, 2026
Patent 12579328
SYSTEM ON A CHIP AND METHOD GUARANTEEING THE FRESHNESS OF THE DATA STORED IN AN EXTERNAL MEMORY
2y 5m to grant Granted Mar 17, 2026
Patent 12572699
Using Memory Protection Data
2y 5m to grant Granted Mar 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
84%
Grant Probability
99%
With Interview (+25.2%)
2y 8m
Median Time to Grant
Low
PTA Risk
Based on 248 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month