Prosecution Insights
Last updated: April 19, 2026
Application No. 18/938,315

DATA PROCESSING METHOD AND APPARATUS, CORE NETWORK NODE, ELECTRONIC DEVICE, AND STORAGE MEDIUM

Non-Final OA §102§103
Filed
Nov 06, 2024
Examiner
TRUVAN, LEYNNA THANH
Art Unit
2435
Tech Center
2400 — Computer Networks
Assignee
Vivo Mobile Communication Co., Ltd.
OA Round
1 (Non-Final)
76%
Grant Probability
Favorable
1-2
OA Rounds
3y 11m
To Grant
96%
With Interview

Examiner Intelligence

Grants 76% — above average
76%
Career Allow Rate
379 granted / 498 resolved
+18.1% vs TC avg
Strong +20% interview lift
Without
With
+20.4%
Interview Lift
resolved cases with interview
Typical timeline
3y 11m
Avg Prosecution
22 currently pending
Career history
520
Total Applications
across all art units

Statute-Specific Performance

§101
7.1%
-32.9% vs TC avg
§103
50.7%
+10.7% vs TC avg
§102
24.6%
-15.4% vs TC avg
§112
5.9%
-34.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 498 resolved cases

Office Action

§102 §103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . The claimed invention of claims 1-20, filed on 11/6/2024, is acknowledged and considered. Claims 1-20 are pending. Claims 1, 15, and 17 are independent claims. Claim Objections Claims 1, 15, and 17 are objected to because of the following informalities: Claims 1, 15, and 17 recites “application function AF”, where the acronym should be in parenthesis, as to refer to the application function. Appropriate correction is required. Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention. Claim(s) 1, 3, 14-15, and 17-20 is/are rejected under 35 U.S.C. 102(a1) as being anticipated by Uefuji [US 20230074366]. As per claim 1: Uefuji, et al. teaches a data processing method, comprising: receiving, by a first core network node [Uefuji: para 0031-0033; FIG. 1, shows an information management device that includes an acquisition unit, a specification unit, and a restriction unit wherein receiving a request for a target operation. Para 0038; The information management system includes information management device are communicably connected to through a network], a task request sent by an application function AF; and [Uefuji: para 0009; the information management program provides an acquisition function of acquiring belonging organization information indicating a belonging organization of an original owner or an original generator of target information, a specification function of, in response to receiving a request for an operation on the target information, specifying, based on job relevance to the belonging organization] performing, by the first core network node, a process of sending target data to the AF, wherein the target data is data obtained through a privacy protection. [Uefuji: para 0009; the information management program provide the disclosure range being set to a path to the target information or the copy; and a restriction function of restricting execution of the operation. Para 0037; The information management system stores and manages information related to a job in an organization of a user (job-related information). Job-related information includes confidential information] Claim 3: Uefuji: para 0009 [the information management program indicating a belonging organization of target information, a specification function of, in response to receiving a request for an operation on the target information]; discussing the method according to claim 1, wherein before the receiving, by a first core network node, a task request sent by an AF, the method further comprises: obtaining, by the first core network node, a privacy protection agreement with the AF [Uefuji: para 0009], wherein the privacy protection agreement comprises one or more of the following: an identifier of the AF; privacy protection method indication information, wherein the privacy protection method indication information is used to indicate at least one privacy protection method; data processing rule indication information, wherein the data processing rule indication information is used to indicate at least one data processing rule; service demand indication information, wherein the service demand indication information is used to indicate at least one service demand; sample indication information, wherein the sample indication information is used to indicate at least one sample collection parameter [Uefuji: para 0045, 0050; various types of acquired information required for management of job-related information into the database]; and quality of service QoS requirement indication information, wherein the QoS requirement indication information is used to indicate at least one QoS requirement. Claim 14: Uefuji: para 0037-0038 [information management connected through the network, with job-related information includes confidential information], para 0130 [the possible disclosure range can be limited according to a degree of confidentiality or the like of target information, and therefore convenience of information management is improved]; discussing the method according to claim 1, wherein the first core network node is an exposed node of a core network, and the exposed node is a node configured to expose a privacy protection capability of the core network to the AF. As per claim 15: Uefuji, et al. teaches a data processing method, comprising: receiving, by a second core network node [Uefuji: para 0031-0033; FIG. 1, shows an information management device that includes an acquisition unit, a specification unit, and a restriction unit wherein receiving a request for a target operation. Para 0038; The information management system includes information management device are communicably connected to through a network], a first request sent by a first core network node, wherein the first request comprises indication information of a task request of an AF; and [Uefuji: para 0009; the information management program provides an acquisition function of acquiring belonging organization information indicating a belonging organization of an original owner or an original generator of target information, a specification function of, in response to receiving a request for an operation on the target information, specifying, based on job relevance to the belonging organization] performing, by the second core network node, a process of sending target data to the first core network node, wherein the target data is data obtained through a privacy protection. [Uefuji: para 0009; the information management program provide the disclosure range being set to a path to the target information or the copy; and a restriction function of restricting execution of the operation. Para 0037; The information management system stores and manages information related to a job in an organization of a user (job-related information). Job-related information includes confidential information] As per claim 17: Uefuji, et al. teaches a first core network node, comprising a memory and a processor, wherein the memory stores a program or instructions executable in the processor, and the program or the instructions, when executed by the processor, implement a data processing method comprising: receiving a task request sent by an application function AF; and [Uefuji: para 0009; the information management program provides an acquisition function of acquiring belonging organization information indicating a belonging organization of an original owner or an original generator of target information, a specification function of, in response to receiving a request for an operation on the target information, specifying, based on job relevance to the belonging organization] performing a process of sending target data to the AF, wherein the target data is data obtained through a privacy protection. [Uefuji: para 0009; the information management program provide the disclosure range being set to a path to the target information or the copy; and a restriction function of restricting execution of the operation. Para 0037; The information management system stores and manages information related to a job in an organization of a user (job-related information). Job-related information includes confidential information] Claim 18: Uefuji: para 0156-0159; discussing the second core network node, comprising a memory and a processor, wherein the memory stores a program or instructions executable in the processor, and the program or the instructions, when executed by the processor, implement the data processing method according to claim 15. Claim 19: Uefuji: para 0156-0159; discussing the readable storage medium, storing a program or instructions, wherein the program or the instructions, when executed by a processor, implement the data processing method according to claim 1. Claim 20: Uefuji: para 0156-0159; discussing the readable storage medium, storing a program or instructions, wherein the program or the instructions, when executed by a processor, implement the data processing method according to claim 15. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claim(s) 2, 4-13, and 16 is/are rejected under 35 U.S.C. 103 as being unpatentable over Uefuji [US 20230074366] in view of Kamarol, et al. [US 20190034716]. Claim 2: Uefuji: para 0009, 0037 [the information management program provide the disclosure range being set to a path to the target information; and a restriction function of restricting execution of the operation. Job-related information includes confidential information]; discussing the method according to claim 1, wherein the task request comprises a task identifier, and the task identifier is used to indicate whether the task request needs a privacy protection; and the performing, by the first core network node, a process of sending target data to the AF comprises: performing, by the first core network node, the process of sending the target data to the AF in a case that the task identifier indicates that the task request needs a privacy protection. However, Uefuji does not further include “a task identifier, and the task identifier is used to indicate whether the task request needs a privacy protection…the task identifier indicates that the task request needs a privacy protection”. Kamarol discloses receive requests identify each of its assigned tasks t. The vision capability repository may be a dictionary of key-value pairs in the form of (task t, implementation i), where an implementation i can be distributed in various forms (e.g., a dynamic linking library in C/C++). Accordingly, based on the task(s) t specified in the request from a particular fog device [Kamarol: para 0189-0190]. As such, the task can be identified as task t or by the key value pairs. Kamarol further suggest the task with privacy protection by the graph used to represent the various tasks and associated dependencies for a particular workload. Moreover, a privacy policy can be defined separately for each dependency. A privacy policy can be defined for the workload, for example, by specifying whether each task has unrestricted access or restricted access to the original visual data [Kamarol: para 0330-0331]. Accordingly, task t associated to the privacy policy specifying each task has restricted or unrestricted access obviously suggest the task identifier indicate the task request needs a privacy protection. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “a task identifier, and the task identifier is used to indicate whether the task request needs a privacy protection…the task identifier indicates that the task request needs a privacy protection” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 4: Uefuji: para 0049-0050 [updates operation target management log, inputs and outputs various types of information]; discussing the method according to claim 3, wherein after the obtaining, by the first core network node, a privacy protection agreement with the AF, the method further comprises: updating, by the first core network node, the privacy protection agreement with the AF. However, Uefuji did not clearly teach “a privacy protection agreement”. Kamarol discloses a device connectivity graph can be used to represent the various devices and their connectivity in the edge-to-cloud paradigm, and a privacy level agreement (PLA) can be established for each edge of connectivity in the graph [Kamarol: para 0330]. Accordingly, the above privacy constraint (PC) requires the privacy level agreement (PLA) of a particular connectivity link to be capable of accommodating the privacy policy (PP) of a particular data transmission sent over that connectivity link [Kamarol: para 0337].Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “a privacy protection agreement” for the reason to be capable of accommodating the privacy policy (PP) of a particular data transmission sent over that connectivity link [Kamarol: para 0337]. Claim 5: Uefuji: para 0049-0050; discussing the method according to claim 1, wherein the target data comprises at least one of the following: **data stored in a database that satisfies the task request and on which a privacy protection is performed; and data obtained through a first privacy protection on first data, wherein the first data is data collected based on the task request, and the first privacy protection is a privacy protection determined based on the task request. However, Uefuji does not further include “data stored in a database that satisfies the task request and on which a privacy protection is performed”. Kamarol discloses receive requests identify each of its assigned tasks t. The vision capability repository may be a dictionary of key-value pairs in the form of (task t, implementation i), where an implementation i can be distributed in various forms. Accordingly, based on the task(s) t specified in the request from a particular fog device [Kamarol: para 0189-0190]. As such, the task can be identified as task t or by the key value pairs. Kamarol further discusses workload includes a plurality of tasks, including preprocessing, detection, tracking, matching and database access. The graph used to represent the various tasks and associated dependencies for a particular workload. Moreover, a privacy policy can be defined separately for each dependency. A privacy policy can be defined for the workload, for example, by specifying whether each task has unrestricted access or restricted access to the original visual data [Kamarol: para 0330-0331]. Accordingly, task t associated to the privacy policy specifying each task has different restrictions with database access obviously suggest data stored in a database that satisfies the task request and on which a privacy protection is performed. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “data stored in a database that satisfies the task request and on which a privacy protection is performed” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 6: Uefuji: para 0050 [various types of information required for management of job-related information, inputs and outputs various types of information from the restriction unit and the update unit]; discussing the method according to claim 1, wherein the task request comprises **data processing rule indication information, the data processing rule indication information is used to indicate a data processing rule, and the data processing rule is used to perform a privacy protection on data; and the target data comprises: the data obtained through the privacy protection performed based on the data processing rule. However, Uefuji does not further include “data processing rule indication information, the data processing rule indication information is used to indicate a data processing rule, and the data processing rule is used to perform a privacy protection on data; and the target data comprises: the data obtained through the privacy protection performed based on the data processing rule”. Kamarol discloses vision application API may include a privacy policy that defines the requisite privacy treatment for all data and devices associated with a visual fog network. [Kamarol: para 0127]. Kamarol further discusses workload includes a plurality of tasks, including preprocessing, detection, tracking, matching and database access. The graph used to represent the various tasks and associated dependencies for a particular workload. Moreover, a privacy policy can be defined separately for each dependency. A privacy policy can be defined for the workload, for example, by specifying whether each task has unrestricted access or restricted access to the original visual data [Kamarol: para 0330-0331]. Accordingly, the particulars of the privacy policy specifying each task has different access restrictions obviously suggest data processing rule indication information that is used to perform a privacy protection on data where the target data obtained through the privacy protection performed based on the data processing rule. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “data processing rule indication information, the data processing rule indication information is used to indicate a data processing rule, and the data processing rule is used to perform a privacy protection on data; and the target data comprises: the data obtained through the privacy protection performed based on the data processing rule” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 7: Uefuji: para 0009; discussing the method according to claim 1, wherein the task request comprises **service demand indication information, and the service demand indication information is used to indicate a service demand; and the target data comprises: data obtained through a privacy protection performed based on a target data processing rule, wherein the target data processing rule is a data processing rule determined based on the service demand indication information. However, Uefuji does not further include “service demand indication information, and the service demand indication information is used to indicate a service demand; and the target data comprises: data obtained through a privacy protection performed based on a target data processing rule, wherein the target data processing rule is a data processing rule determined based on the service demand indication information”. Kamarol suggest service demand indication information by the service delivery and associated infrastructure, security enhancements, and the provision of services based on Quality of Service (QoS) terms specified in service level and service delivery agreements [Kamarol: para 0061]. Kamarol discusses in types of autonomous operations, machines may even contract for human resources and negotiate partnerships with other machine networks. This may allow the achievement of mutual objectives and balanced service delivery against outlined, planned service level agreements as well as achieve solutions that provide metering, measurements, traceability and trackability. The creation of new supply chain structures and methods may enable a multitude of services to be created, mined for value, and collapsed without any human involvement [Kamarol: para 0065]. Accordingly, the particulars of the services by the service delivery and associated infrastructure that provide metering, measurements, traceability and trackability obviously suggest service demand indication information that is used to indicate a service demand. Kamarol further discusses graph used to represent the various tasks and associated dependencies for a particular workload where a privacy policy can be defined separately for each dependency. A privacy policy can be defined for the workload, for example, by specifying whether each task has unrestricted access or restricted access to the original visual data [Kamarol: para 0330-0331]. Thus, Kamarol suggest and the target data comprises: data obtained through a privacy protection performed based on a target data processing rule determined based on the service demand indication information. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “service demand indication information, and the service demand indication information is used to indicate a service demand; and the target data comprises: data obtained through a privacy protection performed based on a target data processing rule, wherein the target data processing rule is a data processing rule determined based on the service demand indication information” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 8: Uefuji: para 0047-0050; discussing the method according to claim 7, wherein the target data **processing rule comprises at least one of the following: a data processing rule stored in a database and indicated in the service demand indication information; and a data processing rule determined based on a preset mapping rule and having a mapping relationship with the service demand indication information. However, Uefuji does not further include “processing rule comprises at least one of the following: a data processing rule stored in a database and indicated in the service demand indication information”. Kamarol suggest service demand indication information by the service delivery and associated infrastructure, security enhancements, and the provision of services based on Quality of Service (QoS) terms specified in service level and service delivery agreements [Kamarol: para 0061]. Kamarol discloses vision application API may include a privacy policy that defines the requisite privacy treatment for all data and devices associated with a visual fog network. [Kamarol: para 0127]. Kamarol further discusses workload includes a plurality of tasks, including preprocessing, detection, tracking, matching and database access. The graph used to represent the various tasks and associated dependencies for a particular workload. Moreover, a privacy policy can be defined separately for each dependency. A privacy policy can be defined for the workload, for example, by specifying whether each task has unrestricted access or restricted access to the original visual data [Kamarol: para 0330-0331]. Accordingly, the particulars of the privacy policy specifying each task has different access restrictions with database access obviously suggest data processing rule comprises a data processing rule stored in a database and indicated in the service demand indication information. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “processing rule comprises at least one of the following: a data processing rule stored in a database and indicated in the service demand indication information” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 9: Uefuji: para 0009, 0037 [Job-related information includes confidential information]; discussing the method according to claim 1, wherein the task request comprises task type indication information, the task type indication information is used to indicate that a task type comprises at least one of a periodic task, an event-based task, and **a one-time task; and the target data comprises at least one of the following: **periodic data obtained through a privacy protection on data from a periodic collection in a case that the task type indicated in the task type indication information is the periodic task; and data obtained through a privacy protection on data from an event-triggered collection in a case that the task type indicated in the task type indication information is the event-based task. However, Uefuji does not further include “a one-time task” and “periodic data obtained through a privacy protection on data from a periodic collection in a case that the task type indicated in the task type indication information is the periodic task”. Kamarol discloses existing deep learning CNNs (e.g., inception or ResNet CNN models) typically repeat an inner module multiple times, and the inner module aggregates the results from multiple convolution layers and/or the original input at the end [Kamarol: para 0262]. This suggest collection of data of different times or periodic data collection. Kamarol finds it is important to implement effective privacy and security policies to protect sensitive visual data of underlying users or subjects [Kamarol: para 0294]. Kamarol further discusses workload includes a plurality of tasks, including preprocessing, detection, tracking, matching and database access. The graph used to represent the various tasks and associated dependencies for a particular workload. Moreover, a privacy policy can be defined separately for each dependency. A privacy policy can be defined for the workload by specifying whether each task has unrestricted access or restricted access to the original visual data [Kamarol: para 0330-0331]. Accordingly, the particulars of the privacy policy specifying each task (i.e. “a one-time task”) has different access restrictions defined separately for each dependency obviously suggest periodic data obtained through a privacy protection on data from a periodic collection and the task type indication information is the periodic task. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “a one-time task” and “periodic data obtained through a privacy protection on data from a periodic collection in a case that the task type indicated in the task type indication information is the periodic task” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 10: Uefuji: para 0040; discussing the method according to claim 1, wherein the task request **comprises QoS requirement indication information, and the QoS requirement indication information is used to indicate a QoS parameter required for a task; and the method further comprises: sending, by the first core network node, QoS execution indication information to the AF, wherein the QoS execution indication information is used to indicate a QoS parameter executed for the target data. However, Uefuji does not further include “QoS requirement indication information, and the QoS requirement indication information is used to indicate a QoS parameter required for a task; and the method further comprises: sending, by the first core network node, QoS execution indication information to the AF, wherein the QoS execution indication information is used to indicate a QoS parameter executed for the target data”. Kamarol suggest service demand indication information by the service delivery and associated infrastructure, security enhancements, and the provision of services based on Quality of Service (QoS) terms specified in service level and service delivery agreements [Kamarol: para 0061]. Kamarol discusses in types of autonomous operations, machines may even contract for human resources and negotiate partnerships with other machine networks. This may allow the achievement of mutual objectives and balanced service delivery against outlined, planned service level agreements as well as achieve solutions that provide metering, measurements, traceability and trackability. The creation of new supply chain structures and methods may enable a multitude of services to be created, mined for value, and collapsed without any human involvement [Kamarol: para 0065]. Accordingly, the particulars of the services by the service delivery and associated infrastructure that provide metering, measurements, traceability and trackability obviously suggest QoS requirement indication information that may be used to indicate a QoS parameter required for a task QoS execution indication information indicate a QoS parameter executed for the target data. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “QoS requirement indication information, and the QoS requirement indication information is used to indicate a QoS parameter required for a task; and the method further comprises: sending, by the first core network node, QoS execution indication information to the AF, wherein the QoS execution indication information is used to indicate a QoS parameter executed for the target data” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 11: Uefuji: para 0009, 0043 [permitting or restricting execution of the operation]; discussing the method according to claim 1, further comprising: sending, by the first core network node, **failure indication information to the AF in a case that the first core network node fails to perform the process of sending the target data to the AF, wherein the failure indication information is used to indicate one or more of a failure reason and a rollback time, and the rollback time is used to indicate a time and/or a time interval for the AF to re-initiate the task request. However, Uefuji does not further include “failure indication information to the AF in a case that the first core network node fails to perform the process of sending the target data to the AF, wherein the failure indication information is used to indicate one or more of a failure reason and a rollback time, and the rollback time is used to indicate a time and/or a time interval for the AF to re-initiate the task request”. Kamarol suggest service demand indication information by the service delivery and associated infrastructure, security enhancements, and the provision of services based on Quality of Service (QoS) terms specified in service level and service delivery agreements [Kamarol: para 0061]. Kamarol discusses in types of autonomous operations, machines may even contract for human resources and negotiate partnerships with other machine networks. This may allow the achievement of mutual objectives and balanced service delivery against outlined, planned service level agreements as well as achieve solutions that provide metering, measurements, traceability and trackability. The creation of new supply chain structures and methods may enable a multitude of services to be created, mined for value, and collapsed without any human involvement [Kamarol: para 0065]. Accordingly, the particulars of the services by the service delivery and associated infrastructure that provide metering, measurements, traceability and trackability may provide indications to request and determine failure. Kamarol further discloses allowing the IoT devices to reconfigure their operations and communications, such as to determine needed resources in response to conditions, queries, and device failures. As an example, a query from a user located at a server about the operations of a subset of equipment monitored by the IoT devices may result in the fog device selecting the IoT devices, such as particular sensors, needed to answer the query. The data from these sensors may then be aggregated and analyzed by any combination of the sensors, data aggregators or gateways, before being sent on by the fog device to the server to answer the query [Kamarol: para 0076]. By the reconfiguration operations in response to failures obviously suggest failure indication information that fails to perform the process of sending the target data, indicate one or more of a failure reason and a rollback time, and the rollback time is used to indicate a time and/or a time interval for the AF to re-initiate the task request. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “failure indication information to the AF in a case that the first core network node fails to perform the process of sending the target data to the AF, wherein the failure indication information is used to indicate one or more of a failure reason and a rollback time, and the rollback time is used to indicate a time and/or a time interval for the AF to re-initiate the task request” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 12: Uefuji: para 0043; discussing the method according to claim 11, further comprising: receiving, by the first core network node, first failure indication information sent by a second core network node, wherein the first failure indication information is used to indicate one or more of the failure reason, the rollback time, and privacy protection node indication information, the privacy protection node indication information is used to indicate an address of an alternative privacy protection node, and the second core network node is a node configured to perform a privacy protection on data; and sending, by the first core network node, second failure indication information to the AF, wherein the second failure indication information is used to indicate one or more of the failure reason and the rollback time. However, Uefuji does not further include “first failure indication information sent by a second core network node, wherein the first failure indication information is used to indicate one or more of the failure reason, the rollback time, and privacy protection node indication information, the privacy protection node indication information is used to indicate an address of an alternative privacy protection node, and the second core network node is a node configured to perform a privacy protection on data; and sending, by the first core network node, second failure indication information to the AF, wherein the second failure indication information is used to indicate one or more of the failure reason and the rollback time”. Kamarol discusses in types of autonomous operations, machines may even contract for human resources and negotiate partnerships with other machine networks. This may allow the achievement of mutual objectives and balanced service delivery against outlined, planned service level agreements as well as achieve solutions that provide metering, measurements, traceability and trackability. The creation of new supply chain structures and methods may enable a multitude of services to be created, mined for value, and collapsed without any human involvement [Kamarol: para 0065]. Accordingly, the particulars of the services by the service delivery and associated infrastructure that provide metering, measurements, traceability and trackability may provide indications to request and determine failure. Kamarol discloses allowing the IoT devices to reconfigure their operations and communications, such as to determine needed resources in response to conditions, queries, and device failures. The data from these sensors may be aggregated and analyzed by any combination of the sensors, data aggregators or gateways, before being sent on by the fog device to the server to answer the query [Kamarol: para 0076]. By the reconfiguration operations in response to failures obviously suggest first failure indication information used to indicate one or more of the failure reason, the rollback time, the privacy protection node indication information is used to indicate an address of an alternative privacy protection node and privacy protection node indication information where sending second failure indication information and indicate one or more of the failure reason and the rollback time. Kamarol further discusses workload includes a plurality of tasks, including preprocessing, detection, tracking, matching and database access. The graph used to represent the various tasks and associated dependencies for a particular workload. Moreover, a privacy policy can be defined separately for each dependency. A privacy policy can be defined for the workload by specifying whether each task has unrestricted access or restricted access to the original visual data [Kamarol: para 0330-0331]. Accordingly, the particulars of the privacy policy specifying each task (i.e. “a one-time task”) has different access restrictions defined separately for each dependency obviously suggest privacy protection node indication information, the privacy protection node indication information is used to indicate an address of an alternative privacy protection node, and the second core network node is a node configured to perform a privacy protection on data. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “first failure indication information sent by a second core network node, wherein the first failure indication information is used to indicate one or more of the failure reason, the rollback time, and privacy protection node indication information, the privacy protection node indication information is used to indicate an address of an alternative privacy protection node, and the second core network node is a node configured to perform a privacy protection on data; and sending, by the first core network node, second failure indication information to the AF, wherein the second failure indication information is used to indicate one or more of the failure reason and the rollback time” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 13: Uefuji: para 0009; discussing the method according to claim 1, further comprising: sending, by the first core network node, a first request to a second core network node, wherein the first request comprises **indication information of the task request, and the second core network node is a node configured to perform a privacy protection on data; and receiving, by the first core network node, target data sent by the second core network node, wherein the target data is data obtained by the second core network node through a privacy protection. However, Uefuji does not further include “indication information of the task request, and the second core network node is a node configured to perform a privacy protection on data; and receiving, by the first core network node, target data sent by the second core network node, wherein the target data is data obtained by the second core network node through a privacy protection”. Kamarol discusses in types of autonomous operations, machines may even contract for human resources and negotiate partnerships with other machine networks. This may allow the achievement of mutual objectives and balanced service delivery against outlined, planned service level agreements as well as achieve solutions that provide metering, measurements, traceability and trackability [Kamarol: para 0065]. Accordingly, the particulars of the services by the service delivery and associated infrastructure that provide metering, measurements, traceability and trackability may provide indications to request and determine failure. The particulars of the services by the service delivery and associated infrastructure that provide metering, measurements, traceability and trackability may provide indications to request and determine failure obviously suggest indication information of the task request. Kamarol discusses workload includes a plurality of tasks, including preprocessing, detection, tracking, matching and database access. The graph used to represent the various tasks and associated dependencies for a particular workload. Moreover, a privacy policy can be defined separately for each dependency. A privacy policy can be defined for the workload, for example, by specifying whether each task has unrestricted access or restricted access to the original visual data [Kamarol: para 0330-0331]. Accordingly, the privacy policy defined with different restrictions with database access obviously suggest perform a privacy protection on data and the target data is data obtained through a privacy protection. Therefore, it would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to combine Kamarol with Uefuji to teach “indication information of the task request, and the second core network node is a node configured to perform a privacy protection on data; and receiving, by the first core network node, target data sent by the second core network node, wherein the target data is data obtained by the second core network node through a privacy protection” for the reason to perform computing tasks more efficiently, thus improving resource utilization, latency, accuracy, precision, and reliability [Kamarol: para 0040]. Claim 16: Uefuji: para 00; discussing the method according to claim 15, wherein the task request comprises a task identifier, and the task identifier is used to indicate whether the task request needs a privacy protection; and the performing, by the second core network node, a process of sending target data to the first core network node comprises: performing, by the second core network node, the process of sending the target data to the first core network node in a case that the task identifier indicates that the task request needs a privacy protection. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to Leynna Truvan whose telephone number is (571)272-3851. The examiner can normally be reached Monday-Friday 9:00AM-5:00PM, EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Amir Mehrmanesh can be reached at 571-270-3351. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. Leynna Truvan Examiner Art Unit 2435 /L.TT/Examiner, Art Unit 2435 /AMIR MEHRMANESH/Supervisory Patent Examiner, Art Unit 2491
Read full office action

Prosecution Timeline

Nov 06, 2024
Application Filed
Feb 19, 2026
Non-Final Rejection — §102, §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603917
SYSTEMS AND METHODS FOR IP SPOOFING SECURITY
2y 5m to grant Granted Apr 14, 2026
Patent 12574242
CONTROLLED PRIVACY IN BIOMETRIC IDENTIFICATION
2y 5m to grant Granted Mar 10, 2026
Patent 12556387
METHOD AND APPARATUS TO FACILITATE TRANSMISSION OF AN ENCRYPTED ROLLING CODE
2y 5m to grant Granted Feb 17, 2026
Patent 12554890
SYSTEM AND METHOD FOR PRIVACY POLICY ENFORCEMENT
2y 5m to grant Granted Feb 17, 2026
Patent 12542657
Reinitialization of an application secret by way of the terminal
2y 5m to grant Granted Feb 03, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
76%
Grant Probability
96%
With Interview (+20.4%)
3y 11m
Median Time to Grant
Low
PTA Risk
Based on 498 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month