throbber
Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 1 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 1 of 14
`
`EXHIBIT 6
`EXHIBIT 6
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 2 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 2 of 14
`UNITED STATES PATENT AND TRADEMARK OFFICE
`.
`
`
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Virginia 22313-3450
`www.uspto.gov
`
`APPLICATION NO.
`
`FILING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKETNO.
`
`CONFIRMATIONNO.
`
`10/838,889
`
`05/03/2004
`
`Shlomo Touboul
`
`,
`
`60644-8007.US01
`
`5334
`
`7590
`22918
`PERKINS COIE LLP
`P.O. BOX 2168
`MENLOPARK,CA 94026
`
`10/04/2007
`
`|
`
`EXAMINER
`
`REVAK, CHRISTOPHER A
`
`ART UNIT
`
`2131
`
`MAIL DATE
`
`10/04/2007
`
`PAPER NUMBER
`
`DELIVERY MODE
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time periodforreply, if any, is set in the attached communication.
`
`PTOL-90A (Rev. 04/07)
`
`

`

`'
`
`oO
`
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 3 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 3 of 14
`Application No.
`Applicant(s)
`
`Office Action Summary
`
`,
`
`10/838,889
`Examiner
`
`ChristopherA. Revak
`
`TOUBOUL, SHLOMO
`Art Unit
`
`2131 po
`
`-- The MAILING DATEof this communication appears on the cover sheetwith the correspondence address --
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLYIS SET TO EXPIRE 3 MONTH(S) OR THIRTY (30) DAYS,
`WHICHEVER IS LONGER, FROM THE MAILING DATE OF THIS COMMUNICATION.
`Extensions of time may be available under the provisions of 37 CFR 1.136(a).
`In no event, however, may a reply be timely filed
`after SIX (6) MONTHSfrom the mailing date of this communication.
`If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHSfrom the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED(35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication, evenif timely filed, may reduce any
`earned patent term adjustment. See 37 CFR 1.704(b).
`
`Status
`
`1)K] Responsive to communication(s) filed on 23 July 2007.
`2a) This action is FINAL.
`|
`2b)L] This action is non-final.
`3) Sincethis application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordancewith the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.
`
`Disposition of Claims
`
`4) Claim(s) 1-45 is/are pending inthe application.
`4a) Of the above claim(s)
`is/are withdrawn from consideration.
`5)0 Claim(s)
`is/are allowed.
`6)X) Claim(s) 1-45 is/are rejected.
`7)\0 Claim(s)__ is/are objected to.
`8)L] Claim(s)___ are subject to restriction and/or election requirement.
`
`Application Papers
`
`N
`
`9)C The specification is objected to by the Examiner.
`10)X] The drawing(s)filed on 03 May 2004 is/are: a)[X] accepted or b)[_] objected to by the Examiner.
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`Replacement drawing sheet(s) including the correction is requiredif the drawing(s) is objected to. See 37 CFR 1.121(d).
`11)(_] The oath or declaration is objected to by the Examiner. Note the attached Office Action or form PTO-152.
`
`Priority under 35 U.S.C. § 119
`
`12) Acknowledgmentis madeofa claim for foreign priority under 35 U.S.C. § 119(a)-(d)or(f).
`a)C] All
`b){_] Some * c)] Noneof:
`1.0] Certified copies of the priority documents have been received.
`2. Certified copies of the priority documents have been received in Application No.
`3.1] Copiesof the certified copies of the priority documents have been received in this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`* See the attached detailed Office action for a list of the certified copies not received.
`
`6) Cc] Other: U.S. Patent and Trademark Office
`
`Attachment(s)
`1) [] Notice of References Cited (PTO-892)
`2) [ Notice of Draftsperson’s Patent Drawing Review (PTO-948)
`3) [J Information Disclosure Statement(s) (PTO/SB/08)
`Paper No(s)/Mail Date.
`
`.
`
`4) LJ Interview Summary (PTO-413)
`Paper No(s)/Mail Date.
`5) [_] Notice of informal Patent Application
`
`PTOL-326 (Rev. 08-06)
`
`Office Action Summary
`
`.
`Part of Paper No./Mail Date 20071001
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 4 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 4 of 14
`
`Application/Control Number: 10/838,889 _
`Art Unit: 2131
`
`Page 2
`
`DETAILED ACTION
`
`Response to Arguments
`
`The examiner hereby withdraws the objection to the specification in light of the
`1.
`applicant’s amendment overcoming the objection.
`|
`
`2.
`
`Applicant's argumentsfiled have been fully considered but they are not
`
`persuasive.
`
`It is asserted by the applicantthat Ji fails to disclose of file cache, let alone any
`type of cache, and additionally fail to disclose of any type of security profile.
`The examiner disagrees with the applicant’s assertion. The examiner agrees
`
`that Ji fails to disclose of the term “cache” and “profile”, however the applicant hasfailed
`to further limit what constitutes these terms. Ji discloses of a monitoring package which
`
`is part of a scannerthat checks applets to determineif the applets are in violation of a
`
`security check, see column3,lines 16-44.
`It is inherent that the files are temporarily
`stored in the scannersincethefiles are interpreted by the scannerfor malicious
`content. For any type of processing, content is temporarily stored in a cache,or buffer,
`prior to being read and interpreted by the processor. Ji additionally discloses of creation
`of a report, which is equated to the claimed “profile”, that indicates violation of a security
`
`In responseto applicant's
`policy, see column 3, lines 40-44 and column5,lines 45-50.
`argument that the referencesfail to show certain features of applicant’s invention,it is
`noted that the features upon which applicantrelies (i.e., cache and profile) are not
`
`recited in the rejected claims. Although the claims are interpreted in light of the
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 5 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 5 of 14
`
`Application/Control Number: 10/838,889
`Art Unit: 2131
`
`Page 3
`
`specification, limitations from the specification are not read into the claims. See /n re
`
`Van Geuns, 988 F.2d 1181, 26 USPQ2d 1057 (Fed. Cir. 1993).
`
`Claim Rejections - 35 USC § 102
`
`3.
`
`The:following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that
`
`form the basis for the rejections under this section madein this Office action:
`
`A person shall be entitled to a patent unless —
`
`(e) the invention was described in (1) an application for patent, published under section 122(b), by
`anotherfiled in the United States before the invention by the applicant for patent or (2) a patent
`granted on an application for patent by anotherfiled in the United States before the invention by the
`applicant for patent, except that an international application filed under the treaty defined in section
`351(a) shall have the effects for purposesof this subsection of an application filed in the United States
`only if the international application designated the United States and was published underArticle 21(2)
`of such treaty in the English language.
`
`4.
`
`Claims 1-45 are rejected under 35 U.S.C. 102(b) as being anticipated by Ji, U.S.
`
`Patent 5,983,348.
`
`As perclaim 1, it is taught by Ji of a computer gateway for an intranet of
`
`computers, comprising a scannerfor scanning incomingfiles from the Internet and
`deriving security profiles therefor, and the security profiles being lists of computer
`commandsthat the files are programmedto perform;a file cachefor storing files
`scannedby the scanner; a security profile cache for storing security profiles forfiles;
`and a security policy cachefor storing security policies for intranet computers within an
`
`intranet, the security policies including a list of restrictions forfiles that are transmitted to
`
`intranet computers(col. 3, lines 7-9 & 16-44).
`It is inherent.that the files are temporarily
`stored in the scannersincethefiles are interpreted by the scanner for malicious .
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 6 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 6 of 14
`
`Application/Control Number: 10/838,889
`Art Unit: 2131
`
`Page 4
`
`content. For any type of processing, content is temporarily stored in a cache, or buffer,
`prior to being read and interpreted by the processor.
`|
`Asper claims 2 and 13, Ji discloses wherein security policies include at least one
`
`alternate action to take when transmissionofa file to an intranet computeris restricted
`(col. 3, lines 38-44).
`|
`As perclaims 3,14, and 371, it is taught by Ji wherein the file cache indexesfiles -
`according to their Universal Resource Identifiers (URIs) (col. 3, lines 32-44).
`
`Asperclaims 4,15, and 32,it is disclosed by Ji wherein thefile cache indexes
`
`files accordingtofile !Ds (col. 8, lines 6-15).
`Asper claims 5.16, and 33, Ji teaches wherein the file IDs are hash values of
`files(col. 8, lines 6-15).
`
`As per claims 6,17, and 34, Ji discloses wherein the file IDs are used to ensure
`that duplicate files are not cached more than once (col. 8, lines 6-15).
`As per claims 7,18, and 35,it is taught by Ji wherein thefile IDs are used to
`ensurethat a file is not re-scannedif its security profile is already resident in the security
`
`profile cache (col. 8, lines 6-15).
`
`As per claims 8,19, and 36, it is disclosed by Ji wherein the security profile cache
`indexes security profiles according to URIs of correspondingfiles (col. 3, lines 32-44).
`As per claims 9,20, and 37, Ji teaches wherein the security profile cache indexes
`
`security profiles according to files IDs of correspondingfiles (col. 8, lines 6-15).
`
`As perclaims 10,21, and 38, Ji discloses wherein the file IDs are hash values of
`
`files (col. 8, lines 6-15).
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 7 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 7of14 -
`
`Application/Control Number: 10/838,889
`Art Unit: 2134
`
`-
`
`Page 5
`
`,
`
`As per claims 11 and 22, it is taught by Ji wherein the security policy cache
`indexes security policies according to groups of intranet users (col. 3, lines 38-44).
`
`Asper claim 12, it is disclosed by Ji of a method for operation of a network
`
`gateway for an intranet of computers, comprising receiving a request from an intranet
`computer for a file on the Internet; determining whether the requested file resides within
`a file cacheat the network gateway;if said determiningis affirmative; retrieving a
`security profile for the requestedfile from a security profile cache at the network
`
`gateway, the security profile including a list of at least one computer command that the
`
`file is programmedto perform; and if said determiningis not affirmative; retrieving the
`
`requestedfile from the Internet; scanning the retrieved file to determine computer
`
`commandsthatthefile is programmedto perform; deriving a security profile for the
`
`~
`
`retrieved file; storing the retrieved file within the file cache; and storing the security
`profile for the retrieved file within a security profile cache; retrieving a security policy for
`
`the intranet computer from a security policy cache at the network gateway, the security
`
`policy defining restrictions for transmitting files to the intranet computer; and comparing
`the securityprofile for the requestedfile vis a vis the security policy for the intranet
`computer,to determine whethertransmission ofthe requestedfile to the intranet
`computeris to be restricted (col. 3, lines 7.9 & 16-44).
`
`Asperclaims 23 and 27, Ji teaches of synchronizing the file cache and the
`
`security profile cache(col. 3, lines 32-44).
`
`|
`
`As per claim 24, Ji discloses of a computer-readable storage medium storing
`
`program codefor causing a computerto perform the steps of receiving a request from
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 8 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 8 of 14
`
`Application/Control Number: 10/838,889
`Art Unit: 2131
`
`Page 6
`
`an intranet computerfor a file on the Internet; determining whether the requestedfile
`
`resides within a file cache at the network gateway; if said determining is affirmative;
`
`retrieving a security profile for the requested file from a security profile cache at the
`
`network gateway, the security profile including a list of at least one computer command
`
`that the file is programmed to perform; andif said determining is not affirmative;
`
`retrieving the requestedfile from the Internet; scanning the retrieved file to determine
`
`_ computer commandsthatthefile is programmedto perform; deriving a security profile
`
`for the retrieved file; storing the retrievedfile within the file cache; and storing the
`
`security profile for the retrievedfile within a security profile cache; retrieving a security
`policy for the intranet computer from a security policy cache at the network gateway,the
`security policy defining restrictions for transmitting files to the intranet computer; and
`
`comparingthe security profile for the requestedfile vis a vis the security policy for the
`
`intranet computer, to determine whether transmission of the requestedfile to the
`intranet computeris to be restricted (col. 3, lines 7-9 & 16-44).
`
`As perclaim 25, it is taught by Ji of a method for operation of a network gateway
`
`for an intranet of computers, comprising receiving a request from an intranet computer
`
`for a file on the Internet; retrieving a security profile for the requestedfile from a security:
`
`profile cache at the network gateway, the security profile including a list of at least one
`
`computer commandthatthefile is programmedto perform; retrieving a security policy
`
`for the intranet computer from a security policy cache at the network gateway, the
`
`security policy defining restrictions on files that can be transmitted to the intranet
`
`computer: and comparing the security profile for the requested file vis a vis the security
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 9 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 9 of 14
`
`Application/Control Number: 10/838,889
`Art Unit: 2131
`
`|
`
`Page 7
`
`policy for the intranet computer, to determine whether transmission of the requestedfile
`to the intranet computer is to be restricted (col. 3, lines 7-9 & 16-44).
`
`Asperclaim 26, it is disclosed by Ji of retrieving the requestedfile from a file
`
`cacheat the network gateway; and transmitting the requested file to the intranet
`
`computerif said comparing determinesthat transmission of the requestedfile to the
`
`intranet computeris not to be restricted (col. 3, lines 7-9 & 16-44).
`—
`Asper claim 28, Ji teaches wherein security policies include at least one
`
`alternate action to take when transmissionof a file to an intranet computeris restricted,
`
`the method further comprising taking such an alternative action if said comparing
`
`determines that transmission of the requestedfile to the intranet computeris to be
`
`restricted (col. 3, lines 7-9 & 16-44).
`
`_ As per claim 29, Ji discloses of a computer-readablestorage medium storing
`program codefor causing a computer to perform the steps of receiving a requestfrom
`
`an intranet computer for a file within the Internet;
`
`retrieving a security profile for the
`
`requestedfile from a security profile cache at the network gateway, the security profile
`includingalist of at least one computer commandthatthefile is programmedto
`
`perform;
`
`retrieving a security policy for the client computer from a security policy cache
`
`at the network gateway, the security policy defining restrictions on files that can be
`
`transmitted to the intranet computer; and comparing the security profile for the
`requestedfile vis a vis the security policy for the intranet computer, to determine
`whether transmission of the requestedfile to the intranet computeris to be restricted
`
`(col. 3, lines 7-9 & 16-44).
`
`

`

`Case 3:17-cv-05659-WHA Document349-7 Filed 01/04/19 Page 10 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 10 of 14
`
`Application/Control Number: 10/838,889
`Art Unit: 2131
`
`Page 8
`,
`
`Asper claim 30,it is taught by Ji of a method for operation of a network gateway
`for an intranet of computers, comprising retrieving a requested file from the Internet;
`scanningthe retrievedfile to determine computer commandsthatthe file and the web
`objects are programmedto perform;deriving a security profile for the retrievedfile, the
`
`security profile including a list of at least one computer commandthat the retrievedfile
`
`is programmedto perform; storing the retrieved file within a file cache; and storing the
`
`security profile for the retrieved file within a security profile cache (col. 3, lines 7-9 & 16-
`44).
`|
`
`As perclaim 39,it is disclosed by Ji of a computer-readable storage medium
`
`storing program code for causing a computerto perform the stepsof retrieving a
`requestedfile from the Internet; scanning the retrieved file to determine computer
`
`commandsthatthefile is programmedto perform; deriving a security profile for the
`
`retrieved file, the security profile including a list of at least one computer commandthat
`
`the retrieved file is programmed to perform; storing the retrieved file within a file cache;
`
`and storing the security profile for the retrieved file within a security profile cache (col. 3,
`
`lines 7-9 & 16-44).
`
`As perclaim 40, Ji teaches of a computer gateway for an intranet of computers,
`
`comprising a file cache for storing files; a security profile cache for storing security
`
`‘profiles for files, the security profiles being lists of computer commands thatthefiles are
`
`programmedto perform; and a security policy cache for storing security policies for
`
`intranet computers within an intranet, the security policies including a list of restrictions
`for files that are transmitted to intranet computers (col. 3, lines 7-9 & 16-44).
`|
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 11 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 11 of 14
`
`Application/Control Number: 10/838,889
`Art Unit: 2131
`
`Page 9
`
`Asper claim 41, Ji discloses of a method for operation of a network gateway for
`
`an intranet of computers, comprising receiving a request from anintranet computer fora
`. file on the Internet; determining whetherthe requestedfile resides withinafile cacheat
`‘the network gateway;if said determining is affirmative; retrieving a security profile for
`
`the requestedfile from a security profile cache at the network gateway, the security
`
`profile including a list of at least one computer commandthat the file is programmedto
`
`perform; andif said determining is not affirmative; retrieving the requestedfile from the
`
`Internet; storing the retrieved file within the file cache; and storing a security profile for
`
`the retrieved file within a security profile cache; retrieving a security policy for the
`
`intranet computer froma security policy cache at the network gateway, the security
`
`policy defining restrictions for transmitting files to the intranet computer; and comparing
`
`the security profile for the requestedfile vis a vis the security policy for the intranet
`
`computer, to determine whether transmission of the requestedfile to the intranet
`
`computeris to be restricted (col. 3, lines 7-9 & 16-44).
`
`As perclaim 42, it is taught by Ji of a computer-readable storage medium storing
`
`program code for causing a computer to perform the stepsof: receiving a requestfrom
`
`an intranet computerfora file on the Internet; determining whether the requestedfile
`
`resides within a file cache at the network gateway; if said determining is affirmative;
`
`retrieving a security profile for the requested file from a security profile cache at the
`network gateway, the security profile includingalist of at least one computer command
`thatthefile is programmed to perform: andif said determining is not affirmative;
`
`retrieving the requestedfile from the Internet; storing the retrieved file within thefile
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 12 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 12 of 14
`
`Application/Control Number: 10/838,889
`Art Unit: 2131
`
`.
`
`Page 10
`
`cache; and storing a security profile for the retrieved file within a security profile cache;
`
`retrieving a security policy for the intranet computer from a security policy cache at the
`
`network gateway, the security policy defining restrictions for transmitting files to the
`intranet computer; and comparing the security profile for the requested file vis a vis the
`
`security policy for the intranet computer, to determine whether transmission of the
`
`requestedfile to the intranet computeris to be restricted (col. 3, lines 7-9 & 16-44).
`As perclaim 43,Ji teaches of a computer gateway for an intranet of computers,
`
`comprising a scannerfor scanning outgoingfiles from an intranet to the Internet and
`
`deriving security profiles therefor, the security profiles being lists of computer
`
`commandsthatthe.files are programmed to perform; and a security policy cache for
`
`storing security policies for recipient computers within the Internet, the security policies
`
`including a list of restrictions forfiles that are transmitted to recipient computers(col. 3,
`
`. lines 7-9 & 16-44).
`
`As per claim 44, Ji discloses of a method for operation of a network gatewayfor
`
`an intranet of computers, comprising receiving a file from an intranet computer for
`transmission to a recipient computeron the Internet; scanning the receivedfile to
`
`derive a security profile for the received file, the security profile including a list of at least
`one computer commandthatthefile is programmed to perform; retrieving a security
`
`policy from a security policy cache at the network gateway, the security policy defining
`
`restrictions for transmitting files to recipient computers; and comparing the security
`
`profile for the receivedfile vis a vis the security policy, to determine whether
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 13 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 13 of 14
`
`Application/Control Number: 10/838,889
`Art Unit: 2131
`
`Page 11
`
`transmission of the requestedfile to the recipient computeris to be restricted (col. 3,
`
`lines 7-9 & 16-44).
`
`Asperclaim 45, it is taught by Ji of a computer-readable storage medium storing
`
`program codefor causing a computerto perform the steps of: receivinga file from an
`
`intranet computerfor transmission to a recipient computer on the Internet; scanning the
`
`receivedfile to derive a security profile for the receivedfile, the security profile including
`a list of at least one computer command that the file is programmed to perform;
`
`retrieving a security policy from a security policy cache at the network gateway, the
`
`security policy defining restrictions for transmitting files to recipient computers; and
`
`comparing the security profile for the receivedfile vis a vis the security policy, to
`
`determine whethertransmission of the requestedfile to the recipient computeris to be
`
`restricted (col. 3, lines 7-9 & 16-44).
`
`Conclusion
`
`5.
`THIS ACTION IS MADEFINAL. Applicant is reminded of the extension of time
`policy as setforth in 37 CFR 1.136(a).
`|
`
`A shortenedstatutory period for reply to this final action is set to expire THREE
`
`MONTHSfrom the mailing date of this action.
`
`In the eventa first reply is filed within
`
`TWO MONTHS of the mailing date of this final action and the advisory action is not
`mailed until after the end of the THREE-MONTHshortened statutory period, then the
`shortened statutory period will expire on the date the advisory action is mailed, and any
`
`extension fee pursuant to 37 CFR 1.136(a) will be calculated from the mailingdate of
`
`

`

`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 14 of 14
`Case 3:17-cv-05659-WHA Document 349-7 Filed 01/04/19 Page 14 of 14
`
` Application/Control Number: 10/838,889
`Art Unit: 2131
`
`|
`
`Page 12
`
`In no event, however,will the statutory period for reply expire later
`the advisory action.
`than SIX MONTHSfrom the mailing date of this final action.
`6.
`Anyinquiry concerning this communication or earlier communications from the
`examiner should be directed to Christopher A. Revak whose telephone numberis 571-
`
`|
`
`272-3794. The examiner can normally be reached on Monday-Friday, 6:30am-3:00pm.
`
`If attempts to reach the examiner by telephone are unsuccessful, the examiner's
`
`supervisor, Ayaz Sheikh can be reached on 571-272-3795. The fax phone numberfor
`the organization where this application or proceeding is assigned is 571-273-8300.
`
`Information regarding the status of an application may be obtained from the
`Patent Application Information Retrieval (PAIR) system. Status information for
`published applications may be obtained from either Private PAIR or Public PAIR.
`
`Status information for unpublished applications is available through Private PAIR only.
`
`For more information about the PAIR system, see http://pair-direct.uspto.gov. Should
`
`you have questions on accessto the Private PAIR system, contact the Electronic
`Business Center (EBC) at 866-217-9197(toll-free). If you would like assistance from a
`
`USPTO Customer Service Representative or access to the automated information
`
`system, call 800-786-9199 (IN USA OR CANADA)or 571-272-1000.
`
`CR
`
`September 30, 2007
`
`CHRISTOPHER REVA
`PRIMARY EXAMINER
`
`Ope
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket