`
`IJNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and '1‘nuIcnI.ark (Jflicc
`Ad¢In:s~;: (IOMMISSIONI-J{ I-"OR 1’A'I'|iNl'lx'
`P,() Iiux I450
`f\lcxnI1dria.Vir;:inia 22?-l3— I-I50
`www usplo gov
`
`A|’I’I.I(.'/\'I'I()N NO.
`
`121345.505
`
`I"II.IN('u l)1\I'I‘.
`
`l2f29!2(JDB
`
`1"IRS'|' NAMIJ) Ii\'VIEi\"|'()I-3
`
`i\'I‘I'()I{EVI'.Y DO('KI'i'I' NO.
`
`(T(JN1"|RM./\'l'|03\." N0.
`
`Scott C, Ilarris
`
`Wirclc5sCl
`
`796.‘-
`
`SCUTT C HARRIS
`1-’ 0 BOX 927649
`SAN DIEGO. CA 92192
`
`COLIN CARL G
`
`NOTIFICATION DATE
`
`DELIVERY MODE
`
`IDf29.I‘2UU'9
`
`]:II_LiCl'RONlC
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`Notice of the Office communication was sent electronically on aboVe—indicated "Notification Date" to the
`following e-mail address(es):
`SC()1l@|1ElffISCS.C()I11
`SCIIIISPIO@gI111|Ii.C()I11
`
`l"TOL—9'0A (Rev. 0-#07)
`
`STARWOOD Ex 1003, page 1
`
`
`
`Office Action Summary
`
`Application No.
`
`Applicantls)
`
`‘l2i34-5,565
`
`HARRIS, SCOTT C.
`
`Examine,
`
`CARL COLIN
`
`M Unit
`
`2433 -
`
`- The MAILING DA TE of this communication appears on the cover sheet with the correspondence address -
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE § MONTH(S) OR THIRTY (30) DAYS,
`WHICHEVER IS LONGER, FROM THE MAILING DATE OF THIS COMMUNICATION.
`- Extensions of time may be available under the provisions of 3? CFR 1.136(a).
`In no event, however, may a reply be timely filed
`after SIX (6) MONTHS from the mailing date of this communication.
`If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS Irorn the mailing date of this communication.
`—
`- Failure to reply within the set or extended period for reply will. by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication. even if timely filed, may reduce any
`earned patent term adjustment. See 37 CFR 1.7lJd(b).
`
`Statu s
`
`1) Responsive to communication(s) filed on 29 December 2008.
`
`2b)|Z This action is non—finaI.
`2a)I:| This action is FINAL.
`3)I:I Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Ex panie Quayle, 1935 CD. 11, 453 O5. 213.
`
`Disposition of Claims
`
`ME Claim(s) 1 is/are pending in the application.
`4a) Of the above claim(s)_ is/are withdrawn from consideration.
`5)I:I Claim(s)
`isiare allowed.
`
`(HE C|aim(s) 1-:21’ isiare rejected.
`7)[:I C|aim(s)j isfare objected to.
`8)I:I C|aim(s)j are subject to restriction andior election requirement.
`
`Application Papers
`
`9)I:I The specification is objected to by the Examiner.
`10) The drawing(s) filed on 29 December 2008 isfare: a)E accepted or b)|:| objected to by the Examiner.
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR ‘l.85(
`).
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 3? CFR 1.‘l21(d).
`
`11)I:I The oath or declaration is objected to by the Examiner. Note the attached Office Action or form PTO-152.
`
`Priority under 35 U.S.C. § 119
`
`12)I:I Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § ‘l19(a)-(d) or (f).
`a)I:I All
`b)I:I Some * c)I:I None of:
`1.I:I Certified copies of the priority documents have been received.
`2.[:I Certified copies of the priority documents have been received in Application No.
`3.I:I Copies of the certified copies of the priority documents have been received in this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`* See the attached detailed Office action for a list of the certified copies not received.
`
`Attachmentjs)
`
`1) E Notice of References Cited (PTO—892)
`2) El Notice of Draftsperson's Patent Drawing Review (PTO-948)
`3) E Information Disclosure Statementis) (PTOlSBi08)
`Paper No(s)iMail Date ‘l2.f29r‘20D8.
`U.S. Patent and Trademark Office
`PTOL-326 (Rev. 08-06)
`
`4) El Interview Summary (PTO-413)
`P3P9" N0t9l"M3“ D313 S
`5) El NOHCE Of '"f0|'mfi| Patent APP|iC3ti0|1
`6) El Other:
`.
`
`Office Action Summary
`
`Part of Paper No.iIvlai| Date 20091025
`
`STARWOOD Ex 1003, page 2
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`DETAILED ACTION
`
`Pursuant to USC 13], claims 1-2] are presented for examination.
`
`Priority
`
`2.
`
`Applicant’s claim for the benefit ofa prior-filed application under 35 U.S.C. 1 l9(e) or
`
`under 35 U.S.C. 120, 12], or 365(e) is acknowledged.
`
`Information Disclosure Statement
`
`3.
`
`The information disclosure statement filed 12/29/2008 fails to comply with 37 CFR
`
`l_98(a)(l), which requires the following: (1) a list of all patents, publications, applications, or
`
`other information submitted for consideration by the Office; (2) U.S. patents and U.S. patent
`
`application publications listed in a section separately from citations of other documents; (3) the
`
`application number of the application in which the information disclosure statement is being
`
`submitted on each page of the list; (4) a column that provides a blank space next to each
`
`document to be considered, for the examiner’s initials; and (5) a heading that clearly indicates
`
`that the list is an information disclosure statement. The information disclosure statement has
`
`been placed in the application file, but the information referred to therein has not been
`
`considered.
`
`STARWOOD Ex 1003, page 3
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Double Parenting
`
`4.
`
`The nonstatutory double patenting rejection is based on a judicially created doctrine
`
`grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or
`
`improper timewise extension of the "right to exclude" granted by a patent and to prevent possible
`
`harassment by multiple assignees. See In re Goodman, 1 1 F.3d 1046, 29 USPQ2d 2010 (Fed.
`
`Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Omum, 686
`
`F.2d 937, 214 USPQ 761 (CCPA l982);1n re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA
`
`l970);and, In re Tkorfngron, 418 F.2d 528, I63 USPQ 644 (CCPA 1969).
`
`A timely filed terminal disclaimer in compliance with 37 CFR l.32l(c) may be used to
`
`overcome an actual or provisional rejection based on a nonstatutory double patenting ground
`
`provided the conflicting application or patent is shown to be commonly owned with this
`
`application. See 37 CFR l.l3U(b).
`
`Effective January 1, 1994, a registered attorney or agent of record may sign a terminal
`
`disclaimer. A terminal disclaimer signed by the assignee must fully comply with 37
`
`CFR 3.73(b).
`
`5.
`
`Claim 1-21 are rejected on the ground of nonstatutory obviousness—type double patenting
`
`as being unpatentablc over claims l—|4 of U.S. Patent No. 7,490,348. Although the conflicting
`
`claims are not identical, they are not patentably distinct from each other.
`
`6.
`
`Claim(s) 1-14 of Patent/Application #7,490,348 contain(s) every element of
`
`claim(s) 1 and 13 of the instant application and thus anticipate the clai1n(s) of the
`
`instant application. Claim(s ) 1-16 of the instant application therefore isfare not
`
`patently distinct from the earlier patent claim(s) and as such is/are unpatentable over
`
`STARWOOD Ex 1003, page 4
`
`
`
`Application/Control Number: l2f345,565
`Art Unit: 2433
`
`Page 4
`
`ohvi0us—type double patenting. A later patent/application claim is not patentably
`
`distinct from an earlier claim if the later claim is anticipated by the earlier claim.
`
`“A later patent claim is not patentably distinct from an earlier patent claim it the later
`
`claim is obvious over, or anticipated by, the earlier claim. In re Longi, 759 F.2d at 896,
`
`225 USPQ at 651 (affirming a holding of obviousness—type double patenting because
`
`the claims at issue were obvious over claims in four prior art patents); In re Berg, 140
`
`F.3d at 1437, 46 USPO2d at 1233 (Fed. Cir. 1998) (affirming a holding of obviousness
`
`type double patenting where a patent application claim to a genus is anticipated by a
`
`patent claim to a species within that genus). “ ELI LILLY AND COMPANY v BARR
`
`LABORATORIES, INC., United States Court of Appeals for the Federal Circuit, ON
`
`PETITION FOR REHEARING EN BANC (DECIDED: May 30, 2001).
`
`"Claim 12 and Claim 13 are generic to the species of invention covered by
`
`claim 3 of the patent. Thus, the generic invention is "anticipated" by the
`
`species of the patented invention. Ct., Titanium Metals Corp. v. Banner,
`
`778 F.2d 775, 227 USPQ 773 (Fed. Cir. 1985) (holding that an earlier
`
`species disclosure in the prior art defeats any generic claim) 4 . This
`
`court's predecessor has held that, without a terminal disclaimer, the
`
`species claims preclude issuance of the generic application. In re Van
`
`Ornum, 686 F.2d 937, 944, 214 USPQ 761, 767 (CCPA 1982).
`
`Accordingly, absent a terminal disclaimer, claims 12 and
`
`13 were properly rejected under the doctrine of obviousness-type double
`
`patenting." (In re Goodman (CA FC) 29 USPQ2d 2010 (12i'3!1993)
`
`STARWOOD Ex 1003, page 5
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 5
`
`7.
`
`Claim 17 of the instant application is similar to claims 1 and 4 of the patented application
`
`except for specifying a resource such as voice over IP.
`
`It would have been obvious to one of
`
`ordinary skill in the art in possession of the claims of the patented application to implement the
`
`invention over any kinds of network resources since this would only require routine skill in the
`
`art as the patented application discloses using first access criteria for network access resources.
`
`Therefore, claims 17-21 are rejected under obviousness-type double patenting.
`
`Claim Rejections - 35 USC § 1 I2
`
`The following is a quotation of the second paragraph of 35 U.S.C. 112:
`
`The specification shall conclude with one or more claims particularly pointing out and
`distinctly claiming the subject matter which the applicant regards as his invention.
`
`9.
`
`Claims 1-18 are rejected under 35 U.S.C.
`
`l 12, second paragraph, as being indefinite for
`
`failing to particularly point out and distinctly claim the subject matter which applicant regards as
`
`the invention.
`
`10.
`
`Claims 1, 13, and 17 recite transmitting a first and second wireless network system. The
`
`word system as known in the art defines a number of connected hardware components.
`
`It
`
`appears that applicant meant to claim wireless communication or wireless service. Appropriate
`
`correction is requested.
`
`1 1.
`
`Claim 15 recites the limitation "said encrypted stream" on line 4 and “said unencrypted
`
`stream” on line 7. There is insufficient antecedent basis for this limitation in the claim.
`
`STARWOOD Ex 1003, page 6
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Claim Rejections - 35 USC § 102
`
`12.
`
`The following is a quotation ofthe appropriate paragraphs of 35 U.S.C. 102 that form the
`
`basis for the rejections under this section made in this Office action:
`
`A person shall be entitled to a patent unless —
`
`(e) the invention was described in (1) an application for patent, published under section
`l22(b), by another filed in the United States before the invention by the applicant for
`patent or (2) a patent granted on an application for patent by another filed in the United
`States before the invention by the applicant for patent, except that an international
`application filed under the treaty defined in section 351(3) shall have the effects for
`purposes of this subsection of an application filed in the United States only if the
`international application designated the United States and was published under Article
`21(2) of such treaty in the English language.
`
`Claims I, 2, 4-7, 9, 10, and 12 are rejected under 35 U.S.C. l02(c) as being anticipated
`
`by US Patent 6,970,927 to Stewart et al (Appiicant ’s IDS).
`
`As per claim 1, Stewart et 211 discloses a wireiess network transmitting system
`
`comprising (see column 9, lines 39-42), Stewart et al discloses the system has different access
`
`points that can provide different communication channels and separate communication traffic
`
`based on the network providers being used (see column 14, lines 19-39); a first level access
`
`providing access to local resources as well as access to the Internet that meets the recitation of a
`
`first networking device. lf‘r.’1l1SlI£i!Iifi'g' afirst wi'reie.s's network sysremjrom afirst location. (see
`
`Column 16, lines 13-20) saia'_first wireless network system requiring afirst access criteria in
`
`order to access .s‘aidjir.s’t wire1e.s:s' network .s;vstem, and .s’aidflrst wireless network .system, when
`
`accesseci using saialfirst access criteria, providing afirst level’ ofaccess to network resources
`
`(see column 16, lines 13-15 and column 16, line 48 through column 17, line 3), Stewart et al
`
`also discloses for instance one or more access points are comprised in an airport and one or more
`
`STARWOOD Ex 1003, page 7
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 7
`
`airlines may maintain various resources (see column 16, lines 21-25) and as noted above the
`
`system has different access points that can provide different communication channels and access
`
`level and separate communication traffic based on the network providers being used (see column
`
`14, lines 19-39) that meets the recitation of a second netwotrking device, transn-n'tting a second
`
`wireiess network systentfront an area adjacent saidfirst location. Stewart et al discloses a
`
`second access level allowing access to the Internet only and no access to local network resources
`
`on the network that meets the recitation of said second wireless network sjzstent controiiing
`
`access without saidfirst access criteria, and providing a second level ofaccess to network
`
`resources in order to access said second wireiess network system, wherein said second level of
`
`access to network resources provided by said second wireless network system is fess access to
`
`network resources than provided by saidfirst level’ ofaccess to network resources provided by
`
`sat'djit1s't wireless network s;v.s'tem (sec column I6, lines I5-20 and column I6, line 48 through
`
`column 17, line 3). Stewart et al also discloses said first communication part having its access
`
`controlled by requiring users of the first communication part to use a first secret key
`
`(identification information which indicates access level) saidfirst wireless network system, when
`
`accessed using saidfirst access criteria (see column 15, lines 40-46 and column 16, lines 42-55)
`
`said second wireiess network system c(Jntr()H1'ng access without said_first access criteria
`
`(identification information) (see column 12, lines 39-46 and column 16, lines 42-55). See
`
`examples ofidentification information in (column 6, lines 18-30 and column 14, lines 55-59, and
`
`column 11, lines 3-33).
`
`STARWOOD Ex 1003, page 8
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 8
`
`As per claim 2, Stewart et al discloses different access points that can provide different
`
`communication channels and access level and separate communication traffic based on the
`
`network providers being used (see column 14, lines 19-3 9) that meets the recitation of wherein
`
`saidjirst and second networidng devices are two separate devices which are physically in a
`
`same housing, and transmit over a same area.
`
`(See also fig.2).
`
`As per claim 4, Stewart et al discloses allowing access to specified level of access to
`
`services (i.c. restricted to use or view private resources of the network) that meets the recitation
`
`of wherein .s'aid_}'irSt‘ level Qfaccess to network resources provides‘ :1 first total am-mm! of data
`
`that can be transferred in a specified session, and said second ievei Qfaccess to network
`
`resources provides a secrmd total’ amount Qfdaia that can be transferred in a specg'fied session,
`
`wherein said second rota!’ amount is less than said_first total amount (see column 16, lines 29-
`
`37').
`
`As per claim 5, Stewart et al discloses an access granting mechanism that detects uscr’s
`
`access level within an identification information (see column 16, lines 15-20 and colurrm 16, line
`
`48 through column 17, line 3) that meets the recitation of wherein said access criteria is a digital
`
`kev.a
`
`As per claim 6, Stewart et al discloses a second access level allowing access to the
`
`lntcmct only and no access to local network resources on the network that meets the recitation of
`
`STARWOOD Ex 1003, page 9
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`wherein said second wireiess network system aiiows access only based on a second access
`
`criteria (sec column 16, lines 15-20 and column 16, line 48 through column I7, line 3).
`
`As per claim 7, Stewart et al discloses access level dependent on identification
`
`information that meets the recitation of wherein said second access criteria is aiso a digital’ key
`
`that is ti.y‘jerent than tnejirst digital key (sec column I5, lines 40-48).
`
`As per claim 9, Stewart et al discloses wherein said access criteria limits access such
`
`that oniy specific Internet pages which can be obtained (see column 16, lines 21-47).
`
`As per Claim 10, Stewart el: al discloses wherein said access is based on a token that
`
`aiiows only a certain amount ofdata transfier (see column 16, lines 2 I -47).
`
`As per claim 12, Stewart et al discloses for instance, one or more access points are
`
`comprised in an airport and one or more airlines may maintain various resources (see column 16,
`
`lines 21-25) and the system has different access points that can provide different communication
`
`channels and access level and separate communication traffic based on the network providers
`
`being used (see column 14, lines 19-39) that meets the recitation of a third networking device,
`
`transmitting a third wireiess network sys2‘eni_fi*'om an area adjacent saidfirst location. Stewart
`
`et al discloses a third level access providing access only to specified internet sites or web pages
`
`and does not include access to private files on said system and this access does not require any
`
`key as it is provided to non-authorized users (see column 15, line 60 through column 16, line 3)
`
`STARWOOD Ex 1003, page 10
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 10
`
`that meets the recitation of wherein said third networicing device operates without either 0f.s'ai¢ri
`
`first or second access criteria and provides a third ievcl Qfaccess to resources‘ which is !'e.s's
`
`access to resr)urrc:es than either r_)f'sairi_fir.st or secoml ievels cfacce.s's.
`
`Claim Rejections - 35 USC § 103
`
`The following is a quotation of 35 U.S.C. l03(a) which forms the basis for all
`
`obviousness rejections set forth in this Office action:
`
`(a) A patent may not be obtained though the invention is not identically disclosed or
`described as set forth in section 102 of this title, if the differences between the subject
`matter sought to be patented and the prior art are such that the subject matter as a whole
`would have been obvious at the time the invention was made to a person having ordinary
`skill in the art to which said subject matter pertains. Patcntability shall not be negativcd
`by the manner in which the invention was made.
`
`Claim 8 is rejected under 35 U.S.C. l03(a) as being unpatcntablc over US Patent
`
`6,970,927 to Stewart et al (Applicant '5 IDS) in view of Examiner's Official Notice.
`
`As per claim 8, Stewart et al substantially discloses the identification information may
`
`be in form of digital certificate (see column 12, lines 4-14) (see column 6, lines 18-30 and
`
`column I4, lines 55-59). Examiner takes official notice that it is very well known in the art that
`
`a digital certificate may include encryption key (such as public key) to access information.
`
`Therefore, it would have been obvious to one of ordinary skill in the art at the time the invention
`
`was made to modify the method of Stewart et alto use an encryption key as identification
`
`information so as to provide security for private information as well-known in the art (see
`
`column 12, lines 4-l5 a11d column 16, lines 21-47).
`
`STARWOOD Ex 1003, page 11
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`14.
`
`Claims I3, 14, and 16 are rejected under 35 U.S.C. l03(a) as being unpatentable over
`
`US Patent 6,970,927 to Stewart et al (Applicant is IDS) in view of Applicant’s Admitted
`
`Prior Art (AAPA).
`
`As per claim I3, Stewart et al substantially discloses a wireless network ,system,
`
`comprising.‘ Stewart et al discloses the system has different access points that can provide
`
`different communication channels and separate communication traffic based on the network
`
`providers being used (see column 14, lines 19-3 9) that meets the recitation of first portion. The
`
`access points also determine the appropriate access level and access method (see column 13,
`
`lines 17-27). Stewart et al discloses a first portion that provides network access and requires
`
`specific identification information for allowing access to resources only on the local network
`
`(see column 13, lines 18-27) that meets the recitation of .' afirst networking device, transmitting
`
`afirst wireiess network .sjfi.s‘tentfrorti a first iocation, saidfirst wireless network .s‘ysrent sending
`
`and receiving
`
`information in order to access s'aid_fir.s't wireless network systent, and said_fir.s't
`
`wireless network .s'ystetJi providing ajirsr ievei ofaccess to network i‘eS0tii‘C€.S‘ via said
`
`infiirniation;
`
`Stewart et al discloses a second portion which does not require the identification
`
`information to get access, and provides the lowest possible level of access to only external access
`
`such as the Internet (a subset of said specified network features) (see column 13, lines 34-44 and
`
`column 12, lines 28-33 and lines 42-46) that meets the recitation of .' a second networking
`
`device, transmitting a second wireless’ network systentfi-orn an area adjacent saidfirst iocation,
`
`STARWOOD Ex 1003, page 12
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 12
`
`said second wireless network system. not being encrypted, and providing a second ievei ofaccess
`
`to network resources in order to access said second wireiess network svstem, wherein said
`
`second ievei ofaccess to network resources provided by said second wireless network system
`
`provides less access to network resources than provided by said_fir.s'r ie vei ofaccess to network
`
`resources provided by saidfirst wireless network system. Stewart et al also discloses limited
`
`access may be only certain Intranet sites (see column 12, lines 28-38).
`
`Stewart does not explicitly disclose that the information may be encrypted or not
`
`encrypted for different level of access. However, App|icant’s admitted prior art discloses it is
`
`very well—known in the art of wireless networks to use encryption so that security can be
`
`achieved. Therefore, it would have been obvious to one ofordinary skill in the art at the time the
`
`invention was made to modify the method of Stewart et al to use an encryption as to provide
`
`secure communication to authorized users.
`
`As per claim 14, Stewart et al discloses different access points that can provide different
`
`communication channels and access level and separate communication traffic based on the
`
`network providers being used (see column 14, lines 19-3 9) that meets the recitation of wherein
`
`saidfirsz‘ and second networking devices are two separate devices which are physicaliy in a
`
`same housing, and transmit over a same area.
`
`(See also fig.2).
`
`As per claim 16, Stewart et al discloses for instance, one or more access points are
`
`comprised in an airport and one or more airlines may maintain Various resources (see column 16,
`
`lines 21-25) and the system has different access points that can provide different communication
`
`STARWOOD Ex 1003, page 13
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 13
`
`channels and access level and separate communication traffic based on the network providers
`
`being used (see column 14, lines 19-39) that meets the recitation of a third networking device,
`
`transntitting a third wii'eies's network systenifi'ani an area adjacent satflfirst location. Stewart
`
`et al discloses a third level access providing access only to specified intcrnct sites or web pages
`
`and does not include access to private files on said system and this access does not require any
`
`key as it is provided to non-authorized users (see column 15, line 60 through column 16, line 3)
`
`that meets the recitation of wherein sairi third netwariring device operates’ wiflzaut either af.s'airI
`
`first or second access criteria and pro vides a third ievel ofaccess to resonrce.s‘ which is Fess
`
`access‘ to resources than either af.s'aidfir.s'2‘ or second ievels afacce.s‘s.
`
`15.
`
`Claims 3 and 17-21 are rejected under 35 U_S.C. 103(a) as being unpatentable over US
`
`Patent 6,970,927 to Stewart et al (Applicanr’s IDS) in view of US Patent ?,2 15,638 to
`
`Roberts et al.
`
`As per claim 3, Stewart et at substantially discloses providing different level of access to
`
`network resources (see column 12, lines 28-46) including voice over IP (see column 16, lines 13-
`
`21). Stewart does not explicitly disclose restricting access to video over IP. Roberts et al in an
`
`analogous art discloses controlling access with voice over IP wherein in one level of access it
`
`may be authorized and in second level of access it is not. Also when the packets are encrypted or
`
`encapsulated they are allowed to pass through an IP tunnel, which otherwise may be restricted
`
`(see column 5, lines I-39). Therefore, it would have been obvious to one of ordinary skill in the
`
`art at the time the invention was made to modify the method of Stewart et al to control access to
`
`STARWOOD Ex 1003, page 14
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 14
`
`video over IP service as suggested by Roberts et alto allow limited access when access is not
`
`otherwise authorized (see column 1, lines 9-16) and as suggested by Stewart et al (see column
`
`12, lines 28-46).
`
`As per claim 17, Stewart et al discloses a network transmitting system comprising (see
`
`column 9, lines 39-42), Stewart et al discloses the system has different access points that can
`
`provide different communication channels and separate communication traffic based on the
`
`network providers being used (see column 14, lines 19-39); a first level access providing access
`
`to local resources as well as access to the Internet that meets the recitation of a first networiling
`
`device, transnzim'ng afir.s't wireless network sy.stein_fi'orn afirsr Jocarion. (see column 16, lines
`
`13-20) saidfirst wireiess networI1's_v.stem requiring a_first access criteria in order to access said
`
`_firsr wireiess network .s;v.s-rem, and saidfirst wireiess network system, when accessed using said
`
`first access criteria, providing afirst level ofaccess to network resources (see column 16, lines
`
`13-15 and column 16, line 48 through column 17, line 3), and providing video over IP access
`
`which can be accessed using saidfirst access criteria (see column 16, lines 13-21). Stewart et
`
`al also discloses for instance one or more access points are comprised in an airport and one or
`
`more airlines may maintain various resources (see column 16, lines 21-25) and as noted above
`
`the system has different access points that can provide different communication channels and
`
`access level and separate communication traffic based on the network providers being used (see
`
`column 14, lines 19-39) that meets the recitation of a second networking device, transmitting a
`
`second wirel’es.s‘ network system that is a separate networkfivm .said_fir'st wireless network
`
`system. Stewart et al discloses a second access level allowing access to the Internet only and no
`
`STARWOOD Ex 1003, page 15
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 15
`
`access to local network resources on the network that meets the recitation of said second wireless
`
`network system controllfng access w1'rhozrIsat'a'first access criteria, and providing a second level
`
`ofaccess to network resources in order to access said second wireless network system, wherein
`
`said second level ofaccess to network resources provided by said second wireless network
`
`system is less rzccess to network resources than provided by .s'afrf_fi1'sHeve.7 ofacce.s'.s' to network
`
`resources provtoled by sa.e'd_fir.s‘t wt're!'ess network system (see column 16, lines 15-20 and column
`
`16, line 48 through column 17, line 3).
`
`Stewart does not explicitly disclose restricting access to video over IP. Roberts et al in
`
`an analogous art discloses controlling access with voice over IP wherein in one level of access it
`
`may be authorized and in second level of access it is not. Also when the packets are encrypted or
`
`encapsulated they are allowed to pass through an IP tunnel, which otherwise may be restricted
`
`(see Column 5, lines I-39). Therefore, it would have been obvious to one of ordinary skill in the
`
`art at the time the invention was made to modify the method of Stewart et al to control access to
`
`video over IP service as suggested by Roberts et alto allow limited access when access is not
`
`otherwise authorized (see column 1, lines 9-16) and as suggested by Stewart et al (see column
`
`12, lines 28-46).
`
`As per claim 18, Stewart et al discloses different access points that can provide different
`
`communication channels and access level and separate communication traffic based on the
`
`network providers being used (see column 14, lines 19-3 9) that meets the recitation of wherein
`
`.s'ai'dfirs2‘ and second nerwrinking devices are two separate devices which transmit over at same
`
`area. (See also fig.2).
`
`STARWOOD Ex 1003, page 16
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`As per claim 19, Stewart et al discloses access level dependent on identification
`
`information that meets the recitation of wherein said second wireless network system oflows
`
`access only based on a second access crt'tert'a, dt'}_Ffe:'ent than s'at'dfirsl access crx'tert'a (sec
`
`column 15, lines 40-48).
`
`As per claim 20, Stewart et al substantially discloses the identification information may
`
`be in form ofdigital certificate (scc column 12, lines 4-14) (see column 6, lines 18-30 and
`
`column 14, lines 55-59). Examiner takes official notice that it is very well known in the art that
`
`a digital certificate may include encryption key (such as public key) to access information.
`
`Therefore, it would have been obvious to one of ordinary skill in the art at the time the invention
`
`was made to modifiy the method of Stewart et al to use an encryption key as identification
`
`information so as to provide security for private information as well—known in the art (see
`
`column 12, lines 4-15 and column 16, lines 21-47).
`
`As per claim 21, Stewart et al discloses for instance, one or more access points are
`
`comprised in an airport and one or more airlines may maintain various resources (sec column 16,
`
`lines 21-25) and the system has different access points that can provide different communication
`
`channels and access level and separate communication traffic based on the network providers
`
`being used (see column 14, lines 19-39) that meets the recitation of a third networking device,
`
`transntftring (J third wireless network .s‘y.s2‘en1_from an area adjacent sa1'ct'first location. Stewart
`
`et al discloses a third level access providing access only to specified intemet sites or web pages
`
`STARWOOD Ex 1003, page 17
`
`
`
`Application/Control Number: 12/345,565
`Art Unit: 2433
`
`Page 17
`
`and does not include access to private files on said system and this access does not require any
`
`key as it is provided to non-authorized users (see column 15, line 60 through column 16, line 3)
`
`that meets the recitation of wherein sairi third netw0ril'ing device operates withrmt either Qfsairi
`
`_fir.s’r or second access criteria and provides a third ievel ofaccess to resources which is iess
`
`aeee.s's to reSr)m'c:e.s' than either of'sairI_fir.s't‘ or seermd ieveis rgfaeee.s‘s.
`
`16.
`
`Claims 15 is rejected under 35 U.S.C. l03(a) as being unpatentable over US Patent
`
`6,970,927 to Stewart et al (Applicants IDS) in view of Applicant's Admitted Prior Art
`
`(AAPA) in view of US Patent 7,215,638 to Roberts et al.
`
`As per claim 15, Stewart et al substantially discloses providing different level of access
`
`to network resources (see column 12, lines 28-46) including voice over IP (see column 16, lines
`
`13-21). Stewart does not explicitly disclose restricting access to video over IP. Roberts et al in
`
`an analogous art discloses controlling access with voice over IP w