throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`'nia 22313-1450
`Alexandria, Vi
`www.uspto.go
`
`APPLICATION NO.
`
`F ING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`CONF <MATION NO.
`
`11/980,687
`
`10/31/2007
`
`David A. Farber
`
`2618-0017
`
`6761
`
`42624
`
`7590
`
`06/15/2009
`
`DAVIDSON BERQUIST JACKSON & GOWDEY LLP
`4300 WILSON BLVD., 7TH FLOOR
`ARLINGTON, VA 22203
`
`EXAMINER
`
`LEMMA, SAMSON B
`
`ART UNIT
`
`2432
`
`MAIL DATE
`
`06/ 15/2009
`
`PAPER NUMBER
`
`DELIVERY MODE
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`PTOL—90A (Rev. 04/07)
`
`GOOG-1002-Page 626 of 841
`
`GOOG-1002-Page 626 of 841
`
`

`
`Application No.
`
`App|icant(s)
`
`Office Action Summary
`
`11/980,687
`
`Examine,
`
`FARBER ET AL.
`
`A,, Unit
`
`2432 —
`
`-- The MAILING DA TE of this communication appears on the cover sheet with the correspondence address --
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE 3 MONTH(S) OR THIRTY (30) DAYS,
`WHICHEVER IS LONGER, FROM THE MAILING DATE OF THIS COMMUNICATION.
`- Extensions of time may be available under the provisions of 37 CFR 1.136(a).
`In no event, however, may a reply be timely filed
`after SIX (6) MONTHS from the mailing date of this communication.
`If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication, even if timely filed, may reduce any
`earned patent term adjustment. See 37 CFR 1.704(b).
`
`Status
`
`1)IXI Responsive to communication(s) filed on 31 October 2007.
`
`2a)I:I This action is FINAL.
`
`2b)IXI This action is non-final.
`
`3)I:I Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`
`closed in accordance with the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.
`
`Disposition of Claims
`
`4)IXI C|aim(s) 1 is/are pending in the application.
`
`4a) Of the above c|aim(s)
`
`is/are withdrawn from consideration.
`
`5)I:I C|aim(s)
`
`is/are allowed.
`
`6)IXI C|aim(s) 1 is/are rejected.
`
`7)IXI C|aim(s) Q is/are objected to.
`
`8)I:I C|aim(s) j are subject to restriction and/or election requirement.
`
`Application Papers
`
`9)I:I The specification is objected to by the Examiner.
`
`10)IZ The drawing(s) filed on 31 October 2007 is/are: a)IXI accepted or b)I:I objected to by the Examiner.
`
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121(d).
`
`11)I:I The oath or declaration is objected to by the Examiner. Note the attached Office Action or form PTO-152.
`
`Priority under 35 U.S.C. § 119
`
`12)I:I Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).
`
`a)I:I All
`
`b)I:I Some * c)I:I None of:
`
`1.I:I Certified copies of the priority documents have been received.
`
`2.I:I Certified copies of the priority documents have been received in Application No.
`
`3.I:I Copies of the certified copies of the priority documents have been received in this National Stage
`
`application from the International Bureau (PCT Rule 17.2(a)).
`
`* See the attached detailed Office action for a list of the certified copies not received.
`
`Attach ment(s)
`
`1) E Notice of References Cited (PTO-892)
`2) D Notice of Draftsperson's Patent Drawing Review (PTO-948)
`3) IXI Information Disclosure Statement(s) (PTO/SB/08)
`Paper No(s)/Mail Date
`.
`U.S. Patent and Trademark Office
`
`4) D Interview Summary (PTO-413)
`Paper N0(S)/IVI3” Data E
`5) I:I Noiice Oi informal Paieiii Appiicaiion
`6) D Other:
`.
`
`PTOL-326 (Rev. 08-06)
`
`Office Action Summary
`
`ier No./Mail Date 02252009
`
`GOOG-1002-Page 627 of 841
`
`GOOG-1002-Page 627 of 841
`
`

`
`Application/Control Number: 11/980,687
`
`Page 2
`
`Art UI1i':: 2432
`
`DETAILED A CTION
`
`1.
`
`This is in reply to application filed on October 31, 2007. Claims 1-24
`
`have been submitted /examined of which claims 1, 20,21 and 24 are
`
`independent.
`
`Information Disclosure Statement
`
`2.
`
`The information disclosure statements (IDS) submitted on 12/ 26/07 and
`
`10/03/08 have been considered. The submission is in compliance with
`
`the provisions of 37 CFR 1.97. Form PTO—1449 is signed and attached
`
`hereto.
`
`Oath/Declaration
`
`3.
`
`The oath filed on 10/31/07 complies with all the requirements set forth
`
`in MPEP 602 and therefore is accepted.
`
`Drawings
`
`4.
`
`The drawings filed on October 31, 2007 are accepted.
`
`Specification
`
`5.
`
`The specification filed on October 31, 2007 is accepted.
`
`Claim Objections
`
`6.
`
`Independent claim 20 is objected to because of the following
`
`informalities: On claim 20, lines 3, the limitation, “by” before the
`
`limitation “in response to ...” makes the claim grammatically incorrect.
`
`GOOG-1002-Page 628 of 841
`
`GOOG-1002-Page 628 of 841
`
`

`
`Application/Control Number: 11/980,687
`
`Page 3
`
`Art UI1i':: 2432
`
`The limitation “by" should either be deleted or appropriate correction is
`
`required.
`
`Claim Rejections — 35 USC § 103
`
`7.
`
`The following is a quotation of 35 U.S.C. 103(a) Which forms the
`
`basis for all obviousness rejections set forth in this Office action:
`
`(a) A patent may not be obtained though the invention is not identically
`disclosed or described as set forth in section 102 of this title, if the differences
`between the subject matter sought to be patented and the prior art are such
`that the subject matter as a whole would have been obvious at the time the
`invention was made to a person having ordinary skill in the art to which said
`subject matter pertains. Patentability shall not be negatived by the manner in
`which the invention was made.
`
`8.
`
`Qlaimg 1-lg and 1§-g§ are rejected under 35 U.S.C. 103(a) as being
`
`unpatentable over Blickenstaff et al (hereinafter referred to as
`
`Blickenstaff), U.S. Patent No. 5,537,585 (filed on Feb 25, 1994) in view
`
`of Yukio Orita (hereinafter referred to as Orita) U.S. Patent No. 5,
`
`163,147 (Date of Patent: Nov 10,1992)
`
`9.
`
`As get independent claim 1, Blickenstaff discloses a method, in a
`
`system which includes a network of computers [See at least column 4,
`
`lines 23-28 and figure “1 / local area network”, ref. Num “ 21, 22 and 42”
`
`and column 1, lines 6-8, “this invention relates to data communication
`
`networks, such as local area networks, that function to interconnect a
`
`plurality of data processors”] (Note: as it is disclosed on column 4, lines 26-
`
`GOOG-1002-Page 629 of 841
`
`GOOG-1002-Page 629 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 4
`
`Art UI1i':: 2432
`
`28, “processors, shown on figure 1, are either personal computers, work
`
`stations or mini—computers”) the method comprising:
`
`0
`
`(a) obtaining a name for a data item, the name being included
`
`in a request for the data item [Figure 8, ref. Num “801—803” and column
`
`13, lines 34-46,], ( “4. File management scheme, including access methods.
`
`For example, DOS data files are named with a 1-8 byte name and a 0-3
`
`byte extent, which are delimited by a ”. ” (nnnnnnnn.xxx). The directory
`
`architecture is illustrated in FIG. 13 and takes the form of a hierarchical
`
`tree of directory names. The root is typically a volume, from which a
`
`number of directories branch. Each directory includes other directories
`
`and/ or data files. A [ull data [ile name is represented by concatenating all
`
`the directory tree structure components from the root to the particular data
`
`file, with components being delimited by ” ”. An example of such a data file
`
`name using this convention is ” vol\dir1\ dir3\ filename.ext”.) and
`
`Blickenstaff further discloses,
`
`based on said name, determine the location of the file and
`
`providing the requesting computer obtain the requested file from its
`
`own storage device or from the different server, distinct from the
`
`requesting computer. [See figure 8, and Column 5, lines 38-57]
`
`Blickenstaff does not explicitly disclose
`
`0
`
`the name being based at least in part on the data which
`
`comprise the contents of the data item; and (b) determining, based
`
`GOOG-1002-Page 630 of 841
`
`GOOG-1002-Page 630 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 5
`
`Art UI1i':: 2432
`
`at least in part on said name, whether or not access to the data item
`
`is authorized.
`
`However, in the same field of endeavor Orita at least on its abstract
`
`discloses the following which meets the above limitation.
`
`“When a specified file access is requested after the execution of the
`
`user program, whether execution of the file access is permitted or
`
`not is determined according to access protection information. The
`
`access protection information is information having access types and Q
`
`contents defined by the environment profile information.”
`
`It would have been obvious to one having ordinary skill in the art,
`
`at the time the invention was made, to combine the feature such as the
`
`name being based at least in part on the data which comprise the
`
`contents of the data item; and determining, based at least in part on
`
`said name, whether or not access to the data item is authorized as
`
`per teachings of Orita into the method of accessing of the file using the
`
`file name as taught by Blickenstaff in order provide a more secure
`
`access control and accurately/ expeditiously retrieve requested file / s.
`
`10.
`
`As pg}: indgpgndgnt glaim 29, Bligkgnstaff discloses a method
`
`comprising: controlling distribution of licensed content (column 5,
`
`lines 28-35, see “migration offiles”) from a first computer [Figure 1, ref.
`
`41 and 43 or storage server processor 51] to a requesting computer
`
`[Figure 1, ref. Num “21 ” and ”22’7 in response to a request for the
`
`GOOG-1002-Page 631 of 841
`
`GOOG-1002-Page 631 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 6
`
`Art UIli':: 2432
`
`content from said requesting computer, [See figure 8, and Column 5,
`
`lines 38-57]
`
`the request including at least a name of the data file, [Figure 8,
`
`ref. Num “801-803” and column 13, lines 34-46,], ( “4. File management
`
`scheme, including access methods. For example, DOS data files are named
`
`with a 1-8 byte name and a 0-3 byte extent, which are delimited by a ”. ”
`
`(nnnnnnnn.xxx). The directory architecture is illustrated in FIG. 13 and
`
`takes the form of a hierarchical tree of directory names. The root is
`
`typically a volume, from which a number of directories branch. Each
`
`directory includes other directories and/ or data files. A ull data ile name
`
`is represented by concatenating all the directory tree structure components
`
`from the root to the particular data file, with components being delimited
`
`by ” ”. An example of such a data file name using this convention is ”
`
`vol\dir1\ dir3\ filename.ext”.)
`
`Blickenstaff further discloses,
`
`based on said name, determine the location of the file and
`
`providing the requesting computer obtain the requested file from its
`
`own storage device or from the different server, distinct from the
`
`requesting computer. [See figure 8, and Column 5, lines 38-57]
`
`Blickenstaff does not explicitly disclose the limitation recited as,
`
`the name having been determined using at least a function of the data
`
`comprising the data item, permitting the content to be provided to the
`
`requesting computer if the content is authorized or licensed.
`
`GOOG-1002-Page 632 of 841
`
`GOOG-1002-Page 632 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 7
`
`Art UI1i':: 2432
`
`However, in the same field of endeavor Orita at least on its abstract
`
`discloses the following which meets the above limitation.
`
`“When a specified file access is requested after the execution of the
`
`user program, whether execution of the file access is permitted or
`
`not is determined according to access protection information. The
`
`access protection information is information having access types and %
`
`contents defined by the environment profile information.”
`
`It Would have been obvious to one having ordinary skill in the art,
`
`at the time the invention Was made, to combine the feature such as the
`
`name having been determined using at least a function of the data
`
`comprising the data item, permitting the content to be provided to the
`
`requesting computer if the content is authorized or licensed as per
`
`teachings of Orita into the method of accessing of the file using the file
`
`name as taught by Blickenstaff in order provide a more secure access
`
`control and accurately/ expeditiously retrieve requested file / s.
`
`ll.
`
`_ discloses a method
`
`comprising:
`
`(a) obtaining a list of names, one for each of a plurality of data
`
`items, wherein, for each of the data items [Figure 8, ref. Num “801—
`
`803” and column 13, lines 34-46,], ( “4. File management scheme,
`
`including access methods. For example, DOS data files are named with a
`
`GOOG-1002-Page 633 of 841
`
`GOOG-1002-Page 633 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 8
`
`Art UI1i':: 2432
`
`1-8 byte name and a 0-3 byte extent, which are delimited by a ”. ”
`
`(nnnnnnnn.xxx). The directory architecture is illustrated in FIG. 13 and
`
`takes the form of a hierarchical tree of directory names. The root is
`
`typically a volume, from which a number of directories branch. Each
`
`directory includes other directories and/ or data files. A ull data ile name
`
`is represented by concatenating all the directory tree structure components
`
`from the root to the particular data file, with components being delimited
`
`by ” ”. An example of such a data file name using this convention is ”
`
`vol\dir1\ dir3\ filename.ext”.) ,
`
`(b) receiving, from a requestor, an identifier for a requested
`
`data item [Figure 8, ref. Num “801—803” and column 13, lines 34-46,],
`
`Blickenstaff further discloses,
`
`based on said name, determine the location of the file and
`
`providing the requesting computer obtain the requested file from its
`
`own storage device or from the different server, distinct from the
`
`requesting computer. [See figure 8, and Column 5, lines 38-57]
`
`Blickenstaff does not explicitly disclose the limitation recited as,
`
`the corresponding name for that data item was determined as
`
`a function of the contents of the data item; said identifier having
`
`been determined based at least in part on the contents of the
`
`requested data item; (c) determining, based at least in part on said
`
`identifier for said requested data item, and using said list of names,
`
`GOOG-1002-Page 634 of 841
`
`GOOG-1002-Page 634 of 841
`
`

`
`Application/Control Number: 11/980,687
`
`Page 9
`
`Art UI1i':: 2432
`
`whether the requestor may access the requested data item; and (d)
`
`based on said determining, if it is determined that requestor may
`
`not access the requested data item, denying access to the requested
`
`data item.
`
`However, in the same field of endeavor Orita at least on its abstract
`
`discloses the following which meets the above limitation.
`
`“When a specified file access is requested after the execution of the
`
`user program, whether execution of the file access is permitted or
`
`not is determined according to access protection information. The
`
`access protection information is information having access types and @
`
`contents defined by the environment profile information.”
`
`It would have been obvious to one having ordinary skill in the art,
`
`at the time the invention was made, to combine the feature such as the
`
`name having been determined using at least a function of the data
`
`comprising the data item, permitting or denying the content to be
`
`provided to the requesting computer as per teachings of Orita into the
`
`method of accessing of the file using the file name as taught by
`
`Blickenstaff in order provide a more secure access control and
`
`accurately / expeditiously retrieve requested file / s.
`
`12. As per independent claim 24, limitations recited in independent claim
`
`24 is similar / equivalent to that of the limitations recited in independent
`
`claim 21, thus the claim is rejected for the same reasons /rationale as
`
`that of independent claim 21.
`
`GOOG-1002-Page 635 of 841
`
`GOOG-1002-Page 635 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 10
`
`Art UI1i':: 2432
`
`13. As per dependent claim 2, the combination of Blickenstaff and Orita
`
`discloses the method as applied to claims above. Furthermore Orita
`
`discloses the method further comprising: (c) based at least in part
`
`on said determining, denying access to the data item when it is
`
`determined that access to the data item is not authorized. [See
`
`abstract] (On abstract the following has been disclosed. “When a specified
`
`file access is requested after the execution of the user program, whether
`
`execution of the file access is permitted or not is determined according to
`
`access protection information. The access protection information is
`
`information having access types and file contents defined by the
`
`environment profile information.”
`
`14. As per dependent claim 3, the combination of Blickenstaff and Orita
`
`discloses the method as applied to claims above. Furthermore Orita
`
`discloses the method wherein the request is received from a
`
`particular requestor, and wherein said step (b) of determining
`
`comprises: determining whether or not the particular requestor is
`
`authorized. [See abstract] (On abstract the following has been disclosed.
`
`“When a specified file access is requested after the execution of the user
`
`program, whether execution of the file access is permitted or not is
`
`determined according to access protection information. The access
`
`protection information is information having access types and file contents
`
`defined by the environment profile information.”
`
`GOOG-1002-Page 636 of 841
`
`GOOG-1002-Page 636 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 11
`
`Art UI1i':: 2432
`
`15. As per dependent claim 4, the combination of Blickenstaff and Orita
`
`discloses the method as applied to claims above. Furthermore Orita
`
`discloses the method further comprising: if it is determined that the
`
`particular requestor is not authorized, denying the particular
`
`requestor's request for the data item. [See abstract] (On abstract the
`
`following has been disclosed. “When a specified file access is requested
`
`after the execution of the user program, whether execution of the file
`
`access is permitted or not is determined according to access protection
`
`information. The access protection information is information having access
`
`types and file contents defined by the environment profile information.”
`
`16.
`
`As per dependent claim 5, the combination of Blickenstaff and Orita
`
`discloses the method as applied to claims above. Furthermore Orita
`
`discloses the method wherein said step (b) of determining whether
`
`or not the data item is authorized comprises determining whether
`
`or not the name is contained in a database comprising a plurality of
`
`identifiers. [See figure 1 and abstract, See also Blickenstaff, figure 1]
`
`17.
`
`As per dependent claim 6, the combination of Blickenstaff and Orita
`
`discloses the method as applied to claims above. Furthermore Orita
`
`discloses the method wherein the name for the data item is based
`
`on a function of the data which comprise the contents of the data
`
`file, and wherein the plurality of identifiers in the database are
`
`identifiers of licensed content items, and wherein the identifier of
`
`each licensed content item is based at least in part on the function
`
`GOOG-1002-Page 637 of 841
`
`GOOG-1002-Page 637 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 12
`
`Art Unit:
`
`2432
`
`of the data comprising the licensed content item. [See figure 1 and
`
`abstract, See also Blickenstaff, figure 1]
`
`18.
`
`As per dependent claim 7 , the combination of Blickenstaff and Orita
`
`discloses the method as applied to claims above. Furthermore
`
`Blickenstaff discloses the method further comprising: (d) collecting
`
`information regarding the data item. [See figure 1 and figure 8]
`
`19.
`
`As per dependent claim 8, the combination of Blickenstaff and Orita
`
`discloses the method as applied to claims above. Furthermore
`
`Blickenstaff discloses the method, wherein the information
`
`collected includes at least one of: (a) information about which data
`
`items have been stored on a computer; (b) information about the
`
`content of the data item, (c) information about the owner of the
`
`data item, (d) information about the type of data item, (e)
`
`information about the contextual name of the data item, (f)
`
`information about whether the data item was copied; (g) the name of
`
`the data item; (h) information about an identity of the requestor; (i)
`
`a timestamp; (j) information about whether the data item was
`
`created; and (k) information about whether the data item was read.
`
`[See figure 1 and figure 8]
`
`20.
`
`As per dependent claim 9, the combination of Blickenstaff and Orita
`
`discloses the method as applied to claims above. Furthermore
`
`Blickenstaff discloses the method, wherein at least some of the
`
`information collected is maintained for accounting or billing
`
`GOOG-1002-Page 638 of 841
`
`GOOG-1002-Page 638 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Art UI1i':: 2432
`
`Page
`
`13
`
`purposes. (It is implicit that such secondary storage system provided, as
`
`shown on figure 1, ref. Num “51 ” and “52”, which maintains/ stores a
`
`collection offiles to the users as shown on figure 1, ref. Num “21 ” and
`
`“22”, could be used by the owner of the storage server/ s shown on figure
`
`1, in order to provide storage services for the users by charging them for
`
`the provided storage services)
`
`21.
`
`As per dependent claim 10, the combination of Blickenstaff and
`
`Orita discloses the method as applied to claims above. Furthermore
`
`Blickenstaff discloses the method, further comprising: (d) tracking
`
`identities of data items requested. [See at least figure 8, ref. Num “801—
`
`8037
`
`22.
`
`As per dependent claims 13 and 22, the combination of Blickenstaff
`
`and Orita discloses the method as applied to claims above.
`
`Furthermore Blickenstaff discloses the method, wherein the name is
`
`a True Name. [Figure 8, ref Num “801—803” and column 13, lines 34-46,]
`
`23.
`
`As per dependent claim 14, the combination of Blickenstaff and
`
`Orita discloses the method as applied to claims above. Furthermore
`
`Blickenstaff discloses the method, wherein a data item may
`
`comprise a file, a portion of a file, a page in memory, a digital
`
`message, a digital image, a video signal or an audio signal. [Figure 1,
`
`ref Num “801—803”]
`
`GOOG-1002-Page 639 of 841
`
`GOOG-1002-Page 639 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 14
`
`Art UI1i':: 2432
`
`24.
`
`As per dependent claims 15 and 23, the combination of Blickenstaff
`
`and Orita discloses the method as applied to claims above.
`
`Furthermore Blickenstaff discloses the method, wherein at least
`
`some computers make up part of a peer-to-peer network of
`
`computers. (See at least column 4, lines 23-28 and figure “1 / local area
`
`network”, ref. Num “ 21, 22 and 42” and column 1, lines 6-8, “this
`
`invention relates to data communication networks, such as local area
`
`networks, that function to interconnect a plurality of data processors”]
`
`(Note: as it is disclosed on column 4, lines 26-28, “processors, shown on
`
`figure 1, are either personal computers, work stations or mini—computers”)
`
`25. As per dependent claim 16, the combination of Blickenstaff and
`
`Orita discloses the method as applied to claims above. Furthermore
`
`Orita discloses the method, further comprising: (c) authorizing
`
`access to the data item when it is determined that the data item is
`
`authorized. [See abstract] (On abstract the following has been disclosed.
`
`“When a specified file access is requested after the execution of the user
`
`program, whether execution of the file access is permitted or not is
`
`determined according to access protection information. The access
`
`protection information is information having access types and file contents
`
`defined by the environment profile information.”
`
`26. As per dependent claim 17 , the combination of Blickenstaff and
`
`Orita discloses the method as applied to claims above. Furthermore
`
`Blickenstaff discloses the method, wherein the authorized access
`
`GOOG-1002-Page 640 of 841
`
`GOOG-1002-Page 640 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 15
`
`Art UI1i':: 2432
`
`permits copying of the data item from at least one of the plurality of
`
`computers. [Figure 8, ref. Num “809” and Column 5, lines 38-57]
`
`27. As per dependent claim 18, limitations recited in dependent claim 18 is
`
`similar/ equivalent to that of the limitations recited in independent claim
`
`20, thus the claim is rejected for the same reasons / rationale as that of
`
`independent claim 20.
`
`28.
`
`As per dependent claim 19, the combination of Blickenstaff and
`
`Orita discloses the method as applied to claims above. Furthermore
`
`Orita discloses the method, if it is determined that said data item is
`
`authorized, access to the data item is authorized [See abstract] from
`
`more than one of the plurality of computers[See Blickenstaff, figure 1
`
`and figure 8]
`
`29.
`
`As per dependent claim 25, the combination of Blickenstaff and
`
`Orita discloses the method as applied to claims above. Furthermore
`
`Blickenstaff discloses the method, further comprising: in response
`
`to said request: (iv) allowing the data file to be delivered to the
`
`requesting computer if the data file is authorized. [See figure 8, and
`
`Column 5, lines 38-5 7,see also Orita’s abstract how the authorization is
`
`determined, such as based on the content of the file]
`
`30.
`
`Dependent glaims 11-12 are rejected under 35 U.S.C. 103(a) as being
`
`unpatentable over Blickenstaff et al (hereinafter referred to as
`
`Blickenstaff), U.S. Patent No. 5,537,585 (filed on Feb 25, 1994) in View
`
`of Yukio Orita (hereinafter referred to as Orita) U.S. Patent No. 5,
`
`GOOG-1002-Page 641 of 841
`
`GOOG-1002-Page 641 of 841
`
`

`
`Application/Control Number: 11/980,687
`
`Page 16
`
`Art UI1i':: 2432
`
`163,147 (Date of Patent: Nov 10, 1992) further in View of Gramlich et a1
`
`(hereinafter referred to as Gramlich), U.S. Patent No. 5,202,982 (date of
`
`Patent: 04/ 13/ 1993) (submitted/cited/listed with/in IDS)
`
`31.
`
`As. get degendent claims 11 and 12, Blickenstaff discloses a method,
`
`in a system which includes a network of computers [See at least
`
`column 4, lines 23-28 and figure “1 / local area network”, ref. Num “ 21, 22
`
`and 42” and column 1, lines 6-8, “this invention relates to data
`
`communication networks, such as local area networks, that function to
`
`interconnect a plurality of data processors”] (Note: as it is disclosed on
`
`column 4, lines 26-28, “processors, shown on figure 1, are either personal
`
`computers, work stations or mini-computers”) the method comprising:
`
`0
`
`(a) obtaining a name for a data item, the name being included
`
`in a request for the data item [Figure 8, ref. Num “801-803” and column
`
`13, lines 34-46,], ( “4. File management scheme, including access methods.
`
`For example, DOS data files are named with a 1-8 byte name and a 0-3
`
`byte extent, which are delimited by a ”. ” (nnnnnnnn.xxx). The directory
`
`architecture is illustrated in FIG. 13 and takes the form of a hierarchical
`
`tree of directory names. The root is typically a volume, from which a
`
`number of directories branch. Each directory includes other directories
`
`and/ or data files. A full data file name is represented by concatenating all
`
`the directory tree structure components from the root to the particular data
`
`file, with components being delimited by ” ”. An example of such a data file
`
`name using this convention is ” vol\dir1\ dir3\ filename.ext”.) and
`
`Blickenstaff further discloses,
`
`GOOG-1002-Page 642 of 841
`
`GOOG-1002-Page 642 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 17
`
`Art UI1i':: 2432
`
`based on said name, determine the location of the file and
`
`providing the requesting computer obtain the requested file from its
`
`own storage device or from the different server, distinct from the
`
`requesting computer. [See figure 8, and Column 5, lines 38-57]
`
`Blickenstaff does not explicitly disclose
`
`0
`
`the name being based at least in part on the data which
`
`comprise the contents of the data item; and (b) determining, based
`
`at least in part on said name, whether or not access to the data item
`
`is authorized.
`
`However, in the same field of endeavor Orita at least on its abstract
`
`discloses the following which meets the above limitation.
`
`“When a specified file access is requested after the execution of the
`
`user program, whether execution of the file access is permitted or
`
`not is determined according to access protection information. The
`
`access protection information is information having access types and @
`
`contents defined by the environment profile information.”
`
`It would have been obvious to one having ordinary skill in the art,
`
`at the time the invention was made, to combine the feature such as the
`
`name being based at least in part on the data which comprise the
`
`contents of the data item; and determining, based at least in part on
`
`said name, whether or not access to the data item is authorized as
`
`per teachings of Orita into the method of accessing of the file using the
`
`GOOG-1002-Page 643 of 841
`
`GOOG-1002-Page 643 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 18
`
`Art UI1i':: 2432
`
`file name as taught by Blickenstaff in order provide a more secure
`
`access control and accurately/ expeditiously retrieve requested file / s.
`
`The combination of Blickenstaff and Orita does not explicitly
`
`discloses the limitation recited as,
`
`wherein the name is based, at least in part, on a function of the data
`
`which comprise the contents of the data item, and wherein the function
`
`is a message digest function or a hash function and wherein the function
`
`is selected from the functions: MD4, MD5, and SHA.
`
`However, in the same field of endeavor Gramlich at least on
`
`its abstract and column 2, lines 52-55, discloses the following
`
`which meets the above limitation.
`
`“In the method and apparatus of the present invention a
`
`file to be added to the database is given a unique name that is
`
`dependent upon the contents of the file such that, when the contents
`
`of the source file changes, the name of the database component file to
`
`be added to the database also changes. Conversely, if two files of the
`
`same name have the same information contained therein, the same
`
`file name will be generated and the duplication of information in the
`
`database is prevented by providing a simple test that checks for the
`
`existence of the name of the database file before the generation and
`
`addition of the new file to the database. If the file name exists in the
`
`database, information is already contained in the database and the
`
`file is not generated and added to the database information.
`
`Preferably the name of the file is generated by computing a hash
`
`GOOG-1002-Page 644 of 841
`
`GOOG-1002-Page 644 of 841
`
`

`
`Application/Control Number:
`
`ll/980,687
`
`Page 19
`
`Art UI1i':: 2432
`
`value from the contents of the file concatenating the hash value
`
`to the name of the source file.”
`
`It would have been obvious to one having ordinary skill in the art,
`
`at the time the invention was made, to add the feature such as the name
`
`is based, at least in part, on a function of the data which comprise the
`
`contents of the data item, and wherein the function is a message digest
`
`function or a hash function as per teachings of Gramlich into the
`
`method as taught by the combination of Blickenstaff and Orita, in
`
`order to provide efficient system that saves resources by avoiding
`
`duplication of storage of files having the same content. [See
`
`Gramlich column 2, lines 36-51]
`
`Conclusion
`
`32. The prior art made of record and not relied upon is considered pertinent
`
`to applicants disclosure.
`
`a.
`
`US Patent No. 5,742,807, to Masinter discloses Systems and
`
`methods for managing a plurality of electronically stored documents in
`
`an open document repository employ a one—Way hash function to
`
`compute a hash for the stored documents as an indexing link. A
`
`document management index maps an attribute of an original document
`
`stored in the repository to the hash and the document. A hash—to—
`
`location index maps the hash to an address location of the document in
`
`a file system of the repository. The attribute points to the hash which
`
`then points to the location for linking the attribute to the location. [See at
`
`lease the abstract]
`
`GOOG-1002-Page 645 of 841
`
`GOOG-1002-Page 645 of 841
`
`

`
`Application/Control Number: 11/980,687
`
`Page 20
`
`Art UI1i':: 2432
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket