`
`M‘HE UNITED STATES PATENT & TRADEMARK OFFICE
`
`IN RE APPLICATION OF
`
`DANIEL J. MENDEZ, ET AL.
`
`: EXAMINER: BURGESS, BARBARA N.
`
`SERIAL NO: 12/489,326
`
`FILED: JUNE 22, 2009
`
`: GROUP ART UNIT: 2457
`
`FOR: GLOBAL SERVER FOR
`AUTHENTICATING ACCESS TO
`
`REMOTE SERVICES (AMENDED)
`
`AMENDMENT UNDER 37 C.F.R. § 1.111
`
`COMMISSIONER FOR PATENTS
`
`ALEXANDRIA, VIRGINIA 223 13
`
`SIR:
`
`In response to the Office Action dated February 3, 2011, please amend the above-
`
`identified application as follows:
`
`Amendments to the Specification begin on page 2 of this paper.
`
`Amendments to the Claims are reflected in the listing of claims which begins on
`
`page 3 of this paper.
`
`Remarks begin on page 12 of this paper.
`
`VMware Exhibit 1004 Page 1
`
`VMware Exhibit 1004 Page 1
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`IN THE SPECIFICATION
`
`Please replace the title on page 1 with the following:
`
`GLOBAL SERVER FOR AUTHENTICATING ACCESS TO REMOTE SERVICES
`
`VMware Exhibit 1004 Page 2
`
`VMware Exhibit 1004 Page 2
`
`
`
`Application No. 12/489,326
`Reply to Office Action ofFebruary 3, 20] I
`
`IN THE CLAIMS
`
`Please amend the claims as follows:
`
`1-45. (Cancelled)
`
`46. (Currently Amended) A global server for providing a user of a remote user
`
`terminal with authenticated access to a service provided by a service server via a first
`
`communications link between the global server and the remote user terminal and a second
`
`communications link between the global server and the service server, the global server being
`
`configured to provide the user of the remote user terminal with authenticated access to the
`
`service provided by the service, the global server comprising server—by:
`
`a communication interface configured to connect to the first communications link and
`
`to connect to the second communications link’
`
`a processor configured to
`
`authentieatiag authenticate the user with respect to the global server by
`
`processing first authentication information for the user, the first authentication
`
`information being received from the remote user terminal via the communication
`
`interface from the first communications link, to verify the identity of the user with
`
`respect to the global server;
`
`authentieating authenticate the user with respect to the service server by
`
`retrieving second authentication information for the user and transmitting said second
`
`authentication information to the service server via the communication link from the
`
`second communications link, to verify the identity of the user with respect to the
`
`service server;
`
`eenelueting conduct authenticated communications with the service server on
`
`behalf of the user, via the second communications link and using the communication
`
`VMware Exhibit 1004 Page 3
`
`VMware Exhibit 1004 Page 3
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`interface, after the authentication of the user with respect to the service server; and
`
`previding provide the user of the remote user terminal with authenticated
`
`access to the service by conducting authenticated communications with the remote
`
`terminal, via the first communications link and using the communication interface,
`
`after conducting the authenticated communications with the service server on behalf
`
`of the user.
`
`47. (Previously Presented) The global server of claim 46, wherein the first
`
`authentication information and the second authentication information are different.
`
`48. (Previously Presented) The global server of claim 46, wherein the first
`
`authentication information comprises a password and a user ID.
`
`49. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to retrieve the second authentication information from storage on the
`
`global server, in dependence on an identity of the service server.
`
`50. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to provide authenticated access to services provided by a plurality of
`
`different service servers.
`
`51. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to retrieve a service address for the service server from storage on the
`
`global server, in order to provide authenticated access to the service provided by the service
`
`SCI‘VCI‘.
`
`VMware Exhibit 1004 Page 4
`
`VMware Exhibit 1004 Page 4
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 201 l
`
`52. (Currently Amended) The global server of claim 46, wherein the processor is
`
`
`further configured to provide authenticated access to the service on the basis of one or more
`
`authentication levels associated with a respective service.
`
`53. (Previously Presented) The global server of claim 46, wherein the first
`
`communications link comprises an Internet communications channel, the user accessing said
`
`service on the remote terminal via a web browser.
`
`54. (Previously Presented) The global server of claim 53, comprising a security
`
`system configured to create the first communications link as a secure communications link
`
`for communication with the remote user terminal.
`
`55. (Previously Presented) The global server of claim 54, wherein the secure
`
`communications link is created in response to the remote user terminal using a uniform
`
`resource locator (URL) to access the global server.
`
`56. (Previously Presented) The global server of claim 46, wherein the remote user
`
`terminal is configured using a downloadable executable, the downloadable executable being
`
`configured to authenticate the user of the remote terminal with respect to the global server.
`
`57. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to access a key store to retrieve said second authentication information.
`
`VMware Exhibit 1004 Page 5
`
`VMware Exhibit 1004 Page 5
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`58. (Currently Amended) The global server of claim 46, wherein the processor is
`
`
`further configured to retrieve a service address of the service server, and to use said service
`
`address to set up said second communications link.
`
`59. (Previously Presented) The global server of claim 46, wherein the service server
`
`comprises a service engine for operating on workspace data, at the service server, in response
`
`to said authenticated communications conducted by the global server.
`
`60. (Currently Amended) The global server of claim 46, wherein the processor is
`
`
`further configured to retrieve data identifying a set of services, associated with a particular
`
`user, in order to provide authenticated access to said services.
`
`61. (Currently Amended) The global server of claim 46, wherein the processor is
`
`
`further configured to retrieve an authentication level needed in order to provide authenticated
`
`access to the service provided by said service server.
`
`62. (Previously Presented) The global server of claim 46, wherein the remote user
`
`terminal a smartphone.
`
`63. (Previously Presented) The global server of claim 46, wherein said service is
`
`provided on a smartphone.
`
`64. (Currently Amended) The global server of claim 46, wherein the processor of the
`
`global server is configured to conduct synchronization of a workspace element with respect
`
`VMware Exhibit 1004 Page 6
`
`VMware Exhibit 1004 Page 6
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`to an independently-modifiable copy of the workspace element stored on the service server,
`
`in addition to providing access to the service provided by the service server.
`
`65. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to conduct the authentication of the user of the remote user terminal with
`
`respect to the service server in response to the authentication of the user of the remote user
`
`terminal with respect to the global server.
`
`66. (Currently Amended) A method of providing a user of a remote user terminal
`
`with authenticated access to a service provided by a service server via a first communications
`
`link between the global server and the remote user terminal and a second communications
`
`link between the global server and the service server, the method comprising:
`
`authenticating, at a processor of the global server= the user with respect to the global
`
`server by processing first authentication information for the user, the first authentication
`
`information being; received from the remote user terminal via the first communications link,
`
`to verify the identity of the user with respect to the global server;
`
`authenticating, at the processor of the global server: the user with respect to the
`
`service server by retrieving second authentication information for the user and transmitting
`
`said second authentication information to the service server via the second communications
`
`link, to verify the identity of the user with respect to the service server;
`
`conducting, by the processor of the global server through a communication interface
`
`_.—1
`thereof authenticated communications with the service server on behalfof the user, via the
`
`second communications link, after the authentication of the user with respect to the service
`
`server; and
`
`VMware Exhibit 1004 Page 7
`
`VMware Exhibit 1004 Page 7
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`providing, by the processor of the global server, the user of the remote user terminal
`
`with authenticated access to the service by conducting authenticated communications with
`
`the remote terminal, via the first communications link, after conducting the authenticated
`
`communications with the service server on behalf of the user.
`
`67. (Previously Presented) The method of claim 66, wherein the first authentication
`
`information and the second authentication information are different.
`
`68. (Previously Presented) The method of claim 66, wherein the first authentication
`
`information comprises a password and a user ID.
`
`69. (Currently Amended) The method ofclaim 66, further comprising the—glebal
`
`seweeretrievinngy the global server, the second authentication information from storage on
`
`the global server, in dependence on an identity of the service server.
`
`70. (Currently Amended) The method of claim 66, further comprising the—global
`
`server providinngy the global server, authenticated access to services provided by a plurality
`
`of different service servers.
`
`71. (Currently Amended) The method of claim 66, further comprising the—global
`
`sewer retrievinngy the global server, a service address for the service server from storage on
`
`the global server, in order to provide authenticated access to the service provided by the
`
`service server.
`
`VMware Exhibit 1004 Page 8
`
`VMware Exhibit 1004 Page 8
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`72. (Currently Amended) The method of claim 66, further comprising theglebal
`
`sewer providinngy the global server, authenticated access to the service on the basis of one
`
`or more authentication levels associated with a respective service.
`
`73. (Previously Presented) The method of claim 66, wherein the first
`
`communications link comprises an lntemet communications channel, the user accessing said
`
`service on the remote terminal Via a web browser.
`
`74. (Currently Amended) The method of claim 73, further comprising the—global
`
`sewer creating, bv the global server, the first communications link as a secure
`
`communications link for communication with the remote user terminal.
`
`75. (Previously Presented) The method of claim 74, comprising creating the secure
`
`communications link in response to the remote user terminal using a uniform resource locator
`
`(URL) to access the global server.
`
`76. (Currently Amended) The method of claim 66, further comprising configuring
`
`the remote user terminal using a downloadable executable, the downloadable executable
`
`authenticating the user of the remote terminal with respect to the global server.
`
`77. (Currently Amended) The method of claim 66, further comprising the—gleba-l
`
`server accessinngy the global server, a key store to retrieve said second authentication
`
`information.
`
`VMware Exhibit 1004 Page 9
`
`VMware Exhibit 1004 Page 9
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 201 l
`
`78. (Currently Amended) The method of claim 66, further comprising the—global
`
`sewer retrievinngy the global server, a service address of the service server, and using said
`
`service address to set up said second communications link.
`
`79. (Currently Amended) The method of claim 66, further comprising the—service
`
`sewer—operating, by the global server, on workspace data, at the service server, in response to
`
`said authenticated communications conducted by the global server.
`
`80. (Currently Amended) The method of claim 66, further comprising the—global
`
`server retrievinngy the global server, data identifying a set of services, associated with a
`
`particular user, in order to provide authenticated access to said services.
`
`81. (Currently Amended) The method of claim 66, further comprising the—global
`
`sewer retrievinngy the global server, an authentication level needed in order to provide
`
`authenticated access to the service provided by said service server.
`
`82; (Previously Presented) The method of claim 66, wherein the remote user
`
`terminal a smartphone.
`
`83. (Previously Presented) The method of claim 66, wherein said service is provided
`
`on a smartphone.
`
`84. (Currently Amended) The method of claim 66, further comprising the—global
`
`server conducting, by the global server, synchronization of a workspace element with respect
`
`10
`
`VMware Exhibit 1004 Page 10
`
`VMware Exhibit 1004 Page 10
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`to an independently-modifiable copy of the workspace element stored on the service server,
`
`in addition to providing access to the service provided by the service server.
`
`85. (Currently Amended) The method of claim 66, further comprising the—glebal
`
`server conducting: by the global server, the authentication of the user of the remote user
`
`terminal with respect to the service server in response to the authentication of the user of the
`
`remote user terminal with respect to the global server.
`
`11
`
`VMware Exhibit 1004 Page 11
`
`VMware Exhibit 1004 Page 11
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`REMARKS
`
`Favorable reconsideration of this application, in View of the present amendments and
`
`in light of the following discussion, is respectfully requested.
`
`Claims 46—85 are pending. Claims 46, 49-52, 57—58, 60—61, 64-66, 69-72, 74, 76-81,
`
`and 84—85 are amended. No new matter is introduced]
`
`In the outstanding Office Action, Claims 66-85 were rejected under 35 U.S.C. § 101;
`
`and Claims 46-65 were rejected under 35 U.S.C. § 112, second paragraph.
`
`Initially, Claim 66 is amended for clarity. As such, amended Claim 66 is believed to
`
`be patent-eligible under 35 U.S.C. § 101.
`
`The outstanding Office Action appears to solely relies on the “machine or
`
`transformation test” to the determine patent-eligibility of the method claims of this
`
`application under Section 101.2 However, in the 2010 Decision, Bilski v. Kappos, the US.
`
`Supreme Court expressly rejected the machine-or—transformation test as the sole test of
`
`patent-eligibility for method claims under Section 101.
`
`In July 2010, the Office also issued
`
`Interim Guidance for determining patent-eligibility in light of the US. Supreme Court
`
`Decision in Bilski v. Kappos. Specifically, the Office acknowledged that
`
`The Office has been using the so-called “machine-or-
`transformation” test used by the Federal Circuit to evaluate
`whether a method claim qualifies as a statutory patent-eligible
`process. See Interim Examination Instructions For Evaluating
`Subject Matter Eligibility Under 35 U.S.C. 101 dated August
`24, 2009 (“2009 Interim Instructions”). The Supreme Court
`stated in Bilski that the machine-or—transformation test is a
`“useful and important clue” and “investigative tool” for
`determining whether some claimed methods are statutory
`processes, but it “is not the sole test for deciding whether an
`invention is a patent—eligible ‘Qrocess.’... Bilski held open the
`possibility that some claims that do not meet the machine-or-
`
`1 Non-limiting support for the amended claims may be found at least in Figure 3 and the associated discussion in
`the specification as originally filed.
`2 See the outstanding Office Action at page 2.
`
`12
`
`VMware Exhibit 1004 Page 12
`
`VMware Exhibit 1004 Page 12
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`transformation test might nevertheless be patent-eligible.
`(Emphasis added.)3
`
`The Interim Guidance also outlined a patent—eligibility procedure for process claims
`
`that included analysis of 4 factors, and at least 17 sub-factors, and which requires Examiners
`
`to specifically point out the factors relied upon in rejecting the method claims under Section
`
`101.4 Thus, the apparent sole reliance on the machine—or-transformation test in the
`
`outstanding Office Action is not consistent with current law or Office practices. As such, it is
`
`submitted that the rejection of Claims 66-85 under 35 U.S.C. § 101 is improper, and that
`
`claims 66-85 are indeed patent-eligible under Section 101 when analyzed as set forth in the
`
`Interim Guidance, Therefore, it is respectfully requested that the rejection of Claims 66-85
`
`under 35 U.S.C. § 101 be withdrawn.
`
`Turning to the rejection of Claims 45-65 under 35 U.S.C. § 112, second paragraph,
`
`Claim 46 is amended to recite such structural features as a “processor” and a “communication
`
`interface”. Non-limiting support for these amendments may be found at least in Figure 3 and
`
`the associated descriptions in the specification. Thus, Claim 46 and the claims depending
`
`therefrom are believed to conform to the requirements of 35 U .S.C. § 1 12, second paragraph.
`
`Accordingly, it is respectfully requested that the rejection of Claims 45-46 under 35 U.S.C.
`
`§ 1 12, second paragraph be withdrawn.
`
`3 See “Interim Guidance for Determining Subject Matter Eligibility for Processed Claims in View of Bilski v.
`Kappos,” Federal Register, Vol. 75, No. 43, § 3 (July 27, 2010).
`4 m. at § 3.v.
`
`13
`
`VMware Exhibit 1004 Page 13
`
`VMware Exhibit 1004 Page 13
`
`
`
`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`For the reasons discussed above, no further issues are believed to be outstanding in
`
`the present application, and the present application is believed to be in condition for formal
`
`allowance. Therefore, a Notice of Allowance for Claims 46-85 is earnestly solicited.
`
`Respectfully submitted,
`
`OBLON, SPIVAK, McCLELLAND,
`MAIER & NEUSTADT, L.L.P.
`
`
`
`Record
`Attorney
`Registration No. 42,866
`
`.
`Aldo Mamnez
`Registration No. 61,357
`
`Customer Number
`
`22 8 5 0
`
`Tel: (703) 413-3000
`Fax: (703) 413-2220
`(OSMMN 08/09)
`
`14
`
`VMware Exhibit 1004 Page 14
`
`VMware Exhibit 1004 Page 14
`
`