throbber
DOCKET NO: 341 244US9 1 CONT
`
`M‘HE UNITED STATES PATENT & TRADEMARK OFFICE
`
`IN RE APPLICATION OF
`
`DANIEL J. MENDEZ, ET AL.
`
`: EXAMINER: BURGESS, BARBARA N.
`
`SERIAL NO: 12/489,326
`
`FILED: JUNE 22, 2009
`
`: GROUP ART UNIT: 2457
`
`FOR: GLOBAL SERVER FOR
`AUTHENTICATING ACCESS TO
`
`REMOTE SERVICES (AMENDED)
`
`AMENDMENT UNDER 37 C.F.R. § 1.111
`
`COMMISSIONER FOR PATENTS
`
`ALEXANDRIA, VIRGINIA 223 13
`
`SIR:
`
`In response to the Office Action dated February 3, 2011, please amend the above-
`
`identified application as follows:
`
`Amendments to the Specification begin on page 2 of this paper.
`
`Amendments to the Claims are reflected in the listing of claims which begins on
`
`page 3 of this paper.
`
`Remarks begin on page 12 of this paper.
`
`VMware Exhibit 1004 Page 1
`
`VMware Exhibit 1004 Page 1
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`IN THE SPECIFICATION
`
`Please replace the title on page 1 with the following:
`
`GLOBAL SERVER FOR AUTHENTICATING ACCESS TO REMOTE SERVICES
`
`VMware Exhibit 1004 Page 2
`
`VMware Exhibit 1004 Page 2
`
`

`

`Application No. 12/489,326
`Reply to Office Action ofFebruary 3, 20] I
`
`IN THE CLAIMS
`
`Please amend the claims as follows:
`
`1-45. (Cancelled)
`
`46. (Currently Amended) A global server for providing a user of a remote user
`
`terminal with authenticated access to a service provided by a service server via a first
`
`communications link between the global server and the remote user terminal and a second
`
`communications link between the global server and the service server, the global server being
`
`configured to provide the user of the remote user terminal with authenticated access to the
`
`service provided by the service, the global server comprising server—by:
`
`a communication interface configured to connect to the first communications link and
`
`to connect to the second communications link’
`
`a processor configured to
`
`authentieatiag authenticate the user with respect to the global server by
`
`processing first authentication information for the user, the first authentication
`
`information being received from the remote user terminal via the communication
`
`interface from the first communications link, to verify the identity of the user with
`
`respect to the global server;
`
`authentieating authenticate the user with respect to the service server by
`
`retrieving second authentication information for the user and transmitting said second
`
`authentication information to the service server via the communication link from the
`
`second communications link, to verify the identity of the user with respect to the
`
`service server;
`
`eenelueting conduct authenticated communications with the service server on
`
`behalf of the user, via the second communications link and using the communication
`
`VMware Exhibit 1004 Page 3
`
`VMware Exhibit 1004 Page 3
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`interface, after the authentication of the user with respect to the service server; and
`
`previding provide the user of the remote user terminal with authenticated
`
`access to the service by conducting authenticated communications with the remote
`
`terminal, via the first communications link and using the communication interface,
`
`after conducting the authenticated communications with the service server on behalf
`
`of the user.
`
`47. (Previously Presented) The global server of claim 46, wherein the first
`
`authentication information and the second authentication information are different.
`
`48. (Previously Presented) The global server of claim 46, wherein the first
`
`authentication information comprises a password and a user ID.
`
`49. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to retrieve the second authentication information from storage on the
`
`global server, in dependence on an identity of the service server.
`
`50. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to provide authenticated access to services provided by a plurality of
`
`different service servers.
`
`51. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to retrieve a service address for the service server from storage on the
`
`global server, in order to provide authenticated access to the service provided by the service
`
`SCI‘VCI‘.
`
`VMware Exhibit 1004 Page 4
`
`VMware Exhibit 1004 Page 4
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 201 l
`
`52. (Currently Amended) The global server of claim 46, wherein the processor is
`
`
`further configured to provide authenticated access to the service on the basis of one or more
`
`authentication levels associated with a respective service.
`
`53. (Previously Presented) The global server of claim 46, wherein the first
`
`communications link comprises an Internet communications channel, the user accessing said
`
`service on the remote terminal via a web browser.
`
`54. (Previously Presented) The global server of claim 53, comprising a security
`
`system configured to create the first communications link as a secure communications link
`
`for communication with the remote user terminal.
`
`55. (Previously Presented) The global server of claim 54, wherein the secure
`
`communications link is created in response to the remote user terminal using a uniform
`
`resource locator (URL) to access the global server.
`
`56. (Previously Presented) The global server of claim 46, wherein the remote user
`
`terminal is configured using a downloadable executable, the downloadable executable being
`
`configured to authenticate the user of the remote terminal with respect to the global server.
`
`57. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to access a key store to retrieve said second authentication information.
`
`VMware Exhibit 1004 Page 5
`
`VMware Exhibit 1004 Page 5
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`58. (Currently Amended) The global server of claim 46, wherein the processor is
`
`
`further configured to retrieve a service address of the service server, and to use said service
`
`address to set up said second communications link.
`
`59. (Previously Presented) The global server of claim 46, wherein the service server
`
`comprises a service engine for operating on workspace data, at the service server, in response
`
`to said authenticated communications conducted by the global server.
`
`60. (Currently Amended) The global server of claim 46, wherein the processor is
`
`
`further configured to retrieve data identifying a set of services, associated with a particular
`
`user, in order to provide authenticated access to said services.
`
`61. (Currently Amended) The global server of claim 46, wherein the processor is
`
`
`further configured to retrieve an authentication level needed in order to provide authenticated
`
`access to the service provided by said service server.
`
`62. (Previously Presented) The global server of claim 46, wherein the remote user
`
`terminal a smartphone.
`
`63. (Previously Presented) The global server of claim 46, wherein said service is
`
`provided on a smartphone.
`
`64. (Currently Amended) The global server of claim 46, wherein the processor of the
`
`global server is configured to conduct synchronization of a workspace element with respect
`
`VMware Exhibit 1004 Page 6
`
`VMware Exhibit 1004 Page 6
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`to an independently-modifiable copy of the workspace element stored on the service server,
`
`in addition to providing access to the service provided by the service server.
`
`65. (Currently Amended) The global server of claim 46, wherein the processor is
`
`further configured to conduct the authentication of the user of the remote user terminal with
`
`respect to the service server in response to the authentication of the user of the remote user
`
`terminal with respect to the global server.
`
`66. (Currently Amended) A method of providing a user of a remote user terminal
`
`with authenticated access to a service provided by a service server via a first communications
`
`link between the global server and the remote user terminal and a second communications
`
`link between the global server and the service server, the method comprising:
`
`authenticating, at a processor of the global server= the user with respect to the global
`
`server by processing first authentication information for the user, the first authentication
`
`information being; received from the remote user terminal via the first communications link,
`
`to verify the identity of the user with respect to the global server;
`
`authenticating, at the processor of the global server: the user with respect to the
`
`service server by retrieving second authentication information for the user and transmitting
`
`said second authentication information to the service server via the second communications
`
`link, to verify the identity of the user with respect to the service server;
`
`conducting, by the processor of the global server through a communication interface
`
`_.—1
`thereof authenticated communications with the service server on behalfof the user, via the
`
`second communications link, after the authentication of the user with respect to the service
`
`server; and
`
`VMware Exhibit 1004 Page 7
`
`VMware Exhibit 1004 Page 7
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`providing, by the processor of the global server, the user of the remote user terminal
`
`with authenticated access to the service by conducting authenticated communications with
`
`the remote terminal, via the first communications link, after conducting the authenticated
`
`communications with the service server on behalf of the user.
`
`67. (Previously Presented) The method of claim 66, wherein the first authentication
`
`information and the second authentication information are different.
`
`68. (Previously Presented) The method of claim 66, wherein the first authentication
`
`information comprises a password and a user ID.
`
`69. (Currently Amended) The method ofclaim 66, further comprising the—glebal
`
`seweeretrievinngy the global server, the second authentication information from storage on
`
`the global server, in dependence on an identity of the service server.
`
`70. (Currently Amended) The method of claim 66, further comprising the—global
`
`server providinngy the global server, authenticated access to services provided by a plurality
`
`of different service servers.
`
`71. (Currently Amended) The method of claim 66, further comprising the—global
`
`sewer retrievinngy the global server, a service address for the service server from storage on
`
`the global server, in order to provide authenticated access to the service provided by the
`
`service server.
`
`VMware Exhibit 1004 Page 8
`
`VMware Exhibit 1004 Page 8
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`72. (Currently Amended) The method of claim 66, further comprising theglebal
`
`sewer providinngy the global server, authenticated access to the service on the basis of one
`
`or more authentication levels associated with a respective service.
`
`73. (Previously Presented) The method of claim 66, wherein the first
`
`communications link comprises an lntemet communications channel, the user accessing said
`
`service on the remote terminal Via a web browser.
`
`74. (Currently Amended) The method of claim 73, further comprising the—global
`
`sewer creating, bv the global server, the first communications link as a secure
`
`communications link for communication with the remote user terminal.
`
`75. (Previously Presented) The method of claim 74, comprising creating the secure
`
`communications link in response to the remote user terminal using a uniform resource locator
`
`(URL) to access the global server.
`
`76. (Currently Amended) The method of claim 66, further comprising configuring
`
`the remote user terminal using a downloadable executable, the downloadable executable
`
`authenticating the user of the remote terminal with respect to the global server.
`
`77. (Currently Amended) The method of claim 66, further comprising the—gleba-l
`
`server accessinngy the global server, a key store to retrieve said second authentication
`
`information.
`
`VMware Exhibit 1004 Page 9
`
`VMware Exhibit 1004 Page 9
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 201 l
`
`78. (Currently Amended) The method of claim 66, further comprising the—global
`
`sewer retrievinngy the global server, a service address of the service server, and using said
`
`service address to set up said second communications link.
`
`79. (Currently Amended) The method of claim 66, further comprising the—service
`
`sewer—operating, by the global server, on workspace data, at the service server, in response to
`
`said authenticated communications conducted by the global server.
`
`80. (Currently Amended) The method of claim 66, further comprising the—global
`
`server retrievinngy the global server, data identifying a set of services, associated with a
`
`particular user, in order to provide authenticated access to said services.
`
`81. (Currently Amended) The method of claim 66, further comprising the—global
`
`sewer retrievinngy the global server, an authentication level needed in order to provide
`
`authenticated access to the service provided by said service server.
`
`82; (Previously Presented) The method of claim 66, wherein the remote user
`
`terminal a smartphone.
`
`83. (Previously Presented) The method of claim 66, wherein said service is provided
`
`on a smartphone.
`
`84. (Currently Amended) The method of claim 66, further comprising the—global
`
`server conducting, by the global server, synchronization of a workspace element with respect
`
`10
`
`VMware Exhibit 1004 Page 10
`
`VMware Exhibit 1004 Page 10
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`to an independently-modifiable copy of the workspace element stored on the service server,
`
`in addition to providing access to the service provided by the service server.
`
`85. (Currently Amended) The method of claim 66, further comprising the—glebal
`
`server conducting: by the global server, the authentication of the user of the remote user
`
`terminal with respect to the service server in response to the authentication of the user of the
`
`remote user terminal with respect to the global server.
`
`11
`
`VMware Exhibit 1004 Page 11
`
`VMware Exhibit 1004 Page 11
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 2011
`
`REMARKS
`
`Favorable reconsideration of this application, in View of the present amendments and
`
`in light of the following discussion, is respectfully requested.
`
`Claims 46—85 are pending. Claims 46, 49-52, 57—58, 60—61, 64-66, 69-72, 74, 76-81,
`
`and 84—85 are amended. No new matter is introduced]
`
`In the outstanding Office Action, Claims 66-85 were rejected under 35 U.S.C. § 101;
`
`and Claims 46-65 were rejected under 35 U.S.C. § 112, second paragraph.
`
`Initially, Claim 66 is amended for clarity. As such, amended Claim 66 is believed to
`
`be patent-eligible under 35 U.S.C. § 101.
`
`The outstanding Office Action appears to solely relies on the “machine or
`
`transformation test” to the determine patent-eligibility of the method claims of this
`
`application under Section 101.2 However, in the 2010 Decision, Bilski v. Kappos, the US.
`
`Supreme Court expressly rejected the machine-or—transformation test as the sole test of
`
`patent-eligibility for method claims under Section 101.
`
`In July 2010, the Office also issued
`
`Interim Guidance for determining patent-eligibility in light of the US. Supreme Court
`
`Decision in Bilski v. Kappos. Specifically, the Office acknowledged that
`
`The Office has been using the so-called “machine-or-
`transformation” test used by the Federal Circuit to evaluate
`whether a method claim qualifies as a statutory patent-eligible
`process. See Interim Examination Instructions For Evaluating
`Subject Matter Eligibility Under 35 U.S.C. 101 dated August
`24, 2009 (“2009 Interim Instructions”). The Supreme Court
`stated in Bilski that the machine-or—transformation test is a
`“useful and important clue” and “investigative tool” for
`determining whether some claimed methods are statutory
`processes, but it “is not the sole test for deciding whether an
`invention is a patent—eligible ‘Qrocess.’... Bilski held open the
`possibility that some claims that do not meet the machine-or-
`
`1 Non-limiting support for the amended claims may be found at least in Figure 3 and the associated discussion in
`the specification as originally filed.
`2 See the outstanding Office Action at page 2.
`
`12
`
`VMware Exhibit 1004 Page 12
`
`VMware Exhibit 1004 Page 12
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`transformation test might nevertheless be patent-eligible.
`(Emphasis added.)3
`
`The Interim Guidance also outlined a patent—eligibility procedure for process claims
`
`that included analysis of 4 factors, and at least 17 sub-factors, and which requires Examiners
`
`to specifically point out the factors relied upon in rejecting the method claims under Section
`
`101.4 Thus, the apparent sole reliance on the machine—or-transformation test in the
`
`outstanding Office Action is not consistent with current law or Office practices. As such, it is
`
`submitted that the rejection of Claims 66-85 under 35 U.S.C. § 101 is improper, and that
`
`claims 66-85 are indeed patent-eligible under Section 101 when analyzed as set forth in the
`
`Interim Guidance, Therefore, it is respectfully requested that the rejection of Claims 66-85
`
`under 35 U.S.C. § 101 be withdrawn.
`
`Turning to the rejection of Claims 45-65 under 35 U.S.C. § 112, second paragraph,
`
`Claim 46 is amended to recite such structural features as a “processor” and a “communication
`
`interface”. Non-limiting support for these amendments may be found at least in Figure 3 and
`
`the associated descriptions in the specification. Thus, Claim 46 and the claims depending
`
`therefrom are believed to conform to the requirements of 35 U .S.C. § 1 12, second paragraph.
`
`Accordingly, it is respectfully requested that the rejection of Claims 45-46 under 35 U.S.C.
`
`§ 1 12, second paragraph be withdrawn.
`
`3 See “Interim Guidance for Determining Subject Matter Eligibility for Processed Claims in View of Bilski v.
`Kappos,” Federal Register, Vol. 75, No. 43, § 3 (July 27, 2010).
`4 m. at § 3.v.
`
`13
`
`VMware Exhibit 1004 Page 13
`
`VMware Exhibit 1004 Page 13
`
`

`

`Application No. 12/489,326
`Reply to Office Action of February 3, 201 1
`
`For the reasons discussed above, no further issues are believed to be outstanding in
`
`the present application, and the present application is believed to be in condition for formal
`
`allowance. Therefore, a Notice of Allowance for Claims 46-85 is earnestly solicited.
`
`Respectfully submitted,
`
`OBLON, SPIVAK, McCLELLAND,
`MAIER & NEUSTADT, L.L.P.
`
`
`
`Record
`Attorney
`Registration No. 42,866
`
`.
`Aldo Mamnez
`Registration No. 61,357
`
`Customer Number
`
`22 8 5 0
`
`Tel: (703) 413-3000
`Fax: (703) 413-2220
`(OSMMN 08/09)
`
`14
`
`VMware Exhibit 1004 Page 14
`
`VMware Exhibit 1004 Page 14
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket