throbber
DOCKET NO: 341244US91CONT
`
`IN THE UNITED STATES PATENT & TRADEMARK OFFICE
`
`IN RE APPLICATION OF
`
`DANIEL J. MENDEZ, ET AL.
`
`: EXAMINER: BURGESS, BARBARA N.
`
`SERIAL NO: 12/489,326
`
`FILED: JUNE 22, 2009
`
`: GROUP ART UNIT: 2457
`
`FOR: GLOBAL SERVER FOR
`AUTHENTICATING ACCESS TO
`REMOTE SERVICES
`
`AMENDMENT UNDER 37 C.F.R. § 1.111
`
`COMMISSIONER FOR PATENTS
`
`ALEXANDRIA, VIRGINIA 22313
`
`SIR:
`
`In response to the Office Action dated June 2, 201 I, please amend the above--
`
`identified application as follows:
`
`Amendments to the Claims are reflected in the listing of claims which begins on
`
`page 2 of this paper.
`
`Remarks/Arguments bcgin on page 1 1 of this paper.
`
`VMware Exhibit 1007 Page 1
`
`VMware Exhibit 1007 Page 1
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 20! 1
`
`IN THE CLAIMS
`
`Please amend the claims as follows:
`
`1-45. (Cancelled)
`
`46. (Currently Amended) A global server for providing a user of a remote user
`
`terminal with authenticated access to a service provided by a service server via a first
`
`communications link between the global server and the remote user terminal and a second
`
`communications link between the global server and the service server, the global server being
`
`configured to provide the user of the remote user terminal with authenticated access to the
`
`service provided by the service server, the global server comprising:
`
`a communication interface configured to connect to the first communications link and
`
`to connect to the second communications link;
`
`a processor configured to
`
`authenticate the user with respect to the global server by processing first
`
`authentication information for the user, the first authentication information being
`
`received from the remote user terminal via the—eemmunieatien—interfaee—frem the first
`
`communications link, to verify the identity of the user with respect to the global
`
`server;
`
`authenticate the user with respect to the service server by retrieving second
`
`authentication information for the user and transmitting said second authentication
`
`information directly to the service server via the—eemumeatten—hnlefrem the second
`
`communications link, to verify the identity of the user with respect to the service
`
`server;
`
`VMware Exhibit 1007 Page 2
`
`VMware Exhibit 1007 Page 2
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 2011
`
`conduct authenticated communications with the service server on behalf of the
`
`user, via the second communications link and using the communication interface,
`
`after the authentication of the user with respect to the service server; and
`
`provide the user of the remote user terminal with authenticated access to the
`
`service by conducting authenticated communications with the remote terminal, via the
`
`first communications link and using the communication interface, after conducting the
`
`authenticated communications with the service server on behalf of the user.
`
`47. (Previously Presented) The global server of claim 46, wherein the first
`
`authentication information and the second authentication information are different.
`
`48. (Previously Presented) The global server of claim 46, wherein the first
`
`authentication information comprises a password and a user ID.
`
`49. (Previously Presented) The global server of claim 46, wherein the processor is
`
`further configured to retrieve the second authentication information from storage on the
`
`global server, in dependence on an identity of the service server.
`
`50. (Previously Presented) The global server ofclaim 46, wherein the processor is
`
`further configured to provide authenticated access to services provided by a plurality of
`
`different service servers.
`
`51. (Previously Presented) The global server of claim 46, wherein the processor is
`
`further configured to retrieve a service address for the service server from storage on the
`
`VMware Exhibit 1007 Page 3
`
`VMware Exhibit 1007 Page 3
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 2011
`
`global server, in order to provide authenticated access to the service provided by the service
`
`server.
`
`52. (Previously Presented) The global server of claim 46, wherein the processor is
`
`further configured to provide authenticated access to the service on the basis of one or more
`
`authentication levels associated with a respective service.
`
`53. (Previously Presented) The global server ofclaim 46, wherein the first
`
`communications link comprises an Internet communications channel, the user accessing said
`
`service on the remote terminal via a web browser.
`
`54. (Previously Presented) The global server of claim 53, comprising a security
`
`system configured to create the first communications link as a secure communications link
`
`for communication with the remote user terminal.
`
`55. (Previously Presented) The global server of claim 54, wherein the secure
`
`communications link is created in response to the remote user terminal using a uniform
`
`resource locator (URL) to access the global server.
`
`56. (Previously Presented) The global server of claim 46, wherein the remote user
`
`terminal is configured using a downloadable executable, the downloadable executable being
`
`configured to authenticate the user of the remote terminal with respect to the global server.
`
`57. (Previously Presented) The global server ofclaim 46, wherein the processor is
`
`further configured to access a key store to retrieve said second authentication information.
`
`VMware Exhibit 1007 Page 4
`
`VMware Exhibit 1007 Page 4
`
`

`

`Application No. 12/489,326
`Reply to Office Action ofJune 2, 201 l
`
`58. (Previously Presented) The global server of claim 46, wherein the processor is
`
`further configured to retrieve a service address of the service server, and to use said service
`
`address to set up said second communications link.
`
`59. (Previously Presented) The global server of claim 46, wherein the service server
`
`comprises a service engine for operating on workspace data, at the service server, in response
`
`to said authenticated communications conducted by the global server.
`
`60. (Previously Presented) The global server of claim 46, wherein the processor is
`
`further configured to retrieve data identifying a set of services, associated with a particular
`
`user, in order to provide authenticated access to said services.
`
`61. (Previously Presented) The global server of claim 46, wherein the processor is
`
`further configured to retrieve an authentication level needed in order to provide authenticated
`
`access to the service provided by said service server.
`
`62. (Currently Amended) The global server of claim 46, wherein the remote user
`
`terminal i_s a smartphone.
`
`63. (Previously Presented) The global server of claim 46, wherein said service is
`
`provided on a smartphone.
`
`64. (Previously Presented) The global server of claim 46, wherein the processor of
`
`the global server is configured to conduct synchronization of a workspace element with
`
`VMware Exhibit 1007 Page 5
`
`VMware Exhibit 1007 Page 5
`
`

`

`Application No. 12/489,326
`Reply to Office Action ofJune 2, 20]]
`
`respect to an independently-modifiable copy of the workspace element stored on the service
`
`server, in addition to providing access to the service provided by the service server.
`
`65. (Previously Presented) The global server of claim 46, wherein the processor is
`
`further configured to conduct the authentication of the user of the remote user terminal with
`
`respect to the service server in response to the authentication of the user of the remote user
`
`terminal with respect to the global server.
`
`66. (Previously Presented) A method of providing a user of a remote user terminal
`
`with authenticated access to a service provided by a service server via a first communications
`
`link between the global server and the remote user terminal and a second communications
`
`link between the global server and the service server, the method comprising:
`
`authenticating, at a processor of the global server, the user with respect to the global
`
`server by processing first authentication information for the user, the first authentication
`
`information being received from the remote user terminal via the first communications link,
`
`to verify the identity of the user with respect to the global server;
`
`authenticating, at the processor of the global server, the user with respect to the
`
`service server by retrieving second authentication information for the user and transmitting
`
`said second authentication information to the service server via the second communications
`
`link, to verify the identity of the user with respect to the service server;
`
`conducting, by the processor of the global server through a communication interface
`
`thereof, authenticated communications with the service server on behalf of the user, via the
`
`second communications link, after the authentication of the user with respect to the service
`
`server; and
`
`VMware Exhibit 1007 Page 6
`
`VMware Exhibit 1007 Page 6
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 201 1
`
`providing, by the processor of the global server, the user of the remote user terminal
`
`with authenticated access to the service by conducting authenticated communications with
`
`the remote terminal, via the first communications link, after conducting the authenticated
`
`communications with the service server on behalf of the user.
`
`67. (Previously Presented) The method of claim 66, wherein the first authentication
`
`information and the second authentication information are different.
`
`68. (Previously Presented) The method of claim 66, wherein the first authentication
`
`information comprises a password and a user ID.
`
`69. (Previously Presented) The method of claim 66, further comprising retrieving, by
`
`the global server, the second authentication information from storage on the global server, in
`
`dependence on an identity of the service server.
`
`70. (Previously Presented) The method of claim 66, further comprising providing, by
`
`the global server, authenticated access to services provided by a plurality of different service
`
`SCTVCI‘S.
`
`71. (Previously Presented) The method of claim 66, further comprising retrieving, by
`
`the global server, a service address for the service server from storage on the global server, in
`
`order to provide authenticated access to the service provided by the service server.
`
`VMware Exhibit 1007 Page 7
`
`VMware Exhibit 1007 Page 7
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 201 l
`
`72. (Previously Presented) The method of claim 66, further comprising providing, by
`
`the global server, authenticated access to the service on the basis of one or more
`
`authentication levels associated with a respective service.
`
`73. (Previously Presented) The method of claim 66, wherein the first
`
`communications link comprises an Internet communications channel, the user accessing said
`
`service on the remote terminal Via a web browser.
`
`74. (Previously Presented) The method of claim 73, further comprising creating, by
`
`the global server, the first communications link as a secure communications link for
`
`communication with the remote user terminal.
`
`75. (Previously Presented) The method of claim 74, comprising creating the secure
`
`communications link in response to the remote user terminal using a uniform resource locator
`
`(URL) to access the global server.
`
`76. (Previously Presented) The method of claim 66, further comprising configuring
`
`the remote user terminal using a downloadable executable, the downloadable executable
`
`authenticating the user of the remote terminal with respect to the global server.
`
`77. (Previously Presented) The method of claim 66, further comprising accessing, by
`
`the global server, a key store to retrieve said second authentication information.
`
`VMware Exhibit 1007 Page 8
`
`VMware Exhibit 1007 Page 8
`
`

`

`Application No. 12/489,326
`Reply to Office Action ofJune 2, 2011
`
`78. (Previously Presented) The method of claim 66, further comprising retrieving, by
`
`the global server, a service address of the service server, and using said service address to set
`
`up said second communications link.
`
`79. (Previously Presented) The method of claim 66, further comprising operating, by
`
`the global server, on workspace data, at the service server, in response to said authenticated
`
`communications conducted by the global server.
`
`80. (Previously Presented) The method of claim 66, further comprising retrieving, by
`
`the global server, data identifying a set of services, associated with a particular user, in order
`
`to provide authenticated access to said services.
`
`81. (Previously Presented) The method of claim 66, further comprising retrieving, by
`
`the global server, an authentication level needed in order to provide authenticated access to
`
`the service provided by said service server.
`
`82. (Currently Amended) The method of claim 66, wherein the remote user terminal
`
`i_s a smartphone.
`
`83. (Previously Presented) The method of claim 66, wherein said service is provided
`
`on a smartphone.
`
`84. (Previously Presented) The method of claim 66, further comprising conducting,
`
`by the global server, synchronization of a workspace element with respect to an
`
`VMware Exhibit 1007 Page 9
`
`VMware Exhibit 1007 Page 9
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 2011
`
`independently-modifiable copy of the workspace element stored on the service server, in
`
`addition to providing access to the service provided by the service server.
`
`85. (Previously Presented) The method of claim 66, further comprising conducting,
`
`by the global server, the authentication of the user of the remote user terminal with respect to
`
`the service server in response to the authentication of the user of the remote user terminal
`
`with respect to the global server.
`
`10
`
`VMware Exhibit 1007 Page 10
`
`VMware Exhibit 1007 Page 10
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 201 1
`
`REMARKS
`
`Favorable reconsideration of this application, in view of the present amendment and
`
`in light of the following discussion, is respectfully requested.
`
`Claims 46-85 are pending. Claims 46, 62 and 82 are amended to address potential
`
`informalities and for clarity. No new matter is introduced.
`
`In the outstanding Office Action, Claims 46-85 were rejected under 35 U.S.C.
`
`§ 102(e) as being unpatentable over Mashayekhi (US. Patent No. 5,818,936).
`
`Claim 46 is amended to recite a global server for providing a user of a remote user
`
`terminal with authenticated access to a service provided by a service server via a first
`
`communication link between the global server and the remote user terminal and a second
`
`communication link between the global server and the service server. Amended Claim 46
`
`further recites that the global server includes a processor configured to:
`
`conduct authenticated communications with the service server
`
`on behalf of the user, via the second communications link and
`using the communication interface, after the authentication of
`the user with respect to the service server; and
`
`provide the user of the remote user terminal with authenticated
`access to the service by conducting authenticated
`communications with the remote terminal, via the first
`communications link and using the communication interface,
`after conducting the authenticated communications with the
`service server on behalf of the user.
`
`Thus, amended Claim 46 defines that the global server conducts authenticated
`
`communication with the service server on behalf of the user via a second communication link
`
`and provides the user of the remote user terminal with authenticated access to the service
`
`through authenticated communication with the remote terminal via the first communication
`
`link. In other words, amended Claim 46 defines that communication between the remote user
`
`terminal and the service server is conducted through the global server via the first and second
`
`communication links. The cited reference does not disclose or suggest these features.
`
`11
`
`VMware Exhibit 1007 Page 11
`
`VMware Exhibit 1007 Page 11
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 201 l
`
`Mashayekhi describes a distributed authentication service to automate authentication
`
`exchange between a workstation (210) and an application resident on the workstation (210)
`
`or a server node (202).1 In operation, Mashayekhi describes that an exchange controller
`
`(207) verifies that a user has successfully logged-on to the network and has been
`
`authenticated by a directory service (DS) and then accesses a database API (206) to retrieve
`
`an application “secret” corresponding to an application that the user wishes to access.2 The
`
`workstation may then forward the application secret to the particular application program in
`
`order to gain access.3 Mashayekhi also describes that users log on to the network (100)
`
`through a directory service (DS) in order to gain access to the network.4
`
`However, Mashayekhi does not describe that the workstation (210) communicates
`
`with a server node that hosts the desired application via the controller (207) and the directory
`
`service (DS). Instead, Mashayekhi merely describes that the directory services (DS) and the
`
`controller (207) authenticate the workstation (210) and provide the workstation with a
`
`“secret” corresponding to the desired application.5 Then, the workstation, not the directory
`
`service (DS) or the controller (207), provides this “secret” to the server node (202).6 In other
`
`words, Mashayekm describes that the directory services (DS) and controller (207) only
`
`communicate with the workstation (210) in order to authenticate the workstation instead of
`
`providing a communication path between the workstation (210) and the server node (202). In
`
`fact, Figure 2 ofMashayekhi clearly illustrates that the workstation (210) is directly
`
`connected to the server node (202) via the network (100) and therefore can directly
`
`communicate with the server node (202) without requiring that the directory services (DS)
`
`and/or the controller (207) to take part in the communication. Conversely, amended Claim
`
`‘ Mashayekhi at column 5, line 57 - column 6, line 2; see also Figure 2,
`3
`Z Mashayekhi at column 6, line 60 — column 7, line 9.
`Q
`4 Mashavekhi at column 5, lines 13-43.
`6
`5 Mashayekhi at column 6, line 60 - column 7, line 9.
`Id.
`
`12
`
`VMware Exhibit 1007 Page 12
`
`VMware Exhibit 1007 Page 12
`
`

`

`Application No. 12/489,326
`Reply to Office Action of June 2, 201 l
`
`46 describes that the global server includes a processor that conducts authenticated
`
`communication with the service server on behalfof the user, Via the second communication
`
`link, and also provides the user of the remote user terminal with authenticated access to the
`
`service by conducting authenticated communication with the remote terminal via the first
`
`communication link. Therefore, Mashayekhi fails to disclose the claimed processor and thus
`
`does not disclose every feature recited in amended Claim 46. Accordingly, amended Claim
`
`46 and the claims depending therefrom are believed to be in condition for allowance.
`
`Claim 66 recites features substantially similar to those recited in amended Claim 46
`
`and is therefore believed to be in condition for allowance, together with any claim depending
`
`therefrom, for substantially similar reasons. Accordingly, it is respectfully requested that the
`
`rejection of Claim 46-85 under 35 U.S.C. § 102(e) be withdrawn.
`
`For the reasons discussed above, no further issues are believed o be outstanding in the
`
`present application, and the present application is believed to be in condition for formal
`
`allowance. Therefore, a Notice of Allowance for Claims 46-85 is earnestly solicited.
`
`Respectfully submitted,
`
`OBLON, SPIVAK, McCLELLAND,
`MAIER & NEUSTADT, L.L.P.
`
`
`
`Attorney of ecord
`Registrati
`I] No. 42,866
`
`.
`Aldo Mamnez
`Registration No. 61,357
`
`Customer Number
`22850
`
`Tel: (703) 413—3000
`Fax: (703) 413 —2220
`(OSMMN 08/09)
`
`13
`
`VMware Exhibit 1007 Page 13
`
`VMware Exhibit 1007 Page 13
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket