throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`PATENT
`
`Frankland, Richard et al.
`
`Examiner:
`
`
`Wang
`
`Cheung, Mary Da Zhi
`
`
`
`Art Unit: 3694
`
`March 1, 2001
`
` Appellant:
`
`
`
` Serial No.:_ 09/797,488
` Filed:
`
`$/QM./€\)§I€&\}
`
`
`
`
` Our Ref: B-5746CONT 952776-6
` Date:
`
`
`
` For:
`
`”INTEGRATED CHANGE
`
`MANAGEMENT SYSTEM”
`
`August 28, 2007
`
` Re:
`
`Appeal to the Board ofAppeals
`BRIEF ON APPEAL
`
`Mail Stop Appeal-Patents
`Commissioner for Patents
`
`P.O. Box 1450
`
`Alexandria, VA 22313-1450
`
`Sir:
`
`This is an appeal from the Final rejection, dated February 28, 2007, for the
`
`above identified patent application. A credit card deposit in the amount of
`
`$500.00 for the fee set forth in 37 C.F.R. 1.17(c) for submitting this Brief and a
`
`credit card deposit in the amount of $120.00 for the time-extension fee set forth in
`
`37 C.F.R. 1.17(a)(1) will be electronically submitted. The Appellants submit that
`
`this Appeal Brief is being timely filed within the one-month extended time limit,
`
`since the Notice Of Appeal was received on May 29, 2007.
`
`REAL PARTY IN INTEREST
`
`The present application has been assigned to Alternative Systems, Inc. of
`
`Half Moon Bay, CA.
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 2
`
`RELATED APPEALS AND INTERFERENCES
`
`There are no other appeals or interferences related to the present
`
`application.
`
`STATUS OF CLAIMS
`
`The present Application comprises claims 2, 4-9, 11-24, 26-31, 33-46, 48-52
`
`and 54-66, which all stand rejected.
`
`Claims 1, 3, 10, 25, 32, 47, 53 and 67-155 were cancelled without prejudice.
`
`Claims 2, 4-9, 11-24, 26-31, 33-46, 48-52 and 54-66 are the subject of this
`
`appeal and are reproduced in the accompanying claim appendix.
`
`STATUS OF AMENDMENTS
`
`There are no amendments pending in the present application.
`
`SUMMARY OF CLAIMED SUBJECT MATTER
`
`The invention described and claimed in the present application relates
`
`generally to the integrated management of information affected by regulatory
`
`changes as well as non-regulatory changes. Regulatory changes include changes
`
`in environmental, health and safety laws (page 1, lines 4-6; paragraph [OOO1]).
`
`A number of rules such as federal, state and local
`
`laws, statutes,
`
`ordinances and regulations control industrial and commercial activities (page 1,
`
`lines 8-10; paragraph [0002]). Some rules have overlapping jurisdiction and are
`
`not always consistent with one another. Further, the rules and related constraints
`
`are constantly changing (page 3, lines 2-9; paragraph [0OO4]). Various attempts
`
`have been made to manage regulatory compliance, but no satisfactory solution
`
`has been developed (page 12, lines 24-30; paragraph [0O25]). There is accordingly
`
`a need for a system that would, for a selected area of commercial or industrial
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 3
`
`activity: store or access all relevant available information and changes used in
`
`connection with the activity; generate and archive records of software system
`
`versions used for: data entry,
`
`reporting, processing, analysis and results
`
`presentation, and changes to these versions; generate all documents and reports
`
`required for compliance under applicable regulations, laws and statutes; and
`
`provide appropriate user
`
`interface, without requiring (re)programming of
`
`underlying software (page 13, lines16-30; paragraph [O027]).
`
`The invention meets the above needs with an integrated system that (1)
`
`provides one or more databases that contain information on operations and
`
`requirements concerning an activity or area of business;
`
`(2) monitors and
`
`evaluates the relevance of information on regulatory and non-regulatory changes
`
`that affect operations of
`
`the business and/or
`
`information management
`
`requirements; (3) converts the relevant changes into changes in work/task lists,
`
`data entry forms,
`
`reports, data processing, analysis and presentation (by
`
`printing, electronic display, network distribution and/or physical distribution) of
`
`data processing and analysis results to selected recipients without requiring the
`
`services of one or more programmers to re-program and/or recode the software
`
`items affected by the change; and (4) implements receipt of change information
`
`and dissemination of data processing and analysis results using the facilities of a
`
`network, such as the Internet (page 14, lines 2-14; paragraph [OO28]).
`
`In particular,
`
`independent claim 2 recites: ”A system for providing a
`
`dynamically generated application having one or more functions and one or more user
`
`interface elements; comprising:
`
`a server computer (for example as in a multi-tier server based model, see
`
`page 20, lines 14-15; paragraph [OO50]);
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 4
`
`one or more client computers connected to the server computer over a computer
`
`network (for example as in a multi—tier server based model, see page 20, lines 14-
`
`15; paragraph [0050]);
`
`a first layer (for example a business content layer, see page 21, lines 1-11;
`
`paragraph [OO54]) associated with the server computer containing information about
`
`the unique aspects of a particular application;
`
`a second layer (for example a metadata layer, see page 21, lines 13-20)
`
`associated with the server computer containing information about the user interface and
`
`functions common to a variety of applications, a particular application being generated
`
`based on the data in both the first and second layers;
`
`a third layer (for example a Java data management layer, see page 24, lines
`
`23-26; paragraph [OO69]) associated with the server computer that retrieves the data in
`
`the first and second layers in order to generate the functionality and user interface
`
`elements of the application; and
`
`a change management
`
`layer (page 28,
`
`lines 4-16; paragraph [OO85]) for
`
`automatically detecting (box 21 in Fig. 2) changes that afiect an application,
`
`each client computer further comprising a browser application (page 26, lines 3-
`
`6; paragraph [0075]) being executed by each client computer, wherein a user interface
`
`and functionality for the particular application is distributed to the browser application
`
`and dynamically generated when the client computer connects to the server computer
`
`(page 26, lines 19-22; paragraph [0078]).
`
`Also, independent claim 24 recites:
`
`”A method for dynamically generating an application using a server computer and one or
`
`more client computers connected to the server computer over a computer network (for
`
`example as in a multi-tier server based model, see page 20, lines 14-15; paragraph
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 5
`
`[O050]), the method comprising:
`
`providing a first layer (for example a business content layer, see page 21,
`
`lines 1-11; paragraph [0054]) containing information about the unique aspects of a
`
`particular application;
`
`providing a second layer (for example a metadata layer, see page 21, lines 13-
`
`20) containing information about the user interface and functions common to a variety of
`
`applications, wherein a particular application is generated based on the data in the first
`
`and second layers;
`
`establishing a connection between a client computer and the server computer (see
`
`page 20, lines 14-15; paragraph [O050]);
`
`providing a third layer (for example a Iava data management layer, see page
`
`24, lines 23-26; paragraph [O069]) that retrieves the data in the first and second layers
`
`in order to generate the functionality and user interface for a particular application for
`
`the client computer as the client computer connects to the server computer;
`
`automatically detecting (box 21 in Fig. 2) changes that afiect a particular
`
`application (page 28, lines 4-6; paragraph [0O85]); and
`
`distributing the user interface and functionality of the particular application to
`
`the client computer wherein the particular application and its user interface are
`
`dynamically re—generated each time a client establishes a connection with the server
`
`computer (page 26, lines 19-22; paragraph [OO78])”.
`
`Further, independent claim 46 recites:
`
`”A server for dynamically generating an application for one or more client
`
`computers connected to the server computer by a computer network (for example as in
`
`a multi-tier server based model, see page 20, lines 14-15; paragraph [O050]),
`
`comprising:
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 6
`
`a first layer (for example a business content layer, see page 21, lines 1-11;
`
`paragraph [OO54]) associated with the server containing information about the unique
`
`aspects of a particular application;
`
`a second layer (for example a metadata layer, see page 21, lines 13-20)
`
`associated with the server containing information about the user interface and functions
`
`common to a variety of applications;
`
`a third layer (for example a Java data management layer, see page 24, lines
`
`23-26; paragraph [OO69]) that retrieves the data in the first and second layers in order to
`
`generate functionality and user interface elements of the application;
`
`a change management
`
`layer (page 28,
`
`lines 4-16; paragraph [O085]) for
`
`automatically detecting (box 21 in Fig. 2) changes that afiect an application;
`
`means for dynamically generating (page 26, lines 19-22; paragraph [OO78]) a
`
`particular application based on the first and second layers each time a client computer
`
`connects to the server computer; and
`means for distributing the user interface and functionality of the particular
`
`application to a client computer (page 26, lines 3-6; paragraph [O075])”.
`
`>l->(->l-
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 7
`
`GROUNDS OF REJECTION TO BE REVIEWED ON APPEAL
`
`Issue 1: Whether claims 2, 4-9, 11-24, 26-31, 33-46, 48-52 and 54-66 are
`
`patentable under 35 U.S.C. 102(e) over U.S. Pat. No. 5,960,200 to Eager.
`
`ARGUMENT
`
`Issue I: Whether claims 2, 4-9, 11-24, 26-31, 33-46, 48-52 and 54-66 are patentable
`
`under 35 U.S.C. 102(e) over U.S. Pat. No. 5,960,200 to Eager (hereinafter
`
`”Eager”).
`
`Rejection of claim 2
`
`In a non-final action issued on September 5, 2006, the Examiner rejected
`
`claim 2 as being anticipated by U.S. 5,960,200 to Eager, under the rationale that:
`
`-a business process layer taught by Eager reads on the first layer recited in
`
`claim 2;
`
`-a functionality layer taught by Eager reads on the second layer recited in
`
`claim 2;
`
`-a presentation layer taught by Eager reads on the third layer recited in
`
`claim 2; and
`
`-a
`
`re-architecting system taught by Eager
`
`reads on the change
`
`management layer recited in claim 2.
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 8
`
`In response to this previous action, the Appellants disagreed with the
`
`rationale of the Examiner, and argued that the business process layer (120) and
`
`functionality layer (130) of Eager are distinct from a data storage layer (150), so
`
`that
`
`they cannot read on the recited first and second layers ”containing
`
`information”.
`
`In the Final action issued on February 28, 2006, the Examiner opines that
`
`the arguments above are not persuasive.
`
`In particular, in response to the Appellant's arguments that Eager fails to
`
`teach the first layer containing information about the unique aspects of particular
`
`application, the Examiner opines that ”Eager teaches a business process layer
`
`that corresponds to the first layer as claimed by the applicant (column 10, lines
`
`33-41 and Fig. 1), and the business layer provides initial application menu or
`
`screen and initial objects to the interface engine (column 10, lines 38-41), in which
`
`the initial application menu or screen and initial objects correspond to the
`
`information contained in the first
`
`layer”. The Examiner also opines that
`
`”although Eager does not explicitly disclose how long the information is
`
`contained in the business layer, the information could either be stored in the
`
`business layer in short period of time or in a long period of time; and in either
`
`case, Eager’s teaching reads on the claimed language”.
`
`Also, in response to the Appellant's arguments that Eager fails to teach a
`
`second layer that contains information about the user interface and functions
`
`common to a variety of applications, the Examiner opines that ”Eager teaches a
`
`functionality layer that corresponds to the second layer (column 12, lines 12-42
`
`and Figs. 1, 8) and the information contained by the second layer is taught by
`
`Eager as the result information is generated by the functionality layer and later is
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 9
`
`transferred to the business layer or the state router (column 12, lines 18-21)”. The
`
`Examiner further opines that ”although Eager does not explicitly disclose how
`
`long the result information is contained in the functionality layer, the result
`
`information could either be stored in the functionality layer in short period of
`
`time or in a long period of time; and in either case, Eager’s teachings reads on the
`
`claimed language”.
`
`The Appellants respectfully submit that the interpretation the Examiner
`
`makes of
`
`the term ”containing” is broader than the ‘broadest reasonable
`
`interpretation‘ that one skilled in the art would make in light of the specification.
`
`Indeed, according to this interpretation, any single means through which data
`
`transit would read on means ”containing” the data. Thus, for example a data bus
`
`would be considered as means containing data. However, one skilled in the art
`
`knows well that a data bus is a means that carries data, but does not contain data.
`
`At least in View of the above, the Appellants submit that the interpretation
`
`the Examiner makes of Eager does not comply with section 2111.01(II) of the
`
`M.P.E.P, and request that the Examiner's rejection of claim 2 be overturned.
`
`The Appellants further note that, even assuming, arguendo,
`
`that
`
`the
`
`interpretation the Examiner makes of the term ”containing” were not broader
`
`than its broadest reasonable interpretation, Eager would still be very different
`
`from the invention as recited in claim 2.
`
`Eager relates (see claim 1 of Eager) to an automated system for converting,
`
`or transitioning, legacy applications operable on a legacy computing system to a
`
`distributed infrastructure on a multi-tiered computer architecture. Eager
`
`provides,
`
`in particular,
`
`for ”an automated converter
`
`to transition the legacy
`
`application to a target application operable on the multi-tiered computer architecture”.
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 10
`
`However, Eager teaches automatically converting an application operable
`
`in a legacy system to an application operable in a multi—tiered system. Nowhere
`
`does Eager disclose or suggest any feature for monitoring applications and
`
`detecting changes affecting the application, and in particular a change
`
`management layer for ”automatically detecting changes that aflect an application” as
`
`recited in claim 2.
`
`In section 4 of the Final action of February 28, 2007, the Examiner opines
`
`that Eager shows ”f) a change management layer for automatically detecting
`
`changes that affect an application (column 2, lines 34-57 and column 4, lines 42-
`
`51 and Figs. 1, 16, 17, 24; specifically, ‘change management layer’ corresponding
`
`to re-architecting system in Eager’s teaching)”. The Appellants respectfully
`
`disagree.
`
`As to what is taught in column 2, lines 34-57 of Eager: the Appellants note
`
`that column 2, lines 34-57 of Eager recite that ’’For each source application, there is a
`
`range of available transition choices,
`
`including the option of translating the source
`
`application to the new target architecture without changing any of the existing
`
`functionality and the option of re-engineering the source application by changing the
`
`existing functionality. The source application may also be replaceable by a commercial
`
`product or a custom application written in—house. The source applications are then
`
`transitioned in order of priority to the new architecture”.
`
`This passage teaches that Eager allows translating source applications to
`
`the new target architecture without changing the existing functionality. It also
`
`teaches that Eager allows re-engineering the source application by changing the
`
`existing functionality.
`
`However,
`
`this passage does not relate to detecting changes in the
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 11
`
`applications, and relates even less to automatically detecting such changes.
`
`Column 2, lines 34-57 of Eager further recites, ”Specifically, a preferred
`
`system in accordance with the present invention includes the automated capability to
`
`translate existing source applications into new target applications on a multi-tiered
`
`client/server architecture. The translation of source applications to target applications
`
`includes the conversion of user interfaces, procedural languages, and data definitions.
`
`These conversions use a two—phase process where source program components written in
`
`the source languages are first translated to components in a common intermediate
`
`language. The intermediate language components are then translated to target program
`
`components in the target languages. By using a common intermediate language, only one
`
`translation module is required for each source and target language”.
`
`This passage teaches that Eager allows automatically translating sources
`
`application.
`
`This passage does not relate to detecting changes in the applications, or to
`
`automatically detecting such changes.
`
`As to what is taught in Column 4, lines 42-51 of Eager: column 4, lines 42-
`
`51 recites that ”a preferred re—architecting system 20 includes a user
`
`interface
`
`conversion utility 210, a procedural
`
`language conversion utility 220, and a data
`
`definition language conversion utility 230. The procedural language conversion utility
`
`220 is in communication with the functionality layer 130 and the data access layer 140 of
`
`the multi—tier architecture 10. The user
`
`interface conversion utility 210 is
`
`in
`
`communication with the user interface repository 152 and the data definition language
`
`conversion utility 230 is in communication with the data record repository 158".
`
`This passage discloses a preferred structure of a re—architecting system of
`
`Eager, but does not disclose or suggest any feature that would allow
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 12
`
`”automatically detecting changes that afiect an application” as recited in claim 2.
`
`Further, the Appellants note that Eager discloses in column 6, lines 50-52,
`
`that ”the re—architect option translates the existing application to the new architecture
`
`without chanin any of the existing functionality”, and thus explicitly and
`
`unambiguously discloses that the ”re—architecting” of Eager is not related to
`
`implementing (or detecting) any change that affects an application.
`
`As to what is taught in Figure 1 of Eager: Figure 1 of Eager shows a re-
`
`architecting system 20 comprising ”a user
`
`interface conversion utility 210, a
`
`procedural language conversion utility 220, and a data definition language conversion
`
`utility 230".
`
`The Appellants note that the Examiner has failed to show which of the
`
`features of system 20 would read on any feature that would allow ”automatically
`
`detecting changes that afi‘ect an application” as recited in claim 2. Further, as detailed
`
`above, Eager discloses that
`
`the system's ”re-architecting” is not related to
`
`handling changes in an application.
`
`As to what is taught in Figure 16 of Eager: Figure 16 of Eager is a block
`
`diagram of the user interface conversion utility 210 of Fig. 1, which ”converts the
`
`user ‘ interface of an existing application represented by the source user interface
`
`definitions 211 into target user interface definitions 213 using the user interface
`
`converter 212" (col. 23, lines 4-8).
`
`As detailed above, Fig. 1 of Eager relates to a re-architecting system,
`
`wherein such re-architecting is done ”without changing any of the existing
`
`functionality”. The Appellants note that the Examiner has failed to explain how a
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 13
`
`portion of a system provided for implementing an operation devoid of change
`
`would disclose or suggest means for detecting changes, and in particular means
`
`for ”automatically detecting changes that ajfect an application” as recited in claim 2.
`
`As to what is taught in Figure 17 of Eager: Figure 17 of Eager is a flow
`
`diagram wherein ”the procedural
`
`language conversion utility 220 converts the
`
`functionality and data access ‘programs of an existing application into the programming
`
`language targeted for the implementation of the functionality layer 130 (Fig. 1). This
`
`conversion process consists of two main phases. A first phase (Phase A) converts the
`
`source language 221 into an intermediary language 225. A second phase (Phase B) then
`
`transforms the intermediary language 225 into the final target language 227" (col. 24,
`
`lines 45-53).
`
`The Appellants note that Figure 17 only relates to converting a source
`
`application in a source language into a target application in a target language,
`
`and note that the Examiner has failed to show which part of the feature of figure
`
`17 would read on means for ”automatically detecting changes
`
`that afiect an
`
`application” as recited in claim 2.
`
`As to what is taught in Figure 24 of Eager: Figure 24 of Eager is a block
`
`diagram of the data definition language conversion utility 230 of Fig. 1 that is
`
`”used to convert a source database language 231 into a target database language 237
`
`using a database converter 234" (col. 28, lines 11-14).
`
`The Appellants note that Figure 24 only relates to converting a source
`
`language into a target language, and note that the Examiner has failed to show
`
`which part of the feature of figure 24 would read on means for ”automatically
`
`detecting changes that aflect an application” as recited in claim 2.
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 14
`
`In addition to the above remarks,
`
`the Appellants note that the only
`
`mention of a change in an application is made in relation to GUI files 248, that
`
`are ”used by application developers and maintenance personnel to midzfy application
`
`screens and messages as part of the re—engineering system 30" (col. 23, line 66 — col. 24,
`
`line 1).
`
`The Appellants note that Eager teaches modifying applications in relation
`
`to Eager’s re—engineering system, and not Eager’s re-architecting system as
`
`opined by the Examiner.
`
`Further, the Appellants note that Eager explicitly teaches that in the re-
`
`engineering system, it is ”application developers and maintenance personnel” that
`
`”modzfy application screens and messages”, thus teaching away from any means that
`
`would operate ’’automatically’’, and in particular that would allow ”aatomatically
`
`detecting changes that afiect an application” as recited in claim 2.
`
`In conclusion,
`
`the Appellants note that Eager relates to means for
`
`automatically converting a source system into a target system, wherein:
`
`-a re-architecting option allows translating applications in the source
`
`system ”withoat changing any of the existing functionality” ; and
`
`-a re—engineering option allows ”application developers and maintenance
`
`personnel” to ’’modify application screens and messages”, as seen above in relation to
`
`Figure 16.
`
`Contrary to the Examiner's assertion, no part of Eager seems to disclose or
`
`suggest any such thing as means ”for automatically detecting changes that aflect an
`
`application” or ”a change management layer for automatically detecting changes that
`
`aflect an application” as recited in claim 2.
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 15
`
`The Appellants note that when converting a source application into a
`
`target application, the converter of Eager parses (with parser 243) the language of
`
`the source application to convert
`
`it
`
`in a target application.
`
`If the source
`
`application has changed, one can assume that such change will be introduced in
`
`the target application. However, the Appellants note that there is no suggestion
`
`in Eager that the parsing of a source application having non-changed instruction
`
`as well as changed instructions would distinguish in any way the changed
`
`instructions from the non-changed instructions. Accordingly, parsing the source
`
`applications cannot be deemed to disclose or suggest ”detecting” changes that
`
`affect an application. For this reason also, Eager cannot be argued to disclose or
`
`suggest ”a change management layer for automatically detecting changes that aflect an
`
`application” as recited in claim 2.
`
`The Appellants respectfully submit that at least in View of the above,
`
`claim 2 is patentable over Eager, and respectfully request that the Examiner's
`
`rejection of claim 2 be properly overturned.
`
`Rejection of claims 24 and 46
`
`The Appellants respectfully submit that the arguments used above for
`
`showing that claim 2 is patentable over Eager can also be used to show that
`
`Eager does not disclose or suggest a method as recited in claim 24, and in
`
`particular comprising: ”automatically detecting changes
`
`that affect a particular
`
`application” or a server as recited in claim 46, and in particular comprising ”a
`
`change management layer for automatically detecting changes that aflect an application”.
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 16
`
`The Appellants respectfully submit that at least in view of the above,
`
`claims 24 and 46 are patentable over Eager, and respectfully request that the
`
`Examiner's rejection of claims 24 and 46 be properly overturned.
`
`Rejection of claims 4-9, 11-23, 26-31, 33-45, 48-52 and 54-66
`
`Claims 4-9 and 11-23 depend directly or indirectly on claim 2; claims 26-31
`
`and 33-45 depend directly or indirectly on claim 2; and claims 48-52 and 54-66
`
`depend directly or indirectly on claim 46.
`
`Appellants note that ”if an independent claim is nonobvious under 35
`
`U.S.C. 103, then any claim depending therefrom is nonobvious.” In re Fine, 837
`
`F.2d 1071, 5 USPQ2d 1596 (Fed. Cir. 1988).
`
`The Appellants respectfully submit that at least in light of the above
`
`discussion, dependent claims 4-9, 11-23, 26-31, 33-45, 48-52 and 54-66 are also
`
`allowable.
`
`Further, as developed hereafter, the Appellants disagree with the specific
`
`rationale developed by the Examiner for rejecting the dependent claims.
`
`Rejection of claim 4
`
`In section 4 of the Final action of February 28, 2007, the Examiner opines
`
`that ”as to claim 4, Eager teaches the third layer further comprises a Java data
`
`management layer having means for distributing one or more ]AVA applets to
`
`the client computer wherein the JAVA applets dynamically generate and present
`
`the user interface and functionality to the user based on the first and second
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 17
`
`layers (column 8,
`
`lines 3-22 and column 10,
`
`lines 7-26)”. The Appellants
`
`respectfully disagree with the Examiner.
`
`Column 8, lines 3-22 of Eager recites that ”an Open Systems Integration
`
`(OSI) process 469 is a manual
`
`implementation process that focuses on integrating
`
`applications that are purchased, newly custom developed, re—architected, or re—engineered
`
`to share data and screens. This process includes the definition of business goals and
`
`objectives,
`
`the definition of applicable business processes,
`
`the study of application
`
`interactions and data relationships, and the planning of hardware and software
`
`infrastructures. The OSI process 469 also includes the implementation of the integration,
`
`including detailed implementation plan and schedule and detailed requirements and
`
`design documentation, user acceptance testing, comprehensive technical documentation,
`
`and empowerment of support stafi‘for the maintenance phase. One powerful example of
`
`integration at the user interface layer using the OSI process 469 is the creation of a
`
`corporate intranet using internet Hyper—Text Manipulation Language (HTML) or a
`
`highly—level language generating HTML, such as ]ava from Sun Microsystems to provide
`
`a user-friendly, platform independent, common user interface to corporate application”.
`
`The Appellants note that the above excerpt does not recite the words
`
`”]AVA applet”, and that the Examiner has failed to explain where the above
`
`excerpt would suggest using IAVA applets. It follows that the Examiner has also
`
`failed to explain where the above excerpt would suggest JAVA applets that
`
`”dynamically generate and present” ”user interface and functionality” to a user” based
`
`on first and second layers.
`
`Column 10, lines 7-26 of Eager recites that ”PIG. 5 is a schematic diagram of a
`
`sample mapping between application user interface representation structures 116 and
`
`display platform user interface representation structures 118. In the figure,
`
`the user
`
`interface display platform 115 is exemplified as Microsoft Windows 3.x and the display
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 18
`
`platform user interface representation structures 117 are thus the internal Windows 3.x
`
`management structures. However, other user interface display platforms 115 using
`
`similar internal structures to manage windows are supported by the exact same user
`
`interface engine 117. Notably, the Internet’s world-wide web, based on the HTML or
`
`Iava user interface languages, is another example of user interface display platform 115.
`
`Indeed, in a preferred embodiment of the present invention, the user interface engine 117
`
`is written using Microsoft Visual C++ and based on the industry—standard Microsoft
`
`Foundations Classes (MPC) class library, which allows cross—platform development for
`
`Windows 3.x, Windows 95, Windows NT, MacOS, and LINIX—based user interface
`
`display platforms 115, including internet web servers”.
`
`The Appellants note that the above excerpt does not recite the words
`
`”]AVA applet”, and that the Examiner has failed to explain where the above
`
`excerpt would suggest using JAVA applets. It follows that the Examiner has also
`
`failed to explain where the above excerpt would suggest JAVA applets that
`
`”dynamically generate and present” ”user interface and functionality” to a user” based
`
`on first and second layers.
`
`At least in view of the above, the Appellants respectfully submit that the
`
`Examiner has failed to show that Eager discloses or suggest the features recited
`
`in claim 4, and in particular ”data management
`
`layer having means for
`
`distributing one or more JAVA applets to the client computer wherein the JAVA
`
`applets dynamically generate and present the user interface and functionality to
`
`the user based on the first and second layers”.
`
`The Appellants respectfully submit that, for this reason also, claim 4 is
`
`patentable over Eager.
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 19
`
`Rejection of claims 26 and 48
`
`Claim 26 depends on claim 24 and recites features corresponding to the
`
`features of claim 4. Claim 48 depends on claim 46 and recites features
`
`corresponding to the features of claim 4.
`
`The Appellants note that the arguments used above to show that claim4 is
`
`patentable over Eager at least because Eager does not disclose or suggest ”]AVA
`
`applets” as recited in claim 4 can also be used to show that claims 26 and 48 are
`
`patentable over Eager.
`
`Rejection of claim 11
`
`In section 4 of the Final action of February 28, 2007, the Examiner opines
`
`that ”as to claims 11-12, Eager teaches the server computer further comprises the
`
`change management layer further comprises one or more intelligent agents that
`
`detects changes that affect an application (column 2, lines 34-57 and column 4,
`
`lines 42-51 and Figs. 1, 16, 17, 24; specifically, ‘change management layer’
`
`corresponding to re-architecting system in Eager’s teaching)”. The Appellants
`
`respectfully disagree.
`
`As detailed above, column 2, lines 34-57 of Eager recites that "For each
`
`source application, there is a range of available transition choices, including the option of
`
`translating the source application to the new target architecture without changing any of
`
`the existing functionality and the option of re—engineering the source application by
`
`changing the existing functionality. The source application may also be replaceable by a
`
`commercial product or a custom application written in-house. The source applications are
`
`then transitioned in order of priority to the new architecture".
`
`

`
`Application Serial No. 09/ 797,488
`Appeal brief
`Page 20
`
`This passage teaches that Eager allows translating sources application to
`
`the new target architecture without changing the existing functionality. It also
`
`teaches that Eager allows re-engineering the source application by changing the
`
`existing functionality.
`
`However,
`
`this passage does not

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket