throbber
\\
`.l_
`
`
`
`9
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Virginia 22313-1450
`www.uspto.goV
`
`90/013,016
`
`10/07/2013
`
`7647633
`
`FINREXM0005
`
`9521
`
`Bey & Cotropia PLLC (Finjan Inc.)
`Dawn-Marie Bey
`213 Bayly Court
`Richmond, VA 23229
`
`BASEHOAR, ADAM L
`
`ART UNIT
`3992
`
`MAIL DATE
`
`12/18/2015
`
`PAPER NUIVIBER
`
`DELIVERY MODE
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`PTOL—90A (Rev. 04/07)
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 1
`
`

`
` IJNI TED S '.['ATE'.~'_-I PATEN T AND TRADEE-‘IARK QFFI CE
`
`Cornrnis-sinner for Patents
`United States Patent and Tradernark Office
`F'.O. Elu;~c145I:i
`Alexaridria, VA 2231 3-1 450
`vuvu-wuspfo.gmr
`
`DO NOT USE IN PALM PRINTER
`
`(THIRD PARTY REQUESTER'S CORRESPONDENCE ADDRESS)
`
`Jeffrey R. Cole, DLA Piper LLP (US)
`
`401 Congress Avenue
`
`Suite 2500
`
`Austin, TX 78701
`
`EX PARTE REEXAMINATION COMMUNICATION TRANSMI'I'I'AL FORM
`
`REEXAMINATION CONTROL NO. 90/013 016.
`
`PATENT NO. 7647633.
`
`ART UNIT 3992.
`
`Enclosed is a copy of the latest communication from the United States Patent and Trademark
`Office in the above identified ex parte reexamination proceeding (37 CFR 1.550(f)).
`
`Where this copy is supplied after the reply by requester, 37 CFR 1.535, or the time for filing a
`reply has passed, no submission on behalf of the ex parte reexamination requester will be
`acknowledged or considered (37 CFR 1.550(g)).
`
`PTOL—465 (Rev.07—04)
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 2
`
`

`
`
`
`Commissioner for Patents
`United States Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`www.uspio.gov
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`Application Number: 90/013,016
`Filing Date: October 07, 2013
`Appellant(s): 7647633
`
`Dawn—Marie Bey (Reg. No. 44,442)
`For Appellant
`
`EXAMINER’S ANSWER
`
`This is in response to the Appeal Brief filed 08/24/2015.
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 3
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 2
`
`(1) Grounds of Rejection to be Reviewed on Appeal
`
`Every ground of rejection set forth in the Office action dated 05/22/2015 (hereafter the
`
`“Final Action”) from which the appeal is taken is being maintained by the Examiner except for
`
`the grounds of rejection (if any) listed under the subheading “WITHDRAWN REJECTIONS.”
`
`New grounds of rejection (if any) are provided under the subheading “NEW GROUNDS OF
`
`REJECTION.”
`
`(2) Response to Argument
`
`Appellant’s arguments filed 08/24/2015 have been fully considered but they are not
`
`persuasive.
`
`A.
`
`Substantial New Question of Patentability (SNQ) Determination
`
`Appellant generally argues (Appeal Brief: pp. 11-13) that both Ji and Golan, among other
`
`references, were either explicitly or inherently considered by Primary Examiner Revak during
`
`the prosecution of the Edery ‘633 patent. Appellant argues that both Ji and Golan are not new
`
`and are the exact same references that were differentiated in the background of the Edery ‘633
`
`specification and considered and cited by the Office during the examination of the Edery '633
`
`patent. Thus, Appellant alleges there is strong evidence against the finding of a SNQ in light of
`
`the Ji and Golan references.
`
`The Examiner respectfully disagrees with the Appellant and notes that the Appeal Brief
`
`does not “clearly present the issue and arguments regarding the examiner’s SNQ determination
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 4
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 3
`
`under a separate heading and identify the communication in which the patent owner first
`
`requested reconsideration before the examiner” as suggested by MPEP §2274(VI). Additionally,
`
`the SNQ Determinations are not listed in Section IV of the Appeal Brief. However, if the SNQ
`
`Determinations are in fact appealed to the Board, Appellant’s arguments are not found to be
`
`persuasive for the reasons stated in the Final Action. Said reasons are reproduced below:
`
`As noted in the Order (see: Order, pp. 10-13), “The existence of a substantially new
`
`question of patentability is not specifically precluded by the fact that a patent or printed
`
`publication was previously cited by or to the Office or considered by the Office.” Similarly, in
`
`relation to the use of the same or substantially identical prior art previously cited/considered
`
`during prior examination, MPEP §2242(II)(A) states that “Determinations on whether a
`
`substantial new question of patentability exists in such an instance shall be based upon a fact-
`
`specific inquiry done on a case—by—case basis. For example, a substantial new question of
`
`patentability may be based solely on old art where the old art is being presented/viewed in a new
`
`light, or in a different way, as compared with its use in the earlier examination(s), in view of a
`
`material new argument or interpretation presented in the request. Such material new argument or
`
`interpretation may be based solely on claim scope of the patent being reexamined.” In the
`
`instant case, the Order specifically determined that Ji and Golan in combination with Ji each
`
`presented substantial nel questions of patentability in light of the prosecution history of the
`
`Edery ‘633 patent.
`
`Regarding the Ji reference, it was noted in the Order that Ji was cited by the prior
`
`examiner and was generally described in the “Background Of The Invention” section of the
`
`Edery ‘633 patent (see: Order, p. 3). However, it was further noted that the prosecution history
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 5
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 4
`
`of Edery ‘633 patent showed that the Ji reference was never discussed by the prior examiner or
`
`applied in a rejection to any of the claims (see: Order, pp. 3 & 11). The part of the specification
`
`in the Edery ‘633 patent (see: Edery ‘633, column 1, line 67—column 2, line 10) that describes Ji,
`
`only characterizes Ji as providing protection only against Java applets or ActiveX controls, as
`
`being resource intensive, and as failing to detect against additional program code. The features
`
`of Ji that helped raise a substantial new question (e. g., “transmitting from the computer mobile
`
`protection code to at least one information—destination of the downloadable—information, if the
`
`downloadable—inforrnation is determined to include executable code” and “receiving a sandboxed
`
`package that includes mobile protection code (“MPC”) and a Downloadable and one or more
`
`protection policies at a computer at a Downloadable—destination") were not described and
`
`therefore were never substantively considered by the Office. Accordingly, the Order correctly
`
`finds that the Ji reference raises a substantial nel question of patentability.
`
`Regarding Golan in combination with Ji, it was noted in the Order that this combination
`
`had never been considered during the prosecution history of the Edery ‘633 patent (see: Order, p.
`
`13: “However, Golan was not considered in combination with the prior art Ji reference as
`
`cited/described in the Request. Thus Golan is being presented/viewed in a different way as
`
`compared with the earlier examination”). The Patent Owner makes no attempt to argue
`
`otherwise. Accordingly, the Order correctly finds that Golan in combination with Ji raises a
`
`substantial new question of patentability.
`
`B.
`
`Anticipation Rejection: Ji
`
`Ji anticipates claims 1-3, 28-33, and 44 under 35 U.S.C § 102(e)
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 6
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Claim 1
`
`Page 5
`
`Appellant argues (Appeal Brief: pp. 13-15) that Ji does not disclose, either expressly or
`
`inherently, the limitation requiring “determining, by the computer, whether the downloadable-
`
`information includes executable code.” Appellant further argues that there is no teaching or
`
`enablement in Ji for “discriminating Java applets from non-applets” and more importantly that
`
`the requirement of “determining, by the computer, whether the downloadable—information
`
`includes executable code” is completely missing. Appellant argues that J i only scans received
`
`applets to look for malicious applet instructions; not to determine if the downloaded applet
`
`contains executable code.
`
`The Examiner respectfully disagrees with the Appellant. As noted by Appellant,
`
`independent claim 1 requires “determining, by the computer, whether the downloadable-
`
`inforrnation includes executable code.” Specifically, it is noted by the Examiner that
`
`independent claim 1 does not specify how the determining is done and certainly does not require
`
`finding multiple forms of executable code or what types of executable code could be found. As
`
`shown in the incorporated claim charts and further explained in the Final Action, the Ji reference
`
`specifically teaches determining whether downloadable-inforrnation includes executable code by
`
`discriminating Java applets from non—applets (see: Ji, column 18-21: “dynamic scanning for
`
`application programs, e. g. Java applets or ActiveX controls”; column 4, line 66—column 5, line 4:
`
`“server. . .scans the applet. . .Downloaded non—applets are not scanned”). As noted by the
`
`specifications of the Edery ‘633 patent (see: Edery ‘633, column 1, lines 60-63: “Java applets”;
`
`column 2, lines 28-33: “remotely operable code. . .such as Java applets, ActiveX
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 7
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 6
`
`controls. . .among others”) and Ji reference (see: Ji, column 3, lines 31-40: “applet code. . .begins
`
`to be executed. . .applet code is executed”), downloadable—information comprising executable
`
`code could include Java applets. Therefore, by Ji scanning every Java applet and only Java
`
`applets for malicious instructions, Ji anticipates the claim language at issue. Since Ji’s system
`
`takes a first action for downloadable—information including executable code (i.e., scanning Java
`
`applets presumed to be executable code) and takes a different action for other downloadable—
`
`information (i.e., not scanning non—applet downloadable—inforrnation), Ji’s system determines
`
`“whether the downloadable—inforrnation includes executable code.”
`
`Appellant next argues (Appeal Brief: pp. 15-17), with regard to Ji’s teaching of looking
`
`for particular instructions, that Ji’s scanner cannot and does not make the binary executable code
`
`vs. no—executable code determination as required. Appellant argues that Ji’s applet scanner can
`
`only look for a predefined set of suspicious functions within a known type of code (i.e., Java
`
`applet byte code). Appellant further argues that Ji also does not teach the step of “based upon
`
`the determination, transmitting from the computer mobile protection code to at least one
`
`information—destination of the downloadable—information, if the downloadable—inforrnation is
`
`determined to include executable code.” Appellant notes that since Ji never makes the claimed
`
`determination in the first instance, the follow—on element cannot be triggered by Ji.
`
`The Examiner respectfully disagrees with the Appellant. Additionally, as shown in the
`
`incorporated claim charts and further explained in the Final Action, the Ji reference also
`
`specifically teaches determining whether downloadable—inforrnation includes executable code by
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 8
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 7
`
`scanning downloadable information for particular executable instructions (see: Ji, column 3,
`
`lines 22-31: “applets are statically scanned. . .looking for particular instructions”; column 5, lines
`
`16-44: “If an instruction. . .that calls an insecure function. . .is found”). Thus Ji discloses a
`
`specific embodiment within the scope of a broadly claimed feature and therefore meets the
`
`claimed requirement. This position is further buttressed by new independent claim 48 which
`
`states that “determining, by the computer, whether downloadable—information includes
`
`executable code” could be performed by “analyzing the downloadable information for operations
`
`to be executed on a computer.” Clearly Ji’s teaching of searching for and identifying “particular
`
`instructions” (i.e., operations to be executed) that are to be executed at a client device meets the
`
`claimed limitation of “determining, by the computer, whether downloadable-inforrnation
`
`includes executable code.”
`
`Regarding the “based upon the determination step”, as shown above, Ji clearly discloses
`
`determining if downloadable-inforrnation includes executable code. Ji further teaches
`
`transmitting mobile protection code only if the downloadable-inforrnation is determined to
`
`include said executable code (see: Ji, column 3, lines 32-50: “scanning for application programs,
`
`e.g. Java applets. . .looking for particular instructions. . .delivering...a security monitoring
`
`package”; column 4, line 66—column 5, line 27: “scans the applet and instruments it...scanning is
`
`performed on the applet by the scanner 26. If an instruction...is found during this static
`
`scanning”; column 6, lines 38-42: “pre and post filter and monitoring package security policy
`
`functions) are combined with the instrumented applet code in a single JAR. . .f1le. . .at the server
`
`32, and downloaded to the web browser 22 of the client machine”). Therefore, the mobile
`
`protection code is sent to a client computer based on the determination. Ji also teaches wherein
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 9
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 8
`
`downloaded non—applets are not scanned and thus are not transmitted with mobile protection
`
`code.
`
`Therefore, Appellant’s arguments regarding claim 1 are not persuasive.
`
`Claim 28
`
`Appellant argues (Appeal Brief: pp. 17-20) that sandboxing is not mentioned in Ji and
`
`that Ji does not describe that the JAR file it sends implements a sandbox. Appellant argues that a
`
`JAR archive file is not a sandboxed package. Appellant further argues that the concept of a
`
`“sandbox” is a term of art and that the contents of a sandbox package cannot be divorced from
`
`the way it is executed. Appellant argues that the sandbox concept requires receiving the sandbox
`
`package as a single Downloadable and execution thereof results in a predetermined ordering of
`
`un—packaging so as to control the attempted Downloadable execution in a restricted environment.
`
`Thus, Appellant argues that Ji’s JAR file fails to anticipate claim 28 because it’s without any
`
`particular structure, let alone a structure that allows mobile protection code to be executed prior
`
`to initiating the downloadable. Finally, Appellant argues that Ji requires the instrumented applet
`
`to be already executing in the client web browser in order for Ji’s monitor package to be invoked.
`
`The Examiner respectfully disagrees with the Appellant. First it is noted that the features
`
`upon which Appellant relies (i.e., “the sandbox concept requires that the receiving computer
`
`treats the sandbox package as a single Downloadable and execution thereof results in a
`
`predetermined ordering of un—packaging, i.e., MPC, then Downloadable, then protection policies,
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 10
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 9
`
`with the MPC creating the initial protected sandbox. . .controlling the attempted Downloadable
`
`execution therein”) are not recited in the rejected claim(s). Although the claims are interpreted
`
`in light of the specification, limitations from the specification are not read into the claims. See In
`
`re Van Geuns, 988 F.2d 1181, 26 USPQ2d 1057 (Fed. Cir. 1993). This position is further
`
`buttressed by dependent claim 29 which appears to specifically claim some of the features
`
`Appellant argues as necessary/inherent to a “sandboxed package.” As previously noted in the
`
`Final Action, the claims only require receiving a sandboxed package wherein the sandboxed
`
`package includes mobile protection code (“MPC”), a Downloadable, and one or more protection
`
`policies. Therefore, a “sandboxed package” is not merely an ordinary term of art, but instead a
`
`“sandboxed package” is defined by the claim language and supported by the specification of the
`
`Edery ‘633 patent. The discussion of what is included in a “sandboxed package” in the
`
`specification of the Edery ‘633 patent (see: Edery ‘633, column 3, lines 7-16) requires nothing
`
`more than is already stated in the claim.
`
`Second, Ji clearly teaches wherein the JAR (Java archive) file downloaded to the client
`
`machine anticipates the claimed “sandbox package” by including pre and post filter and
`
`monitoring package security policy functions and instrumented applet code (see: Ji, column 6,
`
`lines 38-42; column 7, lines 41-64). Ji further taught that once the JAR file was downloaded, the
`
`downloaded applet executed in a sandbox inside the web browser (see: Ji, column 5, lines 6-13:
`
`“its instructions are executed. . .monitored by the monitoring package software, also downloaded
`
`from the scanner”). Ji taught that all “monitoring and applet code is executed in the web
`
`browser” (see: Ji, column 6, lines 43-45) and that execution of the applet code is “monitored by
`
`the monitor package software” (see: Ji, column 5, lines 6-13). The monitoring package further
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 11
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 10
`
`contains monitoring functions that are “invoked by the instrumentation code in the applet” (see:
`
`Ji, column 7, lines 41-49), wherein the monitoring package is considered a “live agent” intended
`
`to prevent execution of the suspicious instructions (see: Ji, column 3, lines 45-50). Therefore,
`
`since “monitoring” is a function performed by the monitor package software during execution,
`
`and Ji discloses that the monitoring package software monitors the execution of the applet, the
`
`monitoring package software of Ji will be executed before the applet (i.e., the “downloadable-
`
`information”).
`
`Therefore, Appellant’s arguments regarding claim 28 are not persuasive.
`
`Claim 29
`
`Appellant argues (Appeal Brief: p. 20) that Ji does not teach the additional elements of
`
`dependent claim 29, because Ji requires the instrumented applet to be already executing in the
`
`client browser in order for Ji's monitor package to be invoked. Thus, Appellant argues that Ji
`
`executes the applet instructions first which invoke the monitoring instructions, which is the
`
`opposite of the claimed process.
`
`The Examiner respectfully disagrees with the Appellant. As noted above with regard to
`
`independent claim 28, Ji taught that once the JAR file was downloaded, the downloaded applet
`
`executed in a sandbox inside the web browser (see: Ji, column 5, lines 6-13: “its instructions are
`
`executed. . .monitored by the monitoring package software, also downloaded from the scanner”).
`
`Ji taught that all “monitoring and applet code is executed in the web browser” (see: Ji, column 6,
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 12
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 11
`
`lines 43-45) and that execution of the applet code is “monitored by the monitor package
`
`software” (see: Ji, column 5, lines 6-13). The monitoring package further contains monitoring
`
`functions that are “invoked by the instrumentation code in the applet” (see: Ji, column 7, lines
`
`41-49), wherein the monitoring package is considered a “live agent” intended to prevent
`
`execution of the suspicious instructions (see: Ji, column 3, lines 45-50). Therefore, since
`
`“monitoring” is a function performed by the monitor package software during execution, and Ji
`
`discloses that the monitoring package software monitors the execution of the applet, the
`
`monitoring package software of Ji will be executed before the applet (i.e., the “downloadable-
`
`information”).
`
`Therefore, Appellant’s arguments regarding claim 29 are not persuasive.
`
`Claim 30
`
`Appellant argues (Appeal Brief: pp. 20-21) that the steps of claim 30 are being performed
`
`at the Ji reference equivalent of the client web browser 22, not at the server 32 of Ji. Appellant
`
`argues that the elements of claim 28 would have to occur at the receiving computer.
`
`The Examiner respectfully disagrees with the Appellant. Ji does disclose that the scanner
`
`26 at the server instruments an identified instruction by placing pre and post filter code around
`
`said instruction (see: Ji, column 3, lines 25-31; column 5, lines 16-27). However, as noted
`
`above, Ji specifically teaches that the applet and its instructions along with the monitoring
`
`package are executed at the client. Therefore, when the applet is conventionally interpreted by a
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 13
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 12
`
`client web browser, the mobile protection code actively modifies the interfaces of the
`
`downloadable to resources at the destination (see: Ji, column 3, lines 38-44: “Upon, execution
`
`each instrumented instruction is subject to a security check”; column 5, line 28-column 6, line
`
`37: “first instruction sequence generates a call to a pre—filter function...is to be invoked...disallow
`
`any directory listing access. . .protect files under c:\temp”; column 7, lines 37-53: “also contains a
`
`security policy checker. . .to determine whether the applet being scanned violates a security
`
`policy”). The Examiner notes that the method by which the MPC modifies the interfaces is not
`
`clearly defined in the claims.
`
`Therefore, Appellant’s arguments regarding claim 30 are not persuasive.
`
`Claim 31
`
`Appellant argues (Appeal Brief: p. 21), as similarly discussed above with regard to claim
`
`30, that Ji does not disclose the modifying element in the first instance. Appellant argues that the
`
`portions of Ji cited in the Request for this element occur at the server 32, not at the client web
`
`browser 22.
`
`The Examiner respectfully disagrees with the Appellant. As similarly discussed above
`
`with regard to claim 30, the Examiner acknowledges that the scanner 26 at the server instruments
`
`identified instructions by placing pre and post filter code around said instructions (see: Ji,
`
`column 3, lines 25-31; column 5, lines 16-27). However, as further explained above, Ji
`
`specifically teaches that the client performs the function required by claim 31 when the applet
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 14
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 13
`
`and monitoring code are actually executed at the client. Thus, Appellant’s argument that the
`
`portions of Ji cited in the Request (e.g., “after receiving the downloadable, executes the
`
`instructions, intercepting (diverting) calls to operating system resources attempted by the
`
`Downloadable. . .monitor package also creates a unique session upon instantiation. . .to determine
`
`whether the applet being scanned violates the security policy”) occur at the server are not
`
`persuasive.
`
`Therefore, Appellant’s arguments regarding claim 31 are not persuasive.
`
`Claim 32
`
`Appellant argues (Appeal Brief: p. 21), as similarly discussed above with regard to claim
`
`30, that Ji does not disclose the modifying element in the first instance. Appellant further argues
`
`that the Request does not even attempt to point to any portion of Ji for teaching the import
`
`address table (“IAT”) element.
`
`The Examiner respectfully disagrees with the Appellant. Appellant’s arguments are not
`
`persuasive for the same reasons given above with regard to claim 30. Additionally, the
`
`Examiner notes that the cited portions of the Request point to Ji’s JAR (Java archive) file for the
`
`clamed functionality of the import address table. Said JAR file containing all the necessary Java
`
`classes required by the applet for execution at the client browser, wherein each fetched Java class
`
`file is individually instrumented, then packed together and delivered to be executed by the client
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 15
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 14
`
`(e. g., see: Ji, column 7, lines 32-40: “extracts the class files from the JAR file. . .instruments the
`
`Java class files, e. g. by inserting monitoring instructions after each suspicious instruction”).
`
`Therefore, Appellant’s arguments regarding claim 32 are not persuasive.
`
`Claim 33
`
`Appellant argues (Appeal Brief: p. 22), as similarly discussed above with regard to claim
`
`30, that Ji does not disclose the modifying element in the first instance. Appellant argues that the
`
`portions of Ji cited in the Request for this element occur at the server 32, not at the client web
`
`browser 22.
`
`The Examiner respectfully disagrees with the Appellant. As similarly discussed above
`
`with regard to claim 30, the Examiner acknowledges that the scanner 26 at the server instruments
`
`identified instructions by placing pre and post filter code around said instructions (see: Ji,
`
`column 3, lines 25-31; column 5, lines 16-27). However, as further explained above, Ji
`
`specifically teaches that the client performs the function required by claim 33 when the applet
`
`and monitoring code are actually executed at the client. Thus, Appellant’s argument that the
`
`portions of Ji cited in the Request (e. g., “modification of the interfaces installs the monitoring
`
`package (to act as a filter-driver)....accessible to the web browser...first instruction...provided by
`
`the scanner...checks the security policy associated with the scanner. . .Both the pre- and post-filter
`
`functions update the session state”) occur at the server are not persuasive.
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 16
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 15
`
`Therefore, Appellant’s arguments regarding claim 33 are not persuasive.
`
`Claim 44
`
`Appellant argues (Appeal Brief: pp. 22-23) that Ji does not teach the additional
`
`limitation, “and transmitting the downloadable—information without the mobile protection code if
`
`the downloadable—information is determined not to include executable code.” Appellant further
`
`argues that Ji only scans Java applets and it doesn’t scan non—applets, and most certainly does not
`
`disclose claim elements pertaining to taking different actions based on a determination of
`
`whether a downloadable contains or does not include executable code.
`
`The Examiner respectfully disagrees with the Appellant. The Examiner first notes, as
`
`discussed above, that Ji teaches all the limitations with respect to independent claim 1.
`
`Additionally, as noted in the rejection set forth the in the Final Action, Ji specifically teaches
`
`transmitting downloadable—information (i.e., non—applets) without mobile protection code if the
`
`downloadable—information is determined not to include executable code (see: Ji, column 4, line
`
`66—column 5, lines 5: “proxy server 32...Downloaded non—applets are not scanned”). As noted
`
`above with regard to independent claim 1, Ji’s system takes a first action for downloadable-
`
`inforrnation including executable code (i.e., scanning Java applets presumed to be executable
`
`code) and takes a different action for other downloadable—information (i.e., not scanning non-
`
`applet downloadable—information). In both cases the scanned applets and un—scanned non-
`
`applets are then conventionally downloaded from the server to the client (local computer),
`
`wherein only the scanned applets are transmitted with the claimed mobile protection code.
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 17
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 16
`
`Therefore, Appellant’s arguments regarding claim 44 are not persuasive.
`
`C.
`
`Anticipation Rejection: Ji
`
`Ji anticipates claims 4-7, 48, and 49 under 35 U.S.C § 102(b)
`
`Claim 4
`
`Appellant argues (Appeal Brief: pp. 23-24) that the processes disclosed in Ji operate on a
`
`single type (i.e., a Java applet), and are directed to scanning of this known type. Thus, Appellant
`
`argues that it is common sense to conclude that Ji does not perform the claimed determination by
`
`analyzing for a type indicator. Appellant notes that Ji is completely silent as to how Ji identifies
`
`Java applets versus non—applets.
`
`The Examiner respectfully disagrees with the Appellant. First, the Examiner notes that Ji
`
`generally provides scanning for application programs such Java applets or ActiveX controls (see:
`
`Ji, column 3, lines 16-21: “scanning for application programs, e. g. Java applets or ActiveX
`
`contro1s...col1ectively referred to as applets”). In the fully disclosed embodiment, the Examiner
`
`agrees that Ji shows scanning Java applets while non—applets are not scanned. Thus, as shown in
`
`the Final Action, Ji at least specifically teaches determining if the type of file is a Java applet and
`
`therefore reads on the claimed invention. The Examiner notes that the claims do not define what
`
`the file type indicator comprises or that the downloadable is analyzed for multiple different type
`
`indicators.
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 18
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 17
`
`Therefore, Appellant’s arguments regarding claim 4 are not persuasive.
`
`Claim 5
`
`Appellant argues (Appeal Brief: pp. 24-25), as similarly discussed above with regard to
`
`claim 4, that the processes disclosed in Ji operate on a single type (i.e., a Java applet), and are
`
`directed to scanning of this known type. Appellant argues that portion of the Request cited is
`
`simply fetching the class files for inclusion in the known JAR file, and thus there is no
`
`“determining” by “analyzing for an included type detector” as required by the claim.
`
`The Examiner respectfully disagrees with the Appellant. As similarly discussed above
`
`with regard to dependent claim 4, the Examiner notes that the claims do not define what the type
`
`detector comprises or that the downloadable is analyzed for multiple different types. As shown
`
`in the Final Action, Ji specifically teaches wherein the dependency class files are extracted from
`
`a detected JAR (Java archive) file, instrumented once, packed together, and delivered to the
`
`client (see: Ji, column 7, lines 8-33: “pre—fetches the dependency class files...instrumented once,
`
`packed together, and delivered...extracts the class files from the JAR file”). Thus, the teachings
`
`described in Ji read on the claimed invention.
`
`Therefore, Appellant’s arguments regarding claim 5 are not persuasive.
`
`Claim 6
`
`Ex Parte Reexamination — Examiner's Answer
`
`Patent Owner Finjan, Inc. - Ex. 2001, p. 19
`
`

`
`Control Number: 90/013,016
`
`Art Unit: 3992
`
`Page 18
`
`Appellant argues (Appeal Brief: pp. 25-27) that Ji does not perform the required
`
`analyzing of downloadable—information for an included file type indicator. Appellant argues that
`
`the cited portion of Ji is directed to retrieving all class files for a known Java applet and packing
`
`into a JAR prior to delivering to a client. Appellant notes that this portion of Ji is simply
`
`fetching what is already known to be associated with the known Java applet and thus there is no
`
`analysis for both file type indicators and information patterns as required by the claim.
`
`The Examiner respectfully disagrees with the Appellant. As similarly discussed above
`
`with regard to dependent claim 4, the Examiner notes that the claims do not define what the file
`
`type indicator or the information patterns comprise. As discussed above with regard to claim 4,
`
`Ji specifically analyzing the downloadable—information for an included file type indicator (i.e., a
`
`Java applet). As shown in the Final Action, Ji teaches two components that read on the claimed
`
`“information pattern.” Ji specifically teaches scanning for known suspicious instructions (e.g.,
`
`“java.io.File.list”) as well as identifying Java class files within a JAR (Java archive) file. Thus,
`
`the teachings described in Ji read on the claimed invention.
`
`Therefore, Appellant’s arguments regarding claim 6 are not persuasive.
`
`Claim 7
`
`Appellant argues (Appeal Brief: p. 27) that Ji does not make the claimed determination.
`
`Accordingly, Appellant argues that the additional elements of claim 7, which furth

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket