throbber
UNITED STATES pATENT AND TRADEMARK OFFICE
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Virginia 22313-1450
`www .uspto.gov
`
`APPLICATION NO.
`
`FILING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`CONFIRMATION NO.
`
`90/013,016
`
`10/07/2013
`
`7647633
`
`FINREXM0005
`
`9521
`
`05/22/2015
`7590
`115222
`Bey & Cotropia PLLC (Fin jan Inc.)
`Dawn-Marie Bey
`213 Bayly Court
`Richmond, VA 23229
`
`EXAMINER
`
`BASEHOAR, ADAM L
`
`ART UNIT
`
`PAPER NUMBER
`
`3992
`
`MAIL DATE
`
`DELIVERY MODE
`
`05/22/2015
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`PTOL-90A (Rev. 04/07)
`
`Blue Coat Systems - Exhibit 1061 Page 1
`
`

`
`Commissioner for Patents
`United States Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-·1450
`W"aAA"I.IJ:.'=ptO.QOV
`
`DO NOT USE IN PALM PRINTER
`
`(THIRD PARTY REQUESTER'S CORRESPONDENCE ADDRESS)
`
`RYAN W. COBB, DLA PIPER LLP (US)
`
`2000 University Avenue
`
`East Palo Alto, CA 94303-2215
`
`EX PARTE REEXAMINATION COMMUNICATION TRANSMITTAL FORM
`
`REEXAMINATION CONTROL NO. 901013,016.
`
`PATENT NO. 7647633.
`
`ART UN IT 3992.
`
`Enclosed is a copy of the latest communication from the United States Patent and Trademark
`Office in the above identified ex parte reexamination proceeding (37 CFR 1.550(f)).
`
`Where this copy is supplied after the reply by requester, 37 CFR 1.535, or the time for filing a
`reply has passed, no submission on behalf of the ex parte reexamination requester will be
`acknowledged or considered (37 CFR 1.550(g)).
`
`PTOL-465 (Rev.0?-04)
`
`Blue Coat Systems - Exhibit 1061 Page 2
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 2
`
`The present application is being examined under the pre-AlA first to invent provisions.
`
`DETAILED ACTION
`
`1.
`
`This Office action addresses original claims 1-7 and 28-33 as well as newly presented
`
`claims 42-52 of United States Patent Number 7,647,633 B2 (Edery et al.), for which it has been
`
`determined in the Order Granting Ex Parte Reexamination (hereafter the "Order") mailed
`
`11119/2013 that a substantial new question of patentability was raised in the Request for Ex
`
`Parte reexamination filed on 10/07/2013 (hereafter the "Request"). Claims 8-27 and 34-41 of
`
`the Edery '633 patent are not subject to this reexamination proceeding. A Non-Final Action was
`
`mailed on 11119/2013 rejecting claims 1-7 and 28-33.
`
`2.
`
`This is a Final Action in response to the Patent Owner's (PO) Response to Non-Final
`
`Office Action (hereafter the "PO Response") filed 02119/2014. The PO Response included claim
`
`amendments to present new claims 42-52. The claim amendments have been entered and made
`
`of record. Thus, claims 1-7, 28-33, and 42-52 are currently pending and subject to
`
`reexamination.
`
`3.
`
`Patent Owner filed a Petition to Accept Unintentionally Delayed Priority Claim under 37
`
`C.P.R.§ 1.78 on 02/19/2014. The Petition was accompanied by an Amendment to the
`
`Specification to correct the language of the benefit claim recited in the first paragraph of the
`
`specification. On 07/25/2014 the Office mailed a Petition Decision that dismissed said Petition.
`
`Therefore, the Amendment to the Specification filed on 02119/2014 has not been entered.
`
`Blue Coat Systems - Exhibit 1061 Page 3
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 3
`
`Subsequently, Patent Owner filed a Renewed Petition to Accept Unintentionally Delayed Priority
`
`Claim under 37 C.P.R.§ 1.78 on 08/25/2014. The Renewed Petition was accompanied by a
`
`Supplemental Amendment to the Specification to correct the language of the benefit claim
`
`recited in the first paragraph of the specification. On 01/23/2015 the Office mailed a Petition
`
`Decision that granted the Renewed Petition. Therefore, the Supplemental Amendment to the
`
`Specification filed on 08/25/2014 has been entered and made of record.
`
`4.
`
`PO's Response filed 02119/2014 further included Declarations, pursuant to 37 C.P.R. §
`
`1.132, of Dr. Nenad Medvidovic (hereafter the "Medvidovic Declaration") and of Phil Harstein
`
`(hereafter the "Harstein Declaration"). Both the Medvidovic Declaration and the Harstein
`
`Declaration, including their accompanying Exhibits, have been entered and made of record as
`
`discussed below.
`
`5.
`
`It is noted that Patent Owner has provided notice that the related co-pending litigation
`
`proceeding Case No: 13-03133 SBA (Pinjan Inc. vs. Pireeye, Inc.) was STAYED pending
`
`reexamination on 05/30/2014.
`
`Reexamination
`
`6.
`
`The Patent Owner is reminded of the continuing responsibility under 37 CPR 1.565( a) to
`
`apprise the Office of any litigation activity, or other prior or concurrent proceeding, involving
`
`Patent No. 7,647,633 B2 throughout the course of this reexamination proceeding. The third party
`
`requester is also reminded of the ability to similarly apprise the Office of any such activity or
`
`Blue Coat Systems - Exhibit 1061 Page 4
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 4
`
`proceeding throughout the course of this reexamination proceeding. See MPEP §§ 2207, 2282
`
`and 2286.
`
`Information Disclosure Statement
`
`7.
`
`Regarding Information Disclosure Statement (IDS) submissions, MPEP 2256 recites the
`
`following: "Where patents, publications, and other such items of information are submitted by a
`
`party (patent owner or requester) in compliance with the requirements of the rules, the requisite
`
`degree of consideration to be given to such information will be normally limited by the degree to
`
`which the party filing the information citation has explained the content and relevance of the
`
`information. The initials of the examiner placed adjacent to the citations on the form
`
`PTO/SB/08A and 08B or its equivalent, without an indication to the contrary in the record, do
`
`not signify that the information has been considered by the examiner any further than to the
`
`extent noted above."
`
`Accordingly, the IDS submissions filed by Patent Owner on 12/20/2013, 02/18/2014,
`
`02119/2014, 03/28/2014, 06/05/2014, 06110/2014, 06/24/2014, 10/01/2014, 11/19/2014,
`
`02/25/2015, and 04/01/2015 have been considered by the Examiner only with the scope required
`
`by MPEP 2256, unless otherwise noted.
`
`References Discussed in This Final Action
`
`• Ji- (U.S. Patent No. 5,983,348, filed 0911011997, published 11/0911999)
`
`• Liu- (U.S. Patent No. 6,058,482, filed 05/2211998, published 05/02/2000)
`
`Blue Coat Systems - Exhibit 1061 Page 5
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 5
`
`• Golan- (U.S. Patent No. 5,974,549, filed 03/2711997, published 10/2611999)
`
`Priority Determination
`
`8.
`
`As noted above, Patent Owner filed a Renewed Petition to Accept Unintentionally
`
`Delayed Priority Claim under 37 C.P.R.§ 1.78 on 08/25/2014. The Renewed Petition having
`
`been granted by the Office on 01/23/2015. As a result, the Edery '633 patent newly claims
`
`priority (via the intermediate '032 and '667 CIP applications) to U.S. Patent No. 6,092,194 (filed
`
`11/0611997) and U.S. Patent No. 6,167,520 (filed 01/2911997).
`
`Independent claims 1 and 28 as well as dependent claims 2-7 and 29-33 (via dependency)
`
`are considered to not be adequately supported by the disclosure of the 6,092,194 and 6,167,520
`
`patents for the same reasons set for in the Order (see: Order, pp. 6-8) regarding the '302 and '667
`
`CIP applications. The disclosures of the 6,092,194 and 6,167,520 patents appear to be
`
`completely silent on teaching or suggesting the transmission of mobile protection code from a
`
`server computer to a client computer when it is determined that downloadable-information
`
`includes executable code. The 6,092,194 and 6,167,520 patents also appear to be completely
`
`silent on teaching or suggesting a client computer receiving a sandboxed package that includes
`
`mobile protection code, a Downloadable, and one or more protection policies.
`
`New independent claims 42-47 and 50-52 detail method and system claims generally in
`
`the form of independent claim 1 (see: PO's Response, p. 13: "Claims 42-47 are method claims
`
`generally in the form of claim 1 ... claims 49-52 are system claims for implementing the methods
`
`of claims 45-47"). Therefore, new claims 42-47 and 50-52 are considered to not be adequately
`
`Blue Coat Systems - Exhibit 1061 Page 6
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 6
`
`supported by the disclosure of the 6,092,194 and 6,167,520 patents for the same rationale as
`
`given above. New independent claim 48 as well as dependent claim 49 (at least via dependency)
`
`are also considered to not be adequately supported by the disclosure of the 6,092,194 and
`
`6,167,520 patents for the same rationale as given above.
`
`Further, new independent claims 42-46, 50, and 51 appear to be fully supported by the
`
`parent '299 continuation application as well as the '591 provisional application for similar
`
`rationale as disclosed in the Order for original claims 1-3 and 28-33 (see: Order, p. 7-8).
`
`However, while new claims 47-49 and 52 also appear to be fully supported by the parent '299
`
`continuation application, the '591 provisional application does not appear to provided sufficient
`
`support for new claims 47-49 and 52. Similar to dependent claims 4-7 noted in the Order (see:
`
`Order, p. 8), the '591 provisional application appears to be completely silent on how the server
`
`computer detects whether downloadable-information includes executable code. More
`
`specifically the '591 provisional application is silent on the specific detection process requiring,
`
`for example, "analyzing downloadable-information for operations to be executed on a computer"
`
`and "analyzed for. .. binary information and a pattern" as required by new claims 47-49 and 52
`
`(see: '591 provisional application, pp. 1 and 4: "Static scanning at the network server
`
`level.. .identifies application programs"; "the server detects an executable being downloaded or
`
`received").
`
`Therefore, claims 1-7, 28-33, and 42-52 of the Edery '633 patent are considered to have
`
`the following effective filing dates:
`
`a.
`
`Claims 1-3,28-33,42-46, 50, and 51 are considered to have an effective filing
`
`date of 05/17/2000, the filing date of the 60/205,591 provisional application.
`
`Blue Coat Systems - Exhibit 1061 Page 7
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 7
`
`b.
`
`Claims 4-7,47-49, and 52 are considered to have an effective filing date of
`
`05/17/2001, the filing date of the parent 09/861,229 continuation application.
`
`Claim Rejections
`
`Claim Rejections - 35 USC § 102
`
`9.
`
`The following is a quotation of the appropriate paragraphs of pre-AlA 35 U.S.C. 102 that
`
`form the basis for the rejections under this section made in this Office action:
`
`A person shall be entitled to a patent unless -
`
`(b) the invention was patented or described in a printed publication in this or a foreign country or in
`public use or on sale in this country, more than one year prior to the date of application for patent in the
`United States.
`
`(e) the invention was described in (1) an application for patent, published under section 122(b), by another filed
`in the United States before the invention by the applicant for patent or (2) a patent granted on an application for
`patent by another filed in the United States before the invention by the applicant for patent, except that an
`international application filed under the treaty defined in section 351(a) shall have the effects for purposes of this
`subsection of an application filed in the United States only if the international application designated the United
`States and was published under Article 21(2) of such treaty in the English language.
`
`10.
`
`Claims 1-3,28-33, and 44 are rejected under pre-AlA 35 U.S.C. 102(e) as being
`
`anticipated by Ji (U.S. Patent No. 5,983,348, filed 0911011997, published 11/0911999).
`
`-Regarding claims 1-3 and 28-33, Ji teaches each and every limitation of the claims (see
`
`the claim charts on pages 14-16 and 19-26 of the Request, which are hereby incorporated by
`
`reference).
`
`-In regard to independent claim 44, Ji teaches each and every limitation of the claim
`
`(see the claim charts on pages 14-16 of the Request, which are hereby incorporated by
`
`Blue Coat Systems - Exhibit 1061 Page 8
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 8
`
`reference). Additionally, Ji teaches based upon the determination transmitting the
`
`downloadable-information to at least one information-destination of the downloadable-
`
`information, if the downloadable-information is determined to include executable code (see: Ji,
`
`column 3, lines 16-34: "scanning for application programs, e.g., Java applets or ActiveX
`
`controls .. .looking for particular instructions ... The instrumented applet is then downloaded from
`
`the server to the client"; column 4, line 66-column 5, line 10: "scans the applet and instruments
`
`it.. .is then downloaded to the web browser") and transmitting the downloadable-information
`
`without the mobile protection code if the downloadable-information is determined not to include
`
`executable code (see: Ji, column 4, line 66-column 5, lines 5: "proxy server 32 ... Downloaded
`
`non-applets are not scanned").
`
`11.
`
`Claims 4-7, 48, and 49 are rejected under pre-AlA 35 U.S.C. 102(b) as being anticipated
`
`by Ji (U.S. Patent No. 5,983,348, filed 0911011997, published 11/0911999).
`
`-Regarding dependent claims 4-7, Ji teaches each and every limitation of the claims
`
`(see the claim charts on pages 16-19 of the Request, which are hereby incorporated by
`
`reference).
`
`-In regard to independent claim 48, Ji teaches a computer processor-based system for
`
`computer security, the system comprising:
`
`an information monitor for receiving downloadable-information by a computer (see: Ji,
`
`column 3, lines 7-23: "a scanner...provides both static and dynamic scanning for application
`
`Blue Coat Systems - Exhibit 1061 Page 9
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 9
`
`programs, e.g., Java applets or ActiveX controls ... conventionally received from .. .Internet or an
`
`Intranet at a conventional server");
`
`a content inspection engine communicatively coupled to the information monitor for
`
`determining, by the computer, whether the downloadable-information includes executable code
`
`(see: Ji, column 3, lines 23-25 & 34-36: "applets are statically scanned at server by the scanner
`
`looking for particular instructions ... applet code is executed"; column 4, line 66-column 5, line 4:
`
`"receipt of a particular Java applet ... scans the applet ... Downloaded non-applets are not
`
`scanned"), wherein determining if downloadable information includes executable code includes
`
`analyzing the downloadable information for operations to be executed on a computer (see: Ji,
`
`column 3, lines 25-35: "instructions which may be problematic"; column 5, lines 16-42: "applet
`
`scanner thus uses applet instrumentation technology .. .If an instruction ... that calls an insecure
`
`function .. .is found"); and
`
`a protection agent engine communicatively coupled to the content inspection engine for
`
`causing mobile protection code ("MPC") to be communicated by the computer to at least one
`
`information-destination of the downloadable-information, if the downloadable-information is
`
`determined to include executable code (see: Ji, column 3, lines 32-50; column 6, lines 38-42:
`
`"The pre and post filter and monitoring package security policy functions) are combined with the
`
`instrumented applet code in a single JAR (Java archive) file format at the server 32, and
`
`downloaded to the ... client"; column 7, lines 41-49).
`
`-In regard to dependent claim 49, Ji teaches wherein the content of the downloadable
`
`information is analyzed for one or more of binary information and a pattern indicative of
`
`Blue Coat Systems - Exhibit 1061 Page 10
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 10
`
`executable code (see: Ji, column 3, lines 23-25: "scanner looking for particular instructions";
`
`column 5, lines 15-43: "applet instrumentation technology ... determined by a predefined set of
`
`such functions) is found").
`
`12.
`
`Claims 1-3 and 44 are rejected under pre-AlA 35 U.S.C. 102(e) as being anticipated by
`
`Liu (U.S. Patent No. 6,058,482, filed 05/2211998, published 05/02/2000).
`
`-In regard to independent claim 1, Liu teaches a computer processor-based method,
`
`compnsmg:
`
`receiving, by a computer, downloadable-information (Liu, column 4, line 64-column 5,
`
`line 2: "request for network information ... is received by the remote server 110"; column 8, lines
`
`8-15: "typically through remote server 110, the method determines whether the requested web
`
`page has ... one or more Java applet tags or other keywords designed to invoke or call executable
`
`code")(Fig. 3: 205 & 210);
`
`determining, by the computer, whether the downloadable-information includes
`
`executable code (Liu, column 4, line 66-column 5, line 16: "remote server 110 then determines
`
`whether the requested network information should have .. .invoke executable code"; column 6,
`
`lines 14-40; column 8, lines 8-15: "typically through remote server 110, the method determines
`
`whether the requested web page has ... one or more Java applet tags or other keywords designed to
`
`invoke or call executable code" ; column 9, lines 39-60: "providing additional security
`
`functionality for executable code which may be downloaded ... for any and all types of
`
`downloadable, executable code")(Fig. 3: 210); and
`
`Blue Coat Systems - Exhibit 1061 Page 11
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 11
`
`based upon the determination, transmitting from the computer mobile protection code to
`
`at least one information-destination of the downloadable-information, if the downloadable-
`
`information is determined to include executable code (Liu, column 5, lines 2-16: "When the
`
`network information should have such keywords ... the remote server 110 then generates the
`
`requested network information with each included keyword having a distinctive reference ... and
`
`transmits the network information to the local end system"; column 8, lines 16-37: "generates an
`
`applet tag having a new, distinctive or unique class name as the reference attribute ... generates
`
`and provides the requested web page with all of its applet tags having their respective new,
`
`distinct (or unique) class names"; column 9, line 63-column 10, line 24)(Fig. 3: 220 & 235).
`
`-In regard to dependent claim 2, Liu teaches wherein the receiving includes monitoring
`
`received information of an information re-communicator (Liu, column 4, line 51-column 5, line
`
`2: "remote server 11 O")(Fig. 1: 65 & 11 0).
`
`-In regard to dependent claim 3, Liu teaches wherein the information re-communicator
`
`is a network server (Liu, column 4, line 51-column 5, line 2: "remote server 110 is typically part
`
`of a remote server system").
`
`-In regard to independent claim 44, Liu teaches each and every limitation of the claim
`
`as noted above with regard to independent claim 1. Additionally, Liu teaches based upon the
`
`determination transmitting the downloadable-information to at least one information-destination
`
`of the downloadable-information if the downloadable-information is determined to include
`
`Blue Coat Systems - Exhibit 1061 Page 12
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 12
`
`executable code (see: Liu, column 8, lines 34-36: "provides the requested web page"; Fig. 1: 40;
`
`Fig. 3: 235) and transmitting the downloadable-information without the mobile protection code if
`
`the downloadable-information is determined not to include executable code (see: Liu, column 8,
`
`lines 10-15: "When the requested web page does not require such applet tags, the requested web
`
`page may be provided"; Fig. 3: 215).
`
`13.
`
`Claims 4 and 7 are rejected under pre-AlA 35 U.S.C. 102(b) as being anticipated by Liu
`
`(U.S. Patent No. 6,058,482, filed 05/2211998, published 05/02/2000).
`
`-In regard to dependent claim 4, Liu teaches wherein the determining comprises
`
`analyzing the downloadable-information for an included type indicator indicating an executable
`
`file type (Liu, column 4, line 65-column 5, line 4: "determines whether the requested network
`
`information should have one or more keywords ... to invoke executable code"; column 6, lines
`
`19-57: "web page may include special or designated keywords which are designed to invoice,
`
`call or specify a network programming language ... an "applet" tag ... an object tag"; column 9,
`
`lines 39-60: "context for any and all types of downloadable, executable code").
`
`-In regard to dependent claim 7, Liu teaches further comprising receiving, by the
`
`computer, one or more executable code characteristics of executable code that is capable of
`
`being executed by the information-destination, and wherein the determining is conducted in
`
`accordance with the executable code characteristics (Liu, column 4, line 65-column 5, line 4:
`
`"determines whether the requested network information should have one or more keywords ... to
`
`invoke executable code"; column 6, lines 19-57: "web page may include special or designated
`
`Blue Coat Systems - Exhibit 1061 Page 13
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 13
`
`keywords which are designed to invoice, call or specify a network programming language ... an
`
`"applet" tag ... an object tag ... typically has required or desirable attributes"; column 9, lines 39-
`
`60: "context for any and all types of downloadable, executable code").
`
`Claim Rejections - 35 USC § 103
`
`14.
`
`The following is a quotation of pre-AlA 35 U.S.C. 103(a) which forms the basis for all
`
`obviousness rejections set forth in this Office action:
`
`(a) A patent may not be obtained though the invention is not identically disclosed or described as set forth in
`section 102 of this title, if the differences between the subject matter sought to be patented and the prior art are
`such that the subject matter as a whole would have been obvious at the time the invention was made to a person
`having ordinary skill in the art to which said subject matter pertains. Patentability shall not be negatived by the
`manner in which the invention was made.
`
`15.
`
`Claims 28-33 are rejected under pre-AlA 35 U.S.C. 103(a) as being unpatentable over Ji
`
`(U.S. Patent No. 5,983,348, filed 0911011997, published 11/0911999) in view of Golan (U.S.
`
`Patent No. 5,974,549, filed 03/2711997, published 10/2611999).
`
`-Regarding claims 28-33, the combination of Ji in view of Golan teaches each and every
`
`limitation of the claims (see the claim charts on pages 41-46 (claim 28) and 22-26 (claims 29-33)
`
`of the Request, which are hereby incorporated by reference). Regarding independent claim 28,
`
`the Examiner further notes that it would have been obvious to one of ordinary skill in the art at
`
`the time of the invention to modify the received single JAR archive file of Ji (Ji, column 6, lines
`
`38-51) to implement the security monitor that executes the downloaded software component
`
`(e.g., Java applet or ActiveX control) in a secure sandbox at the client location as taught in
`
`Golan, because Golan taught that said described features provided the benefit for securing
`
`untrusted and/or unknown software downloaded from an external source to a client (Golan,
`
`Blue Coat Systems - Exhibit 1061 Page 14
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 14
`
`column 1, lines 4-7: "securing untrusted and/or unknown software"; column 4, lines 58-61;
`
`column 5, lines 14-25: "secure sandbox enables untrusted ActiveX controls downloaded from the
`
`Internet to run within security limitations"). The Ji reference further buttresses the combination
`
`by recognizing that the location of the static scanning and run-time monitoring distribution
`
`would be obvious to one of ordinary skill in the art based on the well-known benefits of client-
`
`server processing load distribution (Ji, column 3, lines 1-15: "does not cause heavy load on the
`
`server. .. does not introduce significant performance overheard during the execution of the
`
`applets").
`
`Further regarding dependent claim 32, the Examiner notes that the Golan reference also
`
`specifically teaches wherein modifying interfaces includes modifying interfaces of an import
`
`address table ("IAT") of a native code executable downloadable (Golan, column 6, lines 13-30:
`
`"security monitor, in its initialization code, functions to modify the import tables of all the
`
`modules within the monitored application's address space"). As similarly discussed in Ji (Ji,
`
`column 7, lines 32-40: "extracts the class files from the JAR file .. .instruments the Java class
`
`files, e.g. by inserting monitoring instructions after each suspicious instruction"), Golan teaches
`
`that modifying the lA T provides the benefit of allowing the interception of a specific set of API
`
`calls (Golan, column 5, line 62-column 6, line 25: "can detect and prevent any attempt by the
`
`software component to breach security ... monitoring all calls issued by the
`
`downloadable ... component is permitted to execute freely while enforcing compliance with a
`
`predefined set of security rules"). Therefore, it would have been obvious to one of ordinary skill
`
`in the art at the time of the invention for the interfaces of the import table of Ji to have been
`
`modified as specifically taught in Golan, because Golan taught said modification provided the
`
`Blue Coat Systems - Exhibit 1061 Page 15
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 15
`
`benefit of being able to detect and prevent any attempt by the downloaded software component
`
`to breach security (Golan, column 5, line 62-column 6, line 25: "can detect and prevent any
`
`attempt by the software component to breach security").
`
`16.
`
`Claim 42 is rejected under pre-AlA 35 U.S.C. 103(a) as being unpatentable over Ji (U.S.
`
`Patent No. 5,983,348, filed 0911011997, published 11/0911999) in view of Liu (U.S. Patent No.
`
`6,058,482, filed 05/2211998, published 05/02/2000).
`
`-Regarding independent claim 42, Ji teaches a computer processor-based method
`
`compnsmg,
`
`receiving, by a computer, multiple instances of downloadable-information, wherein at
`
`least one of the multiple instances of downloadable-information includes non-executable
`
`information (see: Ji, column 4, line 66-column 5, lines 5: "proxy server 32 ... Downloaded non-
`
`applets are not scanned") and at least one of the multiple instances of downloadable-information
`
`includes executable information (see: Ji, column 3, lines 7-23: "a scanner. .. provides both static
`
`and dynamic scanning for application programs, e.g., Java applets or ActiveX
`
`controls ... conventionally received from .. .Internet or an Intranet at a conventional server"; column
`
`4, line 66-column 5, line 3: "Upon receipt of a particular Java applet");
`
`determining, by the computer, whether each of the multiple instances of downloadable-
`
`information includes executable code (see: Ji, column 3, lines 23-25 & 34-36: "applets are
`
`statically scanned at server by the scanner looking for particular instructions ... applet code is
`
`executed"; column 4, line 66-column 5, line 4: "receipt of a particular Java applet. .. scans the
`
`applet ... Downloaded non-applets are not scanned"; column 5, lines 15-27); and
`
`Blue Coat Systems - Exhibit 1061 Page 16
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 16
`
`based upon the determination, transmitting from the computer mobile protection code to
`
`at least one information-destination of each instance of downloadable-information that is
`
`determined to include executable information (see: Ji, column 3, lines 32-50; column 5, lines 1-
`
`27: "scans the applet and instruments it .. .If an instruction .. .is found"; column 6, lines 38-42:
`
`"The pre and post filter and monitoring package security policy functions) are combined with the
`
`instrumented applet code in a single JAR (Java archive) file format at the server 32, and
`
`downloaded to the ... client"; column 7, lines 41-49).
`
`Ji does not specifically teach a situation wherein one of the instances of downloadable-
`
`information includes a combination of non-executable and executable code portions. Ji further
`
`does not teach transmitting mobile protection code to at least one information-destination when
`
`the downloadable information is determined to include a combination of non-executable and
`
`executable code portions. Liu specifically teaches wherein downloadable-information (i.e., web
`
`pages) could include a combination of both non-executable and executable code portions (see:
`
`Liu, column 6, lines 3-62: "web page may be ... any another equivalent language ... which provide
`
`for downloadable and executable code ... typically contains text (formatted utilizing HTML),
`
`scripting, and network language keywords such as applet tags"). Liu further taught determining
`
`and transmitting mobile protection code to at least one information-destination when the
`
`downloadable information is determined to include a combination of non-executable and
`
`executable code portions (see: Liu, column 5, lines 2-16: "When the network information should
`
`have such keywords ... the remote server 110 then generates the requested network information
`
`with each included keyword having a distinctive reference ... and transmits the network
`
`information to the local end system"; column 8, lines 16-37: "When the requested web page does
`
`Blue Coat Systems - Exhibit 1061 Page 17
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 17
`
`require one or more applet tags ... generates an applet tag having a new, distinctive or unique
`
`class name as the reference attribute ... generates and provides the requested web page with all of
`
`its applet tags having their respective new, distinct (or unique) class names"; column 9, line 63-
`
`column 10, line 24; Fig. 3: 220 & 235). It would have been obvious to one of ordinary skill in
`
`the art at the time of the invention for the proxy server scanner system of Ji to have explicitly
`
`included the functionality of scanning downloadable information for executable code that
`
`includes a combination of non-executable and executable code portions as taught by the remote
`
`server of Liu, because Liu taught that said functionality provided the well-known benefits of
`
`ensuring that all such executable code, downloaded from a network, was properly identified and
`
`thus a user's network security is preserved (see: Liu, column 3, lines 55-61: "user's network
`
`security is preserved"; column 13, lines 1-28: "Numerous advantages"). Thus the system of Ji
`
`would have been provided the benefit of increased security by being able to actively scan more
`
`than just executable application programs (e.g., Java applets or ActiveX controls) for particular
`
`instructions which may be problematic for system security (see: Ji, column 3, lines 15-25).
`
`Claim Rejections - 35 USC§ 305
`
`17.
`
`The following is a quotation of the appropriate paragraph of 35 U.S .C. 305 that forms the
`
`basis for the rejections under this section made in this Office action:
`
`In any reexamination proceeding under this chapter, the patent owner will be permitted to
`propose any amendment to his patent and a new claim or claims thereto, in order to
`distinguish the invention as claimed from the prior art cited under the provisions of section
`301 of this title, or in response to a decision adverse to the patentability of a claim of a
`patent. No proposed amended or new claim enlarging the scope of a claim of the patent
`will be permitted in a reexamination proceeding under this chapter.
`
`Blue Coat Systems - Exhibit 1061 Page 18
`
`

`
`Application/Control Number: 90/013,016
`Art Unit: 3992
`
`Page 18
`
`18.
`
`Claims 43, 45, 46, 47, and 50-52 are rejected under 35 U.S.C. 305 as enlarging the scope
`
`of the claim(s) of the patent being reexamined. In 35 U.S.C. 305, it is stated that "[n]o proposed
`
`amended or new claim enlarging the scope of a claim of the patent will be permitted in a
`
`reexamination proceeding .... " A claim presented in a reexamination "enlarges the scope" of the
`
`patent claim(s) where the claim is broader than any claim of the patent. A claim is broader in
`
`scope than the original claims if it contains within its scope any c

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket