throbber
www.uspto.gov
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and TrademarkOffice
`Address; COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Virginia 22313-1450
`
`90/014,875
`
`10/07/2021
`
`10257319
`
`HOLA-005-US4-EPR
`
`3994
`
`MayPatents Ltd. c/o Dorit Shem-Tov
`P Oo B 7230
`Ramat-Gan, 5217102
`ISRAEL
`
`WORJLOH, JALATEE
`
`3992
`
`03/25/2022
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`PTOL-90A (Rev. 04/07)
`
`

`

`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`Commissionerfor Patents
`United States Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`www.uspto.gov
`
`DO NOT USE IN PALM PRINTER
`
`(THIRD PARTY REQUESTER'S CORRESPONDENCE ADDRESS)
`
`Charhon Callahan Robson & Garza, PLLC
`3333 Lee Parkway, Suite 460
`Dallas, TX 75219
`
`EX PARTE REEXAMINATION COMMUNICATION TRANSMITTAL FORM
`
`REEXAMINATION CONTROL NO. 90/014,875.
`
`PATENT UNDER REEXAMINATION 10257319.
`
`ART UNIT 3992.
`
`Enclosed is a copy of the latest communication from the United States Patent and Trademark
`Office in the aboveidentified exparte reexamination proceeding (87 CFR 1.550(f)).
`
`Wherethis copy is supplied after the reply by requester, 37 CFR 1.535, or the timefor filing a
`reply has passed, no submission on behalf of the evparfe reexamination requester will be
`acknowledged or considered (37 CFR 1.550(g)).
`
`PTOL-465 (Rev.07-04)
`
`

`

`Office Action in Ex Parte Reexamination
`
`Control No.
`90/014,875
`
`Patent Under Reexamination
`10257319
`
`Examiner
`JALATEE WORJLOH
`
`Art Unit
`3992
`
`AIA (FITF) Status
`No
`
`-- The MAILING DATEof this communication appears on the cover sheet with the correspondence address --
`
`a. L) Responsiveto the communication(s)filed on
`( A declaration(s)affidavit(s) under 37 CFR 1.130(b) was/werefiled on
`
`.
`
`b. (J This action is made FINAL.
`
`Cc.
`
`A statement under 37 CFR 1.530 has not been received from the patent owner.
`
`A shortenedstatutory period for responseto this action is set to expire 2 month(s) from the mailing date ofthis letter.
`Failure to respond within the period for response will result in termination of the proceeding and issuanceof an eygarfe reexamination
`certificate in accordance with this action. 37 CFR 1.550(d). EXTENSIONS OF TIME ARE GOVERNED BY 37 CFR 1.550(c).
`If the period for response specified aboveis less than thirty (30) days, a response within the statutory minimum ofthirty (30) days
`will be consideredtimely.
`
`Part |©THE FOLLOWING ATTACHMENT(S) ARE PARTOF THIS ACTION:
`1. (J Notice of References Cited by Examiner, PTO-892.
`3.{1
`Interview Summary, PTO-474.
`2.
`Information Disclosure Statement, PTO/SB/08.
`4.4
`.
`
`Part Il
`
`ta.
`
`1b.
`
`2.
`
`SUMMARY OF ACTION
`
`Claims 1-2,12,14-15,17-19,21-22 and 24-29 are subject to reexamination.
`
`Claims 3-11,13,16,20 and 23 are not subject to reexamination.
`
`Claims ___ have been canceledin the present reexamination proceeding.
`
`10. [) Other: cc: Requester (if third
`
`OOO08008& Acknowledgment is made ofthe priority claim under 35 U.S.C. 119(a)-(d) or (f).
`
`Claims __ are patentable and/or confirmed.
`
`Claims 1-2,12,14-15,17-19,21-22 and 24-29 are rejected.
`
`Claims _ are objectedto.
`
`The drawings, filedon___—_s are acceptable.
`The proposed drawing correction, filed on
`
`has been (7a)
`
`( approved (7b)
`
`() disapproved.
`
`a) CJ All
`
`b)
`
`() Some* c)
`
`(CJNone
`
`of the certified copies have
`
`1 ©) been received.
`
`2 ( not been received.
`
`3 ( been filed in Application No.
`
`4 (] been filed in reexamination Control No.
`
`5 (] been received by the International Bureau in PCT application No.
`
`* See the attached detailed Office action for a list of the certified copies not received.
`
`9.
`
`(J Since the proceeding appears to be in condition for issuance of an exparte reexamination certificate except for formal
`matters, prosecution as to the merits is closed in accordancewith the practice under Exparfe Quayle, 1935 C.D.
`11, 453 O.G. 213.
`
`U.S. Patent and Trademark Office
`PTOL-466 (Rev. 08-13)
`
`Office Action in Ex Parte Reexamination
`
`PartofPaperNo.
`
`20220303
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 2
`
`NON-FINAL ACTION
`
`Introduction
`
`This is the ex parte reexamination of claims 1, 2, 12, 14, 15, 17-19, 21, 22, and 24-29 of
`
`U.S. Patent No. 10,257,319 to Shribmanet al. (“Shribman”) for which a substantial new question
`
`of patentability has been deemedto exist.
`
`Notice ofPre-AIA or AIA Status
`
`The present application is being examined underthe pre-AIA first to invent provisions.
`
`References cited in Request
`
`e Reiter, M. & Rubin A., Crowds: Anonymityfor Web Transactions, ACM Transactions on
`
`Information and System Security, Vol. 1, No. 1, at pp. 66-2 (Nov. 1998) (“Crowds”);
`
`e
`
`Fielding, R. et al., Hypertext Transfer Protocol -HTTP 1.1., RFC 2616, IETF (June 1999)
`
`(“RFC 2616);
`
`e U.S. Patent No. 6,795,848 to Border et al. (“Border”); and
`
`e Rennhard, M. MorphMix-A Peer-to-Peer-based System for Anonymous Internet Access,
`
`Doctoral Thesis (2004) (“MorphMix’).
`
`e Declaration of Dr. Michael J. Freedman
`
`Other
`
`No Patent Owner statement wasfiled.
`
`Patent Owner Statement
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 3
`
`Information Disclosure Statement
`
`Regarding IDS submissions MPEP 2256 recites the following: “Where patents,
`
`publications, and other such items of information are submitted by a party (patent owner or
`
`requester) in compliance with the requirementsofthe rules, the requisite degree of consideration
`
`to be given to such information will be normally limited by the degree to which the party filing
`
`the information citation has explained the content and relevance of the
`
`information." Accordingly, the IDS submissions have been considered by the Examiner only
`
`with the scope required by MPEP 2256.
`
`Claim Rejections - 35 USC § 102
`
`The following is a quotation of the appropriate paragraphs of pre-AIA 35 U.S.C. 102 that
`
`form the basis for the rejections underthis section madein this Office action:
`
`A personshall be entitled to a patent unless —
`
`(a) the invention was knownorused by others in this country, or patented or described in a printed
`publication in this or a foreign country, before the invention thereof by the applicant for a patent.
`
`Claims 1, 12, 14, 17, 21, 22, 24, 25, 26, 27-29 are rejected under pre-AIA 35 U.S.C.
`
`102(a) as being anticipated by Border.
`
`1. A methodfor use with a first client device, for use with a first server that comprises a
`
`webserver that is a Hypertext Transfer Protocol (HTTP) server that responds to HTTP
`
`requests, the first server stores a first content identified by a first content identifier, and for
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 4
`
`use with a second server, the methodbythefirst client device comprising:
`
`
`
`1. Communication system 101 contains the following components: user station 101
`Fig.
`downstream proxy server 105, upstream proxy server 107. and web server 100. User station 101
`is further comprised of web browser 103, Additionally. Border discloses that downstream proxy
`server 105 and upstream proxy server 107 contain caches 115 and 117, respectively. Further,
`downstream proxy server 105 and upstream proxy server 107 communicate over network 111 via
`a persisten TCP connection. Border discloses that user stations 101 use communication system
`100 to request and receive web content stored on web servers 109, with proxy servers 105 and 107
`acting as intermediary devices between one or more user stations SOI and many web servers 109.
`Col. 1, Il. 34-35 and col. 4, Il. 29-31.
`
`Proxy servers 105 and 107 are Hypertext Transfer Protocol (HTTP) proxy servers with HTTP
`caches 115 and 117, respectively. Col. 4, Il. 7-11.
`
`FRE
`
`Fig. 2.
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 5
`
`Fig. 2. To request web contentat a particular URL, browser 103 ofuser station 101 sends an HTTP
`GETrequest containing the URL (which identifies the requested content) to downstream proxy
`server 105. Col. 5, ll. 14-17. After receiving the request, downstream server 105 checksits cache
`115 to determine if it contains a valid copy of the requested content. If downstream proxy server
`105 does not have a valid copy of the content stored in its cache, downstream server 105 sends an
`HTTP GETrequest containing the URL to upstream proxy server 107. If downstream proxy server
`105 does have a copy of the content stored in its cache, butit is uncertain whether that cached copy
`is still valid, downstream server 105 sends a ‘‘conditional" HTTP IF MODIFIED SINCE GET
`request containing the URL to upstream proxy server 107 (which based on the upstream proxy
`server's later response, servesto either revalidate the downstream proxy server's cached content or
`causes the downstream proxy server to receive a new version of the cached contentif the content
`has subsequently changed since the downstream proxy server hadlast received it). Col. 6, 1. 68-
`col.7, 1. 19.
`
`Upon receiving an HTTP GET request (or IE MODIFIED SINCE GETrequest), upstream proxy
`server 107 likewise checksits cache for a valid copy of the requested content. If upstream proxy
`server 107 does not have a valid copy ofthe content, it sends an HTTP GETrequest to web server
`100 Webserver 109 then transmits the requested content at the URL to upstream server 107, which
`stores the content in its cache (if it is cacheable. Alternatively, if upstream proxy server 107 does
`have a copy of the content stored in its cache, but it is uncertain whether (hat cached copyisstill
`valid, the upstream proxy server 107 sends a “conditional" HTTP IF MODIFIED SINCE (SET
`request containing the URL to the Webserver 109. which either responds (hat the cached content
`is still valid or with a new version ofthe contentif the content has subsequently changed since the
`downstream proxyserver had last received it. Col. 6, 1. 68-col. 7, 1. 19. Upstream server 117 then
`forwards the content (or revalidation information) to downstream server 105. which stores the
`contentin its cache (if it is cacheable), and then forwards the content to web browser103, In steps
`3 through 7 of Figure 2. communication, system 100 prefetches embedded objects in the requested
`content.
`
`After receiving a user request from browser 103. downstream proxy 105 forwards the web request
`to upstream server 107, which forwards the web request to web server 109. Therefore, upstream
`server 107 is the "first client device” that serves as an intermediary between downstream server
`105 and webserver 109.
`
`Downstream proxy server 105 is the second server.
`
`receiving, from the secondserver, thefirst content identifier;
`
`As shownin Figure 2, Border discloses that web browser 103 sends a GET request containing the
`URL for the content “HTML”’ to downstream server 105, and downstream server 105 then sends
`a GET request containing the URL “HTML"to upstream server 107. Col. 5, ll. 14-24, Fig. 2.
`
`The first client device ("upstream server 107*') receiving, from the second server ("downstream
`server 105"). the first content identifier (“URL HTML"):
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 6
`
`sending, to the first server over the Internet, a Hypertext Transfer Protocol (HTTP)
`
`request that comprises the first content identifier;
`
`Webserver 109is the “first server.” Border teaches that upstream server 107 sends a GET
`request for the URL “HTML”to webserver 109. Col. 5, ll. 33-35, Figure 2.
`
`In Fig. 2, the first client device ("upstream server 107“) sending,to the first server (“web server
`109”) over (the Internet a Hypertext Transfer Protocol (HTTP) GET request that comprises the
`first content identifier “URL HTML’):
`
`receiving, the first content from the first server over the Internet in response to the sending
`
`of the first content identifier;
`
`Borderthen teachesthat, in response to upstream server 107 issuing the GET URL HTMLrequest
`the web server 109 for the HTMLpage...the web server 109 transmits the requested HTML page
`to the upstream server. Col. 5, Il. 34-37. Thus, Border teachesthefirst client device receiving the
`first content (the HTML page at the URL “HTML") front the first server in response to sending
`the first content identifier (the URL “HTML").
`
`and sending,the first content by thefirst client device to the second server, in responseto
`
`the receiving of the first content identifier.
`
`After receiving the first content (‘the HTML page at the URL “'HTML'"") from the first server
`“web server 109”), Border discloses that thefirst client device (“upstream server 107”) “forwards
`the HTMLpageto the downstream server 105. Col. 5, Il. 38-40.
`
`The secondserver (“downstream server 105”) then forwardsthe first content to web browser103.
`In response to web browser 103's original GET request, in accordance with the secondserver's role
`is a “server.” Col. 5, ll. 38-40.
`
`12. The method according to claim 1, further comprising storing, by the first client device
`
`in response to the receiving from thefirst server, the first content, and wherein the sending,
`
`of the HTTP request is in response to the receiving of the first content identifier.
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 7
`
`Border discloses that the first client device (upstream server 107) sends the GET requestto the
`first server (web server 109) after it receives the first content identifier (URL “HTML”) from the
`second server (downstream server 105). Border further discloses that downstream proxy server
`105 and upstream proxy server 107 contain caches 115 and 117, respectively. Additionally,
`Border teaches that the caches are “HTTP caches.” Exhibit D at 4:8-11. In response to receiving
`the first content (the URL “HTML?”) from the first server (web server 109), the first client
`device (upstream server 107) stores the first content (the HTMLpage at the URL “HTML’)in
`HTTPcache 117. Col. 5, Il. 36-38.
`
`14. The method according to claim 1, further comprising determining, by thefirst client
`
`device, that the received first content, is valid.
`
`Borderteaches that the caches are “HTTP caches.” Col. 4, ll. 8-1. In response to response to
`receiving the first content (the URL “HTML") from thefirst server (web server 109), the first
`client device (upstream server 107) stores the first content (the HTMLpageat the URL
`“HTML?”) in HTTP cache 117. Col. 5, ll. 36-38. Border discloses that upstream server 107 stores
`the received first content in HTTP cache 117 to provide in response to future requests; for the
`same content, in the event upstream server 107 receives a subsequent request for the received
`first content. Border discloses that upstream server 107 may determine whether such contentis
`still valid by sending a conditional HTTP GETrequest using IF MODIFIED SINCEheaders to
`web server 109. Col. 7, ll. 5-10, col. 9, Il. 14-15. If there has been no changeto the receivedfirst
`comentsince the time specified in the IF MODIFIED SINCEheader, then the contentis still
`valid and webserver 109 returns a NO CHANGEresponse. Col. 7, Il. 5-10. Border discloses the
`servers with caches perform this action “to avoid stale information [and] determine whether the
`information stored at URL HTML,has been updated since the time it was last requested.” Col. 6,
`ll. 55-57.
`
`17. The method according to claim 1, further comprising periodically communicating
`
`between the second server andthefirst client device.
`
`See claim 1 above. Also, each of the “second server‘and “first client device” is a HTTP caching
`proxy, and they comunicate via the HTTP protocol for the purpose of sending web requests. Fig.
`1, 2. A POSA would understand that downstream server /05 and upstream server 107
`communicate via HTTP.
`
`Border discloses downstream server 105 and upstream server 107 communicating via HTTP over
`a persistent TCP connection. This persistent TCP connection is labeled P-TCP in Figures 1 and 3
`of Border.
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 8
`
`21. The method according to claim 1, wherein the first or second server is a Transmission
`
`Control Protocol/Internet Protocol (TCP/IP) server that communicates over the Internet
`
`based on, or according to, using TCP/IP protocol or connection, and wherein thefirst client
`
`device is a Transmission Control Protocol/Internet Protocol (TCP/IP) client that
`
`communicates respectively with the first or second server over the Internet based on, or
`
`according to, TCP/IP protocol or connection.
`
`Borderdiscloses that downstream server 105 and upstream server 107 maintain and communicate
`over a persistent TCP connection to carry HTTPtransactions, which is shown in Figure 1 by the
`connection labeled “P-TCP”’ that is made over network 111. Fig. 1,4:11 - 15, 7:50-52. Border also
`discloses that TCP communications of communication system 100 are made over IP. 7:52-35.
`Thus, at least the second server (downstream server 105) is a TCP/IP server that communicates
`over the Internet using the TCP/IP protocol. Further, the first client device (upstream server 10“)
`is a TCPTPclient that communicates over the Internet with the second server using the TCP/IP
`protocol.
`
`24. The method accordingto claim 1, further comprising establishing, by thefirst client
`
`device, a Transmission Control Protocol (TCP) connection with the second server using
`
`TCP/IP protocol.
`
`See claims land 21 above. Borderdisclosesa first client device (upstream server 105) and second
`server (downstream server 107) in communication with one another. Border also discloses that
`they connect using TCP/IP connections. Borde therefore discloses the first client device
`establishing a TCP connection with the second server using the TCP/IP protocol.
`
`25. The method according to claim 1, wherein the first or second server is a Transmission
`
`Control Protocol/Internet Protocol (TCP/IP) server, wherein thefirst client device
`
`communicates over the Internet with the first or second server based on, or according to,
`
`using TCP/IP protocol or connection.
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 9
`
`See claims | and 24 above. Border disclosesa first client device (upstream server 105) an second
`server (downstream server 107) in communication with one another. Border also discloses that
`they connect using TCP/IP connections. Border therefore discloses the first client device
`establishing a TCP connection with the second server and the TCP/IP protocol.
`
`26. The method accordingto claim 1, further comprising storing, operating, or using, a
`
`client operating system.
`
`Border discloses the use of a client operating system. Border discloses that “communication
`system 100 includes a user station 101 that utilizes a standard web browser 103 (e.g.. Microsoft
`Internet Explorer, Netscape Navigator). In this example, the user station 101 is a personal computer
`(PC); however, any computing platform may be utilized, such as a workstation, web enabledset-
`top boxes, web applications, etc.” Col. 3, ll. 55-61, Further, “FIG. 6 is a diagram of a conventional
`communication system for providing retrieval of web content by a personal computer (PC), PC is
`loaded with a web browser 603 to access the web pages that are resident on web server 605;
`collectively the web pages and webserver 605 denote a “website.” 1:43-48. “FIG. 7 is a diagram
`of a computer system that can be configured as a proxyserver, in accordance with an embodiment
`of the present invention...computer system 701 also includes a main memory 707, such asa random
`access memory (RAM) or other dynamic storage device, coupled to bus 703 for storing
`information and instructions to be executed by processor 705,” 10:6-24, FIG 7.
`
`27. The method according to claim 1, wherein the steps are sequentially executed.
`
`Border. Figure 2, Steps 1 and 2.
`
`Claims 28 and 29 are rejected on the samerationale as claim 1 above.
`
`Claim Rejections - 35 USC § 103
`
`The following is a quotation of pre-AIA 35 U.S.C. 103(a) which forms the basis forall
`
`obviousnessrejections set forth in this Office action:
`
`(a) A patent may not be obtained thoughthe inventionis not identically disclosed or described as set
`forth in section 102, if the differences between the subject matter sought to be patented and the prior art
`are such that the subject matter as a whole would have been obviousat the time the invention was made
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 10
`
`to a person having ordinary skill in the art to which said subject matter pertains. Patentability shall not
`be negatived by the manner in which the invention was made.
`
`Claims 2 and 22 are rejected under pre-AIA 35 U.S.C. 103(a) as being unpatentable over
`
`Borderas applied to claim 1 above, and further in view of Crowds.
`
`2. The method according to claim 1, wherein thefirst client device is identified by a Media
`
`Access Control (MAC) addressor a hostname, and wherein the method further comprising
`
`sending, by thefirst client device, during, as part of, or in response to, a start-up of the first
`
`client device, a first message to the second server, and wherein the first messages comprises
`
`the first IP address, the MAC address, or the hostname.
`
`Claim2initially recites that “the first client device is identified by a Media Access Control (MAC)
`address or a hostname.” Border further discloses that upstream server 107 operates on computer
`system 701,which is comprised of communication interface 719, which may be a network interface
`card. Col. 4, Il. 40-44, col. 11, ll. 24-38. A person of ordinary skill in the art(POSA) would readily
`understand that a network interface card or other communication interface 719 and therefore the
`computer system 701 comprising communication interface 719 would be identified by a MAC
`address as required by IEEE 802. Further, a POSA would havereadily understood that upstream
`server 107 that serves as a web proxy and communicates using the TCP/IP protocol, see, e.g.., col.
`4, 11.11-15 and col. 7, Il. 32-38, would also be identified by an IP address.
`
`Also, Crowds discloses the method of claim 2:
`Claim2initially recites that "the first client device is identified by a Media Access Control (MAC)
`address or a hostname.” The “first client device” is disclosed in Crowdsas a jondo. Crowdsfurther
`discloses that a jondo has a host name,stating, “The user selects this jondo as her web proxy by
`specifying its host name and port numberin her web browseras the proxyforall services” p, 73;
`Fig. 6 (identifying host names of multiple jondos). Crowds therefore expressly discloses that the
`“first client device” is identified by a hostname.
`
`Claim 2 further requires that "during, as part of, or in response to. a start-up of the first client
`device”the first client device sends a "first message" to the second server comprising "the first IP
`address." MAC address, or the hostname. Crowds discloses a setup phase for new jondos. such
`that other jondos learn the IP address, port number, and account nameof the new jondos, and these
`other jondos use this information to select a jondo as a proxy. Crowdsdiscloses that tins can be
`done through a server, to which the jondo sendsits information on startup: "When the jondo is
`started, it contacts a server called the blender to request admittance to the crowd. If admitted, the
`blender reports to this jondo the current membership of the crowd and information that enables
`this jondo to participate in the crowd." p. 73 “When the userstarts a jondo,... the blender adds the
`new jondo(i.e.. its IP address, port number, and account name) toits list of members, and reports
`this list back to the jondo." p. 87. Crowds also discloses that a jondo can communicate directly
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 11
`
`with other jondos during startup to share information, particularly in a more secure manner;
`"yondos will establish shared keys using Diffie-Hellman key exchange [Diffie and Heilman 1976],
`where the blenderserves only to distribute the Diffie-Heilman public keys of crowd members”pp.
`87-88. A POSA would understand that Diffie-Hellman is a cryptographic key-exchangeprotocol,
`also used in the SSL/TLS protocol employed by secure HTTP (HTTPS), whereby two nodes
`directly communicate to establish a shared cryptographic key not known by anybodyelse. The
`messages sent as part of that key exchange would include the IP address of both sender and
`recipient, and thus the other jondo would receive a message from the first jondo, during the first
`jondo’s initialization period, that includesthe first jondo’s IP address and port number.
`
`22. The method according to claim 1, wherein thefirst client device communicates over the
`
`Internet based on, or according to, one out of UDP, DNS, TCP, FTP, POP#, SMTP, or SQL
`
`standards.
`
`Crowds discloses the first client device communication overthe Internet based on at least TCP and
`FTP. The “first client device" of Crowds is a jondo operating on a user's computer. Because
`Crowds' disclosure of TCP/IP is in reference to “the TCP/IP connection to the jondo." Crowds
`discloses that the first client device communicates over the Internet based on TCP.
`
`In addition, Crowds discloses the use of FTP. Crowdsstates that “any request coming from the
`browseris sent directly to the jondo" and there includes a footnote stating that “the services that
`must be proxied include Gopher, HTTP, and SSI. " p.73 n.l. Further, FTP is supported to further
`the goal of anonymity, because otherwise “FTP requests triggered by downloading a w eb page
`would not go through the crowd, and would thus reveal the user's IP address to the end server. p
`73 n. 1. Crowdstherefore also disclosesthat(the first client device communicatesoverthe Internet
`based on FTP.
`
`Claims 15 and 18 are rejected under pre-AIA 35 U.S.C. 103(a) as being unpatentable
`
`over Border as applied to claim 14 above, and further in view of RF 2616.
`
`15. The method according to claim 14, wherein the determining is based on the received
`
`HTTPheaderaccordingto, or based on, IETF RFC 2616.
`
`HTTP(as described in RFC 2616) includes a mechanism for ensuring to contentis valid in terms
`of ensuring to that the content is consistent with content on a web server. Border discloses HTTP
`and therefore discloses this claim. Border discloses, upstream server 10? usine HTTP headers to
`determine whether the content stored in its cacheis stale.
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 12
`
`A POSAwould havebeen well aware in 2009 that RFC 2616 specifies a caching proxy's(e.g.
`upstream server 107) use of HTTP headers received from an origin server (e.g. web server 109)
`to determine the validity of cached content, for example, an origin server may include the
`Expires header in response to an HTTP GETrequest, which “gives the date/time alter which, the
`responseis considered stale” 1.e. not valid. RFC 2616 § 14,2 I. Alternatively, an origin server
`may include the Cache-Control header with a max-age directive in response to a GET request,
`which specifies the amount of time after which the response is considered stale, RFC 2616 8§ 13
`2,4, 14,9, 14.9,3, The caching proxy stores this header information received from the origin
`server, and uses them to determine whether the stored cornentis valid.
`
`Further, even after the expire time or max-age period of a piece of cached content, Border
`discloses, RFC 2616 § 13 further details, the use of conditional HTTP GET requests to validate
`content stored in cache 117 on the upstream server 107. Col. 5, Il. 25-47, Col. 7, IL.5-19; RFC
`2616 §13.
`
`Borderdiscloses the use of HTTP and TCP, whichin turn disclose claim 15, For the same reasons,
`claim 15 at a minimum would have been obvious to a POSA in view of the disclosure of Border
`and the general knowledge of a POSA, and/or with the disclosure of RFC 2616 (regarding
`HTTP/1,1) which similarly reflects Internet communication details with which a POSA would
`have been familiar, and with the disclosure of the TCP/IP protocol.
`
`Asdiscussed in RFC 2616, one of the HTTP/1.1 headers is a “Keep-Alive” header. See RFC 2616
`§ 8.1.3 (Keep-Alive header implemented by many HTTP/1.0clients”), § 13.5.1 (referring to
`Keep-Alive header), § 19.6 (referring to Keep-Alive version of persistent connections). As the
`name suggests, a “Keep-Alive” message in HTTP is a mechanism to allow two communicating
`devices to ensure that their connection remains “alive’' by sending periodic communications, The
`usage of such Keep-Alive” messages in HTTP headersis old and well-known.
`
`18. The method according to claim 17, wherein the periodically communicating comprises
`
`exchanging ‘keep alive’ messages.
`
`Periodically communicating is included the exchange of "keep alive” messages, which are
`discussed in RFC 2616 (e.g., §§8.1.3, 13.5,1, 19,6) and would have been well known to a POSA.
`The usage of such "‘keep alive" messages in the context of claim 17 would have been disclosed
`to a POSA in view of the disclosure of Border and the general knowledge of a POSA,and/or with
`the disclosure of RFC 2616 (regarding HTTP/1.1) which Similarly reflects
`Internet
`communication details with which a POSA would have been familiar.
`
`Asdiscussed in RFC 2616, one of the HTTP/1.1 headers is a “Keep-Alive” header. See RFC 2616
`§ 8.1.3 (Keep-Alive header implemented by many HTTP/1.0clients”), § 13.5.1 (referring to
`Keep-Alive header), § 19.6 (referring to Keep-Alive version of persistent connections). As the
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 13
`
`name suggests, a “Keep-Alive” message in HTTP is a mechanism to allow two communicating
`devices to ensure that their connection remains “alive’' by sending periodic communications. The
`usage of such Keep-Alive” messages in HTTP headersis old and well-known.
`
`Claim 19 is rejected under pre-AIA 35 U.S.C. 103(a) as being unpatentable over Border
`
`as applied to claim 1 above, and further in view of MorphMix.
`
`19. The method according to claim 1, for use with a software application that includes
`
`computerinstructions that, when executed by a computer processor, cause the processorto
`
`perform the sending of the Hypertext Transfer Protocol (HTTP) request, the receiving and
`
`storing ofthe first content, the receiving of the first content identifier, and the sending of
`
`the part of, or the whole of, the stored first content, the methodis further preceded by:
`
`downloading, by thefirst client device from the Internet, the software application; and
`
`installing, by the first client device, the downloaded software application.
`
`MorphMixdiscloses that consumer computers can be the “first client device" of Claim 19: “any
`computer with a dial-up connection capable of running a modern graphical web browser should
`be sufficient " p. 96. The “MorphMix application" is disclosed as being available to “[a]nybody
`who has access to a computer that is connected to the Internet .
`.
`. after having installed the
`MorphMix software” pp. 96, 98 (emphasis added). “The MorphMix prototypeis free software and
`is available with full source code... at the MorphMix project web page"(citing Internet website
`)http:/www.tik ee.ethz.ch/-morphmix). P. 286 That same webpage “also contains information
`about how to configure and run the prototype.” Exhibit E at 286 It is the downloaded (from the
`Internet) and installed MorphMix software application that instructs the processorofthefirst client
`device to perform the steps.
`
`At the time of the invention, it would have been obvious to one of ordinary skill in the art
`
`to modify Border by including the features of MorphMix. Applying the known technique of
`
`MorphMixto Border would have been recognized by those of ordinary skill in the art as
`
`resulting in an improved system that would haveyielded predictable results.
`
`

`

`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 14
`
`Extension of Time
`
`Extensions of time under 37 CFR 1.136(a) will not be permitted in these proceedings
`
`because the provisions of 37 CFR 1.136 apply only to "an applicant" and not to parties in a
`
`reexamination proceeding. Additionally, 35 U.S.C. 305 requires that reexamination proceedings
`
`"will be conducted with special dispatch" (37 CFR 1.550(a)). Extension of time in ex parte
`
`reexamination proceedings are provided for in 37 CFR 1.550(c).
`
`Amendment in Reexamination Proceedings
`
`Patent owneris notified that any proposed amendmentto the specification and/or claims
`
`in this reexamination proceeding must comply with 37 CFR 1.530(d)-(j), must be formally
`
`presented pursuant to 37 CFR 1.52(a) and (b), and must contain any fees required by 37 CFR
`
`1.20(c).
`
`Service of Papers
`
`After the filing of a request for reexamination by a third party requester, any document
`
`filed by either the patent owneror the third party requester must be served on the other party
`
`(or parities wher

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket