`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and TrademarkOffice
`Address; COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Virginia 22313-1450
`
`90/014,875
`
`10/07/2021
`
`10257319
`
`HOLA-005-US4-EPR
`
`3994
`
`MayPatents Ltd. c/o Dorit Shem-Tov
`P Oo B 7230
`Ramat-Gan, 5217102
`ISRAEL
`
`WORJLOH, JALATEE
`
`3992
`
`03/25/2022
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`PTOL-90A (Rev. 04/07)
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`Commissionerfor Patents
`United States Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`www.uspto.gov
`
`DO NOT USE IN PALM PRINTER
`
`(THIRD PARTY REQUESTER'S CORRESPONDENCE ADDRESS)
`
`Charhon Callahan Robson & Garza, PLLC
`3333 Lee Parkway, Suite 460
`Dallas, TX 75219
`
`EX PARTE REEXAMINATION COMMUNICATION TRANSMITTAL FORM
`
`REEXAMINATION CONTROL NO. 90/014,875.
`
`PATENT UNDER REEXAMINATION 10257319.
`
`ART UNIT 3992.
`
`Enclosed is a copy of the latest communication from the United States Patent and Trademark
`Office in the aboveidentified exparte reexamination proceeding (87 CFR 1.550(f)).
`
`Wherethis copy is supplied after the reply by requester, 37 CFR 1.535, or the timefor filing a
`reply has passed, no submission on behalf of the evparfe reexamination requester will be
`acknowledged or considered (37 CFR 1.550(g)).
`
`PTOL-465 (Rev.07-04)
`
`
`
`Office Action in Ex Parte Reexamination
`
`Control No.
`90/014,875
`
`Patent Under Reexamination
`10257319
`
`Examiner
`JALATEE WORJLOH
`
`Art Unit
`3992
`
`AIA (FITF) Status
`No
`
`-- The MAILING DATEof this communication appears on the cover sheet with the correspondence address --
`
`a. L) Responsiveto the communication(s)filed on
`( A declaration(s)affidavit(s) under 37 CFR 1.130(b) was/werefiled on
`
`.
`
`b. (J This action is made FINAL.
`
`Cc.
`
`A statement under 37 CFR 1.530 has not been received from the patent owner.
`
`A shortenedstatutory period for responseto this action is set to expire 2 month(s) from the mailing date ofthis letter.
`Failure to respond within the period for response will result in termination of the proceeding and issuanceof an eygarfe reexamination
`certificate in accordance with this action. 37 CFR 1.550(d). EXTENSIONS OF TIME ARE GOVERNED BY 37 CFR 1.550(c).
`If the period for response specified aboveis less than thirty (30) days, a response within the statutory minimum ofthirty (30) days
`will be consideredtimely.
`
`Part |©THE FOLLOWING ATTACHMENT(S) ARE PARTOF THIS ACTION:
`1. (J Notice of References Cited by Examiner, PTO-892.
`3.{1
`Interview Summary, PTO-474.
`2.
`Information Disclosure Statement, PTO/SB/08.
`4.4
`.
`
`Part Il
`
`ta.
`
`1b.
`
`2.
`
`SUMMARY OF ACTION
`
`Claims 1-2,12,14-15,17-19,21-22 and 24-29 are subject to reexamination.
`
`Claims 3-11,13,16,20 and 23 are not subject to reexamination.
`
`Claims ___ have been canceledin the present reexamination proceeding.
`
`10. [) Other: cc: Requester (if third
`
`OOO08008& Acknowledgment is made ofthe priority claim under 35 U.S.C. 119(a)-(d) or (f).
`
`Claims __ are patentable and/or confirmed.
`
`Claims 1-2,12,14-15,17-19,21-22 and 24-29 are rejected.
`
`Claims _ are objectedto.
`
`The drawings, filedon___—_s are acceptable.
`The proposed drawing correction, filed on
`
`has been (7a)
`
`( approved (7b)
`
`() disapproved.
`
`a) CJ All
`
`b)
`
`() Some* c)
`
`(CJNone
`
`of the certified copies have
`
`1 ©) been received.
`
`2 ( not been received.
`
`3 ( been filed in Application No.
`
`4 (] been filed in reexamination Control No.
`
`5 (] been received by the International Bureau in PCT application No.
`
`* See the attached detailed Office action for a list of the certified copies not received.
`
`9.
`
`(J Since the proceeding appears to be in condition for issuance of an exparte reexamination certificate except for formal
`matters, prosecution as to the merits is closed in accordancewith the practice under Exparfe Quayle, 1935 C.D.
`11, 453 O.G. 213.
`
`U.S. Patent and Trademark Office
`PTOL-466 (Rev. 08-13)
`
`Office Action in Ex Parte Reexamination
`
`PartofPaperNo.
`
`20220303
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 2
`
`NON-FINAL ACTION
`
`Introduction
`
`This is the ex parte reexamination of claims 1, 2, 12, 14, 15, 17-19, 21, 22, and 24-29 of
`
`U.S. Patent No. 10,257,319 to Shribmanet al. (“Shribman”) for which a substantial new question
`
`of patentability has been deemedto exist.
`
`Notice ofPre-AIA or AIA Status
`
`The present application is being examined underthe pre-AIA first to invent provisions.
`
`References cited in Request
`
`e Reiter, M. & Rubin A., Crowds: Anonymityfor Web Transactions, ACM Transactions on
`
`Information and System Security, Vol. 1, No. 1, at pp. 66-2 (Nov. 1998) (“Crowds”);
`
`e
`
`Fielding, R. et al., Hypertext Transfer Protocol -HTTP 1.1., RFC 2616, IETF (June 1999)
`
`(“RFC 2616);
`
`e U.S. Patent No. 6,795,848 to Border et al. (“Border”); and
`
`e Rennhard, M. MorphMix-A Peer-to-Peer-based System for Anonymous Internet Access,
`
`Doctoral Thesis (2004) (“MorphMix’).
`
`e Declaration of Dr. Michael J. Freedman
`
`Other
`
`No Patent Owner statement wasfiled.
`
`Patent Owner Statement
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 3
`
`Information Disclosure Statement
`
`Regarding IDS submissions MPEP 2256 recites the following: “Where patents,
`
`publications, and other such items of information are submitted by a party (patent owner or
`
`requester) in compliance with the requirementsofthe rules, the requisite degree of consideration
`
`to be given to such information will be normally limited by the degree to which the party filing
`
`the information citation has explained the content and relevance of the
`
`information." Accordingly, the IDS submissions have been considered by the Examiner only
`
`with the scope required by MPEP 2256.
`
`Claim Rejections - 35 USC § 102
`
`The following is a quotation of the appropriate paragraphs of pre-AIA 35 U.S.C. 102 that
`
`form the basis for the rejections underthis section madein this Office action:
`
`A personshall be entitled to a patent unless —
`
`(a) the invention was knownorused by others in this country, or patented or described in a printed
`publication in this or a foreign country, before the invention thereof by the applicant for a patent.
`
`Claims 1, 12, 14, 17, 21, 22, 24, 25, 26, 27-29 are rejected under pre-AIA 35 U.S.C.
`
`102(a) as being anticipated by Border.
`
`1. A methodfor use with a first client device, for use with a first server that comprises a
`
`webserver that is a Hypertext Transfer Protocol (HTTP) server that responds to HTTP
`
`requests, the first server stores a first content identified by a first content identifier, and for
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 4
`
`use with a second server, the methodbythefirst client device comprising:
`
`
`
`1. Communication system 101 contains the following components: user station 101
`Fig.
`downstream proxy server 105, upstream proxy server 107. and web server 100. User station 101
`is further comprised of web browser 103, Additionally. Border discloses that downstream proxy
`server 105 and upstream proxy server 107 contain caches 115 and 117, respectively. Further,
`downstream proxy server 105 and upstream proxy server 107 communicate over network 111 via
`a persisten TCP connection. Border discloses that user stations 101 use communication system
`100 to request and receive web content stored on web servers 109, with proxy servers 105 and 107
`acting as intermediary devices between one or more user stations SOI and many web servers 109.
`Col. 1, Il. 34-35 and col. 4, Il. 29-31.
`
`Proxy servers 105 and 107 are Hypertext Transfer Protocol (HTTP) proxy servers with HTTP
`caches 115 and 117, respectively. Col. 4, Il. 7-11.
`
`FRE
`
`Fig. 2.
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 5
`
`Fig. 2. To request web contentat a particular URL, browser 103 ofuser station 101 sends an HTTP
`GETrequest containing the URL (which identifies the requested content) to downstream proxy
`server 105. Col. 5, ll. 14-17. After receiving the request, downstream server 105 checksits cache
`115 to determine if it contains a valid copy of the requested content. If downstream proxy server
`105 does not have a valid copy of the content stored in its cache, downstream server 105 sends an
`HTTP GETrequest containing the URL to upstream proxy server 107. If downstream proxy server
`105 does have a copy of the content stored in its cache, butit is uncertain whether that cached copy
`is still valid, downstream server 105 sends a ‘‘conditional" HTTP IF MODIFIED SINCE GET
`request containing the URL to upstream proxy server 107 (which based on the upstream proxy
`server's later response, servesto either revalidate the downstream proxy server's cached content or
`causes the downstream proxy server to receive a new version of the cached contentif the content
`has subsequently changed since the downstream proxy server hadlast received it). Col. 6, 1. 68-
`col.7, 1. 19.
`
`Upon receiving an HTTP GET request (or IE MODIFIED SINCE GETrequest), upstream proxy
`server 107 likewise checksits cache for a valid copy of the requested content. If upstream proxy
`server 107 does not have a valid copy ofthe content, it sends an HTTP GETrequest to web server
`100 Webserver 109 then transmits the requested content at the URL to upstream server 107, which
`stores the content in its cache (if it is cacheable. Alternatively, if upstream proxy server 107 does
`have a copy of the content stored in its cache, but it is uncertain whether (hat cached copyisstill
`valid, the upstream proxy server 107 sends a “conditional" HTTP IF MODIFIED SINCE (SET
`request containing the URL to the Webserver 109. which either responds (hat the cached content
`is still valid or with a new version ofthe contentif the content has subsequently changed since the
`downstream proxyserver had last received it. Col. 6, 1. 68-col. 7, 1. 19. Upstream server 117 then
`forwards the content (or revalidation information) to downstream server 105. which stores the
`contentin its cache (if it is cacheable), and then forwards the content to web browser103, In steps
`3 through 7 of Figure 2. communication, system 100 prefetches embedded objects in the requested
`content.
`
`After receiving a user request from browser 103. downstream proxy 105 forwards the web request
`to upstream server 107, which forwards the web request to web server 109. Therefore, upstream
`server 107 is the "first client device” that serves as an intermediary between downstream server
`105 and webserver 109.
`
`Downstream proxy server 105 is the second server.
`
`receiving, from the secondserver, thefirst content identifier;
`
`As shownin Figure 2, Border discloses that web browser 103 sends a GET request containing the
`URL for the content “HTML”’ to downstream server 105, and downstream server 105 then sends
`a GET request containing the URL “HTML"to upstream server 107. Col. 5, ll. 14-24, Fig. 2.
`
`The first client device ("upstream server 107*') receiving, from the second server ("downstream
`server 105"). the first content identifier (“URL HTML"):
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 6
`
`sending, to the first server over the Internet, a Hypertext Transfer Protocol (HTTP)
`
`request that comprises the first content identifier;
`
`Webserver 109is the “first server.” Border teaches that upstream server 107 sends a GET
`request for the URL “HTML”to webserver 109. Col. 5, ll. 33-35, Figure 2.
`
`In Fig. 2, the first client device ("upstream server 107“) sending,to the first server (“web server
`109”) over (the Internet a Hypertext Transfer Protocol (HTTP) GET request that comprises the
`first content identifier “URL HTML’):
`
`receiving, the first content from the first server over the Internet in response to the sending
`
`of the first content identifier;
`
`Borderthen teachesthat, in response to upstream server 107 issuing the GET URL HTMLrequest
`the web server 109 for the HTMLpage...the web server 109 transmits the requested HTML page
`to the upstream server. Col. 5, Il. 34-37. Thus, Border teachesthefirst client device receiving the
`first content (the HTML page at the URL “HTML") front the first server in response to sending
`the first content identifier (the URL “HTML").
`
`and sending,the first content by thefirst client device to the second server, in responseto
`
`the receiving of the first content identifier.
`
`After receiving the first content (‘the HTML page at the URL “'HTML'"") from the first server
`“web server 109”), Border discloses that thefirst client device (“upstream server 107”) “forwards
`the HTMLpageto the downstream server 105. Col. 5, Il. 38-40.
`
`The secondserver (“downstream server 105”) then forwardsthe first content to web browser103.
`In response to web browser 103's original GET request, in accordance with the secondserver's role
`is a “server.” Col. 5, ll. 38-40.
`
`12. The method according to claim 1, further comprising storing, by the first client device
`
`in response to the receiving from thefirst server, the first content, and wherein the sending,
`
`of the HTTP request is in response to the receiving of the first content identifier.
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 7
`
`Border discloses that the first client device (upstream server 107) sends the GET requestto the
`first server (web server 109) after it receives the first content identifier (URL “HTML”) from the
`second server (downstream server 105). Border further discloses that downstream proxy server
`105 and upstream proxy server 107 contain caches 115 and 117, respectively. Additionally,
`Border teaches that the caches are “HTTP caches.” Exhibit D at 4:8-11. In response to receiving
`the first content (the URL “HTML?”) from the first server (web server 109), the first client
`device (upstream server 107) stores the first content (the HTMLpage at the URL “HTML’)in
`HTTPcache 117. Col. 5, Il. 36-38.
`
`14. The method according to claim 1, further comprising determining, by thefirst client
`
`device, that the received first content, is valid.
`
`Borderteaches that the caches are “HTTP caches.” Col. 4, ll. 8-1. In response to response to
`receiving the first content (the URL “HTML") from thefirst server (web server 109), the first
`client device (upstream server 107) stores the first content (the HTMLpageat the URL
`“HTML?”) in HTTP cache 117. Col. 5, ll. 36-38. Border discloses that upstream server 107 stores
`the received first content in HTTP cache 117 to provide in response to future requests; for the
`same content, in the event upstream server 107 receives a subsequent request for the received
`first content. Border discloses that upstream server 107 may determine whether such contentis
`still valid by sending a conditional HTTP GETrequest using IF MODIFIED SINCEheaders to
`web server 109. Col. 7, ll. 5-10, col. 9, Il. 14-15. If there has been no changeto the receivedfirst
`comentsince the time specified in the IF MODIFIED SINCEheader, then the contentis still
`valid and webserver 109 returns a NO CHANGEresponse. Col. 7, Il. 5-10. Border discloses the
`servers with caches perform this action “to avoid stale information [and] determine whether the
`information stored at URL HTML,has been updated since the time it was last requested.” Col. 6,
`ll. 55-57.
`
`17. The method according to claim 1, further comprising periodically communicating
`
`between the second server andthefirst client device.
`
`See claim 1 above. Also, each of the “second server‘and “first client device” is a HTTP caching
`proxy, and they comunicate via the HTTP protocol for the purpose of sending web requests. Fig.
`1, 2. A POSA would understand that downstream server /05 and upstream server 107
`communicate via HTTP.
`
`Border discloses downstream server 105 and upstream server 107 communicating via HTTP over
`a persistent TCP connection. This persistent TCP connection is labeled P-TCP in Figures 1 and 3
`of Border.
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 8
`
`21. The method according to claim 1, wherein the first or second server is a Transmission
`
`Control Protocol/Internet Protocol (TCP/IP) server that communicates over the Internet
`
`based on, or according to, using TCP/IP protocol or connection, and wherein thefirst client
`
`device is a Transmission Control Protocol/Internet Protocol (TCP/IP) client that
`
`communicates respectively with the first or second server over the Internet based on, or
`
`according to, TCP/IP protocol or connection.
`
`Borderdiscloses that downstream server 105 and upstream server 107 maintain and communicate
`over a persistent TCP connection to carry HTTPtransactions, which is shown in Figure 1 by the
`connection labeled “P-TCP”’ that is made over network 111. Fig. 1,4:11 - 15, 7:50-52. Border also
`discloses that TCP communications of communication system 100 are made over IP. 7:52-35.
`Thus, at least the second server (downstream server 105) is a TCP/IP server that communicates
`over the Internet using the TCP/IP protocol. Further, the first client device (upstream server 10“)
`is a TCPTPclient that communicates over the Internet with the second server using the TCP/IP
`protocol.
`
`24. The method accordingto claim 1, further comprising establishing, by thefirst client
`
`device, a Transmission Control Protocol (TCP) connection with the second server using
`
`TCP/IP protocol.
`
`See claims land 21 above. Borderdisclosesa first client device (upstream server 105) and second
`server (downstream server 107) in communication with one another. Border also discloses that
`they connect using TCP/IP connections. Borde therefore discloses the first client device
`establishing a TCP connection with the second server using the TCP/IP protocol.
`
`25. The method according to claim 1, wherein the first or second server is a Transmission
`
`Control Protocol/Internet Protocol (TCP/IP) server, wherein thefirst client device
`
`communicates over the Internet with the first or second server based on, or according to,
`
`using TCP/IP protocol or connection.
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 9
`
`See claims | and 24 above. Border disclosesa first client device (upstream server 105) an second
`server (downstream server 107) in communication with one another. Border also discloses that
`they connect using TCP/IP connections. Border therefore discloses the first client device
`establishing a TCP connection with the second server and the TCP/IP protocol.
`
`26. The method accordingto claim 1, further comprising storing, operating, or using, a
`
`client operating system.
`
`Border discloses the use of a client operating system. Border discloses that “communication
`system 100 includes a user station 101 that utilizes a standard web browser 103 (e.g.. Microsoft
`Internet Explorer, Netscape Navigator). In this example, the user station 101 is a personal computer
`(PC); however, any computing platform may be utilized, such as a workstation, web enabledset-
`top boxes, web applications, etc.” Col. 3, ll. 55-61, Further, “FIG. 6 is a diagram of a conventional
`communication system for providing retrieval of web content by a personal computer (PC), PC is
`loaded with a web browser 603 to access the web pages that are resident on web server 605;
`collectively the web pages and webserver 605 denote a “website.” 1:43-48. “FIG. 7 is a diagram
`of a computer system that can be configured as a proxyserver, in accordance with an embodiment
`of the present invention...computer system 701 also includes a main memory 707, such asa random
`access memory (RAM) or other dynamic storage device, coupled to bus 703 for storing
`information and instructions to be executed by processor 705,” 10:6-24, FIG 7.
`
`27. The method according to claim 1, wherein the steps are sequentially executed.
`
`Border. Figure 2, Steps 1 and 2.
`
`Claims 28 and 29 are rejected on the samerationale as claim 1 above.
`
`Claim Rejections - 35 USC § 103
`
`The following is a quotation of pre-AIA 35 U.S.C. 103(a) which forms the basis forall
`
`obviousnessrejections set forth in this Office action:
`
`(a) A patent may not be obtained thoughthe inventionis not identically disclosed or described as set
`forth in section 102, if the differences between the subject matter sought to be patented and the prior art
`are such that the subject matter as a whole would have been obviousat the time the invention was made
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 10
`
`to a person having ordinary skill in the art to which said subject matter pertains. Patentability shall not
`be negatived by the manner in which the invention was made.
`
`Claims 2 and 22 are rejected under pre-AIA 35 U.S.C. 103(a) as being unpatentable over
`
`Borderas applied to claim 1 above, and further in view of Crowds.
`
`2. The method according to claim 1, wherein thefirst client device is identified by a Media
`
`Access Control (MAC) addressor a hostname, and wherein the method further comprising
`
`sending, by thefirst client device, during, as part of, or in response to, a start-up of the first
`
`client device, a first message to the second server, and wherein the first messages comprises
`
`the first IP address, the MAC address, or the hostname.
`
`Claim2initially recites that “the first client device is identified by a Media Access Control (MAC)
`address or a hostname.” Border further discloses that upstream server 107 operates on computer
`system 701,which is comprised of communication interface 719, which may be a network interface
`card. Col. 4, Il. 40-44, col. 11, ll. 24-38. A person of ordinary skill in the art(POSA) would readily
`understand that a network interface card or other communication interface 719 and therefore the
`computer system 701 comprising communication interface 719 would be identified by a MAC
`address as required by IEEE 802. Further, a POSA would havereadily understood that upstream
`server 107 that serves as a web proxy and communicates using the TCP/IP protocol, see, e.g.., col.
`4, 11.11-15 and col. 7, Il. 32-38, would also be identified by an IP address.
`
`Also, Crowds discloses the method of claim 2:
`Claim2initially recites that "the first client device is identified by a Media Access Control (MAC)
`address or a hostname.” The “first client device” is disclosed in Crowdsas a jondo. Crowdsfurther
`discloses that a jondo has a host name,stating, “The user selects this jondo as her web proxy by
`specifying its host name and port numberin her web browseras the proxyforall services” p, 73;
`Fig. 6 (identifying host names of multiple jondos). Crowds therefore expressly discloses that the
`“first client device” is identified by a hostname.
`
`Claim 2 further requires that "during, as part of, or in response to. a start-up of the first client
`device”the first client device sends a "first message" to the second server comprising "the first IP
`address." MAC address, or the hostname. Crowds discloses a setup phase for new jondos. such
`that other jondos learn the IP address, port number, and account nameof the new jondos, and these
`other jondos use this information to select a jondo as a proxy. Crowdsdiscloses that tins can be
`done through a server, to which the jondo sendsits information on startup: "When the jondo is
`started, it contacts a server called the blender to request admittance to the crowd. If admitted, the
`blender reports to this jondo the current membership of the crowd and information that enables
`this jondo to participate in the crowd." p. 73 “When the userstarts a jondo,... the blender adds the
`new jondo(i.e.. its IP address, port number, and account name) toits list of members, and reports
`this list back to the jondo." p. 87. Crowds also discloses that a jondo can communicate directly
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 11
`
`with other jondos during startup to share information, particularly in a more secure manner;
`"yondos will establish shared keys using Diffie-Hellman key exchange [Diffie and Heilman 1976],
`where the blenderserves only to distribute the Diffie-Heilman public keys of crowd members”pp.
`87-88. A POSA would understand that Diffie-Hellman is a cryptographic key-exchangeprotocol,
`also used in the SSL/TLS protocol employed by secure HTTP (HTTPS), whereby two nodes
`directly communicate to establish a shared cryptographic key not known by anybodyelse. The
`messages sent as part of that key exchange would include the IP address of both sender and
`recipient, and thus the other jondo would receive a message from the first jondo, during the first
`jondo’s initialization period, that includesthe first jondo’s IP address and port number.
`
`22. The method according to claim 1, wherein thefirst client device communicates over the
`
`Internet based on, or according to, one out of UDP, DNS, TCP, FTP, POP#, SMTP, or SQL
`
`standards.
`
`Crowds discloses the first client device communication overthe Internet based on at least TCP and
`FTP. The “first client device" of Crowds is a jondo operating on a user's computer. Because
`Crowds' disclosure of TCP/IP is in reference to “the TCP/IP connection to the jondo." Crowds
`discloses that the first client device communicates over the Internet based on TCP.
`
`In addition, Crowds discloses the use of FTP. Crowdsstates that “any request coming from the
`browseris sent directly to the jondo" and there includes a footnote stating that “the services that
`must be proxied include Gopher, HTTP, and SSI. " p.73 n.l. Further, FTP is supported to further
`the goal of anonymity, because otherwise “FTP requests triggered by downloading a w eb page
`would not go through the crowd, and would thus reveal the user's IP address to the end server. p
`73 n. 1. Crowdstherefore also disclosesthat(the first client device communicatesoverthe Internet
`based on FTP.
`
`Claims 15 and 18 are rejected under pre-AIA 35 U.S.C. 103(a) as being unpatentable
`
`over Border as applied to claim 14 above, and further in view of RF 2616.
`
`15. The method according to claim 14, wherein the determining is based on the received
`
`HTTPheaderaccordingto, or based on, IETF RFC 2616.
`
`HTTP(as described in RFC 2616) includes a mechanism for ensuring to contentis valid in terms
`of ensuring to that the content is consistent with content on a web server. Border discloses HTTP
`and therefore discloses this claim. Border discloses, upstream server 10? usine HTTP headers to
`determine whether the content stored in its cacheis stale.
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 12
`
`A POSAwould havebeen well aware in 2009 that RFC 2616 specifies a caching proxy's(e.g.
`upstream server 107) use of HTTP headers received from an origin server (e.g. web server 109)
`to determine the validity of cached content, for example, an origin server may include the
`Expires header in response to an HTTP GETrequest, which “gives the date/time alter which, the
`responseis considered stale” 1.e. not valid. RFC 2616 § 14,2 I. Alternatively, an origin server
`may include the Cache-Control header with a max-age directive in response to a GET request,
`which specifies the amount of time after which the response is considered stale, RFC 2616 8§ 13
`2,4, 14,9, 14.9,3, The caching proxy stores this header information received from the origin
`server, and uses them to determine whether the stored cornentis valid.
`
`Further, even after the expire time or max-age period of a piece of cached content, Border
`discloses, RFC 2616 § 13 further details, the use of conditional HTTP GET requests to validate
`content stored in cache 117 on the upstream server 107. Col. 5, Il. 25-47, Col. 7, IL.5-19; RFC
`2616 §13.
`
`Borderdiscloses the use of HTTP and TCP, whichin turn disclose claim 15, For the same reasons,
`claim 15 at a minimum would have been obvious to a POSA in view of the disclosure of Border
`and the general knowledge of a POSA, and/or with the disclosure of RFC 2616 (regarding
`HTTP/1,1) which similarly reflects Internet communication details with which a POSA would
`have been familiar, and with the disclosure of the TCP/IP protocol.
`
`Asdiscussed in RFC 2616, one of the HTTP/1.1 headers is a “Keep-Alive” header. See RFC 2616
`§ 8.1.3 (Keep-Alive header implemented by many HTTP/1.0clients”), § 13.5.1 (referring to
`Keep-Alive header), § 19.6 (referring to Keep-Alive version of persistent connections). As the
`name suggests, a “Keep-Alive” message in HTTP is a mechanism to allow two communicating
`devices to ensure that their connection remains “alive’' by sending periodic communications, The
`usage of such Keep-Alive” messages in HTTP headersis old and well-known.
`
`18. The method according to claim 17, wherein the periodically communicating comprises
`
`exchanging ‘keep alive’ messages.
`
`Periodically communicating is included the exchange of "keep alive” messages, which are
`discussed in RFC 2616 (e.g., §§8.1.3, 13.5,1, 19,6) and would have been well known to a POSA.
`The usage of such "‘keep alive" messages in the context of claim 17 would have been disclosed
`to a POSA in view of the disclosure of Border and the general knowledge of a POSA,and/or with
`the disclosure of RFC 2616 (regarding HTTP/1.1) which Similarly reflects
`Internet
`communication details with which a POSA would have been familiar.
`
`Asdiscussed in RFC 2616, one of the HTTP/1.1 headers is a “Keep-Alive” header. See RFC 2616
`§ 8.1.3 (Keep-Alive header implemented by many HTTP/1.0clients”), § 13.5.1 (referring to
`Keep-Alive header), § 19.6 (referring to Keep-Alive version of persistent connections). As the
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 13
`
`name suggests, a “Keep-Alive” message in HTTP is a mechanism to allow two communicating
`devices to ensure that their connection remains “alive’' by sending periodic communications. The
`usage of such Keep-Alive” messages in HTTP headersis old and well-known.
`
`Claim 19 is rejected under pre-AIA 35 U.S.C. 103(a) as being unpatentable over Border
`
`as applied to claim 1 above, and further in view of MorphMix.
`
`19. The method according to claim 1, for use with a software application that includes
`
`computerinstructions that, when executed by a computer processor, cause the processorto
`
`perform the sending of the Hypertext Transfer Protocol (HTTP) request, the receiving and
`
`storing ofthe first content, the receiving of the first content identifier, and the sending of
`
`the part of, or the whole of, the stored first content, the methodis further preceded by:
`
`downloading, by thefirst client device from the Internet, the software application; and
`
`installing, by the first client device, the downloaded software application.
`
`MorphMixdiscloses that consumer computers can be the “first client device" of Claim 19: “any
`computer with a dial-up connection capable of running a modern graphical web browser should
`be sufficient " p. 96. The “MorphMix application" is disclosed as being available to “[a]nybody
`who has access to a computer that is connected to the Internet .
`.
`. after having installed the
`MorphMix software” pp. 96, 98 (emphasis added). “The MorphMix prototypeis free software and
`is available with full source code... at the MorphMix project web page"(citing Internet website
`)http:/www.tik ee.ethz.ch/-morphmix). P. 286 That same webpage “also contains information
`about how to configure and run the prototype.” Exhibit E at 286 It is the downloaded (from the
`Internet) and installed MorphMix software application that instructs the processorofthefirst client
`device to perform the steps.
`
`At the time of the invention, it would have been obvious to one of ordinary skill in the art
`
`to modify Border by including the features of MorphMix. Applying the known technique of
`
`MorphMixto Border would have been recognized by those of ordinary skill in the art as
`
`resulting in an improved system that would haveyielded predictable results.
`
`
`
`Application/Control Number: 90/014,875
`Art Unit: 3992
`
`Page 14
`
`Extension of Time
`
`Extensions of time under 37 CFR 1.136(a) will not be permitted in these proceedings
`
`because the provisions of 37 CFR 1.136 apply only to "an applicant" and not to parties in a
`
`reexamination proceeding. Additionally, 35 U.S.C. 305 requires that reexamination proceedings
`
`"will be conducted with special dispatch" (37 CFR 1.550(a)). Extension of time in ex parte
`
`reexamination proceedings are provided for in 37 CFR 1.550(c).
`
`Amendment in Reexamination Proceedings
`
`Patent owneris notified that any proposed amendmentto the specification and/or claims
`
`in this reexamination proceeding must comply with 37 CFR 1.530(d)-(j), must be formally
`
`presented pursuant to 37 CFR 1.52(a) and (b), and must contain any fees required by 37 CFR
`
`1.20(c).
`
`Service of Papers
`
`After the filing of a request for reexamination by a third party requester, any document
`
`filed by either the patent owneror the third party requester must be served on the other party
`
`(or parities wher