`
`17/657,981 - GAU: 2431
`
`Complete if Known
`
`|ApplicationNumber[171657981
`INFORMATION DISCLOSURE
`RevitD03
`
`STATEMENT BY APPLICANT
`
`(Use as many sheets as necessary)
`
`2431
`
`SU, SARAH
`15635,0008-00000
`
`Examiner
`Initials*
`
`Cite
`No.
`
`Pages, Columns, Lines, Where
`Document Number
`Relevant Passagesor Relevant
`:
`:
`Figures Appear
`Number-Kind Code(if known)
`
`US-11,120,124 B2 09-14-2021|Fusenig etal.
`[[ussoamzsoosewean[omer
`[[essomsemer[were[eranamneata
`_[essamreoeeYToraszore[anmonetal
`
`
`
`U.S. PATENTS
`Issue Date
`Nameof Patentee or
`MM-DD-YYYY
`Applicant of Cited Document
`
`[[essrzraseoer—oroezean[vessel
`[_[essresame—[weaszor[oovetetat
`[essaoseoraeaoe[Umsavaretat
`
`[essomseePessoa[ier
`[[essamceoePmezezore[owt
`[[essomsasiseeoraz[owe
`
`
`
`|| US-10,956,484 B1 03-23-2021|Kulkarnietal. Po
`
`Examiner
`Initials*
`
`Cite
`No.
`
`U.S. PUBLISHED PATENT APPLICATIONS
`Document Number
`Publication Date
`Nameof Patentee or
`.
`J
`MM-DD-YYYY
`Applicant of Cited Document
`
`Pages, Columns, Lines, Where
`Relevant Passagesor Relevant
`
`
`
`|| US-2020/0042707 A1 02-06-2020|Kucherovetal. Po—_
`
`
`|| US-2012/0323853 A1—_ 12-20-2012 _—
`
`
`
`|| US-2014/0096135 A1 04-03-2014|Kundu etal.—_ _—
`
`
`
`|| US-2009/0007100 A1 01-01-2009|Field etal.—_ _—
`
`[[esonnessessarrosea[eestor
`[[esaorncnrrsrearforaranig[Garett
`[[esaoarcaronorarforever[Servet
`[[esoreenssasrarfoansanre[Searewerat
`[[esaorsenzoansarforsee[eat
`[esraesoronarosrranre[weneneseeat
`[esosaroasoams[eamom
`[[eseraenarassarforaanre[Shaper
`[[esaoracisesioarforseanre[rans
`
`Examiner
`Signature
`
`SARAH su
`
`Date
`Considered
`
`01/26/2023
`
`*EXAMINER: Initial if reference considered, whetheror not citation is in conformance with MPEP 609. Drawline through citation if not in conformance and not
`considered. Include copy of this form with next communication to applicant.
`
`ALL REFERENCES CONSIDERED EXCEPT WHERE LINED THROUGH.
`
`/8.8/
`
`
`
`Receipt date: 01/24/2023
`
`17/657,981 - GAU: 2431
`
`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`(Use as many sheets as necessary)
`
`Complete if Known
`
`Ping Date
`
`April 5, 2022
`
`
`
`Note: Submission of copies of U.S. Patents and published U.S. Patent Applications is not required.
`
`NON PATENTLITERATURE DOCUMENTS
`
`Examiner|Cite|Include nameof the author(in CAPITAL LETTERS), title of the article (when appropriate), title of the item (book,|Translation
`Initials
`No.
`magazine, journal, serial, symposium, catalog, etc.), date, page(s), volume-issue number(s), publisher, city
`and/or country where published.
`Rani et al.; “An Efficient Approach to Forensic Investigation in Cloud using VM Snapshots”, 2015
`International Conference on Pervasive Computing (ICPC), 5 pages, (2015).
`Wei et al., “Managing Security of Virtual Machine Images in a Cloud Environment”, CCSW’09, pp.
`91-96, November 13, 2009
`Almulla et al., “Digital Forensic of a Cloud Based Snapshot”, The Sixth International Conference on
`Innovative Computing Technology (INTECH 2016), pp. 724-729, (2016)
`Pandeyet al., “An Approach for Virtual Machine Image Security”, Computer Science and
`Engineering MNNIT, Allahabad, 2014 International Conference on Signal Propagation and
`Computer Technology (ICSPCT), pp. 616-623, (2014)
`Rajasekaran etal., “Scalable Cloud Security via Asynchronous Virtual Machine Introspection”, 8th
`USENIX Workshop on HotTopics in Cloud Computing, Cover page and pages 1-6, (2016)
`Kaur et al., “Secure VM Backup and Vulnerability Removal in Infrastructure Clouds”, 2014
`International Conference on Advances in Computing, Communications and Informatics (ICACCI),
`pp. 1217-1226, (2014)
`Fernandezetal., “Two patterns for cloud computing: Secure Virtual Machine Image Repository and
`Cloud Policy Management Point’, PLoP '13: Proceedings of the 20th Conference on Pattern
`Languages of Programs October 2013 Article No.: 15, Association for Computing Machinery (ACM),
`Cover sheet and pages 1-11, (2013)
`Fernandezetal. “Building a security reference architecture for cloud systems”, Springer,
`Requirements Eng, vol. 21, pp. 225-249, (2016)
`Ammonsetal., “Virtual machine images as structured data: the Mirage image library”, IBM
`Research, Cover sheet 2 pages and pages 1-6, (2011)
`“IBM Point of View Security and Cloud Computing”, IBM SmartCloud Enterprise, Cloud Computing
`White Paper, 13 sheets of cover pages and pages 1-20, (2009)
`Cui et al., “A Less Resource-Consumed Security Architecture on Cloud Platform’, Wuhan University
`Journal of Natural Sciences, vol. 21, no. 5, pp. 407-414, (2016)
`|., “AmazonlA: When Elasticity Snaps Back”, CCS’ 11, ACM, pp. 389-400, (2011)
`
`N/A
`
`N/A
`
`N/A
`
`N/A
`
`N/A
`
`N/A
`
`N/A
`
`/A
`
`N/A
`
`N/A
`
`N/A
`
`N/A
`
`N/A
`
`Non-Final Office Action Application No. 17/658,149 dated December30, 2022, in the United States
`Patent and Trademark Office. (15635.0007-00000)
`Non-Final Office Action Application No. 17/658,156 dated January 3, 2023, in the United States
`Patent and Trademark Office. (15635.0010-00000)
`Final Office Action Application No. 17/657,986 dated November 23, 2022,in the United States
`Patent and Trademark Office. (15635.0009-00000)
`
`N/A
`
`N/A
`
`Examiner
`
`Date
`
`*EXAMINER: Initial if reference considered, whetheror not citation is in conformance with MPEP 609. Drawline through citation if not in conformance and not
`considered. Include copy of this form with next communication to applicant.
`
`ALL REFERENCES CONSIDERED EXCEPT WHERE LINED THROUGH.
`
`/8.8/
`
`