`
`In re Patent Application of:
`Darrell Diem
`
`Art Unit: 2689
`
`Application No: 15/200,592
`
`Examiner: Mohamed Barakat
`
`Confirmation No: 1044
`
`Filed: 07-01-2016
`
`Atty. Docket No: 1 1 14-0003 CON
`
`Customer No: 124657
`
`For; A NOTIFICATION SYSTEM FOR OCCURRENCES OF
`GROUP EVENTS BASED ON ZONE AND LOCATION
`OF MOBILE DEVICES
`
`PATENT TRADEMARK OFFICE
`
`RESPONSE TO NON-FINAL OFFICE ACTION
`
`Commissioner for Patents
`
`P.O. Box 1450
`
`Alexandria, VA 22313-1450
`
`Dear Sir:
`
`INTRODUCTORY COMMENTS
`
`In response to the Office Action dated October 7, 2016, please amend the above-
`
`identified U.S. patent application as follows:
`
`Claims Amendments are reflected in the listing of claims, which begins on page 2 of
`
`this paper.
`
`Remarks/Arguments begin on page 12 of this paper.
`
` GPSNA Ex. 1026
`GPSNA Ex. 1026
`
`1
`
`
`
`CLAIMS
`
`1.
`
`(Currently Amended) A notification system for sending group notifications upon
`
`occurrences of events associated with a plurality of mobile devices of user groups having
`
`corresponding group identification codes that identify the user groups, each user group
`
`comprising one or more users having a user identification code associated with a
`
`corresponding group identification code, the user identification code identifying the user
`
`mobile device locations relative to zones that are independent of mobile device locations,
`
`wherein said events occur based on
`
`said system comprising:
`
`one or more servers configured to:
`
`define check a first level administrative privilege to control user membership in a
`
`E user groups, said user groups being defined by a first administrator having the first level
`
`administrative privilege, said first level administrative privilege being used to authorize a
`
`user in each user group to be a second administrator of a plurality of second administrators,
`
`each second administrator having a corresponding second level administrative privilege
`
`associated with a user group;
`
` control conveyance of event
`
`information te—the—user—greu-p based on one or more information access codes specified by a
`
`second administrator of a user group, said one or more information access codes specifying
`
`one or more users in the user group having access to the event information, wherein the
`
`2
`
`
`
`first level administrative privilege is used to administer a first information sharing
`
`environment (ISE) and the second level administrative privilege is used to administer a
`
`corresponding second ISE of a plurality of second ISEs created within the first ISE; said
`
`first and second ISEs comprising a computing network where the conveyance of the event
`
`information from a server to the groups is controlled or configured, wherein each second
`
`ISE is configured to be administered independent of other second ISEs and the first ISE
`
`using the one or more information access codes;
`
`check the first level administrative privileges before aeleli-rig an—authorizi_nged a
`
`user to be a second administrator of the a user group;
`
`
`provide one or more interfaces for setting zones events and groups notifications
`
`for the user groups based on a corresponding second level administrative privilege
`
`associated with the second administrator;
`
`check a the corresponding second level administrative privilege before providing
`
`
`
`one or more interfaces for setting a zone the Qevents and the gteup a_notifications for the
`
`user group;
`
`receive a reguest to set the zone for the user group after the user group is defined
`
`by the first administrator;
`
`receive a request to set ah E event for the user group after the setting of the
`
`zone;
`
`3
`
`
`
`receive a request to set a—group Q notification for the user group, said request
`
`identifying a recipient of the group notification according to said one or more information
`
`access codes;
`
`determine a mobile device location
`
` ;
`
`compare a Q zone and the mobile device location to determine whether an Q event
`
`occurs;
`
`if the event occurs cause a—group Q notification to be sent to the recipient of the group
`
`notification.
`
`(Currently Amended) The system claimed in claim 1, wherein said mobile device location
`
`corresponds to an indoor location of the mobile device determined using a proximig device
`
`included in the mobile device.
`
`(Original) The notification system claimed in claim 2, wherein said servers are further
`
`configured to determine an outdoor location of the mobile device based on a GPS device
`
`included in the mobile device.
`
`(Currently Amended) The notification system claimed in claim 1, wherein sard group
`
`the one or more servers are configured to control
`
`conveyance of mobile device location information other than event information based on
`
`the one or more information access codes specified by the second administrator of the user
`
`group, said one or more information access codes specifying one or more users in the user
`
`4
`
`4
`
`
`
`group having access to the mobile device location information and the event information,
`
`wherein a mobile device location information corresponds to a coordinate of a mobile
`
`device within a coordinate system corresponding to a map as determined by a location
`
`information source associated with the mobile device" and wherein an event information
`
`comprises at least one condition that relates a mobile device location information to a zone
`
`where the occurrence of the event causes a notification to be sent when a mobile device
`
`crosses a boundag associated with the zone, wherein the first administrator defines the
`
`corresponding user group independent of a location of a zone.
`
`(Currently Amended) The notification system claimed in claim 1 4, wherein said
`
`said first level administrative
`
`privilege is associated with an event information service provider and said second level
`
`administrative privilege is provided by the event information service provider to customers
`
`of the event information service provider, said mobile device identification codes being
`
`associated with vehicles in a plurality of vehicle groups based on the second level
`
`administrative privilege, wherein each vehicle group comprises vehicles used by drivers
`
`associated with corresponding mobile object identification codes under the second level
`
`administrative privilege, said mobile object identification codes being different from the
`
`mobile device identification codes, each mobile object identification code being associated
`
`with a mobile object comprising an NFC device, wherein a second event associated with
`
`the mobile object that is different from the event is determined based on proximity of the
`
`driver to the vehicle as determined using the NFC device.
`
`5
`
`
`
`6.
`
`(Currently Amended) The notification system claimed in claim 5 1, wherein said—seheduled
`
` the one or more servers are further confi gured to
`
`determine occurrence of a second event that is different from the event said second event
`
`being based on a condition associated with one or more mobile objects other the one or
`
`more mobile devices, wherein a mobile object identification code that is different from the
`
`mobile device identification codes is associated with a mobile obj ect, and wherein the
`
`occurrence of the event and the second event is determined based on a mobile device
`
`identification code and the mobile object identification code.
`
`7.
`
`(Currently Amended) The notification system claimed in claim Q -l, wherein the—ene—er
`
`the one or more
`
`servers are further configured to:
`
`receive location information from the mobile device associated with the mobile device
`
`identification code‘ .
`
`receive location information from the mobile object associated with the mobile object
`
`identification code,"
`
`determine occurrence of the event based on the location information from the mobile
`
`device associated with the mobile device identification code; and
`
`determine occurrence of the second event based on the location information from the
`
`mobile object associated with the mobile object identification code.
`
`8.
`
`(Currently Amended) The notification system claimed in claim l -1, wherein the—ene—er
`
`an information
`
`6
`
`
`
`access code specified by a second administrator of a user group comprises a group
`
`identification code.
`
`9.
`
`(Currently Amended) The notification system claimed in claim § -lr, wherein saiel—greu-19
`
`
`
`occurred the information access code comprises an access list that includes a sub-group
`
`identification code associated with a sub-group created within the user group.
`
`10. (Currently Amended) The notification system claimed in claim 9 -l, wherein said-ene—er
`
` s
`
` the one or more servers control access to the one
`
`or more user interfaces for adding a mobile device to a sub-group based on the sub-group
`
`identification code, said second level of administrative privilege comprising a privilege to
`
`create the sub-group, specify the sub-group identification code, and specify the users in the
`
`sub-group.
`
`11. (Currently Amended) The notification system claimed in claim 1, wherein said—ene—er—mere
`
`
`
`an information access code specified by a second
`
`administrator of the user group is authenticated at a central access control station to verify
`
`identity of a user before conveying the event information.
`
`12. (Currently Amended) The system claimed in claim 11, wherein
`
`7
`
`
`
`
`
`information access code is conveyed to the user whose identity is to be verified.
`
`13.
`
`(Currently Amended) The system claimed in claim Q -1-}, wherein
`
`
`
`the one or more servers are configured to further control
`
`conveyance of sensor information other than the location information and the event
`
`information based on the one or more information access codes.
`
`14.
`
`(Currently Amended) The system claimed in claim 1 -1%, wherein
`
`the mobile device location information is
`
`determined using an NFC device.
`
`15.
`
`(Currently Amended) The system claimed in claim H -1-}, wherein
`
`16.
`
`17.
`
`associated with a driver of a vehicle.
`
`the NFC device is
`
`(Currently Amended) The system claimed in claim g -1-}, wherein said leeatien—is—traeked
`
`via—the proximity device comprises a Bluetooth devicem%
`
` .
`
`(New) A notification method for sending notifications upon occurrences of events
`
`associated with a plurality of mobile devices operating in user groups having corresponding
`
`group identification codes that identify the user groups, each user group comprising one or
`
`8
`
`
`
`more users of mobile devices, each user having a user identification code associated with a
`
`corresponding group identification code, the user identification code identifying the user,
`
`wherein said events occur based on mobile device locations relative to zones that are
`
`independent of mobile device locations, said method being implemented by one or more
`
`servers configured to:
`
`check a first level administrative privilege to control user membership in the user
`
`groups, said user groups being defined by a first administrator having the first level
`
`administrative privilege, said first level administrative privilege being used to authorize a
`
`user in each user group to be a second administrator of a plurality of second administrators,
`
`each second administrator having a corresponding second level administrative privilege
`
`associated with a user group,
`
`control conveyance of 1) mobile device location information and 2) event
`
`information other than the mobile device location information based on one or more
`
`information access codes specified by a second administrator of a user group, said one or
`
`more information access codes specifying one or more users in the user group having
`
`access to the mobile device location information and the event information, wherein a
`
`mobile device location information corresponds to a coordinate of a mobile device within a
`
`coordinate system corresponding to a map as determined by a location information source
`
`associated with the mobile device, and wherein an event information comprises at least one
`
`condition that relates a mobile device location information to a zone where the occurrence
`
`of the event causes a notification to be sent when a mobile device crosses a boundary
`
`9
`
`9
`
`
`
`associated with the zone; wherein the first administrator defines the corresponding user
`
`group independent of a location of a zone;
`
`check the first level administrative privilege before authorizing a user to be a
`
`second administrator of a user group;
`
`provide one or more interfaces for setting zones; events and notifications for the
`
`user groups based on a corresponding second level administrative privilege associated with
`
`the second administrator;
`
`check the corresponding second level administrative privilege before providing
`
`one or more interfaces for setting a zone; an event and a notifications for the user group;
`
`receive a request to set the zone for the user group after the user group is defined
`
`by the first administrator;
`
`receive a request to set the event for the user group after the setting of the zone;
`
`receive a request to set the notification for the user group; said request identifying
`
`a recipient of the notification according to said one or more information access codes;
`
`determine a mobile device location;
`
`compare the zone and the mobile device location to determine whether the event occurs;
`
`if the event occurs cause the notification to be sent to the recipient of the notification; and
`
`convey mobile device location information based on the one or more information access
`
`codes.
`
`10
`
`10
`
`10
`
`
`
`18.
`
`(New) The method of claim 17, wherein the first level administrative privilege is used to
`
`administer a first information sharing environment (ISE) and the second level of
`
`administrative privilege is used to administer a corresponding second ISE of a plurality of
`
`second ISEs created within the first ISE, said first and second ISEs comprising a computing
`
`network where the conveyance of the event information from a server to the groups is
`
`controlled or configured, wherein each second ISE is configured to be administered
`
`independent of other second ISEs and the first ISE using the one or more information
`
`access codes.
`
`19.
`
`20.
`
`(New) The method of claim 17, wherein the information access code comprises an access
`
`list that includes one or more user identification codes and a sub-group identification code
`
`associated with a sub-group created within the user group.
`
`(New) The method of claim 17, wherein an information access code specified by the
`
`second administrator of the user group is authenticated at a central access control station to
`
`verify identity of a user before conveying the event information.
`
`ll
`
`ll
`
`11
`
`
`
`REMARKS
`
`The Applicant
`
`thanks the Examiner for the careful consideration of the present
`
`application. System claims 1-16 have been amended as shown above. New method claims 17-20
`
`are newly added. Claims 1-20 remain pending.
`
`Information Disclosure Statement
`
`The undersigned records that an IDS filed on December 20th, 2016 discloses IPR
`
`Decisions issued in related patents.
`
`Claim Objection
`
`The Action has objected to claim 11.
`
`Claim 11 has been amended along with other
`
`claims, the support for which is set forth below.
`
`Specification Support for Claim Amendments
`
`The pending claims of the application have been amended to more clearly distinguish
`
`them over the prior art of record. As amended, claims now require a plurality of groups of users
`
`of mobile devices based on corresponding identification codes that identify each user or group or
`
`mobile device associated with a group. Each user in a user group has a user identification code
`
`associated with a group identification code. The claims are further amended to require one or
`
`more information access codes that specify for each user group one or more users or sub-groups
`
`in the user group having access to information associated with the user group.
`
`According to the amended claims,
`
`a first administrator based on a first
`
`level
`
`administrative privilege specifies a second administrator which has a second level administrative
`
`privilege for a user group used to specify the one or more information access codes. The first
`
`12
`
`12
`
`12
`
`
`
`level administrative privilege is used to authorize a user in each user group to be a second
`
`administrator of a plurality of second administrators. The second administrator is authorized to
`
`control conveyance of location and/or event information regarding the user group based on the
`
`one or more information access codes specified under the second level administrative privilege.
`
`The first level administrative privilege can be used to administer a first information sharing
`
`environment
`
`(ISE) and the second level administrative privilege is used to administer a
`
`corresponding second ISE of a plurality of second ISEs created within the first ISE. The first
`
`and second ISEs comprise a computing network where the conveyance of the event information
`
`or mobile device location information from a server to the groups is controlled or configured.
`
`Using the one or more information access codes, each second ISE is configured to be
`
`administered independent of other second ISEs and the first ISE.
`
`According to other amended claims, e. g., claims 4 and 17, such information includes two
`
`types of information: 1) mobile device location information and 2) event information other than
`
`mobile device location information. Claims define mobile device location information as
`
`corresponding to a coordinate of a mobile device as determined by a location information source
`
`associated with the mobile device. The claims further define event information differently from
`
`location information as being a condition that relates a mobile device location information to a
`
`zone that defines an event where the occurrence of the event causes an alert to be sent when a
`
`mobile device crosses a boundary associated with the zone. Access to mobile device location
`
`information and to event information associated with a user group is controlled based on the one
`
`13
`
`13
`
`13
`
`
`
`or more information access codes specified by a corresponding second administrator of a user
`
`group.
`
`It
`
`is respectfully submitted that
`
`the above amendments are fully supported by the
`
`specification. According to the specification, “one or more administrators may be given
`
`privileges to configure the information-sharing environment. Such configuration could include
`
`specifying authorized users of the environment and their access privileges,
`
`etc. Such
`
`configuration can also define groups of users as part of an established organizational structure
`
`associated with the information-sharing environment.” (Specification [OO43]) Thus,
`
`the
`
`specification
`
`supports groups being defined by
`
`administrators having corresponding
`
`administrative privileges. “Because smaller information-sharing environments can exist within
`
`larger information-sharing information environments, various levels of administrator privileges
`
`can exist.”
`
`(Specification [OO43]) Thus,
`
`the
`
`specification supports various
`
`levels of
`
`administrative privilege, including first level and second level of administrative privileges. The
`
`specification states that “an administrator can define one or more groups to which a given user
`
`can be associated. Groups may be defined in accordance with an organizational structure or
`
`hierarchy. For example, an administrator for an information-sharing environment corresponding
`
`to a company may define groups for the various organizations within the company, such as legal,
`
`accounting, shipping, etc., and for groups of users not based on organization, such as executive,
`
`management, administrative, exempt employees, nonexempt employees, etc. After a group has
`
`been defined, the administrator can associate individual users with one or more of the defined
`
`groups.
`
`Similarly, a parent administering an information-sharing environment might define
`
`l4
`
`l4
`
`14
`
`
`
`groups such as parents, teenagers, children, drivers, and so forth.....As such, a user may be
`
`associated with one or more
`
`groups defined by an administrator of an information-sharing
`
`environment.” (Specification [OO67]). Thus,
`
`the specification supports second administrators
`
`having a second level administrative privilege to specify who is authorized to receive location
`
`and/or event information by specifying corresponding information access codes.
`
`The specification states “the present invention can be implemented in a variety of
`
`information-sharing environments. The sharing of information may be managed among a small
`
`number of users such as a family or group of friends, or among a very large number of users such
`
`as among employees of very large business, or among a worldwide user base such as a might be
`
`provided via an Internet service. Furthermore, information-sharing environments may involve
`
`information-sharing environments within information-sharing environments. That
`
`is, one or
`
`more smaller information-sharing environments may overlap or coexist independent of each
`
`other within one or more larger information sharing environments.” (Specification [OO42]) Thus,
`
`the specification supports creating a plurality of second information-sharing environments (ISEs)
`
`within a first ISE.
`
`In addition to overlapping information-sharing environments (ISEs), the
`
`present specification supports second ISEs that are independent of each other and the first ISE.
`
`According to the specification, “codes would typically include an identifier (e.g., a user
`
`account name or user number) and can be associated with one or more groups, and one or more
`
`information access privilege classifications. For example, a given user may be included in a
`
`group indicating members of a family, a company, a club, or an association. Similarly,
`
`employees of a company may belong to one or more defined groups within the company (e. g.,
`
`l5
`
`l5
`
`15
`
`
`
`Management, Engineering, Accounting, etc.).” (Specification [OO46]) “For example, an Internet
`
`service based on the present invention can be provided and administered such that anyone having
`
`access to the Internet can purchase the service and be an authorized user. A purchaser of the
`
`service can set up a company-wide information-sharing environment within the larger world-
`
`wide inforination-sharing environment
`
`that
`
`includes company employees, affiliates, Board
`
`members, guests, etc. A division within a company may set up its own information-sharing
`
`environment, and so on. A family can set up its own information-sharing environment and an
`
`individual may set up his or her own information-sharing environment. As such, each
`
`information sharing environment can be administered so as
`
`to manage conveyance of
`
`information among computing devices based on user identification codes.”
`
`(Specification
`
`[OO46]) Thus, the specification describes controlling conveyance of information based on access
`
`codes specified by a second level administrator, e.g., a family, who can associate group
`
`identification codes with user identifiers. The specification further describes a group, e.g., a
`
`company, being divided into sub-groups (e.g., divisions) having corresponding identifiers.
`
`According to the specification, “an access code specifies the individual users and/or
`
`groups of users having access to the information to which the access code is associated. Such an
`
`access code would typically include specific user identification codes and/or group codes.”
`
`(Specification, [OO47]). The specification further states “The user identification code may also be
`
`associated with one or more groups having corresponding group identification codes. The user
`
`identification code and group identification code(s) are compared to those included in the access
`
`code whereby a match would indicate the user is authorized to receive the information. As such,
`
`16
`
`16
`
`16
`
`
`
`the information is conveyed to those computing devices that are associated with the users having
`
`access to the information as specified by the access code.” Id. Thus, the specification clearly
`
`describes access codes comprising group identification codes, sub-group identification and user
`
`identification codes used to define who gets access to information in a group in order to protect
`
`group privacy.
`
`The specification states “access codes can be associated with information to manage the
`
`conveyance of the information to computing devices. Specifically, an object location information
`
`access code can be associated with object location information. A user-defined zone information
`
`access code can be associated with user-defined zone information and/or an object location event
`
`information access
`
`code
`
`can be
`
`associated with object
`
`location event
`
`information.”
`
`(Specification [OO47]). Thus, the specification fully supports associating mobile device location
`
`information and event information with one or more information access codes to manage the
`
`conveyance of information. For example, “an object location information access code can
`
`specify individual users or groups allowed access to the object
`
`location information.”
`
`(Specification [OO72])
`
`The specification supports events being based on crossing a zone boundary, e.g., “If the
`
`GPS receiver indicates a user’s location passes over a zone boundary, an exit or entry alert is
`
`issued (Specification [OO92]) or “Object location events are defined such that each hiker receives
`
`an email on their smart phone whenever another hiker enters or exits a zone.” (Specification
`
`[OO88]). Moreover, the specification supports creating second events that are other than the
`
`events, for example, “a user could define two zones. .
`
`. .” (Specification [OO73])
`
`l7
`
`l7
`
`17
`
`
`
`The specification discloses using “location information to track vehicles, packages,
`
`people, etc. and to enable a variety of location aware applications.” (Specification [OOO2]) FIG.
`
`1 of the specification reproduced below “also illustrates various examples of objects (e.g.,
`
`devices, things, people, vehicles, animals, etc.) that can be associated with location information
`
`sources enabling object
`
`location information to be conveyed to computing devices.”
`
`(Specification page [OO44]) The specification thus supports various implementations of location
`
`aware applications involving drivers and vehicles for delivery of packages.
`
`“In the system and method of the present invention, an object can comprise any device,
`
`thing, person or entity that can be located or tracked.” (Specification [OO4l]) “Such objects may
`
`be outdoors or indoors and may be included within another object”
`
`(Specification [OO44]) ..
`
`associated with a second location information
`
`suited for indoor operations” (Specification
`
`[OO69]). According to the specification “one or more coordinate systems established by an
`
`administrator or by a user of an information-sharing environment can be used to provide object
`
`location information” Id., with “means for translating between coordinate system” that are
`
`“based upon the location information source(s) used” Id.
`
`18
`
`18
`
`18
`
`
`
`
`
`F165. 1
`
`The specification states “when a user associates multiple location information sources
`
`with an object, the user can determine whether or how the object location information is used
`
`(eg., combined)” (Specification [OO70]). The specificantion discloses a second information
`
`source comprisng a proximity device. As an example, of proximity device specification
`
`discloses Bluetooth.
`
`(Specification [0096] FIG. 11). The specification futher disclsoes “near
`
`field electromagnetic ranging location systems” otherwise knowns as NFC devices (Specification
`
`[0045]).
`
`Claim Rejections -35 USC § 103
`
`Claims 1-16 stand rejected under 35 U.S.C. 103 as being unpatentable over Torvinen et
`
`al. in US 2005/0113123 A1 (Torvinen) and Barnett (Pub. No.: 2002/0095499 A1).
`
`19
`
`19
`
`19
`
`
`
`Torvinen states that “Often, multiple service subscribers are in need of a single service,
`
`where individual sessions between each subscriber and the content server are required. As such,
`
`large amounts of resources such as memog and transmission bandwidth are needlessly
`
`consumed from the server, since each subscriber requiring service additively drains the server's
`
`resources.” (Torvinen [OOO3]) Torvinen identifies delays and consumption of large amounts of
`
`resources and transmission bandwidth as the drawbacks. Torvinen shares group chat sessions,
`
`and downloading to facilitate the location based group session.
`
`Torvinen allows an organization to define a group session based upon location of a
`
`number participating terminals and a criterion, e.g., a region of interest such as a library. The
`
`group session occurs based the determination of proximity of terminals to the region of interest.
`
`When the event occurs, an invitation is sent to a terminal meeting the criteria to join a group
`
`session (See, Torvinen, Abstract), i.e., a demonstration. In Torvinen, those terminals that do not
`
`wish to participate in the demonstration would decline the invitation.” (Torvinen [OO59])
`
`Because Torvinen requires inviting terminals to groups that are in the region of interest and
`
`requires the terminal to accept the invitations to join the group session, the grouping in Torvinen
`
`takes place after the region of interest is set, but not before user groups are specified.
`
`As amended, claims require receiving a request to set the zone for the user group after the
`
`user group is defined by the first administrator and receiving a request to set an event for the user
`
`group after the zone is set. These limitations are in contrast to Torvinen where group sessions are
`
`created after the region of interest is specified. Torvinen determines whether a terminal
`
`is
`
`qualified to join the group based on its location and the criteria. Once qualified, Torvinen sends
`
`20
`
`20
`
`20
`
`
`
`an invitation to the qualified terminal to join the group. The qualified terminal in Torvinen joins
`
`the group by accepting the invitation. Under Torvinen, grouping of users occur E a place of
`
`interest is created, but not before the first administrator specified the user groups, as now
`
`expressly required by the amended claims.
`
`As stated above, the amended claim 1 now also requires controlling access to location
`
`information and event information based one or more information access codes specified by a
`
`second administrator having a second level administrative privilege authorized by a first
`
`administrator. The first administrator defines a plurality of groups after which access privileges
`
`to event information associated with the plurality of groups is controlled based on the access
`
`codes. Claims 4 and 17 specifically require conveying location information other than event
`
`information based on the information access code specified for the group under the second level
`
`of administrative privilege.
`
`Barnett teaches a first level administrator that defines groups and then defines various
`
`(second level) administrators for administering the groups, where the various second level
`
`administrators can define sub-groups within their respective group.
`
`(Barnett,
`
`[OO29]) It
`
`is
`
`respectfully submitted that Barnett does not teach conveying information based on access codes,
`
`let alone access codes specified by second level administrators. The word “code” is only
`
`mentioned in the entire Barnett disclosure twice: “magnetically coded media” (Barnett [OO23])
`
`and “code, which comprises one or more executable instructions for implementing the specified
`
`logical function(s)” (Barnett [OO38]). There is no teaching in Barnett for controlling location
`
`21
`
`21
`
`21
`
`
`
`information and/or event information based on specified access codes under the second level of
`
`administrative privilege as required by the amend claims.
`
`CONCLUSION
`
`In view of the above, it is respectfully submitted that all pending claims are now in
`
`allowable form. Early issuance of a Notice of Allowance is respectfully submitted.
`
`If the
`
`Examiner is of the opinion that the prosecution of this application would be advanced by a
`
`personal interview, the Examiner is invited to telephone undersigned counsel to arrange for such
`
`an interview.
`
`
`Dated: December 31 2016
`
`Respectfully submitted,
`
`By: /Robert S. Babayi/
`Robert S. Babayi
`Registration No.: 33,471
`VECTOR IP LAW GROUP
`
`(202) 446-1481 (Direct)
`(703) 587-3803 (Mobile)
`(202) 446-1485 (Fax)
`Attorney/Agent For Applicant
`
`22
`
`22
`
`22
`
`