throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re Patent Application of:
`Darrell Diem
`
`Art Unit: 2689
`
`Application No: 15/200,592
`
`Examiner: Mohamed Barakat
`
`Confirmation No: 1044
`
`Filed: 07-01-2016
`
`Atty. Docket No: 1 1 14-0003 CON
`
`Customer No: 124657
`
`For; A NOTIFICATION SYSTEM FOR OCCURRENCES OF
`GROUP EVENTS BASED ON ZONE AND LOCATION
`OF MOBILE DEVICES
`
`PATENT TRADEMARK OFFICE
`
`RESPONSE TO NON-FINAL OFFICE ACTION
`
`Commissioner for Patents
`
`P.O. Box 1450
`
`Alexandria, VA 22313-1450
`
`Dear Sir:
`
`INTRODUCTORY COMMENTS
`
`In response to the Office Action dated October 7, 2016, please amend the above-
`
`identified U.S. patent application as follows:
`
`Claims Amendments are reflected in the listing of claims, which begins on page 2 of
`
`this paper.
`
`Remarks/Arguments begin on page 12 of this paper.
`
` GPSNA Ex. 1026
`GPSNA Ex. 1026
`
`1
`
`

`

`CLAIMS
`
`1.
`
`(Currently Amended) A notification system for sending group notifications upon
`
`occurrences of events associated with a plurality of mobile devices of user groups having
`
`corresponding group identification codes that identify the user groups, each user group
`
`comprising one or more users having a user identification code associated with a
`
`corresponding group identification code, the user identification code identifying the user
`
`mobile device locations relative to zones that are independent of mobile device locations,
`
`wherein said events occur based on
`
`said system comprising:
`
`one or more servers configured to:
`
`define check a first level administrative privilege to control user membership in a
`
`E user groups, said user groups being defined by a first administrator having the first level
`
`administrative privilege, said first level administrative privilege being used to authorize a
`
`user in each user group to be a second administrator of a plurality of second administrators,
`
`each second administrator having a corresponding second level administrative privilege
`
`associated with a user group;
`
` control conveyance of event
`
`information te—the—user—greu-p based on one or more information access codes specified by a
`
`second administrator of a user group, said one or more information access codes specifying
`
`one or more users in the user group having access to the event information, wherein the
`
`2
`
`

`

`first level administrative privilege is used to administer a first information sharing
`
`environment (ISE) and the second level administrative privilege is used to administer a
`
`corresponding second ISE of a plurality of second ISEs created within the first ISE; said
`
`first and second ISEs comprising a computing network where the conveyance of the event
`
`information from a server to the groups is controlled or configured, wherein each second
`
`ISE is configured to be administered independent of other second ISEs and the first ISE
`
`using the one or more information access codes;
`
`check the first level administrative privileges before aeleli-rig an—authorizi_nged a
`
`user to be a second administrator of the a user group;
`
`
`provide one or more interfaces for setting zones events and groups notifications
`
`for the user groups based on a corresponding second level administrative privilege
`
`associated with the second administrator;
`
`check a the corresponding second level administrative privilege before providing
`
`
`
`one or more interfaces for setting a zone the Qevents and the gteup a_notifications for the
`
`user group;
`
`receive a reguest to set the zone for the user group after the user group is defined
`
`by the first administrator;
`
`receive a request to set ah E event for the user group after the setting of the
`
`zone;
`
`3
`
`

`

`receive a request to set a—group Q notification for the user group, said request
`
`identifying a recipient of the group notification according to said one or more information
`
`access codes;
`
`determine a mobile device location
`
` ;
`
`compare a Q zone and the mobile device location to determine whether an Q event
`
`occurs;
`
`if the event occurs cause a—group Q notification to be sent to the recipient of the group
`
`notification.
`
`(Currently Amended) The system claimed in claim 1, wherein said mobile device location
`
`corresponds to an indoor location of the mobile device determined using a proximig device
`
`included in the mobile device.
`
`(Original) The notification system claimed in claim 2, wherein said servers are further
`
`configured to determine an outdoor location of the mobile device based on a GPS device
`
`included in the mobile device.
`
`(Currently Amended) The notification system claimed in claim 1, wherein sard group
`
`the one or more servers are configured to control
`
`conveyance of mobile device location information other than event information based on
`
`the one or more information access codes specified by the second administrator of the user
`
`group, said one or more information access codes specifying one or more users in the user
`
`4
`
`4
`
`

`

`group having access to the mobile device location information and the event information,
`
`wherein a mobile device location information corresponds to a coordinate of a mobile
`
`device within a coordinate system corresponding to a map as determined by a location
`
`information source associated with the mobile device" and wherein an event information
`
`comprises at least one condition that relates a mobile device location information to a zone
`
`where the occurrence of the event causes a notification to be sent when a mobile device
`
`crosses a boundag associated with the zone, wherein the first administrator defines the
`
`corresponding user group independent of a location of a zone.
`
`(Currently Amended) The notification system claimed in claim 1 4, wherein said
`
`said first level administrative
`
`privilege is associated with an event information service provider and said second level
`
`administrative privilege is provided by the event information service provider to customers
`
`of the event information service provider, said mobile device identification codes being
`
`associated with vehicles in a plurality of vehicle groups based on the second level
`
`administrative privilege, wherein each vehicle group comprises vehicles used by drivers
`
`associated with corresponding mobile object identification codes under the second level
`
`administrative privilege, said mobile object identification codes being different from the
`
`mobile device identification codes, each mobile object identification code being associated
`
`with a mobile object comprising an NFC device, wherein a second event associated with
`
`the mobile object that is different from the event is determined based on proximity of the
`
`driver to the vehicle as determined using the NFC device.
`
`5
`
`

`

`6.
`
`(Currently Amended) The notification system claimed in claim 5 1, wherein said—seheduled
`
` the one or more servers are further confi gured to
`
`determine occurrence of a second event that is different from the event said second event
`
`being based on a condition associated with one or more mobile objects other the one or
`
`more mobile devices, wherein a mobile object identification code that is different from the
`
`mobile device identification codes is associated with a mobile obj ect, and wherein the
`
`occurrence of the event and the second event is determined based on a mobile device
`
`identification code and the mobile object identification code.
`
`7.
`
`(Currently Amended) The notification system claimed in claim Q -l, wherein the—ene—er
`
`the one or more
`
`servers are further configured to:
`
`receive location information from the mobile device associated with the mobile device
`
`identification code‘ .
`
`receive location information from the mobile object associated with the mobile object
`
`identification code,"
`
`determine occurrence of the event based on the location information from the mobile
`
`device associated with the mobile device identification code; and
`
`determine occurrence of the second event based on the location information from the
`
`mobile object associated with the mobile object identification code.
`
`8.
`
`(Currently Amended) The notification system claimed in claim l -1, wherein the—ene—er
`
`an information
`
`6
`
`

`

`access code specified by a second administrator of a user group comprises a group
`
`identification code.
`
`9.
`
`(Currently Amended) The notification system claimed in claim § -lr, wherein saiel—greu-19
`
`
`
`occurred the information access code comprises an access list that includes a sub-group
`
`identification code associated with a sub-group created within the user group.
`
`10. (Currently Amended) The notification system claimed in claim 9 -l, wherein said-ene—er
`
` s
`
` the one or more servers control access to the one
`
`or more user interfaces for adding a mobile device to a sub-group based on the sub-group
`
`identification code, said second level of administrative privilege comprising a privilege to
`
`create the sub-group, specify the sub-group identification code, and specify the users in the
`
`sub-group.
`
`11. (Currently Amended) The notification system claimed in claim 1, wherein said—ene—er—mere
`
`
`
`an information access code specified by a second
`
`administrator of the user group is authenticated at a central access control station to verify
`
`identity of a user before conveying the event information.
`
`12. (Currently Amended) The system claimed in claim 11, wherein
`
`7
`
`

`

`
`
`information access code is conveyed to the user whose identity is to be verified.
`
`13.
`
`(Currently Amended) The system claimed in claim Q -1-}, wherein
`
`
`
`the one or more servers are configured to further control
`
`conveyance of sensor information other than the location information and the event
`
`information based on the one or more information access codes.
`
`14.
`
`(Currently Amended) The system claimed in claim 1 -1%, wherein
`
`the mobile device location information is
`
`determined using an NFC device.
`
`15.
`
`(Currently Amended) The system claimed in claim H -1-}, wherein
`
`16.
`
`17.
`
`associated with a driver of a vehicle.
`
`the NFC device is
`
`(Currently Amended) The system claimed in claim g -1-}, wherein said leeatien—is—traeked
`
`via—the proximity device comprises a Bluetooth devicem%
`
` .
`
`(New) A notification method for sending notifications upon occurrences of events
`
`associated with a plurality of mobile devices operating in user groups having corresponding
`
`group identification codes that identify the user groups, each user group comprising one or
`
`8
`
`

`

`more users of mobile devices, each user having a user identification code associated with a
`
`corresponding group identification code, the user identification code identifying the user,
`
`wherein said events occur based on mobile device locations relative to zones that are
`
`independent of mobile device locations, said method being implemented by one or more
`
`servers configured to:
`
`check a first level administrative privilege to control user membership in the user
`
`groups, said user groups being defined by a first administrator having the first level
`
`administrative privilege, said first level administrative privilege being used to authorize a
`
`user in each user group to be a second administrator of a plurality of second administrators,
`
`each second administrator having a corresponding second level administrative privilege
`
`associated with a user group,
`
`control conveyance of 1) mobile device location information and 2) event
`
`information other than the mobile device location information based on one or more
`
`information access codes specified by a second administrator of a user group, said one or
`
`more information access codes specifying one or more users in the user group having
`
`access to the mobile device location information and the event information, wherein a
`
`mobile device location information corresponds to a coordinate of a mobile device within a
`
`coordinate system corresponding to a map as determined by a location information source
`
`associated with the mobile device, and wherein an event information comprises at least one
`
`condition that relates a mobile device location information to a zone where the occurrence
`
`of the event causes a notification to be sent when a mobile device crosses a boundary
`
`9
`
`9
`
`

`

`associated with the zone; wherein the first administrator defines the corresponding user
`
`group independent of a location of a zone;
`
`check the first level administrative privilege before authorizing a user to be a
`
`second administrator of a user group;
`
`provide one or more interfaces for setting zones; events and notifications for the
`
`user groups based on a corresponding second level administrative privilege associated with
`
`the second administrator;
`
`check the corresponding second level administrative privilege before providing
`
`one or more interfaces for setting a zone; an event and a notifications for the user group;
`
`receive a request to set the zone for the user group after the user group is defined
`
`by the first administrator;
`
`receive a request to set the event for the user group after the setting of the zone;
`
`receive a request to set the notification for the user group; said request identifying
`
`a recipient of the notification according to said one or more information access codes;
`
`determine a mobile device location;
`
`compare the zone and the mobile device location to determine whether the event occurs;
`
`if the event occurs cause the notification to be sent to the recipient of the notification; and
`
`convey mobile device location information based on the one or more information access
`
`codes.
`
`10
`
`10
`
`10
`
`

`

`18.
`
`(New) The method of claim 17, wherein the first level administrative privilege is used to
`
`administer a first information sharing environment (ISE) and the second level of
`
`administrative privilege is used to administer a corresponding second ISE of a plurality of
`
`second ISEs created within the first ISE, said first and second ISEs comprising a computing
`
`network where the conveyance of the event information from a server to the groups is
`
`controlled or configured, wherein each second ISE is configured to be administered
`
`independent of other second ISEs and the first ISE using the one or more information
`
`access codes.
`
`19.
`
`20.
`
`(New) The method of claim 17, wherein the information access code comprises an access
`
`list that includes one or more user identification codes and a sub-group identification code
`
`associated with a sub-group created within the user group.
`
`(New) The method of claim 17, wherein an information access code specified by the
`
`second administrator of the user group is authenticated at a central access control station to
`
`verify identity of a user before conveying the event information.
`
`ll
`
`ll
`
`11
`
`

`

`REMARKS
`
`The Applicant
`
`thanks the Examiner for the careful consideration of the present
`
`application. System claims 1-16 have been amended as shown above. New method claims 17-20
`
`are newly added. Claims 1-20 remain pending.
`
`Information Disclosure Statement
`
`The undersigned records that an IDS filed on December 20th, 2016 discloses IPR
`
`Decisions issued in related patents.
`
`Claim Objection
`
`The Action has objected to claim 11.
`
`Claim 11 has been amended along with other
`
`claims, the support for which is set forth below.
`
`Specification Support for Claim Amendments
`
`The pending claims of the application have been amended to more clearly distinguish
`
`them over the prior art of record. As amended, claims now require a plurality of groups of users
`
`of mobile devices based on corresponding identification codes that identify each user or group or
`
`mobile device associated with a group. Each user in a user group has a user identification code
`
`associated with a group identification code. The claims are further amended to require one or
`
`more information access codes that specify for each user group one or more users or sub-groups
`
`in the user group having access to information associated with the user group.
`
`According to the amended claims,
`
`a first administrator based on a first
`
`level
`
`administrative privilege specifies a second administrator which has a second level administrative
`
`privilege for a user group used to specify the one or more information access codes. The first
`
`12
`
`12
`
`12
`
`

`

`level administrative privilege is used to authorize a user in each user group to be a second
`
`administrator of a plurality of second administrators. The second administrator is authorized to
`
`control conveyance of location and/or event information regarding the user group based on the
`
`one or more information access codes specified under the second level administrative privilege.
`
`The first level administrative privilege can be used to administer a first information sharing
`
`environment
`
`(ISE) and the second level administrative privilege is used to administer a
`
`corresponding second ISE of a plurality of second ISEs created within the first ISE. The first
`
`and second ISEs comprise a computing network where the conveyance of the event information
`
`or mobile device location information from a server to the groups is controlled or configured.
`
`Using the one or more information access codes, each second ISE is configured to be
`
`administered independent of other second ISEs and the first ISE.
`
`According to other amended claims, e. g., claims 4 and 17, such information includes two
`
`types of information: 1) mobile device location information and 2) event information other than
`
`mobile device location information. Claims define mobile device location information as
`
`corresponding to a coordinate of a mobile device as determined by a location information source
`
`associated with the mobile device. The claims further define event information differently from
`
`location information as being a condition that relates a mobile device location information to a
`
`zone that defines an event where the occurrence of the event causes an alert to be sent when a
`
`mobile device crosses a boundary associated with the zone. Access to mobile device location
`
`information and to event information associated with a user group is controlled based on the one
`
`13
`
`13
`
`13
`
`

`

`or more information access codes specified by a corresponding second administrator of a user
`
`group.
`
`It
`
`is respectfully submitted that
`
`the above amendments are fully supported by the
`
`specification. According to the specification, “one or more administrators may be given
`
`privileges to configure the information-sharing environment. Such configuration could include
`
`specifying authorized users of the environment and their access privileges,
`
`etc. Such
`
`configuration can also define groups of users as part of an established organizational structure
`
`associated with the information-sharing environment.” (Specification [OO43]) Thus,
`
`the
`
`specification
`
`supports groups being defined by
`
`administrators having corresponding
`
`administrative privileges. “Because smaller information-sharing environments can exist within
`
`larger information-sharing information environments, various levels of administrator privileges
`
`can exist.”
`
`(Specification [OO43]) Thus,
`
`the
`
`specification supports various
`
`levels of
`
`administrative privilege, including first level and second level of administrative privileges. The
`
`specification states that “an administrator can define one or more groups to which a given user
`
`can be associated. Groups may be defined in accordance with an organizational structure or
`
`hierarchy. For example, an administrator for an information-sharing environment corresponding
`
`to a company may define groups for the various organizations within the company, such as legal,
`
`accounting, shipping, etc., and for groups of users not based on organization, such as executive,
`
`management, administrative, exempt employees, nonexempt employees, etc. After a group has
`
`been defined, the administrator can associate individual users with one or more of the defined
`
`groups.
`
`Similarly, a parent administering an information-sharing environment might define
`
`l4
`
`l4
`
`14
`
`

`

`groups such as parents, teenagers, children, drivers, and so forth.....As such, a user may be
`
`associated with one or more
`
`groups defined by an administrator of an information-sharing
`
`environment.” (Specification [OO67]). Thus,
`
`the specification supports second administrators
`
`having a second level administrative privilege to specify who is authorized to receive location
`
`and/or event information by specifying corresponding information access codes.
`
`The specification states “the present invention can be implemented in a variety of
`
`information-sharing environments. The sharing of information may be managed among a small
`
`number of users such as a family or group of friends, or among a very large number of users such
`
`as among employees of very large business, or among a worldwide user base such as a might be
`
`provided via an Internet service. Furthermore, information-sharing environments may involve
`
`information-sharing environments within information-sharing environments. That
`
`is, one or
`
`more smaller information-sharing environments may overlap or coexist independent of each
`
`other within one or more larger information sharing environments.” (Specification [OO42]) Thus,
`
`the specification supports creating a plurality of second information-sharing environments (ISEs)
`
`within a first ISE.
`
`In addition to overlapping information-sharing environments (ISEs), the
`
`present specification supports second ISEs that are independent of each other and the first ISE.
`
`According to the specification, “codes would typically include an identifier (e.g., a user
`
`account name or user number) and can be associated with one or more groups, and one or more
`
`information access privilege classifications. For example, a given user may be included in a
`
`group indicating members of a family, a company, a club, or an association. Similarly,
`
`employees of a company may belong to one or more defined groups within the company (e. g.,
`
`l5
`
`l5
`
`15
`
`

`

`Management, Engineering, Accounting, etc.).” (Specification [OO46]) “For example, an Internet
`
`service based on the present invention can be provided and administered such that anyone having
`
`access to the Internet can purchase the service and be an authorized user. A purchaser of the
`
`service can set up a company-wide information-sharing environment within the larger world-
`
`wide inforination-sharing environment
`
`that
`
`includes company employees, affiliates, Board
`
`members, guests, etc. A division within a company may set up its own information-sharing
`
`environment, and so on. A family can set up its own information-sharing environment and an
`
`individual may set up his or her own information-sharing environment. As such, each
`
`information sharing environment can be administered so as
`
`to manage conveyance of
`
`information among computing devices based on user identification codes.”
`
`(Specification
`
`[OO46]) Thus, the specification describes controlling conveyance of information based on access
`
`codes specified by a second level administrator, e.g., a family, who can associate group
`
`identification codes with user identifiers. The specification further describes a group, e.g., a
`
`company, being divided into sub-groups (e.g., divisions) having corresponding identifiers.
`
`According to the specification, “an access code specifies the individual users and/or
`
`groups of users having access to the information to which the access code is associated. Such an
`
`access code would typically include specific user identification codes and/or group codes.”
`
`(Specification, [OO47]). The specification further states “The user identification code may also be
`
`associated with one or more groups having corresponding group identification codes. The user
`
`identification code and group identification code(s) are compared to those included in the access
`
`code whereby a match would indicate the user is authorized to receive the information. As such,
`
`16
`
`16
`
`16
`
`

`

`the information is conveyed to those computing devices that are associated with the users having
`
`access to the information as specified by the access code.” Id. Thus, the specification clearly
`
`describes access codes comprising group identification codes, sub-group identification and user
`
`identification codes used to define who gets access to information in a group in order to protect
`
`group privacy.
`
`The specification states “access codes can be associated with information to manage the
`
`conveyance of the information to computing devices. Specifically, an object location information
`
`access code can be associated with object location information. A user-defined zone information
`
`access code can be associated with user-defined zone information and/or an object location event
`
`information access
`
`code
`
`can be
`
`associated with object
`
`location event
`
`information.”
`
`(Specification [OO47]). Thus, the specification fully supports associating mobile device location
`
`information and event information with one or more information access codes to manage the
`
`conveyance of information. For example, “an object location information access code can
`
`specify individual users or groups allowed access to the object
`
`location information.”
`
`(Specification [OO72])
`
`The specification supports events being based on crossing a zone boundary, e.g., “If the
`
`GPS receiver indicates a user’s location passes over a zone boundary, an exit or entry alert is
`
`issued (Specification [OO92]) or “Object location events are defined such that each hiker receives
`
`an email on their smart phone whenever another hiker enters or exits a zone.” (Specification
`
`[OO88]). Moreover, the specification supports creating second events that are other than the
`
`events, for example, “a user could define two zones. .
`
`. .” (Specification [OO73])
`
`l7
`
`l7
`
`17
`
`

`

`The specification discloses using “location information to track vehicles, packages,
`
`people, etc. and to enable a variety of location aware applications.” (Specification [OOO2]) FIG.
`
`1 of the specification reproduced below “also illustrates various examples of objects (e.g.,
`
`devices, things, people, vehicles, animals, etc.) that can be associated with location information
`
`sources enabling object
`
`location information to be conveyed to computing devices.”
`
`(Specification page [OO44]) The specification thus supports various implementations of location
`
`aware applications involving drivers and vehicles for delivery of packages.
`
`“In the system and method of the present invention, an object can comprise any device,
`
`thing, person or entity that can be located or tracked.” (Specification [OO4l]) “Such objects may
`
`be outdoors or indoors and may be included within another object”
`
`(Specification [OO44]) ..
`
`associated with a second location information
`
`suited for indoor operations” (Specification
`
`[OO69]). According to the specification “one or more coordinate systems established by an
`
`administrator or by a user of an information-sharing environment can be used to provide object
`
`location information” Id., with “means for translating between coordinate system” that are
`
`“based upon the location information source(s) used” Id.
`
`18
`
`18
`
`18
`
`

`

`
`
`F165. 1
`
`The specification states “when a user associates multiple location information sources
`
`with an object, the user can determine whether or how the object location information is used
`
`(eg., combined)” (Specification [OO70]). The specificantion discloses a second information
`
`source comprisng a proximity device. As an example, of proximity device specification
`
`discloses Bluetooth.
`
`(Specification [0096] FIG. 11). The specification futher disclsoes “near
`
`field electromagnetic ranging location systems” otherwise knowns as NFC devices (Specification
`
`[0045]).
`
`Claim Rejections -35 USC § 103
`
`Claims 1-16 stand rejected under 35 U.S.C. 103 as being unpatentable over Torvinen et
`
`al. in US 2005/0113123 A1 (Torvinen) and Barnett (Pub. No.: 2002/0095499 A1).
`
`19
`
`19
`
`19
`
`

`

`Torvinen states that “Often, multiple service subscribers are in need of a single service,
`
`where individual sessions between each subscriber and the content server are required. As such,
`
`large amounts of resources such as memog and transmission bandwidth are needlessly
`
`consumed from the server, since each subscriber requiring service additively drains the server's
`
`resources.” (Torvinen [OOO3]) Torvinen identifies delays and consumption of large amounts of
`
`resources and transmission bandwidth as the drawbacks. Torvinen shares group chat sessions,
`
`and downloading to facilitate the location based group session.
`
`Torvinen allows an organization to define a group session based upon location of a
`
`number participating terminals and a criterion, e.g., a region of interest such as a library. The
`
`group session occurs based the determination of proximity of terminals to the region of interest.
`
`When the event occurs, an invitation is sent to a terminal meeting the criteria to join a group
`
`session (See, Torvinen, Abstract), i.e., a demonstration. In Torvinen, those terminals that do not
`
`wish to participate in the demonstration would decline the invitation.” (Torvinen [OO59])
`
`Because Torvinen requires inviting terminals to groups that are in the region of interest and
`
`requires the terminal to accept the invitations to join the group session, the grouping in Torvinen
`
`takes place after the region of interest is set, but not before user groups are specified.
`
`As amended, claims require receiving a request to set the zone for the user group after the
`
`user group is defined by the first administrator and receiving a request to set an event for the user
`
`group after the zone is set. These limitations are in contrast to Torvinen where group sessions are
`
`created after the region of interest is specified. Torvinen determines whether a terminal
`
`is
`
`qualified to join the group based on its location and the criteria. Once qualified, Torvinen sends
`
`20
`
`20
`
`20
`
`

`

`an invitation to the qualified terminal to join the group. The qualified terminal in Torvinen joins
`
`the group by accepting the invitation. Under Torvinen, grouping of users occur E a place of
`
`interest is created, but not before the first administrator specified the user groups, as now
`
`expressly required by the amended claims.
`
`As stated above, the amended claim 1 now also requires controlling access to location
`
`information and event information based one or more information access codes specified by a
`
`second administrator having a second level administrative privilege authorized by a first
`
`administrator. The first administrator defines a plurality of groups after which access privileges
`
`to event information associated with the plurality of groups is controlled based on the access
`
`codes. Claims 4 and 17 specifically require conveying location information other than event
`
`information based on the information access code specified for the group under the second level
`
`of administrative privilege.
`
`Barnett teaches a first level administrator that defines groups and then defines various
`
`(second level) administrators for administering the groups, where the various second level
`
`administrators can define sub-groups within their respective group.
`
`(Barnett,
`
`[OO29]) It
`
`is
`
`respectfully submitted that Barnett does not teach conveying information based on access codes,
`
`let alone access codes specified by second level administrators. The word “code” is only
`
`mentioned in the entire Barnett disclosure twice: “magnetically coded media” (Barnett [OO23])
`
`and “code, which comprises one or more executable instructions for implementing the specified
`
`logical function(s)” (Barnett [OO38]). There is no teaching in Barnett for controlling location
`
`21
`
`21
`
`21
`
`

`

`information and/or event information based on specified access codes under the second level of
`
`administrative privilege as required by the amend claims.
`
`CONCLUSION
`
`In view of the above, it is respectfully submitted that all pending claims are now in
`
`allowable form. Early issuance of a Notice of Allowance is respectfully submitted.
`
`If the
`
`Examiner is of the opinion that the prosecution of this application would be advanced by a
`
`personal interview, the Examiner is invited to telephone undersigned counsel to arrange for such
`
`an interview.
`
`
`Dated: December 31 2016
`
`Respectfully submitted,
`
`By: /Robert S. Babayi/
`Robert S. Babayi
`Registration No.: 33,471
`VECTOR IP LAW GROUP
`
`(202) 446-1481 (Direct)
`(703) 587-3803 (Mobile)
`(202) 446-1485 (Fax)
`Attorney/Agent For Applicant
`
`22
`
`22
`
`22
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket