throbber
Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 1 of 12
`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 1 of 12
`
`EXHIBIT 3
`EXHIBIT 3
`
`
`
`
`
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 2 of 12
`
`•
`
`UNITED APS DEPARTMENT OF COMMERCE
`
`Patent and Trademark Office
`Address: COMMISSIONER OF PATENTS AND TRADEMARKS
`Washington, D.C. 20231
`
`APPLICATION NO.
`
`FILING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET
`
`09/164, s77 10/01/98 MULLOR
`
`P
`
`TM02/1220
`
`T
`
`SPENCER AND FRANK
`SUITE 300 EAST
`1100 NEW YORK AVENUE NW
`WASHINGTON DO 20005-3955
`
`1\1
`
`REINC4237.01
`
`EXAMINER
`
`l.-4PWTTT C
`ART UNIT
`
`PAPER NUMBER
`
`21o1
`DATE MAILED:
`
`12/20/00
`
`Please find below and/or attached an Office communication concerning this application or
`proceeding.
`
`Commissioner of Patents and Trademarks
`
`PTO-90C (Rev. 2/95)
`
`'U.S. GPO: 2000-473-000/44602
`
`1- File Copy
`
`ANCORA_00000322
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 3 of 12
`
`Office Action Summary
`
`Application No.
`
`Applicant(s)
`
`09/164,777
`
`Examiner
`
`MULLOR ET AL.
`
`Art Unit
`
`2161
`Calvin L Hewitt II
`-- The MAILING DATE of this communication appears on the cover sheet with the correspondence address --
`Period for Reply
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE 3 MONTH(S) FROM
`THE MAILING DATE OF THIS COMMUNICATION.
`- Extensions of time may be available under the provisions of 37 CFR 1.136 (a). In no event, however, may a reply be timely filed
`after SIX (6) MONTHS from the mailing date of this communication.
`- If the period for reply specified above is less than thirty (30) days, a reply within the statutory minimum of thirty (30) days will be considered timely.
`- If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`- Any reply received by the Office later than three months after the mailing date of this communication, even if timely filed, may reduce any
`earned patent term adjustment. See 37 CFR 1.704(b).
`Status
`1)E Responsive to communication(s) filed on 01 December 2000 .
`2b)Z This action is non-final.
`2a)0 This action is FINAL.
`3)0 Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.
`
`Disposition of Claims
`is/are pending in the application.
`4)0 Claim(s)
`is/are withdrawn from consideration.
`4a) Of the above claim(s)
` is/are allowed.
`5)0 Claim(s)
`6)0 Claim(s) 1-15 is/are rejected.
` is/are objected to.
`7)0 Claim(s)
`are subject to restriction and/or election requirement.
`8)0 Claims
`
`Application Papers
`9)0 The specification is objected to by the Examiner.
` is/are objected to by the Examiner.
`10)0 The drawing(s) filed on
` is: a)0 approved b)0 disapproved.
`11)0 The proposed drawing correction filed on
`12)0 The oath or declaration is objected to by the Examiner.
`
`Priority under 35 U.S.C. 119
`13)0 Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d).
`a)E All b)0 Some * c)0 None of:
`1.0 Certified copies of the priority documents have been received.
`2.E Certified copies of the priority documents have been received in Application No. 2.
`3.0 Copies of the certified copies of the priority documents have been received in this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`* See the attached detailed Office action for a list of the certified copies not received.
`14)0 Acknowledgement is made of a claim for domestic priority under 35 U.S.C. & 119(e).
`
`Attachment(s)
`15) E Notice of References Cited (PTO-892)
`16) q Notice of Draftsperson's Patent Drawing Review (PTO-948)
`17) q Information Disclosure Statement(s) (PTO-1449) Paper No(s)
`
`18) q Interview Summary (PTO-413) Paper No(s).
`Notice of Informal Patent Application (PTO-152)
`19) q
`20) q Other:
`
`U.S. Patent and Trademark Office
`PTO-326 (Rev. 9-00)
`
`Office Action Summary
`
`Part of Paper No. 5
`
`ANCORA_00000323
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 4 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 2
`
`Status of Claims
`
`1.
`
`Claims 1-15 have been examined.
`
`Response to Applicants' Request
`
`2.
`
`Applicant's desire for clarity regarding the Examiner's Office Action dated
`
`October 18, 2000 has been noted. In response, the Examiner has written another Office
`
`Action that the Examiner believes speaks directly to the issues raised by the Applicants.
`
`Claim Rejections - 35 USC § 102
`
`3.
`
`The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that
`
`form the basis for the rejections under this section made in this Office action:
`
`A person shall be entitled to a patent unless —
`
`(e) the invention was described in a patent granted on an application for patent by another filed in the United
`States before the invention thereof by the applicant for patent, or on an international application by another who
`has fulfilled the requirements of paragraphs (1), (2), and (4) of section 371(c) of this title before the invention
`thereof by the applicant for patent.
`
`Claims 1-4, 6 and 10-13 are rejected under 35 U.S.C. 102(e) as being clearly anticipated
`
`by Ginter et al U.S. Patent No. 5,892,900.
`
`As per claim 1, Ginter et al teach of a system and method for secure transactions
`
`management and electronic rights protection that:
`
`ANCORA_00000324
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 5 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 3
`
`•
`
`restricts software operation within a license limitation (column 5, lines 29-41; column
`
`6, lines 29-65; column 7, lines 45-57)
`
`• utilizes a computer that has a first non-volatile memory area (column 70, lines 40-65)
`
`, a second non-volatile memory area (column 70, lines 40-65) and a volatile memory
`
`area (column 71, lines 12-25)
`
`• provides a means of selecting a program residing in the volatile memory (column 71,
`
`lines 25-27 and column 82, lines 12-52)
`
`•
`
`sets up a verification structure in the non-volatile memories (column 70, lines 23-53
`
`and column/line 63/67-64/15)
`
`• verifies the program using the structure (column 70, lines 23-53 and column/line
`
`63/67-64/15)
`
`•
`
`and acts on the program according to the verification (column 70, lines 23-53 and
`
`column/line 63/67-64/15).
`
`As per claim 2, the method and system of Ginter et al provide for a license
`
`authorization bureau in the form of a VDE (virtual distribution environment) distributor
`
`and/or administrator (column/line 278/40 to 281/44).
`
`As per claim 3, the method and system of Ginter et al discloses a verification method
`
`with a license authorization bureau that comprises of:
`
`ANCORA_00000325
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 6 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 4
`
`• a two-way data communication link between said bureau and end-user computer
`
`(figure 77)
`
`• a method for establishing end-user rights (column/line 278/40 to 281/44)
`
`• data encryption using keys (column 281, lines 10-22)
`
`•
`
`creating a license record from the selected program at the bureau (column 71,
`
`lines 25-27, column 82, lines 12-52, column/line 278/40 to 281/44 and column 15,
`
`lines 10-34).
`
`As per claim 4,-the method and system of Ginter et al also provides a means of
`
`encrypting the license record for the selected program from the second volatile memory
`
`(column/line 65/55 to 66/47).
`
`As per claim 6, the method and system of Ginter et al provides a means for
`
`establishing a licensed software program. Where said program contains license record
`
`data and is found in the volatile memory (column 71, lines 25-27, column 82, lines 12-52,
`
`column/line 278/40 to 281/44, column 15, lines 10-34, figure 8 and column 96, lines 37-
`
`41).
`
`As per claim 10, the method and system of Ginter et al provide a means for restricting
`
`a program's operation with predetermined limitations if the authorization is invalid
`
`(column 279, lines 21-32).
`
`As per claim 11, the method and system of Ginter et al provide for a ROM BIOS
`
`(figure 69G and column 70, lines 39-53).
`
`ANCORA_00000326
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 7 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 5
`
`As per claim 12, the method and system of Ginter et al provide for an EEPROM
`
`BIOS (figure 69G and column 70, lines 54-65).
`
`As per claim 13, the method and system of Ginter et al provide for volatile RAM
`
`(column 71, lines 22-25).
`
`Claim Rejections - 35 USC § 103
`
`4.
`
`The following is a quotation of 35 U.S.C. 103(a) which forms the basis for all
`
`obviousness rejections set forth in this Office action:
`
`(a) A patent may not be obtained though the invention is not identically disclosed or described as set forth in
`section 102 of this title, if the differences between the subject matter sought to be patented and the prior art are
`such that the subject matter as a whole would have been obvious at the time the invention was made to a person
`having ordinary skill in the art to which said subject matter pertains. Patentability shall not be negatived by the
`manner in which the invention was made.
`
`5.
`
`Claims 5 and 7-9 are rejected under 35 U.S.C. 103(a) as being unpatentable over
`
`Ginter et al U.S. Patent No. 5,892,900 as applied to claims 1, 3, 4 and 6 above, and
`
`further in view of Goldman et al 5,684,951.
`
`As per claim 5, Ginter et al disclose a verification structure. In addition, Ginter et
`
`al disclose a system and method for secure transaction management and electronic rights
`
`protection utilizing encryption keys (column 206, lines 57-65).
`
`However, Ginter et al do not disclose pseudo unique keys. Goldman et al teach of a
`
`method and system for user authorization over a multi-user computer system. In said
`
`system, a user has valid id but lacks an authorized means of access. In order to access the
`
`desired data, a user is sent a pseudo unique key (abstract, lines 19-21) that is derived from
`
`•
`
`ANCORA_00000327
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 8 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 6
`
`a user id and the current IP address. By utilizing such a method a valid user can be
`
`provided access to secured data without comprising the security of the larger system.
`
`Therefore, it would have been obvious to a person of ordinary skill in the art of
`
`encryption, to incorporate pseudo unique keys into the system of Ginter et al.
`
`As per claim 7, Ginter et al teach of a method and system for electronic rights
`
`protection comprising of volatile memory, non-volatile memory, license records location
`
`and licensed software programs (column 5, lines 29-41; column 6, lines 29-65; column
`
`15, lines 10-34; column/line 63/67-64/15; column/line 65/55-66-47; column 70, lines 23-
`
`65; column 71, lines 12-27; column 96, lines 37-41; column/line 278/40-281/44). Ginter
`
`et al also use encryption keys (column 206, lines 57-65). However, Ginter et al do not
`
`make use of pseudo unique keys in their system. Goldman et al teach of a method and
`
`system for user authorization over a multi-user computer system through the use of
`
`pseudo unique keys (abstract, lines 19-23). In said system, a user has valid id but lacks an
`
`authorized means of access. In order to access the desired data, a user is sent a pseudo
`
`unique key that is derived from a user id and the current IP address. By utilizing such a
`
`method a valid user can be provided access to secured data without comprising the
`
`security of the larger system. Therefore, it would have been obvious to a person of
`
`ordinary skill in the art of the time the invention was made to utilize pseudo unique keys
`
`in the system of Ginter et al.
`
`ANCORA_00000328
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 9 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 7
`
`As per claim 8, Ginter et al disclose a method for authoring content that includes
`
`encryption keys (column/line 282/ 33 to 283/34). Ginter et al disclose a method for
`
`selecting a licensed software program from the volatile memory to form a license record.
`
`However, Ginter et al do not use pseudo unique keys for purposes of encryption.
`
`Goldman et al teach of a method and system for user authorization over a
`
`multi-user computer system through the use of pseudo unique keys (abstract, lines 19-
`
`23). In said system, a user has valid id but lacks an authorized means of access. In order
`
`to access the desired data, a user is sent a pseudo unique key that is derived from a user id
`
`and the current IP address. By utilizing such a method a valid user can be provided access
`
`to secured data without comprising the security of the larger system. Therefore it would
`
`have been obvious to a person of ordinary skill in the art at the time the invention was
`
`made to use pseudo unique keys.
`
`As per claim 9, Ginter et al teach of a system and method for encrypting and
`
`decrypting of licensing related communications between end-user(s) and a license
`
`authorization bureau (column/line 282/33 to 283/34 and 168/25 to 169/40). Ginter et al
`
`also teach of volatile and non-volatile memory areas used in conjunction with licensed
`
`software programs (columns 70-72, column 82, lines 12-52, column/line 278/40 to
`
`281/44, column 15, lines 10-34, figure 8 and column 96, lines 37-41). However, Ginter et
`
`al do not disclose pseudo unique keys. Goldman et al provide for the use of pseudo
`
`unique keys (abstract, 19-23). Therefore, it would have been obvious to a person of
`
`ordinary skill in the art at the time the invention was made, to incorporate pseudo unique
`
`keys into the system of Ginter et al.
`
`ANCORA_00000329
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 10 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 8
`
`6.
`
`Claims 14 and 15 are rejected under 35 U.S.C. 103(a) as being unpatentable over
`
`Ginter et al, U.S. Patent No. 5,892,900 in view of Goldman et al U.S. Patent No.
`
`5,684,951.
`
`As per claims 14 and 15, Ginter et al. disclose a rights management system for
`
`restricting software operation (column 5, lines 29-41; column 6, lines 29-65; column 7,
`
`lines 45-57). Further, in order to execute said rights management system, Ginter et al.
`
`disclose read only memory (ROM) that may be used store encryption key information.
`
`Ginter et al. also disclose ROM components, such as masked ROM and EEPROM, that
`
`store permanent portions of code that interface with the encryption and decryption engine
`
`(column/line 70/54-71/11). Recall, Ginter et al utilize encryption keys as a method of
`
`encryption (column/line 67/48-68/16). However, Ginter et al. do not disclose pseudo
`
`unique keys. Goodman et al disclose pseudo unique keys (abstract, lines 19-23) and
`
`provides for the storage in a memory unit (column 8, lines 11-12). In said system, a user
`
`has valid id but lacks an authorized means of access. In order to access the desired data, a
`
`user is sent a pseudo unique key that is derived from a user id and the current IP address.
`
`By utilizing such a method a valid user can be provided access to secured data without
`
`comprising the security of the larger system. Therefore, it would have been obvious
`
`ANCORA_00000330
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 11 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 9
`
`Conclusion
`
`7.
`
`The prior art made of record and not relied upon is considered pertinent to
`
`applicant's disclosure:
`
`• Richardson , III teaches a system for software protection
`
`8.
`
`Any inquiry concerning this communication or earlier communications from the
`
`examiner should be directed to Calvin Loyd Hewitt II whose telephone number is (703)
`
`305-0625. The examiner can normally be reached on Monday-Friday from 8:30 AM —
`
`5:00 PM.
`
`If attempts to reach the examiner by telephone are unsuccessful, the examiner's
`
`supervisor, James P. Trammell, can be reached at (703) 305-9768.
`
`Any response to this action should be mailed to"
`
`Commissioner of Patents and Trademarks
`
`C/o Technology Center 2700
`
`Washington, D.C. 20231
`
`or faxed to:
`
`(703) 308-9051 (for formal communications intended for entry)
`
`or:
`
`(703) 308-5397 (for informal or draft communications, please label
`
`ANCORA_00000331
`
`

`

`Case 1:20-cv-00034-ADA Document 45-5 Filed 03/20/20 Page 12 of 12
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 10
`
`"PROPOSED" or "DRAFT")
`
`Hand-delivered responses should be brought to Crystal Park II, 2121 Crystal Drive,
`
`Arlington, VA, Sixth Floor (Receptionist).
`
`Any inquiry of a general nature or relating to the status of this application should be
`
`directed to the Group receptionist whose telephone number is (703) 305-3900.
`
`Calvin Loyd Hewitt II
`
`December 4, 2000
`
`ANCORA_00000332
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket