throbber
Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 1 of 16
`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 1 of 16
`
`
`
`EXHIBIT 5
`
`EXHIBIT 5
`
`
`
`
`
`
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 2 of 16
`UNITED STA
`EPARTMENT OF COMMERCE
`Patent and Trademark Office
`Address: COMMISSIONER OF PATENTS AND TRADEMARKS
`Washington, D.C. 20231
`
`APPLICATION NO.
`
`FILING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`09/164,777 10/01/98
`
`MULLOR
`
`T
`
`SPENCER AND FRANK
`SUITE 300 EAST
`1100 NEW YORK AVENUE NW
`WASHINGTON DC 2000S-958
`
`TM01/0622
`
`7
`
`REINC4237.01
`
`EXAMINER
`
`HFIA .....
`ART UNIT
`
`.. .FT r
`
`PAPER NUMBER
`
`2161
`DATE MAILED: —
`OE / 22/ 0 1
`
`Please find below and/or attached an Office communication concerning this application or
`proceeding.
`
`Commissioner of Patents and Trademarks
`
`PTO-90C (Rev. 2/95)
`
`*U.S. GPO: 2000-473-000/44602
`
`1- File Copy
`
`ANCORA_00000350
`
`

`

`• •
`
`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 3 of 16
`
`Office Action Summary
`
`Application No.
`
`Applicant(s)
`
`09/164,777
`
`Examiner
`
`MULLOR ET AL.
`
`Art Unit
`
`2161
`Calvin L Hewitt II
`-- The MAILING DATE of this communication appears on the cover sheet with the correspondence address --
`Period for Reply
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE 3 MONTH(S) FROM
`THE MAILING DATE OF THIS COMMUNICATION.
`Extensions of time may be available under the provisions of 37 CFR 1.136 (a). In no event, however, may a reply be timely filed
`after SIX (6) MONTHS from the mailing date of this communication.
`If the period for reply specified above is less than thirty (30) days, a reply within the statutory minimum of thirty (30) days will be considered timely.
`If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication, even if timely filed, may reduce any
`earned patent term adjustment. See 37 CFR 1.704(b).
`Status
`1)E1 Responsive to communication(s) filed on 21 May 2001 .
`2b)0 This action is non-final.
`2aa This action is FINAL.
`3)0 Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.
`
`Disposition of Claims
` is/are pending in the application.
`4)0 Claim(s)
` is/are withdrawn from consideration.
`4a) Of the above claim(s)
`is/are allowed.
`5)0 Claim(s)
`6)12g Claim(s) 1-13 and 16-20 is/are rejected.
` is/are objected to.
`7)0 Claim(s)
`are subject to restriction and/or election requirement.
`8)0 Claims
`
`Application Papers
`9)0 The specification is objected to by the Examiner.
`is/are objected to by the Examiner.
`10)0 The drawing(s) filed on
`is: a)0 approved b)0 disapproved.
`11)0 The proposed drawing correction filed on
`12)0 The oath or declaration is objected to by the Examiner.
`
`Priority under 35 U.S.C. § 119
`13)E] Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).
`a)E] All b)0 Some * c)0 None of:
`1.Z Certified copies of the priority documents have been received.
`2.0 Certified copies of the priority documents have been received in Application No.
`3.0 Copies of the certified copies of the priority documents have been received in this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`* See the attached detailed Office action for a list of the certified copies not received.
`14)0 Acknowledgement is made of a claim for domestic priority under 35 U.S.C. § 119(e).
`
`Attachment(s)
`
`15) q Notice of References Cited (1310-892)
`16) q Notice of Draftsperson's Patent Drawing Review (PTO-948)
`17) q Information Disclosure Statement(s) (PTO-1449) Paper No(s)
`
`18) q Interview Summary (PTO-413) Paper No(s).
`19) q Notice of Informal Patent Application (PTO-152)
`20) q Other:
`
`U.S. Patent and Trademark Office
`PTO-326 (Rev. 01-01)
`
`Office Action Summary
`
`Part of Paper No. 7
`
`ANCORA_00000351
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 4 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 2
`
`Status of Claims
`
`1.
`
`Claims 1-13 and 16-20 have been examined.
`
`Response to Arguments and Amendment
`
`2.
`
`The Applicants are of the opinion that the Ginter et al. reference is insufficient as
`
`it is believed that it does not teach, "... setting up a verification structure and verifying
`
`the program using the verification structure". The Examiner will focus his comments to
`
`this matter as other comments regarding the intended use of the claimed invention (e.g.
`
`"stationary object" vs. "travelling object") do not result in a structural difference between
`
`the claimed invention and the prior art. And, if the prior art structure is capable of
`
`performing the intended use, then it meets the claim- See In re Casey, 152 USPQ 235
`
`(CCPA 1967) and In re Otto, 136 USPQ 458, 459 (CCPA 1963). To this end, the
`
`Examiner would like to reiterate that Ginter et al. the system of Ginter et al. supports,
`
`"launchable content" (column/line 24/54-25/27) and maintains, and allows for evolving,
`
`content and content control as it passes through a "chain of handling" (column/line
`
`28/42-32/60).
`
`Regarding verification structure, Ginter et al. create for each VDE object a
`
`permission record (PERC) (column/line 93/5-94/4; column/line 155/38-159/12) that "...
`
`ANCORA_00000352
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 5 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 3
`
`controls how access and/or manipulation permissions are distributed and/or how content
`
`and/or other information may otherwise be used (column 155, lines 46-51). Ginter et al
`
`teach that electronic appliances may include one or more SPUs (column 64, lines 1-4)
`
`and may be a standardized feature on microprocessors (column 65, lines 17-55). As
`
`previously stated, the SPU contains, volatile and non-volatile memories (column/line
`
`70/11-71/15; column/line 71/51-72/67). The SPU Internal ROM contains, "...kernel
`
`programs, load modules and encryption key information [that] enable the control of
`
`certain basic functions of the SPU" and ". . . components that are at least in part
`
`dependent on [device configuration] may be loaded in [ROM] along with additional load
`
`modules that have been determined to be required for specific installations or applications
`
`(column 70, lines 48-53). Further, Ginter et al. teach that SPU hardware, provides at least
`
`enough processing capabilities to support the secure parts of processing such as events
`
`that generate a usage permission (figure 3; column 58, lines 22-49; column 60, lines 45-
`
`55). Therefore, the Examiner regards the generation of usage permissions as basic to a
`
`SPU, hence, the appropriate load modules would be present in the ROM or EEPROM
`
`(column 70, lines 54-65) to allow for such minimum processing. Also, Ginter et al. teach
`
`that content control information follows the content (e.g. PERC) therefore, it is inherent
`
`that PERC-relevant data would be stored in non-volatile memory (relying on the standard
`
`definition of "non-volatile" memory as memory that is maintained even when the power
`
`is removed from :the storage system). Finally, the Examiner takes issue with the
`
`Applicant using EEPROM to store a license record including author name, program name
`
`ANCORA_00000353
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 6 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 4
`
`and number of licensed users. The Applicant has not disclosed the necessary hardware to
`
`allow a user to add, remove and modify a license record stored in an EEPROM.
`
`EEPROM is read-only memory. Therefore the ability to update existing and add new
`
`records to data stored in the EEPROM is contradictory.
`
`Claim Rejections - 35 USC 1 112
`
`3.
`
`Claim 1 is rejected under 35 U.S.C. 112, first paragraph, as containing subject
`
`matter which was not described in the specification in such a way as to reasonably
`
`convey to one skilled in the relevant art that the inventor(s), at the time the application
`
`was filed, had possession of the claimed invention. The specification does not support
`
`the Applicants' claim of using non-erasable, non-volatile memory being used to store
`
`license records.
`
`Claims 2-19 are also rejected as they depend from claim 1.
`
`4.
`
`Claim 1 is rejected under 35 U.S.C. 112, first paragraph, as containing subject
`
`matter which was not described in the specification in such a way as to enable one skilled
`
`in the art to which it pertains, or with which it is most nearly connected, to make and/or
`
`use the invention. The applicant refers to secondary non-volatile storage as EEPROM
`
`(Specification, page 8, lines 1 and 25-27). However, EEPROMs require a special or
`
`programmer voltage to program it, store 0's and 1's, are programmed at the factory and
`
`ANCORA_00000354
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 7 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`•
`
`Page 5
`
`when erased all data is removed. The Applicants do not teach the device necessary to edit
`
`an EEPROM nor have they made it clear to the Examiner how their system would be
`
`implemented in light of the non-trivial processing required to write and erase its data.
`
`Claims 2-19 are also rejected as they depend from claim 1.
`
`5.
`
`Claim 1 is rejected under 35 U.S.C. 112, first paragraph, as based on a disclosure
`
`which is not enabling. A device to write to an EEPROM and a method taking into
`
`account said device are critical or essential to the practice of the invention, but not
`
`included in the claim(s) is not enabled by the disclosure. See In re Mayhew, 527
`
`F.2d 1229, 188 USPQ 356 (CCPA 1976). The Applicants do not teach the device
`
`necessary to edit an EEPROM nor have they made it clear to the Examiner how their
`
`system would be implemented in light of the non-trivial processing required to write and
`
`erase its data.
`
`Claims 2-19 are also rejected as they depend from claim 1.
`
`6.
`
`7
`
`The following is a quotation of the second paragraph of 35 U.S.C. 112:
`
`The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the
`subject matter which the applicant regards as his invention.
`
`While applicant may be his or her own lexicographer, a term in a claim may not
`
`be given a meaning repugnant to the usual meaning of that term. See In re Hill, 161
`
`F.2d 367, 73 USPQ 482 (CCPA 1947). The term "non-volatile" in claim 1 is used by
`
`ANCORA_00000355
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 8 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`•
`
`Page 6
`
`the claim to exclude "hard disk," while it is accepted that a "hard disk" is "non-volatile"
`
`as it does not lose data when the power is removed from it.
`
`Claims 2-19 are also rejected as they depend from claim 1.
`
`8.
`
`Claim 20 is rejected under 35 U.S.C. 112, second paragraph, as being incomplete
`
`for omitting essential steps, such omission amounting to a gap between the steps. See
`
`MPEP § 2172.01. The omitted steps are: the encrypting of the pseudo unique key.
`
`Claim Rejections - 35 USC 11102
`
`9.
`
`The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that
`
`form the basis for the rejections under this section made in this Office action:
`
`A person shall be entitled to a patent unless —
`
`(e) the invention was described in a patent granted on an application for patent by another filed in the United
`States before the invention thereof by the applicant for patent, or on an international application by another who
`has fulfilled the requirements of paragraphs (1), (2), and (4) of section 371(c) of this title before the invention
`thereof by the applicant for patent.
`
`Claims 1-4, 6 and 10-13 are rejected under 35 U.S.C. 102(e) as being clearly anticipated
`
`by Ginter et al. U.S. Patent No. 5,892,900.
`
`As per claim 1,,Ginter et al. teach of a system and method for secure transactions
`
`management and electronic rights protection that:
`
`• restricts software operation within a license limitation (column 5, lines 29-41; column
`
`6, lines 29-65; column 7, lines 45-57)
`
`ANCORA_00000356
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 9 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 7
`
`• utilizes a computer that has a first non-volatile memory column/line 70/45-71-16;
`
`column/line 71/52-72/67; column 231, lines 13-32; column 236, lines 43-53; column
`
`240, lines 7-42; column 241, lines 19-30; column/line 245/55-246/24), a second non-
`
`volatile memory area (column/line 70/45-71-16; column/line 71/52-72/67; column
`
`231, lines 13-32; column 236, lines 43-53; column 240, lines 7-42; column 241, lines
`
`19-30; column/line 245/55-246/24) and a volatile memory area (column 71, lines 12-
`
`25)
`
`• provides a means of selecting a program residing in the volatile memory (column 71,
`
`lines 25-27 and column 82, lines 12-52)
`
`•
`
`sets up a verification structure in the non-volatile memories (column 70, lines 23-53
`
`and column/line 63/67-64/15)
`
`• verifies the program using the structure (column 70, lines 23-53 and column/line
`
`63/67-64/15)
`
`•
`
`acts on the program according to the verification (column 70, lines 23-53 and
`
`column/line 63/67-64/15).
`
`As per claim 2, the method and system of Ginter et al. provide for a license
`
`authorization bureau in the form of a VDE (virtual distribution environment) distributor
`
`and/or administrator (column/line 278/40 to 281/44).
`
`As per claim 3, the method and system of Ginter et al. discloses a verification method
`
`with a license authorization bureau that comprises of:
`
`ANCORA_00000357
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 10 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 8
`
`• a two-way data communication link between said bureau and end-user computer
`
`(figure 77)
`
`• a method for establishing end-user rights (column/line 278/40 to 281/44)
`
`• data encryption using keys (column 281, lines 10-22)
`
`•
`
`creating a license record from the selected program at the bureau (column 15,
`
`lines 10-34; column 71, lines 25-27, column 82, lines 12-52, column/line 278/40
`
`to 281/44 ).
`
`As per claim 4, the method and system of Ginter et al. also provides a means of
`
`encrypting the license record for the selected program from the second volatile memory
`
`(column/line 65/55 to 66/47).
`
`As per claim 6, the method and system of Ginter et al. provides a means for
`
`establishing a licensed software program. Where said program contains license record
`
`data and is found in the volatile memory (column 71, lines 25-27, column 82, lines 12-52,
`
`column/line 278/40 to 281/44, column 15, lines 10-34, figure 8 and column 96, lines 37-
`
`41).
`
`As per claim 10, the method and system of Ginter et al. provide a means for
`
`restricting a program's operation with predetermined limitations if the authorization is
`
`invalid (column 279, lines 21-32).
`
`As per claim 11, the method and system of Ginter et al. provide for a ROM BIOS
`
`(figure 69G and column 70, lines 39-53).
`
`ANCORA_00000358
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 11 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 9
`
`As per claim 12, the method and system of Ginter et al. provide for an EEPROM
`
`BIOS (figure 69G and column 70, lines 54-65).
`
`As per claim 13, the method and system of Ginter et al. provide for volatile RAM
`
`(column 71, lines 22-25).
`
`Claim Rejections - 35 USC g 103
`
`10.
`
`The following is a quotation of 35 U.S.C. 103(a) which forms the basis for all
`
`obviousness rejections set forth in this Office action:
`
`(a) A patent may not be obtained though the invention is not identically disclosed or described as set forth in
`section 102 of this title, if the differences between the subject matter sought to be patented and the prior art are
`such that the subject matter as a whole would have been obvious at the time the invention was made to a person
`having ordinary skill in the art to which said subject matter pertains. Patentability shall not be negatived by the
`manner in which the invention was made.
`
`11.
`
`Claims 5 and 7-9 and 16-20 are rejected under 35 U.S.C. 103(a) as being
`
`unpatentable over Ginter et al. U.S. Patent No. 5,892,900 as applied to claims 1, 3, 4 and
`
`6 above, and further in view of Goldman et al. 5,684,951.
`
`As per claim 5 and 16-20, Ginter et al. disclose a verification structure. In
`
`addition, Ginter et al. disclose a system and method for secure transaction management
`
`and electronic rights protection utilizing encryption keys (column 15, lines 35-60;
`
`column/line 45/3-46/26; column 49, lines 47-52; column 206, lines 57-65). Ginter et al.
`
`also teach unique keys and storing keys in non-volatile memory (column/line 21/60-
`
`22/25; column/line 70/45-71-16; column/line 71/52-72/67). However, Ginter et al. do not
`
`disclose pseudo unique keys. Goldman et al. teach of a method and system for user
`
`ANCORA_00000359
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 12 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 10
`
`authorization over a multi-user computer system. In said system, a user has valid id but
`
`lacks an authorized means of access. In order to access the desired data, a user is sent a
`
`pseudo unique key (abstract, lines 19-21) that is derived from a user id and the current IP
`
`address. Therefore, it would have been obvious to a person of ordinary skill in the art of
`
`encryption, to incorporate pseudo unique keys into the system of Ginter et al. By utilizing
`
`such a method a valid user can be provided access to secured data without comprising the
`
`security of the larger system. It would have also been obvious to encrypt communications
`
`using pseudo unique keys if less secure means of data exchange was deemed appropriate.
`
`As per claim 7, Ginter et al. teach of a method and system for electronic rights
`
`protection comprising of volatile memory, non-volatile memory, license records location
`
`and licensed software programs (column 5, lines 29-41; column 6, lines 29-65; column
`
`15, lines 10-34; column/line 63/67-64/15; column/line 65/55-66-47; column 70, lines 23-
`
`65; column 71, lines 12-27; column 96, lines 37-41; column/line 278/40-281/44). Ginter
`
`et al. also use encryption keys (column 206, lines 57-65). However, Ginter et al. do not
`
`make use of pseudo unique keys in their system. Goldman et al. teach of a method and
`
`system for user authorization over a multi-user computer system through the use of
`
`pseudo unique keys (abstract, lines 19-23). In said system, a user has valid id but lacks an
`
`authorized means of access. In order to access the desired data, a user is sent a pseudo
`
`unique key that is derived from a user id and the current IP address. Therefore, it would
`
`have been obvious to a person of ordinary skill in the art of the time the invention was
`
`made to utilize pseudo unique keys in the system of Ginter et al.. By utilizing such a
`
`ANCORA_00000360
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 13 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 11
`
`method a valid user can be provided access to secured data without comprising the
`
`security of the larger system.
`
`As per claim 8, Ginter et al. disclose a method for authoring content that includes
`
`encryption keys (column/line 282/ 33 to 283/34). Ginter et al. disclose a method for
`
`selecting a licensed software program from the volatile memory to form a license record.
`
`However, Ginter et al. do not use pseudo unique keys for purposes of encryption.
`
`Goldman et al. teach of a method and system for user authorization over a
`
`multi-user computer system through the use of pseudo unique keys (abstract, lines 19-
`
`23). In said system, a user has valid id but lacks an authorized means of access. In order
`
`to access the desired data, a user is sent a pseudo unique key that is derived from a user id
`
`and the current IP address. Therefore it would have been obvious to a person of ordinary
`
`skill in the art at the time the invention was made to use pseudo unique keys. By utilizing
`
`such a method a valid user can be provided access to secured data without comprising the
`
`security of the larger system. In addition, it would have also been obvious to encrypt
`
`communications using pseudo unique keys if less secure means of data exchange was
`
`deemed appropriate.
`
`As per claim 9, Ginter et al. teach of a system and method for encrypting and
`
`decrypting of licensing related communications between end-user(s) and a license
`
`authorization bureau (column/line 282/33 to 283/34 and 168/25 to 169/40). Ginter et al.
`
`also teach of volatile and non-volatile memory areas used in conjunction with licensed
`
`software programs (figure 8; column 15, lines 10-34; columns 70-72, column 82, lines
`
`ANCORA_00000361
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 14 of 16
`
`tti
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 12
`
`12-52„ column/line 70/45-71-16; column/line 71/52-72/67; column 96, lines 37-41;
`
`column 231, lines 13-32; column 236, lines 43-53; column 240, lines 7-42; column 241,
`
`lines 19-30; column/line 245/55-246/24; column/line 278/40-281/44). However, Ginter et
`
`al. do not disclose pseudo unique keys. Goldman et al. provide for the use of pseudo
`
`unique keys (abstract, 19-23). Therefore, it would have been obvious to a person of
`
`ordinary skill in the art at the time the invention was made, to incorporate pseudo unique
`
`keys into the system of Ginter et al.. By utilizing such a method a valid user can be
`
`provided access to secured data without comprising the security of the larger system.
`
`Conclusion
`
`12.
`
`Applicant's amendment necessitated the new ground(s) of rejection presented in
`
`this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP
`
`§ 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37
`
`CFR 1.136(a).
`
`A shortened statutory period for reply to this final action is set to expire THREE
`
`MONTHS from the mailing date of this action. In the event a first reply is filed within
`
`TWO MONTHS of the mailing date of this final action and the advisory action is not
`
`mailed until after the end of the THREE-MONTH shortened statutory period, then the
`
`shortened statutory period will expire on the date the advisory action is mailed, and any
`
`ANCORA_00000362
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 15 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 13
`
`extension fee pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the
`
`advisory, action. In no event, however, will the statutory period for reply expire later than
`
`SIX MONTHS from the date of this final action.
`
`13.
`
`The prior art made of record and not relied upon is considered pertinent to
`
`applicant's disclosure:
`
`• Richardson , HI teaches a system for software protection
`
`14.
`
`Any inquiry concerning this communication or earlier communications from the
`
`examiner should be directed to Calvin Loyd Hewitt II whose telephone number is (703)
`
`305-0625. The examiner can normally be reached on Monday-Friday from 8:30 AM —
`
`5:00 PM.
`
`If attempts to reach the examiner by telephone are unsuccessful, the examiner's
`
`supervisor, James P. Trammell, can be reached at (703) 305-9768.
`
`Any response to this action should be mailed to"
`
`Commissioner of Patents and Trademarks
`
`C/o Technology Center 2700
`
`Washington, D.C. 20231
`
`or faxed to:
`
`(703) 308-9051 (for formal communications intended for entry)
`
`or:
`
`ANCORA_00000363
`
`

`

`Case 1:20-cv-00034-ADA Document 45-7 Filed 03/20/20 Page 16 of 16
`
`Application/Control Number: 09/164,777
`Art Unit: 2161
`
`Page 14
`
`(703) 308-5397 (for informal or draft communications, please label
`
`"PROPOSED" or "DRAFT")
`
`Hand-delivered responses should be brought to Crystal Park II, 2121 Crystal Drive,
`
`Arlington, VA, Sixth Floor (Receptionist).
`
`Any inquiry of a general nature or relating to the status of this application should
`
`be directed to the Group receptionist whose telephone number is
`
`703 305-3900.
`
`Calvin Loyd Hewitt II
`
`June 21, 2001
`
`JA
`SUPERVISORY PATENT
`TECHNOLOGY CENTER 2100
`
`ANCORA_00000364
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket