throbber
Serial No. 13/336,958
`
`REMARKS
`
`Claims 1-25 are pending in the application, of which Claims 1 and 14 are the independent
`
`claims. By this amendment, only dependent claims 23 and 24 are amended. In the Office Action
`
`mailed July 25, 2012 (“Office Action”), claims 1-25 stand rejected under 35 U.S.C. § 103(a)
`
`based on US. Patent No. 5,898,830 (“Wesz’nger”). Applicants respectfully traverse the rejection
`
`and request reconsideration of the same in view of the following remarks.
`
`Applicants'Summaty 211d Clarification ofthe August 23, 2012 and
`
`October 11, 2012 Interviews
`
`Applicants appreciate the courtesies extended to Applicants’ undersigned representative
`
`at the personal interview conducted in the United States Patent and Trademark Office on August
`
`23, 2012 (“first interview”), as well as to Applicants’ undersigned representative and inventor Dr.
`
`Robert Short III at the personal interview on October 11, 2012 (“second interview”). The
`
`Examiner mailed Interview Summaries on August 30, 2012 and October 18, 2012, summarizing
`
`certain aspects of the interviews. Applicants thank the Examiner for the Interview Summaries,
`
`and submit the following comments to address and clarify the Examiner’s summary of those
`
`discussions.
`
`In the first interview, Applicants’ undersigned representative provided an overview of the
`
`claimed subject matter and discussed patentable distinctions of the claimed subject matter over
`
`the asserted reference, Wesz'nger.
`
`However, no agreement was reached regarding the
`
`allowability of the claims.
`
`During the second interview, Applicants’ representative and Dr. Short provided an
`
`overview of the claimed subject matter. Additionally, the Examiner, Applicants’ representative,
`
`and Dr. Short discussed distinctions of the claimed subject matter over firewall systems such as
`
`Wesz’nger’s.
`
`The Examiner suggested that an exemplary feature discussed by Applicants’
`
`representative and Dr. Short while providing the overview — interception of a request to look up
`
`a network address of a network device and a determination whether the network device is
`
`available for a secure communications service — was distinguishable over the prior art. As such,
`
`the Examiner suggested that Applicants amend the claims accordingly.
`
`Petitioner Apple Inc. - Exhibit 1004, p. 751
`
`Petitioner Apple Inc. - Exhibit 1004, p. 751
`
`

`

`Serial No. 13/336,958
`
`However, in the second Interview Summary, the Examiner summarized the discussions
`
`of such allowable features as the “gist of the invention.” Although Applicants agree that
`
`“interception of a request to look up a network address of a network device and a determination
`
`whether the network device is available for a secure communications service” is one feature that
`
`distinguishes the disclosed subject matter from the cited art, Applicants disagree with the second
`
`Interview Summary to the extent that it suggests that the above mentioned “intercepting” feature
`
`is the only novel and nonobvious aspect of Applicants’ disclosed and/or claimed embodiments.
`
`Indeed, as discussed during the interview and described below, Applicants’ disclosed and
`
`claimed embodiments include other novel and nonobvious aspects of the claimed subject matter.
`
`Other novel and unobvious aspects of the claimed subject include features that are found in the
`
`currently pending claims and in the claims presented prior to this Amendment. Thus, while
`
`Applicants appreciate the Examiner’s suggestion to expedite allowance of this application,
`
`Applicants decline to amend the claims because they already patentably distinguish from
`
`Wesz'nger and other cited prior art, for at least the reasons below.
`
`Claim Rejections — 35 US. C. § 103
`
`Claims 1-25 are rejected under 35 U.S.C. § 103(a) over Wesz'nger. As explained below,
`
`because Wesz'nger does not disclose or suggest each and every limitation of claims 1-25,
`
`Applicants request that the rejection be withdrawn and the claims be allowed.
`
`
`To support an obviousness rejection, “all of the claim limitations must be taught or
`
`suggested by the prior art applied and that all words in a claim must be considered in judging the
`
`patentability of that claim against the prior art.” Ex Parte Karl Burgess, Appeal 2008-2820,
`
`2009 WL 291172 (B.P.A.I. 2009), at *3 (citing In re Royka, 490 F.2d 981, 984-85 (CCPA 1974),
`
`In re Wilson, 424 F.2d 1382, 1385 (CCPA 1970)) (emphases added). A rejection based on
`
`obviousness “cannot be sustained with mere conclusory statements; instead, there must be some
`
`articulated reasoning with some rational underpinning to support
`
`the legal conclusion of
`
`obviousness.” KSR Int’l Co. v. Teleflex Inc., 126 S. Ct. 1727, 1741 (2007) (citing In re Kahn,
`
`441 F.3d at 988). Here, the Office Action fails to demonstrate that each and every limitation of
`
`claims 1-25 are disclosed or suggested by Wesz’nger.
`
`Wesz'nger discloses a firewall that is configured as two or more sets of virtual hosts, with
`
`DNS mappings between the virtual hosts and respective remote hosts to be accessed through
`
`7
`
`Petitioner Apple Inc. - Exhibit 1004, p. 752
`
`Petitioner Apple Inc. - Exhibit 1004, p. 752
`
`

`

`Serial No. 13/336,958
`
`network interfaces of the firewall.
`
`(Wesinger Abstract.) These virtual hosts and DNS mappings
`
`enable transparent communications through the firewall.
`
`The firewall “selectively allows
`
`‘acceptable’ computer transmissions to pass through it and disallows other non-acceptable
`
`computer transmissions.” (Id. at 1:8-12.) In Wesz’nger, “[w]hen a connection request is received,
`
`the firewall spawns a process, or execution thread, to create a virtual host VHn to handle that
`
`connection request.” (Id. at 15:9-12.) “Each virtual host has a separate configuration sub-file
`
`(sub-database) Cl, C2, etc., that may be derived from a master configuration file, or database,
`
`510. The configuration sub-files are text files that may be used to enable or disable different
`
`functions for each virtual host, specify which connections and types of traffic will be allowed
`
`and which will be denied, etc.” (Id. at 14:46-52.) “Also as part of the configuration file of each
`
`virtual host, an access rules database is provided governing access to and through the virtual host,
`
`i.e., which connections will be allowed and which connections will be denied.” (Id. at 15:24-28.)
`
`The process in Wesz’nger uses the access rules database to “allow only a connection from a
`
`specified secure client.” (Id. at 10:14-16.)
`
`Wesz’nger also discusses processing of DNS requests:
`
`When client C tries to initiate a connection to host D using the name of D, DNS
`operates in the usual manner to propagate a name request to successive levels of
`the network until D is found. The DNS server for D returns the network address
`
`of D to a virtual host on the firewall 155. The virtual host returns its network
`
`address to the virtual host on the firewall 157 from which it received the lookup
`request, and so on, until a virtual host on the firewall 105 returns its network
`address (instead of the network address of D) to the client C.
`
`(Id. at 9:16-24.)
`
`Accordingly, when client C uses a name of D in a DNS request, C gets back an address
`
`for a virtual host of firewall 105, which faces C.
`
`(See id. at Fig. 1).
`
`Wesz’nger describes processes and components different than the embodiments recited in
`
`claims 1-25. For instance, independent claim 1 is representative and recites:
`
`A network device, comprising:
`
`a storage device storing an application program for a secure communications
`service; and
`
`at least one processor configured to execute the application program for the secure
`communications service so as to enable the network device to:
`
`Petitioner Apple Inc. - Exhibit 1004, p. 753
`
`Petitioner Apple Inc. - Exhibit 1004, p. 753
`
`

`

`Serial No. 13/336,958
`
`send a request to look up a network address of a second network device
`based on an identifier associated with the second network device;
`
`receive an indication that the second network device is available for the
`
`the indication including the requested
`secure communications service,
`network address of the
`second network device
`and provisioning
`information for a secure communication link;
`
`connect to the second network device over the secure communication link,
`using the received network address of the second network device and the
`provisioning information for the secure communication link; and
`
`communicate at least one of video data and audio data with the second
`
`network device using the secure communications service via the secure
`communication link.
`
`Wesz’nger does not disclose,
`
`for example, receiving “an indication that
`
`the second
`
`network device is available for the secure communications service, the indication including the
`
`requested network address of the second network device and provisioning information for a
`
`secure communication li
`
`,” as recited in claim 1. Nor does Wesz’nger disclose the ability to
`
`“connect to the second network device over the secure communication link, using the received
`
`network address of the second network device and the provisioning information for the secure
`
`communication li
`
`” and “communicate .
`
`.
`
`. with the second network device using the secure
`
`communications service via the secure communication li
`
`,” as recited in claim 1. For these
`
`reasons alone, the rejection of claim 1 in view of Wesinger is improper and should be withdrawn.
`
`For example, nothing in Wesz’nger, including at the cited portions, teaches or suggests at
`
`least the feature of enabling a network device to “receive .
`
`.
`
`. an indication that the second
`
`network device is available for the secure communications service,” as recited by claim 1. The
`
`virtual hosts and DNS mappings of Wesz’nger enable transparent communications through the
`
`firewall, but provide no such indication that the second network device is available for a secure
`
`communications service.
`
`Wesinger briefly states that encryption may be used in combination with its firewalls, but
`
`does not describe those firewalls as providing any indication that a second device is available for
`
`the secure communications service.
`
`(See Wesz’nger at 4:39-42; 12:22-28.)
`
`In fact, Wesz’nger
`
`explains that “[o]nce a connection has been allowed, the virtual host process invokes code that
`
`performs .
`
`.
`
`. channel processing (encryption. . .).” (Id. at l7:l-7.) Invoking code for encryption
`
`Petitioner Apple Inc. - Exhibit 1004, p. 754
`
`Petitioner Apple Inc. - Exhibit 1004, p. 754
`
`

`

`Serial No. 13/336,958
`
`or the like after a connection has already been established does not teach or suggest enabling a
`
`network device to receive an indication that the second network device is available for the secure
`
`communications service. Wesz'nger invokes the code that performs channel processing and
`
`encryption without returning any indication that the second device is available for a secure
`
`communications service.
`
`The Office Action points to a portion of Wesz'nger that describes a piece of software
`
`checking whether the host “requesting the connection”1 has a DNS entry in a database.
`
`(CA at 3
`
`(citing Wesz'nger at 16:57-17:5).) However, following that check, Wesinger does not enable the
`
`device requesting the connection to receive an indication that the second network device is
`
`available for a secure communications service. Thus,
`
`that passage of Wesz'nger, does not
`
`demonstrate the claimed features. (See Wesinger at 16:57-67.)
`
`Moreover, Wesinger merely describes returning a network address of a virtual host. (Id.
`
`at 9: 15-25.) Wesz’nger makes it clear that the network address is returned alone, and not with any
`3,
`“indication” or “provisioning information. Consequently, Wesz'nger, does not teach or suggest
`
`“receiving .
`
`.
`
`. provisioning information for a secure communication link” (emphasis added), as
`
`recited by claim 1.
`
`Indeed, in Wesz'nger, after a connection request is received and allowed, the
`
`virtual host invokes code that performs channel processing (including encryption) but does not
`
`return any provisioning information for a secure communication link.
`
`(Id. at 17:1-7.) Aside
`
`from the address, nothing else is returned to the requesting device in Wesz’nger.
`
`For the above reasons, Wesz'nger does not support the rejection of claim 1 under 35 U.S.C.
`
`§ 103(a). Accordingly, the rejection should be withdrawn, and the claim should be allowed.
`
`Independent claim 14, though of different scope from independent claim 1, recites similar
`
`features to those discussed above in connection with claim 1. Thus, for at least reasons similar to
`
`those provided above for independent claim 1, Wesz'nger does not teach or suggest each and
`
`every limitation of independent claim 14. Consequently, for the same reasons set forth above for
`
`claim 1, Wesz'nger does not support the rejection of claim 14 under 35 U.S.C. § 103(a). Thus, the
`
`rejection should be withdrawn and the claim should be allowed.
`
`1 Wesinger defines a “remote host” as the “host requesting the connection” for the purpose of the cited paragraphs.
`(Wesinger at 16:49.)
`
`10
`
`Petitioner Apple Inc. - Exhibit 1004, p. 755
`
`Petitioner Apple Inc. - Exhibit 1004, p. 755
`
`

`

`Serial No. 13/336,958
`
`Claims 2-13, depend from claim 1. Claims 15-25 depend from claim 14. Thus, for at
`
`least the same reasons set forth above in connection with claims 1 and 14, dependent claims 2-13
`
`and 15-25 are allowable over the cited prior art. Additionally, dependent claims 2-13 and 15-25
`
`are allowable for the additional reason that each of the claims recite additional features not
`
`disclosed or suggested by the cited prior art. Accordingly, Applicants request the timely
`
`allowance of these claims.
`
`CONCLUSION
`
`Applicants respectfully submit that all of the pending claims, claims 1-25, are allowable
`
`over the cited prior art. Applicants respectfully invite the Examiner to contact the undersigned
`
`attorney to promptly address any questions or issues regarding the allowability of the pending
`
`claims.
`
`Applicants’ remarks in support of patentability of one claim should not be imputed to any
`
`other claim, even if similar terminology is used. Any absence of a reply to a specific rejection,
`
`issue, or comment does not signify agreement with or concession of that rejection,
`
`issue, or
`
`comment.
`
`In addition, because Applicants’ remarks are not intended to be exhaustive, as there
`
`may be other reasons for patentability of any or all claims that have not been expressed. Finally,
`
`nothing in this response should be construed as intent to concede any issue with regard to any
`
`claim, and the amendment or cancellation of any claim does not necessarily signify concession
`
`of unpatentability of the claim prior to its amendment or cancellation.
`
`To the extent necessary, a petition for an extension of time under 37 C.F.R. § 1.136 is
`
`hereby made. Please charge any shortage in fees due in connection with the filing of this paper,
`
`ll
`
`Petitioner Apple Inc. - Exhibit 1004, p. 756
`
`Petitioner Apple Inc. - Exhibit 1004, p. 756
`
`

`

`Serial No. 13/336,958
`
`including extension of time fees to Deposit Account 502203 and please credit any excess fees to
`
`such deposit account.
`
`Respectfully submitted,
`
`McDERMOTT WILL & EMERY LLP
`
`
`Date: October 25 2012
`/Toby H. Kusmer/
`Toby H. Kusmer, P.C., Reg. No. 26,418
`Customer No. 23630
`
`28 State Street
`
`Boston, MA 02109-1775
`Telephone: (617) 535-4065
`Facsimile : (617)535-3800
`E-mail:
`tkusmer@mwe.com
`
`Kenneth C. Cheney, Reg. No. 61,841
`4 Park Plaza
`
`Suite 1700
`
`Irvine, California 92614-25 59
`
`Telephone: (949) 757-7111
`Facsimile: (949) 851-9348
`E-mail: kcheney@mwe.com
`
`DMiUS 39449563—1.077580.0152
`
`12
`
`Petitioner Apple Inc. - Exhibit 1004, p. 757
`
`Petitioner Apple Inc. - Exhibit 1004, p. 757
`
`

`

`Electronic Acknowledgement Receipt
`
`International Application Number: —
`
`
`
`“fle°fmve"“°"‘
`
`SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK PROTOCOL FOR
`SBlRECOMMUNKAflONSUSNGSHMREDOMNNNAMES
`
`First Named Inventor/Applicant Name:
`
`Application Type:
`
`Utillty under 35 USC111(a)
`
`Payment information:
`
`File Listing:
`
`Document
`Number
`
`Document Descri
`
`tion
`
`P
`
`File Size(Bytes)/
`Message Digest
`123529
`
`Pages
`Multi
`Part /.zip (if appl.)
`
`
`
`Amend ment/Req. Reconsideration-After
`Non-Final Reject
`
`ReplyB.pdf
`
`33871746cb5d3f30e127953db281d1b6f66
`aadff
`
`Information:
`
`Petitioner Apple Inc. - Exhibit 1004, p. 758
`
`Petitioner Apple Inc. - Exhibit 1004, p. 758
`
`

`

`This Acknowledgement Receipt evidences receipt on the noted date by the USPTO ofthe indicated documents,
`characterized by the applicant, and including page counts, where applicable. It serves as evidence of receipt similar to a
`Post Card, as described in MPEP 503.
`
`Total Files Size (in bytes)
`
`123529
`
`New Applications Under 35 U.S.C. 111
`lfa new application is being filed and the application includes the necessary components for a filing date (see 37 CFR
`1.53(b)—(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date shown on this
`Acknowledgement Receipt will establish the filing date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`lfa timely submission to enter the national stage of an international application is compliant with the conditions of 35
`U.S.C. 371 and other applicable requirements a Form PCT/DO/EO/903 indicating acceptance of the application as a
`national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt, in due course.
`
`the application.
`
`New International Application Filed with the USPTO as a Receiving Office
`lfa new international application is being filed and the international application includes the necessary components for
`an international filing date (see PCT Article 11 and MPEP 1810), a Notification of the International Application Number
`and ofthe International Filing Date (Form PCT/RO/105) will be issued in due course, subject to prescriptions concerning
`national security, and the date shown on this Acknowledgement Receipt will establish the international filing date of
`
`Petitioner Apple Inc. - Exhibit 1004, p. 759
`
`Petitioner Apple Inc. - Exhibit 1004, p. 759
`
`

`

`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`PO. Box 1450
`Alexandria, Virginia 22313- 1450
`www.uspto.gov
`
`APPLICATION NO.
`
`
`
`
`
` F ING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`
`
`
`
`CONF {MATION NO.
`
`13/336,958
`
`12/23/2011
`
`Victor Larson
`
`77580—152(VRNK—1CP3CNFT2)
`
`1832
`
`23630
`7590
`12/07/2012
`Mcnemonwummery —
`The McDermott Building
`LIM, KRISNA
`500 North Capitol Street, NW.
`Washington, DC 20001
`
`PAPER NUMBER
`
`2453
`
`
`
`
`
` NOT *ICATION DATE
`
`DELIVERY MODE
`
`12/07/2012
`
`ELECTRONIC
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`Notice of the Office communication was sent electronically on above—indicated "Notification Date" to the
`following e—mail address(es):
`
`mweipdocket @ mwe.com
`
`PTOL—90A (Rev. 04/07)
`
`Petitioner Apple Inc. - Exhibit 1004, p. 760
`
`Petitioner Apple Inc. - Exhibit 1004, p. 760
`
`

`

`
`
`Office Action Summary
`
`Application No.
`
`Applicant(s)
`
`13/336,958
`
`Examiner
`KRISNA LIM
`
`LARSON ET AL.
`
`Art Unit
`2453
`
`-- The MAILING DA TE of this communication appears on the cover sheet with the correspondence address --
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE 3 MONTH(S) OR THIRTY (30) DAYS,
`WHICHEVER IS LONGER, FROM THE MAILING DATE OF THIS COMMUNICATION.
`Extensions of time may be available under the provisions of 37 CFR1. 136( a).
`In no event however may a reply be timely filed
`after SIX () MONTHS from the mailing date of this communication.
`If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication, even if timely filed, may reduce any
`earned patent term adjustment. See 37 CFR 1.704(b).
`
`Status
`
`1)IZI Responsive to communication(s) filed on 25 October 2012.
`
`2a)|Z| This action is FINAL.
`
`2b)I:| This action is non-final.
`
`3)I:l An election was made by the applicant in response to a restriction requirement set forth during the interview on
`
`
`; the restriction requirement and election have been incorporated into this action.
`
`4)|:| Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`
`closed in accordance with the practice under Exparte Quay/e, 1935 CD. 11, 453 O.G. 213.
`
`Disposition of Claims
`
`5)IZI Claim(s) 1-25 is/are pending in the application.
`
`5a) Of the above claim(s) _ is/are withdrawn from consideration.
`
`6)I:l Claim(s) _ is/are allowed.
`
`7)|Zl Claim(s)_125 Is/are rejected.
`
`8)I:l Claim(s)_ is/are objected to.
`
`
`9)I:l Claim((s)
`
`are subject to restriction and/or election requirement.
`
`* If any claims have been determined allowable, you may be eligible to benefit from the Patent Prosecution Highway
`program at a participating intellectual property office for the corresponding application. For more information, please see
`
`htt
`:/'/www.us to. OV/‘ateI'ItS/II'III events/eeh/Index.‘s or send an inquiry to PPeredback usntot 0v.
`
`Application Papers
`
`10)I:I The specification is objected to by the Examiner.
`
`11)|:| The drawing(s) filed on _ is/are: a)I:l accepted or b)I:l objected to by the Examiner.
`
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121 (d).
`
`Priority under 35 U.S.C. § 119
`
`12)I:l Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).
`
`a)I:l AII
`
`b)I:l Some * c)I:I None of:
`
`1.I:l Certified copies of the priority documents have been received.
`
`2.I:I Certified copies of the priority documents have been received in Application No. _
`
`3.I:l Copies of the certified copies of the priority documents have been received in this National Stage
`
`application from the International Bureau (PCT Rule 17.2(a)).
`
`* See the attached detailed Office action for a list of the certified copies not received.
`
`Attachment(s)
`
`1) D Notice of References Cited (PTO-892)
`
`2) X Information Disclosure Statement(s) (PTO/SB/08)
`Paper No(s)/Mai| Date
`U.S. Patent and Trademark Office
`
`3) D Interview Summary (PTO-413)
`Paper No(s)/Mai| Date.
`4) D Other:
`
`PTOL-326 (Rev. 09-12)
`
`Office Action Summary
`
`Part of Paper No./Mai| Date 20121130
`
`Petitioner Apple Inc. - Exhibit 1004, p. 761
`
`
`
`Petitioner Apple Inc. - Exhibit 1004, p. 761
`
`

`

`Application/Control Number: 13/336,958
`
`Page 2
`
`Art Unit: 2453
`
`1.
`
`2.
`
`Claims 1-25 are still pending for examination.
`
`The following is a quotation of 35 § U.S.C. 103 (a) which forms the basis for all
`
`obviousness rejections set forth in this Office action:
`
`(a) A patent may not be obtained through the invention is not identically disclosed
`or described as set forth in section 102 of this title, if the differences between the
`
`subject matter sought to be patented and the prior art are such that the subject
`matter as a whole would have been obvious at the time the invention was made
`
`to a person having ordinary skill in the art to which said subject matter pertains.
`Patentability shall not be negatived by the manner in which the invention was
`made.
`
`The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459
`
`1966), that are applied for establishing a background for determining obviousness under
`
`35 U.S.C. 103(a) are summarized as follows:
`
`99°F)?“
`
`Determining the scope and contents of the prior art.
`Ascertaining the differences between the prior art and the claims at issue.
`Resolving the level of ordinary skill in the pertinent art.
`Considering objective evidence present in the application indicating
`obviousness or nonobviousness.
`
`3.
`
`Claims 1-25 are rejected under 35 U.S.C. § 103(a) as being unpatentable over
`
`Wesinger [U.S. Patent No. 5,898,830].
`
`4.
`
`Wesinger disclosed the invention substantially as claimed. Taking claims 1, 9,
`
`10, 11-14 and 22-25 as exemplary claims, the reference discloses a network device
`
`(i.e., see Internet 120 of Fig. 1 connecting with other network devices), comprising:
`
`a storage device storing an application program for a secure communication service
`
`((i.e., see col. 8 (lines 65) to col. 9 (line 2), col. 16 (line 57) to col. 17 (line 5), col. 12
`
`(lines 23-27)); and
`
`at least one processor configured to execute the application program for the
`
`secure communication service so as to enable the network device to:
`
`Petitioner Apple Inc. - Exhibit 1004, p. 762
`
`Petitioner Apple Inc. - Exhibit 1004, p. 762
`
`

`

`Application/Control Number: 13/336,958
`
`Page 3
`
`Art Unit: 2453
`
`send a request to look up a network address of a second network device (Le.
`
`a host D) based on an identifier associated with the second network device (i.e.
`
`Wesinger disclosed at col. 8 (line 25) to col. 9 (line 25)
`
`"
`
`DNS is a system that
`
`translates host name address to IP address and IP address to host name
`
`stored in
`
`DNS tables When client C tries to initiates a connection to host D
`
`The DNS server
`
`for D returns the network address D
`
`from which it receives the look up request ...’).
`
`receive an indication that the second network device is available for the secure
`
`communications service, the indication including the requested network address of the
`
`second network device and provisioning information for a secure communication link
`
`(i.e., Wesinger at col. 12 (lines 23-27) disclosed
`
`combining encryption capabilities
`
`allows for the creation of virtual private networks-networks in which two
`
`remote machine communicate securely and at col. 8 (line 25) to col. 9 (line 25)
`
`Wesinger disclosed "
`
`DNS is a
`
`system that translates host name address to IP
`
`address and IP address to host name
`
`stored in DNS tables When client C tries to
`
`initiates a connection to host D
`
`The DNS server for D returns the network address D
`
`from which it receives the look up request ...”);
`
`connect to the second network device, using the received network address of
`
`the second network device and the provisioning information for the secure
`
`communication link (i.e., Wesinger at col. 12 (lines 23-27) disclosed
`
`combining
`
`encryption capabilities
`
`allows for the creation of virtual private networks-
`
`networks in which two remote machine communicate securely
`
`and at col. 8
`
`(line 25) to col. 9 (line 25) Wesinger disclosed "
`
`DNS is a system that translates
`
`host name address to IP address and IP address to host name
`
`stored in DNS tables
`
`When client C tries to initiates a connection to host D
`
`The DNS server for D
`
`returns the network address D
`
`from which it receives the look up request ...”);
`
`communicate with the second network device using the secure
`
`communications service via the virtual private network communication link
`
`(i.e., Wesinger at col. 12 (lines 23-27) disclosed
`
`combining encryption capabilities
`
`allows for the creation of virtual private networks-networks in which two
`
`remote machine communicate securely ...");
`
`Petitioner Apple Inc. - Exhibit 1004, p. 763
`
`Petitioner Apple Inc. - Exhibit 1004, p. 763
`
`

`

`Application/Control Number: 13/336,958
`
`Page 4
`
`Art Unit: 2453
`
`initiating a secure communication link between the first network device and the
`
`second network device based on a determination that the second network device is
`
`available for the secure communications service (i.e., Wesinger at col. 12 (lines 23-27)
`
`disclosed
`
`combining encryption capabilities
`
`allows for the creation of virtual
`
`private networks-networks in which two remote machine communicate securely
`
`and Wesinger disclosed at col. 8 (line 25) to col. 9 (line 25)
`
`"
`
`DNS is a system
`
`that translates host name address to IP address and IP address to host name
`
`stored
`
`in DNS tables When client C tries to initiates a connection to host D
`
`The DNS
`
`server for D returns the network address D
`
`from which it receives the look up
`
`request ...”);
`
`wherein the secure communication link is a virtual private network
`
`communication link and supports data packets (i.e., Wesinger at col. 12 (lines 23-27)
`
`disclosed
`
`combining encryption capabilities
`
`allows for the creation of virtual
`
`private networks-networks in which two remote machine communicate securely
`
`...");
`
`wherein the data is encrypted over the secure communication link (i.e.,
`
`Wesinger at col. 12 (lines 23-27) disclosed
`
`combining encryption capabilities
`
`allows for the creation of virtual private networks-networks in which two remote
`
`machine communicate securely ...");
`
`wherein the identifier associated with the second network device is a domain
`
`name (i.e., see DNS of Fig. 1, cols. 8 and 9); and
`
`wherein the determining of the second network device is available for a secure
`
`communications service is a function of a domain name look up (i.e. Wesinger disclosed
`
`at col. 8 (line 25) to col. 9 (line 25)
`
`"
`
`DNS is a
`
`system that translates host name
`
`address to IP address and IP address to host name
`
`stored in DNS tables When
`
`client C tries to initiates a connection to host D
`
`The DNS server for D returns the
`
`network address D
`
`from which it receives the look up request ...’).
`
`5.
`
`As to claims 2-8, and 15-21, those features (i.e., video data, audio data, video
`
`conference, messaging service, e-mail telephone service using modulation based on
`
`Petitioner Apple Inc. - Exhibit 1004, p. 764
`
`Petitioner Apple Inc. - Exhibit 1004, p. 764
`
`

`

`Application/Control Number: 13/336,958
`
`Page 5
`
`Art Unit: 2453
`
`FDM, TDM, or CDMA, mobile device, a notebook computer, etc.) are well known the art
`
`at the time the invention was made and they are not patentably distinguishable features.
`
`6.
`
`While Wesinger disclosed, at col. 9 (lines 16-25) the feature of "when a client C
`
`tries to initiate a connection to host D using the name D
`
`The DNS server for D returns
`
`the network address of D to a virtual host of the firewall 155. The virtual host returns its
`
`network address to the virtual host on the firewall 157 from which it received the
`
`lookup_ reguest, and so on, until a virtual host on the firewall 105 returns its network
`
`address (instead of the network address of D) to the client C", at col. 12 (lines 23-27)
`
`Wesinger further disclosed
`
`combining encryption capabilities
`
`allows for the
`
`creation of virtual private networks-networks in which two remote machine
`
`communicate securely and at col. 8 (line 25) to col. 9 (line 25) Wesinger further
`
`disclosed "
`
`DNS is a
`
`system that translates host name address to IP address and
`
`IP address to host name
`
`stored in DNS tables When client C tries to initiates a
`
`connection to host D
`
`The DNS server for D returns the network address D
`
`from
`
`which it receives the look up request ...’), Wesinger did not mention as exactly as the
`
`claimed language of "an indication that the second network device is available for the
`
`secure communication service, the indication including the reguested network address
`
`of the second network device and providing information for a virtual private network
`
`communication link".
`
`It would have been obvious to one of ordinary skill in the art to
`
`obviously recognize that Wesinger's passage above and the claimed language are
`
`obviously the same and the difference is how they are written which is obvious to one of
`
`ordinary skill in the art.
`
`7.
`
`Applicant's arguments filed 10/25/2012 have been fully considered but they are
`
`not persuasive. In the remark, applicants argued that:
`
`a) Wesinger does not disclose receiving "an indication that the second network
`
`device is available for the secure communications service, the indication including the
`
`reguested network address of the second network device and provisioning information
`
`for a secure communication link.
`
`Petitioner Apple Inc. - Exhibit 1004, p. 765
`
`Petitioner Apple Inc. - Exhibit 1004, p. 765
`
`

`

`Application/Control Number: 13/336,958
`
`Page 6
`
`Art Unit: 2453
`
`b) Wesinger does not disclose the ability to "connect to the second network
`
`device over the secure communication link, using the received network address of the
`
`second network device and the provisioning information for the secure communication
`
`link".
`
`c) Wesinger does not disclose "communicate
`
`with the second network device
`
`using the secure communications service via the secure communication link."
`
`8.
`
`As to paragraphs 7 a) to 7 c), Examin

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket