Ex Parte PAPIERNIAK et al - Page 3




            Appeal No. 2002-0294                                                                              
            Application No. 09/067,806                                                                        


                   It is the examiner’s position that Bachman discloses a system which includes               
            arranging internet data stored as separate non-correlated data records that relate to             
            internet data records with individual users, citing Bachman’s abstract, Figure 2, and             
            column 3, lines 4-6.  The examiner further contends that Bachman’s secure token is                
            equivalent to the claimed “Internet data records with individual users.”  The examiner            
            cites column 3, lines 18-21, and Figure 2 for the claimed “forming a page map;” cites             
            column 3, lines 25-30, and Figure 2 for the claimed “forming a user session map;” and             
            column 3, lines 30-47, lines 66-67, and column 4, lines 1-3, for the claimed “forming a           
            user session page map.”                                                                           
                   We have reviewed the portions of Bachman cited by the examiner but we find no              
            mention of the claimed “page map,” “user session map,” or “user session page map.”                
                   Of course, an analysis of the claim language initially entails assigning a meaning         
            to the specific claim terms.                                                                      
                   Instant Figure 4, together with pages 15-17 of the instant specification, describes        
            the claimed “page map” as being formed by the steps shown in the flowchart of Figure              
            4.  At the very least, formation of the page map entails collecting data from web and             
            proxy server logs.  Similarly, reference to Figure 7 shows that, at the very least,               
            formation of a user session map entails the collection of data from server, proxy and             





                                                      3                                                       





Page:  Previous  1  2  3  4  5  6  Next 

Last modified: November 3, 2007