Ex Parte Sloan et al - Page 5

            Appeal Number: 2006-2502                                                                          
            Application Number: 09/768,434                                                                    



                   FIG. 5 illustrates a high level flow chart which depicts a server                          
                   computer system establishing an access registry within a service                           
                   executing on the server, and receiving log-in tokens from client                           
                   computer systems in accordance with the method and system of the                           
                   present invention. The process starts as depicted at block 500 and                         
                   thereafter passes to block 502 which illustrates the service                               
                   establishing an access registry within the service. The access registry                    
                   is utilized by the service to store all preregistered log-in tokens which                  
                   identify the particular client computer hardware which are approved                        
                   to utilize the service.                                                                    
                   (Col. 6, lines 5-15).                                                                      
            And                                                                                               
                   Next, block 708 depicts a determination of whether or not the                              
                   received, decrypted token matches any of the initial tokens stored in                      
                   the access registry. If a determination is made that the received log-in                   
                   token does match one of the stored initial tokens, then the client                         
                   computer hardware identified by the token is pre-approved to access                        
                   and utilize the service. Block 712, then, illustrates the service                          
                   transmitting an approval to the client computer hardware identified by                     
                   the log-in token to utilize the service. The process then terminates as                    
                   illustrated at block 710. Referring again to block 708, if a                               
                   determination is made that the service is not able to match the                            
                   received token to any token stored in the access registry, then the                        
                   client hardware identified by the token is not registered to utilize the                   
                   service. Therefore, the process terminates at block 710.                                   
                   (Col. 6 line 62 – Col. 7 line 9).                                                          
                These passages describe determining at the server if the log-in token, which is               
            equivalent to a service tag, is valid, and generating a message if valid, and describe            
            valid log-in tokens corresponding to computer systems that purchased a benefit of                 
            utilizing the service, which meet the claimed subject matter limitations.                         
                Therefore, we find the appellants’ arguments as to independent claims 1 and 14                
            to be unpersuasive.                                                                               

                                                      5                                                       


Page:  Previous  1  2  3  4  5  6  7  8  9  10  Next

Last modified: September 9, 2013