Appeal Number: 2006-2502 Application Number: 09/768,434 FIG. 5 illustrates a high level flow chart which depicts a server computer system establishing an access registry within a service executing on the server, and receiving log-in tokens from client computer systems in accordance with the method and system of the present invention. The process starts as depicted at block 500 and thereafter passes to block 502 which illustrates the service establishing an access registry within the service. The access registry is utilized by the service to store all preregistered log-in tokens which identify the particular client computer hardware which are approved to utilize the service. (Col. 6, lines 5-15). And Next, block 708 depicts a determination of whether or not the received, decrypted token matches any of the initial tokens stored in the access registry. If a determination is made that the received log-in token does match one of the stored initial tokens, then the client computer hardware identified by the token is pre-approved to access and utilize the service. Block 712, then, illustrates the service transmitting an approval to the client computer hardware identified by the log-in token to utilize the service. The process then terminates as illustrated at block 710. Referring again to block 708, if a determination is made that the service is not able to match the received token to any token stored in the access registry, then the client hardware identified by the token is not registered to utilize the service. Therefore, the process terminates at block 710. (Col. 6 line 62 – Col. 7 line 9). These passages describe determining at the server if the log-in token, which is equivalent to a service tag, is valid, and generating a message if valid, and describe valid log-in tokens corresponding to computer systems that purchased a benefit of utilizing the service, which meet the claimed subject matter limitations. Therefore, we find the appellants’ arguments as to independent claims 1 and 14 to be unpersuasive. 5Page: Previous 1 2 3 4 5 6 7 8 9 10 Next
Last modified: September 9, 2013