sanders, darren michael technique for enabling remote data …€¦ · sanders, darren michael...

160
FILE HISTORY US 7,254,621 PATENT: INVENTORS: TITLE: APPLICATION NO: FILED: ISSUED: COMPILED: 7,254,621 Singhal, Sandeep Kishan Levinson, Barry Eliot Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A 07 MAR 2005 07 AUG 2007 12 JUL 2012

Upload: others

Post on 26-May-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

FILE HISTORY

US 7,254,621

PATENT:

INVENTORS:

TITLE:

APPLICATIONNO:

FILED:

ISSUED:

COMPILED:

7,254,621

Singhal, Sandeep Kishan

Levinson, Barry Eliot

Sanders, Darren Michael

Technique for enabling remote data accessand manipulation from a pervasive device

US200575437A

07 MAR 2005

07 AUG 2007

12 JUL 2012

Page 2: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

7,254,621

TECHNIQUE FOR ENABLING REMOTE DATA ACCESS ANDMANIPULATION FROM A PERVASIVE DEVICE

Transaction History

Date Transaction Description03-07-2005 Initial Exam Team nn03-27-2005 IFW Scan & PACR Auto Security Review04-06-2005 Cleared by OIPE CSR04-11-2005 Corrected Paper04-11-2005 Application Return TO OIPE04-11-2005 Application Return from OIPE04-11-2005 Application Is Now Complete04-11-2005 Application Return TO OIPE04-11-2005 Application Dispatched from OIPE04-11-2005 Application Is Now Complete06-09-2005 Applicant has submitted new drawings to correct Corrected Papers problems06-17-2005 Application Return from OIPE06-17-2005 Application Is Now Complete07-29-2005 Transfer Inquiry to GAU10-03-2005 Information Disclosure Statement considered10-03-2005 Information Disclosure Statement (IDS) Filed10-03-2005 Information Disclosure Statement (IDS) Filed10-03-2005 Reference capture on IDS10-12-2005 IFW TSS Processing by Tech Center Complete09-21-2006 Case Docketed to Examiner in GAU01-02-2007 Non-Final Rejection01-08-2007 Email Notification01-08-2007 Mail Non-Final Rejection01-10-2007 Electronic Review01-26-2007 Terminal Disclaimer Filed01-26-2007 Response after Non-Final Action02-02-2007 Date Forwarded to Examiner02-03-2007 PARALEGAL OR ELECTRONIC TERMINAL DISCLAIMER APPROVED02-03-2007 Notification of Terminal Disclaimer - Accepted04-17-2007 Document Verification04-17-2007 Notice of Allowance Data Verification Completed04-20-2007 Mail Notice of Allowance04-20-2007 Mail Notification of Terminal Disclaimer - Accepted04-21-2007 Email Notification04-26-2007 Electronic Review07-02-2007 Issue Fee Payment Verified

Page 3: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

07-02-2007 Issue Fee Payment Received07-03-2007 Application Is Considered Ready for Issue07-09-2007 Dispatch to FDC07-18-2007 Issue Notification Mailed08-07-2007 Recordation of Patent Grant Mailed08-07-2007 Patent Issue Date Used in PTA Calculation

Page 4: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Issue Classification Application/Control No. Appllcant(s)Patent underIssue Classification ReexaminationI 11/075,437 SINGHAL ET ALExaminer Art Unit

Moustafa M. Meky 2157

ISSUE CLASSIFICATION .ORIGINAL CROSS REFERENCE(S)

CLASS SUBCLASS CLASS SUBCLASS (ONE SUBCLASS PER BLOCK)

709 218 709 217

INTERNATIONAL CLASSIFICATION

G 0 6 F 15/16

Total Claims Allowed: 24

PR!Wlrg O.G. O.G.4l//"/2CD7 Print Claim(s) Print Fig.

(Legal Instruments Examiner) (Date) (Primary Examiner) (Date)1 1

[ Claims renumbered in the same order as presented by applicant [ CPA O T.D. [ R.1.47

C '0 . C C

O 0 o o o o o

1 31 61 91 121 151 1812 32 62 92 122 152 1823 33 63 93 123 153 1834 34 64 94 124 154 1845 35 65 95 125 155 1856 36 66 96 126 156 1867 37 67 97 127 157 1878 38 68 98 128 158 1889 39 69 99 129 159 18910 40 70 100 130 160 19011 41 71 101 131 161 19112 42 72 102 132 162 19213 43 73 103 133 163 19314 44 74 104 134 164 19415 45 75 105 135 165 19516 46 76 106 136 166 19617 47 77 107 137 167 19718 48 78 108 138 168 19819 49 79 109 139 169 19920 50 80 110 140 170 20021 51 81 111 141 171 20122 52 82 112 142 172 20223 53 83 113 143 173 20324 54 84 114 144 174 20425 55 85 115 145 175 20526 56 86 116 146 176 20627 57 87 117 147 177 20728 58 88 118 148 178 20829 59 89 119 149 179 20930 60 90 120 150 180 210

U.S. Patent and Trademark Office Part of Paper No. 20070412

Page 5: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Application/Control No. Applicant(s)lPatent underIndex of Claims Reexamination

11/075,437 SINGHAL ET AL.Examiner Art Unit

Moustafa M. Meky 2157

4 Rejected (Through numeral) Non-Elected A AppealAllowed RCancelled I Interference Objected

= Allowed + Restricted I Interference O Objected

Claim Date

oO c

51525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899

100

Claim Date

0O101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140

141

142

143144145146147148149150

U.S. Patent and Trademark Office Part of Paper No. 20061229U.S. Patent and Trademark Office Part of Paper No. 20061229

Page 6: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

ApplicationlControl No. Applicant(s)/Patent underIndex of Claims Reexamination

11/075,437 SINGHAL ET AL.Examiner Art Unit

_______________ 110Moustafa M. Meky 2157

Claim Date

m 0

1 =2 =3 =4 =5 =6 =7 =8 =9 =

10 =11 =12 =13 =14 =15 =16 =17 =18 =19 =20 =21 =22 =23 =24 =2526272829303132333435363738394041424344454647484950

Claim Date

o

51525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100

Claim Date

- C

101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150

U.S. Patent and Trademark Office Part of Paper No. 20070412Part of Paper No. 20070412U.S. Patent and Trademark Office

Page 7: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Search Notes ApplicationlControl No. Applicant(s)1Patent underReexamination

11/075,437 SINGHAL ET AL.Examiner Art Unit

Moustafa M. Meky 2157

INTERFERENCE SEARCHED

Class Subclass Date Examiner

SEARCH NOTES(INCLUDING SEARCH STRATEGY)

DATE EXMR

WEST(ALL FILESO 12/29/2006 MMM

______ -I-

U.S. Patent and Trademark Office Part of Paper No. 20061229

SEARCHED

Class Subclass Date Examiner

709 200-203 12/29/2006 MMM

709 217-227 12/29/2006 MMM

4 I

U.S. Patent and Trademark Office Part of Paper No. 20061229

Page 8: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

ApplicationlControl No. Applicant(s)/Patent UnderReexamination

Search Notes 11075437 SINGHAL ET AL.

IIIIIIIllllll Examiner Art Unit

Meky, Moustafa M 2157

SEARCHED

Class Subclass Date ExaminerUPDATE 4/12/2007 MMM

SEARCH NOTES

Search Notes Date ExaminerWEST(ALL FILES) 4/12/2007 MMM

INTERFERENCE SEARCH

Class Subclass Date Examiner709 218 4/12/2007 MMM709 217 4/12/2007 MMM

U.S. Patent and Trademark Office Part of Paper No.: 218

Page 9: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Search History Transcript

WEST Search. History

Hide Items Restore Clear Cancel

DATE: Friday, December 29, 2006

Set HitHide? Name Query CountDB=PGPB, USPT, USOC,EPAB,JPAB,D WPI, TDBD; PL UR=YES; OP=ADJ

[ L6 13 same 15 57

QO L5 14 near5 (content or data or information or file or response) 4552

O L4 manipulat$5 near3 operation 27670

0I L3 11 or L2 362919

Ol L2 pda 129139

Or L1 (pervasive or wireless or portable or mobile or handheld or phone or 287145telephone or cellular or smart) adj2 (device or unit or appliance)

END OF SEARCH HISTORY

\ 1 7s1Y7

http://jupiter:9000/bin/cgi-bin/srch hist.p?state=bg9ctg.106.57&f=ffsearch&userid=... 12/29/06

Page 1 of 1

Page 10: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Search. History Transcript

WEST Search History

Hide Items Restore Clear Cancel

DATE: Thursday, April 12, 2007

Set HitHide? OneyyName Count

DB=PGPB, USPT, USOC,EPAB,JPAB,D WPI, TDBD; PLUR= YES; OP=ADJr L15 L14 not 113 140] L14 18 not 110 196r L13 L12 not 110 56O L12. 18 and @ap<20010503 61

DB=EPAB; PLUR=YES; OP=ADJr L11 KR-2001025524-A.did. 0

DB=PGPB, USPT, USOC,EPAB,JPAB,D WPI, TDBD; PLUR= YES; OP=ADJ] L10 18 same L9 12

] L9 (user or client or device or unit or phone or telephone or terminal or apparatus) 283475near4 request] L8 16 same L7 208

rO L7 (list$4 or menu or icon or interface) near4 (service or operation or task or 161912manipulat$4)r L6 12 same 15 3714O L5 13 or L4 134578O L4 manipulat$4 near5 (operation or service or task) 47835O L3 manipulat$4 near5 (content or file or response or data or information) 101005] L2 L1 or pda 853668

(pervasive or wireless or portable or mobile or handheld or phone or telephoneF L1 or cel$2 or cellular or smart or telephonic) adj2 (device or unit or phone or 821990

telephone or terminal or apparatus)

END OF SEARCH HISTORY

\\ ) o751 37

http://jupiter2:9000/bin/cgi-bin/srchhist.pl?state=61 mfih.328.1 &f=ffsearch&userid-mmeky

Page 1 of 1

4/12/07

Page 11: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

(12) United States PatentSinghal et al.

(10) Patent No.:(45) Date of Patent:

II II 1llll 1111ll ll lllllll

US 7,254,621 B2*Aug. 7, 2007

Sandeep Kishan Singhal, EnglewoodCliffs, NJ (US); Barry Eliot Levinson,New York, NY (US); Darren MichaelSanders, Nanuet, NY (US)

Symantec Corporation, Cupertino, CA(US)

( * ) Notice: Subject to any disclaimer, the term of thispatent is extended or adjusted under 35U.S.C. 154(b) by 246 days.

This patent is subject to a terminal dis-claimer.

(21) Appl.

(22) Filed:

(65)

No.: 11/075,437

Mar. 7, 2005

Prior Publication Data

US 2005/0216492 Al Sep. 29, 2005

Related U.S. Application Data

(63) Continuation of application No. 09/848,394, filed onMay 3. 2001, now Pat. No. 6,925,481.

(51) Int. Cl.GO6F 15/16 (2006.01)

(52) U.S. CI ..................................... 709/218; 709/217(58) Field of Classification Search ........ 709/200-203,

709/217-227See application file for complete search history.

(56) References Cited

U.S. PATENT DOCUMENTS

6,640,106 B2 *6,765,596 B26,816,719 BI

2002/0065110 Al*2002/0102965 Al*2004/0194014 AI*2005/0113139 Al*

10/20037/2004

11/20045/20028/20029/20045/2005

Gutowski et al. ........ 455/456.1Lection et al.Heinonen et al.Enns et al. .............. 455/566Mandahl et al ......... 455/412Anwar ..................... 715/500Boss et al. .............. 455/558

* cited by examiner

Primary Examiner-Moustafa M. Meky(74) Attorney Agent, or Finrm-Fenwick & West LLP

(57) ABSTRACT

Methods, systems, and computer program instructions forenabling users of pervasive devices to remotely access andmanipulate information in ways that might otherwise beimpossible or impractical because of inherent limitations ofthe device. The disclosed techniques enable a wide varietyof data manipulation operations to be performed on behalf ofthe pervasive device, for a wide variety of content types. Inpreferred embodiments, no modifications or add-ons arerequired to the pervasive device.

24 Claims, 9 Drawing Sheets

(54) TECHNIQUE FOR ENABLING REMOTEDATA ACCESS AND MANIPULATION FROMA PERVASIVE DEVICE

(75) Inventors:

(73) Assignee:

~__I__

Page 12: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

U.S. Patent

'II

6i

Aug. 7, 2007 Sheet 1 of 9 US 7,254,621 B2

Page 13: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

U.S. Patent Aug. 7, 2007

t

CO

00s

Xx

Sheet 2 of 9

~t~m

US 7,254,621 B2

4- R

CZC

00 C

(U

wcr

DC

C

UC

t

Page 14: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

U.S. Patent Aug. 7, 2007 Sheet 3 of 9

FIG. 3

WID Requests 300Data

Request Routed to 310CorrespondingProtocol Proxy

Forward 320request to

information source

Receive 330response from

information source

Obtain 340available service

information

Format 350information to includeaccess to services

Forward 360information to

requesting WI D

WID receives 370data and

service information

US 7,254,621 B2

Page 15: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

U.S. Patent Aug. 7, 2007 Sheet 4 of 9 US 7,254,621 B2

Page 16: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

U.S. Patent

C

0

.-2~

Aug. 7, 2007

to

Sheet 5 of 9 US 7,254,621 B2

C)1

E84icm)

JI

CL.

-'

0.

.)

C04-'

C',

0o

Page 17: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

U.S. Patent

10-

Aug. 7, 2007

10

Sheet 6 of 9

C)0'Q

N

crhOU1U00

C)

0c

I0N

V3O

I-I

Id

9)ID

II

L

l0

Nd,C10

US 7,254,621 B2

(X4LO

0

L()

C)

N

I'

0

Page 18: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

U.S. Patent

0IC)

d

2t1U)

Aug. 7, 2007

dO

Sheet 7 of 9

E

8

(1

c )

-lo

U)

Ur)

EL

I I

0)

E

Q)

...c

U)

U)

C/)

US 7,254,62 1 B2

4ILC

"

0

C

0

0a

0.

U)

to

.

Page 19: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Aug. 7, 2007 Sheet 8 of 9

FIG. 6A

601 602 603 6)4

http/192.16. /reefed de

600 a

S610.

610

U.S. Patent US 7,254,621. B22

(~ ~r~4~~4~~ ~C~fld

'x ~i~i~~;: lh r37

Page 20: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Aug. 7, 2007 Sheet 9 of 9

FIG. 6B

601 603 694

http //192,168.1.10/re -gede

600

620

U.S. Patent US 7,254,621 B2

Page 21: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B21

TECHNIQUE FOR ENABLING REMOTEDATA ACCESS AND MANIPULATION FROM

A PERVASIVE DEVICE

CROSS-REFERENCE TO RELATEDAPPLICATION

This application is a continuation of prior application Ser.No. 09/848,394, filed May 3, 2001, which is hereby incor-porated herein by reference, now U.S. Pat. No. 6,925,481.

FIELD OF THE INVENTION

The present invention relates to pervasive computing, andmore particularly to methods, systems, and computer pro-gram instructions for enabling users of pervasive devices(such as limited-function mobile devices, smart appliances,etc.) to remotely access and manipulate information in waysthat might otherwise be impossible or impractical because ofinherent limitations of the device.

BACKGROUND OF THE INVENTION

Pervasive devices (also referred to as "pervasive comput-ing devices") have become popular in recent years as peopleincreasingly seek "anywhere, anytime" access to servicessuch as voice and data communications. Many pervasivedevices are designed to be mobile, and may equivalently bereferred to as "mobile devices" or "mobile computingdevices". Examples of mobile pervasive devices range fromtwo-way pagers to personal digital assistants, or "PDAs"(such as the Palm Pilot, Handspring VisorTM, or CompaqiPAQ) to cellular phones (such as the Nokia 6110) tomulti-function devices (such as the Nokia 9110 or Qual-comm "pdQTM" smartphone). ("Visor" is a trademark ofHandspring, and "pdQ" is a trademark of QUALCOMMIncorporated.) All pervasive devices are not necessarilymobile, however. Examples of this latter category includesmart appliances for the home or business setting, deviceswhich are permanently mounted in automobiles, and soforth.

Pervasive devices typically share several common char-acteristics:

I) limited processor speed;2) limited memory capacity;3) small size, which limits the richness of the data input

and output interfaces (for example, small screen, limitedkeypad, and so forth);

4) a limited amount of software pre-installed on thedevice; and

5) access to limited-bandwidth networks.The inherent drawbacks of these characteristics are fur-

ther exacerbated by:1) the need to maximize the device's relatively short

battery life-which in turn prevents additional processorpower or memory capacity from being added to the device;and2) the need to simplify use of the device-which in turn

reduces the desirability of supporting an "open" softwareinstallation platform in which arbitrary software packagesmight be added.

As people rely on pervasive devices for day-to-day infor-mation access tasks, they find that the experience can beextremely limiting. While pervasive devices vary widely infunctionality and in their capabilities, some general obser-vations for an average pervasive device can be made. First,the device typically does not have sufficient memory to store

2all of the information that the user requires. Indeed, most ofa user's files or data are normally stored on a desktoppersonal computer ("PC"), laptop. or corporate server.Moreover, the device's memory limitations often prevent the

5 user from manipulating large files, such as graphics-inten-sive presentations (where it might be desirable, for example,to re-order the slides within a presentation). Second, thedevice typically does not have the software required toaccess all of the data that the user might wish to use. For

to10 example, most pervasive devices are unable to run commonsoftware applications such as Microsoft® Word orMicrosoft® Powerpoint. ("Microsoft" is a registered trade-mark of Microsoft Corporation.) Some pervasive devices,such as two-way pagers from Research In Motion ("RIM"),

15 do not usually have a Web browser installed, and thereforethe user cannot render data formatted as Web documents.Third, the device often does not have the necessary driversinstalled with which to support all the data manipulationoperations the user might wish to perform. For example,

20 pervasive devices typically do not have drivers to supportoperations such as printing and faxing. Similarly, pervasivedevices typically do not have drivers for video graphicsarray ("VGA") adapters that would enable the device todisplay content to a projector (such as a liquid crystal

25 display, or "LCD." projector).Some pervasive devices would not be considered as

limited in function, although they may suffer from some ofthe drawbacks of limited-function devices such as poorease-of-use (having, for example, a small screen size).

30 Examples include the Compaq iPAQ Home Internet Appli-ance IA-1 and the AudreyTM home appliance from 3ComCorporation. ("Audrey" is a trademark of 3Com Corpora-tion.) The term "Wireless Information Device", or "WID",will be used hereinafter to refer to this type of pervasive

35 device as well as limited-function pervasive devices. (Thisterm recognizes the fact that both the limnited-function andtifull-funimction pervasive computing devices typically com-municate using wireless communication techniques andprotocols, such as 802.11, Bluetooth. and so forth.)

40 Various attempts have been made to address the limita-tions of WIDs; however, existing approaches fail to providea satisfactory solution.

One existing approach to addressing the limitations ofWIDs involves the technique of "transcoding" content into

45 a form that is better suited for the WID. Products such as theWebSphere® Transcoding Publisher from InternationalBusiness Machines ("IBM") Corporation and SpyglassPrism from Open TV, Inc. represent examples of this classof solution. ("WebSphere" is a registered trademark of

5so IBM.) Through transcoding, the content is programmaticallymanipulated for a target device. For example, the transcod-ing process may enable the content to be rendered effectivelyon a small-screen device (perhaps by altering font size,removing image files, and so forth). Typically, a "transcod-

55 ing engine" located on a server or network device receivesthe content in its original form, performs a conversionprocess, and delivers the renderable formnnat to the clientdevice. However, these transcoding solutions only addressthe need to view content: they do not provide a capability to

60 manipulate the content from the WID. For example, thetranscoding process does not enable the WID to e-mail, fax,print, or project the content.

Another approach to addressing the limitations of WIDsinvolves supplementing the capabilities of the WID through

65 the deployment of hardware adapters or software. Forexample, a special-purpose attachment (known as a "Spring-boardTM" module) may be plugged into a Handspring Visor

Page 22: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B2

device to enable the device to perform additional functionssuch as viewing and projecting Microsoft PowerPoint files.("Springboard" is a trademark of Handspring.) The Pre-senter-to-Go TM module from Margi Systems, Inc. is oneinstance of such an attachment. ("Presenter-to-Go" is a 5

trademark of Margi Systems, Inc.) As another example,software may be installed on a Microsoft Pocket PC deviceto enable the device to print Microsoft Word files to a limitedset of printers. The PrintPocketCE software from FieldSoft-ware Products is one instance of such a software product. 10oHowever, these client-centric add-on approaches increasethe cost of the WID solution significantly and sometimes farexceed the cost of the WID itself. They also require addi-tional power, effectively reducing the WID's available bat-tery life. Each add-on solution typically supports only a issingle data manipulation option (or a very limited set ofoptions), for only a limited set of file formats (or in somecases, for a single file format). Several different add-ons maytherefore be needed to enable a WID to meet a particularuser's requirements. An additional disadvantage of this 20approach is that the extra hardware is often bulky andinconvenient to carry, whereas additional software oftenrequires a complex installation process by end-users, con-sumes valuable memory on the WID, and may not interop-crate effectively with existing software loaded on the WID. 25

Therefore, what is needed is a technique for enablingWIDs to access and manipulate data that avoids the limita-tions of the prior art.

SUMMARY OF TIIE INVENTION 30

The present invention is directed to methods, systems, andcomputer program instructions for enabling wireless infor-mation devices to access and manipulate data. The databeing accessed may reside on a Web server, a file server, a 35personal desktop PC, or elsewhere. The data may representvirtually any type of information, including Web content,e-mail messages, or files in various formats. The datamanipulation operations that are provided through use of thepresent invention may include viewing, faxing, printing, and 40projecting the data, as well as delivering the data to a voicemessaging system.

Note that the discussion herein is primarily in terms of alimited set of data manipulation tasks or operations. Theseoperations are discussed for purposes of illustration, and not 45of limitation. Many other manipulation operations might beprovided in an implementation of the present invention,including modifying or changing data in some way; con-verting data from one format to another; transferring datafrom one device to another (e.g. to a remote file server for sostorage); publishing the data to a Web site; importing data(including a file or document) into a repository; disseminat-ing data to one or more recipients (such as by sending e-mailmessages); attaching data to a workflow message; control-ling a remote application (such as launching and paging 55through a remotely hosted PowerPoint presentation); and soforth.

Enabling WIDs to easily access a wide variety of types ofdata and to initiate a wide variety of manipulations on thatdata in an efficient, cost-effective manner-in spite of the 60device's inherent limitations (such as limited processorcapacity, limited embedded software, and/or limited band-width capability)-is a primary objective of the presentinvention.

In preferred embodiments, the techniques of the present 65invention provide these advantages without requiring theinstallation of new software or hardware on the WID, in a

manner that is easily extensible to support new manipulationoperations and new data types.

Objectives of the present invention are realized by asolution that comprises one or more proxies, zero or moreagents, and a data manipulation server (hereinafter, "DMS").The DMS provides information about what services may beperformnned, and how to invoke those services. The DMS alsoperforms operations on behalf of the WID, in cooperationwith the proxies and the agents. In preferred embodiments,the proxies, agents, and DMS are not located within theWID, but instead are accessed by sending one or morerequest messages from the WID. This solution enables theWID's capabilities to be augmented in a very flexible yetpowerful and cost-effective manner, without requiring anymodifications to be made to the WID itself.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 provides a block diagram which depicts an archi-tecture and components of a preferred embodiment of thepresent invention.

FIGS. 2A and 2B illustrate examples of a table in whichinformation about available data access and/or manipulationservices is stored, according to a preferred embodiment ofthe present invention.

FIG. 3 provides a flowchart that depicts logic with whicha WID accesses data and receives information about whatmanipulation operations are available on that data, accord-ing to a preferred embodiment of the present invention.

FIG. 4 provides a flowchart that depicts logic with whicha WID requests a manipulation service upon data it hasaccessed, and with which that service is performed, accord-ing to a preferred embodiment of the present invention.

FIGS. 5A-5I provide syntax examples that are used indescribing operation of a preferred embodiment of thepresent invention.

FIGS. 6A and 6B illustrate samples of graphical userinterface ("GUI") displays that may be used to displayavailable service information, according to the presentinvention.

DETAILED DESCRIPTION OF THEPREFERRED EMBODIMENTS

The present invention will now be described more fullyhereinafter with reference to the accompanying drawings. inwhich a preferred embodiment of the invention is shown.Like numbers refer to like elements throughout.

Flowchart illustrations of aspects of the present inventionare described below. The logic of these flowcharts may beprovided as methods, systems, and/or computer programinstructions embodied on one or more computer readablemedia, according to an embodiment of the invention. As willbe obvious to one of ordinary skill in the art, these flowchartsare merely illustrative of the manner in which the associatedaspects of the present invention may be implemented, andchanges may be made to the logic that is illustrated therein(for example, by altering the order of operations shown insome cases, by combining operations, etc.) without deviat-ing from the inventive concepts disclosed herein.

The present invention provides an efficient, cost-effectivetechnique for enabling a wireless interface device to easilyaccess a wide variety of types of data and to initiate a widevariety of manipulations on that data, without requiring theinstallation of new software or hardware on the WID, and ina manner that is easily extensible to support new manipu-lation operations and new data types.

Page 23: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B2

FIG. 1 illustrates a preferred architecture and componentsof a system in which the present invention operates. Thesystem may provide support for multiple WIDs, althoughonly one WID 130 is illustrated in FIG. 1. The WID, whichin preferred embodiments is a commercially-available WIDwhich may be provided by any one of a number of vendors,includes at least one software application with which a userinteracts to access and/or manipulate data. In preferredembodiments, this user-interaction software application isthe only software required on the WID to enable use of thepresent invention. This user-interaction software preferablycomprises a browser implementation (such as a Webbrowser); in alternative embodiments, other types of user-interaction software applications (including, but not limitedto, e-mail client software) may be used. The user-interactionsoftware application may be installed on the WID when it ismarketed, and may be a commercially-available softwareimplementation. When browser software is present, it pref-erably supports at least one markup language. Examples ofmarkup languages that may be supported include the Hyper-text Markup Language ("HTML"); Wireless Markup Lan-guage ("WML"); and Voice Extensible Markup Language("VoiceXML").

Note that while preferred embodiments of the presentinvention operate with commercially-available WIDs andwithout requiring hardware or software modifications oradd-ons, in alternative embodiments the WID may be spe-cifically adapted for use with the present invention, withoutdeviating from the inventive concepts disclosed herein. Forexample, a WID might include modifications to provide auser interface tailored for use with the present invention, orperhaps code for optimizing data access and/or manipulationprocessing. Moreover, auxiliary software may be providedto provide enhanced authentication, encryption, compres-sion, or similar functions that augment the transmission ofdata described herein. Furthermore, while the preferredembodiment anticipates invocation by user interaction (anduser-interaction software), there may be implementations inwhich automated or programmatic invocation is appropriate.In these cases, software which embodies the automated orprogrammatic invocation may replace the previously-de-scribed user-interaction software as the only softwarerequired on the WID to enable use of the present invention.Or, the two forms of invocation software may co-exist on aWID.

At least one protocol proxy 120 is provided, according tothe teachings of the present invention. A protocol proxyprovides a bridge between the client (i.e. an applicationexecuting on WID 130) and the information that it seeks toaccess and manipulate. A protocol proxy is responsible foraccessing information on behalf of the client and (in pre-ferred embodiments) annotating this accessed informationwith information about the manipulation services availablefor that accessed information. (The annotation process isdescribed in more detail below, with reference to Block 350of FIG. 3.) The information may be accessed, for example,from its location on one or more Web content servers in theWorld Wide Web (hereinafter, "Web") 110, in a distributedfile system 150 of the prior art, or from an application of theprior art. This content server may deliver content thatincludes services which have been "pre-added" to the con-tent (e.g. by querying the DMS directly), so that the protocolproxy is not required to provide additional annotations. Thislatter situation may be particularly beneficial, for example,if the content server happens to be co-located with the DMS.

Preferred embodiments of the present invention include atleast one of the following types of protocol proxy: (1) a

Hypertext Transfer Protocol ("HTTP") proxy, (2) a WirelessSession Protocol ("WSP") proxy, and (3) a Simple MailTransfer Protocol ("SMTP"), Post Office Protocol ("POP" or"POP3"), or Internal Message Access Protocol ("IMAP")

5 proxy. An HTTP proxy handles requests for and reception ofinformation using HTTP request and response messages. AWSP proxy handles requests for and reception of informa-tion using WSP request and response messages. SMTP, POP,and IMAP proxies handle requests for and reception of

to electronic mail respectively using SMTP, POP, and IMAPrequest and response messages.

Alternative embodiments may include different and/oradditional protocol proxy types. For example, a synchroni-zation protocol proxy may be included, which may be used

is to synchronize data stored locally on a user's WID with datastored elsewhere (such as on the user's desktop PC). Anexample synchronization protocol is "SyncML" which isbeing developed by The SyncML Initiative to seamlesslysynchronize wireless and wireline data and devices. (See

20 http://www.syncml.org for more information on SyncML.)The protocol proxies in a particular implementation of the

present invention may each runm on different hosts if desired,and individual protocol proxies may be co-located withother components of the system. The protocol proxy func-

25 tion described herein may be replicated, if desired (forexample, to administratively separate different types ofproxy function, for purposes of fault tolerance or faultisolation, for scalability and load balancing, etc.) Moreover,a single proxy may itself be divided into separate compo-

30 nents. For example, an HTTP proxy may include a firstcomponent that determines whether the request is for con-tent on the Web or perhaps on a file server; a secondcomponent that handles those requests which are for Webcontent; and a third component that handles those requests

35 which are for content from a file server. The multiplecomponents may, in turn, be distributed across multiplemachines.

In one embodiment, prior art configuration mechanismsare used to adapt the WID for communicating with a

40 protocol proxy. For example, the client Web browser may beinstructed to conmmunicate with an HTTP proxy, or synchro-nization software on the WID may be configured to sendsynchronization protocol messages to the synchronizationprotocol proxy. In this embodiment, the protocol proxy then

45 intercepts outbound messages from the client on the WIDand processes those messages as disclosed herein. In anotherembodiment, a WID conmmunicates with a protocol proxythrough a wireless access point (not shown in FIG. 1), suchas an 802.11 access point or a Bluetooth access point (the

50 functioning of which is known in the art). In this latterembodiment, the access point or an adapter device commu-nicating with the access point receives outbound messagesfrom the WID and evaluates those messages to determinewhich protocol is in use. The access point or adapter device

55 then routes the outbound message to the appropriate proto-col proxy. (This latter embodiment is preferred in the presentinvention because it avoids the need to configure the WID.)

Zero or more file access proxies 140 are also provided,according to the present invention. File access proxies may

60 be located on various file servers, desktop computers, data-base systems, or other storage devices, and provide access todata stored in one or more repositories 150 which are locatedon (or otherwise accessible to) those machines. A particularfile access proxy may access data from a local repository,

65 within remote data stores (such as information that isaccessible from a remote file server or Web server), infor-mation stored within local applications (such as stored

Page 24: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B2

e-mail messages), and/or information stored within remoteapplications (such as information that is accessible througha database or directory application). Accessible informationmay be dynamically generated by the local or remoteapplication, such as a live sensor reading.

A data manipulation server 160 is provided, according tothe present invention. In preferred embodiments, the DMShas two roles. One role is to provide data manipulationservices. Another role is to maintain a repository of theavailable services for various types of data and to make thisinformation available.

While not shown in FIG. 1, it may be desirable in somesituations to have multiple data manipulation servers 160,for example for purposes of availability or load balancing oradministrative control. Furthermore, the DMS may belocated within a cluster. The function of the DMS mayoptionally be partitioned, with different services hosted ondifferent DMS's.

In its role of providing data manipulation services, thoseservices may be provided by the DMS either directly, orindirectly by invoking one or more data output agents 170(which are described below). For example, the DMS maydirectly manipulate content by performing a conversion ofthe content into HTML upon receiving a conversion requestfrom the WID. As another example, the DMS may indirectlymanipulate content by forwarding the content to a filemanipulation agent. where that file manipulation agent isresponsible for storing the content in a repository. In simplecases, the DMS may operate in a "pass-through" modewherein it merely forwards content to a data output agent(such as a file manipulation agent). In most cases, however,the DMS performs operation-specific processing of the datareceived from the client before determining whether andwhere to forward data that may need further processing byan agent. In general, the data manipulation operations pro-vided by the DMS may be arbitrarily complex, and operatein a content-dependent manuer. In some cases, manipulationrequests received from the WID may imply other manipu-lations that need to be performed. As one example, if arequest is received from the WID to fax content to arecipient, the DMS preferably invokes a conversion process(which may be provided by the DMS, by a data output agent,or perhaps by another component of the system) to trans-form the content into Tag Image File Format ("TIFF"),where the resulting TIFF document is then sent to a dataoutput agent responsible for performing facsimile transmis-sion. As another example, if a request for printing a Webpage is received from the WID, the DMS first accesses thecontent of the Web page by retrieving it from the Web (orperhaps from cache storage) and then forwards that contentto a selected data output agent which is responsible for printservices. More information on the data manipulation pro-cessing provided by the DMS is provided below, withreference to FIG. 4.

In its role as a repository of available services, the DMSpreferably maintains a table (or a list or other analogousstructure, referred to hereinafter as a "table" for ease ofreference) to identify those services. At run-time, this tableis used to provide the WID with a list of the available datamanipulation services for particular data content. The tableis preferably organized according to file content type. Anexample is shown in FIG. 2A, which indicates that files oftype "XML" may be converted to WBXML ("WirelessApplication Protocol Binary XML") decks (see 205) orfaxed to recipients (see 210), whereas files of type "ASCII"may be sent as e-mail (see 215). In this example, the filecontent type appears first, in column 200; an identification of

the service appears next, in column 201; and an address ofthe service (i.e. a service invocation address, describedbelow) appears in colunm 202. The service identificationfrom column 201 may, for example, be presented to a user

5 on a user interface to enable user selection of the corre-sponding service.

Alternatively, the table may be organized in a differentmanner. Furthermore, the entries in the table may optionallyprovide for further qualifying the services, such that the

to availability of a particular service depends on additionalfactors beyond the file content type. Examples of suchfactors include: (1) identification of individual users or usergroups; (2) user privileges or access rights; (3) particularlocations from which a service will be available; (4) the

is target WID type; and (5) combinations of such factors. FIG.2B provides an example of this optional firther qualifica-tion, wherein the example table is organized according to filecontent type (in column 250), user identification (in column251), and location (in column 252). The service is identified

20 in column 253, and the service invocation address appears incolumn 254. As illustrated therein, the print service isavailable with all files and all locations (indicated by pres-ence of a wildcard symbol "*") for user A (see 255), whereasprinting is only available to user B for files of type ".doc"

25 and only while he is located in Conference Room C (see260).

When user identifying information is stored in the DMS'table for use as a factor in service availability, it may berepresented in several alternative formats, such as: the user's

30 name; a deparment number to which an authorized usermust belong; an Internet Protocol ("IP") address (which mayoptionally identify a user group, e.g. through a subnet mask)of the user's WID; and so forth. Similarly, location infor-mation used as a factor in service availability may be

35 represented in several alternative manners. Location infor-mation is further described below, with reference to Block340 of FIG. 3. Some factors used in determining serviceavailability, such as user access rights or privileges, mayrequire dynamically querying a directory or similar reposi-

40 tory at run-time to determine availability. Information usedin the retrieval may in some cases be obtained from therequest message issued by the client (e.g. from header valuesin HTTP requests). Techniques for performing this type ofdynamic look-up processing are well known in the art, and

45 will not be described in detail herein.The examples in FIGS. 2A and 2B use a simplified format

for purposes of illustration. In an actual implementation, theentries in the tables may vary from the format shown. Forexample, the identification of the available service may

50o perhaps be represented using numeric identifiers, rather thantextual descriptions. In this case, the WID may optionallycontain software adapted for use with the numeric codes,and may translate the codes into text before displaying a listof available services to the user. Or, this translation might be

55 perfonned by the protocol proxy before the available ser-vices list is returned to the WID. The table might also

contain an identification of an icon or graphic symbolcorresponding to selected ones of the available services,where this icon or symbol can be displayed to the user on the

60 WID. The table might also contain multiple versions of thetextual or graphical descriptions, to accommodate presenta-tion in different languages.

A "service invocation address" is specified for eachservice (see the examples in columns 202 and 254 of FIGS.

65 2A and 2B, respectively) and indicates an address at whichthe service may be invoked. In preferred embodiments, theseaddresses are provided as Uniform Resource Locators

Page 25: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B2

("URLs"). Preferably, the addresses are specified within theentries stored in the DMS's table, as shown in the exampletables of FIG. 2A and FIG. 2B. although alternatively theaddresses may be separately stored (perhaps as a storageoptimization). As an example of using the latter approach, a 5print service might appear many times in the DMS' table. Tobeliminate redundant storage of this service's URL, the URLmight be correlated to the print service but separately stored,enabling individual table entries such as 255 and 260 in FIG.2B (which specify qualifiers on when printing is available) toto be associated with the proper URL at rum-time eventhough column 254 is omitted. Similarly, separate storagemay be desirable in cases where the appropriate URL to usefor creating the available services list is determined dynami-cally at run-time. 15

Note that while the service invocation addresses usedherein as examples specify locations on a DMS, this is forpurposes of illustration and not of limitation. One or more ofthe URLs may alternatively identify services provided atlocations other than the DMS. 20

In alternative embodiments, service invocation addressesmay employ address formats other than URLs. such ase-mail addresses, or perhaps a combination of an e-mailaddress and subject line, to designate a service to beinvoked. 25

When requested information is delivered to a client appli-cation on the WID, a list of service invocation addresses forthe available services is provided along with that informa-tion (as will be discussed in more detail with reference toBlock 350 of FIG. 3). Each service invocation address is 30preferably augmented with an identity of the informationthat is to be operated upon. In some cases, it may be possibleto infer the information identity from the service invocationaddress, in which case this augmentation is not required. Forexample, a service invocation address might identify a 35Structured Query Language ("SQL") query whose result isimplicitly the data being manipulated.

Returning now to FIG. 1, one or more data output agents170. which implement specific output manipulation opera-tions (such as printing, faxing, projecting, or delivering to a 40voice mail system, the details of which do not form part ofthe present invention), are provided. (Note that a data outputagent, as the term is used herein, refers to a component thatdelivers file content to an output device, whereas a fileaccess proxy as defined herein retrieves file content in 45read-only mode. In some instances, a data output agent anda file access proxy may be co-located, and furthermore thesefunctions may be implemented within a single softwarecomponent.) The DMS passes data to selected ones of theseagents to perform the manipulation services which are 50

managed by the DMS. In preferred embodiments of thepresent invention, one or more of the following data outputagents are supported:

a print server agent, which is responsible for sending jobs 55to one or more printers;

a projection server agent, which is responsible for drivingthe display of content to an LCD projector. video display, orother graphical terminal;

a file manipulation server agent, which is capable of 60performing file operations such as copying, deleting, andrenaming files (and which is typically co-located with a fileaccess proxy);

an e-mail manipulation server agent, which is capable ofperforming e-mail operations such as sending, receiving, 65and deleting e-mail messages (and which is typically co-located with a file access proxy that accesses e-mail files);

a fax server agent, which is responsible for sendinginformation for facsimile transmission; and

a voice mail server agent, which is responsible for sendinginformation for delivery through a voice messaging system.

The agents may send data to queues or other similarstructures or processors, which may in turn be implementedas agents. For example, the output of a print server agentmay be sent to a selected print queue for printing (usingqueuing techniques which are well known in the art). Anagent such as a print server may manage local resources,such as a locally-stored print queue for a particular printer,or remote resources, such as access to multiple printers (eachof which typically has its own print queue processing). Indegenerate cases, a print server agent may be manifestedsimply as a print queue. Similarly, other agents such as thefax server agent and projection server agent may be mani-fested as queues for their respective devices.

Referring now to FIG. 3, logic is illustrated that may beused to provide data access support for a WID, includingdelivery of a list of the manipulation operations that areavailable on that data. At Block 300, the client software onthe WID issues a request for information. (This correspondsto request message flow 1 in FIG. 1. The encircled numbersin FIG. 1 all refer to message flows.) Typically, this requestis initiated by action of the WID user. Block 310 indicatesthat a protocol proxy receives this request. As describedearlier, the outbound request either may be received by theprotocol proxy to which the client software has been con-figured to communicate, or may be received by a wirelessaccess point or adapter device (which then inspects thecontent to detennine which protocol proxy is required, andforwards the request to that proxy).

At Block 320, the protocol proxy forwards the request tothe appropriate information source. For example, if therequest is an HTTP request for Web content issued by a Webbrowser, then an HTTP proxy forwards that HTTP request tothe Web. Or, if the request is for file content, it will beforwarded to a file access proxy. (This corresponds tomessage flow 2 or 3 in FIG. 1.) At Block 330, the protocolproxy receives the response from the information source.(This corresponds to message flow 4 or 5 in FIG. 1.)

The protocol proxy then determines, in Block 340. whichservices are available to the WID for manipulating thereturned content. This determination may be made in severalways. In a preferred embodiment, the protocol proxy issuesa query to the DMS for a list of available services. (Thiscorresponds to message flow 6 in FIG. 1.) Upon receivingthe list from the DMS, the protocol proxy may optionallycache the list for use with subsequent requests (in order toavoid the message exchange and processing overhead ofrepeatedly requesting such information from the DMS). Inan alternative embodiment, the protocol proxy may bestatically pre-configured with a list of available services thatare appropriate for particular types of content, users, loca-tions, or other criteria as described previously with respectto FIGS. 2A and 2B; in this case, message flow 6 of FIG. 1is not required.

When queried by the protocol proxy at Block 340, theDMS consults its stored table entries (see FIGS. 2A and 2Bfor examples), using logic that is adapted to the particularstorage format in use by that DMS, and determines whichservices are available for the data being returned to the WID.As stated earlier, the available services are preferably fil-tered according to the type of content being returned, andmay also (or alternatively) account for one or more otherfactors. (This filtering process has been discussed withreference to FIGS. 2A and 2B, above.)

Page 26: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B2

When an identification of the user is one of the factorsused to determine service availability, the user's identifica-tion may be obtained in a protocol-specific manner. Forexample, the user's identification may be available as thevalue of a cookie in an HTTP request or response header. Or,in some cases a look-up operation may be performed toobtain this information if a table or other similar repositoryof such information is available.

In preferred embodiments, the client software on the WIDdoes not participate in data manipulation operations (rather,the request is sent to the DMS, which obtains the data andmanages the manipulation operations), and therefore capa-bilities of the WID may not be of interest when determiningthe list of available services. However, there may be somecases where this information is deemed useful. For example,it may be known that user input is required for a particularmanipulation operation (such as specifying the target of ane-mail message). If the target WID is incapable of support-ing the necessary interactions, then that service is preferablyomitted from the delivered list by the evaluation performedby the DMS at Block 340. When this type of processing isto be performed, information about the capabilities availableon the WID may be obtained in a variety of ways, such asby inspecting the content types accepted according to theAccept header of an HTTP message, by assessing browsercapabilities according to information provided in the User-Agent header of an HTTP message, by analyzing capabilityinformation explicitly provided by the device, or by inspect-ing a repository of capability information indexed by deviceidentity. These approaches for determining client capabili-ties are well known in the prior art.

When infonnation about the location of the WID is usedas a factor in determining available services, this locationinformation may also be obtained in various ways and onceobtained, may be used in various ways. The location infor-mation may, for example, be determined by querying aglobal positioning system ("GPS") function on the client.Or, the location information might be obtained by queryinga Location Registry, such as the Location Registry describedin commonly-assigned U.S. Pat. No., still pending (Ser. No.09/848,441, filed concurrently herewith), which is entitled"Location-Aware Service Proxies in a Short-Range WirelessEnviromnent" and which is incorporated herein by refer-ence. As disclosed therein, a mobile device's access point(equivalently, a WID's access point) monitors its traffic toobtain the device's location. This location .information,which preferably comprises a list of access points which arenear the mobile device at a point in time, is maintained in theLocation Registry. This Location Registry implements aquery interface that may be used by an implementation ofthe present invention to determine the location of a particu-lar WID. This related invention also discloses "I.ocationAware Service Proxies" that intercept requests initiated bymobile clients, and that use the location of the mobile deviceto determine which content to deliver to the mobile device.These location-aware service proxies may be used in con-junction with the present invention to determine what con-tent may be delivered, and a protocol proxy may thenannotate that content with available services information(where the set of available services may also be based onlocation, among other factors). Furthermore, a protocolproxy as disclosed herein may also function as a location-aware service proxy. In this latter case, the location-awareservice proxy preferably performs further location-sensitivefiltering on the available services list obtained from theDMS in Block 340. Or, alternatively, the location-awareservice proxy may transmit location information to the DMS

(e.g. on message flow 6 of FIG. 1), where the DMS thenfactors that information into its list-generation processing.

Once the protocol proxy has the list of available services,it preferably formats or annotates that list in Block 350. (In

s alternative embodiments, this function may be performed bythe DMS before it returns the available services informationto the protocol proxy.) In a preferred embodiment, thisannotation comprises modifying the service invocationaddresses to enable the WID's user to easily invoke each

to available service. For example, in the case of HTML contentsuch as a Web page, the protocol proxy in this preferredembodiment adds a set of links (which may be representedas text or icons) to the list of available services that may beused to manipulate that HTML content. Preferably, the links

15 take the form of a service invocation address that is param-eterized with an identity of the information to be manipu-lated. Suppose, for example, that one of the availableservices is to print a Web page, and that the DMS hassupplied the service invocation address shown in FIG. SA

20 for that print operation, where this syntax, in this example,identifies print service software on the DMS itself. Using thestandard HTTP syntax for a parameter list, the Web page"www.reefedge.com" may be identified for printing by thisprint software by supplying the parameter list shown in FIG.

25 5B, which identifies the data being manipulated, therebyyielding an annotated link as shown in FIG. SC.

As another example, suppose a Microsoft Word documentnamed "report.doc", which is accessed from the root direc-tory of a file server named "fileServer", is being returned to

30 the WID, and that available services for this documentinclude printing it and filing (i.e. storing) it on a file server.To print the document, the document may be identified forprinting by the print software on the DMS by supplying thesample syntax shown in FIG. SD, where the parameter

35 "file=//fileServer/report.doc" identifies the data beingmanipulated.

Alternatively, to identify the document for filing at alocation "newServer/filesAccessedByWID/", the samplesyntax shown in FIG. 5E may be used, where the value of

40 the "dest" parameter identifies the new file storage location.In the preferred embodiment, the service invocation

address may be coupled with additional information duringthis annotation process in order to ensure that the DMS(and/or data output agent, as appropriate for a particular

45 manipulation service) accesses and manipulates the requiredinformation. For purposes of illustration, suppose the useraccessed a Web page for which cookie values were used incustomizing the page content. As an example, the WIDuser's bank account number may have been transmitted in a

so cookie on the outbound HITTP request message, and thisaccount number may have been used by a Web server togenerate a Web page showing the user's current bankaccount balances. If, after viewing this customized Webpage, the user decides that she would like to print the

ss information, the DMS must be able to use this same pagecontent when invoking the printing operation. Rather thanforwarding the Web page from the WID to the DMS, theprotocol proxy of the preferred embodiment captures thecookies that were present on the original HTTP request and

60 includes those cookies as additional parameters on theannotated links created during the processing of Block 350.(Preferably, all cookies are stored and copied to the links,although if the protocol proxy is adapted to know that certaincookies are irrelevant, they may be omitted.) By preserving

65 the cookies in the link annotations, the subsequent manipu-lation services invoked from the DMS will automaticallyhave the same cookie values that were used in processing the

Page 27: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B2

original request message, thereby ensuring that the manipu-lated content corresponds to the content delivered to theWID user. FIG. 5F provides an example of syntax that maybe used to annotate a link with a cookie whose name is"acct_nbr" and whose value is "123456". (Note that theDMS prepares the user's bank account information forprinting in response to a data manipulation request indicatedas message flow 8 in FIG. 1, and invokes the print processat a data output agent by issuing message flow 10 in FIG. 1.The processing performed by the DMS may further com-prise obtaining bank account information by issuing mes-sage flow 9 in FIG. 1.)

This same approach may be used for form parameters thatare submitted to a Web server (e.g. using an HTTP POSTmessage). To encode the form parameter information in theURL, a parameter name such as "postParams" may besubstituted for the "cookie" parameter name shown in FIG.5F. A parameter name/value pair may then be listed, in ananalogous manner to listing a cookie name/value pair.

A service invocation address may be coupled with anycombination of cookies, formnn parameters, or other informa-tion.

When encoding cookies, form parameters, and otherinformation in this manner, three issues should be consid-ered. First, URL length is currently limited to 255 characters,according to the HTTP specification. Second, it is difficult toencode all character sets in URLs. Third, a DMS may insome cases be implemented within a Web client which is notable to programmuatically control the sending of request data.For example, the DMS might use Microsoft InternetExplorer, which provides no progranmatic way to force acookie to be sent. To address these problems, the cookies,form parameters, and so forth may be cached by the protocolproxy (i.e. when the original content is being processed).This cached information may then be used in three ways toconstruct a valid request for use with the present invention.

In a first approach, in the service invocation address URI.,a parameter can be given by which the cached parameterscan be obtained by the DMS from the protocol proxy. Forexample, "?params=http://protocolproxy/params/139x3e245" gives the DMS a URL from which the cachedparameters, cookies, etc. can be obtained. The value"139x3e245" in this example is meant as a temporary codewhich represents the parameters associated with the particu-lar request.

In a variation of this first approach, the parameter on theservice invocation address URL may identify how to obtainthe cached parameters from the cache, rather than from theprotocol proxy.

In a second approach, the data URL may actually point tothe protocol proxy itself. The protocol proxy, upon receivingthe data request from the DMS, determines the real requestand obtains the requested data on the DMS' behalf. Forexample, "http://protocolproxy/request/139x3e 24 5" mightcause a request (along with the appropriate cookies, formparameters, and other information) to be issued from theprotocol proxy to the true source of the data.

hi a third approach, the DMS may request the content byitself using the protocol proxy, in much the same way thatall requests from the WID were directed through the proto-col proxy. However, the protocol proxy may annotate thedata source with a tag that the protocol proxy can later useto reconstruct the original query. For example, the protocolproxy might rewrite the content request URL to be "http:!//www.yahoo.com/?protocolproxy=139x3e245", so, uponreceiving the request from the DMS, the protocol proxy may

look up session 139x3e245 in its cache, obtain the necessaryparameters, and forward the properly-formatted request tolocation "www.yahoo.com".

It is also possible that the protocol proxy might cache the5 data content (rather than the parameters). In this case, the

content location provided by the protocol proxy might thenpoint to that cache. There is then no need to provide cookiesor parameters in the URL, because the DMS can obtain thefull content from the cache. To achieve maximal perfor-

10o mance and capacity in this situation, the cache is preferablycapable of storing multiple versions of content associatedwith the same URL, with each version associated with adifferent combination of cookies, form parameters, and otherrequest information.

15 Optionally, additional formatting information may besupplied as parameters on selected service invocationaddresses during the annotation process of Block 350. Theseadditional parameters may be provided for implementation-specific usage, including for customization of the data

20 manipulation service. One example, described above, is tospecify a destination address for a file that is being stored ina repository. As another example, suppose the data manipu-lation service is to send an e-mail message to a particularrecipient. An example of invoking the "email" service,

25 which is managed through the DMS at the location shown inFIG. 5G, to send a message identified as "msg98765.txt" tothe recipient "[email protected]" is shown in FIG. 5H.

As yet another example of adding parameters to serviceinvocation addresses, it may be desirable in a file conversion

30 service to supply parameter values to be used in guiding theconversion process. Suppose, for example, that the previ-ously-discussed "report.doc" Microsoft Word docunent isbeing converted to IITMT,, and that the conversion software

allows several different types of transformations, based upon35 identification of a particular template. lhe template may

specify how to format the title, for example, and how to"chunk" the source document into different pieces, how

links to those pieces are embedded, and so forth. If thetemplate parameter value is "plain", for example, the con-

40 version is adapted to returning plain text, whereas if thetemplate parameter value is "segmented". then the conver-sion may generate a "chunked" document where each logi-cal input segment appears on a different page, and perhapsfailing to specify a template parameter value causes the

45 entire document to be generated as a single HTML page. Asample service invocation address for viewing the convertedfile in segmented form is shown in FIG. 51.

Preferably, the annotation process of Block 350 generatesseparate annotated links for each valid option, such that

50 when the user selects one of the links, all the necessaryinformation is present for properly invoking the datamanipulation service. (Note that the DMS prepares this file

for viewing in response to a data manipulation requestindicated as message flow 8 in FIG. 1, and returns the result

55 for rendering on the WID at message flow 12 in FIG. 1. Theprocessing performed by the DMS may further compriseobtaining the file content by issuing message flow 11 in FIG.1.)

The parameter types supplied during the annotation pro-

60 cess may be stored in, and obtained from, the DMS tablealong with the applicable service invocation address. Or, theprotocol proxy may provide service-specific code for deter-mining which parameter types are applicable for a particularservice.

65 While the preferred embodiment has been described interms of embedding the service description directly into thecontent (e.g. as links in HTML), other alternative

Page 28: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B2

approaches may be used without deviating from the scope ofthe present invention. As one example, the annotation pro-cess may comprise generating a compound document whichcombines the original content (in HTML, WML, XML, etc.)and the service definition (in XML, or perhaps a similarwell-structured markup language). In this approach, theservice description may be embedded directly into thecontent. As another example, a multi-part MIME (Multi-purpose Internet Mail Extensions) message may be gener-ated which contains the original content (in one part) and theservice description (in another part). These alternativeapproaches provide different ways for conveying the list ofavailable services.

Optionally, an implementation of the present inventionmay enable the protocol proxy itself to directly invoke datamanipulation operations. For example. during the annotationprocessing in Block 350, the protocol proxy may wish tosave the content being returned to the WID in response to itsrequest message into a cache, for faster retrieval on subse-quent requests. Or, the protocol proxy may determine that adata conversion operation is desirable, for example byconverting an XML document to a WBXML deck. Prefer-ably, the protocol proxy sends a data manipulation requestmessage to the DMS for such processing, and the DMS theninvokes the necessary file access proxy and/or other dataoutput agent processing. Upon receiving the response fromthe DMS, the protocol proxy preferably delivers the result-ing data to the WID in addition to (or, alternatively, insteadof) the originally accessed information. For example, if theoriginal request was for a Web page, and the protocol proxyrequests that this Web page be converted to a WBXML deck,then either the deck or the deck plus the Web page may bedelivered to the WID, as appropriate in a particular imple-mentation of the present invention. (As will be obvious,some types of DMS response are preferably never transmit-ted to the client, such as those responses or portions thereofwhich provide return code and status information.) This typeof protocol proxy-initiated manipulation may be appropriatewhen software executing on the proxy can predict that theuser would be likely to request the data manipulationoperation, and the "automatic" invocation by the protocolproxy therefore serves to simplify the user's task. It is alsoappropriate when the protocol proxy can determine that thedata in the accessed format cannot be presented on the WIDwithout first performing a conversion. This latter type ofdetermination may be made by inspecting the content typesaccepted by the WID, for example as indicated on the Acceptheader of the outbound HTTP request. In the preferredembodiment, the protocol proxy invokes a conversion ser-vice to convert all incoming Microsoft Word files to HTMLor WML, because Microsoft Word files cannot be renderednatively on most WIDs. Other similar conversions may alsobe automatically provided. The list of available services tobe delivered to the WID along with the content may beprovided in terms of the originally-accessed content, or themanipulated content, or both, as appropriate in a particularsituation.

Continuing on with FIG. 3, at Block 360, the content,along with the annotated list of available services, isreturned to the WID. This corresponds to message flow 7 inFIG. 1. The WID then receives this infomnnation (Block 370)and preferably displays the content and/or the availableservices list to the user. However, in alternative embodi-ments, the service list might be displayed separately fromthe document. A browser might import that service list andpopulate a dynamic menu, pop-up, service selection panel,or other custom user interface component. (As stated earlier,

in some cases it may be desirable to include custom ormodified client software on the WID for use with the presentinvention, such as software which provides a tailored userinterface.)

s Once the service list is available, the user may then invokea selected service in order to initiate further manipulation ofthe delivered content. In response to the user's invocation, a

request message will be sent to the location identified on theservice invocation address (which, as illustrated herein, is

to preferably an address identifying a service on the DMS, butalternatively may be a service running elsewhere). Thisrequest message corresponds to message flow 8 in FIG. 1.The processing performed on the DMS in response toreceiving the data manipulation request will be described

is with reference to the logic in FIG. 4.In some cases, a WID may have pertinent data that is

locally stored, such as information to be used when sendingfax content to a recipient. After receiving a list of availableservices from the protocol proxy and selecting one of these

20 services, the locally-stored data may be posted from theWID to the DMS, for use as the selected service executes.

Note that programmatic operations on the WID mayinvoke a data manipulation service in some cases, ratherthan the user performing the invocation. For example, the

25 DMS may embed a script within the available services list.where this script may autonomously invoke a manipulationservice. Suppose, for purposes of illustration, that a WIDissues a request to receive a current view of the user'scalendar from his desktop PC. The data returned to the WID

30 in response to the request may include one or more software-activated alarms. When the appropriate action occurs (suchas the passage of time to reach a calendared alarm event), adata manipulation service identified in a script supplied bythe DMS may be prograimnatically triggered to perform

35 some alarm processing (such as printing the agenda for ascheduled meeting to the printer at the designated confer-ence room).

Turning now to FIG. 4, logic is depicted that may be usedto support processing when the WID requests a data manipu-

40 lation service from the DMS. At Block 400, the WID issuesa request for a particular service by invoking the provided(and possibly annotated) service invocation address. (Thiscorresponds to message flow 8 in FIG. 1.) Note that allparameters for this invocation are already available (or

45 indirectly indicated) on the service invocation address, hav-

ing been supplied by the protocol proxy during the annota-tion process in Block 350 of FIG. 3. At Block 410, the DMSreceives the request, and at Block 420, the DMS parses theannotated information in the request to determine the speci-

50 fled service invocation address, the identity of the data to bemanipulated, and any other parameters that may be present.At Block 430, the DMS retrieves the identified data and may

optionally manipulate it, according to the requirements ofthe particular data manipulation service being performed.

55 For example, the DMS may know that a conversion serviceis necessary before performing the manipulation operation

requested by the user, and may therefore automaticallyinvoke such processing. As described earlier, if the userrequests a fax service, then the DMS may retrieve the data

60 and convert it into a TIFF file prior to transmitting it to a faxagent, without requiring the user to explicitly request theconversion to TIFF. (The transmission to the fax agentoccurs according to Block 450. described below.) The DMSmay perform this processing directly, or by invoking a data

65 output agent or other conversion software.Preferably, the annotated service invocation address pro-

vides a complete description of the data to be manipulated,

Page 29: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B2

as has been shown in the examples herein. Alternatively, itmay happen that the DMS needs to evaluate additionalinformation in order to locate the data. For example, if a filename is received that does not specify a complete file pathfrom a root directory, then the DMS preferably uses imple-mentation-dependent techniques for resolving the locationand directory path information. (Or, an error message maybe returned in such cases, if desired.)

At decision Block 440, the DMS determines whetherprocessing by a data output agent is required to complete therequested service. Each service implemented on the DMS isadapted to knowing what type of further processing isrequired and what agent(s) need to be invoked.

If the answer to the decision block is Yes, then controlpasses to Block 450 where a request to the appropriate dataoutput agent is generated. The data output agent that isinvoked is preferably determined according to the type ofservice to be performed, and optionally by evaluating otherfactors (such as the user's identity, the processing load onparticular printers, current network conditions such as avail-able bandwidth and/or outages, which data output agentsupports the user's e-mail service or file system, and soforth). The data output agent performs any necessary opera-tions, using processing which is known in the prior art, to

perform the requested data manipulation. For example, if thedata output agent controls an LCD projector, then the dataoutput agent retrieves the information to be projected, ren-ders it, and makes the rendered information available to theassociated projector (e.g. through a VGA output connector).Or, if the data output agent handles sending of e-mailmessages, then the message to be sent is retrieved, formattedfor delivery (if necessary), and transmitted.

In alternative embodiments, the DMS may choose to notretrieve selected data content until the data is required by thedata output agent. This may be implemented by generatinga special URL and passing this URL to the data output agent.When the data output agent needs the content, it requeststhat URL (from the DMS), and then the content is actuallyobtained (by the DMS, possibly through the protocol proxy)and delivered to the data output agent. This has the advan-tage of avoiding data retrieval until/unless it is needed, andavoids the need to "push" data to the data output agent.

As indicated at Block 460, the DMS then preferablyreceives a response message from the invoked data outputagent. This response message may be simply a success orfailure indication, or it may include additional informationsuch as status information. For example, when a printservice has been invoked, the response message may indi-cate that the print job has started (or is queued), whichprinter has the print job, where that printer is located, and soforth.

When the answer to decision Block 440 is No, and alsofollowing the processing of Block 460, at Block 470 theDMS generates a response to the WID that requested thedata manipulation service. Similar to the response messagereceived at Block 460, this response message may indicatesuccess or failure, and may include additional informationabout the status of the request. Optionally, the response mayinclude a list of further data manipulation services that maybe performed on the data that was sent to the WID at Block370 of FIG. 3. In some cases, the DMS may return newcontent to the WID after invocation of the data manipulationservice. In these cases, the response message sent in Block470 preferably includes a newly-created list of services thatare available for this new content. This processing may beperformed by the DMS initiating a request to the protocolproxy for content at a URL that is actually served from the

DMS, after which the protocol proxy will retrieve thecontent from the DMS and then query the DMS for theservices list. The protocol proxy then annotates this list, andreturns the content to the WID. This approach avoids dupli-

5 cation of the service annotation processing logic.Turning now to FIG. 6A, a sample GUI display that

provides available service information is illustrated, accord-ing to the present invention. This display shows an image ofa Microsoft PowerPoint presentation file that has been

to retrieved by a file access proxy. The file has also beenconverted for display on the WID (e.g. to make the slides ofthe presentation viewable on the WID's display panel). Thisconversion may be performed automatically by the protocolproxy upon detecting that the requested content is a Pow-

Is erPoint file and/or that the target WID cannot display files ofthis type, as discussed earlier. Along with the content 610 ofthe slide, four icons 601-604 have been provided in a headerarea 600 to enable the user to select from among four datamanipulation services which are available for this content.

20 The first icon 601 provides a link to a home page; icon 602may be selected to print the content; icon 603 may beselected to project the content; and icon 604 may be selectedto log out of the system.

FIG. 6B provides another sample GUI display with avail-25 able service information. This display shows an image 620

of a page retrieved from a Web server. Along with thiscontent 620. three icons 601, 602, and 604 have beenprovided in header area 600. These icons represent the samefunctions discussed with reference to FIG. 6A. In this

30 example, the printer icon 603 has been omitted, and the usertherefore cannot request printing of the image. (It may bethat there is no printer available for the WID's currentlocation, or that the user is not authorized to access theprinter, etc.)

35 As has been demonstrated, the present invention providesa number of advantages over prior art solutions for accessingand manipulating data content from a WID. The teachingswhich have been described do not require modifications ofthe WID, yet support a wide variety of data manipulation

40 operations and a wide variety of content types. Furthermore,the supported operations and content types are easily exten-sible, again without requiring modifications to the WID.

The foregoing description of a preferred embodiment isfor purposes of illustrating the present invention, and is not

45 to be construed as limiting thereof. Although a preferredembodiment has been described, it will be obvious to thoseof skill in the art that many modifications to this preferredembodiment are possible without materially deviating fromthe novel teachings and advantages of this invention as

50 disclosed herein. Accordingly, all such modifications areintended to be within the scope of the present invention,which is limited only by the claims hereafter presented (andtheir equivalents).

55 We claim:

1. A method of enabling data access and manipulationfrom a pervasive device, comprising the steps of:

receiving a data access request from a pervasive device;

60 obtaining the requested data;determining what data manipulation operations are avail-

able for the obtained data; andproviding references to the determined data manipulation

operations to the pervasive device.

65 2. The method of claim 1, wherein a reference to adetermined data manipulation operation comprises a serviceinvocation address.

Page 30: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

US 7,254,621 B219

3. The method of claim 1, further comprising the steps of:receiving a request to perform a selected one of the

determined data manipulation operations; andperforming the requested operation on behalf of the

pervasive device.4. The method of claim 1, wherein the determining step

further comprises determining what data manipulationoperations are available for a content type of the obtaineddata.

5. The method of claim 1, wherein the determining stepfurther comprises determining what data manipulationoperations are available for a user of the pervasive device.

6. The method of claim 1, further comprising the steps of:determining a current location of the pervasive device;

anddetermining what data manipulation operations are avail-

able for the current location of the pervasive device.7. The method of claim 1. wherein the determining step

further comprises determining what data manipulationoperations are available responsive to a type of the pervasivedevice.

8. The method of claim 1, further comprising the steps of:performing one or more data manipulation operations on

the obtained data, thereby creating transformed data;determining what data manipulation operations are avail-

able for the transformed data; andproviding references to the determined data manipulation

operations for the transformed data to the pervasivedevice.

9. A computer program product having a computer-readable medium having computer program code encodedthereon to be executed by a processor for enabling dataaccess and manipulating from a pervasive device, the com-puter program code adapted to perform steps comprising:

receiving a data access request from a pervasive device;obtaining the requested data;determining what data manipulation operations are avail-

able for the obtained data: andproviding references to the determined data manipulation

operations to the pervasive device.10. The computer program product of claim 9, wherein a

reference to a determined data manipulation operation com-prises a service invocation address.

11. The computer program product of claim 9, furthercomprising the steps of:

receiving a request to perform a selected one of thedetermined data manipulation operations; and

performing the requested operation on behalf of thepervasive device.

12. The computer program product of claim 9. whereinthe determining step further comprises determining whatdata manipulation operations are available for a content typeof the obtained data.

13. The computer program product of claim 9, whereinthe determining step further comprises determining whatdata manipulation operations are available for a user of thepervasive device.

14. The computer program product of claim 9, furthercomprising the steps of:

determining a current location of the pervasive device;and

determining what data manipulation operations are avail-able for the current location of the pervasive device.

15. The computer program product of claim 9. whereinthe determining step further comprises determining whatdata manipulation operations are available responsive to atype of the pervasive device.

5 16. The computer program product of claim 9, furthercomprising the steps of:

performing one or more data manipulation operations onthe obtained data, thereby creating transformed data:

determining what data manipulation operations are avail-10 able for the transformed data; and

providing references to the determined data manipulationoperations for the transformed data to the pervasivedevice.

17. A system for enabling data access and manipulationis from a pervasive device, comprising:

a data manipulation server for maintaining a repository ofdata manipulation operations; and

a protocol proxy in communication with the pervasivedevice and the data manipulation server and adapted to:

20 receive a data access request from the pervasive device;obtain the requested data;communicate with the data manipulation server to

determine, responsive to the obtained data, what datamanipulation operations are available; and

25 provide references to the determined data manipulationoperations to the pervasive device.

18. The system of claim 17, wherein the data manipula-tion server maintains a service invocation address for a datamanipulation operation in the repository and wherein the

30 reference to the determined data manipulation operationcomprises the service invocation address.

19. The system of claim 17, wherein the data manipula-tion server is adapted to receive a request to perform aselected one of the determined data manipulation operations

35 and invoke the requested operation on behalf of the perva-sive device.

20. The system of claim 17, wherein the protocol proxy isfurther adapted to determine what data manipulation opera-tions are available for a content type of the obtained data.

21. The system of claim 17, wherein the protocol proxy isfurther adapted to determine what data manipulation opera-tions are available for a user of the pervasive device.

22. The system of claim 17, wherein the protocol proxy is45 further adapted to:

determine a current location of the pervasive device; and

determine what data manipulation operations are avail-able responsive to the current location of the pervasivedevice.

so 23. The system of claim 17, wherein the protocol proxy isfurther adapted to determine what data manipulation opera-tions are available responsive to a type of pervasive device.

24. The system of claim 17, wherein the protocol proxy isfurther adapted to:

55 perform one or more data manipulation operations on theobtained data, thereby creating transformed data;

determine what data manipulation operations are avail-able for the transformed data; and

provide references to the determined data manipulation

60 operations for the transformed data to the pervasivedevice.

* * * * *

Page 31: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Page 1 of 1

UNITED STATES PATENT AND TRADEMARK OFFICEUNITED STATES DEPARTMENT OF COMMERCEUnited States Patent and Trademark OmceAddre: COMMISSIONER FOR PATENTS

P.O. Box 1450AL.exdr Vpnia 22313-1450ww..aptgov

IlIIIl Ulll lli11 11 I 11111 11IIl I IIBib Data Sheet

CONFIRMATION NO. 5116

http://neo:8000/PrexServlet/PrexAction

Sandeep Kishan Singhal, Englewood Cliffs, NJ;Barry Eliot Levinson, New York, NY;Darren Michael Sanders, Nanuet, NY;

* CONTINUING DATA **********************This application is a CON of 09/848,394 05/03/2001 PAT 6,925,481/, / , "

FOREIGN APPLICATIONS ***************

IF REQUIRED, FOREIGN FILING LICENSE GRANTED* 04/11/2005

Foreign Priority claimed Q yesno5 USC 119 (a-d) conditions Q yes ,no Met aSTATE OR SHEETS TOTAL INDEPENDENTet Allowance etafter COUNTRY DRAWING CLAIMS CLAIMSAllowance

erified and n NJ 9 24 3Acknowledged Examiners Signature Ini Is

ADDRESS4415

TITLE

Technique for enabling remote data access and manipulation from a pervasive device

Q All Fees

U 1.16 Fees ( Filing )

FILING FEE FEES: Authority has been given in Paper 11U 1.17 Fees ( Processing Ext. ofRECEIVED No. to charge/credit DEPOSIT ACCOUNT Itime )

1200 No. for following: U 1.18 Fees( Issue)

l Other

_ _ Credit

12/29/06

Page 32: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PATENT APPLICATION SERIAL NO.

U.S. DEPARTMENT OF COMMERCEPATENT AND TRADEMARK OFFICE

FEE RECORD SHEET

03/11/2005 SIIIASS1 00000054 1107543701 FC:1011 300.0002 FC:1111 300.00 OP03 FC:1311 500.00 OP04 FC:1202 200.00 OP2010.00 OP

PTO-1556(5/87)

VUS. Govonwiwl Pbvg 01km: 2W - 4SWWYA M

BEST AVAILABLE COPY

Page 33: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

--

o=

C1n

18. If a CONTINUING APPLICATION, check appropriate box and supply the requisite information below and in a preliminary amendment or in anApplication Data Sheet under 37 CFR 1.76:

[ Continuation O Divisional O Continuation-in-part (CIP) of prior application No: 09/848394Prior application information: Examiner: Moustafa M. Mekv Group/Art Unit: 2157

For CONTINUATION OR DIVISIONAL APPS only: The entire disclosure of the prior application, from which an oath or declaration is supplied underBox 5b, is considered a part of the disclosure of the accompanying continuing or divisional application and is hereby incorporated by reference. Theincorporation can only be relied upon when a portion has been inadvertently omitted from the submitted aoolication parts.

19. CORRESPONDENCE ADDRESS

34415Z Customer Number

Name (Print/Type) Brian M. Hoffman Registration No. (Attomey/Agent) 39,713

Signature Date

20423/10036/SF/5138562.1

NEW UTILITY Attomey Docket Number 20423-10036

PATENT APPLICATION First Named Inventor Sandeep K. Singhal

TRANSMITTAL Title Technique for Enabling Remote Data(only for new nonprovisional applications under Access and Manipulation From a n

Pervasive Device37 CFR 1.53(b)) Express Mail Label No. EV 342132685 US

APPLICATION ELEMENTS ACCOMPANYING APPLICATION PARTS L

1. ® Fee Transmittal Form (in duplicate) 7. l Assignment Papers (cover sheet & document(s))2. E Applicant claims small entity status. 8. O Certified Copy of Priority Document(s) (ifforeign priority-

See 37 CFR 1.27 is claimed)3. 2 Specification Total Pages 439. Power of Attorney or Authorization of Agent

(preferred arrangement set forth below) 10. ® 37 CFR 3.73(b) Statementa Descriptive Title of the Invention

Cross Reference(s) to Related Case(s)* Statement Regarding Fed sponsored R & D 11. O Preliminary Amendment* Background of the Invention 12. O Information Disclosure Statement & PTO-1449m Brief Summary of the Invention Q Copies of IDS Citation(s)

SBrieDescription of the Drawing(s) 13. ] Nonpublication Request Under 35 U.S.C. 122* Detailed DescriptionI Claim or Claims (b)(2)(B)(i). Applicant must attach form

PTO/SB/35 or its equivalent* Abstract of the Disclosure 14. 0 Return Postcard

4. ® Drawing(s) (35 U.S.C. 113) Total Sheets 9 15. O5. Combined Declaration and. Power of Attorney 16. O

a. O New Declaration Total Pages F 17. O® Executed (original or copy)

b. ® Copy from a prior application (37 CFR 1.63(d))(for continuation/divisional with Box 18 completed)

i. O DELETION OF INVENTOR(S)Signed statement attached deleting inventor(s)named in the prior application, see 37 CFR1.63(d)(2) and 1.33(b).

6. O Application Data Sheet. See 37 CFR 1.76 ADDRESS TO:Commissioner for PatentsP.O. Box 1450Alexandria, VA 22313-1450

-o

1 3

Page 34: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

0w=0CU,

20423/10036/SF/5138562.1

NEW UTILITY Attorney Docket Number 20423-10036

PATENT APPLICATION First Named Inventor Sandeep K. Singhal

TRANSMITTAL Title Technique for Enabling Remote Data(only for new nonprovisional applications under Access and Manipulation From a Er

Pervasive Device C037 CFR 1.53(b)) Express Mail Label No. EV 342132685 US -

APPLICATION ELEMENTS ACCOMPANYING APPLICATION PARTS O1. 0 Fee Transmittal Form (in duplicate) 7. Q Assignment Papers (cover sheet & document(s))2. Q Applicant claims small entity status. 8. O Certified Copy of Priority Document(s) (if foreign priority -

See 37 CFR 1.27 is claimed)3. 0 Specification Total Pages 43 9. 0 Power of Attorney or Authorization of Agent

(preferred arrangement set forth below) 10. 0 37 CFR 3.73(b) StatementDescriptive Title of the Invention* Cross Reference(s) to Related Case(s)* Statement Regarding Fed sponsored R & D 11. O Preliminary Amendmenta Background of the Invention 12. O Information Disclosure Statement & PTO-1449m Brief Summary of the Invention Q Copies of IDS Citation(s)* Brief Description of the Drawing(s) 13. E Nonpublication Request Under 35 U.S.C. 122

Detailed Description* Claim or Claims (b)(2)(B)(i). Applicant must attach form

PTO/SBI35 or its equivalentAbstract of the Disclosure 14. ReturPostcard

4. [ Drawing(s) (35U.S.C. 113) Total Sheets r 15. O5. Combined Declaration and Power of Attorney 16. O

a. E New Declaration Total Pages F 1 17. E0 Executed (original or copy)

b. 0 Copy from a prior application (37 CFR 1.63(d))(for continuation/divisional with Box 18 completed)

i. O DELETION OF INVENTOR(S)Signed statement attached deleting inventor(s)named in the prior application, see 37 CFR1.63(d)(2) and 1.33(b).

6. O Application Data Sheet. See 37 CFR 1.76 ADDRESS TO:Commissioner for PatentsP.O. Box 1450Alexandria, VA 22313-1450

18. If a CONTINUING APPLICATION, check appropriate box and supply the requisite information below and in a preliminary amendment or in anApplication Data Sheet under 37 CFR 1.76:

[ Continuation Q Divisional O Continuation-in-part (CIP) of prior application No: 0948394Prior application information: Examiner: Moustafa M. Mekv Group/Art Unit. 2157

For CONTINUATION OR DIVISIONAL APPS only: The entire disclosure of the prior application, from which an oath or declaration is supplied underBox 5b, is considered a part of the disclosure of the accompanying continuing or divisional application and is hereby incorporated by reference. Theincorporation can only be relied upon when a portion has been inadvertently omitted from the submitted application parts.

19. CORRESPONDENCE ADDRESS

34415Z Customer Number

Name (Print/Type) Brian M. Hoffman Registration No. (Attorney/Agent) 39,713

Signature T Date

-o

;oo

Page 35: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Effective on 12/08/2004.Fees pursuant to the Consolidated Appropriations Act. 2005 (H.R. 4818). Complete if Known

Application Number NOT YET KNOWN

FEE TRANSMITTAL Filing Date HEREWITH

For FY 2005 First Named Inventor Sandeep K. SinghalO Applicant claims small entity status. See 37 CFR 1.27 Examiner Name UNASSIGNED

Art Unit UNASSIGNEDTOTAL AMOUNT OF PAYMENT ($) 1,200.00

Attorney Docket No. 20423-10036

METHOD OF PAYMENT (check all that aoolv)

[] Check O Credit Card O Money Order O Other (please identify):O Deposit Account Deposit Account Number: 19-2555 Deposit Account Name: Fenwick & West LLP

0 Charge any additional fee(s) or underpayments of fee(s) E Credit any overpaymentsunder 37 CFR 1.16 and 1.17

FEE CALCULATION

1. BASIC FILING, SEARCH, AND EXAMINATION FEES

Application Type

Utility

Design

PlantReissueProvisional

FILING FEES

Small Entity

FeelI) Fee (S)

300 150

200 100

200 100300 150200 100

SEARCH FEES

Small Entity

Fee S) Fee.S)500 250.

100 50

300 150500 2500 0

EXAMINATION FEES

Small Entity

Feel Fee200 100

130 65

160 80

600 3000 0

Fees Paid ($)

1,000

2. EXCESS CLAIM FEES

Fee Description

Each claim over 20 or, for Reissues, each claim over 20 and more than in the original patentEach independent claim over 3 or, for Reissues, each independent claim more than in the original patentMultiple dependent claimsTotal Claims Extra Claims Fee ( Fee Paid ($) Multiple

24 -20orHP= 4 x 50 =Fee

0

Fee

50200360

Small Entity

Fee

25100180

Dependent ClaimsFee Paid ($)

0

HP - highest number of total claims paid for, if greater than 20Total Claims Extra Claims Fee(S) Fee Paid ($1)

3 -3orHP= 0 x 0 = 0

HP = highest number of independent claims paid for, if greater than 33. APPLICATION SIZE FEE

If the specification and drawings exceed 100 sheets of paper, the application size fee due is $250 ($125 for small entity)for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41(a)(1)(G) and 37 CFR 1.16(s).Total Sheets Extra Sheets Number of each additional 50 or fraction thereof Fee S) Fee Paid I )

52 -100 = 0 / 50 = (round up to a whole x = 0number)

4. OTHER FEE(S) Fees Paid ($Non-English Specification, $130 fee (no small entity discount)Assignment:Other:

20423/10036/SF/5138563.1

Page 36: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Effective on 12/08/2004.Fees pursuant to the Consolidated Appropriations Act. 2005 (H.R. 4818). Complete if Known

Application Number NOT YET KNOWN

FEE TRANSMITTAL Filing Date HEREWITH

For FY 2005 First Named Inventor Sandeep K. Singhal0 Applicant claims small entity status. See 37 CFR 1.27 Examiner Name UNASSIGNED

Art Unit UNASSIGNEDTOTAL AMOUNT OF PAYMENT ($) 1,200.00

Attorney Docket No. 20423-10036

METHOD OF PAYMENT (check all that aoolv)

B Check O Credit Card O Money Order O Other (please identify):O Deposit Account Deposit Account Number: 19-2555 Deposit Account Name: Fenwick & West LLP

0 Charge any additional fee(s) or underpayments of fee(s) 19 Credit any overpaymentsunder 37 CFR 1.16 and 1.17

FEE CALCULATION

1. BASIC FILING, SEARCH, AND EXAMINATION FEESFILING FEES SEARCH FEES EXAMIN/

Small Entity Small Entity

ADDlication Type Fee S) Fee .) Fee I e$ Fee FeeUtility 300 150 500 250 200Design 200 100 100 50 130Plant . 200 100 300 150 160Reissue 300 150 500 250 600Provisional 200 100 0 0 0

2. EXCESS CLAIM FEES

Fee Description

Each claim over 20 or, for Reissues, each claim over 20 and more than in the original patentEach independent claim over 3 or, for Relssues, each Independent claim more than in the original patentMultiple dependent claimsTotal Claims Extra Claims Fee Si Fee Paid ($) Multiple

24 -20orHP= 4 x 50 =Fee (S

0200

ATION FEES

Small Entity

Fee (SI100

65

80300

0

Fees Paid (S)

1,000

Fee50200360

Small Entity

Fee

25100180

Dependent ClaimsFee Paid ($)

0

HP - highest number of total claims paid for, if greater than 20

Total Claims Extra Claims Fee (S Fee Paid ($)3 -3orHP= 0 x 0 = 0

HP = highest number of independent claims paid for, if greater than 33. APPLICATION SIZE FEEIf the specification and drawings exceed 100 sheets of paper, the application size fee due is $250 ($125 for small entity)

for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41(a)(1)(G) and 37 CFR 1.16(s).Total Sheets Extra Sheets Number of each additional 50 or fraction thereof Fee i FeE

52 -100 = 0 150 = (round up to a whole x =number)

4. OTHER FEE(S)Non-English Specification, $130 fee (no small entity discount)Assignment:Other:

Fees Paid ($)

SPaid ($)0

20423/10036/SF/5138563.1

Page 37: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

TECHNIQUE FOR ENABLING REMOTE DATA ACCESS ANDMANIPULATION FROM A PERVASIVE DEVICE

INVENTORS

SANDEEP K. SINGHAL

BARRY E. LEVINSONDARREN M. SANDERS

CROSS-REFERENCE TO RELATED APPLICATION

[0001] This application is a continuation of prior Application No. 09/848,394,

filed May 3, 2001, which is hereby incorporated herein by reference.

FIELD OF THE INVENTION

[0002] The present invention relates to pervasive computing, and more

particularly to methods, systems, and computer program instructions for enabling users of

pervasive devices (such as limited-function mobile devices, smart appliances, etc.) to

remotely access and manipulate information in ways that might otherwise be impossible

or impractical because of inherent limitations of the device.

BACKGROUND OF THE INVENTION

[0003] Pervasive devices (also referred to as "pervasive computing devices")

havie become popular in recent years as people increasingly seek "anywhere, anytime"

access to services such as voice and data communications. Many pervasive devices are

designed to be mobile, and may equivalently be referred to as "mobile devices" or

"mobile computing devices". Examples of mobile pervasive devices range from two-way

pagers to personal digital assistants, or "PDAs" (such as the Palm Pilot, Handspring

Page 38: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

TECHNIQUE FOR ENABLING REMOTE DATA ACCESS ANDMANIPULATION FROM A PERVASIVE DEVICE

INVENTORS

SANDEEP K. SINGHAL

BARRY E. LEVINSONDARREN M. SANDERS

CROSS-REFERENCE TO RELATED APPLICATION

vI/ [0001] This application is a continuation of prior Application No. 09/848,394,

'2,11 filed May 3, 2001, which is hereby incorporated herein by reference?,"L U 0.44 . 6 SL*Sz 8

FIELD OF THE INVENTION

[0002] The present invention relates to pervasive computing, and more

particularly to methods, systems, and computer program instructions for enabling users of

pervasive devices (such as limited-function mobile devices, smart appliances, etc.) to

remotely access and manipulate information in ways that might otherwise be impossible

or impractical because of inherent limitations of the device.

BACKGROUND OF THE INVENTION

[0003] Pervasive devices (also referred to as "pervasive computing devices")

have become popular in recent years as people increasingly seek "anywhere, anytime"

access to services such as voice and data communications. Many pervasive devices are

designed to be mobile, and may equivalently be referred to as "mobile devices" or

"mobile computing devices". Examples of mobile pervasive devices range from two-way

pagers to personal digital assistants, or "PDAs" (such as the Palm Pilot, Handspring

Page 39: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

VisorTM, or Compaq iPAQ) to cellular phones (such as the Nokia 6110) to multi-function

devices (such as the Nokia 9110 or Qualcomm "pdQTM" smartphone). ("Visor" is a

trademark of Handspring, and "pdQ" is a trademark of QUALCOMM Incorporated.) All

pervasive devices are not necessarily mobile, however. Examples of this latter category

include smart appliances for the home or business setting, devices which are permanently

mounted in automobiles, and so forth.

[0004] Pervasive devices typically share several common characteristics:

1) limited processor speed;

2) limited memory capacity;

3) small size, which limits the richness of the data input and output interfaces

(for example, small screen, limited keypad, and so forth);

4) a limited amount of software pre-installed on the device; and

5) access to limited-bandwidth networks.

[0005] The inherent drawbacks of these characteristics are further exacerbated by:

1) the need to maximize the device's relatively short battery life -- which in

turn prevents additional processor power or memory capacity from being added to the

device; and

2) the need to simplify use of the device -- which in turn reduces the

desirability of supporting an "open" software installation platform in which arbitrary

software packages might be added.

[0006] As people rely on pervasive devices for day-to-day information access

tasks, they find that the experience can be extremely limiting. While pervasive devices

Page 40: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

vary widely in functionality and in their capabilities, some general observations for an

average pervasive device can be made. First; the device typically does not have sufficient

memory to store all of the information that the user requires. Indeed, most of a user's

files or data are normally stored on a desktop personal computer ("PC"), laptop, or

corporate server. Moreover, the device's memory limitations often prevent the user from

manipulating large files, such as graphics-intensive presentations (where it might be

desirable, for example, to re-order the slides within a presentation). Second, the device

typically does not have the software required to access all of the data that the user might

wish to use. For example, most pervasive devices are unable to run common software

applications such as Microsoft® Word or Microsoft® Powerpoint. ("Microsoft" is a

registered trademark of Microsoft Corporation.) Some pervasive devices, such as two-

way pagers from Research In Motion ("RIM"), do not usually have a Web browser

installed, and therefore the user cannot render data formatted as Web documents. Third,

the device often does not have the necessary drivers installed with which to support all

the data manipulation operations the user might wish to perform. For example, pervasive

devices typically do not have drivers to support operations such as printing and faxing.

Similarly, pervasive devices typically do not have drivers for video graphics array

("VGA") adapters that would enable the device to display content to a projector (such as

a liquid crystal display, or "LCD," projector).

[0007] Some pervasive devices would not be considered as limited in function,

although they may suffer from some of the drawbacks of limited-function devices such as

poor ease-of-use (having, for example, a small screen size). Examples include the

Compaq iPAQ Home Internet Appliance IA-1 and the AudreyTM home appliance from

Page 41: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

3Com Corporation. ("Audrey" is a trademark of 3Com Corporation.) The term

"Wireless Information Device", or "WID", will be used hereinafter to refer to this type of

pervasive device as well as limited-function pervasive devices. (This term recognizes the

fact that both the limited-function and full-function pervasive computing devices

typically communicate using wireless communication techniques and protocols, such as

802.11, Bluetooth, and so forth.)

[0008] Various attempts have been made to address the limitations of WIDs;

however, existing approaches fail to provide a satisfactory solution.

[0009] One existing approach to addressing the limitations of WIDs involves the

technique of "transcoding" content into a form that is better suited for the WID. Products

such as the WebSphere® Transcoding Publisher from International Business Machines

("IBM") Corporation and Spyglass Prism from Open TV, Inc. represent examples of this

class of solution. ("WebSphere" is a registered trademark of IBM.) Through

transcoding, the content is programmatically manipulated for a target device. For

example, the transcoding process may enable the content to be rendered effectively on a

small-screen device (perhaps by altering font size, removing image files, and so forth).

Typically, a "transcoding engine" located on a server or network device receives the

content in its original form, performs a conversion process, and delivers the renderable

format to the client device. However, these transcoding solutions only address the need

to view.content: they do not provide a capability to manipulate the content from the

WID. For example, the transcoding process does not enable the WID to e-mail, fax,

print, or project the content.

Page 42: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

[0010] Another approach to addressing the limitations of WIDs involves

supplementing the capabilities of the WID through the deployment of hardware adapters

or software. For example, a special-purpose attachment (known as a "SpringboardTM"

module) may be plugged into a Handspring Visor device to enable the device to perform

additional functions such as viewing and projecting Microsoft PowerPoint files.

("Springboard" is a trademark of Handspring.) The Presenter-to-GoTM module from

Margi Systems, Inc. is one instance of such an attachment. ("Presenter-to-Go" is a

trademark of Margi Systems, Inc.) As another example, software may be installed on a

Microsoft Pocket PC device to enable the device to print Microsoft Word files to a

limited set of printers. The PrintPocketCE software from FieldSoftware Products is one

instance of such a software product. However, these client-centric add-on approaches

increase the cost of the WID solution significantly and sometimes far exceed the cost of

the WID itself. They also require additional power, effectively reducing the WID's

available battery life. Each add-on solution typically supports only a single data

manipulation option (or a very limited set of options), for only a limited set of file

formats (or in some cases, for a single file format). Several different add-ons may

therefore be needed to enable a WID to meet a particular user's requirements. An

additional disadvantage of this approach is that the extra hardware is often bulky and

inconvenient to carry, whereas additional software often requires a complex installation

process by end-users, consumes valuable memory on the WID, and may not interoperate

effectively with existing software loaded on the WID.

[0011] Therefore, what is needed is a technique for enabling WIDs to access and

manipulate data that avoids the limitations of the prior art.

Page 43: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

SUMMARY OF THE INVENTION

[0012] The present invention is directed to methods, systems, and computer

program instructions for enabling wireless information devices to access and manipulate

data. The data being accessed may reside on a Web server, a file server, a personal

desktop PC, or elsewhere. The data may represent virtually any type of information,

including Web content, e-mail messages, or files in various formats. The data

manipulation operations that are provided through use of the present invention may

include viewing, faxing, printing, and projecting the data, as well as delivering the data to

a voice messaging system.

[0013] Note that the discussion herein is primarily in terms of a limited set of data

manipulation tasks or operations. These operations are discussed for purposes of

illustration, and not of limitation. Many other manipulation operations might be provided

in an implementation of the present invention, including modifying or changing data in

some way; converting data from one format to another; transferring data from one device

to another (e.g. to a remote file server for storage); publishing the data to a Web site;

importing data (including a file or document) into a repository; disseminating data to one

or more recipients (such as by sending e-mail messages); attaching data to a workflow

message; controlling a remote application (such as launching and paging through a

remotely hosted PowerPoint presentation); and so forth.

[0014] Enabling WIDs to easily access a wide variety of types of data and to

initiate a wide variety of manipulations on that data in an efficient, cost-effective manner

Page 44: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

-- in spite of the device's inherent limitations (such as limited processor capacity, limited

embedded software, and/or limited bandwidth capability) -- is a primary objective of the

present invention.

[0015] In preferred embodiments, the techniques of the present invention provide

these advantages without requiring the installation of new software or hardware on the

WID, in a manner that is easily extensible to support new manipulation operations and

new data types.

[0016] Objectives of the present invention are realized by a solution that

comprises one or more proxies, zero or more agents, and a data manipulation server

(hereinafter, "DMS"). The DMS provides information about what services may be

performed, and how to invoke those services. The DMS also performs operations on

behalf of the WID, in cooperation with the proxies and the agents. In preferred

embodiments, the proxies, agents, and DMS are not located within the WID, but instead

are accessed by sending one or more request messages from the WID. This solution

enables the WID's capabilities to be augmented in a very flexible yet powerful and cost-

effective manner, without requiring any modifications to be made to the WID itself.

BRIEF DESCRIPTION OF THE DRAWINGS

[0017] FIG. 1 provides a block diagram which depicts an architecture and

components of a preferred embodiment of the present invention.

Page 45: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

[0018] FIGS. 2A and 2B illustrate examples of a table in which information about

available data access and/or manipulation services is stored, according to a preferred

embodiment of the present invention.

[0019] FIG. 3 provides a flowchart that depicts logic with which a WID accesses

data and receives information about what manipulation operations are available on that

data, according to a preferred embodiment of the present invention.

[0020] FIG. 4 provides a flowchart that depicts logic with which a WID requests

a manipulation service upon data it has accessed, and.with which that service is

performed, according to a preferred embodiment of the present invention.

[0021] FIGS. 5A - 51 provide syntax examples that are used in describing

operation of a preferred embodiment of the present invention.

[0022] FIGS. 6A and 6B illustrate samples of graphical user interface ("GUI")

displays that may be used to display available service information, according.to the

present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0023] The present invention will now be described more fully hereinafter with

reference to the accompanying drawings, in which a preferred embodiment of the

invention is shown. Like numbers refer to like elements throughout.

[0024] Flowchart illustrations of aspects of the present invention are described

below. The logic of these flowcharts may be provided as methods, systems, and/or

Page 46: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

computer program instructions embodied on one or more computer readable media,

according to an embodiment of the invention. As will be obvious to one of ordinary skill

in the art, these flowcharts are merely illustrative of the manner in which the associated

aspects of the present invention may be implemented, and changes may be made to the

logic that is illustrated therein (for example, by altering the order of operations shown in

some cases, by combining operations, etc.) without deviating from the inventive concepts

disclosed herein.

[0025] The present invention provides an efficient, cost-effective technique for

enabling a wireless interface device to easily access a wide variety of types of data and to

initiate a wide variety of manipulations on that data, without requiring the installation of

new software or hardware on the WID, and in a manner that is easily extensible to

support new manipulation operations and new data types.

[0026] Fig. 1 illustrates a preferred architecture and components of a system in

which the present invention operates. The system may provide support for multiple

WIDs, although only one WID 130 is illustrated in Fig. 1. The WID, which in preferred

embodiments is a commercially-available WID which may be provided by any one of a

number of vendors, includes at least one software application with which a user interacts

to access and/or manipulate data. In preferred embodiments, this user-interaction

software application is the only software required on the WID to enable use of the present

invention. This user-interaction software preferably comprises a browser implementation

(such as a Web browser); in alternative embodiments, other types of user-interaction

software applications (including, but not limited to, e-mail client software) may be used.

The user-interaction software application may be installed on the WID when it is

Page 47: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

marketed, and may be a commercially-available software implementation. When

browser software is present, it preferably supports at least one markup language.

Examples of markup languages that may be supported include the Hypertext Markup

Language ("HTML"); Wireless Markup Language ("WML"); and Voice Extensible

Markup Language ("VoiceXML").

[0027] Note that while preferred embodiments of the present invention operate

with commercially-available WIDs and without requiring hardware or software

modifications or add-ons, in alternative embodiments the WID may be specifically

adapted for use with the present invention, without deviating from the inventive concepts

disclosed herein. For example, a WID might include modifications to provide a user

interface tailored for use with the present invention, or perhaps code for optimizing data

access and/or manipulation processing. Moreover, auxiliary software may be provided to

provide enhanced authentication, encryption, compression, or similar functions that

augment the transmission of data described herein. Furthermore, while the preferred

embodiment anticipates invocation by user interaction (and user-interaction software),

there may be implementations in which automated or programmatic invocation is

appropriate. In these cases, software which embodies the automated or programmatic

invocation may replace the previously-described user-interaction software as the only

software required on the WID to enable use of the present invention. Or, the two forms

of invocation software may co-exist on a WID.

[0028] At least one protocol proxy 120 is provided, according to the teachings of

the present invention. A protocol proxy provides a bridge between the client (i.e. an

application executing on WID 130) and the information that it seeks to access and

Page 48: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

manipulate. A protocol proxy is responsible for accessing information on behalf of the

client and (in preferred embodiments) annotating this accessed information with

information about the manipulation services available for that accessed information.

(The annotation process is described in more detail below, with reference to Block 350 of

Fig. 3.) The information may be accessed, for example, from its location on one or more

Web content servers in the World Wide Web (hereinafter, "Web") 110, in a distributed

file system 150 of the prior art, or from an application of the prior art. This content

server may deliver content that includes services which have been "pre-added" to the

content (e.'g. by querying the DMS directly), so that the protocol proxy is not required to

provide additional annotations. This latter situation may be particularly beneficial, for

example, if the content server happens to be co-located with the DMS.

[0029] Preferred embodiments of the present invention include at least one of the

following types of protocol proxy: (1) a Hypertext Transfer Protocol ("HTTP") proxy, (2)

a Wireless Session Protocol ("WSP") proxy, and (3) a Simple Mail Transfer Protocol

("SMTP"), Post Office Protocol ("POP" or "POP3"), or Internal Message Access

Protocol ("IMAP") proxy. An HTTP proxy handles requests for and reception of

information using HTTP request and response messages. A WSP proxy handles requests

for and reception of information using WSP request and response messages. SMTP,

POP, and IMAP proxies handle requests for and reception of electronic mail respectively

using SMTP, POP, and IMAP request and response messages.

[0030] Alternative embodiments may include different and/or additional protocol

proxy types. For example, a synchronization protocol proxy may be included, which may

be used to synchronize data stored locally on a user's WID with data stored elsewhere

Page 49: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

(such as on the user's desktop PC). An example synchronization protocol is "SyncML"

which is being developed by The SyncML Initiative to seamlessly synchronize wireless

and wireline data and devices. (See http://www.syncml.org for more information on

SyncML.)

[0031] The protocol proxies in a particular implementation of the present

invention may each run on different hosts if desired, and individual protocol proxies may

be co-located with other components of the system. The protocol proxy function

described herein may be replicated, if desired (for example, to administratively separate

different types of proxy function, for purposes of fault tolerance or fault isolation, for

scalability and load balancing, etc.) Moreover, a single proxy may itself be divided into

separate components. For example, an HTTP proxy may include a first component that

determines whether the request is for content on the Web or perhaps on a file server; a

second component that handles those requests which are for Web content; and a third

component that handles those requests which are for content from a file server. The

multiple components may, in turn, be distributed across multiple machines.

[0032] In one embodiment, prior art configuration mechanisms are used to adapt

the WID for communicating with a protocol proxy. For example, the client Web browser

may be instructed to communicate with an HTTP proxy, or synchronization software on

the WID may be configured to send synchronization protocol messages to the

synchronization protocol proxy. In this embodiment, the protocol proxy then intercepts

outbound messages from the client on the WID and processes those messages as

disclosed herein. In another embodiment, a WID communicates with a protocol proxy

through a wireless access point (not shown in Fig. 1), such as an 802.11 access point or a

Page 50: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

Bluetooth access point (the functioning of which is known in the art). In this latter

embodiment, the access point or an adapter device communicating with the access point

receives outbound messages from the WID and evaluates those messages to determine

which protocol is in use. The access point or adapter device then routes the outbound

message to the appropriate protocol proxy. (This latter embodiment is preferred in the

present invention because it avoids the need to configure the WID.)

[0033] Zero or more file access proxies 140 are also provided, according to the

present invention. File access proxies may be located on various file servers, desktop

computers, database systems, or other storage devices, and provide access to data stored

in one or more repositories 150 which are located on (or otherwise accessible to) those

machines. A particular file access proxy may access data from a local repository, within

remote data stores (such as information that is accessible from a remote file server or

Web server), information stored within local applications (such as stored e-mail

messages), and/or information stored within remote applications (such as information that

is accessible through a database or directory application). Accessible information may be

dynamically generated by the local or remote application, such as a live sensor reading.

[0034] A data manipulation server 160 is provided, according to the present

invention. In preferred embodiments, the DMS has two roles. One role is to provide data

manipulation services. Another role is to maintain a repository of the available services

for various types of data and to make this information available.

[0035] While not shown in Fig. 1, it may be desirable in some situations to have

multiple data manipulation servers 160, for example for purposes of availability or load

Page 51: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

balancing or administrative control. Furthermore, the DMS may be located within a

cluster. The function of the DMS may optionally be partitioned, with different services

hosted on different DMS's.

[0036] In its role of providing data manipulation services, those services may be

provided by the DMS either directly, or indirectly by invoking one or more data output

agents 170 (which are described below). For example, the DMS may directly manipulate

content by performing a conversion of the content into HTML upon receiving a

conversion request from the WID. As another example, the DMS may indirectly

manipulate content by forwarding the content to a file manipulation agent, where that file

manipulation agent is responsible for storing the content in a repository. In simple cases,

the DMS may operate in a "pass-through" mode wherein it merely forwards content to a

data output agent (such as a file manipulation agent). In most cases, however, the DMS

performs operation-specific processing of the data received from the client before

determining whether and where to forward data that may need further processing by an

agent. In general, the data manipulation operations provided by the DMS may be

arbitrarily complex, and operate in a content-dependent manner. In some cases,

manipulation requests received from the WID may imply other manipulations that need

to be performed. As one example, if a request is received from the WID to fax content to

a recipient, the DMS preferably invokes a conversion process (which may be provided by

the DMS, by a data output agent, or perhaps by another component of the system) to

transform the content into Tag Image File Format ("TIFF"), where the resulting TIFF

document is then sent to a data output agent responsible for performing facsimile

transmission. As another example, if a request for printing a Web page is received from

Page 52: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

the WID, the DMS first accesses the content of the Web page by retrieving it from the

Web (or perhaps from cache storage) and then forwards that content to a selected data

output agent which is responsible for print services. More information on the data

manipulation processing provided by the DMS is provided below, with reference to Fig.

4.

[0037] In its role as a repository of available services, the DMS preferably

maintains a table (or a list or other analogous structure, referred to hereinafter as a "table"

for ease of reference) to identify those services. At run-time, this table is used to provide

the WID with a list of the available data manipulation services for particular data content.

The table is preferably organized according to file content type. An example is shown in

Fig. 2A, which indicates that files of type "XML" may be converted to WBXML

("Wireless Application Protocol Binary XML") decks (see 205) or faxed to recipients

(see 210), whereas files of type "ASCII" may be sent as e-mail (see 215). In this

example, the file content type appears first, in column 200; an identification of the service

appears next, in column 201; and an address of the service (i.e. a service invocation

address, described below) appears in column 202. The service identification from

column 201 may, for example, be presented to a user on a user interface to enable user

selection of the corresponding service.

[0038] Alternatively, the table may be organized in a different manner.

Furthermore, the entries in the table may optionally provide for further qualifying the

services, such that the availability of a particular service depends on additional factors

beyond the file content type. Examples of such factors include: (1) identification of

individual users or user groups; (2) user privileges or access rights; (3) particular

Page 53: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

locations from which a service will be available; (4) the target WID type; and (5)

combinations of such factors. Fig. 2B provides an example of this optional further

qualification, wherein the example table is organized according to file content type (in

column 250), user identification (in column 251), and location (in column 252). The

service is identified in column 253, and the service invocation address appears in column

254. As illustrated therein, the print service is available with all files and all locations

(indicated by presence of a wildcard symbol "*") for user A (see 255), whereas printing

is only available to user B for files of type ".doc" and only while he is located in

Conference Room C (see 260).

[0039] When user identifying information is stored in the DMS' table for use as a

factor in service availability, it may be represented in several alternative formats, such as:

the user's name; a department number to which an authorized user must belong; an

Internet Protocol ("IP") address (which may optionally identify a user group, e.g. through

a subnet mask) of the user's WID; and so forth. Similarly, location information used as a

factor in service availability may be represented in several alternative manners. Location

information is further described below, with reference to Block 340 of Fig. 3. Some

factors used in determining service availability, such as user access rights or privileges,

may require dynamically querying a directory or similar repository at run-time to

determine availability. Information used in the retrieval may in some cases be obtained

from the request message issued by the client (e.g. from header values in HTTP requests).

Techniques for performing this type of dynamic look-up processing are well known in

the art, and will not be described in detail herein.

Page 54: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

[0040] The examples in Figs. 2A and 2B use a simplified format for purposes of

illustration. In an actual implementation, the entries in the tables may vary from the

format shown. For example, the identification of the available service may perhaps be

represented using numeric identifiers, rather than textual descriptions. In this case, the

WID may optionally contain software adapted for use with the numeric codes, and may

translate the codes into.text before displaying a list of available services to the user. Or,

this translation might be performed by the protocol proxy before the available services

list is returned to the WID. The table might also contain an identification of an icon or

graphic symbol corresponding to selected ones of the available services, where this icon

or symbol can be displayed to the user on the WID. The table might also contain

multiple versions of the textual or graphical descriptions, to accommodate presentation in

different languages.

[0041] A "service invocation address" is specified for each service (see the

examples in columns 202 and 254 of Figs. 2A and 2B, respectively) and indicates an

address at which the service may be invoked. In preferred embodiments, these addresses

are provided as Uniform Resource Locators ("URLs"). Preferably, the addresses are

specified within the entries stored in the DMS's table, as shown in the example tables of

Figs. 2A and Fig, 2B, although alternatively the addresses may be separately stored

(perhaps as a storage optimization). As an example of using the latter approach, a print

service might appear many times in the DMS' table. To eliminate redundant storage of

this service's URL, the URL might be correlated to the print service but separately stored,

enabling individual table entries such as 255 and 260 in Fig. 2B (which specify qualifiers

on when printing is available) to be associated with the proper URL at run-time even

Page 55: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

though column 254 is omitted. Similarly, separate storage may be desirable in cases

where the appropriate URL to use for creating the available services list is determined

dynamically at run-time.

[0042] Note that while the service invocation addresses used herein as examples

specify locations on a DMS, this is for purposes of illustration and not of limitation. One

or more of the URLs may alternatively identify services provided at locations other than

the DMS.

[0043] In alternative embodiments, service invocation addresses may employ

address formats other than URLs, such as e-mail addresses, or perhaps a combination of

an e-mail address and subject line, to designate a service to be invoked.

[0044] When requested information is delivered to a client application on the

WID, a list of service invocation addresses for the available services is provided along

with that information (as will be discussed in more detail with reference to Block 350 of

Fig. 3). Each service invocation address is preferably augmented with an identity of the

information that is to be operated upon. In some cases, it may be possible to infer the

information identity from the service invocation address, in which case this augmentation

is not required. For example, a service invocation address might identify a Structured

Query Language ("SQL") query whose result is implicitly the data being manipulated.

[0045] Returning now to Fig. 1, one or more data output agents 170, which

implement specific output manipulation operations (such as printing, faxing, projecting,

or delivering to a voice mail system, the details of which do not form part of the present

invention), are provided. (Note that a data output agent, as the term is used herein, refers

Page 56: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

to a component that delivers file content to an output device, whereas a file access proxy

as defined herein retrieves file content in read-only mode. In some instances, a data

output agent and a file access proxy may be co-located, and furthermore these functions

may be implemented within a single software component.) The DMS passes data to

selected ones of these agents to perform the manipulation services which are managed by

the DMS. In preferred embodiments of the present invention, one or more of the

following data output agents are supported:

a print server agent, which is responsible for sending jobs to one or more

printers;

- a projection server agent, which is responsible for driving the display of

content to an LCD projector, video display, or other graphical terminal;

- a file manipulation server agent, which is capable of performing file

operations such as copying, deleting, and renaming files (and which is typically co-

located with a file access proxy);

- an e-mail manipulation server agent, which is capable of performing e-

mail operations such as sending, receiving, and deleting e-mail messages (and which is

typically co-located with a file access proxy that accesses e-mail files);

- a fax server agent, which is responsible for sending information for

facsimile transmission; and

- a voice mail server agent, which is responsible for sending information for

delivery through a voice messaging system.

[0046] The agents may send data to queues or other similar structures or

processors, which may in turn be implemented as agents. For example, the output of a

Page 57: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

print server agent may be sent to a selected print queue for printing (using queuing

techniques which are well known in the art). An agent such as a print server may manage

local resources, such as a locally-stored print queue for a particular printer, or remote

resources, such as access to multiple printers (each of which typically has its own print

queue processing). In degenerate cases, a print server agent may be manifested simply as

a print queue. Similarly, other agents such as the fax server agent and projection server

agent may be manifested as queues for their respective devices.

[0047] Referring now to Fig. 3, logic is illustrated that may be used to provide

data access support for a WID, including delivery of a list of the manipulation operations

that are available on that data. At Block 300, the client software on the WID issues a

request for information. (This corresponds to request message flow I in Fig. 1. The

encircled numbers in Fig. 1 all refer to message flows.) Typically, this request is initiated

by action of the WID user.' Block 310 indicates that a protocol proxy receives this

request. As described earlier, the outbound request either may be received by the

protocol proxy to which the client software has been configured to communicate, or may

be received by a wireless access point or adapter device (which then inspects the content

to determine which protocol proxy is required, and forwards the request to that proxy).

[0048] At Block 320, the protocol proxy forwards the request to the appropriate

information source. For example, if the request is an HTTP request for Web content

issued by a Web browser, then an HTTP proxy forwards that HTTP request to the Web.

Or, if the request is for file content, it will be forwarded to a file access proxy. (This

corresponds to message flow 2 or 3 in Fig. 1.) At Block 330, the protocol proxy receives

Page 58: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

the response from the information source. (This corresponds to message flow 4 or 5 in

Fig. 1.)

[0049] The protocol proxy then determines, in Block 340, which services are

available to the WID for manipulating the returned content. This determination may be

made in several ways. In a preferred embodiment, the protocol proxy issues a query to

the DMS for a list of available services. (This corresponds to message flow 6 in Fig. 1.)

Upon receiving the list from the DMS, the protocol proxy may optionally cache the list

for use with subsequent requests (in order to avoid the message exchange and processing

overhead of repeatedly requesting such information from the DMS). In an alternative

embodiment, the protocol proxy may be statically pre-configured with a list of available

services that are appropriate for particular types of content, users, locations, or other

criteria as described previously with respect to Figs. 2A and 2B; in this case, message

flow 6 of Fig. 1 is not required.

[0050] When queried by the protocol proxy at Block 340, the DMS consults its

stored table entries (see Figs. 2A and 2B for examples), using logic that is adapted to the

particular storage format in use by that DMS, and determines which services are available

for the data being returned to the WID. As stated earlier, the available services are

preferably filtered according to the type of content being returned, and may also (or

alternatively) account for one or more other factors. (This filtering process has been

discussed with reference to Figs. 2A and 2B, above.)

[0051] When an identification of the user is one of the factors used to determine

service availability, the user's identification may be obtained in a protocol-specific

Page 59: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

manner. For example, the user's identification may be available as the value of a cookie

in an HTTP request or response header. Or, in some cases a look-up operation may be

performed to obtain this information if a table or other similar repository of such

information is available.

[0052] In preferred embodiments, the client software on the WID does not

participate in data manipulation operations (rather, the request is sent to the DMS, which

obtains the data and manages the manipulation operations), and therefore capabilities of

the WID may not be of interest when determining the list of available services. However,

there may be some cases where this information is deemed useful. For example, it may

be known that user input is required for a particular manipulation operation (such as

specifying the target of an e-mail message). If the target WID is incapable of supporting

the necessary interactions, then that service is preferably omitted from the delivered list

by the evaluation performed by the DMS at Block 340. When this type of processing is

to be performed, information about the capabilities available on the WID may be

obtained in a variety of ways, such as by inspecting the content types accepted according

to the Accept header of an HTTP message, by assessing browser capabilities according to

information provided in the User-Agent header of an HTTP message, by analyzing

capability information explicitly provided by the device, or by inspecting a repository of

capability information indexed by device identity. These approaches for determining

client capabilities are well known in the prior art.

[0053] When information about the location of the WID is used as a factor in

determining available services, this location information may also be obtained in various

ways and once obtained, may be used in various ways. The location information may, for

Page 60: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

example, be determined by querying a global positioning system ("GPS") function on the

client. Or, the location information might be obtained by querying a Location Registry,

such as the Location Registry described in commonly-assigned U. S. Patent

(serial number 09/848,441, filed concurrently herewith), which is entitled "Location-

Aware Service Proxies in a Short-Range Wireless Environment" and which is

incorporated herein by reference. As disclosed therein, a mobile device's access point

(equivalently, a WID's access point) monitors its traffic to obtain the device's location.

This location information, which preferably comprises a list of access points which are

near the mobile device at a point in time, is maintained in the Location Registry. This

Location Registry implements a query interface that may be used by an implementation

of the present invention to determine the location of a particular WID. This related

invention also discloses "Location Aware Service Proxies" that intercept requests

initiated by mobile clients, and that use the location of the mobile device to determine

which content to deliver to the mobile device. These location-aware service proxies may

be used in conjunction with the present invention to determine what content may be

delivered, and a protocol proxy may then annotate that content with available services

information (where the set of available services may also be based on location, among

other factors). Furthermore, a protocol proxy as disclosed herein may also function as a

location-aware service proxy. In this latter case, the location-aware service proxy

preferably performs further location-sensitive filtering on the available services list

obtained from the DMS in Block 340. Or, alternatively, the location-aware service proxy

may transmit location information to the DMS (e.g. on message flow 6 of Fig. 1), where

the DMS then factors that information into its list-generation processing.

Page 61: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

example, be determined by querying a global positioning system ("GPS") function on the

client. Or, the location information might be obtained by querying a Location Registry,

such as the Location Registry described in commonly-assigned U. S. Patent, ;//. V .

(serial number 09/848,441, filed concurrently herewith), which is entitled "Location-

Aware Service Proxies in a Short-Range Wireless Environment" and which is

incorporated herein by reference. As disclosed therein, a mobile device's access point

(equivalently, a WID's access point) monitors its traffic to obtain the device's location.

This location information, which preferably comprises a list of access points which are

near the mobile device at a point in time, is maintained in the Location Registry. This

Location Registry implements a query interface that may be used by an implementation

of the present invention to determine the location of a particular WID. This related

invention also discloses "Location Aware Service Proxies" that intercept requests

initiated by mobile clients, and that use the location of the mobile device to determine

which content to deliver to the mobile device. These location-aware service proxies may

be used in conjunction with the present invention to determine what content may be

delivered, and a protocol proxy may then annotate that content with available services

information (where the set of available services may also be based on location, among

other factors). Furthermore, a protocol proxy as disclosed herein may also function as a

location-aware service proxy. In this latter case, the location-aware service proxy

preferably performs further location-sensitive filtering on the available services list

obtained from the DMS in Block 340. Or, alternatively, the location-aware service proxy

may transmit location information to the DMS (e.g. on message flow 6 of Fig. 1), where

the DMS then factors that information into its list-generation processing.

IN4

Page 62: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

[0054] Once the protocol proxy has the list of available services, it preferably

formats or annotates that list in Block 350. (In alternative embodiments, this function

may be performed by the DMS before it returns the available services information to the

protocol proxy.) In a preferred embodiment, this annotation comprises modifying the

service invocation addresses to enable the WID's user to easily invoke each available

service. For example, in the case of HTML content such as a Web page, the protocol

proxy in this preferred embodiment adds a set of links (which may be represented as text

or icons) to the list of available services that may be used to manipulate that HTML

content. Preferably, the links take the form of a service invocation address that is

parameterized with an identity of the information to be manipulated. Suppose, for

example, that one of the available services is to print a Web page, and that the DMS has

supplied the service invocation address shown in Fig. 5A for that print operation, where

this syntax, in this example, identifies print service software on the DMS itself. Using

the standard HTTP syntax for a parameter list, the Web page "www.reefedge.com" may

be identified for printing by this print software by supplying the parameter list shown in

Fig. 5B, which identifies the data being manipulated, thereby yielding an annotated link

as shown in Fig. 5C.

[0055] As another example, suppose a Microsoft Word document named

"report.doc", which is accessed from the root directory of a file server named

"fileServer", is being returned to the WID, and that available services for this document

include printing it and filing (i.e. storing) it on a file server. To print the document, the

document may be identified for printing by the print software on the DMS by supplying

Page 63: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

the sample syntax shown-in Fig. 5D, where the parameter "file=//fileServer/report.doc"

identifies the data being manipulated.

[0056] Alternatively, to identify the document for filing at a location

"newServer/filesAccessedByWID/", the sample syntax shown in Fig. 5E may be used,

where the value of the "dest" parameter identifies the new file storage location.

[0057] In the preferred embodiment, the service invocation address may be

coupled with additional information during this annotation process in order to ensure that

the DMS (and/or data output agent, as appropriate for a particular manipulation service)

accesses and manipulates the required information. For purposes of illustration, suppose

the user accessed a Web page for which cookie values were used in customizing the page

content. As an example, the WID user's bank account number may have been

transmitted in a cookie on the outbound HTTP request message, and this account number

may have been used by a Web server to generate a Web page showing the user's current

bank account balances. If, after viewing this customized Web page, the user decides that

she would like to print the information, the DMS must be able to use this same page

content when invoking the printing operation. Rather than forwarding the Web page

from the WID to the DMS, the protocol proxy of the preferred embodiment captures the

cookies that were present on the original HTTP request and includes those cookies as

additional parameters on the annotated links created during the processing of Block 350.

(Preferably, all cookies are stored and copied to the links, although if the protocol proxy

is adapted to know that certain cookies are irrelevant, they may be omitted.) By

preserving the cookies in the link annotations, the subsequent manipulation services

invoked from the DMS will automatically have the same cookie values that were used in

Page 64: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

processing the original request message, thereby ensuring that the manipulated content

corresponds to the content delivered to the WID user. Fig. 5F provides an example of

syntax that may be used to annotate a link with a cookie whose name is "acct_nbr" and

whose value is "123456". (Note that the DMS prepares the user's bank account

information for printing in response to a data manipulation request indicated as message

flow 8 in Fig. 1, and invokes the print process at a data output agent by issuing message

flow 10 in Fig. 1. The processing performed by the DMS may further comprise obtaining

bank account information by issuing message flow 9 in Fig. 1.)

[0058] This same approach may be used for form parameters that are submitted to

a Web server (e.g. using an HTTP POST message). To encode the form parameter

information in the URL, a parameter name such as "postParams" may be substituted for

the "cookie" parameter name shown in Fig. 5F. A parameter name/value pair may then

be listed, in an analogous manner to listing a cookie name/value pair.

[0059] A service invocation address may be coupled with any combination of

cookies, form parameters, or other information.

[0060] When encoding cookies, form parameters, and other information in this

manner, three issues should be considered. First, URL length is currently limited to 255

characters, according to the HTTP specification. Second, it is difficult to encode all

character sets in URLs. Third, a DMS may in some cases be implemented within a Web

client which is not able to programmatically control the sending of request data. For

example, the DMS might use Microsoft Intemet Explorer, which provides no

programmatic way to force a cookie to be sent. To address these problems, the cookies,

Page 65: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

form parameters, and so forth may be cached by the protocol proxy (i.e. when the original

content is being processed). This cached information may then be used in three ways to

construct a valid request for use with the present invention.

[0061] In a first approach, in the service invocation address URL, a parameter can

be given by which the cached parameters can be obtained by the DMS from the protocol

proxy. For example, "?params=http://protocolproxy/params/139x3e245" gives the DMS

a URL from which the cached parameters, cookies, etc. can be obtained. The value

"139x3e245" in this example is meant as a temporary code which represents the

parameters associated with the particular request.

[0062] In a variation of this first approach, the parameter on the service invocation

address URL may identify how to obtain the cached parameters from the cache, rather

than from the protocol proxy.

[0063] In a second approach, the data URL may actually point to the protocol

proxy itself. The protocol proxy, upon receiving the data request from the DMS,

determines the real request and obtains the requested data on the DMS' behalf. For

example, "http://protocolproxy/request/139x3e245" might cause a request (along with the

appropriate cookies, form parameters, and other information) to be issued from the

protocol proxy to the true source of the data.

[0064] In a third approach, the DMS may request the content by itself using the

protocol proxy, in much the same way that all requests from the WID were directed

through the protocol proxy. However, the protocol proxy may annotate the data source

with a tag that the protocol proxy can later use to reconstruct the original query. For

Page 66: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

example, the protocol proxy might rewrite the content request URL to be

"http://www.yahoo.com/?protocolproxy=139x3e245", so, upon receiving the request

from the DMS, the protocol proxy may look up session 139x3e245 in its cache, obtain

the necessary parameters, and forward the properly-formatted request to location

"www.yahoo.com".

[0065] It is also possible that the protocol proxy might cache the data content

(rather than the parameters). In this case, the content location provided by the protocol

proxy might then point to that cache. There is then no need to provide cookies or

parameters in the URL, because the DMS can obtain the full content from the cache. To

achieve maximal performance and capacity in this situation, the cache is preferably

capable of storing multiple versions of content associated with the same URL, with each

version associated with a different combination of cookies, form parameters, and other

request information.

[0066] Optionally, additional formatting information may be supplied as

parameters on selected service invocation addresses during the annotation process of

Block 350. These additional parameters may be provided for implementation-specific

usage, including for customization of the data manipulation service. One example,

described above, is to specify a destination address for a file that is being stored in a

repository. As another example, suppose the data manipulation service is to send an e-

mail message to a particular recipient. An example of invoking the "email" service,

which is managed through the DMS at the location shown in Fig. 5G, to send a message

identified as "msg98765.txt" to the recipient "[email protected]" is shown in Fig. 5H.

Page 67: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

[0067] As yet another example of adding parameters to service invocation

addresses, it may be desirable in a file conversion service to supply parameter values to

be used in guiding the conversion process. Suppose, for example, that the previously-

discussed "report.doc" Microsoft Word document is being converted to HTML, and that

the conversion software allows several different types of transformations, based upon

identification of a particular template. The template may specify how to format the title,

for example, and how to "chunk" the source document into different pieces, how links to

those pieces are embedded, and so forth. If the template parameter value is "plain", for

example, the conversion is adapted to returning plain text, whereas if the template

parameter value is "segmented", then the conversion may generate a "chunked"

document where each logical input segment appears on a different page, and perhaps

failing to specify a template parameter value causes the entire document to be generated

as a single HTML page. A sample service invocation address for viewing the converted

file in segmented form is shown in Fig. 51.

[0068] Preferably, the annotation process of Block 350 generates separate

annotated links for each valid option, such that when the user selects one of the links, all

the necessary information is present for properly invoking the data manipulation service.

(Note that the DMS prepares this file for viewing in response to a data manipulation

request indicated as message flow 8 in Fig. 1, and returns the result for rendering on the

WID at message flow 12 in Fig. 1. The processing performed by the DMS may further

comprise obtaining the file content by issuing message flow 11 in Fig. 1.)

[0069] The parameter types supplied during the annotation process may be stored

in, and obtained from, the DMS table along with the applicable service invocation

Page 68: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

address. Or, the protocol proxy may provide service-specific code for determining which

parameter types are applicable for a particular service.

[0070] While the preferred embodiment has been described in terms of embedding

the service description directly into the content (e.g. as links in HTML), other alternative

approaches may be used without deviating from the scope of the present invention. As

one example, the annotation process may comprise generating a compound document

which combines the original content (in HTML, WML, XML, etc.) and the service

definition (in XML, or perhaps a similar well-structured markup language). In this

approach, the service description may be embedded directly into the content. As another

example, a multi-part MIME (Multi-purpose Internet Mail Extensions) message may be

generated which contains the original content (in one part) and the service description (in

another part). These alternative approaches provide different ways for conveying the list

of available services.

[0071] , Optionally, an implementation of the present invention may enable the

protocol proxy itself to directly invoke data manipulation operations. For example,

during the annotation processing in Block 350, the protocol proxy may wish to save the

content being returned to the WID in response to its request message into a cache, for

faster retrieval on subsequent requests. Or, the protocol proxy may determine that a data

conversion operation is desirable, for example by converting an XML document to a

WBXML deck. Preferably, the protocol proxy sends a data manipulation request

message to the DMS for such processing, and the DMS then invokes the necessary file

access proxy and/or other data output agent processing. Upon receiving the response

from the DMS, the protocol proxy preferably delivers the resulting data to the WID in

Page 69: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

addition to (or, alternatively, instead of) the originally accessed information. For

example, if the original request was for a Web page, and the protocol proxy requests that

this Web page be converted to a WBXML deck, then either the deck or the deck plus the

Web page may be delivered to the WID, as appropriate in a particular implementation of

the present invention. (As will be obvious, some types of DMS response are preferably

never transmitted to the client, such as those responses or portions thereof which provide

return code and status information.) This type of protocol proxy-initiated manipulation

may be appropriate when software executing on the proxy can predict that the user would

be likely to request the data manipulation operation, and the "automatic" invocation by

the protocol proxy therefore serves to simplify the user's task. It is also appropriate when

the protocol proxy can determine that the data in the accessed format cannot be presented

on the WID without first performing a conversion. This latter type of determination may

be made by inspecting the content types accepted by the WID, for example as indicated

on the Accept header of the outbound HTTP request. In the preferred embodiment, the

protocol proxy invokes a conversion service to convert all incoming Microsoft Word files

to HTML or WML, because Microsoft Word files cannot be rendered natively on most

WIDs. Other similar conversions may also be automatically provided. The list of

available services to be delivered to the WID along with the content may be provided in

terms of the originally-accessed content, or the manipulated content, or both, as

appropriate in a particular situation.

[0072] Continuing on with Fig. 3, at Block 360, the content, along with the

annotated list of available services, is returned to the WID. This corresponds to message

flow 7 in Fig. 1. The WID then receives this information (Block 370) and preferably

Page 70: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

displays the content and/or the available services list to the user. However, in alternative

embodiments, the service list might be displayed separately from the document. A

browser might import that service list and populate a dynamic menu, pop-up, service

selection panel, or other custom user interface component. (As stated earlier, in some

cases it may be desirable to include custom or modified client software on the WID for

use with the present invention, such as software which provides a tailored user interface.)

[0073] Once the service list is available, the user may then invoke a selected

service in order to initiate further manipulation of the delivered content. In response to

the user's invocation, a request message will be sent to the location identified on the

service invocation address (which, as illustrated herein, is preferably an address

identifying a service on the DMS, but alternatively may be a service running elsewhere).

This request message corresponds to message flow 8 in Fig. 1. The processing performed

on the DMS in response to receiving the data manipulation request will be described with

reference to the logic in Fig. 4.

[0074] In some cases, a WID may have pertinent data that is locally stored, such

as information to be used when sending fax content to a recipient. After receiving a list of

available services from the protocol proxy and selecting one of these services, the locally-

stored data may be posted from the WID to the DMS, for use as the selected service

executes.

[0075] Note that programmatic operations on the WID may invoke a data

manipulation service in some cases, rather than the user performing the invocation. For

example, the DMS may embed a script within the available services list, where this script

Page 71: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

may autonomously invoke a manipulation service. Suppose, for purposes of illustration,

that a WID issues a request to receive a current view of the user's calendar from his

desktop PC. The data returned to the WID in response to the request may include one or

more software-activated alarms. When the appropriate action occurs (such as the passage

of time to reach a calendared alarm event), a data manipulation service identified in a

script supplied by the DMS may be programmatically triggered to perform some alarm

processing (such as printing the agenda for a scheduled meeting to the printer at the

designated conference room).

[0076] Turning now to Fig. 4, logic is depicted that may be used to support

processing when the WID requests a data manipulation service from the DMS. At Block

400, the WID issues a request for a particular service by invoking the provided (and

possibly annotated) service invocation address. (This corresponds to message flow 8 in

Fig. 1.) Note that all parameters for this invocation are already available (or indirectly

indicated) on the service invocation address, having been supplied by the protocol proxy

during the annotation process in Block 350 of Fig. 3. At Block 410, the DMS receives

the request, and at Block 420, the DMS parses the annotated information in the request to

determine the specified service invocation address, the identity of the data to be

manipulated, and any other parameters that may be present. At Block 430, the DMS

retrieves the identified data and may optionally manipulate it, according to the

requirements of the particular data manipulation service being performed. For example,

the DMS may know that a conversion service is necessary before performing the

manipulation operation requested by the user, and may therefore automatically invoke

such processing. As described earlier, if the user requests a fax service, then the DMS

Page 72: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

may retrieve the data and convert it into a TIFF file prior to transmitting it to a fax agent,

without requiring the user to explicitly request the conversion to TIFF. (The transmission

to the fax agent occurs according to Block 450, described below.) The DMS may

perform this processing directly, or by invoking a data output agent or other conversion

software.

[0077] Preferably, the annotated service invocation address provides a complete

description of the data to be manipulated, as has been shown in the examples herein.

Alternatively, it may happen that the DMS needs to evaluate additional information in

order to locate the data. For example, if a file name is received that does not specify a

complete file path from a root directory, then the DMS preferably uses implementation-

dependent techniques for resolving the location and directory path information. (Or, an

error message may be returned in such cases, if desired.)

[0078] At decision Block 440, the DMS determines whether processing by a data

output agent is required to complete the requested service. Each service implemented on

the DMS is adapted to knowing what type of further processing is required and what

agent(s) need to be invoked.

[0079] If the answer to the decision block is Yes, then control passes to Block 450

where a request to the appropriate data output agent is generated. The data output agent

that is invoked is preferably determined according to the type of service to be performed,

and optionally by evaluating other factors (such as the user's identity, the processing load

on particular printers, current network conditions such as available bandwidth and/or

outages, which.data output agent supports the user's e-mail service or file system, and so

Page 73: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

forth). The data output agent performs any necessary operations, using processing which

is known in the prior art, to perform the requested data manipulation. For example, if the

data output agent controls an LCD projector, then the data output agent retrieves the

information to be projected, renders it, and makes the rendered information available to

the associated projector (e.g. through a VGA output connector). Or, if the data output

agent handles sending of e-mail messages, then the message to be sent is retrieved,

formatted for delivery (if necessary), and transmitted.

[0080] In alternative embodiments, the DMS may choose to not retrieve selected

data content until the data is required by the data output agent. This may be implemented

by generating a special URL and passing this URL to the data output agent. When the

data output agent needs the content, it requests that URL (from the DMS), and then the

content is actually obtained (by the DMS, possibly through the protocol proxy) and

delivered to the data output agent. This has the advantage of avoiding data retrieval

until/unless it is needed, and avoids the need to "push" data to the data output agent.

[0081] As indicated at Block 460, the DMS then preferably receives a response

message from the invoked data output agent. This response message may be simply a

success or failure indication, or it may include additional information such as status

information. For example, when a print service has been invoked, the response message

may indicate that the print job has started (or is queued), which printer has the print job,

where that printer is located, and so forth.

[0082] When the answer to decision Block 440 is No, and also following the

processing of Block 460, at Block 470 the DMS generates a response to the WID that

Page 74: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

requested the data manipulation service. Similar to the response message received at

Block 460, this response message may indicate success or failure, and may include

additional information about the status of the request. Optionally, the response may

include a list of further data manipulation services that may be performed on the data that

was sent to the WID at Block 370 of Fig. 3. In some cases, the DMS may return new

content to the WID after invocation of the data manipulation service. In these cases, the

response message sent in Block 470 preferably includes a newly-created list of services

that are available for this new content. This processing may be performed by the DMS

initiating a request to the protocol proxy for content at a URL that is actually served from

the DMS, after which the protocol proxy will retrieve the content from the DMS and then

query the DMS for the services list. The protocol proxy then annotates this list, and

returns the content to the WID. This approach avoids duplication of the service

annotation processing logic.

[0083] Turning now to Fig. 6A, a sample GUI display that provides available

service information is illustrated, according to the present invention. This display shows

an image of a Microsoft PowerPoint presentation file that has been retrieved by a file

access proxy. The file has also been converted for display on the WID (e.g. to make the

slides of the presentation viewable on the WID's display panel). This conversion may be

performed automatically by the protocol proxy upon detecting that the requested content

is a PowerPoint file and/or that the target WID cannot display files of this type, as

discussed earlier. Along with the content 610 of the slide, four icons 601 - 604 have

been provided in a header area 600 to enable the user to select from among four data

manipulation services which are available for this content. The first icon 601 provides a

Page 75: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

link to a home page; icon 602 may be selected to print the content; icon 603 may be

selected to project the content; and icon 604 may be selected to log out of the system.

[0084] Fig. 6B provides another sample GUI display with available service

information. This display shows an image 620 of a page retrieved from a Web server.

Along with this content 620, three icons 601, 602, and 604 have been provided in header

area 600. These icons represent the same functions discussed with reference to Fig. 6A:

In this example, the printer icon 603 has been omitted, and the user therefore cannot

request printing of the image. (It may be that there is no printer available for the WID's

current location, or that the user is not authorized to access the printer, etc.)

[0085] As has been demonstrated, the present invention provides a number of

advantages over prior art solutions for accessing and manipulating data content from a

WID. The teachings which have been described do not require modifications of the

WID, yet support a wide variety of data manipulation operations and a wide variety of

content types. Furthermore, the supported operations and content types are easily

extensible, again without requiring modifications to the WID.

[0086] The foregoing description of a preferred embodiment is for purposes of

illustrating the present invention, and is not to be construed as limiting thereof. Although

a preferred embodiment has been described, it will be obvious to those of skill in the art

that many modifications to this preferred embodiment are possible without materially

deviating from the novel teachings and advantages of this invention as disclosed herein.

Accordingly, all such modifications are intended to be within the scope of the present

invention, which is limited only by the claims hereafter presented (and their equivalents).

Page 76: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

CLAIMS

We Claim:

1. A method of enabling data access and manipulation from a pervasive

device, comprising the steps of:

receiving a data access request from a pervasive device;

obtaining the requested data;

determining what data manipulation operations are available for the obtained

data; and

providing references to the determined data manipulation operations to the

pervasive device.

2. The method of claim 1, wherein a reference to a determined data

manipulation operation comprises a service.invocation address.

3. The method of claim 1, further comprising the steps of:

receiving a request to perform a selected one of the determined data

manipulation operations; and

performing the requested operation on behalf of the pervasive device.

4. The method of claim 1, wherein the determining step further comprises

determining what data manipulation operations are available for a content type of the

obtained data.

5. The method of claim 1, wherein the determining step further comprises

determining what data manipulation operations are available for a user of the pervasive

device.

6. The method of claim 1, further comprising the steps of:

determining a current location of the pervasive device; and

Page 77: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

determining what data manipulation operations are available for the current

location of the pervasive device.

7. The method of claim 1, wherein the determining step further comprises

determining what data manipulation operations are available responsive to a type of the

pervasive device.

8. The method of claim 1, further comprising the steps of:

performing one or more data manipulation operations on the obtained data,

thereby creating transformed data;

determining what data manipulation operations are available for the

transformed data; and

providing references to the determined data manipulation operations for the

transformed data to the pervasive device.

9. A computer program product having a computer-readable medium having

computer program code encoded thereon for enabling data access and manipulation from

a pervasive device, the computer program code adapted to perform steps comprising:

receiving a data access request from a pervasive device;

obtaining the requested data;

determining what data manipulation operations are available for the obtained

data; and

providing references to the determined data manipulation operations to the

pervasive device.

10. The computer program product of claim 9, wherein a reference to a

Sdetermined data manipulation operation comprises a service invocation address.

11. The computer program product of claim 9, further comprising the steps of:

receiving a request to perform a selected one of the determined data

manipulation operations; and

performing the requested operation on behalf of the pervasive device.

Page 78: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

12. The computer program product of claim 9, wherein the determining step

further comprises determining what data manipulation operations are available for a

content type of the obtained data.

13. The computer program product of claim 9, wherein the determining step

further comprises determining what data manipulation operations are available for a user

of the pervasive device.

14. The computer program product of claim 9, further comprising the steps of:

determining a current location of the pervasive device; and

determining what data manipulation operations are available for the current

location of the pervasive device.

15. The computer program product of claim 9, wherein the determining step

further comprises determining what data manipulation operations are available

responsive to a type of the pervasive device.

16. The computer program product of claim 9, further comprising the steps of:

performing one or more data manipulation operations on the obtained data,

thereby creating transformed data;

determining what data manipulation operations are available for the

transformed data; and

providing references to the determined data manipulation operations for the

transformed data to the pervasive device.

17. A system for enabling data access and manipulation from a pervasive

device, comprising:

a data manipulation server for maintaining a repository of data manipulation

operations; and

a protocol proxy in communication with the pervasive device and the data

manipulation server and adapted to:

receive a data access request from the pervasive device;

Page 79: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

obtain the requested data;

communicate with the data manipulation server to determine, responsive

to the obtained data, what data manipulation operations are

available; and

provide references to the determined data manipulation operations to the

pervasive device.

18. The system of claim 17, wherein the data manipulation server maintains a

service invocation address for a data manipulation operation in the repository and

wherein the reference to the determined data manipulation operation comprises the

service invocation address.

19. The system of claim 17, wherein the data manipulation server is adapted

to receive a request to perform a selected one of the determined data manipulation

operations and invoke the requested operation on behalf of the pervasive device.

20. The system of claim 17, wherein the protocol proxy is further adapted to

determine what data manipulation operations are available for a content type of the

obtained data.

21. The system of claim 17, wherein the protocol proxy is further adapted to

determine what data manipulation operations are available for a user of the pervasive

device.

22. The system of claim 17, wherein the protocol proxy is further adapted to:

determine a current location of the pervasive device; and

determine what data manipulation operations are available responsive to the

current location of the pervasive device.

Page 80: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

23. The system of claim 17, wherein the protocol proxy is further adapted to

determine what data manipulation operations are available responsive to a type of

pervasive device.

24. The system of claim 17, wherein the protocol proxy is further adapted to:

perform one or more data manipulation operations on the obtained data,

thereby creating transformed data;

determine what data manipulation operations are available for the transformed

data; and

provide references to the determined data manipulation operations for the

transformed data to the pervasive device.

Page 81: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 10036

TECHNIQUE FOR ENABLING REMOTE DATA ACCESS ANDMANIPULATION FROM A PERVASIVE DEVICE

ABSTRACT OF THE DISCLOSURE

Methods, systems, and computer program instructions for enabling users of

pervasive devices to remotely access and manipulate information in ways that might

otherwise be impossible or impractical because of inherent limitations of the device. The

disclosed techniques enable a wide variety of data manipulation operations to be

performed on behalf of the pervasive device, for a wide variety of content types. In

preferred embodiments, no modifications or add-ons are required to the pervasive device.

Page 82: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Slnghal et al.

Atty. Docket No.: 20423-10036Sheet 1 of 9

I0

' ca c

o<

Page 83: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Singhal et al.

Atty. Docket No.: 20423-10036Sheet 2 of 9

.x .c

a a)

0O

E 0c

N tQ. o

o .~~ 0

C C

8 c

N o

N X X Q N °

N N N N N

Page 84: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Singhal et al.

Atty. Docket No.: 20423-10036Sheet 3 of 9

FIG. 3

WID Requests 300Data

Request Routed to 310CorrespondingProtocol Proxy

Forward 320request to

information source

Receive 330response from

information source

Obtain 340available service

information

Format 350information to includeaccess to services

Forward 360information to

requesting WID

WID receives 370data and

service information

Page 85: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Singhal et al.

Atty. Docket No.: 20423-10036Sheet 4 of 9

0moo m

C

L.

00 N O0p

Page 86: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Singhal et al.

Atty. Docket No.: 20423-10036Sheet 5 of 9

E0

CC

8 o

11

=3.)

e0

a) C)

cOL_) Q.

L"i) IIIr )

0.

0. 0

• ('

05-

a.r °

-CI €-

Page 87: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Singhal et al.

Atty. Docket No.: 20423-10036Sheet 6 of 9

0l.

0

aa>

O a)

ottC

o to. V

cL.. CD

Co

_o

0- *4q

1~_Q

Page 88: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Singhal et al.

Atty. Docket No.: 20423-10036Sheet 7 of 9

E

O C

o

Sc

E 0

o" I

0m ECO•

N t

E"

a E,

1 "S

4-

CO'0. 4-

r CU

4-CU

Page 89: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Singhal et al.

Atty. Docket No.: 20423-10036Sheet 8 of 9

FIG. 6A

602I

603 694

'1192.168, 1/1reetedlede

BEST AVAILABLE COPY

601I

600

610

Page 90: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

EXPRESS MAIL NO: EV 342132685 USTitle: Technique for Enabling Remote Access and

Manipulation From a Pervasive DeviceInventor(s): Sandeep K. Singhal et al.

Atty. Docket No.: 20423-10036Sheet 9 of 9

FIG. 6B

601 603 6)4

http //192.168.1.10/re dgelde -

600 [ I

620

Page 91: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Attorney Docket Number MLDRE2001001First Named Inventor: S. Singhal

Express Mail Label No. EF076589295US

DECLARATION AND POWER OF ATTORNEYFOR UTILITY PATENT APPLICATION

Declaration Submitted with Initial Filing

As a below named inventor, I hereby declare that:

My residence, post office address, and citizenship are as stated below next to my name.

I believe I am an original, first and joint inventor of the subject matter which is claimed and forwhich a patent is sought on the invention entitled:

TECHNIQUE FOR ENABLING REMOTE DATA ACCESS AND MANIPULATION FROMA MOBILE DEVICE

the specification of which is attached hereto.

I hereby state that I have reviewed and understand the contents of the above identifiedspecification, including the claims.

I acknowledge the duty to disclose information which is material to patentability as defined in 37CFR 1.56.

I hereby claim foreign priority benefits under 35 U.S.C. 119(a)-(d) or 365(b) of any foreignapplication(s) for patent or inventor's certificate, or 365(a) of any PCT international applicationwhich designated at least one country other than the United States of America, listed below andhave also identified below, by checking the box, any foreign application for patent or inventor'scertificate, or of any PCT international application having a filing date before that of theapplication on which priority is claimed.

Prior Foreign Application Country Foreign Filing Date Priority Not CertifiedNumber(s) Claimed Copy

none

Page 1 of 4

Page 92: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

I hereby claim the benefit under 35 U.S.C. 119(e) of any United States provisional application(s)listed below.

Application Number(s) Filing Date

none

I hereby claim the benefit under 35 U.S.C. 120 of any United States application(s), or 365(c) ofany PCT international application designating the United States of America, listed below and,insofar as the subject matter of each of the claims of this application is not disclosed in the priorUnited States or PCT International application in the manner provided by the first paragraph of35U.S.C. 112, I acknowledge the duty to disclose information which is material to patentability asdefined in 37 CFR 1.56 which became available between the filing date of the prior applicationand the national or PCT international filing date of this application.

U.S. Parent Application or PCTParent Number

Parent Filing Date Parent Patent Number

As a named inventor, I hereby appoint the following registered practitioner(s) to prosecute thisapplication and to transact all business in the Patent and Trademark Office connected therewith:Marcia L. Doubet, Registration Number 40,999.

Direct all correspondence to: Customer Number 000025260, having the correspondence address:

Name:Address:City:State:Zip:Country:Telephone:Fax:

Law Office of Marcia L. Doubet5228 Westminster LaneFuquay-Varina .NC27526USA(919) 557-3827(919) 557-3827

Page 2 of 4

Page 93: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

I hereby declare that all statements made herein of my own knowledge are true and that allstatements made on information and belief are believed to be true; and further that thesestatements were made with the knowledge that willful false statements and the like so made arepunishable by fine or imprisonment, or both, under 18 U.S.C. 1001 and that such willful falsestatements may jeopardize the validity of the application or any patent issued thereon.

Name of First Inventor:Given Name Family Name or Surname

Sandeep Kishan Singhal

Inventor's Signature: __ Date 5 2 / ,Residence: 2 Leighton Street

Englewood Cliffs, NJ 07632-1414USA

Citizenship: USPost Office Address: same

Name of Second Inventor:Given Name Family Name or Surname

Barry Eliot Levinson

Inventor's Signature:Residence:

Citizenship:Post Office Address:

20 East- 2n Street #3B-New Yo N 10009USAUSsame

Page 3 of 4

Date

Page 94: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Name of Third Inventor:Given Name Family Name or Surname

Darren Michael Sanders

Inventor's Signature:Residence:

Citizenship:Post Office Address:

Date S2. 0/61 Avalon Gardens DriveNanuet, NY 10954USAUSsame

Page 4 of 4

Page 95: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

POWER OF ATTORNEY TO PROSECUTE APPLICATIONS BEFORE THE USPTO

I hereby appoint:

[ Practitioners associated with the Customer Number

OR

34415

O Practitioner(s) named below (if more than ten patent practitioners are to be named, then a customer number must be used):

Name Registration Number

- I_________________________________________________as attorney(s) or agent(s) to represent the undersigned before the United States Patent and Trademark Office (USPTO) inconnection with any and all patent applications assigned only to the undersigned according to the USPTO assignment records orassignment documents attached to this form in accordance with 37 CFR 3.73(b).

Assignee Name and Address:

Symantec Corporation20330 Stevens Creek Boulevard

Cupertino, CA 95014

A copy of this form, together with a statement under 37 CFR 3.73(b) (Form PTO/SB196 or equivalent) Isrequired to be filed in each application in which this form is used. The statement under 37 CFR 3.73(b) maybe completed by one of the practitioners appointed in this form if the appointed practitioner is authorized toact on behalf of the assignee, and must identify the application In which this Power of Attorney is to be filed.

SIGNATURE of Assignee of RecordThe individual whose signature and title is supplied below is authorized to act on behalf of the assignee

Page 96: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

STATEMENT UNDER 37 CFR 3.73(b)

Applicant/Patent Owner: Svmantec Corporation

Application No./Patent No.: Unassigned Filed/Issue Date: March 7, 2005

Entitled: Technique for Enabling Remote Data Access and Manipulation From a Pervasive Device

Symantec Corporation , a Corporation(Name of Assignee) (Type of Assignee, e.g., corporation, partnership, university, government agency, etc.)

states that it is:

1. 0 the assignee of the entire right, title, and interest; or

2. O an assignee of less than the entire right, title and interest.The extent (by percentage) of its ownership interest is %

in the patent application/patent identified above by virtue of either:

A. [ ] An assignment from the inventor(s) of the patent application/patent identified above. The assignment was recordedin the United States Patent and Trademark Office at Reel , Frame , or for which a copythereof is attached.

OR

B. [ X ] A chain of title from the inventor(s), of the patent application/patent identified above, to the current assignee as shown

below:

1. From Sandeep K. Singhal. Barry E. Levinson and Darren M. Sanders To: ReetEdae. Inc.The document was recorded in the United States Patent and Trademark Office atReel 014378 , Frame 0225 .or for which a copy thereof is attached.

2. From ReefEdge. Inc. To: Svmantec Corporation and Symantec International LimitedThe document was recorded in the United States Patent and Trademark Office atReel 015698 , Frame 0943 , or for which a copy thereof is attached.

3. From Symantec International Limited To: Symantec CorporationThe document was recorded in the United States Patent and Trademark Office atReel 015722 , Frame 0797 , or for which a copy thereof is attached.

[ ] Additional documents in the chain of title are listed on a supplemental sheet.

[X] Copies of assignments or other documents in the chain of title are attached.[NOTE: A separate copy (i.e., a true copy of the original document) must be submitted to Assignment Division in accordance with 37CFR Part 3, if the assignment is to be recorded in the records of the USPTO. See MPEP 302.08]

The undersigned (whose title is supplied below) is authorized to act on behalf of the assignee.

3 7 0 . Brian M. Hoffman/ Date

(415) 875-2484Telephone number

Type nted name

Signature

Attorney for AssigneeTitle

20423/10036/SF/5138564.1

Page 97: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

NOT FOR RECORDATION

Attorney Docket Number MLDRE2001001Express Mail Label No. EF076589295US

ASSIGNMENT OF PATENT APPLICATION

WHEREAS, we, the undersigned Sandeep Kishan Singhal, Barry Eliot Levinson, and DarrenMichael Sanders, whose full postal addresses are given below, hereafter referred to as Applicants,have invented certain new and useful improvements disclosed in an application for United StatesLetters Patent titled TECHNIQUE FOR ENABLING REMOTE DATA ACCESS AND.MANIPULATION FROM A MOBILE DEVICE, executed on even date herewith, and

WHEREAS, ReefEdge, Inc., a corporation whose full postal address is 2 Executive Drive, Suite600, Fort Lee, New Jersey, United States of America, herein (together with any successors, legalrepresentatives, and/or assignees thereof) referred to as Assignee, is desirous of acquiring theentire right, title and interest in the same;

NOW, THEREFORE, in exchange for good and valuable consideration, the receipt andsufficiency of which is hereby acknowledged, we, the Applicants, by these presents do sell, assignand transfer unto said Assignee the full and exclusive right, title, and interest in and to the saidimprovements and said application (and all divisions, substitutions, continuations, andcontinuations-in-part thereof) in the United States and the entire right, title and interest in and toany and all Patents (including all re-issues, renewals, and extensions thereof) which may begranted therefor in the United States; and we hereby authorize and request the United StatesCommissioner of Patents and Trademarks to issue all said Patents to said Assignee, of the entireright, title, and interest in and to the same, for Assignee's sole use and behoof; and for the use andbehoof of Assignee's legal representatives, to the full end of the term for which said Patents maybe granted, as fully and entirely as the same would have been held by us had this assignment andsale not been made;

AND we hereby covenant that we have full right to convey the entire interest herein assigned, andthat we have not executed, and will not execute, any agreement in conflict herewith;

AND we hereby further covenant and agree that we will communicate to Assignee any factsknown to us respecting said improvements, and testify in any legal proceeding, sign all lawfulpapers, execute all divisional, substitute, continuation, continuation-in-part and re-issueapplications, make all rightful oaths and generally do everything possible to aid Assignee to obtainand enforce proper patent protection for said improvements.

Executed this 12- day ofMay, 2001, at FO " LZE , NT

Signatures of Sandeep Kishan Singhal, Barry Eliot Levinson, and Darren Michael Sanders, alongwith full postal addresses thereof, follow:

Page 1 of 2

Page 98: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

NOT FOR RECORDATION

By Sandeep Kishan Singhal, whose full postal address is 2 Leighton Street, Englewood Cliffs, NJ,07632-1414;

(Signature of Sandeep shan Singhal)

By Barry Eliot Levinson, whose full postal address is 206 EPZt !4reek New York, NY,10009;

gnature of Barry Eliot Levinson)

and By Darren Michael Sanders, whose full postal address is 61 Avalon Gardens Drive, Nanuet,NY, 10954.

(Signature of Darren Michael. Sanders)

State of /e, Orse ) SS.County of e )

On this -Z day of May, 2001, before the undersigned, a Notary Public for the State and Countyaforesaid, personally appeared said Sandeep Kishan Singhal, Barry Eliot Levinson, and DarrenMichael Sanders, who are known or proved to me on the basis of satisfactory evidence to be thepersons whose names are subscribed to the above assignment, and acknowledged that theyexecuted the same.

Seal (Not Public)

My commission expires: 1 8//

Page 2 of 2

Page 99: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

NOT FOR RECORDATION

PATENT ASSIGNMENT

This PATE ASSINMENT ("h i nc) ite e t o caeed itob Ref~g, aDelwae mpoatoo hain alas o bsieshloated at Two Eeaiv Drive. Sante 60,a Le. NwJre

07024 ('Asaign), as anigam, in favor ofSyeunfec Corporation. aDelaware corporatia. having a place ofbasis lc ad a 2030 tevns Mek lvd Cuatio. A 9014and Symanaec Internationalliited: an Ks

copny with id crpaoe offlees at Ballycoolse Business Park, BbUICIudstwN. Dublin 15. brtland (coea ivelYAssivwse), as asinee. with mfarxac to the follow*n facts and drmcnee.

Asswanrand Assignere have cabned into that certain Asset Purchase Areemeau datod as of Jamsazty 31,2005 (the AAsCI ftba eApwnt ) which. dkimg with th promises contained heretuoaom ceititl 1uocdmiaati for the psnaisaa hercin;

Aniguom is the sole and acluieve awns of lbs Letter Patents and pplhcations m the United Staten(herlin dto h7aktb) as altn m the attacbed Exhit 1.

Ashpnndeansu to acquire, and Assipno deajem to assign, Amsi a ight title and ifre is t ndunder the Patenws as proviedia the Awet Purchane Agreerncni

NOW, THEREFORBIto alU vahomit may coma=, berit henian that for good and 'valuable consideaztin thereceipt and adoscwy of which is hereby adwazwledged, Assignor has noKt snaigiud. k ti danudi sax oGmr anddoes herby sett asign, transfer and set over wo Assignee the P ate listed ms Exhibis l saaclted I re,. togetherwith all patnams. -applicatons, patent tights (mcddmg sll i iMM reamanasri, -=Uazm, oao s.

caiinnriaas to part eoattmzlgpreamion appliaanos, and division of etch pa ents and applicatzosa. peovuzradpatent apaplicas that ae or will be coatinam rasnostanas in part of mhptats and aplian feignpcowntepaxti to any of the foeping including utility miodels; ad the right to sue and tecover for past inkiugeni0M).

MAsignor fwlwwwas that ft has not a mated, and wvl not exe~cute, ay aremmnot il cmdu ithd Oriaconaiseef with this sasigoateaL.

intu wiwbercol Assignsor has csted this Asuimnnet to be art Otd byits office(s) traazfo dslyauthorized.

Dated: o! 2$

303197 VamO 2tit .Doc

Page 100: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

NOT FOR RECORDATION

EXHIBIT 1 TO PATENT ASSIGNMENT

UNITED STATES ISSUED PATENTS

Serial No. Filing Date Title

6,633,761 Aug. 11, 2000 Enabling Seamless User Mobility in a Short-Range(09/637,742) Wireless Networking Environment

6,691,227 September 10, Location Independent Packet Routing and Secure Access

(09/657,745) 2000 in a Short-Range Wireless Networking Environment

UNITED STATES PENDING PATENT APPLICATIONS

Serial No. Filing Date Title

09/866,297 May 21, 2001 Providing Secure Network Access for short-rangewireless computing devices

(divisional of09/657,745)

October 20, 2003 Location Independent Packet Routing and Secure Access

in a Short-Range Wireless Networking Environment

(continuationof09/657,745)

09/685,715 October 10, 2000 Extension Mechanism and Technique for Enabling Low-Power End Devices To Access Remote Networks usingShort-Range Wireless Communications means

10/785,637 February 24 2004 Mechanism and Technique for Dynamically OptimizingAntenna Orientation and Transmit Power in a Meshed

(divisional of Network Environment09/685,715)

09/848,662 May 3, 2001 Method and System for Adapting Short-Range WirelessAccess Points for Participation in a CoordinatedNetworked Environment

505187 v4/HN@tsz04!.DOC

Page 101: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

NOT FOR RECORDATION

09/848,441 May 3, 2001 Location Aware Service Proxies in a Short-RangeWireless Environment

Technique for Enabling Remote Data Access and09/848,394 May 3, 2001 Manipulation from a Pervasive Device

A10/011,538 Nov. 13, 2001 Enabling Secure Communication in-a Clustered or

Distributed Architecture

10/457,573 June 11, 2003 Seamless User Mobility in a Short-Range WirelessNetworking Environment

(divisional of09/637,742)

505187 v4/HN@tsz04!.DOC

Page 102: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

.4 .

NOT FOR RECORDATION

ASSIGNMENT

For good and valuable consideration, the receipt of which is hereby acknowledged, Symantec InternationalLimited, an Irish company, having a place of business at Ballycoolin Business Park, Blanchardstown, Dublin 15,Ireland ("ASSIGNOR"), has sold, assigned, and transferred and does hereby sell, assign, and transfer to SymantecCorporation, a Delaware corporation, having a place of business at 20330 Stevens Creek Blvd., Cupertino, CA95014 ("ASSIGNEE"), for itself and its successors, transferees, and assignees, the following:

I. The entire worldwide right, title, and interest in all inventions and improvements("SUBJECT MATTER") that are disclosed in the following applications and Letters Patents ("PATENTRIGHTS"):

Country: PatentApplication Title: Filing Date:Serial No.:

US 09/866,297 Providing Secure Network Access for Short- May 21, 2001Range Wireless Computing Devices

US 10/688,576 Location Independent Packet Routing and October 20, 2003Secure Access in a Short-Range Wireless

Networking Environment

US 09/685,715 Extension Mechanism and Technique for October 10, 2000Enabling Low-Power End Devices to Access

Remote Networks Using Short-Range WirelessCommunications Means

US 10/785,637 Mechanism and Technique for Dynamically February 24, 2004Optimizing Antenna Orientation and Transmit

Power in a Meshed Network Environment

US 09/848,662 Method and System for Adapting Short-Range May 3, 2001Wireless Access Points for Participation in a

Coordinated Networked Environment

US 09/848,441 Location Aware Service Proxies in a Short- May 3, 2001Range Wireless Environment

US 09/848,394 Technique for Enabling Remote Data Access May 3, 2001and Manipulation From a Pervasive Device

US 10/011,538 Enabling Secure Communication in a Clustered November 13, 2001or Distributed Architecture

US 10/457,573 Seamless User Mobility in a Short-Range June 11, 2003Wireless Networking Environment

Country: Letters PatentNo.: Title: Issue Date:

US 6,633,761 Enabling Seamless User Mobility in a Short- October 14, 2003Range Wireless Networking Environment

US 6,691,227 Location Independent Packet Routing and February 10, 2004Secure Access in a Short-Range Wireless

Networking Environment

20423/01000/SF/5137390.1

Page 103: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

NOT FOR RECORDATION

2. The entire worldwide right, title, and interest in and to:

(a) the PATENT RIGHTS, including any right of priority; (b) any provisional, divisional, continuation,substitute, renewal, reissue, and other related applications thereto which have been or may be filed in theUnited States or elsewhere in the world; (c) any patents which may be granted on the applications set forthin (a) and (b) above; and (d) the right to sue in its own name and to recover for past infringement of any orall of any applications or patents issuing therefrom together with all rights to recover damages forinfringement of provisional rights.

ASSIGNOR agrees to do the following, when requested, and without further consideration, in order to carryout the intent of this Assignment: (I) execute all oaths, assignments, powers of attorney, applications, and otherpapers necessary or desirable to fully secure to ASSIGNEE the rights, titled and interests herein conveyed; (2)communicate to ASSIGNEE all known facts relating to the SUBJECT MATTER of the above-identified patentapplications and Letters Patents; and (3) generally do all lawful acts that ASSIGNEE shall consider desirable forsecuring, maintaining, and enforcing worldwide patent protection relating to the SUBJECT MATTER of the above-identified patent applications and Letters Patents and for vesting in ASSIGNEE the rights, titles, and interests hereinconveyed. ASSIGNOR further agrees to provide any successor, transferee, assignee, or legal representative ofASSIGNEE with the benefits and assistance provided to ASSIGNEE hereunder.

ASSIGNOR represents that ASSIGNOR has the rights, titles, and interests to convey as set forth herein, andcovenants with ASSIGNEE that the ASSIGNOR has made or will make hereafter no assignment, grant, mortgage,license, or other agreement affecting the rights, titles, and interests herein conveyed.

Dul Au d Representative of ASSIGNOR

Arthur CourvilleDirectorSymantec International LimitedBallycoolin Business ParkBlanchardstown, Dublin 15IRELAND

Duly i zed Representative of ASSIGNEE

Arthur CourvilleSenior Vice President and General CounselSymantec Corporation20330 Stevens Creek BlvdCupertino, CA 95014

Date of Signature

./'d- 2005

Date of Signature

2 - S 2005

.4 1

20423/01000/SF/5137390.1

Page 104: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

NOT FOR RECORDATION

AMENDMENT TO ASSIGNMENT

We the undersigned inventors hereby amend the Assignment of Patent

Application, executed on May 2, 2001, assigning U.S. Patent Application No. 09/848,394

to ReefEdge, Inc., to fix a typographical error as follows:

In the first "WHEREAS" clause,

"United States Letters Patent titled TECHNIQUE FOR ENABLING REMOTEDATA ACCESS AND MANIPULATION FROM A MOBILE DEVICE" should read"United States Letters Patent titled TECHNIQUE FOR ENABLING REMOTE DATA.ACCESS AND MANIPULATION FROM A PERVASIVE DEVICE".

By Sandeep Kishan Singhal, whose full postal address is 2 Leighton Street, EnglewoodCliffs, NJ 07632-1414

Sandeep Kishan Singhal20 J-Viy 2003Date

By Barry Eliot Levinson, whose full postal address is 20 '(csr ke A', NewYork, NY 10009

JDate LoDateBarry Eliot Levinson

By Darren Michael Sanders whose full postal address is 61 Avalon Gardens Drive,Nanuet, NY 10954

Darren Michael Sanders2.1 I It 603

Date

Page 105: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Page 1 of 2

S UNITED STATES PATENT AND ThADEMARK OFFICEUNITED STATES DEPARTMENT OF COMMERCEUnited Stntes Patent and Tradcm.rk OfficeAddres: COMMISSIONER FOR PATENTS

P.O. Box 1450Alexandri, Vgi u 22313-1450,ww.oupto.gv

APPLICATION NUMBER FILING OR 371 (c) DATE FIRST NAMED APPLICANT ATTORNEY DOCKET NUMBER

11/075,437 03/07/2005 Sandeep Kishan Singhal 20423-10036

34415FENWICK & WEST LLPSILICON VALLEY CENTER801 CALIFORNIA STREETMOUNTAIN VIEW, CA 94041

CONFIRMATION NO. 5116FORMALITIES LETTER

oII IIlU IU oIIo ooololol081II II l1 I III IIl'0C000000015709381"

Date Mailed: 04/11/2005

NOTICE TO FILE CORRECTED APPLICATION PAPERS

Filing Date Granted

An application number and filing date have been accorded to this application. The application is informal since itdoes not comply with the regulations for the reason(s) indicated below. Applicant is given TWO MONTHS fromthe date of this Notice within which to correct the informalities indicated below. Extensions of time may beobtained by filing a petition accompanied by the extension fee under the provisions of 37 CFR 1.136(a).

The required item(s) identified below must be timely submitted to avoid abandonment:

* Replacement drawings in compliance with 37 CFR 1.84 and 37 CFR 1.121(d) are required. The drawingssubmitted are not acceptable because:

More than one figure is present and each figure is not labeled "Fig." with a consecutiveArabic numeral (1, 2, etc.) or an Arabic numeral and capital letter in the Englishalphabet (A, B, etc.)(see 37 CFR 1.84(u)(1)). See Figure(s) 2. A brief description of theseveral views of the drawings (see 37 CFR 1.74) should be added or amended tocorrespond to the corrected numbering of the figures. See also 37 CFR 1.77(b)(7).

Applicant is cautioned that correction of the above items may cause the specification and drawings page count toexceed 100 pages. If the specification and drawings exceed 100 pages, applicant will need to submit the requiredapplication size fee.

Replies should be mailed to: Mail Stop Missing Parts

Commissioner for Patents

P.O. Box 1450

Alexandria VA 22313-1450

A copy of this notice MUST be returned with the reply.

Page 106: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Page 2 of 2

Ollice of Initial Patent Examination (703) 308-1202PART 3 - OFFICE COPY

Page 107: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

TRANSMITTAL FORM(to be used for all correspondence during pendency of

filed application)

Application Number 111075,437

Filing Date March 7, 2005

First Named Inventor Sandeep K. Singhal

Group Art Unit Number 2161

Examiner Name not yet known

Total Number of Pages in This Submission 6. Attorney Docket Number 20423-10036

ENCLOSURES (check all that apply)

O Fee Transmittal Form (in duplicate) I Issue Fee Transmittal

O Check Enclosed O Letter to Chief Draftsperson

] Return Receipt Postcard ® Formal Drawing(s): (Replacement Sheet)

® Response to Notice to File Corrected Application [ 1 ] Sheet(s) of Figure(s) [ 2 1Papers® Copy of Notice to File Corrected Application Papers O Appeal Communication to Board of Appeals and

O Declaration Interferences

O Power of Attorney O Appeal Communication to Group

O Application Data Sheet (Appeal Notice, Brief, Reply Brief)

Q Information Disclosure Statement & PTOISBIO08A O Certified Copy of Priority Document(s)

O Copies of IDS Cited References O After Allowance Communication to Group

Q Request for Corrected Filing Receipt E0 Request for Correction of Recorded Assignment Q

Q Preliminary Amendment/Response: [ i Page(s) OO After Final O

E Status Request 00 Revocation and Substitute Power of Attomey O

REMARKS:

SIGNATURE OF ATTORNEY OR AGENT

Signature:

Attorney/Reg. No.: Brian M. Hoffman, Reg. No.: 39,713 Dated: ( OS

CERTIFICATE OF MAILING .I hereby certify that this correspondence, including the enclosures identified above, is being deposited with the United States Postal Service asfirst class mail in an envelope addressed to: Mail Stop Missing Parts, Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450on the date shown below. If the Express Mail Mailing Number is filled in below, then this correspondence is being deposited with the UnitedStates Postal Service "Express Mail Post Office to Addressee" service pursuant to 37 CFR 1.10.

Signature:

Typed or Printed Name: Brian M. Hoffman Dated: I 4

Express Mail Mailing Number (optional):

24089/09282/SF/5144646.1

+!

Page 108: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

JUN 0 9 2005 "

lTHE UNITED STATES

PATENT AND TRADEMARK OFFICE

APPLICANTS:

APPLICATION NO.:

FILING DATE:

TITLE:

EXAMINER:

GROUP ART UNIT:

ATTY. DKT. NO.:

Sandeep K. Singhal et al.

11/075,437

March 7, 2005

TECHNIQUE FOR ENABLING REMOTE DATA ACCESS ANDMANIPULATION FROM A PERVASIVE DEVICE

Not yet known

2161

20423-10036

CERTIFICATE OF MAILINGI hereby certify that this correspondence is being deposited with the United States Postal Service as first class mail in anenvelope addressed to: Mail Stop Missing Parts, Commissioner For Patents, P.O. Box 1450, Alexandria, VA 22313-1450, onthe date shown below:

Dated: s By:Brian M. Hoffman, Reg. No.: 39,713

MAIL STOP MISSING PARTSCOMMISSIONER FOR PATENTSP.O. BOX 1450ALEXANDRIA, VA 22313-1450

RESPONSE TO THE NOTICE TO FILE CORRECTED APPLICATION PAPERS

SIR:

Responsive to the Notice To File Corrected Application Papers dated April 11, 2005

received in the above-identified patent application,

[ Enclosed are:

® a copy of the Notice To File Corrected Application Papers; and

20423/10036/SF/5144695.1

Page 109: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PATENT

.11 Other: Replacement Drawing in compliance with 37 CFR 1.84 and 37 CFR1.121(d).

REMARKS

Enclosed is a replacement page containing Figures 2A and 2B in compliance with 37

CFR 1.84 and 1.121(d). Applicants submit that amending the specification is unnecessary

because it already refers to Figs. 2A and 2B.

Respectfully submitted,SANDEEP K. SINGHAL ET AL.

Dated: 6 By:Brian M. Hoffman, Reg. No.: 39,713Fenwick & West LLPSilicon Valley Center801 California StreetMountain View, CA 94041Tel.: (510) 875-2484Fax.: (415) 281-1350

20423/10036/SF/5144695.1

Page 110: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Page 1 of 2

Tlp y

APPLICATION NUMBER FILING OR 371 (c) DATE

11/075,437 03/07/2005

United States Patent and Tradcmark OfficeAddrer COMMISSIONER FOR PATENTS

P.O. Box 1450Al ndri, VYuini 22313-1450www.u.pto.gov

FIRST NAMED APPLICANT ATTORNEY DOCKET NUMBER

Sandeep Kishan Singhal 20423-10036

CONFIRMATION NO. 511634415 FORMALITIES LETTERFENWICK & WEST LLP "enwick & West ililIIIHllillUiDIrIlllilllllllllllilllHSILICON VALLEY CENTER801 CALIFORNIA STREET *0000000015709381-MOUNTAIN VIEW, CA 94041 APR 13 2005

tReceivedDate Mailed: 04/11/2005

NOTICE TO FILE CORRECTED APPLICATION PAPERS

Filing Date Granted

An application number and filing date have been accorded to this application. The application is informal since itdoes not comply with the regulations for the reason(s) indicated below. Applicant is given TWO MONTHS fromthe date of this Notice within which to correct the informalities indicated below. Extensions of time may beobtained by filing a petition accompanied by the extension fee under the provisions of 37 CFR 1.136(a).

The required item(s) identified below must be timely submitted to avoid abandonment:

* Replacement drawings in compliance with 37 CFR 1.84 and 37 CFR 1.121(d) are required. The drawingssubmitted are not acceptable because:

a More than one figure is present and each figure is not labeled "Fig." with a consecutiveArabic numeral (1, 2, etc.) or an Arabic numeral and capital letter in the Englishalphabet (A, B, etc.)(see 37 CFR 1.84(u)(1)). See Figure(s) 2. A brief description of theseveral views of the drawings (see 37 CFR 1.74) should be added or amended tocorrespond to the corrected numbering of the figures. See also 37 CFR 1.77(b)(7).

Applicant is cautioned that correction of the above items may cause the specification and drawings page count toexceed 100 pages. If the specification and drawings exceed 100 pages, applicant will need to submit the requiredapplication size fee.

Replies should be mailed to: Mail Stop Missing Parts

Commissioner for Patents

P.O. Box 1450

Alexandria VA 22313-1450

A copy of this notice MUST be returned with the reply.

Page 111: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

. Page 2 of 2

Oicelof Initial Patent Examination (703) 308-1202PART 1 - ATTORNEY/APPLICANT COPY

Page 112: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Serial No.: 11/075,437 Filed: 3/7/05Title: Technique for Enabling Remote Access and

Manipulation From a Pervasive Device'Inventor(s): Sandeep K. Slnghal et al.

Atty. Docket No.: 20423-10036Figure 2 (REPLACEMENT SHEET)

EU)

U)L

a)cC.O

C

CUZ0

-J

m C

DEs

o

*1.3.C

Ea

Cc

(cc

OC:

QU

:1

00

Cc

E8KIC.)

0

Ves1~h V 7

Page 113: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

+F(OCT 0 3 2005

Aoa

20423/110036/DOCS/I 558769.1

Application Number 11/075,437

Filing Date March 7, 2005

TRANSMITTAL FORM First Named Inventor Sandeep Kishan Singhal

(to be used for all correspondence during pendency offiled application) Group Art Unit Number 2161

Examiner Name Not Yet Known

Total Number of Pages in This Submission 5 Attorney Docket Number 20423-10036

ENCLOSURES (check all that apply)O Fee Transmittal Form (in duplicate) [ Issue Fee Transmittal

O Check Enclosed [] Letter to Chief Draftsperson

M Return Receipt Postcard [ Formal Drawing(s):

O Response to Notice to File Missing Parts [ ] Sheet(s)of Figure(s) [ ]O Assignment & Recordation Cover Sheet [. Appeal Communication to Board of Appeals and] Declaration Interferences

O Power of Attorney O Appeal Communication to GroupO Application Data Sheet (Appeal Notice, Brief, Reply Brief)

® Information Disclosure Statement & PTO/SB/08A O Certified Copy of Priority Document(s)O Copies of IDS Cited References O After Allowance Communication to Group

O Request for Corrected Filing Receipt [] Request for Correction of Recorded Assignment 0] Amendment/Response: [ ]Page(s) O

O After Final O[ Status Request EQ Revocation and Substitute Power of Attorney OEREMARKS:

SIGNATURE OF ATTORNEY OR AGENTSignature:

Attomey/Reg. No.: Brian M. Hoffman, Reg. No. 39,713 Dated: 7

CERTIFICATE OF MAILINGI hereby certify that this correspondence, including the enclosures identified above, is being deposited with the United States Postal Service asfirst class mail in an envelope addressed to: Commissioner for Patents. P.O. Box 1450. Alexandria, VA 22313-1450 on the date shown below.If the Express Mail Mailing Number is filled in below, then this correspondence is being deposited with the United States Postal Service"Express Mail Post Office to Addressee" service pursuant to 37 CFR 1.10.

Signature:

Typed or Printed Name: Brian M. Hoffman Dated:

Express Mail Mailing Number (optional):

Page 114: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

APPLICAT

FILING DA

TITLE:

EXAMINEI

GROUP AR

ATTY. DK]

IN THE UNITED STATES PATENT AND TRADEMARK OFFICET: Sandeep Kishan Singhal, Barry Eliot Levinson and Darren Michael

Sanders

ION NO.: 11/075,437TE: March 7, 2005

Technique For Enabling Remote Data Access And Manipulation

From A Pervasive Device

R: Not Yet Known

T UNIT: 2161

r. NO.: 20423-10036

CERTIFICATE OF MAILINGI hereby certify that this correspondence is being deposited with the United States Postal Service as first class mail in anenvelope addressed to: Mail Stop Amendment, Commissioner For Patents, P.O. Box 1450, Alexandria, VA 22313-1450, onthe date shown below:

Dated: 2 By:Brian M. Hoffman, Reg. No.: 39,713

MAIL STOP AMENDMENTCOMMISSIONER FOR PATENTSP.O. BOX 1450ALEXANDRIA, VA 22313-1450

INFORMATION DISCLOSURE STATEMENTUnder 37 CFR §§ 1.56 and 1.97-98

SIR:

Pursuant to the provisions of 37 CFR §§ 1.56 and 1.97-98, enclosed herewith is modifiedform PTO/SB/08A listing references for consideration by the Examiner.

The filing of this Information Disclosure Statement shall not be construed as a representationregarding the completeness of the list of references, or that inclusion of a reference in this list is anadmission that it is prior art or is pertinent to this application, or that a search has been made, or asan admission that the information listed is, or may be considered to be, material to patentability, orthat no other material information exists, and shall not be construed as an admission against interestin any manner.

This Information Disclosure Statement is being filed:

® within three months of the filing date of the application, or date of entry into

the national stage of an international application, or before the mailing date ofa first office action on the merits, whichever event last occurred;

O before the mailing of a first official action after the filing of a request forcontinued examination (RCE) under 37 CFR § 1.114;

[ after three months of the filing date of this national application or the date ofentry of the national stage in an international application, or after the mailing

20423/1 0036/DOCS/1 558763.1

Page 115: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PATENT

date of the first official action on the merits, whichever event last occurred, butbefore the mailing date of the first to occur of either: (1) a final action under37 CFR §1.113; or (2) an action that otherwise closes prosecution in theapplication, and:

O attached hereto is the fee set forth under 37 CFR § 1.17(p) forsubmission of this Information Disclosure Statement under 37 CFR.§

1.97(c); OR

O Applicant certifies pursuant to 37 CFR § 1.97(e) that:

O each item of information' contained in this Information

Disclosure Statement was first cited in a communication from

a foreign patent office in a counterpart foreign application not

more than three months prior to the filing of this Statement;

OR

O no item of information contained in this InformationDisclosure Statement was cited in a communication from a

foreign patent office in a counterpart foreign application and,to the knowledge of the person signing this certification after

making reasonable inquiry, no item of information contained

in this Statement was known to any individual designated

under 37 CFR § 1.56(c) more than three months prior to the

filing of this Statement;

O on or before the payment of the issue fee but after the mailing date of the firstto occur of either: (1) a final action under 37 CFR § 1.113; (2) a notice of

allowance under 37 CFR § 1.311; or (3) an action that otherwise closes

prosecution in the application, and:

O Applicant certifies pursuant to 37 CFR. § 1.97(e) that:

O each item of information contained in this InformationDisclosure Statement was cited in a communication from a

foreign patent office in a counterpart foreign application not

more than three months prior to the filing of this Statement;

O no item of information contained in this Information

Disclosure Statement was cited in a communication from a

foreign patent office in a counterpart foreign application and,to the knowledge of the person signing this certification after

making reasonable inquiry, no item of information contained

in this Statement was known to any individual designated

220423/10036/DOCS/1558763.1

Page 116: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PATENTunder 37 CFR § 1.56(c) more than three months prior to thefiling of this Statement; AND

O attached hereto is the fee set forth under 37 CFR §1.17(p) forsubmission of this Information Disclosure Statement under 37 CFR.§1.97(d); OR

O after the payment of the issue fee. Applicant requests that the informationcontained in this Information Disclosure Statement be placed in the fileaccording to 37 CFR § 1.97(i), although the information may not beconsidered by the USPTO. *

O Enclosed is a copy of each listed reference that may be material to the examination ofthis application, and for which there may be a duty to disclose.

® This application relies, under 35 U.S.C. § 120, on the earlier filing date of priorapplication No. 09/848,394, filed on May 3, 2001, and the references cited thereinare hereby referenced, but are not required to be provided in this application under 37CFR § 1.98(d).

O This application was filed after June 30, 2003. Therefore, pursuant to the waiver ofthe requirements under 37 CFR 1.98(a)(2)(i), copies of each U.S. Patent and eachU.S. Patent Application Publication are not required to be submitted. Copies of anyforeign patent documents and non-patent literature cited herein are enclosed.

O Each item of information contained in this Information Disclosure Statement wascited in a communication from a foreign patent office in a counterpart application,and the communication was not received by any individual designated in 37 CFR §1.56(c) more than thirty days prior to the filing of this Information DisclosureStatement. 37 CFR § 1.704(d).

® Applicant submits that no fee is required for the consideration of this InformationDisclosure Statement.

Consideration of the listed references and favorable action are solicited.Respectfully submitted,SANDEEP KISHAN SINGHAL ET AL.

Dated: 20 S By:_Brian M. Hoffman, Reg. No.: 39,713Fenwick & West LLPSilicon Valley Center801 California StreetMountain View, CA 94041Tel.: (415) 875-2484Fax.: (650) 938-5200

320423/10036/DOCS/I 558763.1

Page 117: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PTO/SB/08A (10-01)Approved for use through 10/31/2002. OMB 0651-0031

CT U.S. Patent and Trademark Office: U.S. DEPARTMENT OF COMMERCE, Und e Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number.

Substitute for form 1449APTO Conmpliete if KnownApplication No. 11/075,437INFORMATION DISCLOSURE Filing Date

STATEMENT BY APPLICANT March 7, 2005First Named Inventor Sandeep K. SinghalArt Unit 2161Examiner Name Not Yet Known

Sheet 1 of 1 Attomey Docket Number 20423-10036

U.S. PATENT DOCUMENTSDocument No.

Examiner Cite Number - Kind Code' (if Date Name of Patentee orInitials' No.' known) MM-DD-YYYY Applicant of Cited Document

Al US-6,816,719 11-09-2004 Heinonen et al.

A2 US-6,765,596 07-20-2004 Lection et al.

US-

US-

US-

US-

US-

US-

US-

FOREIGN PATENT DOCUMENTSForeign Patent Document

Examiner Cite Country Code3 - Publication Date Name of Patentee or TaInitials' No.' Number' MM-DD-YYYY Applicant of Cited Document

Kind Code s (if known)

OTHER REFERENCES - NON-PATENT LITERATURE DOCUMENTSExaminer Cite Include name of the author (in CAPITAL LETTERS), title of the article (when appropriate), title of the item (book, magazine,Initials' No.' journal, serial, symposium, catalog, etc.), date, page(s). volume-issue number(s), publisher, city andlor country where T

published

Examiner DateSignature Considered

'EXAMINER: Initial if reference considered, whether or not ctation is in conformance with MPEP 609.Draw line through citation if not in conformance and not considered. Include copy of this form with next communication to applicant

'Applicant's unique citation designation number (optional). ZSee Kinds Codes of USPTO Patent Documents at www.uspto.gov or MPEP 901.04. 3Enter Office thatissued the document, by the two-letter code (WIPO Standard ST.3). 4For Japanese patent documents, the indication of the year of the reign of the Emperor mustprecede the serial number of the patent document sKind of document by the appropriate symbols as indicated on the document under WIPO Standard ST. 16 ifpossible. eApplicant is to place a check mark here if English language Translation is attached.

20423/10036/DOCS/1558757.1

Page 118: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

UNITED STATES PATENT AND TRADEMARK OFFICEC UNITED STATES DEPARTMENT OF COMMERCE

United States Patent and Trademark OfficeAddress: COMMISSIONER FOR PATENTS

P.O. Box 1450Alexandria, Virginia 22313.1450www.uspto.gov

APPLICATION NO. FILING DATE . FIRST NAMED INVENTOR ATTORNEY DOCKET NO. CONFIRMATION NO.

11/075,437 03/07/2005 Sandeep Kishan Singhal 20423-10036 5116

34415 7590 01/08/2007SYMANTEC/ FENWICK EXAMINER

SILICON VALLEY CENTER MEKY, MOUSTAFA M801 CALIFORNIA STREETMOUNTAIN VIEW, CA 94041 . ART UNIT PAPER NUMBER

2157

SHORTENED STATUTORY PERIOD OF RESPONSE - NOTIFICATION DATE DELIVERY MODE

3 MONTHS 01/08/2007 ELECTRONIC

Please find below and/or attached an Office communication concerning this application or proceeding.

If NO period for reply is specified above, the maximum statutory period will apply and will expire 6 MONTHSfrom the mailing date of this communication.

Notice of this Office communication was sent electronically on the above-indicated "Notification Date" andhas a shortened statutory period for reply of 3 MONTHS from 01/08/2007.

Notice of the Office communication was sent electronically on above-indicated "Notification Date" to thefollowing e-mail address(es):[email protected]@[email protected]

PTOL-90A (Rev. 10/06)

Page 119: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Application No. Applicant(s)

11/075,437 SINGHAL ET AL.

Office Action Summary Examiner Art Unit

Moustafa M. Meky 2157

-- The MAILING DATE of this communication appears on the cover sheet with the correspondence address -Period for Reply

A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE 3 MONTH(S) OR THIRTY (30) DAYS,WHICHEVER IS LONGER, FROM THE MAILING DATE OF THIS COMMUNICATION.

Extensions of time may be available under the provisions of 37 CFR 1.136(a). In no event, however, may a reply be timely filedafter SIX (6) MONTHS from the mailing date of this communication.

- If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).Any reply received by the Office later than three months after the mailing date of this communication, even if timely filed, may reduce anyeamed patent term adjustment. See 37 CFR 1.704(b).

Status

1)] Responsive to communication(s) filed on 07 March 2005.

2a)O This action is FINAL. 2b)0 This action is non-final.

3)O Since this application is in condition for allowance except for formal matters, prosecution as to the merits is

closed in accordance with the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.

Disposition of Claims

4)[ Claim(s) 1-24 is/are pending in the application.4a) Of the above claim(s) is/are withdrawn from consideration.

5)O Claim(s) is/are allowed.6)[ Claim(s) 1-24 is/are rejected.

7)1 Claim(s) is/are objected to.8)1 Claim(s) are subject to restriction and/or election requirement.

Application Papers

9)0 The specification is objected to by the Examiner.10)O The drawing(s) filed on is/are: a)O accepted or b)O objected to by the Examiner.

Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).

Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121(d).

11)1 The oath or declaration is objected to by the Examiner. Note the attached Office Action or form PTO-152.

Priority under 35 U.S.C. § 119

12)O Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).

a)L All b)O Some * c)O None of:1.0 Certified copies of the priority documents have been received.

2.0 Certified copies of the priority documents have been received in Application No.

3.0 Copies of the certified copies of the priority documents have been received in this National Stage

application from the International Bureau (PCT Rule 17.2(a)).

* See the attached detailed Office action for a list of the certified copies not received.

Attachment(s)

1) ® Notice of References Cited (PTO-892) 4) [ Interview Summary (PTO-413)2) O Notice of Draftsperson's Patent Drawing Review (PTO-948) Paper No(s)/Mail Date. .

3) ® Information Disclosure Statement(s) (PTO/SB/08) 5) [] Notice of Informal Patent ApplicationPaper No(syMail Date 10/3/2005. 6) O Other:

U.S. Patent and Trademark OfficePTOL-326 (Rev. 08-06) Office Action Summary Part of Paper No./Mail Date 20061229

Page 120: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Application/Control Number: 11/075,437 Page 2

Art Unit: 2157

1. Claims 1-24 are presenting for examination.

2. The nonstatutory double patenting rejection is based on a judicially created doctrine

grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or

improper timewise extension of the "right to exclude" granted by a patent and to prevent possible

harassment by multiple assignees. A nonstatutory obviousness-type double patenting rejection

is appropriate where the conflicting claims are not identical, but at least one examined

application claim is not patentably distinct from the reference claim(s) because the examined

application claim is either anticipated by, or would have been obvious over, the reference

claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re

Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225

USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982); In re

Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); and In re Thorington, 418 F.2d 528, 163

USPQ 644 (CCPA 1969).

A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may

be used to overcome an actual or provisional rejection based on a nonstatutory double patenting

ground provided the conflicting application or patent either is shown to be commonly owned

with this application, or claims an invention made as a result of activities undertaken within the

scope of a joint research agreement.

Effective January 1, 1994, a registered attorney or agent of record may sign a terminal

disclaimer. A terminal disclaimer signed by the assignee must fully comply with 37 CFR

3.73(b).

3. Claims 1-24 are rejected on the ground of nonstatutory obviousness-type double

patenting as being unpatentable over claims 1-57 of U.S. Patent No. 6,925,481. Although the

conflicting claims are not identical, they are not patentably distinct from each other because the

claims of the patent 481 substantially teaches the claimed limitations.

4. Claims 1-24 would be allowable upon receiving the terminal disclaimer.

Page 121: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Application/Control Number: 11/075,437 Page 3Art Unit: 2157

4.1. The prior art of record does not teach providing references to determined data

manipulations operations for obtained data to a pervasive device that requests the data.

5. The prior art made of record and not relied upon is considered pertinent to applicant's

disclosure.

6. Any inquiry concerning this communication or earlier communications from the

examiner should be directed to Moustafa M. Meky whose telephone number is 571-272-4005.

The examiner can normally be reached on flex.

If attempts to reach the examiner by telephone are unsuccessful, the examiner's.

supervisor, Ario Etienne can be reached on 571-272-4001. The fax phone number for the

organization where this application or proceeding is assigned is 571-273-8300.

Information regarding the status of an application may be obtained from the Patent

Application Information Retrieval (PAIR) system. Status information for published applications

may be obtained from either Private PAIR or Public PAIR. Status information for unpublished

applications is available through Private PAIR only. For more information about the PAIR

system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR

system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would

like assistance from a USPTO Customer Service Representative or access to the automated

information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.

MMM12/29/2006

{.w4 YvW 1..

Page 122: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Application/Control No. Applicant(s)/Patent UnderReexamination

11/075,437 SINGHAL ET AL.Notice of References Cited

Examiner Art Unit

Moustafa M. Meky 2157 Page 1 of 1

U.S. PATENT DOCUMENTS

Document Number Date* Country Code-Number-Kind Code MM-YYYYName Classification

* A US-2005/0113139 05-2005 Boss et al. 455/558

* B US-2002/0065110 05-2002 Enns et al. 455/566

c US-

D US-

E US-

F US-

G US-

H US-

I US-

J US-

K US-

L US-

M US-

FOREIGN PATENT DOCUMENTS

* Document Number DateCountry Code-Number-Kind Code MM-YYYY Country Name Classification

N

O

P

Q

R

S

T

NON-PATENT DOCUMENTS

* Include as applicable: Author, Title Date, Publisher, Edition or Volume, Pertinent Pages)

U

V

W

X

'A copy of this reference is not being furnished with this Office action. (See MiPEP 707.05(a).)Dates in MM-YYYY format are publication dates. Classifications may be US or foreign.

U.S. Patent and Trademark OfficePTO-892 (Rev. 01-2001) Notice of References Cited Part of Paper No. 20061229

Page 123: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PTO/S8/08A (10-01)1 Approved for use through 10131/2002. OMB 0651.0031U.S. Patent and Trademark Office: U.S. DEPARTMENT OF COMMERCE

SUnt Paperwork Reduction Act of 1995, no persons are required to respond to a collection of Information unless it contains a valid OMB control number.

Substitute fo n 1449A/PTO_ Complete If Known

INFORMATION DISCLOSURE Application No. 11/075,437STATEMENTFiling Date March 7, 2005STATEMENT BY APPLICANT First Named Inventor Sandeep K. Singhal

Art Unit gggcy 2/57Examiner Name

Sheet 1 of 1 Attorney Docket Number 20423-10036

U.S. PATENT DOCUMENTS

Document No.

Examiner Cite Number- Kind Code' (if Date Name of Patentee orInitialsa No.' known) MM-OD-YYYY Applicant of Cited Document

Al US-68,818,7t 11-09-2004 Heinonen et al.

/ A2 US-8.765.598 07-20-2004 Lection et al.

US-

US-

US-

US-

US-

Us-

us-

FOREIGN PATENT DOCUMENTSForeign Patent Document

Examiner Cite Country Code' - Publication Date Name of Patentee or T"Initials' No.' Number" MM-DD-YYYY Applicant of Cited Document

Kind Codes (if known)

OTHER REFERENCES - NON-PATENT LITERATURE DOCUMENTSExaminer Cite Include name of the author (in CAPITAL LETTERS). title of the article (when appropriate) title of the item (book, magazine.

Initials' No.' joumal. seral, symposium, catalog. etc.), date, page(s), volume-ssue number(s). publisher, city and/orcountry where Tpublished

Examiner *J i DateSignature Considered /2

'EXAMINER: Initial if reference considered, whether or not dtation is in conformance with MPEP 09.Draw line through dtatlon if not in conformance and not considered. Indclude copy of this fonm with next c0mmunication to applicant

'Applicants unique citation designation number (optional). 'See Kinds Codes of USPTO Patent Documents at www.uspto.gov or MPEP 901.04. 'Enter Office thatissued the document, by the twoetter codae (WIPO Standard ST.3). 'For Japanese patent documents, the Indication of the year of the reign of the Emperor mustprecede the serial number of the patent document sKind of document by the appropriate symbols as indicated on the document under WIPO Standard ST. 16 ifpossible. Applicant is to place a check mark here if English language Translation is attached.

20423/10036DOCS/1558757.1

Page 124: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Electronic Acknowledgement Receipt

EFS ID: 1468124

Application Number: 11075437

International Application Number:

Confirmation Number: 5116

Title of Invention: Technique for enabling remote data access and manipulation from apervasive device

First Named Inventor/Applicant Name: Sandeep Kishan Singhal

Customer Number: 34415

Filer: Brian M. Hoffman

Filer Authorized By:

Attorney Docket Number: 20423-10036

Receipt Date: 26-JAN-2007

Filing Date: 07-MAR-2005

Time Stamp: 18:56:57

Application Type: Utility

Payment information:

Submitted with Payment yes

Payment was successfully received in RAM $130

RAM confirmation Number 991

Deposit Account 192555

The Director of the USPTO is hereby authorized to charge indicated fees and credit any overpayment as follows:

Charge any Additional Fees required under 37 C.F.R. Section 1.16 and 1.17

File Listing:

Page 125: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Document Multi PagesNumber Document Description File Name File Size(Bytes) Part /.zip (if appl.)

1 Statutory disclaimers per MPEP 10036 Terminal Disclaimer. 72248 no 11490. pdf

Warnings:

Information:

Amendment - After Non-Final 10036_Amendment A subm2 onitted with Terminal_Disclai 73799 no 2

Rejection mer.pdf

Warnings:

Information:

3 Fee Worksheet (PTO-06) fee-info.pdf 8177 no 2

Warnings:

Information:

Total Files Size (in bytes): 154224

This Acknowledgement Receipt evidences receipt on the noted date by the USPTO of the indicated documents,characterized by the applicant, and including page counts, where applicable. It serves as evidence of receiptsimilar to a Post Card, as described in MPEP 503.

New Applications Under 35 U.S.C. 111If a new application is being filed and the application includes the necessary components for a filing date (see37 CFR 1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the dateshown on this Acknowledgement Receipt will establish the filing date of the application.

National Stage of an International Application under 35 U.S.C. 371If a timely submission to enter the national stage of an international application is compliant with the conditionsof 35 U.S.C. 371 and other applicable requirements a Form PCT/DO/EO/903 indicating acceptance of theapplication as a national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt,in due course.

Page 126: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

TERMINAL DISCLAIMER TO OBVIATE A DOUBLE PATENTING Docket Number (Optional)

REJECTION OVER A PRIOR PATENT 20423-10036

In re Application of: Sandeep K. Singhal et al.

Application Serial No.: 11/075,437

Filed: March 7, 2005

For: Technique for Enabling Remote Data Access and Manipulation From a Pervasive Device

The owner, Symantec Corporation*, of t it entir, interest in the instant application hereby disclaims, except

as provided below, the terminal part of the statutory term of any patent granted on the instant application, which would extend

beyond the expiration date of the full statutory term defined in 35 U.S.C. 154 to 156 and 173, as presently shortened by any

terminal disclaimer, of prior Patent No. 6,925,481. The owner hereby agrees that any patent so granted on the instant

application shall be enforceable only for and during such period that it and the prior patent are commonly owned. This

agreement runs with any patent granted on the instant application and is binding upon the grantee, its successors-or assigns.

In making the above disclaimer, the owner does not disclaim the terminal part of any patent granted on the

instant application that would extend to the expiration date of the full statutory term as defined in 35 U.S.C. 154 to 156 and 173

of the prior patent, as presently shortened by any terminal disclaimer, in the event that it later: expires for failure to pay a

maintenance fee; is held unenforceable; is found invalid by a court of competent jurisdiction; is statutorily disclaimed in whole

or terminally disclaimed under 37 CFR § 1.321; has all claims canceled by a reexamination certificate, is reissued, or is in any

manner terminated prior to the expiration of its full statutory term as presently shortened by any terminal disclaimer.

Check either box 1 or 2 below, if appropriate.

1. O For submissions on behalf of an organization (e.g. corporation, partnership, university, government agency, etc.), the

undersigned is empowered to act on behalf of the organization.

I hereby declare that all statements made herein of my own knowledge are true and that all statements made

on information and belief are believed to be true; and further, that these statements are made with the knowledge that willful

false statements and the like so made are punishable by fine or imprisonment, or both, under Section 1001, Title 18 of the

United States Code and that such willful false statements may jeopardize the validity of the application or any patent issuing

thereon.

2. ® The undersigned is an attorney of record.

January 26, 2007 /Brian Hoffman/Date Signature

Brian M. Hoffman. Reg. No. 39,713Typed or printed name

® Terminal Disclaimer fee under 37 CFR 1.20(d) included

O Fee Transmittal included

® PTO suggested wording for terminal disclaimer was

® unchanged O changed (if changed, an explanation should be supplied).

*Certificate under 37 CFR 3.73(b) is required if terminal disclaimer is signed by the assignee

[Page 1 of 1]

20423/10036/SF/5190335.1

Page 127: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

IN THE UNITED STATES

PATENT AND TRADEMARK OFFICE

APPLICANT:

APPLICATION NO.:

FILING DATE:

TITLE:

EXAMINER:

GROUP ART UNIT:

ATTY. DKT. NO.:

Sandeep Kishan Singhal, Barry Eliot Levinson and Darren MichaelSanders

11/075,437

March 7, 2005

Technique For Enabling Remote Data Access And Manipulation

From A Pervasive Device

Not Yet Known

2161

20423-10036

MAIL STOP AMENDMENTCOMMISSIONER FOR PATENTSP.O. BOX 1450ALEXANDRIA, VA 22313-1450

AMENDMENT A

Sir:

This is in response to the Office Action mailed January 8, 2007.

Claims 1-24 are presented for examination and pending in this application. In the latest

Office Action, claims 1-24 were rejected under the judicially created doctrine of obvious-type

double patenting based on commonly owned U.S. Patent No. 6,925,481 to Sandeep Singhal et al.

In response, Applicants herewith submit a terminal disclaimer to obviate the double patenting

rejection, pursuant to 37 C.F.R. § 1.321(c).

Accordingly, the application is in condition for allowance of all pending claims, and a

Notice of Allowance is respectfully requested. If the examiner believes that for any reason direct

App. No. 11/075,437

20423/10036/SF/5190334.1

Page 128: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

contact with Applicant's representative would help advance the prosecution of this case to

allowance, the examiner is encouraged to telephone the undersigned at the number given below.

Respectfully submitted,

SANDEEP K. SINGHAL ET AL.

Dated: January 26, 2007

App. No. 11/075,437

By: /Brian Hoffman/Brian M. Hoffman, Reg. No. 39,713Attorney for ApplicantFcnwick & West LLP801 California StreetMountain View, CA 94041Tel.: (415) 875-2484Fax: (415) 281-1350

-2-

20423/10036/SF/5190334.1

Page 129: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Electronic Patent Application Fee Transmittal

Application Number: 11075437

Filing Date: 07-Mar-2005

Title of Invention: Technique for enabling remote data access and manipulation from apervasive device

First Named Inventor/Applicant Name: Sandeep Kishan Singhal

Filer: Brian M. Hoffman

Attorney Docket Number: 20423-10036

Filed as Large Entity

Utility Filing Fees

Description Fee Code Quantity Amount Sub-Total inUSD($)

Basic Filing:

Pages:

Claims:

Miscellaneous-Filing:

Petition:

Patent-Appeals-and-Interference:

Post -Allowance-and -Post-Issuance:

Statutory disclaimer 1814 1 130 130

Extension-of-Time:

Page 130: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Sub-Total inDescription Fee Code Quantity Amount USD($)

Miscellaneous:

Total in USD ($) 130

Page 131: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Transamfl Hlbbyl ,9,oD7- oa2Q3D&W IM lR 811 m -fUSPOpdet

ApplaalGf hftm n ftdv (PAR)sydomn saidtww Urr {pgI

SApplication Number Application/Control No. Applicant(s)1Patent under1 Reexamination

II 111 jlII f ffl 11/075,437 SINGHAL ET AL.

Document Code - DISQ Internal Document - DO NOT MAIL

TERMINAL ® APPROVED O DISAPPROVEDDISCLAIMER

This patent is subject,Date Filed : 012607 to a Terminal

Disclaimer

Approved/Disapproved by:

jrm

U.S. Patent and Trademark Office

Page 132: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Tramacon Hd00y D2O7- 04--60dm b W f.n Iu--v-d hi, UPTO Prsnt

ApplWcdM A -m10s AUIISYS (PAR)yum n dillm atwwia-1-0v

Application No. Applicant(s)

11/075,437 SINGHAL ET AL.Notice of Allowability Examiner Art Unit

Moustafa M. Meky 2157

-- The MAILING DATE of this communication appears on the cover sheet with the correspondence address-All claims being allowable, PROSECUTION ON THE MERITS IS (OR REMAINS) CLOSED in this application. If not includedherewith (or previously mailed), a Notice of Allowance (PTOL-85) or other appropriate communication will be mailed in due course. THISNOTICE OF ALLOWABILITY IS NOT A GRANT OF PATENT RIGHTS. This application is subject to withdrawal from issue at the initiativeof the Office or upon petition by the applicant. See 37 CFR 1.313 and MPEP 1308.

1. ® This communication is responsive to the terminal disclaimer filed 1/26/2007.

2. ® The allowed claim(s) is/are 1-24.

3. O Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).

a) O All b) O Some* c) [ None of the:

1. O Certified copies of the priority documents have been received.

2. O Certified copies of the priority documents have been received in Application No.

3. O Copies of the certified copies of the priority documents have been received in this national stage application from the

International Bureau (PCT Rule 17.2(a)).

Certified copies not received:

Applicant has THREE MONTHS FROM THE "MAILING DATE" of this communication to file a reply complying with the requirementsnoted below. Failure to timely comply will result in ABANDONMENT of this application.THIS THREE-MONTH PERIOD IS NOT EXTENDABLE.

4. O A SUBSTITUTE OATH OR DECLARATION must be submitted. Note the attached EXAMINER'S AMENDMENT or NOTICE OFINFORMAL PATENT APPLICATION (PTO-152) which gives reason(s) why the oath or declaration is deficient.

5. O CORRECTED DRAWINGS ( as "replacement sheets") must be submitted.

(a) O including changes required by the Notice of Draftsperson's Patent Drawing Review ( PTO-948) attached

1) O hereto or 2) O to Paper No./Mail Date

(b) O including changes required by the attached Examiner's Amendment / Comment or in the Office action ofPaper No./Mail Date

Identifying indicia such as the application number (see 37 CFR 1.84(c)) should be written on the drawings In the front (not the back) ofeach sheet. Replacement sheet(s) should be labeled as such in the header according to 37 CFR 1.121(d).

6. O DEPOSIT OF and/or INFORMATION about the deposit of BIOLOGICAL MATERIAL must be submitted. Note theattached Examiner's comment regarding REQUIREMENT FOR THE DEPOSIT OF BIOLOGICAL MATERIAL.

Attachment(s)1. 0 Notice of References Cited (PTO-892)

2. O Notice of Draftperson's Patent Drawing Review (PTO-948)

3. O Information Disclosure Statements (PTO/SB/08),Paper No./Mail Date

4. O Examiner's Comment Regarding Requirement for Depositof Biological Material

5. O Notice of Informal Patent Application

6. 0 Interview Summary (PTO-413),Paper No./Mail Date 4/12/07.

7. 0 Examiner's Amendment/Comment

8. O Examiner's Statement of Reasons for Allowance

9. O Other Y 4A

U.S. Patent and Trademr OttcePTOL-37 (Rev. 08-06)PTOL-37 (Rev. 08-08) Notice of Ailowability Part of Paper No./MaiI Date 20070412

Part of Paper No./Mail Date 20070412Notice of Allowability

Page 133: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

£

Application/Control Number: 11/075,437 Page 2

Art Unit: 2157

EXAMINER'S AMENDMENT

An examiner's amendment to the record appears below. Should the changes and/or

additions be unacceptable to applicant, an amendment may be filed as provided by 37 CFR

1.312. To ensure consideration of such an amendment, it MUST be submitted no later than the

payment of the issue fee.

Authorization for this examiner's amendment was given in a telephone interview with

Mr. Brian Hoffman on 4/12/2007.

The application has been amended as follows:

IN THE CLAIMS

9. (Amended) A computer program product having a computer-readable medium having

computer program code encoded thereon to be executed by a processor for enabling data access

and manipulating from a pervasive device, the computer program code adapted to perform steps

comprising:

receiving a data access request from a pervasive device;

obtaining the requested data;

determining what data manipulation operations are available for the obtained data; and

providing references to the determined data manipulation operations to the pervasive

device.

Any inquiry concerning this communication or earlier communications from the

examiner should be directed to Moustafa M. Meky whose telephone number is 571-272-4005.

The examiner can normally be reached on flex.

Page 134: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Application/Control Number: 11/075,437 Page 3Art Unit: 2157

If attempts to reach the examiner by telephone are unsuccessful, the examiner's

supervisor, Ario Etienne can be reached on 571-272-4001. The fax phone number for the

organization where this application or proceeding is assigned is 571-273-8300.

Information regarding the status of an application may be obtained from the Patent

Application Information Retrieval (PAIR) system. Status information for published applications

may be obtained from either Private PAIR or Public PAIR. Status information for unpublished

applications is available through Private PAIR only. For more information about the PAIR

system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR

system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would

like assistance from a USPTO Customer Service Representative or access to the automated

information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.

MMM4/12/2007

C-.'STAFA M. WN vF,3 1 t iT"f ZG |~R

Page 135: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Application/Control No. Applicant(s)/Patent UnderReexamination

111075;437 SINGHAL ET AL.Notice of References Cited

Examiner Art Unit

Moustafa M. Meky 2157 Page 1 of 1

U.S. PATENT DOCUMENTS

Document Number DateCountry Code-Number-Kind Code MM-YYYY Name Classification

* A US-2002/0102965 08-2002 Mandahl et al. 455/412

* B US-2002/0065110 05-2002 Enns et al. 455/566

* C US-2004/0194014 09-2004 Anwar, Majid 715/500

* D US-6,640,106 10-2003 Gutowski et al. 455/456.1

E US-

F US-

G US-

H US-

I US-

J US-

K US-

L US-

M US-

FOREIGN PATENT DOCUMENTS

* Document Number DateCountry Code-Number-Kind Code MM-YYYY Country Name Classification

N

O

P

Q

R

S

T

NON-PATENT DOCUMENTS

* Include as applicable: Author, Title Date, Publisher, Edition or Volume, Pertinent Pages)

U

V

W

X

xA copy of th s reference is not eing fumlsned wth this nOffie acuon. (See MPEP § 77.05(a).)

Dates in MM-YYY format are publication dates. Classifications may be US or foreign.

u.s. Patent and Trademark OfficePTO-892 (Rev. 01-2001) Notice of References Cited Part of Paper No. 20070412

Page 136: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Application No. Applicant(s)

11/075,437 SINGHAL ET AL.Interview Summary Examiner Art Unit

Moustafa M. Meky 2157

All participants (applicant, applicant's representative, PTO personnel):

(1) Moustafa M. Meky. (3)

(2) Brian Hoffman. (4)

Date of Interview: 12 April 2007.

Type: a)® Telephonic b)O Video Conferencec)O Personal [copy given to: 1)O applicant

Exhibit shown or demonstration conducted: d)O YesIf Yes, brief description:

2)O applicant's representative]

e)l No.

Claim(s) discussed: 9.

Identification of prior art discussed: NONE.

Agreement with respect to the claims f)® was reached. g)O was not reached. h)O N/A.

Substance of Interview including description of the general nature of what was agreed to if an agreement wasreached, or any other comments: The examiner informed the applicant that the examiner failed to raise the issue of101 reiection. The applicant and the examiner agreed to amend the preamble of claim 9 to overcome a potential 35U.S.C. 101 reiectidn .

(A fuller description, if necessary, and a copy of the amendments which the examiner agreed would render the claimsallowable, if available, must be attached. Also, where no copy of the amendments that would render the claimsallowable is available, a summary thereof must be attached.)

THE FORMAL WRITTEN REPLY TO THE LAST OFFICE ACTION MUST INCLUDE THE SUBSTANCE OF THEINTERVIEW. (See MPEP Section 713.04). If a reply to the last Office action has already been filed,. APPLICANT ISGIVEN A NON-EXTENDABLE PERIOD'OF THE LONGER OF ONE MONTH OR THIRTY DAYS FROM THISINTERVIEW DATE, OR THE MAILING DATE OF THIS INTERVIEW SUMMARY FORM, WHICHEVER IS LATER, TOFILE A STATEMENT OF THE SUBSTANCE OF THE INTERVIEW. See Summary of Record of Interviewrequirements on reverse.side or on attached sheet.

Examiner Note: You must sign this form unless it is anAttachment to a signed Office action. Examiner's signature, if required

U.S. Patent and Trademark OfficePTOL-413 (Rev. 04-03)PTOL-413 (Rev. 04-03) Interview Summary Paper No. 20070412

Interview Summary Paper No. 20070412

Page 137: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Summary of Record of Interview Requirements

Manual of Patent Examining Procedure (MPEP), Section 713.04, Substance of Interview Must be Made of RecordA complete written statement as to the substance of any face-to-face, video conference, or telephone interview vrith regard to an application must be made of record in theapplication whether or not an agreement with the examiner was reached at the interview.

Title 37 Code of Federal Regulations (CFR) § 1.133 InterviewsParagraph (b)

In every instance where reconsideration is requested in view of an interview with an examiner, a complete written statement of the reasons presented at the interview aswarranting favorable action must be filed by the applicant. An interview does not remove the necessity for reply to Office action as specified in §§ 1.111, 1.135. (35 U.S.C. 132)

37 CFR §1.2 Business to be transacted in writing.All business with the Patent or Trademark Office should be transacted in writing. The personal attendance of applicants or their attorneys or agents at the Patent andTrademark Office is unnecessary. The action of the Patent and Trademark Office will be based exclusively on the written record in the Office. No attention will be paid toany alleged oral promise, stipulation, or understanding in relation to which there is disagreement or doubt.

The action of the Patent and Trademark Office cannot be based exclusively on the written record in the Office if that record is itselfincomplete through the failure to record the substance of interviews.

It is the responsibility of the applicant or the attorney or agent to make the substance of an interview of record in the application file, unlessthe examiner indicates he or she will do so. It is the examiner's responsibility to see that such a record is made and to correct material inaccuracieswhich bear directly on the question of patentability.

Examiners must complete an Interview Summary Form for each interview held where a matter of substance has been discussed during theinterview by checking the appropriate boxes and filling in the blanks. Discussions regarding only procedural matters, directed solely to restrictionrequirements for which interview recordation is otherwise provided for in Section 812.01 of the Manual of Patent Examining Procedure, or pointingout typographical errors or unreadable script in Office actions or the like, are excluded from the interview recordation procedures below. Where thesubstance of an interview is completely recorded in an Examiners Amendment, no separate Interview Summary Record is required.

The Interview Summary Form shall be given an appropriate Paper No., placed in the right hand portion of the file, and listed on the"Contents" section of the file wrapper. In a personal interview, a duplicate of the Form is given to the applicant (or attorney or agent) at theconclusion of the interview. In the case of a telephone or video-conference interview, the copy is mailed to the applicant's correspondence addresseither with or prior to the next official communication. If additional correspondence from the examiner is not likely before an allowance or if othercircumstances dictate, the Form should be mailed promptly after the interview rather than with the next official communication.

The Form provides for recordation of the following information:- Application Number (Series Code and Serial Number)- Name of applicant- Name of examiner- Date of interview- Type of interview (telephonic, video-conference, or personal)- Name of participant(s) (applicant, attorney or agent, examiner, other PTO personnel, etc.)- An indication whether or not an exhibit was shown or a demonstration conducted- An identification of the specific prior art discussed- An indication whether an agreement was reached and if so, a description of the general nature of the agreement (may be by

attachment of a copy of amendments or claims agreed as being allowable). Note: Agreement as to allowability is tentative and doesnot restrict further action by the examiner to the contrary.

- The signature of the examiner who conducted the interview (if Form is not an attachment to a signed Office action)

It is desirable that the examiner orally remind the applicant of his or her obligation to record the substance of the interview of each case. Itshould be noted, however, that the Interview Summary Form will not normally be considered a complete and proper recordation of the interviewunless it Includes, or is supplemented by the applicant or the examiner to include, all of the applicable items required below conceming thesubstance of the interview.

A complete and proper recordation of the substance of any interview should include at least the following applicable items:1) A brief description of the nature of any exhibit shown or any demonstration conducted,2) an identification of the claims discussed,3) an identification of the specific prior art discussed,4) an identification of the principal proposed amendments of a substantive nature discussed, unless these are already described on the

Interview Summary Form completed by the Examiner,5) a brief identification of the general thrust of the principal arguments presented to the examiner,

(The identification of arguments need not be lengthy or elaborate. A verbatim or highly detailed description of the arguments is notrequired. The identification of the arguments is sufficient if the general nature or thrust of the principal arguments made to theexaminer can be understood in the context of the application file. Of course, the applicant may desire to emphasize and fullydescribe those arguments which he or she feels were or might be persuasive to the examiner.)

6) a general indication of any other pertinent matters discussed, and7) if appropriate, the general results or outcome of the interview unless already described in the Interview Summary Form completed by

the examiner.

Examiners are expected to carefully review the applicant's record of the substance of an interview. If the record is not complete andaccurate, the examiner will give the.applicant an extendable one month time period to correct the record.

Examiner to Check for Accuracy

If the claims are allowable for other reasons of record, the examiner should send a letter setting forth the examiner's version of thestatement attributed to him or her. If the record is complete and accurate, the examiner should place the indication, "Interview Record OK" on thepaper recording the substance of the interview along with the date and the examiner's initials.

Page 138: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

UNITED STATES PATENT AND TRADEMARK OFFICE RNUNITED STATES DEPARTMENT OF COMMERCEUnited States Patent and Trademark OfficeAddress: COMMISSIONER FOR PATENTS

P.O. Box 1450Alexandria, Virginia 22313.1450www.uspto.gov

NOTICE OF ALLOWANCE AND FEE(S) DUE

34415 7590 04/20/2007

SYMANTEC/ FENWICKSILICON VALLEY CENTER801 CALIFORNIA STREETMOUNTAIN VIEW, CA 94041

EXAMINER

MEKY, MOUSTAFA M

ART UNIT PAPER NUMBER

2157

DATE MAILED: 04/20/2007

APPLICATION NO. FILING DATE FIRST NAMED INVENTOR ATTORNEY DOCKET NO. CONFIRMATION NO.

11/075,437 03/07/2005 Sandeep Kishan Singhal 20423-10036 5116

TITLE OF INVENTION: TECHNIQUE FOR ENABLING REMOTE DATA ACCESS AND MANIPULATION FROM A PERVASIVE DEVICE

APPLN. TYPE SMALL ENTITY ISSUE FEE DUE PUBLICATION FEE DUE PREV. PAID ISSUE FEE TOTAL FEE(S) DUE DATE DUE

nonprovisional NO $1400 $300 $0 $1700 07/20/2007

THE APPLICATION IDENTIFIED ABOVE HAS BEEN EXAMINED AND IS ALLOWED FOR ISSUANCE AS A PATENT.PROSECUTION ON THE MERITS IS CLOSED. THIS NOTICE OF ALLOWANCE IS NOT A GRANT OF PATENT RIGHTS.THIS APPLICATION IS SUBJECT TO WITHDRAWAL FROM ISSUE AT THE INITIATIVE OF THE OFFICE OR UPONPETITION BY THE APPLICANT. SEE 37 CFR 1313 AND MPEP 1308.

THE ISSUE FEE AND PUBLICATION FEE (IF REQUIRED) MUST BE PAID WITHIN THREE MONTHS FROM THEMAILING DATE OF THIS NOTICE OR THIS APPLICATION SHALL BE REGARDED AS ABANDONED. THISSTATUTORY PERIOD CANNOT BE EXTENDED. SEE 35 U.S.C. 151. THE ISSUE FEE DUE INDICATED ABOVE DOESNOT REFLECT A CREDIT FOR ANY PREVIOUSLY PAID ISSUE FEE IN THIS APPLICATION. IF AN ISSUE FEE HASPREVIOUSLY. BEEN PAID IN THIS APPLICATION (AS SHOWN ABOVE), THE RETURN OF PART B OF THIS FORMWILL BE CONSIDERED A REQUEST TO REAPPLY THE PREVIOUSLY PAID ISSUE FEE TOWARD THE ISSUE FEE NOWDUE.

HOW TO REPLY TO THIS NOTICE:

I. Review the SMALL ENTITY status shown above.

If the SMALL ENTITY is shown as YES, verify your currentSMALL ENTITY status:

A. If the status is the same, pay the TOTAL FEE(S) DUE shownabove.

B. If the status above is to be removed, check box 5b on Part B -Fee(s) Transmittal and pay the PUBLICATION FEE (if required)and twice the amount of the ISSUE FEE shown above, or

If the SMALL ENTITY is shown as NO:

A. Pay TOTAL FEE(S) DUE shown above, or

B. If applicant claimed SMALL ENTITY status before, or is nowclaiming SMALL ENTITY status, check box 5a on Part B - Fee(s)Transmittal and pay the PUBLICATION FEE (if required) and 1/2the ISSUE FEE shown above.

11. PART B - FEE(S) TRANSMITTAL, or its equivalent, must be completed and returned to the United States Patent and Trademark Office

(USPTO) with your ISSUE FEE and PUBLICATION FEE (if required). If you are charging the fee(s) to your deposit account, section "4b"of Part B - Fee(s) Transmittal should be completed and an extra copy of the form should be submitted. If.an equivalent of Part B is filed, a

request to reapply a previously paid issue fee must be clearly made, and delays in processing may occur due to the difficulty in recognizingthe paper as an equivalent of Part B.

III. All communications regarding this application must give the application number. Please direct all communications prior to issuance to

Mail Stop ISSUE FEE unless advised to the contrary.

IMPORTANT REMINDER: Utility patents issuing on applications filed on or after Dec. 12, 1980 may require payment ofmaintenance fees. It is patentee's responsibility to ensure timely payment of maintenance fees when due.

Page 1 of 3

PTOL-85 (Rev. 07/06) Approved for use through 04/30/2007.

Page 139: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PART B - FEE(S) TRANSMITTAL

Complete and send this form, together with applicable fee(s), to: Mail Mail Stop ISSUE FEECommissioner for PatentsP.O. Box 1450Alexandria, Virginia 22313-1450

or Fax (571)-273-2885

INSTRUCTIONS: This form should be used for transmitting the ISSUE FEE and PUBLICATION FEE (if required). Blocks I through 5 should be completed whereappropriate. All further correspondence including the Patent, advance orders and notification of maintenance fees will be mailed to the current correspondence address asindicated unless corrected below or directed otherwise in Block 1, by (a) specifying a new correspondence address; and/or (b) indicating a separate "FEE ADDRESS" formaintenance fee notifications.

CURRENT CORRESPONDENCE ADDRESS (Note: Use Block I for any change of address) Note: A certificate of mailing can only be used for domestic mailings of theFee(s) Transmittal. This certificate cannot be used for any other accompanyingpapers. Each additional paper, such as an assignment or formal drawing, musthave its own certificate of mailing or transmission.

34415 7590 04/20/2007Certificate of Mailing or Transmission

SYMANTEC/ FENWICK I hereby certify that this Fee(s) Transmittal is being deposited with the UnitedSILICON VALLEY CENTER States Postal Service with sufficient postage for first class mail in an envelopeaddressed to the Mail Stop ISSUE FEE address above, or being facsimile801 CALIFORNIA STREET transmitted to the USPTO (571) 273-2885, on the date indicated below.MOUNTAIN VIEW, CA 94041

(Depositor's name)

(Signature)

(Date)

APPLICATION NO. FILING DATE FIRST NAMED INVENTOR ATTORNEY DOCKET NO. CONFIRMATION NO.

11/075,437 03/07/2005 Sandecp Kishan Singhal 20423-10036 5116

TITLE OF INVENTION: TECHNIQUE FOR ENABLING REMOTE DATA ACCESS AND MANIPULATION FROM A PERVASIVE DEVICE

APPLN. TYPE SMALL ENTITY ISSUE FEE DUE PUBLICATION FEE DUE PREV. PAID ISSUE FEE TOTAL FEE(S) DUE DATE DUE

nonprovisional NO $1400 $300 $0 $1700 07/20/2007

EXAMINER ART UNIT CLASS-SUBCLASS

MEKY, MOUSTAFA M 2157 709-218000

1. Change of correspondence address or indication of "Fee Address" (37 2. For printing on the patent front page, listCFR 1.363). (1) the names of up to 3 registered patent attorneys 10- Change of correspondence address (or Change of Correspondence or agents OR, alternatively,

Address form PTO/SB/122) attached. (2) the name of a single firm (having as a member a 2O "Fee Address" indication (or "Fee Address" Indication form registered attorney or agent) and the names of up toPTO/SB/47; Rev 03-02 or more recent) attached. Use of a Customer 2 registered patent attorneys or agents. If no name is 3Number is required. listed, no name will be printed.

3. ASSIGNEE NAME AND RESIDENCE DATA TO BE PRINTED ON THE PATENT (print or type)

PLEASE NOTE: Unless an assignee is identified below, no assignee data will appear on the patent. If an assignee is identified below, the document has been filed forrecordation as set forth in 37 CFR 3.11. Completion of this form is NOT a substitute for filing an assignment.(A) NAME OF ASSIGNEE (B) RESIDENCE: (CITY and STATE OR COUNTRY)

Please check the appropriate assignee category or categories (will not be printed on the patent) : [ Individual O Corporation or other private group entity O Government

4a. The following fee(s) are submitted: 4b. Payment of Fee(s): (Please first reapply any previously paid issue fee shown above)O Issue Fee O A check is enclosed.O Publication Fee (No small entity discount permitted) O Payment by credit card. Form PTO-2038 is attached.O Advance Order - # of Copies O The Director is hereby authorized to charge the required fee(s), any deficiency, or credit any

overpayment, to Deposit Account Number (enclose an extra copy of this form).

5. Change in Entity Status (from status indicated above)O a. Applicant claims SMALL ENTITY status. See 37 CFR 1.27. O b. Applicant is no longer claiming SMALL ENTITY status. See 37 CFR 1.27(g)(2).

NOTE: The Issue Fee and Publication Fee (if required) will not be accepted from anyone other than the applicant; a registered attorney or agent; or the assignee or other party ininterest as shown by the records of the United States Patent and Trademark Office.

Authorized Signature Date

Typed or printed name Registration No.

This collection of information is required by 37 CFR 1.311. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO to process)an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete, including gathering, prepanng, andsubmitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on the amount of time you require to completethis form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and Trademark Office, U.S. Department of Commerce, P.O.Box 1450, Alexandria Virginia 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450,Alexandria, Virginia 22313-1450.Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.

OMB 0651-0033 U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCEPTOL-85 (Rev. 07/06) Approved for use through 04/30/2007.

Page 140: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

UNITED STATES PATENT AND TRADEMARK OFFICEUNITED STATES DEPARTMENT OF COMMERCEUnited States Patent and Trademark OfficeAddress: COMMISSIONER FOR PATENTS

P.O. Box 1450Alexandria, Virginia 22313-1450www.uspto.gov

APPLICATION NO. FILING DATE FIRST NAMED INVENTOR ATTORNEY DOCKET NO. CONFIRMATION NO.

11/075,437 03/07/2005 Sandeep Kishan Singhal 20423-10036 5116

34415 7590 04/20/2007

SYMANTEC/ FENWICKSILICON VALLEY CENTER801 CALIFORNIA STREETMOUNTAIN VIEW, CA 94041

EXAMINER

MEKY, MOUSTAFA M

ART UNIT PAPER NUMBER

2157

DATE MAILED: 04/20/2007

Determination of Patent Term Adjustment under 35 U.S.C. 154 (b)(application filed on or after May 29, 2000)

The Patent Term Adjustment to date is 246 day(s). If the issue fee is paid on the date that is three months after themailing date of this notice and the patent issues on the Tuesday before the date that is 28 weeks (six and a halfmonths) after the mailing date of this notice, the Patent Term Adjustment will be 246 day(s).

If a Continued Prosecution Application (CPA) was filed in the above-identified application, the filing date thatdetermines Patent Term Adjustment is the filing date of the most recent CPA.

Applicant will be able to obtain more detailed information by accessing the Patent Application Information Retrieval(PAIR) WEB site (http://pair.uspto.gov).

Any questions regarding the Patent Term Extension or Adjustment determination should be directed to the Office ofPatent Legal Administration at (571)-272-7702. Questions relating to issue and publication fee payments should bedirected to the Customer Service Center of the Office of Patent Publication at 1-(888)-786-0101 or(571)-272-4200.

Page 3 of 3PTOL-85 (Rev. 07/06) Approved for use through 04/30/2007.

Page 141: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Electronic Acknowledgement Receipt

EFS ID: 1934230

Application Number: 11075437

International Application Number:

Confirmation Number: 5116

TECHNIQUE FOR ENABLING REMOTE DATA ACCESS ANDMANIPULATION FROM A PERVASIVE DEVICE

First Named Inventor/Applicant Name: Sandeep Kishan Singhal

Customer Number: 34415

Filer: Brian M. Hoffman

Filer Authorized By:

Attorney Docket Number: 20423-10036

Receipt Date: 02-JUL-2007

Filing Date: 07-MAR-2005

Time Stamp: 19:32:18

Application Type: Utility

Payment information:

Submitted with Payment yes

Payment was successfully received in RAM $1700

RAM confirmation Number 3421

Deposit Account 192555

The Director of the USPTO is hereby authorized to charge indicated fees and credit any overpayment as follows:

Charge any Additional Fees required under 37 C.F.R. Section 1.16 and 1.17

File Listing:

Page 142: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Document Multi PagesDocument Document Description File Name File Size(Bytes) Part /.zip (if app.)Number

1 Issue Fee Payment (PTO-85B) 10036_Issue_Fee.pdf 91505 no 1

Warnings:

Information:

2 Fee Worksheet (PTO-06) fee-info.pdf 8334 no 2

Warnings:

Information:

Total Files Size (in bytes) 99839

This Acknowledgement Receipt evidences receipt on the noted date by the USPTO of the indicated documents,characterized by the applicant, and including page counts, where applicable. It serves as evidence of receiptsimilar to a Post Card, as described in MPEP 503.

New Applications Under 35 U.S.C. 111If a new application is being filed and the application includes the necessary components for a filing date (see37 CFR 1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the dateshown on this Acknowledgement Receipt will establish the filing date of the application.

National Stage of an International Application under 35 U.S.C. 371If a timely submission to enter the national stage of an international application is compliant with the conditionsof 35 U.S.C. 371 and other applicable requirements a Form PCT/DO/EO/903 indicating acceptance of theapplication as a national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt,in due course.

New International Application Filed with the USPTO as a Receiving OfficeIf a new international application is being filed and the international application includes the necessarycomponents for an international filing date (see PCT Article 11 and MPEP 1810), a Notification of theInternational Application Number and of the International Filing Date (Form PCT/RO/105) will be issued in duecourse, subject to prescriptions concerning national security, and the date shown on this AcknowledgementReceipt will establish the international filing date of the application.

Page 143: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PART B - FEE(S) TRANSMITTAL

Complete and send this form, together with applicable fee(s), to: Mail Mail Stop ISSUE FEECommissioner for PatentsP.O. Box 1450Alexandria, Virginia 22313-1450

or Fax (571)-273-2885INSTRUCTIONS: This form should be used for transmitting the ISSUE FEE and PUBLICATION FEE (if required). Blocks I through 5 should be complcted whereappropriate. All further correspondence including the Patent, advance orders and notification of maintenance fees will be mailed to the current correspondence address asindicated unless corrected below or directed otherwise in Block I, by (a) specifying a new correspondencc address; and/or (b) indicating a separate "FEE ADDRESS" formaintenance fee notifications.

CURRENT CORRESPONDENCE ADDRESS (Note: Use Block I for any change of address) Note: A certificate of mamg can only be used for domestic mailings of theFee(s) Transmittal. This certificale cannot be used for any other accompanyingpapers. Each additional paper, such as an assignment or formal drawing, musthave its own certificate of mailing or transmission.

34415 7590 04/20/2007Certificate of Mailing or Transmission

SYMANTEC/ FENWICK I hereby certify that this Feels) Transmittal is being deposited with the UnitedSILICON VALLEY CENTER States Postal Service with sufficient postage for first class mail in an envelope

addressed to the Mail Stop ISSUE-FEEaddress above, or being facsimile801 CALIFORNIA STREET transmitted to the USPTO (571) 273-2885, on the date indicated below.MOUNTAIN VIEW, CA 94041 I (Depa ior )

(Sig-oe)

(Datc)

APPLICATION NO. FILING DATE FIRST NAMED INVENTOR - ATTORNEY DOCKET NO. CONFIRMATION NO.

11/075,437 03107/2005 Sandecp Kishan Singhal 20423-10036 5116

TITLE OF INVENTION: TECHNIQUE FOR ENABLING REMOTE DATA ACCESS AND MANIPULATION FROM A PERVASIVE DEVICE

APPLN. TYPE SMALL ENTITY ISSUE FEE DUE PUBLICATION FEE DUE PREV. PAID ISSUE FEE TOTAL FEE(S) DUE DATE DUE

nonprovisional NO 51400 $300 O0 51700 07/20/2007

EXAMINER ART UNIT CLASS-SUBCLASS

MEKY, MOUSTAFA M 2157 709-218000

.Change of correspondence address or indication of "Fee Address" (37 2. For printing on the patent front page, list denwick & West LLPCFR 1.363). (1) the names of up to 3 registered patent attorneys I .

O Change of correspondence address (or Change of Correspondence or agents OR, alternatively,Address form PTO/SB/122) attached. (2) the name of a single firm (having as a member a 2O "Fee Address" indication (or "Fe Address" Indication form registered attorney or agent) and the names of up toPTO/SB/47; Rev 03-02 or more recent) attached. Use of a Customer 2 registered patent attorneys or agents. If no name is 3Number is required, listed, no name will be printed.

3. ASSIGNEE NAME AND RESIDENCE DATA TO BE PRINTED ON THE PATENT (print or type)

PLEASE NOTE: Unless an assignee is identified below, no assignee data will appear on the patent. If an assignee is identified below, the document has been filed forrecordation as set forth in 37 CFR 3.11. Completion of this form is NOT a substitute for filing an assignment.

(A) NAME OF ASSIGNEE (B) RESIDENCE: (CITY and STATE OR COUNTRY)

Symantec Corporation Cupertino, CA

Please check the appropriate assignee category or categories (will not be printed on the patent): O Individual i Corporation or other private group entity 0 Government

4a. The following fee(s) are submitted: 4b. Payment of Fee(s): (Please first reapply any previously paid issue fee shown above)

E lssue Fee O A check is enclosed.OPublication Fee (No small entity discount permitted) 0 Payment by credit card. Form PTO-2038 is attached.

D Advance Order - # of Copies @The Director is hereby authorized to charge the required fee(s), any deficiency, or credit anyoverpayment, to Deposit Account Number I 9-5 5 5 (enclose an extra copy of this form).

5. Change in Entity Status (from status indicated above)

O a. Applicant claims SMALL ENTITY status. See 37 CFR 1.27. O b. Applicant is no longer claiming SMALL ENTITY status. See 37 CFR 1.27(g)(2).

NOTE: The Issue Fee and Publication Fee (if required) will not be accepted from anyone other than the applicant; a registered attorney or agent; or the assignee or other party ininterest as shnwn hv thr rc.did f she Inilte 5tlt, Paten! and Trademark Office

Authorized Signature Date Ju11y 2. 2007

Typed or printed name Brian M. Hoffman Registration No. 39,713

This collection of information is required by 37 CFR 1.311. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO to process)an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete, including gathering,preparing, andsubmitting the completed application form to the USPTO. Time will vary depending upon the individual cane. Any comments on the amount of time you require to completethis form and/or suggestions for reducing this burden should be sent to the Chief Information Officer, U.S. Patent and Trademark Office, U.S. Department of Commerce, P.O.Box 1450, Alexandria, Virginia 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450,Alexandria, Virginia 22313-1450.Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.

OMB 0651-0033 U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCEPTOL-85 (Rev. 07/06) Approved for use through 04/302007.

Page 144: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Electronic Patent Application Fee Transmittal

Application Number: 11075437

Filing Date: 07-Mar-2005

Title of Invention: TECHNIQUE FOR ENABLING REMOTE DATA ACCESS ANDMANIPULATION FROM A PERVASIVE DEVICE

First Named Inventor/Applicant Name: Sandeep Kishan Singhal

Filer: Brian M. Hoffman

Attorney Docket Number: 20423-10036

Filed as Large Entity

Utility Filing Fees

Sub-Total inDescription Fee Code Quantity Amount USD($)

Basic Filing:

Pages:

Claims:

Miscellaneous-Filing:

Petition:

Patent-Appeals-and-Interference:

Post-Allowance-and-Post-Issuance:

Utility Appl issue fee

Publ. Fee- early, voluntary, or normal

Page 145: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Sub-Total inDescription Fee Code Quantity Amount USD($)

Extension-of-Time:

Miscellaneous:

Total in USD ($) 1700

Page 146: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

UNITED STATES PATENT AND TRADEMARK OFFICEUNITED STATES DEPARTMENT OF COMMERCEUnited States Patent and Trademark OfficeAddress: COMMISSIONER FOR PATENTS

PO Box 1450Alexandria, Virginia 22313-1450www.uspto.gov

APPLICATION NO. ISSUE DATE PATENT NO. ATTORNEY DOCKET NO. CONFIRMATION NO.

11/075,437 08/07/2007 7254621 20423-10036 5116

34415 7590 07/18/2007

SYMANTEC/ FENWICKSILICON VALLEY CENTER801 CALIFORNIA STREETMOUNTAIN VIEW, CA 94041

ISSUE NOTIFICATION

The projected patent number and issue date are specified above.

Determination of Patent Term Adjustment under 35 U.S.C. 154 (b)(application filed on or after May 29, 2000)

The Patent Term Adjustment is 246 day(s). Any patent to issue from the above-identified application willinclude an indication of the adjustment on the front page.

If a Continued Prosecution Application (CPA) was filed in the above-identified application, the filing date thatdetermines Patent Term Adjustment is the filing date of the most recent CPA.

Applicant will be able to obtain more detailed information by accessing the Patent Application InformationRetrieval (PAIR) WEB site (http://pair.uspto.gov).

Any questions regarding the Patent Term Extension or Adjustment determination should be directed to theOffice of Patent Legal Administration at (571)-272-7702. Questions relating to issue and publication feepayments should be directed to the Customer Service Center of the Office of Patent Publication at(571)-272-4200.

APPLICANT(s) (Please see PAIR WEB site http://pair.uspto.gov for additional applicants):

Sandeep Kishan Singhal, Englewood Cliffs, NJ;Barry Eliot Levinson, New York, NY;Darren Michael Sanders, Nanuet, NY;

IR103 (Rev. 11/05)

Page 147: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 1:12-cv-00638-UNA Document 3 Filed 05/22/12 Page 1 of 1 PagelD #: 189

AO 120 Rev. 08/10)

Mail Stop 8 REPORT ON THETO: Director of the U.S. Patent and Trademark Office FILING OR DETERMINATION OF AN

P.O. Box 1450 ACTION REGARDING A PATENT ORAlexandria, VA 22313-1450 TRADEMARK

In Compliance with 35 U.S.C. § 290 and/or 15 U.S.C. § 1116 you are hereby advised that a court action has been

filed in the U.S. District Court for the District of Delaware on the following

O Trademarks or [ Patents. ( O the patent action involves 35 U.S.C. § 292.):

DOCKET NO. DATE FILED U.S. DISTRICT COURT5/22/2012 for the District of Delaware

PLAINTIFF DEFENDANT

STEC IP, LLC Apple, Inc.

PATENT OR DATE OF PATENT HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1 7,032,089 4/18/2006 STEC IP, LLC

2 6,738,799 5/18/2004 STEC IP, LLC

3 5,495,607 2/27/1996 STEC IP, LLC

4 6,925,481 8/2/2005 STEC IP, LLC

5 7,254,621 8/7/2007 STEC IP, LLC

In the above-entitled case, the following patent(s)/ trademark(s) have been included:

DATE INCLUDED INCLUDED BY

O Amendment 0 Answer O Cross Bill [ Other Pleading

PATENT OR DATE OF PATENT HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1 6,963,908 11/8/2005 STEC IP, LLC

2 5,825,891 10/20/1998 STEC IP, LLC

3

4

5

In the above-entitled case, the following decision has been rendered or judgement issued:

DECISION/JUDGEMENT

CLERK (BY) DEPUTY CLERK DATE

Copy 1-Upon initiation of action, mail this copy to Director Copy 3-Upon termination of action, mail this copy to DirectorCopy 2-Upon filing document adding patent(s), mail this copy to Director Copy 4-Case file copy

Page 148: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 1:12-cv-00642-UNA Document 3 Filed 05/22/12 Page 1 of 1 PagelD #: 221

AO 120 (Rev. 08/10

Mail Stop 8 REPORT ON THEDirector of the U.S. Patent and Trademark OTice FILING OR DETERMINATION OF AN

P.O. Box 1450 ACTION REGARDING A PATENT ORAlexandria, VA 22313-1450 TRADEMARK

In Compliance with 35 U.S.C. § 290 and/or 15 U.S.C. § 1116 you are hereby advised that a court action has beenfiled in the U.S. District Court for the District of Delaware on the following

O Trademarks or j[ Patents. ( O the patent action involves 35 U.S.C. § 292.):

DOCKET NO. DATE FILED U.S. DISTRICT COURT5/2212012 for the District of Delaware

PLAINTIFF DEFENDANT

STEC IP, LLC Oracle Corporation

PATENT OR DATE OF PATENTPATENT OR DATE OF PATENT HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1 7,596,784 9/2912009 STEC IP, LLC

2 7,065,637 6/20/2006 STEC IP, LLC

3 6,738,799 5/1812004 STEC IP, LLC

4 5,944,839 8/31/1999 STEC IP, LLC

5 5,825,891 10120/1998 STEC IP, LLC

In the above-entitled case, the following patent(s)/ trademark(s) have been included:

DATE INCLUDED INCLUDED BY[ Amendment [ Answer O Cross Bill [f Other Pleading

PATENT OR DATE OF PATENTTRADEMARK NO. OR TRADEMARK HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1 5,678,042 10/14/1997 STEC IP, LLC

2 5,495,607 2/27/1996 STEC IP, LLC

3 7,254,621 8/7/2007 STEC IP. LLC

4 6,925,481 8/2/2005 STEC IP, LLC

5

in the above-entitled case, the following decision has been rendered or judgement issued:

DECISION/JUDGEMENT

CLERK (BY) DEPUTY CLERK DATE

Copy 1-Upon initiation of action, mail this copy to Director Copy 3-Upon termination of action, mail this copy to DirectorCopy 2-Upon filing document adding patent(s), mail this copy to Director Copy 4-Case file copy

Page 149: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 1:12-cv-00639-UNA Document 3 Filed 05/22/12 Page 1 of 1 PagelD #: 256

AO.120 (Rev. 08/10)

TO: Mail Stop 8 REPORT ON THEDirector of the U.S. Patent and Trademark Office FILING OR DETERMINATION OF AN

P.O. Box 1450 ACTION REGARDING A PATENT ORAlexandria, VA 22313-1450 TRADEMARK

In Compliance with 35 U.S.C. § 290 and/or 15 U.S.C. § 1116 you are hereby advised that a court action has been

filed in the U.S. District Court for the District of Delaware on the following

O Trademarks or 6 Patents. ( O the patent action involves 35 U.S.C. § 292.):

DOCKET NO. DATE FILED U.S. DISTRICT COURT5/22/2012 for the District of Delaware

PLAINTIFF DEFENDANT

STEC IP, LLC GOOGLE, INC.

PATENT OR DATE OF PATENT HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1 7,596,784 9/29/2009 STEC IP, LLC

2 7,065,637 6/20/2006 STEC IP, LLC

3 7,032,089 4/18/2006 STEC IP, LLC

4 6,738,799 5/18/2004 STEC IP, LLC

5 5,495,607 2/27/1996 STEC IP, LLC

In the above--entitled case, the following patent(s)/ trademark(s) have been included:

DATE INCLUDED INCLUDED BY

O Amendment Q Answer 1] Cross Bill ld Other PleadingPATENT OR DATE OF PATENT

HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

I 5,825,891 10/20/1998 STEC IP, LLC

2 6,925,481 8/2/2005 STEC IP, LLC

3 7,254,621 8/712007 STEC IP, LLC

4 6,963,908 11/8/2005 STEC IP, LLC

5

In the above-entitled case, the following decision has been rendered or judgement issued:

DECISION/JUDGEMENT

CLERK (BY) DEPUTY CLERK DATE

Copy I-Upon initiation of action, mail this copy to Director Copy 3-Upon termination of action, mail this copy to DirectorCopy 2-Upon filing document adding patent(s), mail this copy to Director Copy 4-Case file copy

Page 150: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 1:12-cv-00641-UNA Document 3 Filed 05/22/12 Page 1 of 2 PagelD #: 279

AO 120 Rev. 08/10

Mail Stop 8 REPORT ON THETO: Director of the U.S. Patent and Trademark Office FILING OR DETERMINATION OF AN

P.O. Box 1450 ACTION REGARDING A PATENT ORAlexandria, VA 22313-1450 TRADEMARK

In Compliance with 35 U.S.C. § 290 and/or 15 U.S.C. § 1116 you are hereby advised that a court action has been

filed in the U.S. District Court for the District of Delaware on the following

O Trademarks or I2 Patents. ( O the patent action involves 35 U.S.C. § 292.):

DOCKET NO. DATE FILED U.S. DISTRICT COURT5/22/2012 for the District of Delaware

PLAINTIFF DEFENDANT

STEC IP, LLC AMAZON.COM, INC.

PATENT OR DATE OF PATENT HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1 7,596,784 9/29/2009 AMAZON.COM, INC.

2 7,065,637 6/20/2006 AMAZON.COM, INC.

3 6,738,799 5/18/2004 AMAZON.COM, INC.

4 5,944,839 8/31/1999 AMAZON.COM, INC.

5 5,825,891 10/20/1998 AMAZON.COM, INC.

In the above-entitled case, the following patent(s)/ trademark(s) have been included:

DATE INCLUDED INCLUDED BY

O Amendment 0 Answer [ Cross Bill d Other Pleading

PATENT OR DATE OF PATENT HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1 5,495,607 2/27/1996 AMAZON.COM, INC.

2 6,925,481 8/2/2005 AMAZON.COM, INC.

3 7,254,621 8/7/2007 AMAZON.COM, INC.

4 6,631,449 10/7/2003 AMAZON.COM, INC.

5 6,918,014 7/12/2005 AMAZON.COM, INC.

In the above-entitled case, the following decision has been rendered or judgement issued:

DECISION/JUDGEMENT

CLERK (BY) DEPUTY CLERK DATE

Copy 1-Upon initiation of action, mail this copy to Director Copy 3-Upon termination of action, mail this copy to DirectorCopy 2-Upon filing document adding patent(s), mail this copy to Director Copy 4-Case file copy

Page 151: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 1:12-cv-00641-UNA Document 3 Filed 05/22/12 Page 2 of 2 PagelD #: 280

AO 120 (Rev. 08/10)

Mail Stop 8 REPORT ON THEDirector of the U.S. Patent and Trademark Office FILING OR DETERMINATION OF AN

P.O. Box 1450 ACTION REGARDING A PATENT ORAlexandria, VA 22313-1450 TRADEMARK

In Compliance with 35 U.S.C. § 290 and/or 15 U.S.C. § 1116 you are hereby advised that a court action has been

filed in the U.S. District Court for the District of Delaware on the following

O Trademarks or I] Patents. ( O the patent action involves 35 U.S.C. § 292.):

DOCKET NO. DATE FILED U.S. DISTRICT COURT5/22/2012 for the District of Delaware

PLAINTIFF DEFENDANT

STEC IP, LLC AMAZON.COM, INC.

PATENT OR DATE OF PATENTHOLDER OF PATENT OR TRADEMARK

TRADEMARK NO. OR TRADEMARK

1 6,963,908 11/8/2005 AMAZON.COM, INC.

2

3

4

5

In the above-entitled case, the following patent(s)/ trademark(s) have been included:

DATE INCLUDED INCLUDED BY

O Amendment 0 Answer O Cross Bill I[ Other PleadingPATENT OR DATE OF PATENT

HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1

2

3

4

5

In the above--entitled case, the following decision has been rendered or judgement issued:

DECISION/JUDGEMENT

CLERK (BY) DEPUTY CLERK DATE

Copy 1-Upon initiation of action, mail this copy to Director Copy 3-Upon termination of action, mail this copy to DirectorCopy 2-Upon filing document adding patent(s), mail this copy to Director Copy 4--Case file copy

Page 152: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Case 1:12-cv-00675-UNA Document 3 Filed 05/29/12 Page 1 of 1 PagelD #: 250

AO 120 (Rev. 08/10)

TMail Stop 8 REPORT ON THEDirector of the U.S. Patent and Trademark Office FILING OR DETERMINATION OF AN

P.O. Box 1450 ACTION REGARDING A PATENT ORAlexandria, VA 22313-1450 TRADEMARK

In Compliance with 35 U.S.C. § 290 and/or 15 U.S.C. § 1116 you are hereby advised that a court action has been

filed in the U.S. District Court for the District of Delaware on the following

Q Trademarks or [ Patents. ( Ol the patent action involves 35 U.S.C. § 292.):

DOCKET NO. DATE FILED U.S. DISTRICT COURT5/29/2012 for the District of Delaware

PLAINTIFF DEFENDANT

CLOUDING IP, LLC ROCKSPACE HOSTING, INC.

PATENT OR DATE OF PATENT HOLDER OF PATENT OR TRADEMARKTRADEMARK NO. OR TRADEMARK

1 7,596,786 9129/2009 CLOUDING IP, LLC

2 7,065,637 6/20/2006 CLOUDING IP, LLC

3 6,738,799 5/18/2004 CLOUDING IP, LLC

4 5,495,607 2/27/1996 CLOUDING IP, LLC

5 6,925,481 8/2/2005 CLOUDING IP, LLC

In the above--entitled case, the following patent(s)/ trademark(s) have been included:

DATE INCLUDED INCLUDED BY

O Amendment Q Answer 0] Cross Bill g Other Pleading

PATENT OR DATE OF PATENTHOLDER OF PATENT OR TRADEMARK

TRADEMARK NO. OR TRADEMARK

1 7,254,621 8/7/2007 CLOUDING IP, LLC

2 6,963,908 11/8/2005 CLOUDING IP, LLC

3 6,631,449 10/7/2003 CLOUDING IP, LLC

4 6,918,014 7/12/2005 CLOUDING IP, LLC

5

In the above--entitled case, the following decision has been rendered or judgement issued:

DECISION/JUDGEMENT

CLERK (BY) DEPUTY CLERK DATE

Copy 1-Upon initiation of action, mail this copy to Director Copy 3-Upon termination of action, mail this copy to DirectorCopy 2-Upon filing document adding patent(s), mail this copy to Director Copy 4--Case file copy

Page 153: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

PATENT APPLICATION FEE DETERMINATION RECORDEffective December 8, 2004 o .7 -

CLAIMS AS FILED - PART IIColumn 1I lunIl mn 21

TOTAL CLAIMS

FOR NUMBER FILED NUMBER EXTRA

TOTAL CHARGEABLE CLAIMS 99 minus 20= *

INDEPENDENT CLAIMS 3 minus 3 = 6-MULTIPLE DEPENDENT CLAIM PRESENT Q

* If the difference in column 1 is less than zero, enter "0' in column 2

SMALL ENTITYTYPE I'1

RATE

BASIC FEE

X$ 25=

X100=

+180=

TOTAL

CLAIMS AS AMENDED - PART II(Column 1)

FEE

150.00

(Column 9 (nColumn 3I SMALL ENTITY ORCLAIMS HIGHEST

4 REMAINING NUMBER PRESENTAFTER PREVIOUSLY EXTRA

m AMENDMENT PAID FOR

Total * Minus *

Independent • Minus *=FIRST PRESENTATION OF MULTIPLE DEPENDENT CLAIM

(Column 1) (Column 2) (Column 3)CLAIMS HIGHEST

m REMAINING NUMBER PRESENTI- AFTER PREVIOUSLY EXTRAw AMENDMENT PAID FOR

o Total * Minus * ,

l Independent * Minus . =

FIRST PRESENTATION OF MULTIPLE DEPENDENT CLAIM

(Column 1) . (Column 2 (Column 3CLAIMS HIGHEST

V REMAINING NUMBER PRESENTI AFTER. PREVIOUSLY EXTRAw _AMENDMENT : PAID FOR

p Total * Minus =

w Independent . Minus . =

FIRST PRESENTATION OF MULTIPLE DEPENDENT CLAIM

RATE

XS 25=

X100=

+180=

TOTALADDIT. FEE

RATE

X$ 25=

X100=

+180=

TOTALADDIT FEE

X$ 25=

X100=

ADDI-TIONAL

FEE

ADDI-TIONAL

FEE

ADDI-TIONAL

FEE

OTHER THANSMALL ENTITY

RATE FEE

ASIC FE 300.00

X$50=

X200=

+360=

TOTAL

OTHER THANSMALL ENTITY

ADDI-RATE TIONAL

FEE

OR X$50=

OR X200=

OR +360=

OR TOTALADDIT. FEE

RATE

OR X$50=

OR X200=

OR +360=

OR TOTALADDIT. FEE

RATE

X$50=

X200=

+1 8 0 = OR +36 0=* If the entry in column 1 s less thanthe entry incolumn 2, write in column 3.TOTAL" If the 'Highest Number Previously Paid For' IN THIS SPACE is less than 20, enter 0." ADDIT. FEE ADDIT FEE*tf the "Highest Number Previously Paid For' IN THIS SPACE is less than 3,. enter '3.'

The "Highest Number Previously Paid For' (Total or Independent) is the highest number found in the appropriate box in column.1.

TO sm - rPatent and Trademark Office. U.S. DEPARTMENT OF COMMERC

ADDI-TIONAL

FEE

ADDI-TIONALFEE

FOM P i 75 (Riev 1U/41_w

Page 154: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Table of Contents i

MicroPatent Patent Index - an enhanced INPADOC database

MPI Family Report (Family Bibliographic and Legal Status)

In the MPI Family report, all publication stages are collapsed into a single record, based on identical application data. The bibliographic information displayed in the collapsed record is taken from the latest publication.

Report Created Date: 2012-07-12

Name of Report:

Number of Families: 1

Comments:

Table of Contents

1. US7254621B2 20070807 SYMANTEC CORP US Technique for enabling remote data access and manipulation from a pervasive device .................................... 1

Page 155: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Family Bibliographic and Legal Status 1

MicroPatent Patent Index - an enhanced INPADOC database

Family1

4 records in the family, collapsed to 2 records.

US7254621B2 20070807US2005216492A1 20050929

(ENG) Technique for enabling remote data access and manipulation from a pervasive device

Assignee: SYMANTEC CORP US

Inventor(s): SINGHAL SANDEEP KISHAN US ; LEVINSON BARRY ELIOT US ; SANDERS DARREN MICHAEL US

Application No: US 7543705 A

Filing Date: 20050307

Issue/Publication Date: 20070807

Abstract: (ENG) Methods, systems, and computer program instructions for enabling users of pervasive devices to remotely access and manipulate information in ways that might otherwise be impossible or impractical because of inherent limitations of the device. The disclosed techniques enable a wide variety of data manipulation operations to be performed on behalf of the pervasive device, for a wide variety of content types. In preferred embodiments, no modifications or add-ons are required to the pervasive device.

Priority Data: US 7543705 20050307 A N; US 84839401 20010503 A 1 Y;

Related Application(s): 11/075437 20050307 20050216492 US; 09/848394 20010503 6925481 US

IPC (International Class): G06F01516; H04L02906; H04L02908

ECLA (European Class): H04L02908N27E; H04L02906; H04L02908N5; H04L02908N27

US Class: 709218; 709217

Publication Language: ENG

Filing Language: ENG

Agent(s): Fenwick & West LLP

Examiner Primary: Meky, Moustafa M.

Assignments Reported to USPTO:Reel/Frame: 28271/0971 Date Signed: 20120228 Date Recorded: 20120525 Assignee: STEC IP, LLC 2 TERRACE WAY STE. C GREENSBORO NORTH CAROLINA 27403

Assignor: SYMANTECSYMANTEC

Corres. Addr: TAREK N. FAHMI, APC 84W. SANTA CLARA ST., SUITE 550 SAN JOSE, CA 95113 Brief: ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).

Reel/Frame: 28275/0896 Date Signed: 20120524 Date Recorded: 20120525 Assignee: CLOUDING IP, LLC 2 TERRACE WAY STE. C GREENSBORO NORTH CAROLINA 27403

Assignor: STEC IP, LLCSTEC IP, LLC

Corres. Addr: TAREK N. FAHMI,APC 84 W. SANTA CLARA ST., SUITE 550 SAN JOSE, CA 95113 Brief: CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).

Page 156: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Family Bibliographic and Legal Status 2

MicroPatent Patent Index - an enhanced INPADOC database

Legal Status:Date +/- Code Description20110207 () FPAY Year of fee payment: 4;

US6925481B2 20050802US2002178211A1 20021128

(ENG) Technique for enabling remote data access and manipulation from a pervasive device

Assignee: SYMANTEC CORP US

Inventor(s): SINGHAL SANDEEP KISHAN US ; LEVINSON BARRY ELIOT US ; SANDERS DARREN MICHAEL US

Application No: US 84839401 A

Filing Date: 20010503

Issue/Publication Date: 20050802

Abstract: (ENG) Methods, systems, and computer program instructions for enabling users of pervasive devices to remotely access and manipulate information in ways that might otherwise be impossible or impractical because of inherent limitations of the device. The disclosed techniques enable a wide variety of data manipulation operations to be performed on behalf of the pervasive device, for a wide variety of content types. In preferred embodiments, no modifications or add-ons are required to the pervasive device.

Priority Data: US 84839401 20010503 A Y;

IPC (International Class): H04L02908; H04L02906

ECLA (European Class): H04L02908N27E; H04L02906; H04L02908N5; H04L02908N27

US Class: 709200; 709203; 709217; 709219

Publication Language: ENG

Filing Language: ENG

Agent(s): Doubet, Marcia L.

Examiner Primary: Meky, Moustafa M.

Assignments Reported to USPTO:Reel/Frame: 11779/0130 Date Signed: 20010503 Date Recorded: 20010503 Assignee: REEFEDGE, INC. 2 EXECUTIVE DRIVE, SUITE 600 FORT LEE NEW JERSEY 07024

Assignor: SINGHAL, SANDEEP K.; LEVINSON, BARRY E.; SANDERS, DARREN M.SINGHAL, SANDEEP K.; LEVINSON, BARRY E.; SANDERS, DARREN M.

Corres. Addr: LAW OFFICE OFMARCIA L. DOUBET MARCIA L. DOUBET 5228 WESTMINSTER LANE FUQUAY-VARINA, NC 27526

Brief: ASSIGNMENT OF ASSIGNORS INTEREST (SEEDOCUMENT FOR DETAILS).

Reel/Frame: 12471/0289 Date Signed: 20010503 Date Recorded: 20020111 Assignee: REEFEDGE, INC., A CORPORATION OF DELAWARE 2 EXECUTIVE DRIVE, SUITE 600

FORT LEE NEW JERSEY07024

Page 157: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Family Bibliographic and Legal Status 3

MicroPatent Patent Index - an enhanced INPADOC database

Assignor: SINGHAL, SANDEEP K.; LEVINSON, BARRY E.; SANDERS, DARREN M.SINGHAL, SANDEEP K.; LEVINSON, BARRY E.; SANDERS, DARREN M.

Corres. Addr: LAW OFFICE OF MARCIA L. DOUBET MARCIA L. DOUBET 5228 WESTMINSTER LANE FUQUAY-VARINA, NC 27526

Brief: CORRECTIVEASSIGNMENT TO CORRECT THE TITLE IN THE BODY OF THE ASSIGNMENT DOCUMENT ON REEL 011779 FRAME 0130.

Reel/Frame: 14378/0225 Date Signed: 20030720 Date Recorded: 20030814 Assignee: REEFEDGE, INC., A CORPORATION OF DELAWARE 2 EXECUTIVE DRIVE, SUITE 600

FORT LEE NEW JERSEY07024

Assignor: SINGHAL, SANDEEP KISHAN; LEVINSON, BARRY ELIOT; SANDERS, DARREN MICHAELSINGHAL, SANDEEP KISHAN; LEVINSON, BARRY ELIOT; SANDERS, DARREN MICHAEL

Corres. Addr: MARCIA L. DOUBET PO BOX 422859 KISSIMMEE, FL 34742-2859 Brief: AMENDMENT TO PRIOR ASSIGNMENT

Reel/Frame: 14327/0892 Date Signed: 20031215 Date Recorded: 20040212 Assignee: SILICON VALLEY BANK DBA SILICON VALLEY EAST 3003 TASMAN DRIVE SANTA

CLARA CALIFORNIA 95054

Assignor: REEFEDGE, INC.REEFEDGE, INC.

Corres. Addr: CHRISTOPHER E. KONDRACKI 2001 JEFFERSON DAVIS, HWY. SUITE 505 ARLINGTON, VA 22202

Brief: SECURITY AGREEMENT

Reel/Frame: 15698/0943 Date Signed: 20050128 Date Recorded: 20050210 Assignee: SYMANTEC CORPORATION 20330 STEVENS CREEK BLVD. CUPERTINO CALIFORNIA

95014 SYMANTECINTERNATIONAL LIMITED BALLYCOOLIN BUSINESS PARK BLANCHARDSTOWN, DUBLIN 15 IRELAND

Assignor: REEFEDGE, INC.REEFEDGE, INC.

Corres. Addr: FENWICK & WEST LLP BRIAN M. HOFFMANSILICON VALLEY CENTER 801 CALIFORNIA STREET MOUNTAIN VIEW, CA 94041

Brief: ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FORDETAILS).

Reel/Frame: 15722/0797 Date Signed: 20050215 Date Recorded: 20050216 Assignee: SYMANTEC CORPORATION 20330 STEVENS CREEK BLVD. CUPERTINO CALIFORNIA

95014

Assignor: SYMANTEC INTERNATIONAL LIMITEDSYMANTEC INTERNATIONAL LIMITED

Corres. Addr: FENWICK & WESTLLP BRIAN M. HOFFMAN, ESQ. SILICON VALLEY CENTER 801 CALIFORNIA STREET MOUNTAIN VIEW, CA 94041

Brief: ASSIGNMENT OF ASSIGNORSINTEREST (SEE DOCUMENT FOR DETAILS).

Reel/Frame: 28271/0971 Date Signed: 20120228 Date Recorded: 20120525 Assignee: STEC IP, LLC 2 TERRACE WAY STE. C GREENSBORO NORTH CAROLINA 27403

Assignor: SYMANTECSYMANTEC

Corres. Addr: TAREK N. FAHMI, APC 84W. SANTA CLARA ST., SUITE 550 SAN JOSE, CA 95113 Brief: ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).

Reel/Frame: 28275/0896 Date Signed: 20120524 Date Recorded: 20120525

Page 158: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Family Bibliographic and Legal Status 4

MicroPatent Patent Index - an enhanced INPADOC database

Assignee: CLOUDING IP, LLC 2 TERRACE WAY STE. C GREENSBORO NORTH CAROLINA 27403

Assignor: STEC IP, LLCSTEC IP, LLC

Corres. Addr: TAREK N. FAHMI,APC 84 W. SANTA CLARA ST., SUITE 550 SAN JOSE, CA 95113 Brief: CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).

Legal Status:Date +/- Code Description20010503 () AS New owner name: REEFEDGE, INC., NEW JERSEY; :

ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SINGHAL, SANDEEP K.;LEVINSON, BARRY E.;SANDERS, DARREN M.;REEL/FRAME:011779/0130; Effective date: 20010503;

20020111 () AS New owner name: REEFEDGE, INC., A CORPORATION OF DELAWARE, NEW JER; : CORRECTIVE ASSIGNMENT TO CORRECT THE TITLE IN THE BODY OF THE ASSIGNMENT DOCUMENT ON REEL 011779 FRAME 0130;ASSIGNORS:SINGHAL, SANDEEP K.;LEVINSON, BARRY E.;SANDERS, DARREN M.;REEL/FRAME:012471/0289; Effective date: 20010503;

20030814 () AS New owner name: REEFEDGE, INC., A CORPORATION OF DELAWARE, NEW JER; : AMENDMENT TO PRIOR ASSIGNMENT;ASSIGNORS:SINGHAL, SANDEEP KISHAN;LEVINSON, BARRY ELIOT;SANDERS, DARREN MICHAEL;REEL/FRAME:014378/0225;SIGNING DATES FROM 20030720 TO 20030721;

20040212 ( ) AS ASSIGNMENT New owner name: SILICON VALLEY BANK DBA SILICON VALLEY EAST 3003 T; : SECURITY AGREEMENT;ASSIGNOR:REEFEDGE, INC. /AR;REEL/FRAME:014327/0892; Effective date: 20031215;

20040212 () AS New owner name: SILICON VALLEY BANK DBA SILICON VALLEY EAST, CALIF; : SECURITY AGREEMENT;ASSIGNOR:REEFEDGE, INC.;REEL/FRAME:014327/0892; Effective date: 20031215;

20040212 () AS New owner name: SILICON VALLEY BANK DBA SILICON VALLEY EAST 3003 T; : SECURITY AGREEMENT;ASSIGNOR:REEFEDGE, INC. /AR;REEL/FRAME:014327/0892; Effective date: 20031215;

20050210 ( ) AS ASSIGNMENT New owner name: SYMANTEC CORPORATION 20330 STEVENS CREEK BLVD.CUPE; : ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:REEFEDGE, INC. /AR;REEL/FRAME:015698/0943; Effective date: 20050128;

20050210 () AS New owner name: SYMANTEC CORPORATION, CALIFORNIA; : ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:REEFEDGE, INC.;REEL/FRAME:015698/0943; Effective date: 20050128;

20050210 () AS New owner name: SYMANTEC INTERNATIONAL LIMITED, IRELAND; : ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:REEFEDGE, INC.;REEL/FRAME:015698/0943; Effective date: 20050128;

20050210 () AS New owner name: SYMANTEC CORPORATION 20330

Page 159: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

Family Bibliographic and Legal Status 5

MicroPatent Patent Index - an enhanced INPADOC database

STEVENS CREEK BLVD.CUPE; : ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:REEFEDGE, INC. /AR;REEL/FRAME:015698/0943; Effective date: 20050128;

20050216 ( ) AS ASSIGNMENT New owner name: SYMANTEC CORPORATION 20330 STEVENS CREEK BLVD.CUPE; : ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYMANTEC INTERNATIONAL LIMITED /AR;REEL/FRAME:015722/0797; Effective date: 20050215;

20050216 () AS New owner name: SYMANTEC CORPORATION, CALIFORNIA; : ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYMANTEC INTERNATIONAL LIMITED;REEL/FRAME:015722/0797; Effective date: 20050215;

20050216 () AS New owner name: SYMANTEC CORPORATION 20330 STEVENS CREEK BLVD.CUPE; : ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYMANTEC INTERNATIONAL LIMITED /AR;REEL/FRAME:015722/0797; Effective date: 20050215;

20090202 () FPAY Year of fee payment: 4;

Page 160: Sanders, Darren Michael Technique for enabling remote data …€¦ · Sanders, Darren Michael Technique for enabling remote data access and manipulation from a pervasive device US200575437A

USPTO Maintenance Report

Patent Bibliographic Data 07/12/2012 10:00 AM

Patent Number:

7254621 Application Number:

11075437

Issue Date: 08/07/2007 Filing Date: 03/07/2005

Title: TECHNIQUE FOR ENABLING REMOTE DATA ACCESS AND MANIPULATION FROM A PERV

Status: 8th year fee window opens: 08/07/2014 Entity: Large

Window Opens:

08/07/2014 Surcharge Date:

02/10/2015 Expiration: N/A

Fee Amt Due:

Window not open

Surchg Amt Due:

Window not open

Total Amt Due:

Window not open

Fee Code: 1552 MAINTENANCE FEE DUE AT 7.5 YEARS

Surcharge Fee Code:

Most recent events (up to 7):

02/07/2011 Payment of Maintenance Fee, 4th Year, Large Entity. --- End of Maintenance History ---

Address for fee purposes:

SYMANTEC/ FENWICK SILICON VALLEY CENTER 801 CALIFORNIA STREET MOUNTAIN VIEW CA 94041