`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`PO. Box 1450
`Alexandria, Virginia 2231371450
`
`15/670,585
`
`08/07/2017
`
`Katsunao TAKAHASHI
`
`20296.0109USW1
`
`1043
`
`53148
`
`759°
`
`08/02/20”
`
`HAMRE, SCHUMANN, MUELLER & LARSON RC.
`45 South Seventh Street
`Suite 2700
`
`MINNEAPOLIS, MN 55402-1683
`
`CAREY” FORRESTL
`
`ART UNIT
`2491
`
`PAPER NUMBER
`
`NOTIFICATION DATE
`
`DELIVERY MODE
`
`08/02/2019
`
`ELECTRONIC
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`Notice of the Office communication was sent electronically on above—indicated "Notification Date" to the
`
`following e—mail address(es):
`PTOMail@hsml.eom
`
`PTOL-90A (Rev. 04/07)
`
`
`
`0/7709 A0170” Summary
`
`Application No.
`15/670,585
`Examiner
`FORREST L CAREY
`
`Applicant(s)
`TAKAHASHI, Katsunao
`Art Unit
`AIA (FITF) Status
`2491
`Yes
`
`- The MAILING DA TE of this communication appears on the cover sheet wit/7 the correspondence address -
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE g MONTHS FROM THE MAILING
`DATE OF THIS COMMUNICATION.
`Extensions of time may be available under the provisions of 37 CFR 1.136(a). In no event, however, may a reply be timely filed after SIX (6) MONTHS from the mailing
`date of this communication.
`|f NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication, even if timely filed, may reduce any earned patent term
`adjustment. See 37 CFR 1.704(b).
`
`Status
`
`1). Responsive to communication(s) filed on 8/7/2017.
`[:1 A declaration(s)/affidavit(s) under 37 CFR 1.130(b) was/were filed on
`
`2a)D This action is FINAL.
`
`2b)
`
`This action is non-final.
`
`3)[:] An election was made by the applicant in response to a restriction requirement set forth during the interview on
`; the restriction requirement and election have been incorporated into this action.
`
`4)[:] Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Expat/7e Quay/e, 1935 CD. 11, 453 O.G. 213.
`
`Disposition of Claims*
`5)
`Claim(s)
`
`1—12 is/are pending in the application.
`
`5a) Of the above claim(s)
`
`is/are withdrawn from consideration.
`
`E] Claim(s)
`
`is/are allowed.
`
`Claim(s) fl is/are rejected.
`
`[:1 Claim(s) _ is/are objected to.
`
`) ) ) )
`
`6 7
`
`8
`
`
`
`are subject to restriction and/or election requirement
`[j Claim(s)
`9
`* If any claims have been determined aflowabie. you may be eligible to benefit from the Patent Prosecution Highway program at a
`
`participating intellectual property office for the corresponding application. For more information, please see
`
`http://www.uspto.gov/patents/init events/pph/index.jsp or send an inquiry to PPeredback@uspto.gov.
`
`Application Papers
`10)[:] The specification is objected to by the Examiner.
`
`11). The drawing(s) filed on 8/7/2017 is/are: a). accepted or b)D objected to by the Examiner.
`
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121 (d).
`
`Priority under 35 U.S.C. § 119
`12). Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).
`Certified copies:
`
`a). All
`
`b)D Some**
`
`C)D None of the:
`
`1.. Certified copies of the priority documents have been received.
`
`2.[:] Certified copies of the priority documents have been received in Application No.
`
`3:] Copies of the certified copies of the priority documents have been received in this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`
`** See the attached detailed Office action for a list of the certified copies not received.
`
`Attachment(s)
`
`1)
`
`Notice of References Cited (PTO-892)
`
`Information Disclosure Statement(s) (PTO/SB/08a and/or PTO/SB/08b)
`2)
`Paper No(s)/Mail Date_
`U.S. Patent and Trademark Office
`
`3) C] Interview Summary (PTO-413)
`Paper No(s)/Mail Date
`4) CI Other-
`
`PTOL-326 (Rev. 11-13)
`
`Office Action Summary
`
`Part of Paper No./Mai| Date 20190721
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 2
`
`DETAILED ACTION
`
`Notice of Pre-AIA or AIA Status
`
`The present application, filed on or after March 16, 2013, is being examined under the first
`
`inventor to file provisions of the AIA.
`
`Status of Claims
`
`Claims 1-12 are pending.
`
`Information Disclosure Statement
`
`The information disclosure statement (IDS) submitted on 8/7/2017 is in compliance with the
`
`provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the
`
`examiner.
`
`Claim Interpretation
`
`The following is a quotation of 35 U.S.C. 112(f):
`
`(f) Element in Claim for a Combination. — An element in a claim for a combination may be expressed as
`a means or step for performing a specified function without the recital of structure, material, or acts
`in support thereof, and such claim shall be construed to cover the corresponding structure, material,
`or acts described in the specification and equivalents thereof.
`
`The following is a quotation of pre-AIA 35 U.S.C. 112, sixth paragraph:
`
`An element in a claim for a combination may be expressed as a means or step for performing a
`specified function without the recital of structure, material, or acts in support thereof, and such claim
`shall be construed to cover the corresponding structure, material, or acts described in the
`specification and equivalents thereof.
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 3
`
`This application includes one or more claim limitations that do not use the word ”means,” but
`
`are nonetheless being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph,
`
`because the claim limitation(s) uses a generic placeholder that is coupled with functional language
`
`without reciting sufficient structure to perform the recited function and the generic placeholder is not
`
`preceded by a structural modifier. Such claim limitation(s) is/are: ”an obtainment unit that obtains
`
`position-dependent information” in claim 1.
`
`Because this/these claim limitation(s) is/are being interpreted under 35 U.S.C. 112(f) or pre-AIA
`
`35 U.S.C. 112, sixth paragraph, it/they is/are being interpreted to cover the corresponding structure
`
`described in the specification as performing the claimed function, and equivalents thereof.
`
`|f applicant does not intend to have this/these limitation(s) interpreted under 35 U.S.C. 112(f) or
`
`pre-AIA 35 U.S.C. 112, sixth paragraph, applicant may: (1) amend the claim limitation(s) to avoid it/them
`
`being interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph (e.g., by reciting
`
`sufficient structure to perform the claimed function); or (2) present a sufficient showing that the claim
`
`limitation(s) recite(s) sufficient structure to perform the claimed function so as to avoid it/them being
`
`interpreted under 35 U.S.C. 112(f) or pre-AIA 35 U.S.C. 112, sixth paragraph.
`
`Claim Rejections - 35 USC § 102
`
`The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis
`
`for the rejections under this section made in this Office action:
`
`A person shall be entitled to a patent unless —
`
`(a)(2) the claimed invention was described in a patent issued under section 151, or in an application
`for patent published or deemed published under section 122(b), in which the patent or application, as
`the case may be, names another inventor and was effectively filed before the effective filing date of
`the claimed invention.
`
`Claim(s) 1-2, 4, 6-10 is/are rejected under 35 U.S.C. 102(a)(2) as being anticipated by Sheller et al
`
`(PGPUB 2015/0363582) .
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 4
`
`Regarding Claim 1:
`
`Sheller teaches an electronic device (paragraph 16, system for determining confidence of user
`
`authentication includes a computing device) comprising:
`
`an obtainment unit that obtains position-dependent information, the position-dependent
`
`information being information depending on a position of the electronic device (paragraph 23, location
`
`sensor embodied as any type of sensor capable of generating data indicative of a location of the
`
`computing device);
`
`a storage in which a table is stored, the table managing the position-dependent information
`
`obtained by the obtainment unit and authentication information used by a user to log in to the
`
`electronic device while correlating the position-dependent information and the authentication
`
`information to each other (paragraph 33-34, sensor data generated by the sensors 120 is recorded for
`
`a known user; recoded sensor data may be used to train the individual classifiers; one or more
`
`classifiers is selected as individual authentication factors for generating the fused authentication
`
`template; paragraph 36, 44, Fig. 6, fused authentication template table for user n; fused
`
`authentication template is generated for the known user based on the selected sensors and/or
`
`classifiers; paragraph 36, each fused authentication template has an associated fusion function that
`
`"fuses" the multiple sensor and/or classifier data output; for example, a fused authentication
`
`template may describe the typical motion of the computing device 102 when handled by the user, the
`
`typical location of the user when performing a certain function (e.g., calling or searching the Web), or
`
`other context characteristic of the user or computing device 102; the fused authentication template(s)
`
`is stored in the fused template database 220; paragraph 16, authentication may be a current
`
`authentication or may have been performed at some time in the past (e.g., an initial authentication to
`
`the computing device 102)); and
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 5
`
`a controller that performs operating environment setting of the electronic device (paragraph
`
`30, authentication module 204 is configured to authenticate the user of the computing device 102
`
`based on the sample sensor data received from the sensor aggregation module 202 and one or more
`
`fused authentication templates stored in the fused template database 220), wherein the controller
`
`compares the position-dependent information obtained in predetermined timing by the obtainment
`
`unit with the position-dependent information corresponding to the authentication information about
`
`the user who is currently logged in to the electronic device in pieces of position-dependent information
`
`managed by the table (paragraph 26, any single piece of sensor data may be used to authenticate the
`
`user (i.e. sensor data is therefore authentication information about the user who is currently logged
`
`in), similar to a single traditional active authentication process (e.g., the entering of a password); to
`
`improve the level of confidence of authentication, multiple sensor data (e.g., from multiple sensors)
`
`are used by the computing device 102 to passively authenticate the user on a continuous, continual,
`
`and/or periodic basis (i.e. predetermined timing); motion data indicative of the current orientation of
`
`the computing device 102, location data indicative of the current location of the computing device
`
`102, and/or vicinity data indicative of the proximity of another computing device while the user is
`
`interacting with the computing device 102 may be used in combination to passively authenticate the
`
`user (any of location data, motion data, or vicinity data may be seen as position-dependent
`
`information); paragraph 37-38, computing device periodically (i.e. at regular intervals, or
`
`"predetermined timing") samples the sensors at reference sample rate; classifiers trained by prior
`
`sample data are applied to one or more sensor data depending on classifiers used; paragraph 44, Fig.
`
`6, result of each classifier is determined and fused to arrive at final fused result for user
`
`authentication using fused authentication table (therefore, at least one position-dependent
`
`information such as the sampled location data classifier is correlated to authentication information
`
`from any other classifier, such as vicinity classifier, and applied to newly sampled data to determine
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 6
`
`authentication result); such authentication may occur periodically based on sensor sample rate;
`
`therefore, table manages the comparison in pieces of position-dependent information (e.g. classifiers,
`
`samples, and authentication results), and
`
`changes the operating environment setting of the electronic device according to a comparison
`
`result (paragraph 57, if the user is determined to be authenticated, computing device determines
`
`whether the authentication confidence is less than a threshold amount; if so, a security action is
`
`performed, such as active user authentication action; security actions include locking the user from
`
`the computing device, locking an application, requiring user to actively authenticate, etc.).
`
`Regarding Claim 2:
`
`Sheller teaches the electronic device according to claim 1.
`
`In addition, Sheller teaches wherein
`
`the operating environment setting performed by the controller includes setting of a function usable by
`
`the user who is currently logged in to the electronic device (paragraph 57, if authentication confidence
`
`is less than a threshold amount, computing device performs security action such as locking an
`
`application).
`
`Regarding Claim 4:
`
`Sheller teaches the electronic device according to claim 1.
`
`In addition, Sheller teaches wherein
`
`the table manages all the pieces of position-dependent information (paragraph 29, sensor aggregation
`
`module 202 may be configured to continuously, continually, and/or periodically sample or otherwise
`
`retrieve the sensor data from the sensors 120; aggregated sensor data used to generate classifier
`
`output data; paragraph 44, classifiers used for fusion function table to determine authentication
`
`based on sensor data), which are obtained since the user logs in to the electronic device until the user
`
`logs out from the electronic device (paragraph 16, computing device 102 is configured to continuously
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 7
`
`or continually determine a level of authentication confidence of an authentication of a user of the
`
`computing device 102; authentication is initial authentication to computing device; authentication
`
`confidence determined continuously, continually, or periodically, which allows authentication system
`
`to passively and continually authenticate user; therefore, sampling of sensor data and management of
`
`data using table occurs from first authentication until termination).
`
`Regarding Claim 6:
`
`Sheller teaches the electronic device according to claim 4.
`
`In addition, Sheller teaches wherein
`
`the table further manages the obtained position-dependent information in each predetermined time
`
`period (paragraph 29, sensor aggregation module 202 may be configured to continuously, continually,
`
`and/or periodically (i.e. predetermined time period) sample or otherwise retrieve the sensor data
`
`from the sensors 120; aggregated sensor data used to generate classifier output data; paragraph 44,
`
`classifiers used for fusion function table to determine authentication based on sensor data).
`
`Regarding Claim 7:
`
`Sheller teaches the electronic device according to claim 1.
`
`In addition, Sheller teaches wherein
`
`the table manages the position-dependent information obtained at a predetermined time point
`
`(paragraph 29, sensor aggregation module 202 may be configured to continuously, continually, and/or
`
`periodically (i.e. predetermined time period) sample or otherwise retrieve the sensor data from the
`
`sensors 120; aggregated sensor data used to generate classifier output data; paragraph 44, classifiers
`
`used for fusion function table to determine authentication based on sensor data).
`
`Regarding Claim 8:
`
`Sheller teaches the electronic device according to claim 1.
`
`In addition, Sheller teaches wherein
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 8
`
`when the table manages a plurality of the pieces of position-dependent information for each
`
`user (paragraph 29, sensor aggregation module 202 includes a sensor data classifier 210 to aggregate
`
`the sensor data, or a subset thereof, and generate classifier output data based thereon; paragraph 22-
`
`23, motion and location sensors generate information on orientation (Le. a type of position-
`
`dependent information) and location of computing device (i.e. another type of position dependent
`
`information); paragraph 44, classifiers combined into fusion function represented by table),
`
`the controller determines whether all the plurality of pieces of position-dependent information
`
`obtained in the predetermined timing are matched to the position-dependent information
`
`corresponding to the authentication information about the user who is currently logged in to the
`
`electronic device in the pieces of position-dependent information managed by the table (paragraph 30,
`
`authentication module 204 is configured to authenticate the user of the computing device 102 based
`
`on the sample sensor data received from the sensor aggregation module 202 and one or more fused
`
`authentication templates stored in the fused template database 220; paragraph 40, output of each
`
`authentication factor (i.e. classifier) is determined and results are fused; paragraph 44, fusion result
`
`provides indication whether user is authenticated), and
`
`changes the operating environment setting of the electronic device according to a
`
`determination result (paragraph 57, if the user is determined to be authenticated, computing device
`
`determines whether the authentication confidence is less than a threshold amount; if so, a security
`
`action is performed, such as active user authentication action; security actions include locking the user
`
`from the computing device, locking an application, requiring user to actively authenticate, etc.).
`
`Regarding Claim 9:
`
`Sheller teaches the electronic device according to claim 1.
`
`In addition, Sheller teaches wherein
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 9
`
`when the table manages a plurality of the pieces of position-dependent information for each
`
`user (paragraph 29, sensor aggregation module 202 includes a sensor data classifier 210 to aggregate
`
`the sensor data, or a subset thereof, and generate classifier output data based thereon; paragraph 22-
`
`23, motion and location sensors generate information on orientation (Le. a type of position-
`
`dependent information) and location of computing device (i.e. another type of position dependent
`
`information); paragraph 44, classifiers combined into fusion function represented by table),
`
`the controller determines whether a ratio of match between the plurality of pieces of position-
`
`dependent information obtained in the predetermined timing and the authentication information about
`
`the user who is currently logged in to the electronic device in the pieces of position-dependent
`
`information managed by the table is greater than or equal to a predetermined value (paragraph 30,
`
`authentication module 204 is configured to authenticate the user of the computing device 102 based
`
`on the sample sensor data received from the sensor aggregation module 202 and one or more fused
`
`authentication templates stored in the fused template database 220; paragraph 40, output of each
`
`authentication factor (i.e. classifier) is determined and results are fused; paragraph 44, fusion result
`
`provides indication whether user is authenticated; paragraph 50, authentication module of computing
`
`device determines authentication confidence which provides indication of probability that given user
`
`is at the computing device, given that the system has identified the user; paragraph 57, authentication
`
`confidence compared against a threshold), and changes the operating environment setting of the
`
`electronic device according to a determination result (paragraph 57, if the user is determined to be
`
`authenticated, computing device determines whether the authentication confidence is less than a
`
`threshold amount; if so, a security action is performed, such as active user authentication action;
`
`security actions include locking the user from the computing device, locking an application, requiring
`
`user to actively authenticate, etc.).
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Regarding Claim 10:
`
`Page 10
`
`Sheller teaches the electronic device according to claim 1, wherein
`
`when the table manages a plurality of the pieces of position-dependent information for each
`
`user (paragraph 29, sensor aggregation module 202 includes a sensor data classifier 210 to aggregate
`
`the sensor data, or a subset thereof, and generate classifier output data based thereon; paragraph 22-
`
`23, motion and location sensors generate information on orientation (Le. a type of position-
`
`dependent information) and location of computing device (i.e. another type of position dependent
`
`information); paragraph 44, classifiers combined into fusion function represented by table),
`
`the controller determines whether at least a predetermined number of the plurality of pieces of
`
`position-dependent information obtained in the predetermined timing are matched to the position-
`
`dependent information corresponding to the authentication information about the user who is currently
`
`logged in to the electronic device in the pieces of position-dependent information managed by the table
`
`(paragraph 30, authentication module 204 is configured to authenticate the user of the computing
`
`device 102 based on the sample sensor data received from the sensor aggregation module 202 and
`
`one or more fused authentication templates stored in the fused template database 220; paragraph 40,
`
`output of each authentication factor (i.e. classifier) is determined and results are fused; paragraph 44,
`
`fusion result provides indication whether user is authenticated; paragraph 44, fusion function
`
`represented by truth table having multiple authentication factors (i.e. classifiers), and generating
`
`binary output (i.e. authenticated or not) using basic majority vote system), and changes the operating
`
`environment setting of the electronic device according to a determination result (paragraph 56,
`
`computing device 102 determines whether the user has been authenticated based on the fused
`
`function and multi-factor sensor data; if not, the computing device 102 may perform some type of
`
`security action, e.g. the computing device 102 may prompt the user for an active authentication (e.g.,
`
`prompt the user for a password or PIN)).
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 11
`
`Claim Rejections - 35 USC § 103
`
`The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections
`
`set forth in this Office action:
`
`A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is
`not identically disclosed as set forth in section 102, if the differences between the claimed invention
`and the prior art are such that the claimed invention as a whole would have been obvious before the
`effective filing date of the claimed invention to a person having ordinary skill in the art to which the
`claimed invention pertains. Patentability shall not be negated by the manner in which the invention
`was made.
`
`Claim 3 is/are rejected under 35 U.S.C. 103 as being unpatentable over Sheller, and further in view of
`
`Sanjeev (PGPUB 2011/0252464).
`
`Regarding Claim 3:
`
`Sheller teaches the electronic device according to claim 1.
`
`Sheller does not explicitly teach the device further comprising a display wherein the operating
`
`environment setting performed by the controller includes setting of an element displayed on the
`
`display.
`
`However, Sanjeev teaches the concept of a device comprising a display wherein an operating
`
`environment setting performed by a controller includes setting of an element displayed on the display
`
`(abstract, mobile devices provide security based on geographic location; mobile device may
`
`automatically check its current location against geographic information as to the location(s) in which
`
`it is permitted to operate; paragraph 36, warnings, such as that the device is outside its permitted
`
`area of operation and therefore not accessible by the user may be provided as visual warnings on the
`
`display and/or as audible warnings via the speaker).
`
`It would have been obvious to one or ordinary skill in the art before the effective filing date of
`
`the claimed invention to combine the displayed location warning teachings of Sanjeev with the location-
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 12
`
`based authentication and environment setting teachings of Sheller, in order to provide diagnostic
`
`information to a user that authentication failure or restrictions were in place, allowing said user to
`
`mitigate the problem by returning to a usable location or requesting a waiver or similar correction
`
`procedure.
`
`Claims 5, 11-12 is/are rejected under 35 U.S.C. 103 as being unpatentable over Sheller, and further in
`
`view of Gum (PGPUB 2010/0175116).
`
`Regarding Claim 5:
`
`Sheller teaches the electronic device according to claim 1.
`
`Sheller does not explicitly teach wherein the table manages the position-dependent information
`
`obtained on a predetermined day.
`
`However, Gum teaches wherein a table manages position-dependent information obtained on a
`
`predetermined day (abstract, usage or mobility characteristics of portable electronic device (PED) are
`
`compared with current parameters to determine whether to permit an operation; paragraph 60-62,
`
`usage profile specifies location and calendar information, including day of the week; PED compares
`
`list of APs in usage profile with current AP and measures time of day/week; comparison includes
`
`calendar information relating to when a user is typically expected to be in certain location).
`
`It would have been obvious to one or ordinary skill in the art before the effective filing date of
`
`the claimed invention to combine the calendar-based location determination teachings of Gum with the
`
`location-based authentication and environment setting teachings of Sheller, in order to improve the
`
`accuracy of a user’s location profile by accounting for location changes based on a predetermined
`
`schedule, allowing the system to account for predictable deviations from typical behavior, improve
`
`authentication success, and avoid false negative determinations.
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 13
`
`Regarding Claim 11:
`
`Sheller teaches the electronic device according to claim 8.
`
`Sheller does not explicitly teach wherein, in addition to the determination result, the controller
`
`further determines whether the plurality of pieces of position-dependent information obtained in the
`
`predetermined timing include the position-dependent information about a connectable access point,
`
`and changes the operating environment setting of the electronic device according to determination
`
`results.
`
`However, Gum teaches the concept wherein, in addition to a determination result, a controller
`
`further determines whether a plurality of pieces of position-dependent information obtained in a
`
`predetermined timing include position-dependent information about a connectable access point, and
`
`changes an operating environment setting of an electronic device according to determination results
`
`(paragraph 47, Table 1, positioning technique includes identifying IP address of local access point (AP);
`
`paragraph 62, portable electronic device (PED) compares list of APs in usage profile with current AP to
`
`which PED is connected to or within range of; paragraph 68, after the user is logged on, the PED
`
`determines its position; the position of the PED can be determined in different ways, e.g. a confidence
`
`level that the PED is located within a given geographic range can be determined, a GPS or SPS
`
`estimate can be determined, a list of available access points or base stations can be used to
`
`approximate a position of the PED, etc.; the PED compares the determined location of the PED with
`
`each user-defined mobility characteristic; if the mobility characteristic includes a non-location
`
`attribute such as time of day, this attribute may also be measured by the PED and used in the
`
`comparison; the PED determines whether the comparison results in a match; if the comparison is
`
`determined to have resulted in a match, the context associated with the matching mobility
`
`characteristic is launched at the PED).
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 14
`
`It would have been obvious to one or ordinary skill in the art before the effective filing date of
`
`the claimed invention to combine the access point identification teachings of Gum with the location-
`
`based authentication and environment setting teachings of Sheller, in order to utilize a common means
`
`of positioning devices based on typically fixed-position networking equipment to allow devices which do
`
`not possess other means of position determination (e.g. GPS) to locate themselves in an environment,
`
`or to save processing time and efficiency which would otherwise be wasted on a precise geographical
`
`determination, thereby allowing a wider range of devices to rely on location-aware authentication
`
`methods and to improve user convenience by automatically configuring a device context in a preset
`
`location.
`
`Regarding Claim 12:
`
`Sheller teaches the electronic device according to claim 1.
`
`Sheller does not explicitly teach wherein the position-dependent information is identification
`
`information about an access point having a predetermined radio communication system.
`
`However, Gum teaches the concept wherein position-dependent information is identification
`
`information about an access point having a predetermined radio communication system (paragraph 47,
`
`Table 1, positioning technique includes identifying IP address of local access point (AP); paragraph 62,
`
`portable electronic device (PED) compares list of APs in usage profile with current AP to which PED is
`
`connected to or within range of).
`
`It would have been obvious to one or ordinary skill in the art before the effective filing date of
`
`the claimed invention to combine the access point identification teachings of Gum with the location-
`
`based authentication and environment setting teachings of Sheller, in order to utilize a common means
`
`of positioning devices based on typically fixed-position networking equipment to allow devices which do
`
`not possess other means of position determination (e.g. GPS) to locate themselves in an environment,
`
`
`
`Application/Control Number: 15/670,585
`Art Unit: 2491
`
`Page 15
`
`or to save processing time and efficiency which would otherwise be wasted on a precise geographical
`
`determination, thereby allowing a wider range of devices to rely on location-aware authentication
`
`methods.
`
`Conclusion
`
`Any inquiry concerning this communication or earlier communications from the examiner
`
`should be directed to FORREST L CAREY whose telephone number is (571)270-7814. The examiner can
`
`normally be reached on 9:00AM-5:30PM M-F.
`
`Examiner interviews are available via telephone, in-person, and video conferencing using a
`
`USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use
`
`the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
`
`If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor,
`
`Ashok Patel can be reached on 5712723972. The fax phone number for the organization where this
`
`application or proceeding is assigned is 571-273-8300.
`
`Information regarding the status of an application may be obtained from the Patent Application
`
`Information Retrieval (PAIR) system. Status information for published applications may be obtained
`
`from either Private PAIR or Public PAIR. Status information for unpublished applications is available
`
`through Private PAIR only. For more information about the PAIR system, see http://pair-
`
`direct.uspto.gov. Should you have questions on access to the Private PAIR sys