DETAILED ACTION
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Response to Amendment
The amendments filed on February 11, 2026 have been entered.
Claims 1, 23-24, and 30-31 have been amended.
Claims 34-35 have been added.
Applicant’s amendment and response to the claims are sufficient to overcome the 35 USC § 112 (b), and the claim objection set forth in the previous office action. The examiner has withdrawn the rejection/objection.
Response to Arguments
Applicant's arguments filed on February 11, 2026 have been fully considered, but they are not all persuasive.
Applicant’s Argument 1 (Page 8 of Applicant Arguments/Remarks):
Applicant argues that “Applicant respectfully disagrees with the rejections of independent Claims 1, 23, and 24. For example, in the Office Action, the Examiner alleges that Thul discloses that its camera is configured to detect an unauthorized attempt into an access opening of a fixture. However, Thul, simply discloses that the lock to the door is unlocked and that the camera monitors the cabinet. In fact, in citing to paragraph 57 of Thul, Applicant notes that this alleged "detection" is in relation to detecting the status of the door lock, not the camera, i.e., the camera is not detecting any unauthorized access attempt. As such, the camera is not detecting an unauthorized access attempt that in turn provides a signal indicative of this attempt to a monitoring device.”
Examiner’s Response:
The Examiner respectfully disagrees. Thul explicitly discloses in at least Parag. [0052] that the security devices (e.g., camera) may be configured to provide access monitoring and control at the cabinet level … by mounting a dedicated camera (audiovisual sensor) on each cabinet, access may be remotely monitored and/or controlled on a per cabinet basis (as opposed to using a camera and to secure an entire room). In addition, Thul discloses in at least Parag. [0010] that a software application running on a server which may be local to or remote from the monitored cabinet. The application may also be configured to interact with the security devices (e.g., camera) to thereby remotely control access to the cabinet. In this way, the system may deter or even prevent unauthorized intrusion and the attendant cyber security risks. See also See Parag. [0053].
Therefore, it is reasonable to interpret the teaching of Thul to be equivalent to the camera is detecting unauthorized access attempt.
Applicant’s Arguments 2-4 (Pages 8-9 of Applicant Arguments/Remarks) are moot in view of the new ground(s) of rejection.
Claim Objections
Claim 23 is objected to because of the following informality:
In claim 23, line 9, “receive a signal for arming or disarming the at the access control
point” should read “receive a signal for arming or disarming
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459 (1966), that are applied for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows:
1. Determining the scope and contents of the prior art.
2. Ascertaining the differences between the prior art and the claims at issue.
3. Resolving the level of ordinary skill in the pertinent art.
4. Considering objective evidence present in the application indicating obviousness or nonobviousness.
Claims 1-2, 4-10, 15-17, 24, 26-27, 30-31, and 33-35 are rejected under 35 U.S.C. 103 as being unpatentable over Thul (Pub. No. US 2017/0111451); in view of Eterovic Alliende et al. (Pub. No. US 2021/0320948), hereinafter Eterovic.
Claim 1. Thul discloses a data center monitoring system for detecting unauthorized access to a fixture in a data center, wherein the fixture defines an enclosure having a top edge, a bottom edge, and an access opening defined therebetween (See Fig. 12; schematic layout diagram of a data center including security devices configured to monitor and control access at the cabinet level. See Parag. [0008]; the cabinet architecture includes an extended chassis which houses servers and networking equipment in a traditional server rack mounting configuration, as well as a network enabled PDU. One or both of a front cabinet door and a back cabinet door includes a lock, camera, biometric device, or the like. The security devices interface with the PDU to allow remote monitoring and/or control of physical access to the network devices housed within the cabinet interior. See Parag. [0052] and Fig. 13; cabinet system 1300 includes a front door 1302 having a door lock 1306 and an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. The aforementioned security devices may be configured to provide access monitoring and control at the cabinet level), the data center monitoring system comprising:
a sensor configured to be located at the top edge of the fixture (See Parag. [0052] and Fig. 13; an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. The aforementioned security devices may be configured to provide access monitoring and control at the cabinet level (as opposed to at the zone level). Parag. [0053] that the camera may comprise a motion surveillance device), wherein the sensor is configured to transmit a plurality of signals towards the bottom edge of the fixture for detecting an unauthorized access attempt into the access opening of the fixture (See Parag [0052]; audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis (i.e., the camera captures the bottom edge); security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera, access may be remotely monitored and/or controlled on a per cabinet basis (as opposed to using a camera to secure an entire room); See Parag. [0057]; detecting a change in status of the door lock… unauthorized user engages the door lock in an attempt to gain access to the interior of the cabinet); and
at least one monitoring device configured to communicate with the sensor, wherein the at least one monitoring device is configured to receive a signal from the sensor indicative of the unauthorized access attempt to the fixture (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet... The application may also be configured to interact with the security devices to thereby remotely control access to the cabinet. In this way, the system may deter or even prevent unauthorized intrusion and the attendant cyber security risks. See Parag. [0051]; the security devices may be wireless or wired. See Parag. [0052]; security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera and/or lock on each cabinet, access may be remotely monitored and/or controlled on a per cabinet basis).
Thul further discloses the cabinet architecture includes an extended chassis which houses servers and networking equipment in a traditional server rack mounting configuration, as well as a network enabled PDU. One or both of a front cabinet door and a back cabinet door includes a lock, camera, biometric device, or the like. The security devices interface with the PDU to allow remote monitoring and/or control of physical access to the network devices housed within the cabinet interior, but Thul doesn’t explicitly disclose wherein the fixture does not have a door covering the access opening; an array of sensors; the transmitted signals are optical signals; and an interface associated with the fixture, the interface configured to receive a signal for arming or disarming the array of sensors, the array of sensors configured to detect an unauthorized access attempt to the fixture when armed and to allow an authorized access attempt to the fixture when disarmed.
However, Eterovic discloses wherein the fixture does not have a door covering the access opening (See Parag. [0028]; Referring to FIG. 1A, the server rack 100 may include one or more server computers, such as server computer 110, server computer 120, and server computer 130. The server computers 110, 120, 130 may be arranged inside an enclosure, which may be the server rack 100 itself as shown, or may be a separate structure. The enclosure may include a frame 102, such as a shelf structure for supporting the server computers inside. Referring to FIG. 1B, the enclosure may further include one or more doors 104 (e.g., mesh screen) that allow access to the server computers, and one or more locks 106 to secure the doors… Examiner’s note: the server rack in FIG 1A is reasonably interpreted by the examiner as not having a door);
an array of sensors; the transmitted signals are optical signals (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed); and
an interface associated with the fixture, the interface configured to receive a signal for arming or disarming the array of sensors, the array of sensors configured to detect an unauthorized access attempt to the fixture when armed and to allow an authorized access attempt to the fixture when disarmed (See Parag. [0046-0049]; the rack processors 210 may be further configured to determine the security status of the server rack 100 based on maintenance information. In this regard, the rack processors 210 may be configured to receive the maintenance information. For example, the maintenance information may be received from a maintenance ticketing system. The maintenance information may include maintenance requests, scheduled times for maintenance, authorized personnel to perform the maintenance, identity of the server computer to be serviced within the server rack, etc. As an example, the rack processors 210 may receive a maintenance request specifying that a server within server rack 100 is to be serviced at a scheduled time… The rack processors 210 may be configured to use the maintenance information to determine whether an entry is authorized or unauthorized. For instance, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, but there is no scheduled maintenance at the time, the rack processors 210 may determine that an unauthorized entry has been made. Conversely, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, and that there is scheduled maintenance at the time, the rack processors 210 may determine that the entry is authorized… The rack processors 210 may be configured to generate notifications or alerts based on the security statuses. In this regard, the rack signal analyzer 214 may also include instructions on whether notifications or alerts, if any, is to be generated. For example, a notification or alert may include the security status, such as a high risk level, and/or may include the underlying event corresponding to the security status, such as unauthorized entry).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, wherein the fixture does not have a door covering the access opening, and an interface associated with the fixture, the interface configured to receive a signal for arming or disarming the array of sensors, the array of sensors configured to detect an unauthorized access attempt to the fixture when armed and to allow an authorized access attempt to the fixture when disarmed, as taught by Eterovic. This would be convenient to detect, based on the sensor signals, an unauthorized entry to the server rack (Eterovic, Parag. [0005]).
Claim 2. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein the fixture is a server rack or server cabinet (See Parag. [0050]; data center 1200 including a first room or zone 1202, a second zone 1204, and a third zone 1206. See Parag. [0051]; one or more zones each include one or more cabinet arrays 1214, with each array comprising any desired number of server cabinets 1216).
Claim 4. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein the array of sensors or the at least one monitoring device is configured to communicate a notification message to one or more remote devices (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet. The application receives and processes data from the one or more peripheral security devices associated with the monitored cabinet, and my provide real time status information, alerts, summary information, remote and/or local storage of logged events, to users on a desk top, mobile (e.g., tablet), or hand held device. The application may also be configured to interact with the security devices to thereby remotely control access to the cabinet).
Claim 5. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein the sensor is configured to wirelessly communicate with the at least one monitoring device (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet... See Parag. [0051]; the security devices may be wireless or wired. See Parag. [0052]; security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera and/or lock on each cabinet, access may be remotely monitored and/or controlled on a per cabinet basis).
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 6. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein the sensor is electrically connected to the at least one monitoring device via one or more cables (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet... See Parag. [0051]; the security devices may be wireless or wired. See Parag. [0052]; security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera and/or lock on each cabinet, access may be remotely monitored and/or controlled on a per cabinet basis).
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 7. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein the at least one monitoring device is a controller (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet. The application receives and processes data from the one or more peripheral security devices associated with the monitored cabinet, and my provide real time status information, alerts, summary information, remote and/or local storage of logged events, to users on a desk top, mobile (e.g., tablet), or hand held device. The application may also be configured to interact with the security devices to thereby remotely control access to the cabinet).
Claim 8. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein the at least one monitoring device is a computer (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet. The application receives and processes data from the one or more peripheral security devices associated with the monitored cabinet, and my provide real time status information, alerts, summary information, remote and/or local storage of logged events, to users on a desk top, mobile (e.g., tablet), or hand held device. The application may also be configured to interact with the security devices to thereby remotely control access to the cabinet).
Claim 9. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses the system further comprising a plurality of sensor, each sensor coupled to a respective fixture (See Parag. [0050]; data center 1200 including a first room or zone 1202, a second zone 1204, and a third zone 1206. See Parag. [0051]; one or more zones each include one or more cabinet arrays 1214, with each array comprising any desired number of server cabinets 1216. See Parag. [0052]; audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis).
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 10. Thul in view of Eterovic discloses the data center monitoring system of Claim 9,
Thul further discloses wherein the at least one monitoring device is configured to communicate with each of the plurality of sensors (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet. The application receives and processes data from the one or more peripheral security devices associated with the monitored cabinet, and my provide real time status information, alerts, summary information, remote and/or local storage of logged events, to users on a desk top, mobile (e.g., tablet), or hand held device. The application may also be configured to interact with the security devices to thereby remotely control access to the cabinet. See Parag [0052]; audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis (i.e., the camera captures the bottom edge); security devices may be configured to provide access monitoring and control at the cabinet level).
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 15. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses the system further comprising a camera for capturing one or more images of the fixture (See Parag [0052-0053]; audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis; security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera, access may be remotely monitored and/or controlled on a per cabinet basis (as opposed to using a camera to secure an entire room. The camera 1304 may comprise any suitable audio, video, and/or motion surveillance device).
Claim 16. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein the interface comprises an access control point coupled to the fixture and configured to control access to the fixture (See Parag. [0053]; Door lock 1306 may comprise any suitable latching or locking mechanism ... See Parag. [0057]; detecting a change in status of the door lock, when an authorized or unauthorized user engages the door lock in an attempt to gain access to the interior of the cabinet. The user may unlock the lock directly; alternatively, a second level of approval (e.g., password) may be required from a remote administrator. In this regard the method may require one or more verification (e.g., biometric) steps to confirm the user's identity before granting access to the cabinet interior. See also Parag. [0059]; monitoring the closing and/or relocking of the cabinet door when the access session is terminated; the lock may be remotely secured in the event the user forgets to or otherwise fails to properly secure the cabinet door when finished).
Claim 17. Thul in view of Eterovic discloses the data center monitoring system of Claim 16,
Eterovic further discloses wherein the access control point is configured to communicate with an electronic key for arming or disarming the array of sensors (See Parag. [0046-0049]; the rack processors 210 may be further configured to determine the security status of the server rack 100 based on maintenance information. In this regard, the rack processors 210 may be configured to receive the maintenance information. For example, the maintenance information may be received from a maintenance ticketing system. The maintenance information may include maintenance requests, scheduled times for maintenance, authorized personnel to perform the maintenance, identity of the server computer to be serviced within the server rack, etc. As an example, the rack processors 210 may receive a maintenance request specifying that a server within server rack 100 is to be serviced at a scheduled time… The rack processors 210 may be configured to use the maintenance information to determine whether an entry is authorized or unauthorized. For instance, if the rack processor 210 determine based on the sensor signals that the door 104 is being opened, but there is no scheduled maintenance at the time, the rack processors 210 may determine that an unauthorized entry has been made. Conversely, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, and that there is scheduled maintenance at the time, the rack processors 210 may determine that the entry is authorized… The rack processors 210 may be configured to generate notifications or alerts based on the security statuses. In this regard, the rack signal analyzer 214 may also include instructions on whether notifications or alerts, if any, is to be generated. For example, a notification or alert may include the security status, such as a high risk level, and/or may include the underlying event corresponding to the security status, such as unauthorized entry)).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include wherein the access control point is configured to communicate with an electronic key for arming or disarming the array of sensors, as taught by Eterovic. This would be convenient to detect, based on the sensor signals, an unauthorized entry to the server rack (Eterovic, Parag. [0005]).
Claim 24. Thul discloses a method for monitoring a data center for detecting unauthorized access to a fixture, wherein the fixture defines an enclosure having a top edge, a bottom edge, and an access opening defined therebetween (See Fig. 12; schematic layout diagram of a data center including security devices configured to monitor and control access at the cabinet level. See Parag. [0008]; the cabinet architecture includes an extended chassis which houses servers and networking equipment in a traditional server rack mounting configuration, as well as a network enabled PDU. One or both of a front cabinet door and a back cabinet door includes a lock, camera, biometric device, or the like. The security devices interface with the PDU to allow remote monitoring and/or control of physical access to the network devices housed within the cabinet interior. See Parag. [0052] and Fig. 13; cabinet system 1300 includes a front door 1302 having a door lock 1306 and an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. The aforementioned security devices may be configured to provide access monitoring and control at the cabinet level), the method comprising:
transmitting a signal towards the bottom edge of the fixture with sensor located at the top edge of the fixture for detecting an unauthorized access attempt into the access opening of the fixture (See Parag [0052]; audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis (i.e., the camera captures the bottom edge); security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera, access may be remotely monitored and/or controlled on a per cabinet basis (as opposed to using a camera to secure an entire room); See Parag. [0057]; detecting a change in status of the door lock… unauthorized user engages the door lock in an attempt to gain access to the interior of the cabinet); and
receiving a signal at a monitoring device from the sensor indicative of the unauthorized access attempt (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet... The application may also be configured to interact with the security devices to thereby remotely control access to the cabinet. In this way, the system may deter or even prevent unauthorized intrusion and the attendant cyber security risks. See Parag. [0051]; the security devices may be wireless or wired. See Parag. [0052]; security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera and/or lock on each cabinet, access may be remotely monitored and/or controlled on a per cabinet basis).
Thul doesn’t explicitly disclose wherein the fixture does not have a door covering the access opening; an array of sensors; the transmitted signals are optical signals; and receiving a signal for arming or disarming the array of sensors, the array of sensors configured to detect an unauthorized access attempt to the fixture when armed and to allow an authorized access attempt to the fixture when disarmed.
However, Eterovic discloses wherein the fixture does not have a door covering the access opening (See Parag. [0028]; Referring to FIG. 1A, the server rack 100 may include one or more server computers, such as server computer 110, server computer 120, and server computer 130. The server computers 110, 120, 130 may be arranged inside an enclosure, which may be the server rack 100 itself as shown, or may be a separate structure. The enclosure may include a frame 102, such as a shelf structure for supporting the server computers inside. Referring to FIG. 1B, the enclosure may further include one or more doors 104 (e.g., mesh screen) that allow access to the server computers, and one or more locks 106 to secure the doors… Examiner’s note: the server rack in FIG 1A is reasonably interpreted by the examiner as not having a door);
an array of sensors; the transmitted signals are optical signals (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed); and
receiving a signal for arming or disarming the array of sensors, the array of sensors configured to detect an unauthorized access attempt to the fixture when armed and to allow an authorized access attempt to the fixture when disarmed (See Parag. [0046-0049]; the rack processors 210 may be further configured to determine the security status of the server rack 100 based on maintenance information. In this regard, the rack processors 210 may be configured to receive the maintenance information. For example, the maintenance information may be received from a maintenance ticketing system. The maintenance information may include maintenance requests, scheduled times for maintenance, authorized personnel to perform the maintenance, identity of the server computer to be serviced within the server rack, etc. As an example, the rack processors 210 may receive a maintenance request specifying that a server within server rack 100 is to be serviced at a scheduled time… The rack processors 210 may be configured to use the maintenance information to determine whether an entry is authorized or unauthorized. For instance, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, but there is no scheduled maintenance at the time, the rack processors 210 may determine that an unauthorized entry has been made. Conversely, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, and that there is scheduled maintenance at the time, the rack processors 210 may determine that the entry is authorized… The rack processors 210 may be configured to generate notifications or alerts based on the security statuses. In this regard, the rack signal analyzer 214 may also include instructions on whether notifications or alerts, if any, is to be generated. For example, a notification or alert may include the security status, such as a high risk level, and/or may include the underlying event corresponding to the security status, such as unauthorized entry).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, wherein the fixture does not have a door covering the access opening, and receiving a signal for arming or disarming the array of sensors, the array of sensors configured to detect an unauthorized access attempt to the fixture when armed and to allow an authorized access attempt to the fixture when disarmed, as taught by Eterovic. This would be convenient to detect, based on the sensor signals, an unauthorized entry to the server rack (Eterovic, Parag. [0005]).
Claim 26. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul discloses wherein the sensor is arranged along an entire width of the top edge of the fixture (See Parag. [0052] and Fig. 13; an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. The aforementioned security devices may be configured to provide access monitoring and control at the cabinet level (as opposed to at the zone level). Parag. [0053] that the camera may comprise a motion surveillance device).
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 27. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein a field of view of the sensors is adjustable (See Parag. [0058]; Once access is granted, an audio/video or other record may be recorded and stored (Task 1512) for the entire session during which the cabinet is opened, including event logs for all actions taken with respect to equipment added to, removed from, or otherwise manipulated or configured within the cabinet (Task 1514). This may include live streaming to remote viewers of the entire access session, which may also involve the use of multiple cameras movable about multiple respective axes to ensure that all relevant activities are observed and recorded).
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 30. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses the system further comprising a sensor, wherein the top edge of the fixture defines a top surface having a front edge and a rear edge, and wherein one of the plurality of sensor is located at the front edge and another of the plurality sensor is located at the rear edge (See Parag. [0051]; Each cabinet 1216 may include one or both of a front door 1220 and a back door 1222, as well as respective front-side and back-side security devices… the security devices may be wireless or wired, and may include: video, audio, and or motion surveillance apparatus. See Parag. [0052] and Fig. 13; cabinet system 1300 includes a front door (also referred to as a frontside door) 1302 having a door lock 1306 and an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. See also Parag. [0008]; the cabinet architecture includes an extended chassis which houses servers and networking equipment in a traditional server rack mounting configuration, as well as a network enabled PDU. One or both of a front cabinet door and a back cabinet door includes a camera).
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 31. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Eterovic further discloses wherein the interface is configured to receive a signal from the monitoring device for arming or disarming the array of sensors (See Parag. [0046-0049]; the rack processors 210 may be further configured to determine the security status of the server rack 100 based on maintenance information. In this regard, the rack processors 210 may be configured to receive the maintenance information. For example, the maintenance information may be received from a maintenance ticketing system. The maintenance information may include maintenance requests, scheduled times for maintenance, authorized personnel to perform the maintenance, identity of the server computer to be serviced within the server rack, etc. As an example, the rack processors 210 may receive a maintenance request specifying that a server within server rack 100 is to be serviced at a scheduled time… The rack processors 210 may be configured to use the maintenance information to determine whether an entry is authorized or unauthorized. For instance, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, but there is no scheduled maintenance at the time, the rack processors 210 may determine that an unauthorized entry has been made. Conversely, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, and that there is scheduled maintenance at the time, the rack processors 210 may determine that the entry is authorized… The rack processors 210 may be configured to generate notifications or alerts based on the security statuses. In this regard, the rack signal analyzer 214 may also include instructions on whether notifications or alerts, if any, is to be generated. For example, a notification or alert may include the security status, such as a high risk level, and/or may include the underlying event corresponding to the security status, such as unauthorized entry).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include wherein the interface is configured to receive a signal from the monitoring device for arming or disarming the array of sensors, as taught by Eterovic. This would be convenient to detect, based on the sensor signals, an unauthorized entry to the server rack (Eterovic, Parag. [0005]).
Claim 33. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul further discloses wherein the sensor is contained within a single assembly configured to be mounted to the fixture with a bracket (See Parag. [0052] and Fig. 13; an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. The aforementioned security devices may be configured to provide access monitoring and control at the cabinet level (as opposed to at the zone level). Parag. [0053] that the camera may comprise a motion surveillance device).
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 34. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Eterovic further discloses wherein the array of sensors is configured to detect access attempts to the fixture when both armed and disarmed (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed. See Parag. [0046-0049]).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors configured to detect access attempts to the fixture when both armed and disarmed instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claim 35. Thul discloses a data center monitoring system for detecting unauthorized access to a fixture in a data center, wherein the fixture defines an enclosure having a top edge, a bottom edge, and an access opening defined therebetween (See Fig. 12; schematic layout diagram of a data center including security devices configured to monitor and control access at the cabinet level. See Parag. [0008]; the cabinet architecture includes an extended chassis which houses servers and networking equipment in a traditional server rack mounting configuration, as well as a network enabled PDU. One or both of a front cabinet door and a back cabinet door includes a lock, camera, biometric device, or the like. The security devices interface with the PDU to allow remote monitoring and/or control of physical access to the network devices housed within the cabinet interior. See Parag. [0052] and Fig. 13; cabinet system 1300 includes a front door 1302 having a door lock 1306 and an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. The aforementioned security devices may be configured to provide access monitoring and control at the cabinet level), the data center monitoring system comprising:
a sensor configured to be located at the top edge of the fixture (See Parag. [0052] and Fig. 13; an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. The aforementioned security devices may be configured to provide access monitoring and control at the cabinet level (as opposed to at the zone level). Parag. [0053] that the camera may comprise a motion surveillance device), wherein the sensor is configured to transmit a plurality of signals towards the bottom edge of the fixture for detecting an unauthorized access attempt into the access opening of the fixture (See Parag [0052]; audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis (i.e., the camera captures the bottom edge); security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera, access may be remotely monitored and/or controlled on a per cabinet basis (as opposed to using a camera to secure an entire room); and
at least one monitoring device configured to communicate with the array of sensors, wherein the at least one monitoring device is configured to receive a signal from the array of sensors indicative of the unauthorized access attempt to the fixture (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet... The application may also be configured to interact with the security devices to thereby remotely control access to the cabinet. In this way, the system may deter or even prevent unauthorized intrusion and the attendant cyber security risks. See Parag. [0051]; the security devices may be wireless or wired. See Parag. [0052]; security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera and/or lock on each cabinet, access may be remotely monitored and/or controlled on a per cabinet basis).
Thul further discloses the cabinet architecture includes an extended chassis which houses servers and networking equipment in a traditional server rack mounting configuration, as well as a network enabled PDU. One or both of a front cabinet door and a back cabinet door includes a lock, camera, biometric device, or the like. The security devices interface with the PDU to allow remote monitoring and/or control of physical access to the network devices housed within the cabinet interior, but Thul doesn’t explicitly disclose wherein the fixture does not have a door covering the access opening; an array of sensors; the transmitted signals are optical signals; wherein the array of sensors is contained within a single assembly configured to be mounted at the top edge of the fixture with a bracket.
However, Eterovic discloses wherein the fixture does not have a door covering the access opening (See Parag. [0028]; Referring to FIG. 1A, the server rack 100 may include one or more server computers, such as server computer 110, server computer 120, and server computer 130. The server computers 110, 120, 130 may be arranged inside an enclosure, which may be the server rack 100 itself as shown, or may be a separate structure. The enclosure may include a frame 102, such as a shelf structure for supporting the server computers inside. Referring to FIG. 1B, the enclosure may further include one or more doors 104 (e.g., mesh screen) that allow access to the server computers, and one or more locks 106 to secure the doors… Examiner’s note: the server rack in FIG 1A is reasonably interpreted by the examiner as not having a door);
an array of sensors; the transmitted signals are optical signals (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed); and
wherein the array of sensors is contained within a single assembly configured to be mounted at the top edge of the fixture with a bracket (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, wherein the fixture does not have a door covering the access opening, and wherein the array of sensors is contained within a single assembly configured to be mounted at the top edge of the fixture with a bracket, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Claims 19-21, 23, and 29 are rejected under 35 U.S.C. 103 as being unpatentable over Thul (Pub. No. US 2017/0111451); in view of Eterovic Alliende et al. (Pub. No. US 2021/0320948), hereinafter Eterovic; and in further view of Patterson et al. (Pub. No. US 2017/0294088), hereinafter Patterson as applied to claim 1 above.
Claim 19. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Thul in view of Eterovic doesn’t explicitly disclose the system further comprising a reflective component spaced at a predetermined distance from the sensors, wherein the reflective component is configured to reflect the plurality of optical signals back to the sensors.
However, Patterson discloses a reflective component spaced at a predetermined distance from the sensors, wherein the reflective component is configured to reflect the plurality of optical signals back to sensors (See Fig. 2 and Parag. [0023]; one or more of the reflector elements 114, 116, 126 are retroreflectors. A retroreflector is a device or surface that reflects light back to its source with a minimum of scattering. See also Parag. [0028]; a reflected optical signal from one or more of the reflector elements 114, 116, 126 is monitored by a processing element (e.g. a processing element associated with the optical transceiver 110). Disturbances associated with the reflected optical signal are then used to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Thul in view of Eterovic, to include a reflective component spaced from the at least one sensor, wherein the reflective component is configured to reflect the at least one optical signal back to the at least one sensor, as taught by Patterson. This would be convenient to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms (Patterson, Parag. [0028]).
Claim 20. Thul in view of Eterovic and Patterson discloses the data center monitoring system of Claim 19,
Patterson further discloses wherein the reflective component comprises a retroreflective tape (See Parag. [0024] and Fig. 3; reflector element 300 is a retroreflector, meaning that it reflects light back to its source with a minimum of scattering. Reflector element 300 can be comprised of a plurality of transparent optical beads or microspheres 302. Accordingly, an optical wave which arrives at the reflector element 300 in a first vector direction is reflected back along a second vector direction that is parallel to but opposite to the transmit vector direction. The microspheres can be secured or embedded in a binder material 304 in a random or predetermined pattern. The binder material 304 can be a colorless clear paint, a flexible substrate in the form of a tape with adhesive disposed on one surface to secure the tape to a surface, or any other suitable material that is capable of securing the microspheres in a location).
It would have been obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Thul in view of Eterovic, to include the reflective component comprises a retroreflective tape, as taught by Patterson. This would be convenient to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms (Patterson, Parag. [0028]).
Claim 21. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Thul in view of Eterovic doesn’t explicitly disclose wherein the sensor is configured to detect an interruption in the plurality of optical signals.
However, Patterson discloses wherein the sensor is configured to detect an interruption in the plurality of optical signals (See Parag. [0029]; a disturbance associated with a reflected optical signal can comprise an interruption or disruption of the reflected signal such that the presence of the reflected signal is no longer detected at the optical transceiver 110. As an example, such an interruption in the reflected optical signal could occur when a door 108 moves from a closed position to an open position. When this occurs, the reflector element 116 is rotated with the door 108 to an orientation in which it is no longer able to effectively reflect a transmitted optical signal to the optical receiver 112. See also Parag. [0030]).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Thul in view of Eterovic, to include a detecting an interruption in the optical signal, as taught by Patterson. This would be convenient to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms (Patterson, Parag. [0028]).
Claim 23. Thul discloses a data center monitoring system comprising:
a server rack located in a data center, wherein the server rack defines an enclosure having a top edge, a bottom edge, and an access opening defined therebetween (See Fig. 12; schematic layout diagram of a data center including security devices configured to monitor and control access at the cabinet level. See Parag. [0008]; the cabinet architecture includes an extended chassis which houses servers and networking equipment in a traditional server rack mounting configuration, as well as a network enabled PDU. One or both of a front cabinet door and a back cabinet door includes a lock, camera, biometric device, or the like. The security devices interface with the PDU to allow remote monitoring and/or control of physical access to the network devices housed within the cabinet interior. See Parag. [0052] and Fig. 13; cabinet system 1300 includes a front door 1302 having a door lock 1306 and an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. The aforementioned security devices may be configured to provide access monitoring and control at the cabinet level); at least one sensor configured to be located at the top edge of the server rack (See Parag. [0052] and Fig. 13; an audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis. Parag. [0053] that the camera may comprise a motion surveillance device), the at least one sensor configured to transmit a wireless signal towards the bottom edge of the fixture for detecting an unauthorized access attempt into the access opening of the server rack (See Parag [0052]; audiovisual sensor (e.g., camera) 1304 suitably mounted proximate a top portion of the cabinet chassis (i.e., the camera captures the bottom edge); security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera, access may be remotely monitored and/or controlled on a per cabinet basis (as opposed to using a camera to secure an entire room); See Parag. [0057]; detecting a change in status of the door lock… unauthorized user engages the door lock in an attempt to gain access to the interior of the cabinet);
at least one monitoring device configured to communicate with the at least one sensor, the at least one monitoring device configured to receive a signal from the at least one sensor indicative of an unauthorized access attempt into the server rack due to an interruption in the wireless signal (See Parag. [0010]; a software application running on a server (monitoring device) which may be local to or remote from the monitored cabinet... The application may also be configured to interact with the security devices to thereby remotely control access to the cabinet. In this way, the system may deter or even prevent unauthorized intrusion and the attendant cyber security risks. See Parag. [0051]; the security devices may be wireless or wired. See Parag. [0052]; security devices may be configured to provide access monitoring and control at the cabinet level; by mounting a dedicated camera and/or lock on each cabinet, access may be remotely monitored and/or controlled on a per cabinet basis).
Thul doesn’t explicitly discloses wherein the fixture does not have a door covering the access opening; an access control point mounted to the server rack, the access control point configured to receive a signal for arming or disarming the at the access control point, the at least one sensor configured to detect an unauthorized access attempt to the server rack when the access control point is armed and to allow an authorized access attempt to the server rack when the access control point is disarmed; and a reflective component spaced at a predetermined distance from the at least one sensor, wherein the reflective component is a retroreflective tape configured to reflect the wireless signal back to the at least one sensor.
However, Eterovic discloses wherein the fixture does not have a door covering the access opening (See Parag. [0028]; Referring to FIG. 1A, the server rack 100 may include one or more server computers, such as server computer 110, server computer 120, and server computer 130. The server computers 110, 120, 130 may be arranged inside an enclosure, which may be the server rack 100 itself as shown, or may be a separate structure. The enclosure may include a frame 102, such as a shelf structure for supporting the server computers inside. Referring to FIG. 1B, the enclosure may further include one or more doors 104 (e.g., mesh screen) that allow access to the server computers, and one or more locks 106 to secure the doors… Examiner’s note: the server rack in FIG 1A is reasonably interpreted by the examiner as not having a door);
an access control point mounted to the server rack, the access control point configured to receive a signal for arming or disarming the at the access control point, the at least one sensor configured to detect an unauthorized access attempt to the server rack when the access control point is armed and to allow an authorized access attempt to the server rack when the access control point is disarmed (See Parag. [0046-0049]; the rack processors 210 may be further configured to determine the security status of the server rack 100 based on maintenance information. In this regard, the rack processors 210 may be configured to receive the maintenance information. For example, the maintenance information may be received from a maintenance ticketing system. The maintenance information may include maintenance requests, scheduled times for maintenance, authorized personnel to perform the maintenance, identity of the server computer to be serviced within the server rack, etc. As an example, the rack processors 210 may receive a maintenance request specifying that a server within server rack 100 is to be serviced at a scheduled time… The rack processors 210 may be configured to use the maintenance information to determine whether an entry is authorized or unauthorized. For instance, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, but there is no scheduled maintenance at the time, the rack processors 210 may determine that an unauthorized entry has been made. Conversely, if the rack processors 210 determine based on the sensor signals that the door 104 is being opened, and that there is scheduled maintenance at the time, the rack processors 210 may determine that the entry is authorized… The rack processors 210 may be configured to generate notifications or alerts based on the security statuses. In this regard, the rack signal analyzer 214 may also include instructions on whether notifications or alerts, if any, is to be generated. For example, a notification or alert may include the security status, such as a high risk level, and/or may include the underlying event corresponding to the security status, such as unauthorized entry).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include wherein the fixture does not have a door covering the access opening, and an access control point mounted to the server rack, the access control point configured to receive a signal for arming or disarming the at the access control point, the at least one sensor configured to detect an unauthorized access attempt to the server rack when the access control point is armed and to allow an authorized access attempt to the server rack when the access control point is disarmed, as taught by Eterovic. This would be convenient to detect, based on the sensor signals, an unauthorized entry to the server rack (Eterovic, Parag. [0005]).
Paterson discloses:
a reflective component spaced at a predetermined distance from the at least one sensor, wherein the reflective component is a retroreflective tape configured to reflect the wireless signal back to the at least one sensor (See Fig. 2 and Parag. [0023]; one or more of the reflector elements 114, 116, 126 are retroreflectors. A retroreflector is a device or surface that reflects light back to its source with a minimum of scattering. See also Parag. [0028]; a reflected optical signal from one or more of the reflector elements 114, 116, 126 is monitored by a processing element (e.g. a processing element associated with the optical transceiver 110). Disturbances associated with the reflected optical signal are then used to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms. See Parag. [0024] and Fig. 3; reflector element 300 is a retroreflector, meaning that it reflects light back to its source with a minimum of scattering. Reflector element 300 can be comprised of a plurality of transparent optical beads or microspheres 302. Accordingly, an optical wave which arrives at the reflector element 300 in a first vector direction is reflected back along a second vector direction that is parallel to but opposite to the transmit vector direction. The microspheres can be secured or embedded in a binder material 304 in a random or predetermined pattern. The binder material 304 can be a colorless clear paint, a flexible substrate in the form of a tape with adhesive disposed on one surface to secure the tape to a surface, or any other suitable material that is capable of securing the microspheres in a location).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Thul in view of Eterovic, to include a reflective component spaced from the at least one sensor wherein the reflective component is a retroreflective tape, as taught by Patterson. This would be convenient to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms (Patterson, Parag. [0028]).
Claim 29. Thul in view of Eterovic discloses the data center monitoring system of Claim 19,
Thul in view of Eterovic doesn’t explicitly disclose wherein the reflective component is located along the bottom edge of the fixture.
However, Patterson discloses wherein the reflective component is located along the bottom edge of the fixture (See Fig. 2 and Parag. [0023]; one or more of the reflector elements 114, 116, 126 are retroreflectors. A retroreflector is a device or surface that reflects light back to its source with a minimum of scattering. See also Parag. [0028]; a reflected optical signal from one or more of the reflector elements 114, 116, 126 is monitored by a processing element (e.g. a processing element associated with the optical transceiver 110). Disturbances associated with the reflected optical signal are then used to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the sensor system, taught by Thul in view of Eterovic, to include a located along the bottom edge of the fixture, as taught by Patterson. This would be convenient to monitor openings and closing of the doors and windows and/or other intrusions for purposes of triggering alerts and/or alarms (Patterson, Parag. [0028]).
Claim 22 is rejected under 35 U.S.C. 103 as being unpatentable over Thul (Pub. No. US 2017/0111451); in view of Eterovic Alliende et al. (Pub. No. US 2021/0320948), hereinafter Eterovic; in view of Patterson et al. (Pub. No. US 2017/0294088), hereinafter Patterson; and in further view of Kare et al. (Pub. No. US 2018/0131449), hereinafter Kare as applied to claim 1 above.
Claim 22. Thul in view of Eterovic and Patterson discloses the data center monitoring system of Claim 21,
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Thul in view of Eterovic and Patterson doesn’t explicitly disclose wherein the sensor is configured to detect an interruption in the plurality of optical signals using time of flight.
However, Kare discloses wherein the sensor is configured to detect an interruption in the optical signal using time of flight (See Parag. [0138]; the time delay is determined between the leading or trailing edge of the emitted time-varying optical signal and the corresponding edge of the returned signal (i.e., the pulsed output). The phase of the returned signal is compared to the phase of the emitted time-varying optical signal to determine the time-of-flight delay. See also Parag. [0140][0152]).
It would have been obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the teaching, taught by Thul in view of Eterovic and Patterson, to include detecting interruption in the optical signal using time of flight, as taught by Kare. This would be convenient to account for a sensor that is malfunctioning or is consistently providing object-intrusion indication (Kare, Parag. [0103]).
Claim 28 is rejected under 35 U.S.C. 103 as being unpatentable over Thul (Pub. No. US 2017/0111451); in view of Eterovic Alliende et al. (Pub. No. US 2021/0320948), hereinafter Eterovic; and in further view of Liu et al. (Pub. No. US 2020/0018855), hereinafter Liu as applied to claim 1 above.
Claim 28. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Thul in view of Eterovic doesn’t explicitly disclose wherein the array of sensors is configured to define a light curtain between the top edge and the bottom edge of the fixture.
However, Liu discloses wherein the array of sensors is configured to define a light curtain between the top edge and the bottom edge of the fixture (See Parag. [0047]; multiple singlepoint ToF laser radars can form a single-point ToF array and be disposed on the rack. Specifically, the single-point ToF array may be disposed on a top edge, a bottom edge, and an edge side of either one of the left and right sides of the rack, and the multiple single-point ToF laser radars combine to form a “light curtain” covering the exhibition surface of the rack).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the server rack, taught by Thul in view of Eterovic, to include light curtain, as taught by Liu. This would be convenient to monitor various items displayed on the rack. If there is a target object (an object capable of taking the item actively, such as a person, a robot, etc.) taking an item on the rack, the target object will inevitably touch the “light curtain” formed by the laser radar in front of the exhibition surface, thereby being detected by the oneline scanning laser radar, and corresponding sensing information is generated (Liu, Parag. [0043]).
Claim 32 is rejected under 35 U.S.C. 103 as being unpatentable over Thul (Pub. No. US 2017/0111451); in view of Eterovic Alliende et al. (Pub. No. US 2021/0320948), hereinafter Eterovic; in further view of Barr et al. (Patent No. US 10,706,703), hereinafter Barr as applied to claim 1 above.
Claim 32. Thul in view of Eterovic discloses the data center monitoring system of Claim 1,
Eterovic further discloses an array of sensors (See Parag. [0029]; The server rack 100 may be provided with one or more sensors 140. The sensors 140 may be positioned anywhere on or in the enclosure, such as on the frame 102, on or near the doors 104, on or near the mesh screens 105, on or near the locks 106. Additionally or alternatively, the sensors 140 may be positioned on the server computers 110, 120, 130 themselves. The sensors 140 may include motion sensors, contact sensors, optical sensors, capacitive sensors, vibration sensors, pressure sensors, etc. The sensors 140 may capture the physical environment or state of the server rack 100, which may include positioning of a door or other components of the server rack 100 (e.g., open or closed), contacts made with any part of the server rack 100, tampering with the server rack 100 (e.g., with doors or locks), motions of objects or persons inside the server rack 100, etc. As an example, motion or optical sensors on or near the doors 104 may generate signals when the doors 104 are moved, which may indicate whether the doors 104 are open or closed).
it would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the audiovisual sensor system mounted on the top of the cabinet chassis to detect unauthorized access, taught by Thul, to include an array of sensors instead of a single sensor, as taught by Eterovic. This would be convenient detect based on the sensor signals, an unauthorized entry to the server rack, wherein the security status indicates that an unauthorized entry has been detected (Eterovic, Parag. [0005]).
Thul in view of Eterovic doesn’t explicitly disclose wherein sensor is configured to detect unauthorized tampering of the sensor.
However, Barr discloses wherein sensor is configured to detect unauthorized tampering of the sensor (See Col. 16 lines 60-64; a housing may include a tamper-resistant sensor that is operable to detect magnetic tampering with a breach sensor mounted on a door of the housing, the tamper-resistant sensor being in electronic communication with the controller. See Col. 22 lines 37-41; The anti-tampering sensor(s) may detect magnetic tamper attempts near the at least one housing door sensor 125. If the anti-tampering sensor(s) detect a magnetic tamper event, a signal may be sent by the anti-tampering sensor(s) to the controller 110 indicating a tampering event).
It would be obvious to one of ordinary skill in the art at the time before the effective filling date of the claimed invention to modify the sensor system, taught by Thul in view of Eterovic, to include configuring the array of sensors to detect unauthorized tampering of the array of sensors, as taught by Barr. This would be convenient to protect from unauthorized entry to the premises (Barr, Col. 1 line 29).
Conclusion
The prior art made of record and not relied upon is considered pertinent to applicant's disclosure (see PTO-form 892).
The following Patents and Papers are cited to further show the state of the art at the time of Applicant’s invention with respect to data center security system.
Whitney (Pub. No. US 2015/0236512); “Cabinet Level Controller with Asset Management;”
Teaches a plurality of sensors can be placed at various locations in and around a rack to monitor the environmental conditions proximate to the rack and the assets. the cabinet level controller 100 of an example embodiment can further include access control module 120, which can be integrated into the cabinet level controller 100. In the example embodiment, the access control module 120 is used to monitor and control access to the assets in a rack. The access control module 120 acts as an electronic lock that provides conditional access control to the assets in the rack. In one embodiment, the access control module 120 is configured to communicate with rack locking mechanisms (e.g., in front and back) to control access to the assets in the rack. (See Parag. [0046-0047]).
Applicant's amendment necessitated the new ground(s) of rejection presented in this Office Action. Accordingly, THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a).
A shortened statutory period for reply to this final action is set to expire THREE
MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any extension fee pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the date of this final action.
Any inquiry concerning this communication or earlier communications from the examiner should be directed to GHIZLANE MAAZOUZ whose telephone number is (571)272-8118. The examiner can normally be reached Telework M-F 7:30-5 PM.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Philip Chea can be reached on 571-272-3951. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/GHIZLANE MAAZOUZ/Examiner, Art Unit 2499 /PHILIP J CHEA/Supervisory Patent Examiner, Art Unit 2499