Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
DETAILED ACTIONClaims StatusClaims 16, 25 and 35 filed 11/12/2025 have been amended. Claims 16-35 are pending and have been rejected. Claims 1-15 were previously canceled.
Response to Arguments
Applicant's arguments filed 11/12/2025 have been fully considered but they are not persuasive. Applicant’s asserts that neither Kato nor Tiwari, alone or in combination, teaches or suggests discovering a cryptographic capability of a byte-addressable non-volatile memory by querying a memory-controller interface, determining whether that capability satisfies a cryptographic requirement associated with cache data, or copying the cache data by a byte-addressable memory operation while relying on the non-volatile memory to encrypt the data. However, the Examiner respectfully disagrees as the prior art of Kato (U.S. Publication 2015/0370704) is used to disclosed the features of cryptographic mechanism is provided in the nonvolatile external storage device shown in paragraph 0099. The prior art of Tiwari et al (U.S. Publication 2022/0100403) is used to disclosed the features of volatile storage device and non-volatile storage to store data providing different addresses.
Applicant’s arguments with respect to claims 16, 25 and 34 (“a cryptographic capability of the second memory, including whether the second memory automatically encrypts data copied to the second memory”) have been considered but are moot because the new ground of rejection does not rely on any reference applied in the prior rejection of record for any teaching or matter specifically challenged in the argument.
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows:
1. Determining the scope and contents of the prior art.
2. Ascertaining the differences between the prior art and the claims at issue.
3. Resolving the level of ordinary skill in the pertinent art.
4. Considering objective evidence present in the application indicating obviousness or nonobviousness.
Claims 16, 17, 25, 33-35 are rejected under 35 U.S.C. 103 as being unpatentable over Kato (U.S. Publication 2015/0370704), hereinafter ‘Kato’ in view of Tiwari et al (U.S. Publication 2022/0100403), hereinafter ‘Tiwari’ and Haghighat et al. (U.S. Publication 2021/0263779), hereinafter “Haghighat”.
As to claim 16, Kato discloses a method, implemented at a computer system that includes a processor, a first memory that is byte-addressable and volatile, and a second memory that is byte-addressable and non-volatile, comprising: discovering, by querying a memory controller interface of the second memory (Kato, see [0099], cryptographic mechanism is provided in the nonvolatile external storage device), Kato is silent to identifying a portion of cache data stored in the first memory that is to be copied to the second memory, the portion of cache data being associated with a cryptographic requirement for storing the portion of cache data on non-volatile storage; determining that the cryptographic requirement is met by the cryptographic capability; and copying, by the byte-addressable memory operation, the portion of cache data to the second memory while relying on the second memory to encrypt the portion of cache data. However, Tiwari discloses identifying a portion of cache data stored in the first memory that is to be copied to the second memory, the portion of cache data being associated with a cryptographic requirement for storing the portion of cache data on non-volatile storage (Tiwari, see [0090], the volatile storage operating system processes a request to encrypt data on the non-volatile storage device by encrypting any data. See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device); determining that the cryptographic requirement is met by the cryptographic capability (Tiwari, see [0089-0091], the volatile storage operating system processes a request to encrypt the data on the volatile storage device by encrypting any data, wherein encryption can be any form of suitable encryption); and copying, by the byte-addressable memory operation, the portion of cache data to the second memory while relying on the second memory to encrypt the portion of cache data (Tiwari, see [0090], the volatile storage operating system processes a request to encrypt data on the non-volatile storage device by encrypting any data. See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device).
Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari. One of ordinary skill in the art would have been motivated because it would allow to adapt systems to enhance the functionalities of devices and/or components that cannot perform the one or more functionalities (Tiwari – 0001). Kato in view of Tiwari is silent to a cryptographic capability of the second memory, including whether the second memory automatically encrypts data copied to the second memory; However, Haghighat discloses a cryptographic capability of the second memory, including whether the second memory automatically encrypts data copied to the second memory (Haghighat, see [1150], key is automatically reassigned, which is used to encrypt a second memory); Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari and Haghighat in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari and the method for provide enhanced function as a service to users from the teachings of Haghighat. One of ordinary skill in the art would have been motivated because it would allow to share access to the keys used to encrypt the corresponding regions of shared memory (Haghighat – 1151).
As to claim 17, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 16. Tiwari further discloses wherein identifying the portion of cache data comprises identifying a plurality of portions of cache data, each portion of cache data being associated with the cryptographic requirement (Tiwari, see [0090], the volatile storage operating system processes a request to encrypt data on the non-volatile storage device by encrypting any data. See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device).
As to claim 25, Kato discloses a method, implemented at a computer system that includes a processor, a first memory that is byte-addressable and volatile, and a second memory that is byte-addressable and non- volatile, comprising: discovering, by querying a memory controller interface of the second memory (Kato, see [0099], cryptographic mechanism is provided in the nonvolatile external storage device), Kato is silent to identifying a portion of cache data stored in the first memory that is to be copied to the second memory, the portion of cache data being associated with a cryptographic requirement for storing the portion of cache data on non-volatile storage; determining that the cryptographic requirement is not met by the cryptographic capability; encrypting the portion of cache data to generate an encrypted portion of cache data; and copying, by a byte-addressable memory operation, the encrypted portion of cache data to the second memory.
However, Tiwari disclose to identifying a portion of cache data stored in the first memory that is to be copied to the second memory, the portion of cache data being associated with a cryptographic requirement for storing the portion of cache data on non-volatile storage (Tiwari, see [0090], the volatile storage operating system processes a request to encrypt data on the non-volatile storage device by encrypting any data. See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device); determining that the cryptographic requirement is not met by the cryptographic capability (Tiwari, see [0089], encrypt data on volatile storage device); encrypting the portion of cache data to generate an encrypted portion of cache data (Tiwari, see [0089- 0090], encrypt data on non-volatile storage device); and copying, by a byte-addressable memory operation, the encrypted portion of cache data to the second memory (See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device , see [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari. One of ordinary skill in the art would have been motivated because it would allow to adapt systems to enhance the functionalities of devices and/or components that cannot perform the one or more functionalities (Tiwari – 0001). Kato in view of Tiwari is silent to a cryptographic capability of the second memory, including whether the second memory automatically encrypts data copied to the second memory; However, Haghighat discloses a cryptographic capability of the second memory, including whether the second memory automatically encrypts data copied to the second memory (Haghighat, see [1150], key is automatically reassigned, which is used to encrypt a second memory); Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari and Haghighat in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari and the method for provide enhanced function as a service to users from the teachings of Haghighat. One of ordinary skill in the art would have been motivated because it would allow to share access to the keys used to encrypt the corresponding regions of shared memory (Haghighat – 1151).
As to claim 33, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 25. Kato further discloses wherein encrypting the portion of cache data to generate the encrypted portion of cache data comprises executing an instruction at the processor to encrypt the portion of cache data (Kato, see [0039], the cryptographic device encrypts and decrypts data input to and output from the nonvolatile external storage unit. See [0207], computer of a system or apparatus that reads out and executes computer executable instructions (e.g., one or more programs) to perform the functions).
As to claim 34, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 33. Kato further discloses wherein the instruction leverages a hardware encryption acceleration capability of the processor (Kato, see [0207], computer of a system or apparatus that reads out and executes computer executable instructions to perform the functions and/or that includes one or more circuits (e.g., application specific integrated circuit (ASIC)) for performing the functions by the computer of the system or apparatus).
As to claim 35, Kato discloses a computer system comprising: a processor (Kato, see fig. 11 , CPU); a first memory that is byte-addressable and volatile (Kato, see fig. 11, volatile); a second memory that is byte-addressable and non-volatile (Kato, see fig. 11, non-volatile); and a computer-readable medium that stores computer-executable instructions that are executable by the processor to cause the computer system to at least: discovering, by querying a memory controller interface of the second memory (Kato, see [0099], cryptographic mechanism is provided in the nonvolatile external storage device), Kato is silent to identify a first portion of cache data stored in the first memory that is to be copied to the second memory, the first portion of cache data being associated with a first cryptographic requirement for storing the first portion of cache data on non-volatile storage; determine that the first cryptographic requirement is met by the cryptographic capability; based on the first cryptographic requirement being met by the cryptographic capability, copy, by a byte-addressable memory operation, the first portion of cache data to the second memory while relying on the second memory to encrypt the first portion of cache data; identify a second portion of cache data stored in the first memory that is to be copied to the second memory, the second portion of cache data being associated with a second cryptographic requirement for storing the second portion of cache data on non-volatile storage; determine that the second cryptographic requirement is not met by the cryptographic capability; and based on the second cryptographic requirement being not met by the cryptographic capability, encrypt the second portion of cache data to generate an encrypted portion of cache data; and copy the encrypted portion of cache data to the second memory. However, Tiwari discloses identify a first portion of cache data stored in the first memory that is to be copied to the second memory, the first portion of cache data being associated with a first cryptographic requirement for storing the first portion of cache data on non-volatile storage (Tiwari, see [0090], the volatile storage operating system processes a request to encrypt data on the non-volatile storage device by encrypting any data. See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device); determine that the first cryptographic requirement is met by the cryptographic capability (Tiwari, see [0089-0091], the volatile storage operating system processes a request to encrypt the data on the volatile storage device by encrypting any data, wherein encryption can be any form of suitable encryption); based on the first cryptographic requirement being met by the cryptographic capability, copy the first portion of cache data to the second memory while relying on the second memory to encrypt the first portion of cache data (Tiwari, see [0090], the volatile storage operating system processes a request to encrypt data on the non-volatile storage device by encrypting any data. See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device); identify a second portion of cache data stored in the first memory that is to be copied to the second memory, the second portion of cache data being associated with a second cryptographic requirement for storing the second portion of cache data on non-volatile storage (Tiwari, see [0090], the volatile storage operating system processes a request to encrypt data on the non-volatile storage device by encrypting any data. See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device); determine that the second cryptographic requirement is not met by the cryptographic capability (Tiwari, see [0089], encrypt data on volatile storage device); and based on the second cryptographic requirement being not met by the cryptographic capability, encrypt the second portion of cache data to generate an encrypted portion of cache data (Tiwari, see [0089- 0090], encrypt data on non-volatile storage device); and copy, by a byte-addressable memory operation, the encrypted portion of cache data to the second memory (See [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device , see [0112], the volatile storage firmware initiates the copying of the data by instructing the DMA engine to copy the data from the volatile storage device to the non-volatile storage device). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari. One of ordinary skill in the art would have been motivated because it would allow to adapt systems to enhance the functionalities of devices and/or components that cannot perform the one or more functionalities (Tiwari – 0001). Kato in view of Tiwari is silent to a cryptographic capability of the second memory, including whether the second memory automatically encrypts data copied to the second memory; However, Haghighat discloses a cryptographic capability of the second memory, including whether the second memory automatically encrypts data copied to the second memory (Haghighat, see [1150], key is automatically reassigned, which is used to encrypt a second memory); Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari and Haghighat in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari and the method for provide enhanced function as a service to users from the teachings of Haghighat. One of ordinary skill in the art would have been motivated because it would allow to share access to the keys used to encrypt the corresponding regions of shared memory (Haghighat – 1151).
Claims 18, 19, 27 and 28 are rejected under 35 U.S.C. 103 as being unpatentable over Kato (U.S. Publication 2015/0370704), hereinafter ‘Kato’ in view of Tiwari et al (U.S. Publication 2022/0100403), hereinafter ‘Tiwari’, Kato’ in view of Tiwari et al (U.S. Publication 2022/0100403), hereinafter ‘Tiwari’ and Haghighat et al. (U.S. Publication 2021/0263779), hereinafter “Haghighat” and Bak et al. (U.S. Publication 2012/0233438), hereinafter ‘Bak’.
As to claim 18, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 16, but is silent to wherein the portion of cache data comprises a trimmed memory page in a standby list. However, Bak discloses wherein the portion of cache data comprises a trimmed memory page in a standby list (Bak, see [0052], memory manager finds eligible pages to be trimmed. See [0077], the page may be removed from modified list 214 and added to standby list). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Bak in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method for maintaining a pagefile of a computer system using a technique of reserving portions of the pagefile for related memory pages from the teachings of Bak. One of ordinary skill in the art would have been motivated because it would allow to increase the computer system with the efficiency of memory management functionalities (Bak – Abstract).
As to claim 19, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 16, but is silent to wherein the portion of cache data comprises an active memory pages copied to a page file. However, Bak discloses wherein the portion of cache data comprises an active memory pages copied to a page file (Bak, see [0052], if memory manager finds some other pages nearby that are trimmed, but there are pages in between that are not being trimmed, page writer can implement a sequential writing of these separated pages). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Bak in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method for maintaining a pagefile of a computer system using a technique of reserving portions of the pagefile for related memory pages from the teachings of Bak. One of ordinary skill in the art would have been motivated because it would allow to increase the computer system with the efficiency of memory management functionalities (Bak – Abstract).
As to claim 27, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 25, but is silent to wherein the portion of cache data comprises a trimmed memory page in a standby list. However, Bak discloses wherein the portion of cache data comprises a trimmed memory page in a standby list (Bak, see [0052], memory manager finds eligible pages to be trimmed. See [0077], the page may be removed from modified list 214 and added to standby list). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Bak in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method for maintaining a pagefile of a computer system using a technique of reserving portions of the pagefile for related memory pages from the teachings of Bak. One of ordinary skill in the art would have been motivated because it would allow to increase the computer system with the efficiency of memory management functionalities (Bak – Abstract).
As to claim 28, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 25, but is silent to wherein the portion of cache data comprises an active memory page copied to a page file. However, Bak discloses wherein the portion of cache data comprises an active memory page copied to a page file (Bak, see [0052], if memory manager finds some other pages nearby that are trimmed, but there are pages in between that are not being trimmed, page writer can implement a sequential writing of these separated pages). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Bak in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method for maintaining a pagefile of a computer system using a technique of reserving portions of the pagefile for related memory pages from the teachings of Bak. One of ordinary skill in the art would have been motivated because it would allow to increase the computer system with the efficiency of memory management functionalities (Bak – Abstract).
Claims 20-23 and 29-32 are rejected under 35 U.S.C. 103 as being unpatentable over Kato (U.S. Publication 2015/0370704), hereinafter ‘Kato’ in view of Tiwari et al (U.S. Publication 2022/0100403), hereinafter ‘Tiwari’, Haghighat et al. (U.S. Publication 2021/0263779), hereinafter “Haghighat” and Zeh et al. (U.S. Publication 2020/0092098), hereinafter ‘Zeh’.
As to claim 20, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 16, but is silent to further comprising presenting a first application programming interface (API) to an application executing at the processor, the first API identifying the cryptographic capability. However, Zeh discloses presenting a first application programming interface (API) to an application executing at the processor, the first API identifying the cryptographic capability (Zeh, see [0026], the first and second input interfaces 212, 222 are each configured to receive input data, that contains configuration data, for a cryptographic operation). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Zeh in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Zeh. One of ordinary skill in the art would have been motivated because it would allow to receive data from the communication interface in order to encrypted/decrypted and/or authenticated/signed (Zeh – 0026).
As to claim 21, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 16, but is silent to further comprising presenting a second application programming interface (API) to an application executing at the processor, the second API enabling specification of the cryptographic requirement. However, Zeh discloses presenting a second application programming interface (API) to an application executing at the processor, the second API enabling specification of the cryptographic requirement (Zeh, see [0026], the first and second input interfaces 212, 222 are each configured to receive input data, that contains configuration data, for a cryptographic operation).
Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Zeh in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Zeh. One of ordinary skill in the art would have been motivated because it would allow to receive data from the communication interface in order to encrypted/decrypted and/or authenticated/signed (Zeh – 0026).
As to claim 22, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 16, but is silent to wherein the cryptographic requirement includes one or more of a cryptographic key lifetime, a cryptographic key length, or a cryptographic algorithm. However, Zeh discloses wherein the cryptographic requirement includes one or more of a cryptographic key lifetime, a cryptographic key length, or a cryptographic algorithm (Zeh, see [0028], the first and second crypto compute processors are each configured to execute a cryptographic operation, which could be any symmetric cipher, asymmetric algorithm). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Zeh in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Zeh. One of ordinary skill in the art would have been motivated because it would allow to make modifications during a predetermined period of time until modification rights expire (Zeh – 0027).
As to claim 23, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 16, but is silent to wherein the cryptographic capability includes one or more of a cryptographic key lifetime, a cryptographic key length, or a cryptographic algorithm. However, Zeh discloses wherein the cryptographic capability includes one or more of a cryptographic key lifetime, a cryptographic key length, or a cryptographic algorithm (Zeh, see [0028], the first and second crypto compute processors are each configured to execute a cryptographic operation, which could be any symmetric cipher, asymmetric algorithm). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Zeh in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Zeh. One of ordinary skill in the art would have been motivated because it would allow to make modifications during a predetermined period of time until modification rights expire (Zeh – 0027).
As to claim 29, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 26, but is silent to further comprising presenting a first application programming interface (API) to an application executing at the processor, the first API identifying the cryptographic capability. However, Zeh discloses presenting a first application programming interface (API) to an application executing at the processor, the first API identifying the cryptographic capability (Zeh, see [0026], the first and second input interfaces 212, 222 are each configured to receive input data, that contains configuration data, for a cryptographic operation). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Zeh in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Zeh. One of ordinary skill in the art would have been motivated because it would allow to receive data from the communication interface in order to encrypted/decrypted and/or authenticated/signed (Zeh – 0026).
As to claim 30, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 25, but is silent to further comprising presenting a second application programming interface (API) to an application executing at the processor, the second API enabling specification of the cryptographic requirement. However, Zeh discloses presenting a second application programming interface (API) to an application executing at the processor, the second API enabling specification of the cryptographic requirement (Zeh, see [0026], the first and second input interfaces 212, 222 are each configured to receive input data, that contains configuration data, for a cryptographic operation).
Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Zeh in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Zeh. One of ordinary skill in the art would have been motivated because it would allow to receive data from the communication interface in order to encrypted/decrypted and/or authenticated/signed (Zeh – 0026).
As to claim 31, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 25, but is silent to wherein the cryptographic requirement includes one or more of a cryptographic key lifetime, a cryptographic key length, or a cryptographic algorithm. However, Zeh discloses wherein the cryptographic requirement includes one or more of a cryptographic key lifetime, a cryptographic key length, or a cryptographic algorithm (Zeh, see [0028], the first and second crypto compute processors are each configured to execute a cryptographic operation, which could be any symmetric cipher, asymmetric algorithm). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Zeh in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Zeh. One of ordinary skill in the art would have been motivated because it would allow to make modifications during a predetermined period of time until modification rights expire (Zeh – 0027).
As to claim 32, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 25, but is silent to wherein the cryptographic capability includes one or more of a cryptographic key lifetime, a cryptographic key length, or a cryptographic algorithm. However, Zeh discloses wherein the cryptographic capability includes one or more of a cryptographic key lifetime, a cryptographic key length, or a cryptographic algorithm (Zeh, see [0028], the first and second crypto compute processors are each configured to execute a cryptographic operation, which could be any symmetric cipher, asymmetric algorithm). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Zeh in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Zeh. One of ordinary skill in the art would have been motivated because it would allow to make modifications during a predetermined period of time until modification rights expire (Zeh – 0027).
Claim 24 is rejected under 35 U.S.C. 103 as being unpatentable over Kato (U.S. Publication 2015/0370704), hereinafter ‘Kato’ in view of Tiwari et al (U.S. Publication 2022/0100403), hereinafter ‘Tiwari’ and Beale (U.S. Publication 2015/0281336), hereinafter ‘Beale’.
As to claim 24, Kato in view of Tiwari & Haghighat discloses everything disclosed in claim 16, but is silent to wherein copying the portion of cache data to the second memory is a processor-bound operation. However, Beale discloses wherein copying the portion of cache data to the second memory is a processor-bound operation (Beale, see [0175], portions of the task can be offloaded to another computing system, wherein a task can be identified as portable if it is processor-bound and memory-bound in order to execute independently). Therefore, it would have been obvious to a person of ordinary skill in the art before the effective filing date of the claimed invention to modify Kato in view of Tiwari, Haghighat and Beale in order to further modify the method for a nonvolatile main memory unit from the teachings of Kato with the method for modular hybrid storage devices from the teachings of Tiwari with the method for provide enhanced function as a service to users from the teachings of Haghighat and the method of cryptographic diversity from the teachings of Beale. One of ordinary skill in the art would have been motivated because it would allow to offload resource utilization for procedures containing task that are identifiable as being portable/bound to a known set of computing resources (Beale – 0175).
Conclusion
Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a).
A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action.
Any inquiry concerning this communication or earlier communications from the examiner should be directed to TANIA M PENA-SANTANA whose telephone number is (571)270-0627. The examiner can normally be reached Monday - Friday 8am to 4pm EST.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Nicholas R Taylor can be reached at 5712723889. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/TANIA M PENA-SANTANA/Examiner, Art Unit 2443
/NICHOLAS R TAYLOR/Supervisory Patent Examiner, Art Unit 2443