Notice of Pre-AIA or AIA Status
1. The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claim Rejections - 35 USC § 103
2. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
3. Claims 1-6 are rejected under 35 U.S.C. 103 as being unpatentable over Kremer et al. Pat. No. US 12,481,675 B2 (hereafter Kremer) in view of Tsirkin Pub. No. US 2016/0124763 A1 (hereafter Tsirkin), and OGAWA et al. Pub. No. US 2023/0185489 A1 (hereafter Ogawa).
4. Regarding claim 1, Kremer teaches “A non-transitory machine-readable storage medium comprising instructions (Col 57, line 65 – Col 58, line 6)
that upon execution cause a processing system to: create a partition map that maps partitions of a data bucket to respective virtual processors executed in a cluster of computer nodes that are coupled to a shared storage system to store data of the data bucket (Col 16, line 11 – Col 17, line 57; Kremer teaches a cluster of storage nodes with entities (partitions) that map to authorities (virtual processors) using identifiers, hashes (see Col 20, lines 1-35 and Col 22, lines 42-62 for more explicit details), and/or segment numbers. Col 20, lines 45-65 mention the storage nodes all being connected, hence forming a storage cluster [Also see Fig. 1C, 1D, 2B]. Col 24, lines 3-12 explicitly state authorities being allocated partitions in flash memory/storage units and NVRAM (data buckets).
wherein portions of metadata for the data bucket are divided across the partitions (Col 18, lines 31-43; Kremer teaches that metadata of object buckets may be stored across storages);
responsive to a request to access a data object in the data bucket (Col 24, lines 20-23), identify which partition of the partitions contains metadata for the data object based on a key associated with the data object (Col 17, line 58 – Col 18, line 22; Kremer teaches a write request forwarded to a storage based on segment ID (key associated with data object) for data, then points to a corresponding authority. Col 58, lines 22-40; Kremer teaches the metadata of the object indicates the physical location in the storage resource. Also see Col 25, lines 6-24 and Fig. 2E),
and identify, based on the identified partition and using the partition map, a virtual processor that has the metadata for the data object (Col 16, line 49 – Col 17, line 40; Kremer teaches that metadata is owned by an authority, and can be located by calculating a hash value, pointing to a non-volatile state storage having the authority for the piece of data);
and responsive to a migration of a first virtual processor of the virtual processors from a first computer node to a second computer node of the cluster of computer nodes (Col 21, lines 20-35; Kremer teaches that authorities can be transferred between storage nodes and authority owners -- also referred to as a storage node in Col 18, line 54 – Col 19, line 3),
wherein the partition map remains unchanged in response to the migration of the first virtual processor from the first computer node to the second computer node (Col 24, lines 50-67 – Col 25, lines 1-5, Kremer teaches authorities migrating between blades [blades are also storage nodes as described in Col 13, lines 50-52], allowing them to manage the same storage partition from its new location, therefore would not require a map update/address change for partitions to authorities)”.
Kremer teaches that authorities control how and where data is stored in storage (Col. 16, lines 43-48). Kremer however does not explicitly teach that an authority is a virtual processor.
Tsirkin teaches that a virtual processor mapped to a location in a storage device such that it teaches authorities may be virtual processors ([0025] Hypervisor 125 can use virtual processor mapping table 127 to store cross reference information regarding which of the virtual processors 131-1 through 131-N of VM 130 are associated with shared device 190. Hypervisor 125 may store a unique identifier that is associated with each of the virtual processors 131-1 through 131-N, along with an identifier for the shared memory location of the associated shared device 190 for use by polling manager 128. If hypervisor 125 determines that a virtual processor of VM 130 needs to be reassigned to another physical processor as described below in FIG. 3, it may use virtual processor mapping table 127 to assist with identification of eligible physical processors. For example, if a virtual processor is associated with a shared device, and a host processor normally conducts polling of that shared device, then that host processor may not be deemed eligible to assume the load for all virtual processors since it could interfere with polling operations. Virtual processor mapping table 127 may be a memory location within hypervisor 125. Alternatively, virtual processor mapping table 127 may be written to a location in storage device 180).
It would have been obvious to a person of ordinary skill in the art before the effective filing date to combine the teachings of Tsirkin with the invention of Kremer to show that an authority is a virtual processor. A person having ordinary skill in the art would have been motivated to make this combination to allow for efficient access of memory/data from a component to a storage location. Together, Tsirkin in combination with Kremer teach every limitation of the claimed invention. Since the teachings were analogous art known at the filing time of invention, one of ordinary skill could have applied said teachings to achieve expected results.
Kremer teaches an authority-node map and migration of authorities (In Col. 20, lines 14-29, Kremer teaches that a function may assign authorities to storage nodes and create a list where the authorities are assigned. In Col 25, lines 1-5, Kremer teaches that when a blade is removed, the system redistributes the authorities among the remaining blades), however Kremer does not explicitly teach that in response to a migration, it updates a virtual processor-computer node map that maps the respective processors to corresponding computer nodes.
Ogawa teaches a map update such that it teaches the limitation “updates a virtual processor-computer node map that maps the respective processors to corresponding computer nodes ([0202] the first controller acquires the post-migration mapping information from the second controller, and updates the second mapping information by using the post-migration mapping information in a case where information that is in the second mapping information and is to be used for accessing the data in the predetermined storage area).”
It would have been obvious to a person of ordinary skill in the art before the effective filing date to combine the teachings of Ogawa to the combination of Kremer and Tsirkin to show that in response to a migration of an authority to another node, the mapping of the two would be updated to reflect the new location of an authority. A person having ordinary skill in the art would have been motivated to make this combination with a reasonable expectation of success to achieve data integrity and redundancy. Together, Ogawa in combination with Kremer and Tsirkin teach every limitation of the claimed invention. Since the teachings were analogous art known at the filing time of invention, one of ordinary skill could have applied said teachings to achieve expected results.
5. Regarding claim 2, wherein the combination Kremer teaches “The non-transitory machine-readable storage medium of claim 1, wherein the migration of the first virtual processor from the first computer node to the second computer node causes migration of one or more portions of the metadata associated with the first virtual processor from the first computer node to the second computer node (Col 24, lines 36-63; Kremer teaches that authorities are stateless, therefore they can cache active metadata and can migrate between blades. Also, Col 16, lines 49-66 explicitly state that every piece of metadata has an owner, referred to as an authority).”
6. Regarding claim 3, wherein the combination Kremer teaches “The non-transitory machine-readable storage medium of claim 2, wherein the migration of the first virtual processor from the first computer node to the second computer node is performed without performing movement of data owned by the first virtual processor between computer nodes of the cluster of computer nodes (Col 24, lines 50-63; Kremer teaches that when migrated, authorities still manage the same storage partitions from its new location, not requiring the storage partitions to move with the authority).”
7. Regarding claim 4, wherein the combination Kremer teaches “The non-transitory machine-readable storage medium of claim 1, wherein: prior to the migration of the first virtual processor, a first request for a first data object associated with a first key maps, based on the partition map, to the first virtual processor on the first computer node (Col 17, lines 58-67 – Col 18, lines 1-22; Kremer teaches a request to write to data (data object) determined by segment ID (key associated with data object), then maps to a corresponding authority on the storage node), and after the migration of the first virtual processor, a second request for the first data object associated with the first key maps, based on the partition map, to the first virtual processor on the second computer node (Col 24, lines 50-67 – Col 25 lines 1-5; Kremer teaches that even after migration, authorities still fulfill the client requests that endpoints directly to them, managing the same storage partition such that if a second request for the same data object with the first key were requested, it would still go to the same processor on a different node).”
8. Regarding claim 5, wherein the combination Kremer teaches “The non-transitory machine-readable storage medium of claim 4, wherein the instructions upon execution cause the processing system to: in response to the first request, obtain metadata for the first data object from the first virtual processor on the first computer node (Col 24, lines 20-23);
and in response to the second request, obtain the metadata for the first data object from the first virtual processor on the second computer node (Col 24, line 20 – Col 25, lines 1-5; As Kremer previously taught in claim 4, the authority still manages the same storage partition after moving, therefore in the mentioned column, the authority would obtain still obtain metadata stored in that storage even on a different node).”
10. Regarding claim 6, wherein the combination Kremer teaches “The non-transitory machine-readable storage medium of claim 1, wherein the instructions upon execution cause the processing system to: apply a function on a first portion of the key associated with the data object to obtain a value; and use the value to identify the partition that contains the metadata for the data object.” (Col 16, line 49 - Col 17, line 57; Kremer teaches an entity identifier being hashed or applying a bit mask to map it to an authority, which in turn maps to a partition based on the hashed ID).
11. Claims 7-9, and 11 are rejected under 35 U.S.C. 103 as being unpatentable over Kremer in view of Tsirkin and Ogawa as applied to claims 1-5 above and in further view of Schlegal et al. Pub. No. US 202/0348933 A1 (hereafter Schlegal).
12. Regarding claim 7, the combination does not explicitly teach that a portion of the key is a prefix.
Schlegal explicitly teaches that keys are split up into prefixes and suffixes such that it teaches the limitation “The non-transitory machine-readable storage medium of claim 6, wherein the first portion of the key is a prefix of the key the prefix of the key being less than an entirety of the key.” ([0058] For example, if 100 8-byte key values that are split up in a 6-byte prefix value and a 2-byte suffix value all share the same prefix value, then about 32 bytes are required to store the prefix value in the prefix hash table and the prefix heap and 200 bytes are required for storing the suffix values).
It would have been obvious to a person of ordinary skill in the art before the effective filing date to combine the teachings of Schlegal to the combination of Kremer, Tsirkin, and Ogawa to show that a first portion of a key is a prefix, that prefix being less than the entirety of a key. A person having ordinary skill in the art would have been motivated to make this combination with a reasonable expectation of success to show that prefixes can be less than an entirety of a key. Together, Schlegal with the combination teaches every limitation of the claimed invention. Since the teachings were analogous art known at the filing time of invention, one of ordinary skill could have applied said teachings to achieve expected results.
13. Regarding claim 8, wherein the combination Kremer does not explicitly teach the storing configuration information indicating a length of the prefix.
Wherein the combination Schlegal teaches storing prefixes in a prefix hash table such that it teaches “The non-transitory machine-readable storage medium of claim 7, wherein the instructions upon execution cause the processing system to: store configuration information indicating a length of the prefix ([0044] In this example, the prefix length is set to 2 bytes while the suffix length is set to one byte for illustration purposes. All values are represented as hexadecimal numbers, i.e., each value starts with 0x followed by either two or four numbers that represent one or two bytes, respectively. Also see at least Figure 3 & [0044-0045]).”
It would have been obvious to a person of ordinary skill in the art before the effective filing date to combine a further teaching of Schlegal to the combination to show as evidence that the combination may include storing configuration information containing prefix lengths. A person having ordinary skill in the art would have been motivated to make this combination with a reasonable expectation of success to increase the workflow for performing key searches. Together, the combination teaches every limitation of the claimed invention. Since the teachings were analogous art known at the filing time of invention, one of ordinary skill could have applied said teachings to achieve expected results.
13. Regarding claim 9, wherein the combination Schlegal teaches different prefix lengths for different suffixes such that it teaches the limitation “The non-transitory machine-readable storage medium of claim 8, wherein the configuration information indicates different lengths of prefixes for different data buckets ([0042] The number of suffix d-heaps depends on the number of unique prefix values for all key values indexed in the generic vectorized d-heap. Thus, there is one suffix d-heap for each prefix value. Also see figure 3).”
14. Regarding claim 11, wherein the combination Kremer teaches “The non-transitory machine-readable storage medium of claim 6, wherein the data object is a first data object, the data bucket is a first data bucket (Col 58, lines 22-40; Kremer teaches objects and buckets for storing objects. There may be a plurality such that there may be a first object and first data bucket),
and the instructions upon execution cause the processing system to: apply a function on … a key associated with a … data object in a … data bucket to obtain a … value (Col 16, line 49 - Col 17, line 57), and use the … value to identify another partition that contains metadata for the … data object (Col 24, line 20 – Col 25, lines 1-5).”
Kremer does not explicitly teach a second data object with a key associated in comparison of a first data object’s key, only a plurality of objects having keys associated with them.
Schlegal explicitly teaches a table representing multiple prefixes being hashed to obtain a reference to corresponding suffixes such that it teaches the limitation “apply a function on a first portion of a key associated with a second data object in a second data bucket to obtain a second value ([0043] In an embodiment, a C++ standard template library ‘unordered map’ is used to implement prefix hash tables where the key value being hashed is the prefix value and the prefix value, through a hash function, includes reference to a suffix d-heap), wherein a length of the first portion of the key associated with the second data object in the second data bucket is different from a length of the first portion of the key associated with the first data object in the first data bucket (Figure 3, [0044-0045]).
It would have been obvious to a person of ordinary skill in the art before the effective filing date to combine a further teaching of Schlegal to combination to show as evidence that a prefix of key to a first data object is of different length to that of a prefix of a key to a second data object, pointing to their respective data locations buckets. A person having ordinary skill in the art would have been motivated to make this combination with a reasonable expectation of success to show what data is associated with a particular length prefix. Together, the combination teaches every limitation of the claimed invention. Since the teachings were analogous art known at the filing time of invention, one of ordinary skill could have applied said teachings to achieve expected results.
15. Claim 10 is rejected under 35 U.S.C. 103 as being unpatentable over Kremer in view of Tsirkin and Ogawa as applied to claims 1, 6 and 7 and Schlegal as applied in claims 6 and 7 above, and in further view of MANJANATHA et al. Pub. No. WO/2022/220830 (hereafter Manjanatha).
16. Regarding claim 10, the wherein combination Schlegal teaches that prefixes associated with different destinations with the same prefix may map to the same suffix heap such that it teaches “The non-transitory machine-readable storage medium of claim 7, wherein different keys associated with respective data objects that share a same prefix map to a same partition of the partitions ([0042] Each suffix d-heap hold the suffix values of the key values stored in the generic vectorized d-heap. Suffix d-heaps are used to quickly obtain suffix values in order of priority. A single suffix d-heap contains all suffix values of key values that share the same prefix value. [0045] Key values 0x000101, 0x000103, 0x000110, 0x000124, 0x000141, and 0x000138 share a prefix 0x0001 and thus the key values' respective suffix values are stored in the same suffix d-heap).”
The combination does not teach performing a range query at virtual processors mapped to a partition associated with the range of keys.
Manjanatha teaches querying a service for a partition key space range such that it teaches “the instructions upon execution cause the processing system to: perform a range query for a range of keys at one or more virtual processors mapped to a partition associated with the range of keys ([0056] the metadata gateway services 416 may subsequently look up the entry by directly querying the remote metadata gateway service 440 or 442 for that partition key space range, and may respond to the end user when the lookup completes successfully).”
It would have been obvious to a person of ordinary skill in the art before the effective filing date to combine the teaching of Manjanatha to the combination to show as evidence that a virtual processor may perform a query of key ranges to determine if a key exists at a current location. A person having ordinary skill in the art would have been motivated to make this combination with a reasonable expectation of success to validate data requests made to virtual processors. Together, Manjanatha with the combination teaches every limitation of the claimed invention. Since the teachings were analogous art known at the filing time of invention, one of ordinary skill could have applied said teachings to achieve expected results.
17. Claims 12 and 16 are rejected under 35 U.S.C. 103 as being unpatentable over Kremer in view of Tsirkin and Ogawa as applied to claim 1, 14 and in addition to Schlegal as applied to 14, and in further view of MANJANATHA et al. Pub. No. WO/2022/220830 (hereafter Manjanatha).
18. Regarding claim 12, the combination does not explicitly teach migration of a partition due to a hotspot.
Manjanatha teaches the migration of a partition to another computing device due to it being overloaded and updating a partition map in response such that it teaches the limitation “The non-transitory machine-readable storage medium of claim 1, wherein the instructions upon execution cause the processing system to: in response to detecting a metadata hotspot at a given virtual processor, migrate a first partition of the partitions from the given virtual processor to another virtual processor; and update the partition map in response to the migration of the first partition ([0062] For instance, if the frequency of access load 614 of a particular partition or to a number of partitions hosted by particular ones of the service computing devices 202 exceeds a threshold amount over a specified period of time, the service computing device(s) 202 may be overloaded and accordingly, one or more partitions may be split and migrated to other computing devices. The decision to split and migrate a partition may also be based on the amount of remaining storage space available on respective ones of the service computing devices 202. [0063] A split operation for splitting a selected partition initially just results in an update to the respective local partition map. See [0062 - 0065] for full details).”
It would have been obvious to a person of ordinary skill in the art before the effective filing date to combine the teaching of Manjanatha to the combination to show as evidence that in response to an overloaded virtual processor, a migration of a partition from the virtual processor to another may occur. A person having ordinary skill in the art would have been motivated to make this combination with a reasonable expectation of success to achieve load balancing, and allow users to access metadata that is physically closer to them to reduce latency times (Manjanatha [0030]). Together, Manjanatha with the combination teaches every limitation of the claimed invention. Since the teachings were analogous art known at the filing time of invention, one of ordinary skill could have applied said teachings to achieve expected results.
19. Claim 16 has similar limitations to claim 12 and is rejected for similar reasons.
20. Claim 13 is rejected under 35 U.S.C. 103 as being unpatentable over Kremer in view of Tsirkin and Ogawa as applied to claims 1 above, and in further view of Gupta et al. Pat. No. US 11,226,905 B2 (hereafter Gupta).
21. Regarding claim 13, wherein the combination Kremer teaches creating a partition map; the mapping of entities to authorities (Col 16, line 11 – Col 17, line 57).
Kremer does not teach creating the map in response to the generation of receipt of a data bucket.
Gupta teaches creating bucket and allocating a region to a bucket, creating map entries such that it teaches the limitation “The non-transitory machine-readable storage medium of claim 1, wherein the instructions upon execution cause the processing system to: create the partition map in response to generation or receipt of the data bucket to be stored in the shared storage system (Col 14, lines 3-31).”
It would have been obvious to a person of ordinary skill in the art before the effective filing date to combine the teaching of Gupta to the combination to show as evidence that a map is created in response to adding, creating, or allocating a region for a bucket. A person having ordinary skill in the art would have been motivated to make this combination with a reasonable expectation of success to dynamically allocate buckets and maintain a consistent mapping. Together, Gupta with the combination teaches every limitation of the claimed invention. Since the teachings were analogous art known at the filing time of invention, one of ordinary skill could have applied said teachings to achieve expected results.
22. Claims 14, 15, 17, and 18 are rejected under 35 U.S.C. 103 as being unpatentable over Kremer et al. Pat. No. US 12,481,675 B2 (hereafter Kremer) in view of Tsirkin Pub. No. US 2016/0124763 A1 (hereafter Tsirkin), OGAWA et al. Pub. No. US 2023/0185489 A1 (hereafter Ogawa), and Schlegal et al. Pub. No. US 202/0348933 A1 (hereafter Schlegal).
23. Claim 14 has similar limitations to claims 1, 6, and 11 and is rejected for similar reasons. Claim 14 is directed towards “A system comprising: a cluster of computer nodes to execute a plurality of virtual processors, (Kremer, Col 25, lines 6-24)
wherein the cluster of computer nodes is to store: a first partition map that maps partitions of a first data bucket to a first subset of virtual processors, wherein portions of metadata for the first data bucket are divided across the partitions of the first data bucket,
and a second partition map that maps partitions of a second data bucket to a second subset of virtual processors, wherein portions of metadata for the second data bucket are divided across the partitions of the second data bucket; and a shared storage system accessible by the cluster of computer nodes to store data of the first and second data buckets (Kremer, Col 16, line 11 – Col 17, line 57 & Col 18, lines 31-43 & Col 20, lines 45-65 & Col 24, lines 3-12),
wherein a first virtual processor in the cluster of computer nodes is to: responsive to a request to access a first data object in the first data bucket, identify a first given partition of the partitions of the first data bucket that contains metadata for the first data object based on a first portion of a first key associated with the first data object, (Kremer Col 17, line 58 – Col 18, line 22)
and identify, based on the first given partition and using the first partition map, a virtual processor that has the metadata for the first data object, (Kremer, Col 16, line 49 – Col 17, line 40)
wherein a second virtual processor in the cluster of computer nodes is to: responsive to a request to access a second data object in the second data bucket, identify a second given partition of the partitions of the second data bucket that contains metadata for the second data object based on a second portion of a second key associated with the second data object, (Kremer Col 17, line 58 – Col 18, line 22)
wherein the second portion of the second key is of a different length than the first portion of the first key, (Schlegal, Figure 3, [0044-0045])
and identify, based on the second given partition and using the second partition map, a virtual processor that has the metadata for the second data object (Kremer, Col 16, line 49 – Col 17, line 40).”
24. Claim 15 has similar limitations to claim 1 and is rejected for similar reasons. Claim 15 is directed towards “The system of claim 14, wherein a first computer node of the cluster of computer nodes is to: migrate the first virtual processor from the first computer node to a second computer node of the cluster of computer nodes, (Kremer, Col 21, lines 20-35)
and update a virtual processor-computer node map that maps the virtual processors of the first subset of virtual processors to corresponding computer nodes of the cluster of computer nodes, (Kremer, Col. 20, lines 14-29 & Col 25, lines 1-5 & Ogawa [0202])
wherein the first partition map remains unchanged in response to the migration of the first virtual processor from the first computer node to the second computer node (Kremer, Col 24, lines 50-67 – Col 25, lines 1-5).”
25. Claim 17 has similar limitations to claim 6 and is rejected for similar reasons. Claim 17 is directed towards “The system of claim 14, wherein the identifying of the first given partition of the partitions of the first data bucket that contains metadata for the first data object is based on applying a hash function on the first portion of the first key associated with the first data object, and wherein the identifying of the second given partition of the partitions of the second data bucket that contains metadata for the second data object is based on applying the hash function on the second portion of the second key associated with the second data object (Kremer, Col 16, line 49 - Col 17, line 57 – Col 18 line 22).”
26. Claim 18 has similar limitations to claim 6 and is rejected for similar reasons. Claim 18 is directed towards “The system of claim 17, wherein the first portion of the first key is a first prefix of the first key, and the second portion of the second key is a second prefix of the second key (Schlegal [0058]).”
27. Claims 19 and 20 are rejected under 35 U.S.C. 103 as being unpatentable over Kremer et al. Pat. No. US 12,481,675 B2 (hereafter Kremer) in view of Tsirkin Pub. No. US 2016/0124763 A1 (hereafter Tsirkin), OGAWA et al. Pub. No. US 2023/0185489 A1 (hereafter Ogawa), Schlegal et al. Pub. No. US 202/0348933 A1 (hereafter Schlegal), and Gupta et al. Pat. No. US 11,226,905 B2 (hereafter Gupta).
28. Claim 19 has similar limitations to claims 1 and 13, and is rejected for similar reasons. Claim 19 is directed towards “A method of a system comprising a hardware processor, comprising: (Kremer, Col 15, lines 49-59)
receiving a request to create a data bucket; (Gupta, Col 10, lines 57 – 67)
in response to the request to create the data bucket, creating a partition map that maps partitions of the data bucket to respective virtual processors executed in a cluster of computer nodes (Kremer, Col. 20, lines 14-29) that are coupled to a shared storage system to store data of the data bucket (Kremer, Col 20, lines 45-65), wherein portions of metadata for the data bucket are divided across the partitions (Kremer, Col 18, lines 31-43);
receiving a request to access a data object in the data bucket (Kremer, Col 4, lines 64-67);
in response to the request to access the data object in the data bucket, identifying which partition of the partitions contains metadata for the data object based on applying a function on a key associated with the data object, (Kremer, Col 17, line 58 – Col 18, line 22
and identifying, based on the identified partition and using the partition map, a virtual processor that has the metadata for the data object; (Kremer, Col 16, line 49 – Col 17, line 40
and responsive to a migration of a first virtual processor of the virtual processors from a first computer node to a second computer node of the cluster of computer nodes (Kremer, Col 21, lines 20-35), updating a virtual processor-computer node map that maps the respective virtual processors to corresponding computer nodes of the cluster of computer nodes, (Kremer, Col 25, lines 1-5 & Ogawa [0202])
wherein the partition map remains unchanged in response to the migration of the first virtual processor from the first computer node to the second computer node (Kremer, Col 24, lines 50-67 – Col 25, lines 1-5).”
29. Claim 20 has similar limitations to claim 8 and is rejected for similar reasons. Claim 20 is directed towards “The method of claim 19, further comprising: accessing configuration information in the cluster of computer nodes to determine a length of a portion of the key on which the function is to be applied. (Schlegal, [0043-0045], Fig 3).”
Conclusion
30. Any inquiry concerning this communication or earlier communications from the examiner should be directed to BRANDON A NGUYEN whose telephone number is (571)272-6074. The examiner can normally be reached Mon-Fri (10am-6pm).
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Aimee Li can be reached at (571) 272-4169. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/BRANDON NGUYEN/Examiner, Art Unit 2195
/Aimee Li/Supervisory Patent Examiner, Art Unit 2195