DETAILED ACTION
1. This office action is in the reply to an application No. 18/745,920 filed on June 17, 2024. Claims 1-20 are submitted for examination. 1, 14 and 18 are independent.
Notice of Pre-AIA or AIA Status
2. The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Priority
3. This application filed on filed on 06/17/2024 is a Continuation of application No. 17571338, filed on 01/07/2022, now U.S. Patent # 12050678.
Information Disclosure Statement
4. The information disclosure statements (IDS) submitted on June 17, 2024 has been considered. The submission is in-compliance with the provisions of 37 CFR 1.97. Form PTO-1449 is signed and attached hereto.
Drawings
5. The drawings filed on June 17, 2024 are accepted.
Specification
6. The specification filed on June 17, 2024 is also accepted.
Examiner Note: The scope of the claims in this application is compared with the parent application (Patent No. 12050678) and it is found to be distinct. Thus, no double patenting rejection is warranted at this time of the prosecution.
Claim Rejections - 35 USC § 102
7. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action:
A person shall be entitled to a patent unless –
(a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale or otherwise available to the public before the effective filing date of the claimed invention.
(a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention.
8. Claims 1-3, 14-15, 18-19 are rejected under 35 U.S.C. 102 (a)(1) and/or 102 (a)(2) as being anticipated by Graser et al. (Graser) (US Patent Publication No. 2008/0276308-A1, Pub. Date: Nov 6, 2008)
The following is referring to independent claims 1, 14 and 18:
As per independent claim 1, Graser discloses one or more non-transitory, computer-readable media having instructions stored thereon, wherein the instructions, when executed by a computing system, cause the computing system to: [Para. 0033, the method mentioned above is performed by a computer program product stored on a computer usable medium comprising computer readable program means for causing a computer to perform the method mentioned above, when said computer program product is executed on a computer]:
identify a termination associated with an access of a secured entity [Figure 1, step d, “Session closed?” and Para. 0045, “step d) a verification takes place, if the session is still active, or if the session is closed; On Figure 1, Step d, the system identifies whether or not the session associated with an access of the distributed computer system is terminated/closed or still active for a client device. Examiner Note: the distributed computer system as disclosed on para. 0029, comprises of first and second security zones that are accessed by using two different passwords which are cached in a cache memory. Note: Either the first security zone or/and the second security zone of the distributed system meets the limitation “Secured entity” Para. 0029, the distributed computer system includes first and second security zones. distributed computer system comprises at least two different security zones, wherein systems located in different security zones are only accessible by different passwords. To access a system located in a first security zone, the user has to enter a first password. The first password is cached and the cached first password is re-used to access other systems located in the first security zone accessible by the same first password. To access a system located in a second security zone the user is asked to enter a second password that again is cached and is re-used to access other systems of the second security zone accessible by the same second password ] for a client device [Figure 1, Step b, Para. 0043, Figure 1, Step b, Para. 0043, Opening a session takes place e.g. by starting a user terminal of the distributed computer system, “user terminal” meets the limitation client device, Figure 1, step b) a user opens a session by accessing a first system of the distributed computer system. Opening a session takes place e.g. by starting a user terminal of the distributed computer system, by starting an application, by accessing a server of the distributed computer system and the like.]
identify a credential stored for the client device [Figure 1, step g, where the “cached password” which are stored for the client device is identified to be re-used. Para. 0029, The first password is cached and the cached first password is re-used to access other systems located in the first security zone accessible by the same first password….To access a system located in a second ….a second password that again is cached and is re-used to access other systems of the second security zone accessible by the same second password and para. 0023, caching’ means a non-persistent storage like e.g. in a Random Access Memory (RAM) and the like in contrast to a persistent storage like e.g. in a database, a disk-storage and the like] the credential to be utilized for accessing the secured entity on behalf of the client device [Figure 1, step. e-f and g, and para. 0029 where the system on behalf of the client device checks whether or not the cached password can be utilized or re-used for accessing other systems in the same security zone using the same cached password/stored in the cache memory…]; and
delete the credential from storage based at least in part on the identification of the termination [Figure 1, step i, which is executed after steps e., f and g, where the system after re-using the stored credential/cached password as shown on figure 1, step g, if the session is closed step d then the system will erase the credential /cached password form the cache memory as shown on figure 1, step i. Para. 0051, If step d) leads to the result, that the session is closed, the method proceeds with step i) wherein the cached passwords are deleted by erasing the cache]
Examiner Note: Examiner also would like to point out that (Ichikawa) (US Publication No. US-2009/0222896-A1, Pub. Date: Sep. 3, 2009) which is cited at the end of this office action also discloses the claim limitation: “identify a termination associated with an access of a secured entity for a client device [See at least claim 42, wherein the client terminal further includes a notification sending unit that sends, to the administration server, a notification of termination of access to the specific storage unit] and delete the credential from storage based at least in part on the identification of the termination” [Claim 42, and the administration server further includes a deleting unit that deletes, upon receiving the notification from the client terminal, the second password/credential from the database.]
As per independent claim 14, Graser a computing system [Claim 6, System for securely accessing a plurality of systems comprising,], comprising: memory to store one or more credentials [Par. 0011 and Claim 6, caching said password in a way that during the current session, it can be re-used when accessing other systems of the distributed computer system accessible by the same password and para. 0023, caching’ means a non-persistent storage like e.g. in a Random Access Memory (RAM) and the like…]; and one or more processors coupled to the memory, the one or more processors to [Para. 0011, “distributed computer system” and figure 1-2, Note: distributed computer system comprises a processors and memories] and
identify a termination associated with an access of a secured entity [Figure 1, step d, “Session closed?” and Para. 0045, “n step d) a verification takes place, if the session is still active, or if the session is closed/termination; On Figure 1, Step d, the system identifies whether or not the session associated with an access of the distributed computer system is closed or still active for a client device. Examiner Note: the distributed computer system as disclosed on para. 0029, comprises of first and second security zones that are accessed by using two different passwords which are cached in a cache memory. Note: Either the first security zone or/and the second security zone of the distributed system meets the limitation “Secured entity” Para. 0029, the distributed computer system includes first and second security zones. distributed computer system comprises at least two different security zones, wherein systems located in different security zones are only accessible by different passwords. To access a system located in a first security zone, the user has to enter a first password. The first password is cached and the cached first password is re-used to access other systems located in the first security zone accessible by the same first password. To access a system located in a second security zone the user is asked to enter a second password that again is cached and is re-used to access other systems of the second security zone accessible by the same second password] for a client device [Figure 1, Step b, Para. 0043, Opening a session takes place e.g. by starting a user terminal of the distributed computer system, “user terminal” that meets the limitation client device, Figure 1, step b) a user opens a session by accessing a first system of the distributed computer system. Opening a session takes place e.g. by starting a user terminal of the distributed computer system, by starting an application, by accessing a server of the distributed computer system and the like.]
identify a credential stored in the memory for the client device [Figure 1, step g, where the “cached password” which are stored for the client device is identified to be re-used. Para. 0029, The first password is cached and the cached first password is re-used to access other systems located in the first security zone accessible by the same first password….To access a system located in a second ….a second password that again is cached and is re-used to access other systems of the second security zone accessible by the same second password and para. 0023, caching’ means a non-persistent storage like e.g. in a Random Access Memory (RAM) …]the credential to be utilized for accessing the secured entity on behalf of the client device [Figure 1, step. e-f and g, and para. 0029, where the system on behalf of the client device checks whether or not the cached password can be utilized or re-used for accessing other systems in the same security zone using the same cached password/stored in the cache memory…]; and
delete the credential from the memory based at least in part on the identification of the termination[Figure 1, step i, which is executed after steps e., f and g, where the system after re-using the stored credential/cached password as shown on figure 1, step g, identify or checks steps d for session closure and if the session is closed at figure 1, step d then the system will erase the credential /cached password form the cache memory as shown on figure 1, step i. Para. 0051, If step d) leads to the result, that the session is closed, the method proceeds with step i) wherein the cached passwords are deleted by erasing the cache]
Examiner Note: Examiner also would like to point out that (Ichikawa) (US Publication No. US-2009/0222896-A1, Pub. Date: Sep. 3, 2009.) which is cited at the end of this office action also discloses the claim limitation: “identify a termination associated with an access of a secured entity for a client device [See at least claim 42, wherein the client terminal further includes a notification sending unit that sends, to the administration server, a notification of termination of access to the specific storage unit] and delete the credential from storage based at least in part on the identification of the termination” [Claim 42, and the administration server further includes a deleting unit that deletes, upon receiving the notification from the client terminal, the second password/credential from the database.]
As per independent claim 18, Graser discloses a method of managing a credential for a client device [Para. 0010, An object of the invention is to improve security of SSO/Single Sign On products and of distributed computer systems providing password protections. On para. 0029, it has been described how the system manages for the client device/users to use two distinct passwords/credentials to access secure entities located in two different security zones respectively. “To access a system located in a first security zone, the user has to enter a first password. The first password is cached and the cached first password is re-used to access other systems located in the first security zone accessible by the same first password. To access a system located in a second security zone the user is asked to enter a second password that again is cached and is re-used to access other systems of the second security zone accessible by the same second password.”], comprising:
identify a termination associated with an access of a secured entity [Figure 1, step d, “Session closed?” and Para. 0045, “n step d) a verification takes place, if the session is still active, or if the session is closed; On Figure 1, Step d, the system identifies whether or not the session associated with an access of the distributed computer system is closed or still active for a client device. Examiner Note: the distributed computer system as disclosed on para. 0029, comprises of first and second security zones that are accessed by using two different passwords which are cached in a cache memory. Note: Either the first security zone or/and the second security zone of the distributed system meets the limitation “Secured entity” Para. 0029, the distributed computer system includes first and second security zones. distributed computer system comprises at least two different security zones, wherein systems located in different security zones are only accessible by different passwords. To access a system located in a first security zone, the user has to enter a first password. The first password is cached and the cached first password is re-used to access other systems located in the first security zone accessible by the same first password. To access a system located in a second security zone the user is asked to enter a second password that again is cached and is re-used to access other systems of the second security zone accessible by the same second password. Examiner Note: ] for a client device [Figure 1, Step b, Para. 0043, Figure 1, Step b, Para. 0043, Opening a session takes place e.g. by starting a user terminal of the distributed computer system, “user terminal” meets the limitation client device, Figure 1, step b) a user opens a session by accessing a first system of the distributed computer system. Opening a session takes place e.g. by starting a user terminal of the distributed computer system, by starting an application, by accessing a server of the distributed computer system and the like.]
identify a credential stored for the client device [Figure 1, step g, where the “cached password” which are stored for the client device is identified to be re-used. Para. 0029, The first password is cached and the cached first password is re-used to access other systems located in the first security zone accessible by the same first password….To access a system located in a second ….a second password that again is cached and is re-used to access other systems of the second security zone accessible by the same second password and para. 0023, caching’ means a non-persistent storage like e.g. in a Random Access Memory (RAM) and the like in contrast to a persistent storage like e.g. in a database, a disk-storage and the like] the credential to be utilized for accessing the secured entity on behalf of the client device [Figure 1, step. e-f and g, and para. 0029, where the system on behalf of the client device checks whether or not the cached password can be utilized or re-used for accessing other systems in the same security zone using the same cached password/stored in the cache memory…]; and
deleting the credential from storage based at least in part on the identification of the termination [Figure 1, step i, which is executed after steps e., f and g, where the system after re-using the stored credential/cached password as shown on figure 1, step g, checks step d for session closure and if the session is closed then the system will erase the credential /cached password form the cache memory as shown on figure 1, step i. Para. 0051, If step d) leads to the result, that the session is closed, the method proceeds with step i) wherein the cached passwords are deleted by erasing the cache]
Examiner Note: Examiner also would like to point out that (Ichikawa) (US Publication No. US-2009/0222896-A1, Pub. Date: Sep. 3, 2009.) which is cited at the end of this office action also discloses the claim limitation: “identify a termination associated with an access of a secured entity for a client device [See at least claim 42, wherein the client terminal further includes a notification sending unit that sends, to the administration server, a notification of termination of access to the specific storage unit] and delete the credential from storage based at least in part on the identification of the termination” [Claim 42, and the administration server further includes a deleting unit that deletes, upon receiving the notification from the client terminal, the second password/credential from the database.]
The following is referring to dependent claims 2-3; 15 and 19:
As per dependent claim 2 Graser discloses the non-transitory computer readable medium/system/method as applied to claim 1 above. Furthermore, Graser discloses the method, wherein the termination includes a completion of an action performed on behalf of the client device [Para. 0021, where closing a document or quitting an application is completion of an action performed on behalf of the user/client with triggers session closure or session termination. “Quitting a systems accessed during the session can take place e.g. automatically by a timeout, by closing a document or by quitting an application”]
Examiner Note: Ichikawa, which is cited at the end of this office action also discloses the claim limitation: “wherein the termination includes a completion of an action performed on behalf of the client device [See at least claim 42, wherein the termination includes a completion of an action such as a deletion of a password by an administration server on behalf of the client device. “ the client terminal further includes a notification sending unit that sends, to the administration server, a notification of termination of access to the specific storage unit, and the administration server further includes a deleting unit that deletes, upon receiving the notification from the client terminal, the second password from the database”.]
As per dependent claim 3 Graser discloses the non-transitory computer readable medium/system/method as applied to claim 1 above. Furthermore, Graser discloses the method, wherein the termination includes an end of a session of the client device [Para. 0045, figure 1, step d and I, step d) a verification takes place, if the session is still active, or if the session is closed. If the session is still active, the method proceeds with step e), if the session is closed, e.g. by quitting all systems of the distributed computer system, the method proceeds with step i)]
As per dependent claim 15, dependent claim 15 is a system version of the medium claims 2-3, having the same scope as that of the above dependent claims 2-3. Thus, is rejection for the same reason/rationale as that of the above dependent claims 2-3.
As per dependent claim 19, dependent claim 19 is a method version of the medium claims 2-3, having the same scope as that of the above dependent claims 2-3. Thus, is rejection for the same reason/rationale as that of the above dependent claims 2-3.
The following is referring to dependent claims 4-11; 16-17 and 20:
9. Claims 4-11, 16-17 and 20 are rejected under 35 U.S.C. 103 as being unpatentable over Graser et al. (Graser) (US Patent Publication No. 2008/0276308-A1, Pub. Date: Nov 6, 2008)
in view of Simon Dominic Copsey (herein after referred as Copsey) (US Publication No. 2015/0012990 A1; Pub. Date: Jan 8, 2015)
As per dependent claim 4 Graser discloses the non-transitory computer readable medium/system/method as applied to claim 3 above.
Graser doesn’t explicitly disclose the limitation, “wherein the credential is generated at a start of the session”
However, Copsey on para. 0056-0057 and 0059 discloses that at the start of session (initial startup of the app) the system detects no existing login identifier and therefore generates and returns a new login identifier/credential and this corresponds to the claim limitation, “wherein the credential is generated at a start of the session” [See parts of Para. 0056-0057 and 0059, “when a user of computing device 210 wishes to utilize an application 212 a on his computing device 210 he may activate the application (e.g., tapping or clicking on an icon, using a command on a command line, etc.). At some point during execution of the application 212 a then (e.g., on initial startup of the application 212 a, when the application 212 a first requires particular data, etc.) the application 212 a may require access to content provisioning module 222. [Para. 0056] “The access enabler module 214 a may then send a request to access that application data (e.g., a request to access the content or other data associated with that application 212 a) to content provisioning module 222, where the request includes a device identifier”[Para. 0057] “If there is no login tracking data 246 associated with the device identifier included in the received request, a request for a user credential along with a login identifier to allow access to the content provisioning module 222 ….returned to the access enabler module 214 a from which the initial access request was received. [Para. 0059]
Graser and Copsey are analogous/in the same field of endeavor as they both are directed to controlling access to a secure storage devices by using credential.
It would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to implement in the system of Graser, a credential generation mechanism or a feature such as “wherein the credential is generated at a start of the session” as per teaching of Copsey to enhance the security of the system by reducing risk of credential theft and even if a session credential is compromised, the attacker has a limited time window of access and the breach cannot be used to access the systems after the session expires. [Copsey, para. 0006, method includes expiring the login identifier]
As per dependent claim 5 Graser discloses the non-transitory computer readable medium/system/method as applied to claim 3 above.
Graser doesn’t explicitly disclose the limitation, “wherein the credential is maintained separate from the client device without the client device having access to the credential”
However, Copsey on para. 0061 discloses that the login identifier/credential is stored in login tracking data figure 2, ref. 246 on the proxy platform shown on figure 2, ref. 240 not on client device which corresponds to the claim limitation: wherein the credential is maintained separate from the client device without the client device having access to the credential [Para. 0061,” the user credentials can be authenticated access module 242 stores this login identifier in association with the device identifier (e.g., associated with computing device 210) received in the initial access request in login tracking data 246”]
Graser and Copsey are analogous/in the same field of endeavor as they both are directed to controlling access to a secure storage devices by using credential.
It would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to implement in the system of Graser, a credential storing mechanism or a feature such as “wherein the credential is maintained separate from the client device without the client device having access to the credential” as per teaching of Copsey to enhance the security of the system by minimizing exposure to client-side vulnerabilities, maintains central management, and ensures a more robust overall system architecture. [See Copsey, Para. 0061 and at least figure 2, how the credentials are stored in login tracking data figure 2, ref. 246 on the proxy platform shown on figure 2, ref. 240]
As per dependent claim 16, dependent claim 16 is a system version of the medium claim 5, having the same scope as that of the above dependent claim 5. Thus, is rejection for the same reason/rationale as that of the above dependent claim 5.
As per dependent claim 6 Graser discloses the non-transitory computer readable medium/system/method as applied to claim 1 above.
Graser doesn’t explicitly disclose the limitation, “coordinate with the secured entity to generate the credential for access to the secured entity; and store the credential with association to the client device without providing the credential to the client device”.
However, Copsey discloses: coordinate with the secured entity to generate the credential for access to the secured entity [Para. 0055; 0057-0058 and 0060 shows that the proxy system 240 and access module 242 as broker and the platform 220/content provisioning module 222 that corresponds to secure entity. The device identifier 218 corresponds to the claim limitation client ID. Copsey on these paragraphs shows the broker sending the client ID to the secured platform authenticate and generate a login identifier/credential] and store the credential with association to the client device without providing the credential to the client device [Para. 0061,” the user credentials can be authenticated access module 242 stores this login identifier in association with the device identifier (e.g., associated with computing device 210) received in the initial access request in login tracking data 246”. Note: para. 0061 discloses that the login identifier/credential is stored in login tracking data figure 2, ref. 246 on the proxy platform shown on figure 2, ref. 240 not on client device which corresponds to the claim limitation]
Graser and Copsey are analogous/in the same field of endeavor as they both are directed to controlling access to a secure storage devices by using credential.
It would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to implement in the system of Graser, a credential storing mechanism or a feature such as “coordinate with the secured entity to generate the credential for access to the secured entity; and store the credential with association to the client device without providing the credential to the client device” as per teaching of Copsey to enhance the security of the system by minimizing exposure to client-side vulnerabilities, maintains central management, and ensures a more robust overall system architecture. [See Copsey, Para. 0061 and at least figure 2, how the credentials are stored in login tracking data figure 2, ref. 246 on the proxy platform shown on figure 2, ref. 240]
As per dependent claim 20, dependent claim 20 is a method version of the medium claim 6, having the same scope as that of the above dependent claim 6. Thus, is rejection for the same reason/rationale as that of the above dependent claim 6.
As per dependent claim 7 Graser discloses the non-transitory computer readable medium/system/method as applied to claim 6 above.
Graser doesn’t explicitly disclose the limitation, wherein to coordinate with the secured entity to generate the credential includes to: “receive a key from the secured entity for generation of the credential and generating the credential utilizing the key and an identifier of the client device”
However, Copsey discloses:
receive a key from the secured entity for generation of the credential [Para. 0059, If there is no login tracking data 246 associated with the device identifier included in the received request, a request for a user credential along with a login identifier to allow access to the content provisioning module 222 may be returned. The user credential returned by the platform corresponds to the key]; and generating the credential utilizing the key and an identifier of the client device [Para 0060, When the user credential is received at proxy system 240 from the access enabler module 214 a at the computing device 210 the user may be authenticated. Note: The determination combines this key with the device identifier 218 (client ID) to create/store the login identifier, which functions as the session credential]
Graser and Copsey are analogous/in the same field of endeavor as they both are directed to controlling access to a secure storage devices by using credential.
It would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to implement in the system of Graser, a credential storing/creating mechanism or a feature such as “receive a key from the secured entity for generation of the credential and generating the credential utilizing the key and an identifier of the client device” as per teaching of Copsey to enhance the security of the system by minimizing exposure to client-side vulnerabilities, maintains central management, and ensures a more robust overall system architecture. [See Copsey, Para. 0061 and at least figure 2, how the credentials are stored in login tracking data figure 2, ref. 246 on the proxy platform shown on figure 2, ref. 240]
As per dependent claim 8 Graser discloses the non-transitory computer readable medium/system/method as applied to claim 1 above.
Graser doesn’t explicitly disclose the limitation wherein the instructions, when executed by the computing system, further causes the computing system to: “identify a request, received from the client device, for performance of an action by the secured entity; and generate the credential based at least in part on the identification of the request”.
However, Copsey discloses:
identify a request, received from the client device, for performance of an action by the secured entity [Para. 0057, When the application 212 a first attempts to access content provisioning module 222, access enabler module 214 a may access the identifier 218 on the computing device 210. The access enabler module 214 a may then send a request to access that application data (e.g., a request to access the content or other data associated with that application 212 a) to content provisioning module 222] and generate the credential based at least in part on the identification of the request” [Para. 0059. If there is no login tracking data 246 associated with the device identifier included in the received request, a request for a user credential along with a login identifier (which is generated based on the client ID) to allow access to the content provisioning module 222 may be/created/generated and returned]
Graser and Copsey are analogous/in the same field of endeavor as they all are directed to controlling access to a secure storage devices by using credential.
It would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to implement in the system of Graser, a credential storing/creating mechanism or a feature such as “identify a request, received from the client device, for performance of an action by the secured entity; and generate the credential based at least in part on the identification of the request” as per teaching of Copsey to enhance the security of the system by minimizing exposure to client-side vulnerabilities, maintains central management, and ensures a more robust overall system architecture. [See Copsey, Para. 0061 and at least figure 2, how the credentials are stored in login tracking data figure 2, ref. 246 on the proxy platform shown on figure 2, ref. 240]
As per dependent claim 17, dependent claim 17 is a system version of the medium claim 8, having the same scope as that of the above dependent claim 8. Thus, is rejection for the same reason/rationale as that of the above dependent claim 8.
As per dependent claim 9 the combination Graser and Copsey discloses the non-transitory computer readable medium/system/method as applied to claim 8 above. Furthermore, Copsey discloses the non-transitory computer readable medium/system/method further comprising: determine that the client device is authorized for the action [Para. 0058, determine whether a user associated with the device identifier has been previously authenticated, Para. 0066, determine whether a user associated with the device 210 has been previously authenticated. Note this teaches the user or device is authenticated before allowing access/action], wherein the credential is generated at least in part on the client device being authorized for the action [Para. 0061, If, however, the user credentials can be authenticated access module 242 stores this login identifier and Para. 0062, The application 212 a may thus utilize the login identifier in subsequent accesses to content provisioning module 222 to access the application data 228 associated with the application 212 a. This implies the login identifier/credentials is created only after authorization for action is confirmed].
As per dependent claim 10 Graser discloses the non-transitory computer readable medium/system/method as applied to claim 1 above.
Graser doesn’t explicitly disclose the limitation: “wherein the credential is stored within a broker of the computing system”
However, Copsey discloses:
“wherein the credential is stored within a broker of the computing system” [Para. 0061, access module 242 stores this login identifier in association with the device identifier (e.g., associated with computing device 210) …in login tracking data 246. Note: Login identifier /credential is stored in tracking data 242 which is part of proxy system 240 and access module 242 and this meets the limitation the broker. Thus, the credential is stored in the broker’s storage rather than on the client device]
Graser and Copsey are analogous/in the same field of endeavor as they all are directed to controlling access to a secure storage devices by using credential.
It would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to implement in the system of Graser, a credential storing mechanism or a feature such as “wherein the credential is stored within a broker of the computing system” as per teaching of Copsey to enhance the security of the system by minimizing exposure to client-side vulnerabilities, maintains central management, and ensures a more robust overall system architecture. [See Copsey, Para. 0061 and at least figure 2, how the credentials are stored in login tracking data figure 2, ref. 246 on the proxy platform shown on figure 2, ref. 240]
As per dependent claim 11 the combination of Graser and Copsey discloses the non-transitory computer readable medium/system/method as applied to claim 10 above. Furthermore, Copsey discloses the non-transitory computer readable medium/system/method, wherein: determine that a validity time for a key used for generation of credentials has expired [Para. 0061, an expiration time may be associated with the login identifier and the device identifier in login tracking data 246, such that when the expiration time has elapsed the associated login identifier and device identifier may be removed from login tracking data 246. Note: the login identifier acts as the key used for subsequent credential based access. Detection that the expiration time “has elapsed” is the determination that a validity time for a key used for generation of credentials has expired] and obtain a new key for generation of credentials from the secured entity [Para. 0059, If there is no login tracking data 246 associated with the device identifier included in the received request, a request for a user credential along with a login identifier to allow access to the content provisioning module 222 is created and returned to the access enabler module 214 a. Para. 0060, “When the user credential is received at proxy system 240 … the user may be authenticated and para. 0061, the associated login identifier…may be removed, (this happens when the expiration time elapses). And para. 0062, the application 212 a … thus utilize the login identifier in subsequent accesses to. Note: This teaches when the login identifier expires (0061), it is removed. Once removed, the next request generates a new request for a user credentials (para. 0059). The secured platform returns a new user credential, which is then processed and generates a new login identifier (para. 00060-0062]
10. Claims 12-13 are rejected under 35 U.S.C. 103 as being unpatentable over Graser et al. (Graser) (US Patent Publication No. 2008/0276308-A1, Pub. Date: Nov 6, 2008) in view of Simon Dominic Copsey (herein after referred as Copsey) (US Publication No. 2015/0012990 A1; Pub. Date: Jan 8, 2015) and further in view of NPL document titled, “What Are Refresh Tokens and How to Use Them Securely” (Learn about refresh tokens and how they help developers balance security and usability in their applications). By Dan Arias and Sam Bellen (herein after referred as Arias) (October 7, 2021)
As per dependent claim 12 the combination of Graser and Copsey discloses the non-transitory computer readable medium/system/method as applied to claim 11 above. Furthermore, Copsey discloses the non-transitory computer readable medium/system/method, wherein to obtain the new key includes to: transmit a new request aPara. 0023, 0061 and 0059, an expiration time may be associated with the stored device identifier and login identifier when the user is initially authenticated such that the login identifier and device identifier may be removed or otherwise invalidated after the expiration of this time. By removing the login identifier and device identifier the user is required to be re-authenticated when an application is next accessed and para. 0059, Para. 0059, a request for a user credential along with a login identifier to allow access to the content provisioning module 222 is created and returned”. Note: when the expiration time is elapsed para. 0061, the login identifier is removed. Once the login identifier is removed, the next access attempt triggers a request for a new user credential/para. 0059, a new request is automatically triggered and that request is made only after detecting expiration; it is directed to the secured entity (content provisioning platform/access module 242)]; identify the new key received from the secured entity [Para. 0060, When the user credential is received at proxy system 240 … the user may be authenticated and para. 0061, access module 242 stores this login identifier in association with the device identifier, Note: This means after the user credential is submitted (triggered by expiration) the platform (secured entity) returns a new identifier associated with the device identifier and this means the system: receives the new identifier/the new key and identifies and process it as the new credential for that device]; and store the new key [Para. 0061, access module 242 stores this login identifier in association with the device identifier. This means once the new login identifier is generated by the secured platform and returned, access module 242 stores it in login tracking data 246 associated with the device identifier. This matches to the claim limitation storing new key]
Graser and Copsey doesn’t explicitly disclose the following underlined claim limitation: “transmit a key refresh request to the secured entity based at least in part on the determination that the validity time has expired”
However, Arias discloses “transmit a key refresh request to the secured entity based at least in part on the determination that the validity time has expired” [See under the title “what is a Refresh Token”…for security purposes, access tokens may be valid for a short amount of time. Once they expire, client applications can use a refresh token to "refresh" the access token. That is, a refresh token is a credential artifact that lets a client application get new access tokens without having to ask the user to log in again.
Graser, Copsey and Arias are analogous/in the same field of endeavor as they all are directed to controlling access to a secure storage devices by using credential.
It would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to implement in the system of Graser and Copsey, a Key refresh mechanism such as “a key refresh request to the secured entity based at least in part on the determination that the validity time has expired” as per teaching of Arias to enhance the security of the system by helping developers balance security and usability in their applications. [See Arias, “Learn about refresh tokens and how they help developers balance security and usability in their applications”]
As per dependent claim 13 the combination of Graser and Copsey discloses the non-transitory computer readable medium/system/method as applied to claim 12 above. Furthermore, Copsey discloses the non-transitory computer readable medium/system/method, wherein the new [Para. 0058, “The request to access the application 212 a including the device identifier is received from the computing device 210 at proxy system 240” Para. 0059, “If there is no login tracking data 246 associated with the device identifier included in the received request” and 0061,” when the expiration time has elapsed the associated login identifier and device identifier may be removed from login tracking data 246.” Note: the request contains the device identifier (Para. 0058) this meets the value of the key. When the request arrives, the system checks the login tracking data associated with that device ID/Para. 0059. If the credential expired, the login identifier has been removed. Para. 0061. Therefore, the absence of a login identifier for that device ID servers as the “indication that the validity time has expired” In other words, the new request includes the device identifier; the system checks login tracing data for that identifier, the combination of request+ missing login ID= expiration indication] or a value of the key [Para. 0058, “including a device identifier…”, Note: the device identifier functions as the key value since it uniquely identifies the client device and it is used to look up the login identifier and it is also used in the refresh request. This meets the limitation the request includes “a value of the key”]
Graser and Copsey doesn’t explicitly disclose the following underlined claim limitation: “the key refresh request includes an indication that the validity time has expired”
However, Arias discloses “the key refresh request includes an indication that the validity time has expired [See under the title “what is a Refresh Token”…for security purposes, access tokens may be valid for a short amount of time. Once they expire, client applications can use a refresh token to "refresh" the access token. That is, a refresh token is a credential artifact that lets a client application get new access tokens without having to ask the user to log in again.
Graser, Copsey and Arias are analogous/in the same field of endeavor as they all are directed to controlling access to a secure storage devices by using credential.
It would have been obvious to a person having ordinary skill in the art before the effective filing date of the claimed invention to implement in the system of Graser, and Copsey a Key refresh mechanism such as “the key refresh request includes an indication that the validity time has expired” as per teaching of Arias to enhance the security of the system by helping developers balance security and usability in their applications. [See Arias, “Learn about refresh tokens and how they help developers balance security and usability in their applications”]
Conclusion
11. The prior art made of record and not relied upon is considered pertinent to applicant's disclosure.
A. US Publication No. 2009/0222896 A1 Ichikawa discloses the claim limitation: “identify a termination associated with an access of a secured entity for a client device [See at least claim 42, wherein the client terminal further includes a notification sending unit that sends, to the administration server, a notification of termination of access to the specific storage unit] and delete the credential from storage based at least in part on the identification of the termination” [Claim 42, and the administration server further includes a deleting unit that deletes, upon receiving the notification from the client terminal, the second password/credential from the database.]
B. US Publication No. 2017/0251025 A1 to Varley discloses a broker-based identity model, where a broker mediates between a user device, relaying parties and attestation servers.
C. US Publication No. 2019/0135229 A1 Ledvina discloses a set of ranging session status changed subevent can be generated to indicate the start, progress, and completion of a UWB-related action. These sub-events can be generated by both the mobile device and the vehicle. The security key refresh event may be initiated by the vehicle or the mobile device to request a new set of security keys. The lock and unlock events can be generated by the vehicle after a successful ranging session. Example of this set of subevents include: ranging session key refresh subevent (e.g., if initiator requires refresh of all security keys); ranging session lock started subevent (e.g., if initiator is performing a lock operation); ranging session lock completed subevent (e.g., if initiator has completed the lock operation); ranging session unlock started subevent (e.g., if initiator is performing an unlock operation); ranging session unlock completed subevent (e.g., if initiator has completed the unlock operation); ranging session ignition started subevent (e.g., if initiator is performing an immobilizer operation); ranging session ignition completed subevent (e.g., if initiator has completed the immobilizer operation); and ranging session timed out subevent (e.g., if initiator has stopped ranging due to timeout)
D. US Publication No. 2016/0277400 A1 Maurya discloses the credential of the first type may be associated with a predetermined validity period, which, for example, may have been specified by the server. In this case, the apparatus may monitor for expiry of the predetermined validity period and cause issuance of a further credential of the first type in response to expiry of the predetermined validity period. Thus, the apparatus may maintain its ability to obtain a further credential of the second type. The apparatus may cause such issuance in response to receiving a request for the further credential of the second type from the user device. [Para. 0016] In this case, the apparatus may monitor for expiry of the further predetermined validity period and cause issuance of a further credential of the first type in response to expiry of the further predetermined validity period. Thus, the apparatus enables the user device to maintain and refresh authenticated communication with the service.
E. See other cited prior arts.
Any inquiry concerning this communication or earlier communications from the examiner should be directed to SAMSON B LEMMA whose telephone number is 571-272-3806. The examiner can normally be reached on M-F 8am-10pm.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor Yin-Chen Shaw can be reached on 571-272-8878. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free).
/SAMSON B LEMMA/Primary Examiner, Art Unit 2498