throbber
CERTIFIC
`
`AIL
`
`deposited with the
`rtify that this correspondence is be"
`I hereb
`‘EXPRESS MAIL
`las Postal Service in an envelope
`United
`POST OFFICE TO ADDRESSEE‘ service under 37 C.F.R.1.10.
`Mailing Label No. EV336035415US and is addressed to the:
`Assistant Commissioner for Patents, Washington, D. C. 20231.
`
`Date: June 3, 2005
`
`(f
`
`Wilbum Liddell, Jr.
`
`PATENT
`
`409475-67
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Applicant:
`
`I GARY STEPHEN SHUSTER
`
`Serial No.:
`
`b
`Not Yet Assigned
`
`Parent Art Unit:
`I
`
`.
`
`2132
`
`’
`
`'
`
`Parent Examiner:
`
`J. M. McArdle
`
`Filed:
`
`Concurrently Herewith
`
`Title: METHOD AND APPARATUS FOR
`IDENTIFYING
`AND
`CHARACTERIZING
`ERRANT ELECTRONIC FILES
`
`
`PRELIMINARY AMENDMENT
`
`Commissioner for Patents
`
`P.O. Box 1450
`
`Alexandria, VA 22313-1450
`
`Sir:
`
`Prior to examination of the application, please amend the application as follows:
`
`LA2:764029.1
`
`(cid:51)(cid:49)(cid:38)(cid:3)(cid:20)(cid:19)(cid:19)(cid:27)
`PNC 1008
`
`

`
`Preliminary Amendment
`June 3, 2005
`Page 2 of 8
`
`IN THE SPECIFICATION:
`
`Please amend the paragraph beginning on page 1, line 5, including the heading
`
`“CROSS-REFERENCE TO RELATED APPLICATION,” as follows: .
`
` RELATED APPLICATIONS
`
`This application, is a continuation of co-pending application Serial No.
`
`09/561, 751 filed April 29, 2000, which claims priority pursuant to 35 U.S.C. § 119(e) to
`
`U.S. Provisional Application Numbers 60/132,093, filed April 30, 1999; 60/142,332, filed
`
`July 3, 1999; and 60/157,195, filed September 30, 1999.
`
`-These All of the foregoing
`
`non-provisional and provisional applications are specifically incorporated by reference
`
`herein, in their entirety.
`
`LA2:764029.1
`
`

`
`Preliminary Amendment
`June 3, 2005
`Page 3 of 8
`
`IN THE CLAIMS:
`
`The following listing of claims will replace all prior versions, and listings, of
`
`the claims in the application:
`
`1-58.
`
`(Canceled)
`
`59.
`
`(New) A computer-implemented method for identifying and characterizing
`
`stored electronic files, said method comprising:
`
`processing a file from a computer storage medium using an algorithm to
`generate an identification yalue determined by processing contents of the file using the
`
`algorithm;
`
`comparing the identification value to each of a plurality of identification values
`
`each associated with one of a plurality of unauthorized files, wherein each of the
`
`plurality of unauthorized files is substantially free from infection with a computer virus;
`
`and
`
`.
`
`_
`
`characterizing the file as an identified unauthorized file if the identification value
`
`matches one of the plurality of identification values.
`
`60.
`
`(New) The method of Claim 59, further comprising selecting the file from
`
`one of a plurality of sequentially-ordered files in a directory of the computer storage
`
`medium.
`
`61..
`
`(New) The method of Claim 59, further comprising selecting the file from
`
`a plurality of files stored in the computer storage medium, based on size of the file.
`
`62-.
`
`(New) The method of Claim 61, wherein the selecting step further-
`
`comprises determining whether an aggregate size of plural
`
`identical|y—sized files
`
`exceeds a predetermined threshold.
`
`63.
`
`(New) The method of Claim 59, further comprising selecting the file from
`
`a plurality of files stored in the computer storage medium, based on whether content of
`
`the file matches a file type indicated by a name of the file.
`
`LA2:764029.1
`
`

`
`Preliminary Amendment
`June 3, 2005
`Page 4 of 8
`
`64.
`
`(New) The method of Claim 59, further comprising selecting the file from
`
`a plurality of files stored in the computer storage medium, based on whether the file
`
`comprises data beyond an end of data markerfor the file.
`
`65.
`
`(New) The method of Claim 59, wherein the processing step comprises
`
`using the algorithm, wherein the algorithm is configured for generating a checksum.
`
`66.
`
`(New) The method of 65, wherein the processing step comprises using the
`
`algorithm, wherein the algorithm is configured for generating a first checksum
`
`corresponding to a first portion of said stored file and- a second checksum
`
`corresponding to a second portion of said stored file.
`
`67.
`
`(New) The method of 65, wherein the processing step comprises using the
`
`algorithm, wherein the algorithm is configured for generating a first‘ checksum
`
`corresponding to a first portion of said stored file and a second checksum
`
`corresponding to a larger portion of said stored file that includes the first portion.
`
`68.
`
`(New) The method of 65, wherein the processing step comprises using the
`
`algorithm, wherein the algorithm is configured for generating the checksum for graphics
`
`files based on vector graphics analysis.
`
`69.
`
`(New) The method of 65, wherein the processing step comprises using the
`
`algorithm, wherein the algorithm is configured for dividing a graphical image file into
`
`blocks and comparing relationships between the blocks.
`
`70.
`
`(New) The method of Claim 59, further comprising processing a plurality of
`
`known unauthorized files to generate the plurality of identification values.
`
`71.
`
`(New) The method of Claim 59,
`
`further comprising presenting the
`
`identified unauthorized file for human review prior to disposing of it.
`
`72.
`
`(New) The method of Claim 59, further comprising automatically notifying
`
`a third party that the file has been identified.
`
`LA2:764029.1
`
`

`
`Preliminary Amendment
`June 3, 2005
`Page 5 of 8
`
`73.
`
`(New) The method of Claim 59, further comprising deleting the identified
`
`unauthorized file from the computer storage medium.
`
`74.
`
`(New) A computer system, comprising:
`
`a server having a memory connectedthereto, said sewer being adapted ‘to be
`
`connected to a network to permit remote storage and retrieval of data files from said
`
`A memory; and
`a file identification application operative with said server to identify unauthorized
`
`files stored in said memory, said file identification application providing the functions of:
`
`processing a’ file from the memory using an algorithm to generate an
`
`identification value determined by processing contents of the file using the
`
`algorithm;
`
`comparing the identification value to each of a plurality of identification A
`
`values each associated with one of a plurality of unauthorized files, wherein each '
`
`of the plurality of unauthorized files is substantially free from infection. with a
`
`computer virus; and
`
`characterizing the file as an identified unauthorized" file if the identification
`
`value matches one of the plurality of identification values.
`
`75.
`
`' (New) The system of Claim 74, wherein the application further comprises
`
`the function of selecting the file from one of a plurality of sequentially-ordered files in a
`
`directory of the computer storage medium.
`
`76.
`
`‘(New) The system of Claim 74, wherein the application further comprises
`
`the function of selecting the file from a plurality of files stored in the computer storage
`
`medium, based on size of the file. '
`
`77.
`
`(New) The system of Claim 74, wherein the application further comprises
`
`the function of determining whether an aggregate size of plural identically-sized files
`
`exceeds a predetermined threshold.
`
`LA2:764029.1
`
`

`
`Preliminary Amendment
`June 3, 2005
`Page 6 of 8
`
`78.
`
`(New) The system of Claim 74, wherein the application further comprises
`
`the function of selecting the file from a plurality of files stored in the computer storage
`
`medium, based on whether content of the file matches a file type indicated by a name of
`
`the file.
`
`79.
`
`(New) The system of Claim 74, wherein» the application further comprises
`
`the function of selecting the file from a plurality of files stored in the computer storage
`
`medium, based on whether the file comprises data beyond an end of data marker for
`
`the file.
`
`80.
`
`(New)
`
`The system of Claim 74, wherein the processing function
`
`comprises using the algorithm; wherein the algorithm is configured for generating. a
`
`checksum.
`
`81.
`
`(New) The system of Claim 80, wherein the processing function comprises
`
`using the algorithm, wherein the algorithm is configured for generating a first checksum
`
`corresponding to a first portion of said stored file and a second checksum
`
`corresponding to a second portion of said stored file.
`
`82.
`
`(New) The system of Claim 80, wherein the processing function comprises
`
`using the algorithm, wherein the algorithm is configured for generating a first checksum
`
`corresponding to a first portion of said stored file and a second checksum
`
`corresponding to a larger portion of said stored file that includes the first portion.
`
`83.
`
`(New) The system of Claim 80, wherein the processing function comprises
`
`using the algorithm, wherein the algorithm is configured for generating the checksum for
`
`graphics files based on vector graphics analysis.
`
`84.
`
`(New) The system of Claim 80, wherein the processing function comprises
`
`using the algorithm, wherein the algorithm is configured for dividing a graphical image
`
`file into blocks and comparing relationships between the blocks.
`
`LA2:764029.1
`
`

`
`Preliminary Amendment
`June 3, 2005
`Page 7 of 8
`
`85.
`(New) The system of Claim 74, wherein the application further comprises
`the function of processing a plurality of known unauthorized files to generate the
`
`plurality of identification values.
`
`86.
`
`(New) The system of Claim 74, wherein the application further comprises
`
`the function of presenting the identified unauthorized file for human review prior to
`
`disposing of it.
`
`.87.
`
`(New) The system of Claim 74, wherein the application further comprises
`
`the function of automatically notifying a third party that the file has been identified.
`
`88.
`
`(New) The system of Claim 74, wherein the application further comprises
`
`the function of deleting the identified unauthorized file from the computer storage
`
`medium.
`
`LA2:764029.1
`
`

`
`Preliminary Amendment
`June 3, 2005 ‘
`Page 8 of 8
`
`REMARKS
`
`Claims 59-88 are pending in this application, with Claims 1-58 cancelled and
`
`Claims 59-88 added by this amendment. The specification has been amended to refer
`
`to the parent of the present application. By these amendments, no new matter has
`
`been added. The Applicant respectfully requests entry of the foregoing amendments,
`
`and examination on the merits of Claims 59-88.
`
`While Applicant believes that no fees are due in connection with the filing of this
`
`paper,
`
`the Commissioner is authorized to charge any shortage in fees,
`
`including
`
`‘extension of time fees, to Deposit Account No. 50-0639.
`
`Respectfully submitted,
`
`Brian M. Berliner
`
`Attorney’ for Applicant
`Registration No. 34,549
`
`Date: June 3, 2005
`
`, O’MELVENY & MYERS LLP
`
`400 So. Hope Street
`Los Angeles, CA 90071-2899
`Telephone: 213-430-6000
`
`LA2:764029.1 V

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket