throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Applicants:
`
`Rozman, et al.
`
`Docket No.:
`
`ARAC-01RE3C1C1
`
`Serial No.:
`
`TBD
`
`Reissue of:
`
`7,484,247
`
`Filed:
`
`Issued:
`
`Herewith
`
`January 27, 2009
`
`Title:
`
`System and Method for Protecting a Computer System from Malicious
`Software
`
`Commissioner for Patents
`P. 0. Box 1450
`Alexandria, VA 22313-1450
`
`PRELIMINARY AMENDMENT
`
`Dear Sir:
`
`Prior to examination on the merits, the Applicants respectfully submit the
`
`amendments and remarks set forth below.
`
`ARAC-01RE3C1C1
`
`Page 1 of 18
`Google - Exhibit 1009, page 1
`Google - Exhibit 1009, page 1
`
`Google - Exhibit 1009, page 1
`
`

`
`IN THE SPECIFICATION:
`
`Before the heading "Cross Reference to Related Patents and Applications" please insert:
`
`Cross Reference to Multiple Reissue Applications
`
`This is a reissue continuation of U.S. Reissue Patent Application Serial No.
`
`13/015,186 (now, U.S. Patent No. RE43,987), which is a reissue continuation application of U.S.
`
`Reissue Patent Application Serial No. 12/854,149 (now, U.S. Patent No. RE43,103), which is a
`
`reissue application of U.S. Patent No. 7,484,247, entitled "System and Method for Protecting a
`
`Computer System from Malicious Software," issued on January 27, 2009. The following are
`
`related reissue applications: U.S. Reissue Patent Application Serial No. 12/720,147 (now, U.S.
`
`Patent No. RE43,528) from U.S. Patent No. 7,484,247, filed on March 9, 2010, U.S. Reissue
`
`Patent Application Serial No. 12/720,207 (now, U.S. Patent No. RE43,500) from U.S. Patent No.
`
`7,484,247, filed on March 9, 2010, and U.S. Reissue Patent Application Serial No. 12/941,067
`
`(now, U.S. Patent No. RE43,529) from U.S. Patent No. 7,484,247, filed on November 7, 2010.
`
`All of the above applications are incorporated herein by reference.
`
`ARAC-01RE3C1C1
`
`Page 2 of 18
`Google - Exhibit 1009, page 2
`
`Google - Exhibit 1009, page 2
`
`

`
`Before the heading "BRIEF DESCRIPTION OF THE DRAWINGS", please insert the following
`
`material into the specification. All of the added material has been previously incorporated by
`
`reference and the amendment contains no new matter.
`
`TERM DESCRIPTION
`
`Memory: This term is intended to broadly encompass any device capable of storing
`
`and/or incorporating computer readable code for instantiating the client device referred to
`
`immediately above. Thus, the term encompasses all types of recording medium, e.g., a CD-
`
`ROM, a disk drive (hard or soft), magnetic tape, and recording devices, e.g., memory devices
`
`including DRAM, SRAM, EEPROM, FRAM, and Flash memory. It should be noted that the
`
`term is intended to include any type of device which could be deemed persistent storage. To the
`
`extent that an Application Specific Integrated Circuit (ASIC) can be considered to incorporate
`
`instructions for instantiating a client device, an ASIC is also considered to be within the scope of
`
`the term "memory."
`
`ARAC-01RE3C1C1
`
`Page 3 of 18
`Google - Exhibit 1009, page 3
`
`Google - Exhibit 1009, page 3
`
`

`
`IN THE CLAIMS:
`
`1.-20. (Canceled)
`
`21.
`
`(New) A method, comprising:
`
`executing instructions in a first logical process with one of a first electronic data
`
`processor and a second electronic data processor employing a common operating system, the first
`
`logical process accessing data in at least one of a first memory space and a second memory
`
`space;
`
`executing instructions in a second logical process with one of the first electronic data
`
`processor and the second electronic data processor employing the common operating system, the
`
`second logical process accessing data in at least one of the first memory space and the second
`
`memory space, and exchanging data across a computer network; and
`
`protecting data residing in the first memory space from a malware process downloaded
`
`from the computer network and operating as part of the second logical process.
`
`22.
`
`(New) The method of claim 21 further comprising generating data from the first
`
`logical process and the second logical process for display.
`
`23.
`
`(New) The method of claim 21 wherein the first and second electronic data
`
`processors are part of a multi-core electronic data processor.
`
`24.
`
`(New) The method of claim 21 wherein the first logical process executes
`
`instructions with the first electronic data processor and accesses data in the first and second
`
`ARAC-01RE3C1C1
`
`Page 4 of 18
`Google - Exhibit 1009, page 4
`
`Google - Exhibit 1009, page 4
`
`

`
`memory space, and the second logical process executes instructions with the second electronic
`
`data processor and accesses data in the second memory space.
`
`25.
`
`(New) The method of claim 21 further comprising protecting the first logical
`
`process from executing instructions initiated by the malware process downloaded from the
`
`network and executing as part of the second logical process.
`
`26.
`
`(New) The method of claim 21 further comprising restoring at least one corrupted
`
`data file residing on the second memory space from an image residing on the first memory space.
`
`27.
`
`(New) The method of claim 21 further comprising automatically deleting at least
`
`one data file residing on the second memory space when the second logical process is terminated.
`
`28.
`
`(New) A computer, comprising:
`
`a first electronic data processor employing a common operating system and configured to
`
`execute instructions in a first logical process, the first logical process configured to access data
`
`in at least one of a first memory space and a second memory space;
`
`a second electronic data processor employing the common operating system and
`
`configured to execute instructions in a second logical process, the second logical process
`
`configured to access data in at least one of the first memory space and the second memory space,
`
`and exchange data across a computer network; wherein data residing in the first memory space is
`
`protected from a malware process downloaded from the computer network and operating as part
`
`of the second logical process.
`
`ARAC-01RE3C1C1
`
`Page 5 of 18
`Google - Exhibit 1009, page 5
`
`Google - Exhibit 1009, page 5
`
`

`
`29.
`
`(New) The computer of claim 28 further comprising a display configured to
`
`display data from the first logical process and the second logical process.
`
`30.
`
`(New) The computer of claim 28 wherein the first and second electronic data
`
`processors are part of a multi-core electronic data processor.
`
`31.
`
`(New) The computer of claim 28 wherein the first logical process is configured to
`
`execute instructions with the first electronic data processor and access data in the first and second
`
`memory space, and the second logical process is configured to execute instructions with the
`
`second electronic data processor and access data in the second memory space.
`
`32.
`
`(New) The computer of claim 28 wherein the first logical process is configured to
`
`be protected from executing instructions initiated by the malware process downloaded from the
`
`network and executing as part of the second logical process.
`
`33.
`
`(New) The computer of claim 28 wherein at least one corrupted data file residing
`
`on the second memory space is restored from an image residing on the first memory space.
`
`34.
`
`(New) The computer of claim 28 wherein at least one data file residing on the
`
`second memory space is automatically deleted when the second logical process is terminated.
`
`35.
`
`(New) A computer program product comprising a program code stored in a
`
`computer readable medium configured to:
`
`execute instructions in a first logical process with one of a first electronic data processor
`
`and a second electronic data processor employing a common operating system, the first logic
`
`ARAC-01RE3C1C1
`
`Page 6 of 18
`Google - Exhibit 1009, page 6
`
`Google - Exhibit 1009, page 6
`
`

`
`process being configured to access data in at least one of a first memory space and a second
`
`memory space;
`
`execute instructions in a second logical process with one of the first electronic data
`
`processor and the second electronic data processor employing the common operating system, the
`
`second logical process being configured to access data in at least one of the first memory space
`
`and the second memory space, and exchange data across a computer network; and
`
`protect data residing in the first memory space from a malware process downloaded from
`
`the computer network and operating as part of the second logical process.
`
`36.
`
`(New) The computer program product of claim 35 wherein said program code
`
`stored in said computer readable medium is further configured to generate data from the first
`
`logical process and the second logical process for display.
`
`37.
`
`(New) The computer program product of claim 35 wherein the first and second
`
`electronic data processors are part of a multi-core electronic data processor.
`
`38.
`
`(New) The computer program product of claim 35 wherein the first logical
`
`process is configured to execute instructions with the first electronic data processor and access
`
`data in the first and second memory space, and the second logical process is configured to
`
`execute instructions with the second electronic data processor and access data in the second
`
`memory space.
`
`39.
`
`(New) The computer program product of claim 35 wherein said program code
`
`stored in said computer readable medium is further configured to protect the first logical process
`
`ARAC-01RE3C1C1
`
`Page 7 of 18
`Google - Exhibit 1009, page 7
`
`Google - Exhibit 1009, page 7
`
`

`
`from executing instructions initiated by the malware process downloaded from the network and
`
`executing as part of the second logical process.
`
`40.
`
`(New) The computer program product of claim 35 wherein said program code
`
`stored in said computer readable medium is further configured to restore at least one corrupted
`
`data file residing on the second memory space from an image residing on the first memory space.
`
`41.
`
`(New) The computer program product of claim 35 wherein said program code
`
`stored in said computer readable medium is further configured to automatically delete at least one
`
`data file residing on the second memory space when the second logical process is terminated.
`
`42.
`
`(New) A portable computer based system using a common operating system for
`
`protecting critical files and data from malicious software attacks via a network of one or more
`
`computers, comprising:
`
`a protected process capable of accessing at least one website via the network of one or
`
`more computers, the protected process capable of being communicatively coupled to a first
`
`memory space and to a second protected memory space, and including a first logical process and
`
`at least one secure second logical process;
`
`the first logical process configured to:
`
`access data files contained in the first memory space including at least one critical
`
`file.
`
`accept data entry from a computer user;
`
`initialize the at least one secure second logical process;
`
`pass data to the at least one secure second logical process;
`
`ARAC-01RE3C1C1
`
`Page 8 of 18
`Google - Exhibit 1009, page 8
`
`Google - Exhibit 1009, page 8
`
`

`
`the at least one secure second logical process configured to:
`
`execute instructions downloaded from the network of one or more computers;
`
`access data files contained in the second protected memory space, wherein a
`
`malware process downloaded from the network and executing as part of the at least one secure
`
`second logical process is capable of accessing the second protected memory space but is denied
`
`access to the first memory space;
`
`generate website video data for display;
`
`wherein the protected process is configured such that the at least one critical file residing
`
`on the first memory space is protected from corruption by the malware process downloaded from
`
`the network and executing as part of the at least one secure second logical process.
`
`43.
`
`(New) The portable computer based system of Claim 42 wherein the first logical
`
`process is capable of directly exchanging data with a network interface device and with the at
`
`least one secure second logical process.
`
`44
`
`(New) The portable computer based system of Claim 42 wherein the first logical
`
`process is capable of passing data downloaded from the network to the at least one secure second
`
`logical process.
`
`45
`
`(New) The portable computer based system of Claim 42 wherein the at least one
`
`secure second logical process is capable of directly exchanging data with a network interface
`
`device and with the first logical process.
`
`ARAC-01RE3C1C1
`
`Page 9 of 18
`Google - Exhibit 1009, page 9
`
`Google - Exhibit 1009, page 9
`
`

`
`46
`
`(New) The portable computer based system of Claim 42 further configured to:
`
`close the at least one secure second logical process;
`
`upon closing the at least one secure second logical process, automatically delete at least
`
`one file selected from the group consisting of:
`
`a temporary internet file,
`
`a cookie, and
`
`a file corrupted by malware.
`
`47.
`
`(New) The portable computer based system of Claim 42 further configured to
`
`block attempts by malware to record data entry by the computer user.
`
`48.
`
`(New) The portable computer based system of Claim 42 further configured to
`
`initialize a plurality of secure second logical processes with the first logical process.
`
`49.
`
`(New) The portable computer based system of Claim 42 wherein the at least one
`
`secure second logical process is initialized from clean system files.
`
`50.
`
`(New) The portable computer based system of Claim 42 further configured to:
`
`execute instructions from the first logical process on a first core of a multi-core processor;
`
`and
`
`execute instructions from the at least one secure second logical process on a second core
`
`of the multi-core processor.
`
`51.
`
`(New) The portable computer based system of Claim 42 wherein at least one file
`
`corrupted by the malware process is capable of being restored from a protected image.
`
`ARAC-01RE3C1C1
`
`Page 10 of 18
`Google - Exhibit 1009, page 10
`
`Google - Exhibit 1009, page 10
`
`

`
`52.
`
`(New) The portable computer based system of Claim 51 wherein the protected
`
`image is stored at a location selected from the group consisting of:
`
`a removable drive,
`
`the first memory space,
`
`a partition on a memory device, and
`
`a memory storage medium.
`
`53
`
`(New) The portable computer based system of Claim 42 wherein the at least one
`
`secure second logical process is selected from the group consisting of:
`
`an electronic mail process,
`
`an instant messaging process,
`
`an internet browser process,
`
`a gaming process,
`
`a reader application process, and
`
`a word processor process.
`
`54.
`
`(New) The portable computer based system of Claim 42 wherein the malware
`
`process downloaded from the network and executing as part of the at least one secure second
`
`logical processes is capable of being disallowed from initiating access to another logical process.
`
`55.
`
`(New) The portable computer based system of Claim 42 further configured to:
`
`place an offending website that contributed to a malware infection on a block list, thereby
`
`blocking future access to the offending website; and
`
`allowing access to the offending website if the computer user authorizes access.
`
`ARAC-01RE3C1C1
`
`Page 11 of 18
`Google - Exhibit 1009, page 11
`
`Google - Exhibit 1009, page 11
`
`

`
`56.
`
`(New) The portable computer based system of Claim 42 further comprising a cell
`
`phone communication capability.
`
`57.
`
`(New) A method of operating a portable computer based system using a common
`
`operating system and configured with a first memory space and a second protected memory space
`
`and at least one electronic data processor, comprising:
`
`storing at least one system file within the first memory space;
`
`exchanging data across a network of one or more computers using a protected browser
`
`process, wherein the protected browser process comprises a first logical process and at least one
`
`secure second logical process;
`
`executing instructions in the first logical process using the at least one electronic data
`
`processor, wherein the first logical process is configured to access data contained in the first
`
`memory space and to initialize the at least one secure second logical process;
`
`executing instructions in the at least one secure second logical process using the at least
`
`one electronic data processor, wherein the at least one secure second logical process is
`
`configured to access data contained in the second memory space and is capable of executing
`
`instructions from a malware process downloaded from the network of one or more computers,
`
`wherein the malware process is capable of accessing the second protected memory space but is
`
`denied access to the first memory space;
`
`passing data from the first logical process to the at least one secure second logical
`
`process;
`
`displaying video data generated by the at least one secure second logical process;
`
`wherein the protected browser process is configured such that the at least one system file
`
`ARAC-01RE3C1C1
`
`Page 12 of 18
`Google - Exhibit 1009, page 12
`
`Google - Exhibit 1009, page 12
`
`

`
`residing on the first memory space is protected from corruption by a malware process
`
`downloaded from the network and executing as part of the at least one secure second logical
`
`process;
`
`wherein the at least one secure second logical process is selected from the group
`
`consisting of;
`
`an electronic mail process;
`
`an internet browser process;
`
`a word processor process.
`
`58.
`
`(New) The method of Claim 57 further comprising:
`
`closing the at least one secure second logical process; and
`
`upon closing the at least one secure second logical process, automatically deleting at least
`
`one file selected from the group consisting of:
`
`a temporary internet file;
`
`a cookie; and
`
`a file corrupted by malware.
`
`59.
`
`(New) The method of Claim 57 further comprising blocking attempts by malware
`
`to record data entry by the computer user.
`
`60.
`
`(New) The method of Claim 57 further comprising the first logical process
`
`opening a plurality of secure second logical processes.
`
`ARAC-01RE3C1C1
`
`Page 13 of 18
`Google - Exhibit 1009, page 13
`
`Google - Exhibit 1009, page 13
`
`

`
`61.
`
`(New) The method of Claim 57 wherein the at least one secure second logical
`
`process is initialized from clean system files.
`
`62.
`
`(New) The method of Claim 57 further comprising executing instructions from
`
`the first logical process on a first core of a multi-core processor and executing instructions from
`
`the at least one secure second logical process on a second core of the multi-core processor.
`
`63.
`
`(New) The method of Claim 57 wherein at least one file corrupted by the
`
`malware process is capable of being restored from a protected image.
`
`64.
`
`(New) The method of Claim 63 wherein the protected image is stored at a
`
`location selected from the group consisting of:
`
`a removable drive,
`
`the first memory space,
`
`a partition on a memory device, and
`
`a memory storage medium.
`
`65.
`
`(New) The method of Claim 57 further comprising placing an offending website
`
`that contributed to a malware infection on a block list, thereby blocking future access to the
`
`offending website and allowing access to the offending website if the computer user authorizes
`
`access.
`
`66.
`
`(New) The method of Claim 57 wherein the portable computer based system is
`
`further configured with a cell phone communication capability.
`
`ARAC-01RE3C1C1
`
`Page 14 of 18
`Google - Exhibit 1009, page 14
`
`Google - Exhibit 1009, page 14
`
`

`
`REMARKS
`
`This reissue application is a continuation of U.S. Reissue Patent Application Serial No.
`
`13/015,186 (now, U.S. Patent No. RE43,987), which is a reissue continuation application of U.S.
`
`Reissue Patent Application Serial No. 12/854,149 (now, U.S. Patent No. RE43,103), which is a
`
`reissue application of U.S. Patent No. 7,484,247. The Applicants respectfully provide the
`
`following remarks related to the claim amendments submitted above. This is a broadening
`
`reissue application.
`
`Claims 1-20 have been canceled without prejudice or disclaimer. Claims 21-66 have
`
`been added by this Preliminary Amendment to more comprehensively claim the subject invention
`
`and their examination is respectfully requested. No new subject matter has been added by the
`
`claims, and the new claims are fully supported in the specification.
`
`The Applicants respectfully provide notice that more than one reissue application has
`
`been filed on U.S. Patent No. 7,484,247, as required under 37 C.F.R. § 1.177(a). The
`
`specification has also been amended to insert a Cross Reference to Related Applications section
`
`in compliance with 37 C.F.R. §1.53 and §1.173(b).
`
`A Statement of Status of Claims and Support for Claim changes, as required by 37 C.F.R.
`
`§ 1.173(c) is provided in an Appendix. The support shown in the Appendix is by way of
`
`example only and the Applicants make no representation that the identified support is the only or
`
`best support for the claims. Other support than that specifically cited in the Appendix may be
`
`found in the specification, drawings, and original claims, as well.
`
`ARAC-01RE3C1C1
`
`Page 15 of 18
`Google - Exhibit 1009, page 15
`
`Google - Exhibit 1009, page 15
`
`

`
`Please enter the above amendments before consideration of this application. The
`
`Applicants believe the claims are in condition for allowance and respectfully request that the
`
`Examiner pass the case to reissuance. The Examiner is invited to contact the undersigned to
`
`address any questions or concerns regarding the present reissue application.
`
`Respectfully submitted,
`
`/Glenn W. Boisbrun/
`Glenn W. Boisbrun
`Attorney for Applicants
`Reg. No. 39,615
`
`February 1, 2013
`
`Date
`
`Slater & Matsil, L.L.P.
`17950 Preston Rd., Suite 1000
`Dallas, TX 75252-5793
`Tel: (972) 732-1001
`Fax: (972) 732-9218
`
`ARAC-01RE3C1C1
`
`Page 16 of 18
`Google - Exhibit 1009, page 16
`
`Google - Exhibit 1009, page 16
`
`

`
`APPENDIX
`
`STATUS OF CLAIMS AND
`SUPPORT FOR CLAIM CHANGES
`
`Support
`
`Original Claim 1
`Original Claim 1
`Original Claim 5
`Original Claim 1
`Original Claim 14
`Fig. 4, 420
`Col 8 lines 23-26
`Claim 1
`Claim 1
`Claim 5
`Claim 1
`Claim 16
`Claim 20
`Col 8, lines 23-26
`Original Claim 1
`Original Claim 1
`Original Claim 5
`Original Claim 1
`Original Claim 14
`Original Claim 6
`Original Claim 7
`Col 9 lines 30-37
`Fig. 2
`Fig. 9
`Col 7 lines 42-44
`Fig. 1, 120, 191,
`190, 195
`Fig. 1, 120, 191,
`190, 195
`Fig. 1, 140, 190, 195
`Col 13 lines 41-62
`Col 7 lines 58-62
`Col 13 lines 22-24
`Col 13 lines 16-30
`Col 16 lines 6-47
`Fig. 4, 420
`Col 12 lines 46-58
`
`Original Claim 10
`
`Original Claim 15
`
`Col 16, lines 22-47
`Col 12 lines 46-58
`
`Claim 10
`
`Claim 15
`
`Original Claim 10
`Original Claim 10
`
`Original Claim 15
`Original Claim 15
`
`Col 9 line 53
`Col 16 lines 22-24
`Col 11 lines 2-4
`Col 8 lines 1-6
`
`Col 10 lines 46-49
`Fig. 1
`Col 18 lines 23-28
`
`Col 11 lines 38-41
`
`Col 7 lines 13-16
`
`Claims
`1-20
`21
`22
`23
`24
`25
`26
`27
`28
`29
`30
`31
`32
`33
`34
`35
`36
`37
`38
`39
`40
`41
`42
`
`43
`
`44
`
`45
`46
`47
`48
`49
`50
`51
`52
`
`Status
`Canceled
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`New
`
`New
`
`New
`
`New
`New
`New
`New
`New
`New
`New
`New
`
`ARAC-01RE3C1C1
`
`Page 17 of 18
`Google - Exhibit 1009, page 17
`Google
`- Exhibit
`1009, page 17
`
`Google - Exhibit 1009, page 17
`
`

`
`53
`54
`55
`56
`57
`
`58
`59
`60
`61
`62
`63
`64
`65
`66
`
`New
`New
`New
`New
`New
`
`New
`New
`New
`New
`New
`New
`New
`New
`New
`
`Col 18 lines 33-38
`Col 16, lines 30-40
`Col 13 lines 58-65
`Col 9 lines 30-37
`Col 9 lines 30-37
`Fig. 9
`Col 7 lines 5-7
`Col 9 line 53
`Col 13 lines 41-62
`Col 7 lines 58-62
`Col 13 lines 22-24
`Col 13 lines 16-30
`Col 16 lines 6-47
`Fig. 4, 420
`Col 12 lines 46-58
`Col 13 lines 58-65
`Col 9 lines 30-37
`
`Fig 2
`Col 16 lines 22-24
`Col 11 lines 2-4
`Col 8 lines 1-6
`
`Col 10 lines 46-49
`Fig. 1
`Col 18 lines 23-28
`
`Col 7 lines 13-16
`
`ARAC-01RE3C1C1
`
`Page 18 of 18
`Google - Exhibit 1009, page 18
`
`Google - Exhibit 1009, page 18
`
`

`
`PTO/AIA/53 (09-12)
`Approved for use through 08/31/2013. OMB 0651-0033
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`Docket Number (Optional)
`
`REISSUE APPLICATION: CONSENT OF ASSIGNEE;
`STATEMENT OF NON-ASSIGNMENT
`
`ARAC-01RE3C1C1
`
`This is part of the application for a reissue patent based on the original patent identified below.
`Name of Patentee(s)
`Allen F. Rozman, Alfonso J. Cioffi
`
`Patent Number
`7,484,247
`Title of Invention
`System and Method for Protecting a Computer System from Malicious Software
`
`Date Patent Issued
`January 27, 2009
`
`1.
`
`Filed herein is a statement under 37 CFR 3.73(c).
`
`(Form PTO/AIA/96)
`
`assignment of the patent' is in effect.
`2. ,/ Ownership of the patent is in the inventor(s), and no
`
`One of boxes 1 or 2 above must be checked. If multiple assignees, complete this form for each assignee. If
`box 2 is checked, skip the next entry and go directly to "Name of Assignee."
`
`The written consent of all assignees and inventors owning an undivided interest in the original
`patent is included in this application for reissue.
`
`The assignee(s) owning an undivided interest in said original patent is/are
`and the assignee(s) consents to the accompanying application for reissue.
`
`,
`
`Name of assignee/inventor (if not assigned)
`Alfonso J. Cioffi, as i ventor and less representative on behalf of Allen F. Rozman, deceased
`
`
`Signature
`
`j
`
`Date
`
`Typed or prin -: nam
`
`d t
`
`of •erson signing for assignee (if assigned)
`
`/3(...) /-,-/(9 /_3
`
`This collection of information is required by 37 CFR 1.172. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 6 minutes to complete, including
`gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on the
`amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS
`ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`If you need assistance in completing the form, call 1-800-PTO-9199 and select option 2.
`
`Google - Exhibit 1009, page 19
`Google - Exhibit 1009, page 19
`
`Google - Exhibit 1009, page 19
`
`

`
`Doc Code REI t-3.DECL.
`Document Description: Reissue Declaration Filed In Accordance With MPEP 1414
`
`PT0i,NA,105 (06-12)
`Approved for use through 08/31/2013. OMB 0651-0033
`U.S Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are Tecuired to resoond to a collection Of information ;..ink;ss it dispays a
`OiVE controi number.
`Docket Number (Optional;
`ARAC-0 1 RE3C1 C1
`
`REISSUE APPLICATION DECLARATION BY THE INVENTOR
`
`hereby declare that:
`Each inventor's residence and mating address are stated below next to their name.
`believe am the oric.final inventor or an original joint inventor of the subject matter which is desc.Tibed and claimed
`in patent number 7,484,247
`granted ""elY 27 ' 2009
`and for which a
`System and Method for Protecting a Computer System from Malicious Software
`reissue patent is sought on the invention titled
`
`the specification of which
`
` is attached hereto.
`
`TI was filed on
`
` as reissue application number
`
`
`
`The above-identified application was made or authorized to be made by me
`
`I hereby acknowledge that any willful false statement made in this declaration is punishable under 18 U.S.C. 1001 by fine
`or imprisonment of not more than five (5) years, or both.
`
`I believe the original patent to be vvi-lolly or partly inoperative or invalid, for the reasons described
`below. (Check at boxes that apply.)
`
`I-1 by reason of a defective specification or drawing.
`Z by reason of the patentee claiming more or less than he had the right to claim in the patent.
`
` by reason of other errors.
`
`At least one error upon which reissue is based is described below. If the reissue is a broadening
`reissue, a claim that the application seeks to broaden must be identified:
`The patentees have claimed less than they had the right to claim and have filed a broadening
`reissue. At least one error is limiting the display of data to a windowed format.
`
`Every error in the patent which was corrected in the present reissue application, and is not
`covered by the prior declaration submitted in this application, arose without any deceptive
`intention on the part of the Applicants.
`
`[Page 1 of 2]
`This collection of information is required by 37 CFR 1.175. The information is required to obtain or retain a benefit by the public which is to file (and by the USP1O
`to pnacess) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 30 minutes to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on
`the amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450. Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS
`ADDRESS. SEND TO: Commissioner for Patents, P.0, Box 1450, Alexandria, VA 22313-1450.
`
`if you need assistance in completing the form, Caii 1-600-PTO-9199 end select option 2.
`
`Google - Exhibit 1009, page 20
`Google - Exhibit 1009, page 20
`
`Google - Exhibit 1009, page 20
`
`

`
`PTO/AIA/05 (06-12)
`Approved for use through 08/3112013. OMB 0651-0033
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of Information unless it displays a valid OMB control number.
`Docket Number (Optional)
`ARAC-01 RE3C1 C1
`
`(REISSUE APPLICATION DECLARATION BY THE INVENTOR, page 2)
`
`Note: To appoint a power of attorney, use form PTO/SB/81.
`
`Correspondence Address: Direct all communications about the application to:
`i The address associated with Customer Number: 25962
`OR
`Firm or
`Individual Name
`Address
`
`City
`
`Country
`
`Telephone
`
`State
`
`Zip
`
`Email
`
`WARNING:
`Petitioner/applicant is cautioned to avoid submitting personal information in documents filed in a patent application that may
`contribute to identity theft. Personal information such as social security numbers, bank account numbers, or credit card
`numbers (other than a check or credit card authorization form P10-2038 submitted for payment purposes) is never required by
`the USPTO to support a petition or an application. If this type of personal information is included in documents submitted to
`the USPTO, petitioners/applicants should consider redacting such personal information from the documents before submitting
`them to the USPTO. Petitioner/applicant is advised that the record of a patent application is available to the public after
`publication of the application (unless a non-publication request in compliance with 37 CFR 1.213(a) is made in the application)
`or issuance of a patent. Furthermore, the record from an abandoned application may also be available to the public if the
`application is referenced in a published application or an issued patent (see 37 CFR 1.14). Checks and credit card
`authorization forms PTO-2038 submitted for payment purposes are not retained in the application file and therefore are not
`publicly available.
`
`Legal name of sole or first inven or (E.g., Given Name (first and middle (if any) and Family Name or Surname)
`Alfonso J. C.:ffi, as inv ntor and as legal representative for Allen F. Rozman, deceased
`Date (Optio al)
`Inventor's S nat re
`
`Residence: City I
`Murphy
`Mailing Address
`
`719 Mockingbird Dr.
`
`City
`Murphy
`
`State
`TX
`
`State
`TX
`
`/
`Country
`US
`
`Zip
`75094
`
`.3 0 -20 13
`7
`
`Country
`US
`
`1
`
`I Additional joint inventors are named on the
`
`supplemental sheet(s) PTO/AIA/10 a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket