throbber
PTO/SB/50 (O8-O8)
`Approved for use through 08/31/2010. OMB 0651-0033
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paervvork Reduction Act of 1995 no ersons are reuired to resond to a collection of information unless it disla s a valid OMB control number.
`
`REISSUE PATENT APPLICATION TRANSMITTAL
`
`Address to:
`
`M3" Stop Reissue
`Commissioner for Patents
`P'O' Box 1450
`Alexandria, VA 22313-1450
`
`Attorney Docket No.
`
`ARAC_01RE1
`
`First Named Inventor
`Original Patent Number
`Original Patent Issue Date
`Month/Da /Year
`Express Mail Label No.
`
`Rozman, Amen |:_
`7 484 247 B2
`I
`I
`‘Jan’ 272009
`
`APPLICATION FOR REISSUE OF:
`(Check applicable box)
`APPLICATION ELEMENTS (37 CFR 1.173)
`
`Utility Patent
`
`I:I
`
`Plant Patent
`I:I
`Design Patent
`ACCOMPANYING APPLICATION PARTS
`
`Fee Transmittal FOFITI (PTO/SB/56)
`_
`_
`_
`Applicant claims small entity status. See 37 CFR 1.27.
`
`10.
`
`Statement of status and support for all
`changes to the claims. See 37 CFR 1.173(c).
`
`Specification and Claims in double column copy of patent format
`(amended, if appropriate)
`
`11:‘ Foreign Priority Claim (35 U_S_C_ 119)
`(if applicable)
`
`DraWIng(S) (proposed amendments’ ifappropriate)
`_
`_
`_
`_
`Reissue Oath/Declaration (original or copy)
`(37 C.F.R. 1.175) (PTO/SB/51 or 52)
`
`Power of Attorney
`
`Original U.S. Patent currently assigned?
`(If Yes, check applicable box(es))
`_
`_
`I:I Written Consent of all Assignees (PTO/SB/53)
`
`I:I Yes
`
`No
`
`12.
`
`Information Disclosure Statement (IDS)
`PTO/SB/08 or PTO-1449
`'3 copies of Citations attached
`
`13. I:I English Translation of Reissue Oath/Declaration
`(ifapp/[cab/e)
`Pre|iminaryAmendment
`
`14.
`
`l:| 37 CFR 3.73<b> statement (PTO/s B/96>
`
`15.
`
`:1 Return Receipt Postcard (MPEP 503)
`(Should be specifically itemized)
`
`16. I:I Other:
`
`. El CD-ROM or CD-R in duplicate, Computer Program (Appendix)
`or large table
`I: Landscape Table on CD
`. Nucleotide and/or Amino Acid Sequence Submission
`(if applicable, items a. — c. are required))
`a. I:I Computer Readable Form (CRF)
`b. Specification Sequence Listing on:
`i I] CD-ROM (2 copies) or CD-R (2 copies); or
`ii |:|
`paper
`Statements verifying identity of above copies
`17. CORRESPONDENCE ADDRESS
`
`c. I:I
`
`I:I The address associated withCustomer Number: I OR
`Name
`Allen F. Rozman
`
`Correspondence address below
`
`Address
`
`6402 Wildlife Trail
`
`City
`
`Country
`
`Signature
`
`TeIephOne
`
`214-478-2172
`
`Ema”
`
`arozman@verizon.net
`
`Zip Code
`
`75044
`
`/A. F. Rozmanl
`
`Date
`
`3/9/2010
`
`41230
`Registration No. (Attorney/Agent)
`Name (Print/Type) Allen l=_ Rozman
`This collection of information is required by 37 CFR 1.173. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 12 minutes to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on
`the amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS
`ADDRESS. SEND To: Mail Stop Reissue, Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`If you need assistance in completing the form, call 1-800-PTO-9199 and select option 2.
`
`Google - Exhibit 1002, page 1
`Google - Exhibit 1002, page 1
`
`Google - Exhibit 1002, page 1
`
`

`
`Privacy Act Statement
`
`The Privacy Act of 1974 (P.L. 93-579) requires that you be given certain information in connection
`with your submission of the attached form related to a patent application or patent. Accordingly,
`pursuant to the requirements of the Act, please be advised that: (1) the general authority for the
`collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the information solicited is voluntary;
`and (3) the principal purpose for which the information is used by the U.S. Patent and Trademark
`Office is to process and/or examine your submission related to a patent application or patent. If you do
`not furnish the requested information, the U.S. Patent and Trademark Office may not be able to
`process and/or examine your submission, which may result in termination of proceedings or
`abandonment of the application or expiration of the patent.
`
`The information provided by you in this form will be subject to the following routine uses:
`
`1 . The information on this form will be treated confidentially to the extent allowed under the
`Freedom of Information Act (5 U.S.C. 552) and the Privacy Act (5 U.S.C 552a). Records from
`this system of records may be disclosed to the Department of Justice to determine whether
`disclosure of these records is required by the Freedom of Information Act.
`A record from this system of records may be disclosed, as a routine use, in the course of
`presenting evidence to a court, magistrate, or administrative tribunal, including disclosures to
`opposing counsel in the course of settlement negotiations.
`A record in this system of records may be disclosed, as a routine use, to a Member of
`Congress submitting a request involving an individual, to whom the record pertains, when the
`individual has requested assistance from the Member with respect to the subject matter of the
`record.
`
`A record in this system of records may be disclosed, as a routine use, to a contractor of the
`Agency having need for the information in order to perform a contract. Recipients of
`information shall be required to comply with the requirements of the Privacy Act of 1974, as
`amended, pursuant to 5 U.S.C. 552a(m).
`A record related to an International Application filed under the Patent Cooperation Treaty in
`this system of records may be disclosed, as a routine use, to the International Bureau of the
`World Intellectual Property Organization, pursuant to the Patent Cooperation Treaty.
`A record in this system of records may be disclosed, as a routine use, to another federal
`agency for purposes of National Security review (35 U.S.C. 181) and for review pursuant to
`the Atomic Energy Act (42 U.S.C. 218(c)).
`A record from this system of records may be disclosed, as a routine use, to the Administrator,
`General Services, or his/her designee, during an inspection of records conducted by GSA as
`part of that agency’s responsibility to recommend improvements in records management
`practices and programs, under authority of 44 U.S.C. 2904 and 2906. Such disclosure shall
`be made in accordance with the GSA regulations governing inspection of records for this
`purpose, and any other relevant (i.e., GSA or Commerce) directive. Such disclosure shall not
`be used to make determinations about individuals.
`
`A record from this system of records may be disclosed, as a routine use, to the public after
`either publication of the application pursuant to 35 U.S.C. 122(b) or issuance of a patent
`pursuant to 35 U.S.C. 151. Further, a record may be disclosed, subject to the limitations of 37
`CFR 1.14, as a routine use, to the public if the record was filed in an application which
`became abandoned or in which the proceedings were terminated and which application is
`referenced by either a published application, an application open to public inspection or an
`issued patent.
`A record from this system of records may be disclosed, as a routine use, to a Federal, State,
`or local law enforcement agency, if the USPTO becomes aware of a violation or potential
`violation of law or regulation.
`
`Google - Exhibit 1002, page 2
`Google - Exhibit 1002, page 2
`
`Google - Exhibit 1002, page 2
`
`

`
`PTOISBIS3 (O9-07)
`Approved for use through 08/31I2010. OMB 0651-0033
`US. Patent and ‘Trademark Office: US. DEPARTMENT OF COMMERCE
`Under the Paerwork Reduction Act of 1995. no ersons are re uired to resend to a coiiection of information unless it disia
`a valid OMB control number.
`
`
`
`REISSUE APPLICATION: CONSENT OF ASSIGNEE;
`STATEMENT OF NON-ASSIGNMENT
`
`Docket Number (Optionai)
`
`ARAC—O1 RE1
`
`art of the a iication for a reissue atent based on the oriinal atent identified beiow.
`
`Name of Patentee(s)
`Rozman; Allen F,
`
`Ciofii; Alfonso J
`
`Patent Number
`
`7,484,247
`Title of Invention
`
`Date Patent issued
`
`January 27, 2009
`
`System and method for protecting a computer system from maiicious software.
`
`‘I. E]
`
`Fiied herein is a statement under 37 CFR 3.73(b)_ (Form PTO:'SBI96)
`
`2.
`
`Ownership of the patent is in the inventor(s), and no assignment of the patent is in effect.
`
`One of boxes 1 or 2 above must be checked. If multiple assignees, complete this form for each assignee. if
`box 2 is checked, skip the next entry and go directly to “Name of Assignee”.
`
`The written consent of all assignees and inventors owning an undivided interest in the original
`atent is included in this a iication for reissue.
`
`The assignee(s) owning an undivided interest in said original patent is/are
`and the assignee(s) consents to the accompanying application for reissue.
`
`Name of assignee/inventor (if not assigned)
`
`Rozman; Alien F, Cioffi; Alfonso J
`
`Signature
`
`r {Li
`
`Typed or printe J
`
`This collection of information is required by 37 CFR 1.172. The information is required to obtain or retain a benefit by the public which is to me (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 6 minutes to complete, including
`gathering. preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on the
`emount of time you require to complete this form andlor suggestions for reducing this burden, should be sent to the Chief information Officer, US. Patent and
`Trademark Office, US. Department of Commerce, PO. Box 1450, Alexandria, VA 223131450. DO NOT SEND FEES OR COMPLETED FORMS TO Tl-tls
`ADDRESS. SEND To: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`If you need assistance in completing the form, call 1-B00~PTO—9f 99 and select option 2.
`
`Google - Exhibit 1002, page 3
`Google - Exhibit 1002, page 3
`
`Google - Exhibit 1002, page 3
`
`

`
`Privacy Act Statement
`
`The Privacy Act of 1974 (P.L. 93-579) requires that you be given certain information in connection
`with your submission of the attached form related to a patent application or patent. Accordingly,
`pursuant to the requirements of the Act, please be advised that: (1) the general authority for the
`collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the information solicited is voluntary;
`and (3) the principal purpose for which the information is used by the U.S. Patent and Trademark
`Office is to process and/or examine your submission related to a patent application or patent. If you do
`not furnish the requested information, the U.S. Patent and Trademark Office may not be able to
`process and/or examine your submission, which may result in termination of proceedings or
`abandonment of the application or expiration of the patent.
`
`The information provided by you in this form will be subject to the following routine uses:
`
`1 . The information on this form will be treated confidentially to the extent allowed under the
`Freedom of Information Act (5 U.S.C. 552) and the Privacy Act (5 U.S.C 552a). Records from
`this system of records may be disclosed to the Department of Justice to determine whether
`disclosure of these records is required by the Freedom of Information Act.
`A record from this system of records may be disclosed, as a routine use, in the course of
`presenting evidence to a court, magistrate, or administrative tribunal, including disclosures to
`opposing counsel in the course of settlement negotiations.
`A record in this system of records may be disclosed, as a routine use, to a Member of
`Congress submitting a request involving an individual, to whom the record pertains, when the
`individual has requested assistance from the Member with respect to the subject matter of the
`record.
`
`A record in this system of records may be disclosed, as a routine use, to a contractor of the
`Agency having need for the information in order to perform a contract. Recipients of
`information shall be required to comply with the requirements of the Privacy Act of 1974, as
`amended, pursuant to 5 U.S.C. 552a(m).
`A record related to an International Application filed under the Patent Cooperation Treaty in
`this system of records may be disclosed, as a routine use, to the International Bureau of the
`World Intellectual Property Organization, pursuant to the Patent Cooperation Treaty.
`A record in this system of records may be disclosed, as a routine use, to another federal
`agency for purposes of National Security review (35 U.S.C. 181) and for review pursuant to
`the Atomic Energy Act (42 U.S.C. 218(c)).
`A record from this system of records may be disclosed, as a routine use, to the Administrator,
`General Services, or his/her designee, during an inspection of records conducted by GSA as
`part of that agency’s responsibility to recommend improvements in records management
`practices and programs, under authority of 44 U.S.C. 2904 and 2906. Such disclosure shall
`be made in accordance with the GSA regulations governing inspection of records for this
`purpose, and any other relevant (i.e., GSA or Commerce) directive. Such disclosure shall not
`be used to make determinations about individuals.
`
`A record from this system of records may be disclosed, as a routine use, to the public after
`either publication of the application pursuant to 35 U.S.C. 122(b) or issuance of a patent
`pursuant to 35 U.S.C. 151. Further, a record may be disclosed, subject to the limitations of 37
`CFR 1.14, as a routine use, to the public if the record was filed in an application which
`became abandoned or in which the proceedings were terminated and which application is
`referenced by either a published application, an application open to public inspection or an
`issued patent.
`A record from this system of records may be disclosed, as a routine use, to a Federal, State,
`or local law enforcement agency, if the USPTO becomes aware of a violation or potential
`violation of law or regulation.
`
`Google - Exhibit 1002, page 4
`Google - Exhibit 1002, page 4
`
`Google - Exhibit 1002, page 4
`
`

`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Applicants:
`
`Rozman, er al.
`
`Docket No.:
`
`ARAC-0 l RE1
`
`Serial No.:
`
`TBD
`
`Filed:
`
`Herewith
`
`Reissue of:
`
`7,484,247
`
`Issued:
`
`January 27, 2009
`
`Title:
`
`System and Method for Protecting a Computer System from Malicious
`Software.
`
`Mail Stop: REISSUE
`Commissioner for Patents
`
`P. O. Box 1450
`
`Alexandria, VA 22313-1450
`
`Dear Sir:
`
`PRELIMINARY AMENDMENT
`
`Prior to examination on the merits, Applicants respectfully submit the amendments and
`
`remarks set forth below.
`
`ARAC-0lREl
`
`Page 1 of23
`
`Google - Exhibit 1002, page 5
`Google - Exhibit 1002, page 5
`
`Google - Exhibit 1002, page 5
`
`

`
`In the Specification:
`
`Before the heading “Cross Reference to Related Patents and Applications” please insert:
`
`Cross Reference to Multiple Reissue Applications
`
`This application is a reissue application of U.S. Patent No. 7,484,247, entitled “System
`
`and Method for Protecting a Computer System from Malicious Software,” issued on Januapy 27,
`
`2009, and is related to another reissue application designated U.S. Patent Application Serial No.
`
`gDocl<et No. ARAC-0lRE2) from U.S. Patent No. 7,484,247 filed concurrently
`
`herewith, which are incogporated herein by reference.
`
`ARAC-0lREl
`
`Page 2 of 23
`
`Google - Exhibit 1002, page 6
`Google - Exhibit 1002, page 6
`
`Google - Exhibit 1002, page 6
`
`

`
`Claims (1, 2, 6, 10, 11, 15, 17 and 20) are currently amended from their form in U.S. Patent No.
`
`7,484,247. Claims (3, 4, 5, 7, 8, 9, 12, 13, 14, 16, 18 and 19) are in their original form in U.S.
`
`Patent No. 7,484,247.
`
`1
`
`1)
`
`(Currently amended) A method of operating a computer system capable of exchanging
`
`data across a network of one or more computers and having at least a first and second
`
`electronic data processor capable of executing instructions using a common operating
`
`system, comprising the steps of:
`
`executing browser instructions in a first logical process within the common
`
`operating system using the first electronic data processor, wherein the first logical
`
`process is capable of accessing data contained in a first memory space
`
` ;
`
`executing instructions in a second logical process within the common operating
`
`system using the second electronic data processor, wherein the second logical process is
`
`capable of accessing data contained in the second memory space
`
`
`
`displaying data from the first logical
`
`process and the second logical process, wherein a Video processor is adapted to combine
`
`data from the first and second logical processes and transmit the combined data to [the] a
`
`display ter-m-i-n-a-1;
`
`wherein the computer system is configured such that the second electronic data
`
`processor is operating in a protected mode and data residing on the first memory space is
`
`ARAC-01RE1
`
`Page 3 of 23
`
`Google - Exhibit 1002, page 7
`Google - Exhibit 1002, page 7
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`Google - Exhibit 1002, page 7
`
`

`
`20
`
`21
`
`protected from corruption by a malware process downloaded from the network and
`
`executing as part of the second logical process.
`
`2)
`
`(Currently amended) The method of claim 1 wherein the fim%m
`
`second memory space
`
`
`
`. - is selected
`
`from the group consisting of:
`
`a memo;v_ zone within a physical memo;v_ common to the first memo;v_ space;
`
`a partition on a memogv_ device;
`
`random access memoLv_ (RAM );
`
`both volatile and nonvolatile memo;v_.
`
`3)
`
`(Original) The method of claim 1 wherein the second logical process is selected from the
`
`group consisting of:
`
`an electronic mail process, an instant messaging process, an intemet browser process,
`
`an interactive gaming process, a virtual private network (VPN) process, and a reader
`
`application process.
`
`4)
`
`(Original) The method of claim 1 wherein the first logical process receives user interface
`
`data, and passes the user interface data to the second logical process.
`
`5)
`
`(Original) The method of claim 1 wherein the first and second electronic data processors
`
`are part of a multi-core electronic data processor.
`
`ARAC-0lREl
`
`Page 4 of 23
`
`Google - Exhibit 1002, page 8
`Google - Exhibit 1002, page 8
`
`Google - Exhibit 1002, page 8
`
`

`
`l
`
`6)
`
`(Currently amended) The method of claim 1 and further comprising the step of restoring
`
`at least one corrupted data file from [an] a
`
`protected image
`
`7)
`
`(Original) The method of claim 1 and further comprising the step of automatically
`
`deleting at least one data file residing on the second memory space when the second
`
`logical process is terminated.
`
`8)
`
`(Original) The method of claim 1 and further comprising the steps of:
`
`encrypting data with the first logical process;
`
`transferring the encrypted data from the first logical process to the second logical
`
`process;
`
`transferring the encrypted data from the second logical process to the network
`
`interface device.
`
`9)
`
`(Original) The method of claim 8 and further comprising the steps of:
`
`decrypting the data with the network interface device;
`
`transferring the decrypted data from the network interface device to the network
`
`10) (Currently amended) A multi-processor computer system using a common operating
`
`system capable of exchanging data across a network of one or more computers via a
`
`network interface device, comprising:
`
`a first electronic data processor capable of executing browser instructions using the
`
`common operating system and communicatively coupled to a first memory space-and—a
`
`ARAC-0lREl
`
`Page 5 of 23
`
`Google - Exhibit 1002, page 9
`Google - Exhibit 1002, page 9
`
`Google - Exhibit 1002, page 9
`
`

`
` ;
`
`a second electronic data processor capable of executing browser instructions using
`
`the common operating system and communicatively coupled to [the] a second memory
`
`
`
`a Video processor adapted to combine Video data from the first and second electronic
`
`data processors and transmit the combined Video data to a display
`
`
`
`wherein the computer system is configured such that the second electronic data
`
`processor is operating in a protected mode and data residing on the first memory space is
`
`protected from corruption by a malware process downloaded from the network and
`
`executing on the second electronic data processor.
`
`10
`
`ll
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`ll) (Currently amended) The computer system of claim 10 wherein the £1-r-st—n=ien=ier=,Lspaee
`
`and—the-second memory space i_s
`
`selected from the group consisting of:
`
`a memo;V_ zone within a physical memo;V_ common to the first memo;V_ space;
`
`a partition on a memo;V_ device;
`
`random access memogy gRAM );
`
`both Volatile and nonvolatile memory.
`
`12) (Original) The computer system of claim 10 wherein the first and second electronic data
`
`processors are part of a dual processor computer system.
`
`ARAC-0lREl
`
`Page 6 of 23
`
`Google - Exhibit 1002, page 10
`Google - Exhibit 1002, page 10
`
`Google - Exhibit 1002, page 10
`
`

`
`13) (Original) The computer system of claim 10 wherein the second electronic data
`
`processor and the Video processor are co-located on a circuit card, the circuit card being
`
`communicatively coupled to the first electronic data processor.
`
`14) (Original) The computer system of claim 10 wherein the computer system is configured
`
`such that the first electronic data processor is protected from executing instructions
`
`initiated by a malware process downloaded from the network and executing on the
`
`second electronic data processor.
`
`15) (Currently amended) A multi-processor computer system using a common operating
`
`system capable of exchanging data across a network of one or more computers,
`
`comprising:
`
`at least a first and second electronic data processor capable of executing instructions
`
`using the common operating system;
`
`at least a first and second memory space;
`
`a Video processor;
`
`wherein the first and second electronic data processors, first and second memory
`
`space, and Video processor are configured for performing the steps of;
`
`executing browser instructions in a first logical process with the first electronic data
`
`processor, wherein the first logical process is executing within the common operating
`
`system and is capable of accessing data contained in the first memory space and—the
`
` ;
`
`executing browser instructions in a second logical process with the second electronic
`
`data processor, wherein the second logical process is executing within the common
`
`ARAC-01RE1
`
`Page 7 of 23
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`Google - Exhibit 1002, page 11
`Google - Exhibit 1002, page 11
`
`Google - Exhibit 1002, page 11
`
`

`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`operating system and is capable of accessing data contained in the second memory space;
`
`
`
`displaying data from the first logical
`
`process and the second logical process, wherein the Video processor is adapted to
`
`combine data from the first and second logical processes and transmit the combined data
`
`to [the] a display terminal;
`
`wherein the computer system is configured such that the second electronic data
`
`processor is operating in a protected mode and data residing on the first memory space is
`
`protected from corruption by a malware process downloaded from the network and
`
`executing as part of the second logical process.
`
`16) (Original) The computer system of claim 15 wherein the computer system is further
`
`configured such that the first logical process is protected from executing instructions
`
`initiated by a malware process downloaded from the network and executing as part of the
`
`second logical process.
`
`17) (Currently amended) The computer system of claim 15 and further comprising: at least
`
`one network interface device capable of exchanging datawith
`
`preeess-and—wi-th the network and with a logical process selected from the group
`
`consisting of:
`
`the first logical process;
`
`the second logical process.
`
`ARAC-01RE1
`
`Page 8 of 23
`
`Google - Exhibit 1002, page 12
`Google - Exhibit 1002, page 12
`
`Google - Exhibit 1002, page 12
`
`

`
`18) (Original) The computer system of claim 17 wherein the network interface device is
`
`capable of decrypting data received from the second logical process and transmitting the
`
`decrypted data to the network while preventing the second logical process from accessing
`
`the decrypted data.
`
`19) (Original) The computer system of claim 15 wherein the at least one electronic data
`
`processor is selected from the group consisting of: a multi-core electronic data processor;
`
`dual electronic data processors; and multiple electronic data processors.
`
`20) (Currently amended) The computer system of claim 15 and further configured for
`
`performing the step of: restoring at least one corrupted data filem9
`
`m from [an] a protected image
`
`ARAC-01RE1
`
`Page 9 of 23
`
`Google - Exhibit 1002, page 13
`Google - Exhibit 1002, page 13
`
`Google - Exhibit 1002, page 13
`
`

`
`Please add the following new claims (21-57)
`
`1
`
`21) (New) A portable computer, comprising:
`
`a network interface device configured to exchange data across a network of one or
`
`more computers using a wireless connection;
`
`at least a first memory space and a second memory space, the first memory space
`
`containing at least one system file;
`
`at least one electronic data processor communicatively coupled to the network
`
`interface device, the first and second memory space, and to a user interface, wherein the
`
`user interface is configured to receive input from a computer user;
`
`the at least one electronic data processor configured to execute a first browser process
`
`in a first logical process, wherein the first logical process is capable of accessing data
`
`contained in the first memory space;
`
`the at least one electronic data processor further configured to execute a second
`
`browser process in a second logical process, wherein the second logical process is
`
`capable of accessing data contained in the second memory space and is further capable of
`
`generating video data;
`
`a video processor configured to transmit video data from the second browser process
`
`to a display;
`
`wherein the first browser process is capable of opening the second browser process
`
`and is further capable of passing data to the second browser process;
`
`wherein further the portable computer is configured such that the at least one system
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`ARAC-01RE1
`
`Page 10 of 23
`
`Google - Exhibit 1002, page 14
`Google - Exhibit 1002, page 14
`
`Google - Exhibit 1002, page 14
`
`

`
`21
`
`22
`
`1
`
`2
`
`3
`
`1
`
`2
`
`1
`
`2
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`1
`
`2
`
`3
`
`4
`
`file residing on the first memory space is protected from corruption by a malware process
`
`downloaded from the network and executing within the second browser process.
`
`22) (New) The portable computer of Claim 21 wherein the first browser process is capable
`
`of exchanging data with the network interface device and with the second browser
`
`process.
`
`23) (New) The portable computer of Claim 22 wherein the first browser process is capable of
`
`passing data downloaded from the network to the second browser process.
`
`24) (New) The portable computer of Claim 21 wherein the second browser process is capable
`
`of exchanging data with the network interface device and with the first browser process.
`
`25) (New) The portable wireless communication device of Claim 21 wherein the at least one
`
`electronic data processor is selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors;
`
`a multi-core electronic data processor.
`
`26) (New) The portable computer of Claim 21 wherein the second memory space is selected
`
`from the group consisting of:
`
`a memory zone within a physical memory common to the first memory space;
`
`a partition on a memory device;
`
`ARAC-0lREl
`
`Page ll of 23
`
`Google - Exhibit 1002, page 15
`Google - Exhibit 1002, page 15
`
`Google - Exhibit 1002, page 15
`
`

`
`random access memory (RAM);
`
`both volatile and nonvolatile memory.
`
`27) (New) The portable computer of Claim 21 configured such that at least one corrupted file
`
`required for a browser process is capable of being restored from a protected image.
`
`28) (New) The portable computer of Claim 27 wherein the protected image is stored at a
`
`location selected from the group consisting of:
`
`a removable drive;
`
`the first memory space;
`
`a partition on a memory device;
`
`a nonvolatile memory disk;
`
`another device.
`
`29) (New) The portable computer of Claim 21 configured such that at least one corrupted file
`
`residing on the second memory space is capable of being automatically deleted when the
`
`second browser process is terminated.
`
`30) (New) The portable computer of Claim 21 configured such that the first browser process
`
`is protected from executing instructions initiated by a malware process downloaded from
`
`the network and executing as part of the second browser process.
`
`31) (New) The portable computer of Claim 21 wherein attempts by malware to record data
`
`entry by the computer user are effectively blocked.
`
`ARAC-0lREl
`
`Page 12 of 23
`
`Google - Exhibit 1002, page 16
`Google - Exhibit 1002, page 16
`
`Google - Exhibit 1002, page 16
`
`

`
`1
`
`32) (New) A method of operating a portable computer having at least one electronic data
`
`processor communicatively coupled to a first and second memory space and to a network
`
`interface device, wherein the network interface device is configured to exchange data
`
`across a network of one or more computers using a wireless connection, comprising the
`
`steps of:
`
`storing at least one system file within the first memory space;
`
`executing a first browser process in a first logical process using the at least one
`
`electronic data processor, wherein the first logical process is configured to access data
`
`contained in the first memory space;
`
`executing a second browser process in a second logical process using the at least
`
`one electronic data processor, wherein the second logical process is configured to access
`
`data contained in the second memory space and is further configured to generate video
`
`data;
`
`opening the second browser process on instruction from the first browser process;
`
`passing data from the first browser process to the second browser process;
`
`displaying video data from the second browser process;
`
`wherein the portable computer is configured such that the at least one system file
`
`residing on the first memory space is protected from corruption by a malware process
`
`downloaded from the network and executing as part of the second browser process.
`
`33) (New) The method of Claim 32 wherein the portable computer is configured such that the
`
`first browser process is capable of exchanging data with the network interface device and
`
`with the second browser process.
`
`ARAC-01RE1
`
`Page 13 of23
`
`Google - Exhibit 1002, page 17
`Google - Exhibit 1002, page 17
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`1
`
`Google - Exhibit 1002, page 17
`
`

`
`l
`
`34) T(New) The method of Claim 33 and further comprising the step of;
`
`downloading data from the network and passing the data from the first browser
`
`process to the second browser process.
`
`35) (New) The method of Claim 32 wherein the portable computer is configured such that the
`
`second browser process is capable of exchanging data with the network interface device
`
`and with the first browser process.
`
`36) (New) The method of Claim 32 wherein the second memory space is selected from the
`
`group consisting of:
`
`a memory zone within a physical memory common to the first memory space;
`
`a partition on a memory device;
`
`random access memory (RAM);
`
`both volatile and nonvolatile memory.
`
`37) (New) The method of Claim 32 and further comprising the step of;
`
`restoring at least one corrupted file from a protected image.
`
`38) (New) The method of Claim 37 wherein the protected image is stored at a location
`
`selected from the group consisting of:
`
`a removable drive;
`
`the first memory space;
`
`a partition on a memory device;
`
`ARAC-0lREl
`
`Page 14 of 23
`
`Google - Exhibit 1002, page 18
`Google - Exhibit 1002, page 18
`
`Google - Exhibit 1002, page 18
`
`

`
`a nonvolatile memory disk;
`
`another device.
`
`39) (New) The method of Claim 32 and further comprising the step of;
`
`deleting at least one corrupted data file residing on the second memory space
`
`when the second logical process is terminated.
`
`40) (New) The method of Claim 32 wherein the at least one electronic data processor is
`
`selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors;
`
`a multi-core electronic data processor.
`
`41) (

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket