`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`313-1450
`Alexandria, Virginia 22.
`www.uspto.gov
`
`APPLICATION NO.
`
`
`
`
` FILING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`
`
`
`CONFIRMATIONNO.
`
`11/889,685
`
`08/15/2007
`
`Nalini J. Prakash
`
`2222.540REIO
`
`5524
`
`26111
`
`7590
`
`06/04/2010
`
`STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
`1100 NEW YORK AVENUE,N.W.
`WASHINGTON,DC 20005
`
`EXAMINER
`
`NGUYEN,LE V
`
`ART UNIT
`
`2174
`
`MAIL DATE
`
`06/04/2010
`
`PAPER NUMBER
`
`DELIVERY MODE
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`PTOL-90A (Rev. 04/07)
`
`
`
`
`
`Office Action Summary
`
`Application No.
`
`Applicant(s)
`
`11/889,685
`Examiner
`
`PRAKASH, NALINI J.
`Art Unit
`
`-- The MAILING DATEof this communication appears on the cover sheet with the correspondence address--
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLYIS SET TO EXPIRE 3 MONTH(S) OR THIRTY (30) DAYS,
`WHICHEVER IS LONGER, FROM THE MAILING DATE OF THIS COMMUNICATION.
`Extensions of time may be available underthe provisions of 37 CFR 1.136(a).
`In no event, however, may a reply be timelyfiled
`after SIX (6) MONTHSfrom the mailing date of this communication.
`If NO period forreply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHSfrom the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for replywill, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three monthsafter the mailing date of this communication, even if timely filed, may reduce any
`eamed patent term adjustment. See 37 CFR 1.704(b).
`
`Status
`
`1)L] Responsive to communication(s) filed on
`2a)L] This action is FINAL.
`2b)X] This action is non-final.
`3)L] Sincethis application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.
`
`Disposition of Claims
`
`4)X] Claim(s) 1-70 is/are pending in the application.
`
`4a) Of the above claim(s)
`is/are withdrawn from consideration.
`
`5)L] Claim(s)
`is/are allowed.
`6)X] Claim(s) 1-70 is/are rejected.
`7)L] Claim(s)__ is/are objectedto.
`8)L] Claim(s)____ are subject to restriction and/or election requirement.
`
`Application Papers
`
`9)L] The specification is objected to by the Examiner.
`
`10)L] The drawing(s) filed on
`is/are: a)[_] accepted or b)[_] objected to by the Examiner.
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121(d).
`11)] The oath or declaration is objected to by the Examiner. Note the attached Office Action or form PTO-152.
`
`Priority under 35 U.S.C. § 119
`
`12)L] Acknowledgmentis made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or(f).
`a)LJAll b)L_] Some*c)L] Noneof:
`
`1.L] Certified copies of the priority documents have been received.
`2.L] Certified copies of the priority documents have been received in Application No.
`3.L] Copies ofthe certified copies of the priority documents have been receivedin this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`* See the attached detailed Office action foralist of the certified copies not received.
`
`Attachment(s)
`4) C] Interview Summary (PTO-413)
`1) Xx] Notice of References Cited (PTO-892)
`Paper No(s)/Mail Date. __
`2) [J Notice of Draftsperson’s Patent Drawing Review (PTO-948)
`5) L] Noticeof Informal Patent Application
`3) IX] Information Disclosure Statement(s) (PTO/SB/08)
`
`Paper No(s)/Mail Date 10/29/07. 6) C] Other:
`U.S. Patent and Trademark Office
`
`PTOL-326 (Rev. 08-06)
`
`Office Action Summary
`
`Part of Paper No./Mail Date 20100323
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 2
`
`DETAILED ACTION
`
`1.
`
`37 CFR 1.173(c) requires the following:
`
`
` $8 O es
`
`ation of
`
`Applicant is reminded of this requirement even if no amendment is made in
`
`responseto the action.
`
`Claim Objections
`
`2.
`
`Claims 1, 2 and 60 are objected to because ofthe following informalities:
`
`a) claim 2, line 4:
`
`the phrase “in the files file” appears to contain a
`
`typographical error;
`
`b) claim 12, line 3 the limitation “the obscuring program” lack antecedent
`
`bases;
`
`c) claim 60, line 4:
`
`the phrase “thesecured item” appears to contain a
`
`typographical error; and
`
`Furthermore, claims 37, 39 and 40 are objected to under 37 CFR 1.75(c),
`
`as being of improper dependent form for failing to further limit the subject matter
`
`of a previous claim. Applicant is required to cancel the claim(s), or amend the
`
`claim(s) to place the claim(s) in proper dependent form, or rewrite the claim(s) in
`
`independent form. They areidentical to claims 2, 4 and 5. Appropriate correction
`
`is required.
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 3
`
`Claim Rejections - 35 USC § 112
`
`3.
`
`The following is a quotation of the second paragraph of 35 U.S.C. 112:
`
`The specification shall conclude with one or more claims particularly pointing out and distinctly
`claiming the subject matter which the applicant regards ashis invention.
`
`4.
`
`Claims 1-13, 19-21, 48, 54-56 and 66 are rejected under 35 U.S.C. 112,
`
`second paragraph, as being indefinite for failing to particularly point out and
`
`distinctly claim the subject matter which applicant regards as the invention. It is
`
`unclear what is meant by the phrases “each of the secured items has a default
`
`icon associated with if each of the secured items is otherwise not secured; and
`
`superimposing an appropriate icon” of claim 1 and “there is an appropriate icon
`
`for the at least one of the secured items when the at least one of the secured
`
`items is not secured” of claims 19 and 54. The Office will interpret: claim 1 to
`
`mean superimposing an appropriate icon corresponding to the security level over
`
`a default icon, and claims 19 and 54 to mean there is an appropriate icon for the
`
`at least one of the secured items when the at least one of the secured items is
`
`secured. With regards to claims 13, 48 and 66, it is noted that the terms
`
`“resizing”, “size” and its derivatives are not supported in the specification.
`
`Therefore, the phrase “resizing the appropriate icon according to a size of the
`
`default icon; and overlaying the resized appropriate icon onto the default icon in
`
`an optimal size without obscuring the rest of the default icon”will be interpreted
`
`to mean: sizing of the appropriate icon is in accordance with a size of the default
`
`icon and overlaying the appropriate icon onto the default icon in an optimal size
`
`without obscuring the rest of the default icon.
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 4
`
`Claim Rejections - 35 USC § 102
`
`5.
`
`The following is a quotation of the appropriate paragraphs of 35
`
`U.S.C. 102 that form the basis for the rejections under this section made in this
`
`Office action:
`
`A person shall be entitled to a patent unless —
`
`(b) the invention was patented or described in a printed publication in this or a foreign country
`or in public use or on sale in this country, more than one year prior to the date of application
`for patent in the United States.
`
`6.
`
`Claims 1, 8, 13, 18, 19, 22, 26, 31, 36, 43, 48, 53, 54, 57, 61 and 66 are
`
`rejected under 35 U.S.C. 102(b) as being anticipated by Salahshour etal.
`
`(“Salahshour’, US 5,577,125).
`
`As per claim 1, Salanhshour teaches a method for graphically indicating
`
`secured items in a program for displaying contents in a selected place
`
`comprising determining a security level of each of the secured items wherein
`
`each of the secured items has an associated default icon and superimposing an
`
`appropriate icon corresponding to the security level over the default icon without
`
`losing original indications of the default icon (fig. 2; col. 3, lines 21-29; files can
`
`be associated with a default icon such as a folder icon; if one ofthe files is
`
`detected as secured, a visual object is retrieved to be overlaid over a default
`
`icon, e.g. plurality of folder icons displayed wherein secured items 212 and 214
`
`has been determined to have a security level and displays a key overlay).
`
`Asper claim 8, Salahshour teaches a method for graphically indicating
`
`secured items in a program for displaying contents in a selected place wherein
`
`the default icon is associated with an executable program, when the each of the
`
`secured items or the default icon thereofis clicked, the executable program will
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 5
`
`be activated (figs. 2 and 4; col. 5, lines 23-34 and 52-62; following a requestto
`
`open an encrypted object such as selectable icon 274 and user supplies the
`
`encryption key, the step proceeds to step 385 to open and decrypt the object;
`
`moreover, the definition of a selectable icon is an interface element graphically
`
`representing a function or system resource that is accessed when the graphical
`
`representation is selected by user interaction).
`
`As per claim 13, Salanshour teaches a method for graphically indicating
`
`secured items in a program for displaying contents in a selected place wherein
`
`said superimposing an appropriate icon corresponding to the security level over
`
`the default icon comprisesresizing the appropriate icon according to a size of the
`
`default icon and overlaying the resized appropriate icon onto the default icon in
`
`an optimal size without obscuring the rest of the default icon, i.e., sizing of the
`
`appropriate icon is in accordance with a size of the default icon overlaying the
`
`appropriate icon onto the default icon in an optimal size without obscuring the
`
`rest of the default icon (fig. 2; col. 3, lines 21-29).
`
`Claims 18 and 19 in combination is similar in scope to claim 1 and are
`
`therefore rejected under similar rationale.
`
`Claims 22, 36 and 57are individually similar in scope to claim 1 and are
`
`therefore rejected under similar rationale.
`
`Claims 26, 43 and 61 are individually similar in scope to claim 8 and are
`
`therefore rejected under similar rationale.
`
`Claims 31, 48 and 66 areindividually similar in scope to claim 13 and is
`
`therefore rejected under similar rationale.
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 6
`
`Claims 53 and 54 in combination is similar in scope to claim 1 and are
`
`therefore rejected under similar rationale.
`
`Claim Rejections - 35 USC § 103
`
`7.
`
`The following is a quotation of 35 U.S.C. 103(a) which forms the basis for
`
`all obviousnessrejections set forth in this Office action:
`
`(a) A patent may not be obtained though the invention is not identically disclosed or described
`as set forth in section 102 ofthis title, if the differences between the subject matter sought to
`be patented and the prior art are such that the subject matter as a whole would have been
`obviousat the time the invention was made to a person having ordinary skill in the art to which
`said subject matter pertains. Patentability shall not be negatived by the manner in which the
`invention was made.
`
`8.
`
`Claims 2-7, 14, 15, 23-25, 32, 33, 37-42, 58-60, 67 and 68 are rejected
`
`under 35 U.S.C. 103(a) as being unpatentable over Salahshour etal.
`
`(“Salahshour’, US 5,577,125) in view of Astiz et al. (US 6,035,330).
`
`Asper claim 2, Salahshour teaches a method for graphically indicating
`
`secured items in a program for displaying contents in a selected place
`
`comprising capturing files from the selected place when the files are selected by
`
`the program for displaying the contents in the selected place(fig. 2; seize files
`
`from a selected place, i.e., source is stored somewhere, when the files in the
`
`selected place are selected by the program for displaying in 200 or when files are
`
`selected, they are pulled from storage for display), checking if any of the secured
`
`items are included in the files and activating a component/module when said
`
`checking indicates that there are at lease one of the secured items included in
`
`the file (col. 3, lines 21-29; a container for programs and files symbolized on the
`
`screen byan icon ofa file folder such as 210-214; 200 displays files 212 and 214
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 7
`
`wherein 212 and 214 are secured items having a key overlay associated with
`
`each and are displayed with a key overlay to indicate that they are secured).
`
`Salahshour does notexplicitly disclose pulling and intercepting files; however,
`
`intercepting a transmission ofa file from, for example, a serverfor display is a
`
`well known practice for many years as taught by Astiz (fig. 6; col. 6, lines 7-20
`
`and 43). In view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2d at 1397 (2007), it would
`
`have been obvious to an artisan at the time of the invention to incorporate such
`
`well known practices with the method of Salahshour in order to provide for
`
`exchanging offiles.
`
`Asper claim 3, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein said determining a security level of each of the secured items comprises
`
`activating a client component/module when said checking indicates that there are
`
`at lease one of the secured items is includedin the files, i.e., the client
`
`component/module facilitates superimposing an appropriate icon onto the default
`
`icon of the securedfile before the icon or superimposed icon and file name of the
`
`file is displayed by a browser (Salahshour: fig. 2; col. 3, lines 21-29; operating
`
`system is inherent especially when graphics such as folders 210-214 and 228
`
`are displayed and, moreover, operating system functions to convert instructions
`
`to messagesthat a device can understand; Astiz: fig. 6; col. 6, lines 7-20;
`
`contents are intercepted on the wayto the browser for display in a
`
`display/browser window).
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 8
`
`Asper claim 4, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the client module operates in a operating system supporting the program
`
`(Salahshour: col. 2, lines 13-41; Astiz: col. 7, lines 6-9).
`
`As per claim 5, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the selected place is a folder and the operating system is a graphic
`
`windowsoperating system and the program is a utility for a user to display the
`
`contents in the folder (Salahshour: figs. 2-3; col. 2, lines 13-41; the sourceis a
`
`folder and the operating system is required for displaying graphics such as
`
`folders 214 and 228 of windows 200 and 220; Astiz: figs. 6-10; col. 6, lines 7-20;
`
`col. 7, lines 6-9; a utility tool for users to view contents such as Netscape).
`
`As per claim 6, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the client component/module is configured to look into security
`
`information associated with the at least one of the secured items wherein the
`
`security information includes information regarding the security level of the at
`
`least one of the secured items (Salahshour: figs. 2-3; col. 2, lines 13-41; Astiz:
`
`fig. 2; col. 3, lines 21-29; Astiz: col. 9, lines 44-65; col. 10, lines 15-26; a
`
`password protected icon is generated and displayed next to document icon; see
`
`“LEGENDS OF THE REFERENCE MAP’ offig. 7 for a listing of icons utilized
`
`such as an icon in the form of a key, whichis further illustrated in fig. 6 of the web
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 9
`
`site map wherein map creation and viewing is at a single workstation/PC, col. 6,
`
`lines 42-43 and col. 7, line 67 — col. 8, line 4).
`
`Asper claim 7, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the security level includes at least one level to indicate that the at least
`
`one of the secured items is secured, differentiating from the rest of the files
`
`(Salahshour: fig. 2; col. 3, lines 21-29; Astiz: figs. 6-7; secured versus non-
`
`secured).
`
`Claim 14 is similar in scope to claim 3 and is therefore rejected under
`
`similar rationale exceptfor utilizing meta-data; however, information about
`
`content is meta-data and use of meta-data to describe content is a common
`
`practice. In view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2d at 1397 (2007),
`
`it would
`
`have been obvious to an artisan at the time of the invention to incorporate such a
`
`well knownpractice with the method of the modified Salanshour in order to keep
`
`content separate from description to provide, for example, ease of searching.
`
`As per claim 15, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein there is an appropriate icon for the at least one of the secured items
`
`when the at least one of the secured items is not secured and wherein said
`
`generating a superimposed icon comprises choosing an appropriate icon for the
`
`at least one of the secured items and superimposing the appropriate icon over
`
`the default icon associated with without losing original indications of the default
`
`icon (Salahshour:fig. 2; col. 3, lines 21-29).
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 10
`
`Claims 23, 37 and 58 are individually similar in scope to claim 2 and are
`
`therefore rejected under similar rationale.
`
`Claims 24, 38 and 59 are individually similar in scope to claim 3 and are
`
`therefore rejected under similar rationale.
`
`Claims 25, 41 and 60 areindividually similar in scope to claim 6 and are
`
`therefore rejected under similar rationale.
`
`Claims 32, 49 and 67 are similar in scope to claim 14 and are therefore
`
`rejected under similar rationale.
`
`Claims 33, 50 and 68 are similar in scope to claim 15 and are therefore
`
`rejected under similar rationale.
`
`Claim 39 is similar in scope to claim 4 and is therefore rejected under
`
`similar rationale.
`
`Claim 40 is similar in scope to claim 5 and is therefore rejected under
`
`similar rationale.
`
`Claim 42 is similar in scope to claim 7 and is therefore rejected under
`
`similar rationale.
`
`9.
`
`Claims 9-12, 20, 21, 27-30, 44-47, 55, 56 and 62-65 are rejected under
`
`35 U.S.C. 103(a) as being unpatentable over Salahshour et al. (“Salahshour’, US
`
`5,577,125) in view of Gough etal. (’?Gough”, US 5,638,501).
`
`Asper claim 9, although Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the appropriate icon includesa visual object(fig. 2; col. 3, lines 21-29;
`
`key overlay and transparent background; in other words, each of the icons 212
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 11
`
`and 214 are encrypted and is visually indicated to the user by the encryption key
`
`overlay and, thereby, indicates the nature of a secured file), Salanshour does not
`
`explicitly disclose an icon that includes a visual object and a transparent
`
`background. Gough teachesan icon that includes a visual object and a
`
`clear/transparent background (fig. 4; col. 6, lines 50-56; claims 1, 9 and 14). In
`
`view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2dat 1397 (2007), it would have been
`
`obvious to an artisan at the time of the invention to incorporate Gough’s teaching
`
`with the teaching of Salahshour so that users can simultaneously see a visual
`
`object and portions of a base image directly beneath the visual object.
`
`As per claim 10, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein said superimposing an appropriate icon corresponding to the security
`
`level over the default icon comprises overlaying the visual object onto the default
`
`icon without obscuring the rest of the default icon (Salahshour: fig. 2; col. 3, lines
`
`21-29; superimposing comprising key overlaid on a default icon without
`
`obscuring the rest of the default icon, e.g., 212, 214).
`
`As per claim 11, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein said superimposing an appropriate icon corresponding to the security
`
`level over the default icon comprises generating a superimposedicon including
`
`the default icon with the visual object superimposed thereon without obscuring
`
`the rest of the default icon (Salahshour:col. 3, lines 21-29; superimposing
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 12
`
`comprising key overlaid on a default icon without obscuring the rest of the default
`
`icon as displayed by 212 and 214 in fig. 2).
`
`As per claim 12, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the default icon is associated with an executable program, when the
`
`each of the secured items or the superimposed icon thereofis clicked, the
`
`program will be activated (Salahshour: figs. 2 and 4; col. 5, lines 23-34 and 52-
`
`62; upon selection of the secured items or the superimposed icon or upon a
`
`request to open the secured items or the superimposed icon such as 214, the
`
`associated program is opened/accessed).
`
`As per claims 20 and 55, although Salahshour teaches a computerfor
`
`graphically indicating secured item(s) in a program for displaying contents in a
`
`selected place wherein the appropriate icon includes a visual object(fig. 2; col. 3,
`
`lines 21-29; key overlay and transparent background; in other words, each of the
`
`icons 212 and 214 are encrypted and is visually indicated to the user by the
`
`encryption key overlay and, thereby, indicates the nature of a securedfile),
`
`Salahshour doesnotexplicitly disclose an icon that includes a visual object and a
`
`transparent background. Gough teachesan icon thatincludes a visual object and
`
`a Clear/transparent background (fig. 4; col. 6, lines 50-56; claims 1, 9 and 14). In
`
`view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2dat 1397 (2007), it would have been
`
`obvious to an artisan at the time of the invention to incorporate Gough’s teaching
`
`with the teaching of Salahshour so that users can simultaneously see a visual
`
`object and portions of a base image directly beneath the visual object.
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 13
`
`As per claims 21 and 56, the modified Salanshour teaches a computer for
`
`graphically indicating secured item(s) in a program for displaying contents in a
`
`selected place wherein said superimposing an appropriate icon corresponding to
`
`the security level over the default icon comprises overlaying the visual object
`
`onto the default icon without obscuring the rest of the default icon (Salahshour:
`
`fig. 2; col. 3, lines 21-29; superimposing comprising key overlaid on a default icon
`
`without obscuring the rest of the default icon, e.g., 212, 214).
`
`Claims 27, 44 and 62 are individually similar in scope to claim 9 and are
`
`therefore rejected under similar rationale.
`
`Claims 28, 45 and 63 are individually similar in scope to claim 10 and are
`
`therefore rejected under similar rationale.
`
`Claims 29, 46 and 64 are individually similar in scope to claim 11 and are
`
`therefore rejected under similar rationale.
`
`Claims 30, 47 and 65 areindividually similar in scope to claim 12 and are
`
`therefore rejected under similar rationale.
`
`10.
`
`Claims 16, 17, 34, 35, 51, 52, 69 and 70 are rejected under 35 U.S.C.
`
`103(a) as being unpatentable over Salahshour etal. (“Salanshour’, US
`
`5,577,125) in view of Astiz et al. (“Astiz’, US 6,035,330), and further in view of
`
`Gough etal. ("Gough”, US 5,638,501).
`
`Asper claim 16, although the modified Salahshour teaches a method for
`
`graphically indicating secured items in a program for displaying contents in a
`
`selected place wherein the appropriate icon includes a visual object(fig. 2; col. 3,
`
`lines 21-29; key overlay and transparent background; in other words, each of the
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 14
`
`icons 212 and 214 are encrypted and is visually indicated to the user by the
`
`encryption key overlay and, thereby, indicates the nature of a securedfile),
`
`Salahshour does notexplicitly disclose an icon that includes a visual object and a
`
`transparent background. Gough teachesan icon thatincludes a visual object and
`
`a Clear/transparent background (fig. 4; col. 6, lines 50-56; claims 1, 9 and 14). In
`
`view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2dat 1397 (2007), it would have been
`
`obvious to an artisan at the time of the invention to incorporate Gough’s teaching
`
`with the teaching of Salahshour so that users can simultaneously see a visual
`
`object and portions of a base image directly beneath the visual object.
`
`As per claim 17, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein said superimposing the appropriate icon over the default icon comprises
`
`overlaying the visual object onto the default icon without obscuring the rest of the
`
`default icon (Salahshour: fig. 2; col. 3, lines 21-29; superimposing comprising key
`
`overlaid on a default icon without obscuring the rest of the default icon, e.g., 212,
`
`214).
`
`Claim 34 is similar in scope to claim 16 and is therefore rejected under
`
`similar rationale.
`
`Claim 35 is similar in scope to claim 17 and is therefore rejected under
`
`similar rationale.
`
`As per claims 51 and 69, although the modified Salanshour teaches a
`
`method and a computer readable medium containing program code executable
`
`by a computing device for graphically indicating a secured item in a program for
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 15
`
`displaying contents in a selected place wherein the appropriate icon includes a
`
`visual object(fig. 2; col. 3, lines 21-29; key overlay and transparent background;
`
`in other words, each of the icons 212 and 214 are encrypted and is visually
`
`indicated to the user by the encryption key overlay and, thereby, indicates the
`
`nature of a securedfile), Salanshour does not explicitly disclose an icon that
`
`includes a visual object and a transparent background. Gough teaches an icon
`
`that includes a visual object and a clear/transparent background (fig. 4; col. 6,
`
`lines 50-56; claims 1, 9 and 14). In view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2d at
`
`1397 (2007), it would have been obvious to an artisan at the time of the invention to
`
`incorporate Gough’s teaching with the teaching of Salahshour so that users can
`
`simultaneously see a visual object and portions of a base image directly beneath
`
`the visual object.
`
`As per claims 52 and 70, the modified Salanshour teaches a method and
`
`a computer readable medium containing program code executable by a
`
`computing device for graphically indicating a secured item in a program for
`
`displaying contents in a selected place wherein said superimposing the
`
`appropriate icon over the default icon comprises overlaying the visual object onto
`
`the default icon without obscuring the rest of the default icon (Salahshour: fig. 2;
`
`col. 3, lines 21-29; superimposing comprising key overlaid on a default icon
`
`without obscuring the rest of the default icon, e.g., 212, 214).
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 16
`
`Conclusion
`
`11.
`
`The prior art made of record and notrelied upon is considered pertinent to
`
`applicant's disclosure.
`
`Kharonet al. (US 6,487,662) teach a biometric system for biometric input,
`
`comparison, authentication and access control and method therefore.
`
`Millard et al.
`
`(US 2002/0007335) teach a data processing system having
`
`external terminal and data communication device connected to the same external
`
`terminal.
`
`Bannai (US 2002/0041391) teaches a method and system for a network-
`
`based securities marketplace.
`
`Barrus et al. (US 6,693,652 B1) teach a two-dimensional reduced-size
`
`"thumbnail" image is created and superimposed upon a three-dimensionally
`
`rendered figure such as cubes 510, 515 and 520 (figs. 5-6).
`
`Bloomfield et al. (US 5,461,710) teach altering a representative icon so
`
`that it becomes miniaturized or scaled down and superimposed on top of a
`
`normal size icon, which resemblesa pad of sheets of paper such pad having a
`
`predetermined color. This metaphor or visual cue is used to symbolize a stack of
`
`objects, of which new objects can be peeled off the top of the stack (figs. 4-5).
`
`Fallon et al. (US 2003/0132949 A1) teach a "battery" icon overlayed on
`
`top of the computer icon (fig. 7; par [0106]).
`
`
`
`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 17
`
`Inquires
`
`12.—Any inquiry concerning this communication or earlier communications from
`
`the examiner should be directed to Examiner Lێ Nguyen whose telephone
`
`number is (571) 272-4068. The examiner can normally be reached on Monday-
`
`Friday from 7:00 am to 3:30 pm (EST).
`
`If attempts to reach the examiner by telephone are unsuccessful, the
`
`examiner's supervisor, Dennis Chow, can be reached at (571) 272-7767.
`
`Information regarding the status of an application may be obtained from
`
`the Patent Application Information Retrieval (PAIR) system. Status information
`
`for published applications may be obtained from either Private PAIR or Public
`
`PAIR. Status information for unpublished applications is available through
`
`Private PAIR only. For more information about the PAIR system, see http://pair-
`
`
`
`direct.uspte.gov. Should you have questions on accessto the Private PAIR
`
`system, contact the Electronic Business Center (EBC) at 866-217-9197(toll-
`
`free).
`
`Ivn
`Patent Examiner
`March 22, 2010
`
`/DENNIS-DOON CHOW/
`Supervisory Patent Examiner, Art Unit 2174
`
`