`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`313-1450
`Alexandria, Virginia 22.
`www.uspto.gov
`
`APPLICATION NO.
`
`
`
`
` FILING DATE
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`
`
`
`CONFIRMATIONNO.
`
`11/889,685
`
`08/15/2007
`
`Nalini J. Prakash
`
`2222.540REIO
`
`5524
`
`26111
`
`7590
`
`06/04/2010
`
`STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
`1100 NEW YORK AVENUE,N.W.
`WASHINGTON,DC 20005
`
`EXAMINER
`
`NGUYEN,LE V
`
`ART UNIT
`
`2174
`
`MAIL DATE
`
`06/04/2010
`
`PAPER NUMBER
`
`DELIVERY MODE
`
`PAPER
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`PTOL-90A (Rev. 04/07)
`
`

`

`
`
`Office Action Summary
`
`Application No.
`
`Applicant(s)
`
`11/889,685
`Examiner
`
`PRAKASH, NALINI J.
`Art Unit
`
`-- The MAILING DATEof this communication appears on the cover sheet with the correspondence address--
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLYIS SET TO EXPIRE 3 MONTH(S) OR THIRTY (30) DAYS,
`WHICHEVER IS LONGER, FROM THE MAILING DATE OF THIS COMMUNICATION.
`Extensions of time may be available underthe provisions of 37 CFR 1.136(a).
`In no event, however, may a reply be timelyfiled
`after SIX (6) MONTHSfrom the mailing date of this communication.
`If NO period forreply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHSfrom the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for replywill, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three monthsafter the mailing date of this communication, even if timely filed, may reduce any
`eamed patent term adjustment. See 37 CFR 1.704(b).
`
`Status
`
`1)L] Responsive to communication(s) filed on
`2a)L] This action is FINAL.
`2b)X] This action is non-final.
`3)L] Sincethis application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.
`
`Disposition of Claims
`
`4)X] Claim(s) 1-70 is/are pending in the application.
`
`4a) Of the above claim(s)
`is/are withdrawn from consideration.
`
`5)L] Claim(s)
`is/are allowed.
`6)X] Claim(s) 1-70 is/are rejected.
`7)L] Claim(s)__ is/are objectedto.
`8)L] Claim(s)____ are subject to restriction and/or election requirement.
`
`Application Papers
`
`9)L] The specification is objected to by the Examiner.
`
`10)L] The drawing(s) filed on
`is/are: a)[_] accepted or b)[_] objected to by the Examiner.
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121(d).
`11)] The oath or declaration is objected to by the Examiner. Note the attached Office Action or form PTO-152.
`
`Priority under 35 U.S.C. § 119
`
`12)L] Acknowledgmentis made of a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or(f).
`a)LJAll b)L_] Some*c)L] Noneof:
`
`1.L] Certified copies of the priority documents have been received.
`2.L] Certified copies of the priority documents have been received in Application No.
`3.L] Copies ofthe certified copies of the priority documents have been receivedin this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`* See the attached detailed Office action foralist of the certified copies not received.
`
`Attachment(s)
`4) C] Interview Summary (PTO-413)
`1) Xx] Notice of References Cited (PTO-892)
`Paper No(s)/Mail Date. __
`2) [J Notice of Draftsperson’s Patent Drawing Review (PTO-948)
`5) L] Noticeof Informal Patent Application
`3) IX] Information Disclosure Statement(s) (PTO/SB/08)
`
`Paper No(s)/Mail Date 10/29/07. 6) C] Other:
`U.S. Patent and Trademark Office
`
`PTOL-326 (Rev. 08-06)
`
`Office Action Summary
`
`Part of Paper No./Mail Date 20100323
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 2
`
`DETAILED ACTION
`
`1.
`
`37 CFR 1.173(c) requires the following:
`
`
` $8 O es
`
`ation of
`
`Applicant is reminded of this requirement even if no amendment is made in
`
`responseto the action.
`
`Claim Objections
`
`2.
`
`Claims 1, 2 and 60 are objected to because ofthe following informalities:
`
`a) claim 2, line 4:
`
`the phrase “in the files file” appears to contain a
`
`typographical error;
`
`b) claim 12, line 3 the limitation “the obscuring program” lack antecedent
`
`bases;
`
`c) claim 60, line 4:
`
`the phrase “thesecured item” appears to contain a
`
`typographical error; and
`
`Furthermore, claims 37, 39 and 40 are objected to under 37 CFR 1.75(c),
`
`as being of improper dependent form for failing to further limit the subject matter
`
`of a previous claim. Applicant is required to cancel the claim(s), or amend the
`
`claim(s) to place the claim(s) in proper dependent form, or rewrite the claim(s) in
`
`independent form. They areidentical to claims 2, 4 and 5. Appropriate correction
`
`is required.
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 3
`
`Claim Rejections - 35 USC § 112
`
`3.
`
`The following is a quotation of the second paragraph of 35 U.S.C. 112:
`
`The specification shall conclude with one or more claims particularly pointing out and distinctly
`claiming the subject matter which the applicant regards ashis invention.
`
`4.
`
`Claims 1-13, 19-21, 48, 54-56 and 66 are rejected under 35 U.S.C. 112,
`
`second paragraph, as being indefinite for failing to particularly point out and
`
`distinctly claim the subject matter which applicant regards as the invention. It is
`
`unclear what is meant by the phrases “each of the secured items has a default
`
`icon associated with if each of the secured items is otherwise not secured; and
`
`superimposing an appropriate icon” of claim 1 and “there is an appropriate icon
`
`for the at least one of the secured items when the at least one of the secured
`
`items is not secured” of claims 19 and 54. The Office will interpret: claim 1 to
`
`mean superimposing an appropriate icon corresponding to the security level over
`
`a default icon, and claims 19 and 54 to mean there is an appropriate icon for the
`
`at least one of the secured items when the at least one of the secured items is
`
`secured. With regards to claims 13, 48 and 66, it is noted that the terms
`
`“resizing”, “size” and its derivatives are not supported in the specification.
`
`Therefore, the phrase “resizing the appropriate icon according to a size of the
`
`default icon; and overlaying the resized appropriate icon onto the default icon in
`
`an optimal size without obscuring the rest of the default icon”will be interpreted
`
`to mean: sizing of the appropriate icon is in accordance with a size of the default
`
`icon and overlaying the appropriate icon onto the default icon in an optimal size
`
`without obscuring the rest of the default icon.
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 4
`
`Claim Rejections - 35 USC § 102
`
`5.
`
`The following is a quotation of the appropriate paragraphs of 35
`
`U.S.C. 102 that form the basis for the rejections under this section made in this
`
`Office action:
`
`A person shall be entitled to a patent unless —
`
`(b) the invention was patented or described in a printed publication in this or a foreign country
`or in public use or on sale in this country, more than one year prior to the date of application
`for patent in the United States.
`
`6.
`
`Claims 1, 8, 13, 18, 19, 22, 26, 31, 36, 43, 48, 53, 54, 57, 61 and 66 are
`
`rejected under 35 U.S.C. 102(b) as being anticipated by Salahshour etal.
`
`(“Salahshour’, US 5,577,125).
`
`As per claim 1, Salanhshour teaches a method for graphically indicating
`
`secured items in a program for displaying contents in a selected place
`
`comprising determining a security level of each of the secured items wherein
`
`each of the secured items has an associated default icon and superimposing an
`
`appropriate icon corresponding to the security level over the default icon without
`
`losing original indications of the default icon (fig. 2; col. 3, lines 21-29; files can
`
`be associated with a default icon such as a folder icon; if one ofthe files is
`
`detected as secured, a visual object is retrieved to be overlaid over a default
`
`icon, e.g. plurality of folder icons displayed wherein secured items 212 and 214
`
`has been determined to have a security level and displays a key overlay).
`
`Asper claim 8, Salahshour teaches a method for graphically indicating
`
`secured items in a program for displaying contents in a selected place wherein
`
`the default icon is associated with an executable program, when the each of the
`
`secured items or the default icon thereofis clicked, the executable program will
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 5
`
`be activated (figs. 2 and 4; col. 5, lines 23-34 and 52-62; following a requestto
`
`open an encrypted object such as selectable icon 274 and user supplies the
`
`encryption key, the step proceeds to step 385 to open and decrypt the object;
`
`moreover, the definition of a selectable icon is an interface element graphically
`
`representing a function or system resource that is accessed when the graphical
`
`representation is selected by user interaction).
`
`As per claim 13, Salanshour teaches a method for graphically indicating
`
`secured items in a program for displaying contents in a selected place wherein
`
`said superimposing an appropriate icon corresponding to the security level over
`
`the default icon comprisesresizing the appropriate icon according to a size of the
`
`default icon and overlaying the resized appropriate icon onto the default icon in
`
`an optimal size without obscuring the rest of the default icon, i.e., sizing of the
`
`appropriate icon is in accordance with a size of the default icon overlaying the
`
`appropriate icon onto the default icon in an optimal size without obscuring the
`
`rest of the default icon (fig. 2; col. 3, lines 21-29).
`
`Claims 18 and 19 in combination is similar in scope to claim 1 and are
`
`therefore rejected under similar rationale.
`
`Claims 22, 36 and 57are individually similar in scope to claim 1 and are
`
`therefore rejected under similar rationale.
`
`Claims 26, 43 and 61 are individually similar in scope to claim 8 and are
`
`therefore rejected under similar rationale.
`
`Claims 31, 48 and 66 areindividually similar in scope to claim 13 and is
`
`therefore rejected under similar rationale.
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 6
`
`Claims 53 and 54 in combination is similar in scope to claim 1 and are
`
`therefore rejected under similar rationale.
`
`Claim Rejections - 35 USC § 103
`
`7.
`
`The following is a quotation of 35 U.S.C. 103(a) which forms the basis for
`
`all obviousnessrejections set forth in this Office action:
`
`(a) A patent may not be obtained though the invention is not identically disclosed or described
`as set forth in section 102 ofthis title, if the differences between the subject matter sought to
`be patented and the prior art are such that the subject matter as a whole would have been
`obviousat the time the invention was made to a person having ordinary skill in the art to which
`said subject matter pertains. Patentability shall not be negatived by the manner in which the
`invention was made.
`
`8.
`
`Claims 2-7, 14, 15, 23-25, 32, 33, 37-42, 58-60, 67 and 68 are rejected
`
`under 35 U.S.C. 103(a) as being unpatentable over Salahshour etal.
`
`(“Salahshour’, US 5,577,125) in view of Astiz et al. (US 6,035,330).
`
`Asper claim 2, Salahshour teaches a method for graphically indicating
`
`secured items in a program for displaying contents in a selected place
`
`comprising capturing files from the selected place when the files are selected by
`
`the program for displaying the contents in the selected place(fig. 2; seize files
`
`from a selected place, i.e., source is stored somewhere, when the files in the
`
`selected place are selected by the program for displaying in 200 or when files are
`
`selected, they are pulled from storage for display), checking if any of the secured
`
`items are included in the files and activating a component/module when said
`
`checking indicates that there are at lease one of the secured items included in
`
`the file (col. 3, lines 21-29; a container for programs and files symbolized on the
`
`screen byan icon ofa file folder such as 210-214; 200 displays files 212 and 214
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 7
`
`wherein 212 and 214 are secured items having a key overlay associated with
`
`each and are displayed with a key overlay to indicate that they are secured).
`
`Salahshour does notexplicitly disclose pulling and intercepting files; however,
`
`intercepting a transmission ofa file from, for example, a serverfor display is a
`
`well known practice for many years as taught by Astiz (fig. 6; col. 6, lines 7-20
`
`and 43). In view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2d at 1397 (2007), it would
`
`have been obvious to an artisan at the time of the invention to incorporate such
`
`well known practices with the method of Salahshour in order to provide for
`
`exchanging offiles.
`
`Asper claim 3, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein said determining a security level of each of the secured items comprises
`
`activating a client component/module when said checking indicates that there are
`
`at lease one of the secured items is includedin the files, i.e., the client
`
`component/module facilitates superimposing an appropriate icon onto the default
`
`icon of the securedfile before the icon or superimposed icon and file name of the
`
`file is displayed by a browser (Salahshour: fig. 2; col. 3, lines 21-29; operating
`
`system is inherent especially when graphics such as folders 210-214 and 228
`
`are displayed and, moreover, operating system functions to convert instructions
`
`to messagesthat a device can understand; Astiz: fig. 6; col. 6, lines 7-20;
`
`contents are intercepted on the wayto the browser for display in a
`
`display/browser window).
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 8
`
`Asper claim 4, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the client module operates in a operating system supporting the program
`
`(Salahshour: col. 2, lines 13-41; Astiz: col. 7, lines 6-9).
`
`As per claim 5, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the selected place is a folder and the operating system is a graphic
`
`windowsoperating system and the program is a utility for a user to display the
`
`contents in the folder (Salahshour: figs. 2-3; col. 2, lines 13-41; the sourceis a
`
`folder and the operating system is required for displaying graphics such as
`
`folders 214 and 228 of windows 200 and 220; Astiz: figs. 6-10; col. 6, lines 7-20;
`
`col. 7, lines 6-9; a utility tool for users to view contents such as Netscape).
`
`As per claim 6, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the client component/module is configured to look into security
`
`information associated with the at least one of the secured items wherein the
`
`security information includes information regarding the security level of the at
`
`least one of the secured items (Salahshour: figs. 2-3; col. 2, lines 13-41; Astiz:
`
`fig. 2; col. 3, lines 21-29; Astiz: col. 9, lines 44-65; col. 10, lines 15-26; a
`
`password protected icon is generated and displayed next to document icon; see
`
`“LEGENDS OF THE REFERENCE MAP’ offig. 7 for a listing of icons utilized
`
`such as an icon in the form of a key, whichis further illustrated in fig. 6 of the web
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 9
`
`site map wherein map creation and viewing is at a single workstation/PC, col. 6,
`
`lines 42-43 and col. 7, line 67 — col. 8, line 4).
`
`Asper claim 7, the modified Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the security level includes at least one level to indicate that the at least
`
`one of the secured items is secured, differentiating from the rest of the files
`
`(Salahshour: fig. 2; col. 3, lines 21-29; Astiz: figs. 6-7; secured versus non-
`
`secured).
`
`Claim 14 is similar in scope to claim 3 and is therefore rejected under
`
`similar rationale exceptfor utilizing meta-data; however, information about
`
`content is meta-data and use of meta-data to describe content is a common
`
`practice. In view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2d at 1397 (2007),
`
`it would
`
`have been obvious to an artisan at the time of the invention to incorporate such a
`
`well knownpractice with the method of the modified Salanshour in order to keep
`
`content separate from description to provide, for example, ease of searching.
`
`As per claim 15, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein there is an appropriate icon for the at least one of the secured items
`
`when the at least one of the secured items is not secured and wherein said
`
`generating a superimposed icon comprises choosing an appropriate icon for the
`
`at least one of the secured items and superimposing the appropriate icon over
`
`the default icon associated with without losing original indications of the default
`
`icon (Salahshour:fig. 2; col. 3, lines 21-29).
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 10
`
`Claims 23, 37 and 58 are individually similar in scope to claim 2 and are
`
`therefore rejected under similar rationale.
`
`Claims 24, 38 and 59 are individually similar in scope to claim 3 and are
`
`therefore rejected under similar rationale.
`
`Claims 25, 41 and 60 areindividually similar in scope to claim 6 and are
`
`therefore rejected under similar rationale.
`
`Claims 32, 49 and 67 are similar in scope to claim 14 and are therefore
`
`rejected under similar rationale.
`
`Claims 33, 50 and 68 are similar in scope to claim 15 and are therefore
`
`rejected under similar rationale.
`
`Claim 39 is similar in scope to claim 4 and is therefore rejected under
`
`similar rationale.
`
`Claim 40 is similar in scope to claim 5 and is therefore rejected under
`
`similar rationale.
`
`Claim 42 is similar in scope to claim 7 and is therefore rejected under
`
`similar rationale.
`
`9.
`
`Claims 9-12, 20, 21, 27-30, 44-47, 55, 56 and 62-65 are rejected under
`
`35 U.S.C. 103(a) as being unpatentable over Salahshour et al. (“Salahshour’, US
`
`5,577,125) in view of Gough etal. (’?Gough”, US 5,638,501).
`
`Asper claim 9, although Salahshour teaches a method for graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the appropriate icon includesa visual object(fig. 2; col. 3, lines 21-29;
`
`key overlay and transparent background; in other words, each of the icons 212
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 11
`
`and 214 are encrypted and is visually indicated to the user by the encryption key
`
`overlay and, thereby, indicates the nature of a secured file), Salanshour does not
`
`explicitly disclose an icon that includes a visual object and a transparent
`
`background. Gough teachesan icon that includes a visual object and a
`
`clear/transparent background (fig. 4; col. 6, lines 50-56; claims 1, 9 and 14). In
`
`view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2dat 1397 (2007), it would have been
`
`obvious to an artisan at the time of the invention to incorporate Gough’s teaching
`
`with the teaching of Salahshour so that users can simultaneously see a visual
`
`object and portions of a base image directly beneath the visual object.
`
`As per claim 10, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein said superimposing an appropriate icon corresponding to the security
`
`level over the default icon comprises overlaying the visual object onto the default
`
`icon without obscuring the rest of the default icon (Salahshour: fig. 2; col. 3, lines
`
`21-29; superimposing comprising key overlaid on a default icon without
`
`obscuring the rest of the default icon, e.g., 212, 214).
`
`As per claim 11, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein said superimposing an appropriate icon corresponding to the security
`
`level over the default icon comprises generating a superimposedicon including
`
`the default icon with the visual object superimposed thereon without obscuring
`
`the rest of the default icon (Salahshour:col. 3, lines 21-29; superimposing
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 12
`
`comprising key overlaid on a default icon without obscuring the rest of the default
`
`icon as displayed by 212 and 214 in fig. 2).
`
`As per claim 12, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein the default icon is associated with an executable program, when the
`
`each of the secured items or the superimposed icon thereofis clicked, the
`
`program will be activated (Salahshour: figs. 2 and 4; col. 5, lines 23-34 and 52-
`
`62; upon selection of the secured items or the superimposed icon or upon a
`
`request to open the secured items or the superimposed icon such as 214, the
`
`associated program is opened/accessed).
`
`As per claims 20 and 55, although Salahshour teaches a computerfor
`
`graphically indicating secured item(s) in a program for displaying contents in a
`
`selected place wherein the appropriate icon includes a visual object(fig. 2; col. 3,
`
`lines 21-29; key overlay and transparent background; in other words, each of the
`
`icons 212 and 214 are encrypted and is visually indicated to the user by the
`
`encryption key overlay and, thereby, indicates the nature of a securedfile),
`
`Salahshour doesnotexplicitly disclose an icon that includes a visual object and a
`
`transparent background. Gough teachesan icon thatincludes a visual object and
`
`a Clear/transparent background (fig. 4; col. 6, lines 50-56; claims 1, 9 and 14). In
`
`view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2dat 1397 (2007), it would have been
`
`obvious to an artisan at the time of the invention to incorporate Gough’s teaching
`
`with the teaching of Salahshour so that users can simultaneously see a visual
`
`object and portions of a base image directly beneath the visual object.
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 13
`
`As per claims 21 and 56, the modified Salanshour teaches a computer for
`
`graphically indicating secured item(s) in a program for displaying contents in a
`
`selected place wherein said superimposing an appropriate icon corresponding to
`
`the security level over the default icon comprises overlaying the visual object
`
`onto the default icon without obscuring the rest of the default icon (Salahshour:
`
`fig. 2; col. 3, lines 21-29; superimposing comprising key overlaid on a default icon
`
`without obscuring the rest of the default icon, e.g., 212, 214).
`
`Claims 27, 44 and 62 are individually similar in scope to claim 9 and are
`
`therefore rejected under similar rationale.
`
`Claims 28, 45 and 63 are individually similar in scope to claim 10 and are
`
`therefore rejected under similar rationale.
`
`Claims 29, 46 and 64 are individually similar in scope to claim 11 and are
`
`therefore rejected under similar rationale.
`
`Claims 30, 47 and 65 areindividually similar in scope to claim 12 and are
`
`therefore rejected under similar rationale.
`
`10.
`
`Claims 16, 17, 34, 35, 51, 52, 69 and 70 are rejected under 35 U.S.C.
`
`103(a) as being unpatentable over Salahshour etal. (“Salanshour’, US
`
`5,577,125) in view of Astiz et al. (“Astiz’, US 6,035,330), and further in view of
`
`Gough etal. ("Gough”, US 5,638,501).
`
`Asper claim 16, although the modified Salahshour teaches a method for
`
`graphically indicating secured items in a program for displaying contents in a
`
`selected place wherein the appropriate icon includes a visual object(fig. 2; col. 3,
`
`lines 21-29; key overlay and transparent background; in other words, each of the
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 14
`
`icons 212 and 214 are encrypted and is visually indicated to the user by the
`
`encryption key overlay and, thereby, indicates the nature of a securedfile),
`
`Salahshour does notexplicitly disclose an icon that includes a visual object and a
`
`transparent background. Gough teachesan icon thatincludes a visual object and
`
`a Clear/transparent background (fig. 4; col. 6, lines 50-56; claims 1, 9 and 14). In
`
`view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2dat 1397 (2007), it would have been
`
`obvious to an artisan at the time of the invention to incorporate Gough’s teaching
`
`with the teaching of Salahshour so that users can simultaneously see a visual
`
`object and portions of a base image directly beneath the visual object.
`
`As per claim 17, the modified Salahshour teaches a methodfor graphically
`
`indicating secured items in a program for displaying contents in a selected place
`
`wherein said superimposing the appropriate icon over the default icon comprises
`
`overlaying the visual object onto the default icon without obscuring the rest of the
`
`default icon (Salahshour: fig. 2; col. 3, lines 21-29; superimposing comprising key
`
`overlaid on a default icon without obscuring the rest of the default icon, e.g., 212,
`
`214).
`
`Claim 34 is similar in scope to claim 16 and is therefore rejected under
`
`similar rationale.
`
`Claim 35 is similar in scope to claim 17 and is therefore rejected under
`
`similar rationale.
`
`As per claims 51 and 69, although the modified Salanshour teaches a
`
`method and a computer readable medium containing program code executable
`
`by a computing device for graphically indicating a secured item in a program for
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 15
`
`displaying contents in a selected place wherein the appropriate icon includes a
`
`visual object(fig. 2; col. 3, lines 21-29; key overlay and transparent background;
`
`in other words, each of the icons 212 and 214 are encrypted and is visually
`
`indicated to the user by the encryption key overlay and, thereby, indicates the
`
`nature of a securedfile), Salanshour does not explicitly disclose an icon that
`
`includes a visual object and a transparent background. Gough teaches an icon
`
`that includes a visual object and a clear/transparent background (fig. 4; col. 6,
`
`lines 50-56; claims 1, 9 and 14). In view of KSR, 127 S. Ct. 1727 at 1742, 82 USPG2d at
`
`1397 (2007), it would have been obvious to an artisan at the time of the invention to
`
`incorporate Gough’s teaching with the teaching of Salahshour so that users can
`
`simultaneously see a visual object and portions of a base image directly beneath
`
`the visual object.
`
`As per claims 52 and 70, the modified Salanshour teaches a method and
`
`a computer readable medium containing program code executable by a
`
`computing device for graphically indicating a secured item in a program for
`
`displaying contents in a selected place wherein said superimposing the
`
`appropriate icon over the default icon comprises overlaying the visual object onto
`
`the default icon without obscuring the rest of the default icon (Salahshour: fig. 2;
`
`col. 3, lines 21-29; superimposing comprising key overlaid on a default icon
`
`without obscuring the rest of the default icon, e.g., 212, 214).
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 16
`
`Conclusion
`
`11.
`
`The prior art made of record and notrelied upon is considered pertinent to
`
`applicant's disclosure.
`
`Kharonet al. (US 6,487,662) teach a biometric system for biometric input,
`
`comparison, authentication and access control and method therefore.
`
`Millard et al.
`
`(US 2002/0007335) teach a data processing system having
`
`external terminal and data communication device connected to the same external
`
`terminal.
`
`Bannai (US 2002/0041391) teaches a method and system for a network-
`
`based securities marketplace.
`
`Barrus et al. (US 6,693,652 B1) teach a two-dimensional reduced-size
`
`"thumbnail" image is created and superimposed upon a three-dimensionally
`
`rendered figure such as cubes 510, 515 and 520 (figs. 5-6).
`
`Bloomfield et al. (US 5,461,710) teach altering a representative icon so
`
`that it becomes miniaturized or scaled down and superimposed on top of a
`
`normal size icon, which resemblesa pad of sheets of paper such pad having a
`
`predetermined color. This metaphor or visual cue is used to symbolize a stack of
`
`objects, of which new objects can be peeled off the top of the stack (figs. 4-5).
`
`Fallon et al. (US 2003/0132949 A1) teach a "battery" icon overlayed on
`
`top of the computer icon (fig. 7; par [0106]).
`
`

`

`Application/Control Number: 11/889,685
`Art Unit: 2174
`
`Page 17
`
`Inquires
`
`12.—Any inquiry concerning this communication or earlier communications from
`
`the examiner should be directed to Examiner Lێ Nguyen whose telephone
`
`number is (571) 272-4068. The examiner can normally be reached on Monday-
`
`Friday from 7:00 am to 3:30 pm (EST).
`
`If attempts to reach the examiner by telephone are unsuccessful, the
`
`examiner's supervisor, Dennis Chow, can be reached at (571) 272-7767.
`
`Information regarding the status of an application may be obtained from
`
`the Patent Application Information Retrieval (PAIR) system. Status information
`
`for published applications may be obtained from either Private PAIR or Public
`
`PAIR. Status information for unpublished applications is available through
`
`Private PAIR only. For more information about the PAIR system, see http://pair-
`
`
`
`direct.uspte.gov. Should you have questions on accessto the Private PAIR
`
`system, contact the Electronic Business Center (EBC) at 866-217-9197(toll-
`
`free).
`
`Ivn
`Patent Examiner
`March 22, 2010
`
`/DENNIS-DOON CHOW/
`Supervisory Patent Examiner, Art Unit 2174
`
`

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

HTTP Error 400: Found

Refresh this Document
Go to the Docket