`
`-2-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Amendments to the Claims
`
`This listing of claims will replace all prior versions, andlistings, of claims in the
`
`application.
`
`The claim identifiers, or lack thereof, below conform to the rules for reissue
`
`amendments set forth in 37 C.F.R.
`
`1.173(b)(2
`
`c
`
`d),
`
`and (e).
`
`(See also
`
`M.P.E.P.
`
`1453 dD,
`
`(VY), and (V)).
`
`1. (amended) A method for graphically [indicating] representing secured items
`[in a program for displaying contents in a selected place], [the method] comprising:
`
`determining a security level of each of the secured items [, wherein each
`
`of the secured items has a default icon associated withif the each of the secured itemsis
`
`otherwise not secured]; and
`
`superimposing [an
`secured items,
`for graphically displaying the
`appropriate] for each secured item a security icon corresponding to the security level of
`that item over[the] a default icon [without losing original indications of the default icon]
`_ wherein the default icon represents a corresponding non-secured item from which the
`
`respective secured item was derived.
`
`2. (amended) The method asrecited in claim 1, further comprising:
`
`intercepting [files from the selected place when thefiles are selected by
`the program for displaying the contents in the selected place] items when the items are
`retrieved from a storage device; and
`
`[checking if] determining whether any of the [secured] intercepted items
`
`are [included in the files] secured.
`
`3. (amended) The method as recited in claim 2, wherein said determining a
`security level [of each of the secured items] comprises activating a client module [when
`said checking indicates that there are] in response to_a determination that at [lease] least
`
`one of the [secured] items is [included in the files] secured.
`
`Atty. Dkt. No. 2222,540REI0
`
`
`
`Reply to Office Action of June 4, 2010
`
`-3-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`4. (amended) The method as recited in claim 3, wherein the client module
`[operates] is configured to operate in [a] an operating system supporting[the] a program.
`
`5. (amended) The methodas recited in claim 4, wherein [the selected place is a
`folder and] the operating system [is] comprises a graphic windows operating system and
`the program [is] comprisesautility [for a user] configured to display [the] contents[in]
`
`of the [folder] storage device.
`
`6. (amended) The methodas recited in claim 3, further comprising:
`
`[wherein the client module is configured to look into] determining security
`information associated with the at least one [of the secured items] secured item, [and]
`
`wherein the security information includes information regarding the security level of the
`
`at least one [of the secured items] secured item.
`
`(amended) The method as recited in claim 6, wherein the security level
`7.
`includes at least one level of security [to indicate that the at least one of the secured items
`
`is secured, differentiating from the rest of the files].
`
`8. (amended) The method as recited in claim 1, wherein the default icon is
`associated with an executable program [, when the each of the secured items or the
`
`default icon thereof is clicked, the executable program will be activated].
`
`9. (amended) The methodasrecited in claim 1, wherein the [appropriate] security
`
`icon includes a visual object and a transparent background.
`
`10. (amended) The methodasrecited in claim 9, wherein said superimposing [an
`appropriate icon corresponding to the security level over the default icon] comprises
`overlaying the visual object onto the default icon such that_at least_a portion [without
`
`obscuring the rest] of the default icon is visible.
`
`11. (amended) The methodasrecited in claim 9, wherein said superimposing [an
`appropriate icon corresponding to the security level over the default icon] comprises
`generating a superimposed icon including the default
`icon with the visual object
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of June 4, 2010
`
`-4-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`superimposed thereon such that at least_a portion of [without obscuring the rest of] the
`default icon is visible.
`
`12. (amended) The method as recited in claim 10, wherein the default icon is
`associated with an executable program [, when the each of the secured items or the
`
`superimposedicon thereofis clicked, the obscuring program will be activated].
`
`13. (cancelled)
`
`14. (amended) A method [for graphically indicating secured items in a program
`
`for displaying contentsin a selected place, the method] comprising:
`
`[retrievingall files in the selected place;]
`
`intercepting [the files when metadataofthe files are being loadedinto the
`
`program] items being retrieved from a storage device;
`
`[checking if there is] determining whether at least one of the [secured]
`
`retrieved items [includedin the files] is secured;
`
`in response to a determination that at least one of the items is secured,
`determining a security level of the least one secured item [activating a client module to
`determine how theat least one of the secured items is secured, when it is checked that the
`
`at least one of the secured itemsis includedin the files]; and
`
`generating a superimposedicon [to indicate the at least one of the secured
`items is secured, different from the rest of the files when displayed in the program]
`
`based, at least in part, on the determined security level for graphically displaying the at
`
`least one secured item.
`
`recited in claim 14, wherein [there is an
`(amended) The method as
`15.
`appropriate icon for the at least one of the secured items when the at least one of the
`secured items is not secured, and wherein] said generating a superimposed icon
`
`comprises:
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of June 4, 2010
`
`-5-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[choosing an appropriate] determining a security icon forthe at least one
`[of the secured items] secured item based, at least in part, on the determined security
`
`level; and
`
`superimposing the [appropriate] security icon over [the] a default icon,
`wherein the default icon is configured to represent a non-secured item from which theat
`least one secured item was derived [associated with, without losing original indications
`
`of the default icon].
`
`16. (amended) The method as recited in claim 15, wherein the [appropriate]
`security icon includes a visual object and a transparent background.
`
`17. (amended) The method as recited in claim 16, wherein said superimposing
`[the appropriate icon over the default icon] comprises overlaying the visual object onto
`the default icon such that at least_a portion [without obscuring the rest] of the default
`
`icon is visible.
`
`18. (amended) [A computer for graphically indicating secured items in a program
`for displaying contents in a selected place,
`the computer] An article of manufacture
`including a computer-readable medium havinginstructions stored thereon, execution of
`which by a computing device causes the computing device to perform operations
`
`comprising:
`
`[at least a processor;|
`
`[a first memory spacefor storing a client module;]
`
`[a second memory space, coupled to the processor, for storing code as a
`graphic operating system, the code, when executed by the processor, causing the graphic
`operating system to support the program for displaying the contents in the selected place
`
`and perform operationsof: ]
`
`[retrievingall files in the selected place;]
`
`intercepting items beingretrieved from a storage device;
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of June 4, 2010
`
`-6-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[checking if there is] determining whether at
`
`least one of the
`
`[secured] retrieved items [includedin the files] is secured;
`
`in response to_a determination that at_least one of the items is
`secured, determining a security level of the at least one secured item [activating the client
`module to determine how the at least one of the secured items is secured, when it
`is
`
`checkedthat the at least one of the secured itemsis included in the files]; and
`
`generating a superimposed icon [to indicate the at least one of the
`secured items is secured, different from the rest of the files when displayed in the
`program] based, at least in part, on the determined security level to graphically display
`
`the at least one secured item.
`
`19. (amended) The [computer] article of manufacture as recited in claim 18,
`wherein [there is an appropriate icon for the at least one of the secured items whenthe at
`least one of the secured items is not secured, and wherein]
`said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determining a security icon for the at least one
`[of the secured items] secured item based, at least in part, on the determined security
`
`level; and
`
`superimposing the [appropriate] security icon over [the] a default icon,
`wherein the default icon is configured to represent_a non-secured item from whichtheat
`least one secured item was derived [associated with, without losing original indications
`
`of the default icon].
`
`(amended) The [method] article of manufacture as recited in claim 19,
`20.
`wherein the [appropriate] security icon includes a visual object and a transparent
`
`background.
`
`(amended) The [method] article of manufacture as recited in claim 20,
`21.
`wherein said superimposing [the appropriate icon over the default
`icon] comprises
`
`Atty. Dkt. No. 2222. 540REIO
`
`
`
`Reply to Office Action of June 4, 2010
`
`-7-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`overlaying the visual object onto the default icon such that at least_a portion [without
`obscuring the rest] of the default icon is visible.
`
`22. (amended) A tangible computer readable medium [containing program code
`executable by a computing device for graphically indicating secured items in a program
`for displaying contents in a selected place,
`the computer readable medium] having
`instructions stored thereon, the instructions comprising:
`
`[program code for determining] instructions to determine a security level
`of each of [the] secured items [, wherein each of the secured items has a default icon
`
`associated with if the each of the secured items is otherwise not secured]; and
`
`{program code for superimposing] for graphically displaying the secured
`items, instructions to superimpose [an appropriate] for each secured item a security icon
`corresponding to the security level of that item over [the] a default icon [withoutlosing
`original
`indications of the default
`icon]
`, wherein the default
`icon represents a
`corresponding non-secured item from which the respective secured item was derived.
`
`23. (amended) The tangible computer readable mediumas recited in claim 22, the
`
`instructions further comprising:
`
`[program code for intercepting] instructions to intercept [files from the
`selected place whenthe files are selected by the program for displaying the contents in
`the selected place] items when theitems are retrieved from a storage device; and
`
`[program code for checking if] instructions to determine whether any of
`
`the [secured] intercepted itemsare [includedin the files] secured.
`
`24. (amended) The tangible computer readable medium asrecited in claim 23,
`wherein the [program code for determining] the instruction to determine the security
`level [of the each of the secured items comprises program code for activating] comprise
`instructions to activate a client module [when the program code for checking indicates
`
`that there are] in response to_a determination that at [lease] least one of the [secured]
`
`itemsis [included in the files] secured.
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of June 4, 2010
`
`-8-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`25. (amended) The tangible computer readable medium asrecited in claim 24, the
`instructions further comprising:
`
`[wherein the client module is configured to look into] instructions to determine
`security information associated with the at least one [of the secured items] secured item,
`[and] wherein the security information includes information regarding the security level
`
`of the at least one [of the] secured [items] item.
`
`26. (amended) The tangible computer readable medium as recited in claim 22,
`wherein the default icon is associated with an executable program [, when the each ofthe
`
`secured items or the default icon thereof is clicked,
`
`the executable program will be
`
`activated].
`
`27. (amended) The tangible computer readable medium asrecited in claim 22,
`wherein the [appropriate] security icon includes a visual object and a transparent
`
`background.
`
`28. (amended) The tangible computer readable medium as recited in claim 27,
`wherein the
`[program code for
`superimposing]
`instructions
`to superimpose the
`[appropriate] security icon corresponding to the security level over the default
`icon
` [comprises program code for overlaying] comprise instructions to overlay the visual
`object onto the default icon such that at least_a portion [without obscuring therest] of the
`
`default icon is visible.
`
`29. (amended) The tangible computer readable medium as recited in claim 27,
`wherein the
`[program code for
`superimposing]
`instructions
`to superimpose the
`[appropriate] security icon corresponding to the security level over the default
`icon
`[comprises program code
`for generating]
`comprise
`instructions
`to generate
`a
`superimposed icon including the default
`icon with the visual object superimposed
`thereon such that at least_a portion [without obscuring the rest] of the default icon is
`
`visible.
`
`30. (amended) The tangible computer readable medium as recited in claim 29,
`
`wherein the default icon is associated with an executable program [, when the each ofthe
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of June 4, 2010
`
`-9-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`secured items or the superimposediconthereofis clicked, the obscuring program will be
`
`activated].
`
`31. (cancelled)
`
`32. (amended) A tangible computer readable medium [containing program code
`executable by a computing device for graphically indicating secured items in a program
`for displaying contents in a selected place,
`the computer readable medium] having
`instructions stored thereon, the instructions comprising:
`
`[program codeforretrieving all files in the selected place;]
`
`[program code for intercepting] instructions to intercept [the files when
`metadata of the files are being loaded into the program] items being retrieved from a
`
`storage device;
`
`[program code for checking if there is] instructions to determine whether
`at least one ofthe [secured] retrieved items [included in the files file] is secured;
`
`in_response to a determination that at least one of the items is secured,
`instructions to determine a security level of the at least one secured item [program code
`for activating a client module to determine how the at least one of the secured itemsis
`secured, when it is checked that the at least one of the secured items is included in the
`
`files]; and
`
`[program code for generating] instructions to generate a superimposed
`icon [to indicate the at least one of the secured itemsis secured, different from the rest of
`the files when displayed in the program] based, at
`least
`in part, on the determined
`
`security level for graphically displaying the at least one secured item.
`
`33. (amended) The tangible computer readable medium as recited in claim 32,
`[wherein there is an appropriate icon for the at least one of the secured items whenthe at
`least one of the secured items is not secured, and] wherein the [program code for
`
`generating] instructions to generate the superimposed icon [[comprises]] comprise:
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of June 4, 2010
`
`-10-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[program code for choosing an appropriate] instructions to determine a
`security icon for the at least one [of the] secured [items] item based, at least in part, on
`the determined security level; and
`
`to superimpose the
`instructions
`superimposing]
`[program code for
`icon, wherein the default
`icon is
`[the] a default
`[appropriate] security icon over
`configured to represent a non-secured item from which the at least one secured item was
`derived [associated with, without losing original indications of the default icon].
`
`34. (amended) The [method] tangible computer readable medium asrecited in
`claim 33, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`35. (amended) The [method] tangible computer readable medium as recited in
`claim 34, wherein the [program code for superimposing] instructions to superimpose the
`[appropriate] security icon over the default icon [comprise program code for overlaying]
`comprise instructions to overlay the visual object onto the default icon such thatat least a
`portion [without obscuring the rest] of the default icon is visible.
`
`36. (new) A method comprising:
`
`determining a security level of a secured item; and
`
`for graphically displaying the secured item, superimposing a security icon
`corresponding to the security level of the secured item over a default icon, wherein the
`default icon represents a non-secured item from which the secured item was derived,
`
`37. (new) The methodasrecited in claim 36, further comprising:
`
`intercepting an item whentheitem is retrieved from a storage device; and
`
`determining whetherthe intercepted item is secured.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of June 4, 2010
`
`-ll-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`38. (new) The methodas recited in claim 37, wherein said determining a security
`level comprises activating a client module in response to a determination that the item is
`
`secured,
`
`(new) The method as recited in claim 38, wherein the client module is
`39.
`configured to operate in an operating system supporting a program.
`
`40, (new) The method as recited in claim 39, wherein the operating system
`comprises a graphic windows operating system and the program comprises _a utility
`configured to display content of the storage device.
`
`Al. (new) The method asrecited in claim 38, further comprising:
`
`determining security information associated with the secured item, wherein the
`security information includes information regarding the security level of the secured
`
`item.
`
`42. (new) The method asrecited in claim 41, wherein the security level includes
`at least one level of security.
`
`43.
`
`(new) The method as recited in claim 36, wherein the default
`
`icon is
`
`associated with an executable program.
`
`44. (new) The methodasrecited in claim 36, wherein the security icon includes a
`
`visual object and a transparent background.
`
`(new) The method as recited in claim 44, wherein said superimposing
`45.
`comprises overlaying the visual object onto the default icon such that the default icon is
`
`at least partially visible.
`
`(new) The method as recited in claim 44, wherein said superimposing
`46.
`comprises generating a superimposed icon including the default icon with the visual
`object superimposed thereon such that the default icon is at least partially visible.
`
`Atty. Dkt. No. 2222. 540REI0
`
`
`
`Reply to Office Action of June 4, 2010
`
`-12-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`47. (new) The method as recited_in claim 45, wherein the default
`associated with an executable program.
`
`icon is
`
`48. (cancelled)
`
`49. (new) A method comprising:
`
`intercepting an item being retrieved from a storage device;
`
`determining whether the item is secured;
`
`in response to_a determination that the item is secured, determining a
`
`security level of the secured item; and
`
`generating a superimposed icon based, at least in part, on the determined
`security level for graphically displaying the secured item.
`
`(new) The method as _recited_in claim 49, wherein said generating a
`50.
` superimposed icon comprises:
`
`determining a security icon for the secured item based, at least in part, on
`
`the determined security level; and
`
`superimposing the security icon over a default icon, wherein the default
`icon is configured to represent_a non-secured item from which the secured item was
`
`derived.
`
`51. (new) The method asrecited in claim 50, wherein the security icon includes a
`
`visual object and a transparent background.
`
`(new) The method as recited in claim 51, wherein said superimposing
`52.
`comprises overlaying the visual object onto the default icon such that the default icon is
`
`at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of June 4, 2010
`
`-13-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`(new) An article of manufacture including a computer-readable_ medium
`53.
`having instructions stored thereon, execution of which by a computing device causes the
`
`computing device to perform operations comprising:
`
`intercepting an item being retrieved from a storage device;
`
`determining whether the item is secured;
`
`
`
` in response to a determination that the item is secured,
`
`
`
`
`
`
`
`determining a security level of the secured item; and
`
`generating a superimposed icon based, at
`
`least
`
`in part, on the
`
`determined security level to graphically display the secured item.
`
`54.
`
`(new) The article of manufacture as recited_in claim 53, wherein said
`
`generating a superimposed icon comprises:
`
`determining a security icon for the secured item based, at least in part, on
`the determined security level; and
`
`superimposing the security icon over _a default icon, wherein the default
`icon is configured to represent a non-secured item from which the secured item was
`
`derived.
`
`55. (new) Thearticle of manufacture as recited in claim 54, wherein the security
`
`icon includes a visual object and a transparent background.
`
`56.
`(new) The
`article of manufacture _as recited _in claim 55, wherein_said
`superimposing comprises overlaying the visual object onto the default icon such that the
`default icon is at least partially visible.
`
`57.
`
`(new) A tangible computer_readable medium having instructions stored
`
`thereon, the instructions comprising:
`
`instructions to determine a security level of a secured item: and
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of June 4, 2010
`
`~14-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`for graphically displaying the secured item, instructions to superimpose a
`
`security icon corresponding to the security level of the secured item over a default icon,
`
`wherein the default icon represents a non-secured item from which the secured item was
`
`derived.
`
`58. (new) The tangible computer readable medium as recited in claim 57, the
`instruction further comprising:
`
`instructions to intercept an item when the item is retrieved from a storage
`
`device; and
`
`instructions to determine whether the intercepted item is secured.
`
`59. (new) The tangible computer readable medium as recited in claim 58, wherein
`
`the instructions to determine the security level comprise instructions to activate a client
`
`module in response to a determination that the item is secured.
`
`60. (new) The tangible computer readable medium as recited in claim 59,
`instructions further comprising:
`
`the
`
`instructions to determine security information associated with the secured item,
`
`wherein the security information includes information regarding the security level of the
`
`secured item,
`
`61. (new) The tangible computer readable medium as recited in claim 57,wherein
`the default icon is associated with an executable program.
`
`62. (new) The tangible computer readable medium as recited in claim 57, wherein
`the security icon includes a visual object and a transparent background.
`
`63. (new) The tangible computer readable medium as recited in claim 62, wherein
`
`the instructions to superimpose the security icon corresponding to the security level over
`
`the default icon comprise instructions to overlay the visual object onto the default icon
`
`such that the default icon is at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of June 4, 2010
`
`-15-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`64. (new) The tangible computer readable medium as recited in claim 62, wherein
`the instructions to superimpose the security icon corresponding to the security level over
`the default _icon comprise instructions to generate _a superimposed icon including the
`default icon with the visual object superimposed thereon such that the default icon is at
`
`least partially visible.
`
`65. (new) The tangible computer readable medium asrecited in claim 64, wherein
`
`the default icon is associated with an executable program.
`
`66. (cancelled)
`
`(new) A tangible computer readable medium having instructions stored
`67.
`thereon, the instructions comprising:
`
`instructions to intercept an item being retrieved from a storage device;
`
`instructions to determine whether the item is secured:
`
`in response to a determination that the item is secured, instructions to
`
`determine a security level of the secured item: and
`
`instructions to generate a superimposed icon based, at least in part, on the
`
`determined security level for graphically displaying the secured item.
`
`68. (new) The tangible computer readable medium asrecited in claim 67, wherein
`
`the instructions to generate the superimposed icon comprise:
`
`instructions to determine a security icon for the secured item based, at
`
`least in part, on the determined security level; and
`
`instructions to superimpose the security icon over a default icon, wherein
`the default icon is configured to represent _a non-secured item from which the secured
`
`item was derived.
`
`69. (new) The tangible computer readable medium asrecited in claim 68, wherein
`the security icon includes a visual object and a transparent background.
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of June 4, 2010
`
`- 16-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`70. (new) The tangible computer readable medium asrecited in claim 69, wherein
`the instructions to superimpose the security icon over the default_icon comprise
`
`instructions to overlay the visual object onto the default icon such that_the default icon is
`
`at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`