Reply to Office Action of June 4, 2010
`
`-2-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Amendments to the Claims
`
`This listing of claims will replace all prior versions, andlistings, of claims in the
`
`application.
`
`The claim identifiers, or lack thereof, below conform to the rules for reissue
`
`amendments set forth in 37 C.F.R.
`
`1.173(b)(2
`
`c
`
`d),
`
`and (e).
`
`(See also
`
`M.P.E.P.
`
`1453 dD,
`
`(VY), and (V)).
`
`1. (amended) A method for graphically [indicating] representing secured items
`[in a program for displaying contents in a selected place], [the method] comprising:
`
`determining a security level of each of the secured items [, wherein each
`
`of the secured items has a default icon associated withif the each of the secured itemsis
`
`otherwise not secured]; and
`
`superimposing [an
`secured items,
`for graphically displaying the
`appropriate] for each secured item a security icon corresponding to the security level of
`that item over[the] a default icon [without losing original indications of the default icon]
`_ wherein the default icon represents a corresponding non-secured item from which the
`
`respective secured item was derived.
`
`2. (amended) The method asrecited in claim 1, further comprising:
`
`intercepting [files from the selected place when thefiles are selected by
`the program for displaying the contents in the selected place] items when the items are
`retrieved from a storage device; and
`
`[checking if] determining whether any of the [secured] intercepted items
`
`are [included in the files] secured.
`
`3. (amended) The method as recited in claim 2, wherein said determining a
`security level [of each of the secured items] comprises activating a client module [when
`said checking indicates that there are] in response to_a determination that at [lease] least
`
`one of the [secured] items is [included in the files] secured.
`
`Atty. Dkt. No. 2222,540REI0
`
`

`

`Reply to Office Action of June 4, 2010
`
`-3-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`4. (amended) The method as recited in claim 3, wherein the client module
`[operates] is configured to operate in [a] an operating system supporting[the] a program.
`
`5. (amended) The methodas recited in claim 4, wherein [the selected place is a
`folder and] the operating system [is] comprises a graphic windows operating system and
`the program [is] comprisesautility [for a user] configured to display [the] contents[in]
`
`of the [folder] storage device.
`
`6. (amended) The methodas recited in claim 3, further comprising:
`
`[wherein the client module is configured to look into] determining security
`information associated with the at least one [of the secured items] secured item, [and]
`
`wherein the security information includes information regarding the security level of the
`
`at least one [of the secured items] secured item.
`
`(amended) The method as recited in claim 6, wherein the security level
`7.
`includes at least one level of security [to indicate that the at least one of the secured items
`
`is secured, differentiating from the rest of the files].
`
`8. (amended) The method as recited in claim 1, wherein the default icon is
`associated with an executable program [, when the each of the secured items or the
`
`default icon thereof is clicked, the executable program will be activated].
`
`9. (amended) The methodasrecited in claim 1, wherein the [appropriate] security
`
`icon includes a visual object and a transparent background.
`
`10. (amended) The methodasrecited in claim 9, wherein said superimposing [an
`appropriate icon corresponding to the security level over the default icon] comprises
`overlaying the visual object onto the default icon such that_at least_a portion [without
`
`obscuring the rest] of the default icon is visible.
`
`11. (amended) The methodasrecited in claim 9, wherein said superimposing [an
`appropriate icon corresponding to the security level over the default icon] comprises
`generating a superimposed icon including the default
`icon with the visual object
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of June 4, 2010
`
`-4-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`superimposed thereon such that at least_a portion of [without obscuring the rest of] the
`default icon is visible.
`
`12. (amended) The method as recited in claim 10, wherein the default icon is
`associated with an executable program [, when the each of the secured items or the
`
`superimposedicon thereofis clicked, the obscuring program will be activated].
`
`13. (cancelled)
`
`14. (amended) A method [for graphically indicating secured items in a program
`
`for displaying contentsin a selected place, the method] comprising:
`
`[retrievingall files in the selected place;]
`
`intercepting [the files when metadataofthe files are being loadedinto the
`
`program] items being retrieved from a storage device;
`
`[checking if there is] determining whether at least one of the [secured]
`
`retrieved items [includedin the files] is secured;
`
`in response to a determination that at least one of the items is secured,
`determining a security level of the least one secured item [activating a client module to
`determine how theat least one of the secured items is secured, when it is checked that the
`
`at least one of the secured itemsis includedin the files]; and
`
`generating a superimposedicon [to indicate the at least one of the secured
`items is secured, different from the rest of the files when displayed in the program]
`
`based, at least in part, on the determined security level for graphically displaying the at
`
`least one secured item.
`
`recited in claim 14, wherein [there is an
`(amended) The method as
`15.
`appropriate icon for the at least one of the secured items when the at least one of the
`secured items is not secured, and wherein] said generating a superimposed icon
`
`comprises:
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of June 4, 2010
`
`-5-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[choosing an appropriate] determining a security icon forthe at least one
`[of the secured items] secured item based, at least in part, on the determined security
`
`level; and
`
`superimposing the [appropriate] security icon over [the] a default icon,
`wherein the default icon is configured to represent a non-secured item from which theat
`least one secured item was derived [associated with, without losing original indications
`
`of the default icon].
`
`16. (amended) The method as recited in claim 15, wherein the [appropriate]
`security icon includes a visual object and a transparent background.
`
`17. (amended) The method as recited in claim 16, wherein said superimposing
`[the appropriate icon over the default icon] comprises overlaying the visual object onto
`the default icon such that at least_a portion [without obscuring the rest] of the default
`
`icon is visible.
`
`18. (amended) [A computer for graphically indicating secured items in a program
`for displaying contents in a selected place,
`the computer] An article of manufacture
`including a computer-readable medium havinginstructions stored thereon, execution of
`which by a computing device causes the computing device to perform operations
`
`comprising:
`
`[at least a processor;|
`
`[a first memory spacefor storing a client module;]
`
`[a second memory space, coupled to the processor, for storing code as a
`graphic operating system, the code, when executed by the processor, causing the graphic
`operating system to support the program for displaying the contents in the selected place
`
`and perform operationsof: ]
`
`[retrievingall files in the selected place;]
`
`intercepting items beingretrieved from a storage device;
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of June 4, 2010
`
`-6-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[checking if there is] determining whether at
`
`least one of the
`
`[secured] retrieved items [includedin the files] is secured;
`
`in response to_a determination that at_least one of the items is
`secured, determining a security level of the at least one secured item [activating the client
`module to determine how the at least one of the secured items is secured, when it
`is
`
`checkedthat the at least one of the secured itemsis included in the files]; and
`
`generating a superimposed icon [to indicate the at least one of the
`secured items is secured, different from the rest of the files when displayed in the
`program] based, at least in part, on the determined security level to graphically display
`
`the at least one secured item.
`
`19. (amended) The [computer] article of manufacture as recited in claim 18,
`wherein [there is an appropriate icon for the at least one of the secured items whenthe at
`least one of the secured items is not secured, and wherein]
`said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determining a security icon for the at least one
`[of the secured items] secured item based, at least in part, on the determined security
`
`level; and
`
`superimposing the [appropriate] security icon over [the] a default icon,
`wherein the default icon is configured to represent_a non-secured item from whichtheat
`least one secured item was derived [associated with, without losing original indications
`
`of the default icon].
`
`(amended) The [method] article of manufacture as recited in claim 19,
`20.
`wherein the [appropriate] security icon includes a visual object and a transparent
`
`background.
`
`(amended) The [method] article of manufacture as recited in claim 20,
`21.
`wherein said superimposing [the appropriate icon over the default
`icon] comprises
`
`Atty. Dkt. No. 2222. 540REIO
`
`

`

`Reply to Office Action of June 4, 2010
`
`-7-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`overlaying the visual object onto the default icon such that at least_a portion [without
`obscuring the rest] of the default icon is visible.
`
`22. (amended) A tangible computer readable medium [containing program code
`executable by a computing device for graphically indicating secured items in a program
`for displaying contents in a selected place,
`the computer readable medium] having
`instructions stored thereon, the instructions comprising:
`
`[program code for determining] instructions to determine a security level
`of each of [the] secured items [, wherein each of the secured items has a default icon
`
`associated with if the each of the secured items is otherwise not secured]; and
`
`{program code for superimposing] for graphically displaying the secured
`items, instructions to superimpose [an appropriate] for each secured item a security icon
`corresponding to the security level of that item over [the] a default icon [withoutlosing
`original
`indications of the default
`icon]
`, wherein the default
`icon represents a
`corresponding non-secured item from which the respective secured item was derived.
`
`23. (amended) The tangible computer readable mediumas recited in claim 22, the
`
`instructions further comprising:
`
`[program code for intercepting] instructions to intercept [files from the
`selected place whenthe files are selected by the program for displaying the contents in
`the selected place] items when theitems are retrieved from a storage device; and
`
`[program code for checking if] instructions to determine whether any of
`
`the [secured] intercepted itemsare [includedin the files] secured.
`
`24. (amended) The tangible computer readable medium asrecited in claim 23,
`wherein the [program code for determining] the instruction to determine the security
`level [of the each of the secured items comprises program code for activating] comprise
`instructions to activate a client module [when the program code for checking indicates
`
`that there are] in response to_a determination that at [lease] least one of the [secured]
`
`itemsis [included in the files] secured.
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of June 4, 2010
`
`-8-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`25. (amended) The tangible computer readable medium asrecited in claim 24, the
`instructions further comprising:
`
`[wherein the client module is configured to look into] instructions to determine
`security information associated with the at least one [of the secured items] secured item,
`[and] wherein the security information includes information regarding the security level
`
`of the at least one [of the] secured [items] item.
`
`26. (amended) The tangible computer readable medium as recited in claim 22,
`wherein the default icon is associated with an executable program [, when the each ofthe
`
`secured items or the default icon thereof is clicked,
`
`the executable program will be
`
`activated].
`
`27. (amended) The tangible computer readable medium asrecited in claim 22,
`wherein the [appropriate] security icon includes a visual object and a transparent
`
`background.
`
`28. (amended) The tangible computer readable medium as recited in claim 27,
`wherein the
`[program code for
`superimposing]
`instructions
`to superimpose the
`[appropriate] security icon corresponding to the security level over the default
`icon
` [comprises program code for overlaying] comprise instructions to overlay the visual
`object onto the default icon such that at least_a portion [without obscuring therest] of the
`
`default icon is visible.
`
`29. (amended) The tangible computer readable medium as recited in claim 27,
`wherein the
`[program code for
`superimposing]
`instructions
`to superimpose the
`[appropriate] security icon corresponding to the security level over the default
`icon
`[comprises program code
`for generating]
`comprise
`instructions
`to generate
`a
`superimposed icon including the default
`icon with the visual object superimposed
`thereon such that at least_a portion [without obscuring the rest] of the default icon is
`
`visible.
`
`30. (amended) The tangible computer readable medium as recited in claim 29,
`
`wherein the default icon is associated with an executable program [, when the each ofthe
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of June 4, 2010
`
`-9-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`secured items or the superimposediconthereofis clicked, the obscuring program will be
`
`activated].
`
`31. (cancelled)
`
`32. (amended) A tangible computer readable medium [containing program code
`executable by a computing device for graphically indicating secured items in a program
`for displaying contents in a selected place,
`the computer readable medium] having
`instructions stored thereon, the instructions comprising:
`
`[program codeforretrieving all files in the selected place;]
`
`[program code for intercepting] instructions to intercept [the files when
`metadata of the files are being loaded into the program] items being retrieved from a
`
`storage device;
`
`[program code for checking if there is] instructions to determine whether
`at least one ofthe [secured] retrieved items [included in the files file] is secured;
`
`in_response to a determination that at least one of the items is secured,
`instructions to determine a security level of the at least one secured item [program code
`for activating a client module to determine how the at least one of the secured itemsis
`secured, when it is checked that the at least one of the secured items is included in the
`
`files]; and
`
`[program code for generating] instructions to generate a superimposed
`icon [to indicate the at least one of the secured itemsis secured, different from the rest of
`the files when displayed in the program] based, at
`least
`in part, on the determined
`
`security level for graphically displaying the at least one secured item.
`
`33. (amended) The tangible computer readable medium as recited in claim 32,
`[wherein there is an appropriate icon for the at least one of the secured items whenthe at
`least one of the secured items is not secured, and] wherein the [program code for
`
`generating] instructions to generate the superimposed icon [[comprises]] comprise:
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of June 4, 2010
`
`-10-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[program code for choosing an appropriate] instructions to determine a
`security icon for the at least one [of the] secured [items] item based, at least in part, on
`the determined security level; and
`
`to superimpose the
`instructions
`superimposing]
`[program code for
`icon, wherein the default
`icon is
`[the] a default
`[appropriate] security icon over
`configured to represent a non-secured item from which the at least one secured item was
`derived [associated with, without losing original indications of the default icon].
`
`34. (amended) The [method] tangible computer readable medium asrecited in
`claim 33, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`35. (amended) The [method] tangible computer readable medium as recited in
`claim 34, wherein the [program code for superimposing] instructions to superimpose the
`[appropriate] security icon over the default icon [comprise program code for overlaying]
`comprise instructions to overlay the visual object onto the default icon such thatat least a
`portion [without obscuring the rest] of the default icon is visible.
`
`36. (new) A method comprising:
`
`determining a security level of a secured item; and
`
`for graphically displaying the secured item, superimposing a security icon
`corresponding to the security level of the secured item over a default icon, wherein the
`default icon represents a non-secured item from which the secured item was derived,
`
`37. (new) The methodasrecited in claim 36, further comprising:
`
`intercepting an item whentheitem is retrieved from a storage device; and
`
`determining whetherthe intercepted item is secured.
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of June 4, 2010
`
`-ll-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`38. (new) The methodas recited in claim 37, wherein said determining a security
`level comprises activating a client module in response to a determination that the item is
`
`secured,
`
`(new) The method as recited in claim 38, wherein the client module is
`39.
`configured to operate in an operating system supporting a program.
`
`40, (new) The method as recited in claim 39, wherein the operating system
`comprises a graphic windows operating system and the program comprises _a utility
`configured to display content of the storage device.
`
`Al. (new) The method asrecited in claim 38, further comprising:
`
`determining security information associated with the secured item, wherein the
`security information includes information regarding the security level of the secured
`
`item.
`
`42. (new) The method asrecited in claim 41, wherein the security level includes
`at least one level of security.
`
`43.
`
`(new) The method as recited in claim 36, wherein the default
`
`icon is
`
`associated with an executable program.
`
`44. (new) The methodasrecited in claim 36, wherein the security icon includes a
`
`visual object and a transparent background.
`
`(new) The method as recited in claim 44, wherein said superimposing
`45.
`comprises overlaying the visual object onto the default icon such that the default icon is
`
`at least partially visible.
`
`(new) The method as recited in claim 44, wherein said superimposing
`46.
`comprises generating a superimposed icon including the default icon with the visual
`object superimposed thereon such that the default icon is at least partially visible.
`
`Atty. Dkt. No. 2222. 540REI0
`
`

`

`Reply to Office Action of June 4, 2010
`
`-12-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`47. (new) The method as recited_in claim 45, wherein the default
`associated with an executable program.
`
`icon is
`
`48. (cancelled)
`
`49. (new) A method comprising:
`
`intercepting an item being retrieved from a storage device;
`
`determining whether the item is secured;
`
`in response to_a determination that the item is secured, determining a
`
`security level of the secured item; and
`
`generating a superimposed icon based, at least in part, on the determined
`security level for graphically displaying the secured item.
`
`(new) The method as _recited_in claim 49, wherein said generating a
`50.
` superimposed icon comprises:
`
`determining a security icon for the secured item based, at least in part, on
`
`the determined security level; and
`
`superimposing the security icon over a default icon, wherein the default
`icon is configured to represent_a non-secured item from which the secured item was
`
`derived.
`
`51. (new) The method asrecited in claim 50, wherein the security icon includes a
`
`visual object and a transparent background.
`
`(new) The method as recited in claim 51, wherein said superimposing
`52.
`comprises overlaying the visual object onto the default icon such that the default icon is
`
`at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of June 4, 2010
`
`-13-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`(new) An article of manufacture including a computer-readable_ medium
`53.
`having instructions stored thereon, execution of which by a computing device causes the
`
`computing device to perform operations comprising:
`
`intercepting an item being retrieved from a storage device;
`
`determining whether the item is secured;
`
`
`
` in response to a determination that the item is secured,
`
`
`
`
`
`
`
`determining a security level of the secured item; and
`
`generating a superimposed icon based, at
`
`least
`
`in part, on the
`
`determined security level to graphically display the secured item.
`
`54.
`
`(new) The article of manufacture as recited_in claim 53, wherein said
`
`generating a superimposed icon comprises:
`
`determining a security icon for the secured item based, at least in part, on
`the determined security level; and
`
`superimposing the security icon over _a default icon, wherein the default
`icon is configured to represent a non-secured item from which the secured item was
`
`derived.
`
`55. (new) Thearticle of manufacture as recited in claim 54, wherein the security
`
`icon includes a visual object and a transparent background.
`
`56.
`(new) The
`article of manufacture _as recited _in claim 55, wherein_said
`superimposing comprises overlaying the visual object onto the default icon such that the
`default icon is at least partially visible.
`
`57.
`
`(new) A tangible computer_readable medium having instructions stored
`
`thereon, the instructions comprising:
`
`instructions to determine a security level of a secured item: and
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of June 4, 2010
`
`~14-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`for graphically displaying the secured item, instructions to superimpose a
`
`security icon corresponding to the security level of the secured item over a default icon,
`
`wherein the default icon represents a non-secured item from which the secured item was
`
`derived.
`
`58. (new) The tangible computer readable medium as recited in claim 57, the
`instruction further comprising:
`
`instructions to intercept an item when the item is retrieved from a storage
`
`device; and
`
`instructions to determine whether the intercepted item is secured.
`
`59. (new) The tangible computer readable medium as recited in claim 58, wherein
`
`the instructions to determine the security level comprise instructions to activate a client
`
`module in response to a determination that the item is secured.
`
`60. (new) The tangible computer readable medium as recited in claim 59,
`instructions further comprising:
`
`the
`
`instructions to determine security information associated with the secured item,
`
`wherein the security information includes information regarding the security level of the
`
`secured item,
`
`61. (new) The tangible computer readable medium as recited in claim 57,wherein
`the default icon is associated with an executable program.
`
`62. (new) The tangible computer readable medium as recited in claim 57, wherein
`the security icon includes a visual object and a transparent background.
`
`63. (new) The tangible computer readable medium as recited in claim 62, wherein
`
`the instructions to superimpose the security icon corresponding to the security level over
`
`the default icon comprise instructions to overlay the visual object onto the default icon
`
`such that the default icon is at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of June 4, 2010
`
`-15-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`64. (new) The tangible computer readable medium as recited in claim 62, wherein
`the instructions to superimpose the security icon corresponding to the security level over
`the default _icon comprise instructions to generate _a superimposed icon including the
`default icon with the visual object superimposed thereon such that the default icon is at
`
`least partially visible.
`
`65. (new) The tangible computer readable medium asrecited in claim 64, wherein
`
`the default icon is associated with an executable program.
`
`66. (cancelled)
`
`(new) A tangible computer readable medium having instructions stored
`67.
`thereon, the instructions comprising:
`
`instructions to intercept an item being retrieved from a storage device;
`
`instructions to determine whether the item is secured:
`
`in response to a determination that the item is secured, instructions to
`
`determine a security level of the secured item: and
`
`instructions to generate a superimposed icon based, at least in part, on the
`
`determined security level for graphically displaying the secured item.
`
`68. (new) The tangible computer readable medium asrecited in claim 67, wherein
`
`the instructions to generate the superimposed icon comprise:
`
`instructions to determine a security icon for the secured item based, at
`
`least in part, on the determined security level; and
`
`instructions to superimpose the security icon over a default icon, wherein
`the default icon is configured to represent _a non-secured item from which the secured
`
`item was derived.
`
`69. (new) The tangible computer readable medium asrecited in claim 68, wherein
`the security icon includes a visual object and a transparent background.
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of June 4, 2010
`
`- 16-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`70. (new) The tangible computer readable medium asrecited in claim 69, wherein
`the instructions to superimpose the security icon over the default_icon comprise
`
`instructions to overlay the visual object onto the default icon such that_the default icon is
`
`at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

Connectivity issues with tsdrapi.uspto.gov. Try again now (HTTP Error 429: ).

Refresh this Document
Go to the Docket