`
`-2-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Amendments to the Claims
`
`Thislisting of claimswill replaceall prior versions, andlistings, of claimsin the
`
`application. The claim identifiers, or lack thereof, below conform to the rules for reissue
`
`amendments set
`
`forth in 37 C.F.R. §§ 1.173(b)(2),
`
`(c),
`
`(d), and (e).
`
`(See also,
`
`M.P.E.P. §§ 1453 (ID),(IV), and (V)).
`
`1.
`
`(Twice Amended)
`
`A method for graphically [indicating] representing
`
`secured items on a computer[in a program for displaying contents in a selected place],
`
`[the method] comprising:
`
`determining a security level of each of the secured items [, wherein each
`
`of the secured itemshas a default icon associated with if the each of the secured itemsis
`
`otherwise not secured]; and
`
`for graphically displaying the
`
`secured items,
`
`superimposing [an
`
`appropriate] for each secured item a security icon corresponding to the security level of
`
`that item over [the] a default icon [without losing original indications of the default
`icon], wherein the default icon represents a corresponding non-secured item of a same
`
`file type as the respective secured item.
`
`2.
`
`(Once Amended)
`
`The method as
`
`recited in
`
`claim 1, further
`
`comprising:
`
`intercepting [files from the selected place when thefiles are selected by
`
`the program for displaying the contents in the selected place] items when the items are
`
`retrieved from a storage device; and
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of May 26, 2011
`
`-3-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[checking if] determining whether any of the [secured] intercepted items
`
`are [includedin the files] secured.
`
`3.
`
`(Once Amended)
`
`The method as recited in claim 2, wherein said
`
`determiningasecurity level [of each of the secured items] comprisesactivating a client
`
`module [when said checking indicates that there are] in response to a determination that
`
`at [lease] least one of the [secured] itemsis [included in the files] secured.
`
`4.
`
`(Once Amended)
`
`The methodasrecited in claim 3, whereinthe client
`
`module [operates] is configured to operate in [a] an operating system supporting [the] a
`
`program.
`
`5.
`
`(Once Amended)
`
`The method as recited in claim 4, wherein [the
`
`selected place is a folder and] the operating system [is] comprises a graphic windows
`
`operating system and the program [is] comprises a utility [for a user, configured to
`
`display [the] contents [in] of the [folder] storage device.
`
`6.
`
`(Once Amended)
`
`The method as
`
`recited in
`
`claim 3,
`
`further
`
`comprising:
`
`[wherein the client module is configured to look into] determining security
`
`information associated with the at least one [of the secured items] secured item, [and]
`
`wherein the security information includes information regarding the security level of the
`
`at least one [of the secured items] secured item.
`
`1368659-1
`
`Atty. Dkt. No. 2222. 540REI0
`
`
`
`Reply to Office Action of May 26, 2011
`
`-4-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`7.
`
`(Once Amended)
`
`The method as recited in claim 6, wherein the
`
`security level includesat least one level of security [to indicate that the at least one of the
`
`secured itemsis secured, differentiating from therest of the files].
`
`8.
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`itemsor the default icon thereof is clicked, the executable program will be activated].
`
`9.
`(Once Amended)
`The method as recited in claim 1, wherein the
`[appropriate] security icon includes a visual object and a transparent background.
`
`10.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises overlaying the visual object onto the default icon such that at least_a
`
`portion [without obscuring the rest] of the default icon is visible.
`
`11.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises generating a superimposed icon including the default icon with the
`
`visual object superimposed thereon suchthatat least a portion of [without obscuring the
`
`rest of] the default icon is visible.
`
`12.
`
`(Once Amended)
`
`The method as recited in claim 10, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of May 26, 2011
`
`-5-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`items or the superimposed icon thereof is clicked,
`
`the obscuring program will be
`
`activated].
`
`13.
`
`(Cancelled)
`
`14.
`
`(Twice Amended)
`
`A computer-implemented method [for graphically
`
`indicating secured items in a program for displaying contents in a selected place, the
`
`method] comprising:
`
`[retrieving all files in the selected place;]
`
`intercepting [the files when metadata ofthe files are being loaded into the
`
`program]items beingretrieved from a storage device;
`
`[checking if there is] determining whether at least one of the {secured]
`
`retrieved items[includedin thefiles] is secured;
`
`in response to a determination that at least one of the items is secured,
`
`determining a security level of the least one secured item [activating a client module to
`
`-determine howtheat least one of the secured items is secured, whenit is checked that the
`
`at least one of the secureditemsis included in the files]; and
`generating a superimposed icon [to indicate the at least one ofthe secured
`items is secured, different from the rest of the files when displayed in the program]
`
`based. at least in part, on the determined security level for graphically displaying the at
`
`least one secured item.
`
`15.
`
`(Once Amended)
`
`The method as recited in claim 14, wherein [there
`
`is an appropriate icon for the at least one of the secured items whentheat least oneofthe
`1368659-1
`Atty. Dkt. No, 2222.540REIO
`
`
`
`Reply to Office Action of May 26, 2011
`
`-6-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`secured items is not secured, and wherein] said generating a superimposed icon
`
`comprises:
`
`[choosing an appropriate] determining a security icon for the at least one
`
`[of the secured items] secured item based. at least _in_part, on the determined security
`
`level; and
`
`superimposing the [appropriate] security icon over [the] a default icon,
`
`wherein the default icon is configured to represent a non-secured item from whichtheat
`
`least one secured item was derived [associated with, without losing original indications
`
`of the default icon].
`
`16.
`
`(Once Amended)
`
`The method as recited in claim 15, wherein the
`
`[appropriate] security icon includes a visual object and a transparent background.
`
`
`
`17.|(Once Amended) The method as recited in claim 16, wherein said
`
`superimposing [the appropriate icon over the default icon] comprises overlaying the
`
`visual object onto the default icon such that at least a portion [without obscuringtherest]
`
`of the default icon is visible.
`
`18.
`
`(Once Amended)
`
`[A computer
`
`for graphically indicating secured
`
`items in a program for displaying contents in a selected place, the computer] An article
`
`of manufacture including a computer-readable_medium_having instructions stored
`
`thereon, execution of which by a computing device causes the computing device to
`
`perform operations comprising:
`
`[at least a processor;]
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of May 26, 2011
`
`-7-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[a first memory spacefor storing a client module;]
`[a second memory space, coupled to the processor, for storing code as a
`graphic operating system, the code, when executed by the processor, causing the graphic
`
`operating system to support the program for displaying the contents in the selected place
`
`and perform operationsof:]
`
`[retrievingall files in the selected place;]
`
`intercepting items beingretrieved from a storage device,
`
`[checking if there is] determining whether at
`
`least one of the
`
`[secured] retrieved items[includedin the files] is secured;
`
`in_ response to a determination that at least one of the items is
`
`secured, determining a security level of the at least one secured item [activating the client
`
`module to determine how the at least one of the secured items is secured, whenit is
`
`checked thatthe at least one of the secured items is includedin the files]; and
`
`generating a superimposed icon[to indicate the at least one of the
`
`secured items is secured, different from the rest of the files when displayed in the
`
`program] based. at least in part. on the determined security level to graphically display
`
`the at least one secured'item.
`
`19.
`
`(Once Amended)
`
`The [computer] article of manufacture as recited in
`
`claim 18, wherein [there is an appropriate icon for the at least one of the secured items
`
`whenthe at least one of the secured itemsis not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of May 26, 2011
`
`-8-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[choosing an appropriate] determining a security icon for the at least one
`
`{of the secured items] secured item based, at least in part, on the determined security
`
`level; and
`
`superimposing the [appropriate] security icon over [the] a default icon,
`
`wherein the default icon is configured to represent a non-secured item from which the at
`
`least one secured item was derived [associated with, without losing original indications
`
`of the default icon].
`
`20.
`
`(Once Amended)
`
`The [method] article of manufacture as recited in
`
`claim 19, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`21.
`
`(Once Amended)
`
`The [method] article of manufacture as recited in
`
`claim 20, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`comprises overlaying the visual object onto the default icon such that_at least a portion
`
`[without obscuring the rest] of the default iconis visible.
`
`22.
`
`(Once Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`having instructions stored thereon, the instructions comprising:
`
`[program code for determining] instructions to determinea security level
`of each of[the] secured items [, wherein each of the secured items has a default icon
`
`associated with if the each of the secured items is otherwise not secured]; and
`1368659-1
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of May 26, 2011
`
`-9-
`
`;
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[program code for superimposing] for graphically displaying the secured
`
`items, instructions to superimpose [an appropriate] for each secured item a securityicon
`
`correspondingto the security level of that item over [the] a default icon [without losing
`
`original
`
`indications of the default
`
`icon]
`
`, wherein the default _icon represents a
`
`corresponding non-secured item from which the respective secured item was derived.
`
`23.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22,
`
`the instructions further comprising:
`
`[program code forintercepting] instructions to intercept[files from the
`
`selected place whenthe files are selected by the program for displaying the contents in
`the selected place] items when the items are retrieved from a storage device; and
`
`[program code for checking if] instructions to determine whether any of
`
`the [secured] intercepted itemsare [includedin the files] secured.
`
`The tangible computer readable medium asrecited
`(Once Amended)
`24.
`in claim 23, wherein the [program code for determining] the instruction to determine the
`
`security level [of the each of the secured items comprises program codefor activating]
`comprise instructions to activate a client module [when the program code for checking
`indicates that there are] in response to a determination that at [lease] least one of the
`
`[secured] itemsis {included in the files] secured.
`
`25.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 24, the instructions further comprising:
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`Reply to Office Action ofMay 26, 2011
`[wherein the client module is configured to look into] instructions to determine
`
`-10-
`
`security information associated with the at least one {of the secured items] secured item,
`
`[and] wherein the security information includes information regarding the security level
`
`ofthe at least one [of the] secured [items] item.
`
`26.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 22, wherein the default icon is associated with an executable program [, when
`
`the each of the secured items or the default
`
`icon thereof is clicked,
`
`the executable
`
`program will be activated].
`
`27.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the [appropriate- security icon includes a visual object and a
`
`transparent background.
`
`28.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 27, wherein the [program code for superimposing] instructions to_ superimpose
`
`the [appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code for overlaying] comprise instructions to overlay the visual
`
`object onto the default icon such thatat least a portion [without obscuring therest; of the
`
`default icon is visible.
`
`29.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 27, wherein the [program code for superimposing] instructions to_superimpose
`
`the [appropriate] security icon corresponding to the security level over the default icon
`1368659-1
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of May 26, 2011
`
`-ll-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[comprises program code for generating]
`
`comprise instructions
`
`to generate a
`
`superimposed icon including the default
`
`icon with the visual object superimposed
`
`thereon such that at least_a portion [without obscuring the rest] of the default icon is
`
`visible.
`
`30.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 29, wherein the default icon is associated with an executable program [, when
`the each ofthe secured itemsor the superimposed icon thereof is clicked, the obscuring
`
`program will be activated].
`
`31.
`
`(Cancelled)
`
`32.
`
`(Once Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`in a program for displaying contents in a selected place, the computer readable medium]
`
`havinginstructions stored thereon, the instructions comprising:
`[program code forretrievingall files in the selected place;]
`
`[program code for intercepting] instructions to intercept [the files when
`
`metadata of the files are being loaded into the program] items being retrieved from a
`
`
`
`storagedevice;
`
`[program code for checking if there is] instructions to determine whether
`
`at least one of the [secured] retrieved items [included in thefiles file} is secured;
`
`in response to a determination that at least_one of the items is secured,
`
`instructions to determine a security level of the at least one secured item [program code
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of May 26, 2011
`
`-12-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`for activating a client module to determine howtheat least one of the secured itemsis
`
`secured, whenit is checked that the at least one of the secured items is included in the
`
`files]; and
`
`[program code for generating] instructions to generate a superimposed
`
`icon [to indicate the at least one of the secured itemsis secured,different from the rest of
`
`the files when displayed in the program] based, at least_in part. on the determined
`
`security level for graphically displaying the at least one secured item.
`
`33.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 32, [wherein there is an appropriate icon for the at least one of the secured items
`
`whentheat least one of the secured itemsis not secured, and] wherein the [program code
`
`for generating] instructions to generate the superimposed icon [[comprises]] comprise:
`
`[program code for choosing an appropriate] instructions to determine _a
`
`security icon for the at least one [of the] secured [items] item based, at least in part, on
`
`the determined security level; and
`
`[program code for superimposing]
`
`instructions
`
`to superimpose the
`
`[appropriate] security icon over
`
`[the] a default
`
`icon, wherein the default _icon is
`
`configured to represent a non-secured item from which the at least one secured item was
`
`derived [associated with, without losing original indications of the default icon].
`
`34.
`
`(Once Amended)
`
`The [method] tangible computer readable medium
`
`as recited in claim 33, wherein the [appropriate] security icon includes a visual object
`
`and a transparent background.
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of May 26, 2011
`
`-13-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`35.
`
`(Once Amended)
`
`The [method] tangible computer readable medium
`
`as recited in claim 34, wherein the [program code for superimposing] instructions to
`
`superimpose the [appropriate] security icon over the default icon [comprise program
`
`code for overlaying] comprise instructions to overlay the visual object onto the default
`
`icon such that at least_a portion [without obscuring therest] of the default iconis visible.
`
`36._(New) A method on a computer, comprising:
`
`determining a security level of a secured item: and
`
`for graphically displaying the secured item. superimposing a securityicon
`
`corresponding to the security level of the secured item over a default icon, wherein the
`
`default icon represents a non-secured item from which the secured item was derived.
`
`37,
`
`(New) The methodasrecited in claim 36, further comprising:
`
`intercepting an item whenthe item is retrieved from a storage device: and
`
`determining whetherthe intercepted item is secured.
`
`38.
`
`(New) The method as recited in claim 37, wherein said determining a
`
`security level comprises activating a client module in response to a determination that the
`
`item is secured.
`
`39.
`
`(New) The method as recited in claim 38. wherein the client module is
`
`configured to operate in an operating system supporting a program.
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action ofMay 26, 2011
`
`-14-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`40.
`
`(New) The methodas recited in claim 39. wherein the operating system
`
`comprises a graphic windows operating system and the program comprises _a_utility
`
`configured to display content of the storage device.
`
`41.
`
`(New) The methodas recited in claim 38. further comprising:
`
`determining security information associated with the secured item, wherein the
`
`security information includes information regarding the security level of the secured
`
`item.
`
`42,
`
`(New) The method as recited in claim 41. wherein the security level
`
`includes at least one level of security.
`
`43.
`
`(New) The method as recited in claim 36, wherein the default icon is
`
`associated with an executable program.
`
`44.
`
`(New) The method as recited in claim 36, wherein the security icon
`
`includes a visual object and a transparent background.
`
`45.
`
`(New) The method as recited in claim 44. wherein said superimposing
`
`comprises overlaying the visual object onto the default icon such that the default icon is
`
`at least partially visible.
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of May 26, 2011
`
`-15-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`46.
`
`(New) The method as recited in claim 44, wherein said superimposing
`
`comprises generating a superimposed icon including the default icon with the visual
`
`object superimposed thereon such that the default icon is at least partially visible.
`
`47.
`
`(New) The method as recited in claim 45, wherein the default icon is
`
`associated with an executable program.
`
`48.
`
`(Cancelled)
`
`49._(New) A computer-implemented method comprising:
`
`intercepting an item being retrieved from a storage device;
`
`|
`
`determining whether the item is secured:
`
`in response to a determination that the item_is secured, determining a
`
`security level of the secured item; and
`
`generating a superimposed icon based, at least in part, on the determined
`
`security level for graphically displaying the secured item.
`
`50.
`
`(New) The method as recited in claim 49, wherein said generating a
`
`superimposed icon comprises:
`
`determining a security icon for the secured item based. at least in part. on
`
`the determined security level: and
`
`superimposing the security icon over a default icon. wherein the default
`
`icon is configured to represent a non-secured item of a samefile type as the secured item.
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of May 26, 2011
`
`- 16-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`51.
`
`(New) The method as recited in claim 50. wherein the security _icon
`
`includes a visual object and a transparent background.
`
`52.__(New) The method as recited in claim 51, wherein said superimposing
`
`comprises overlaying the visual object onto the default icon such that the default iconis
`
`at least partially visible.
`
`~ 53.
`
`(New) An article of manufacture including a computer-readable medium
`
`having instructionsstored thereon, execution of which by a computing device causes the
`computing device to perform operations comprising:
`
`intercepting an item being retrieved from a storage device;
`
`determining whetherthe item is secured;
`
`in_response_to a determination that
`
`the
`
`item is
`
`secured,
`
`determining a security level of the secured item: and
`
`generating a superimposed icon based, at Jeast_in_ part. on the
`
`determined security level to graphically display the secured item.
`
`54.
`
`(New) The article of manufacture as recited in claim 53. wherein said
`
`generating a superimposed icon comprises:
`
`determining a security icon for the secured item based. at least in part, on
`
`the determined security level; and
`
` superimposing the security icon over a default_icon wherein the default
`
`icon is configured to represent_a non-secured item from which the secured item was
`
`derived.
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of May 26, 2011
`
`-17-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`55.
`
`(New) The article of manufacture as recited in claim 54, wherein the
`
`security icon includes a visual object and a transparent background.
`
`56.
`
`(New) The article of manufacture as recited in claim 55, wherein said
`
`superimposing comprises overlaying the visual object onto the default icon such that the
`
`default icon is at least partially visible.
`
`57.
`
`(New) A tangible computer readable medium having instructions stored
`
`thereon,the instructions comprising:
`
`instructions to determinea security level of a secured item: and
`
`for graphically displaying the secured item, instructions to superimpose a
`
`security icon correspondingto the security level of the secured item over a default icon,
`
`wherein the default icon represents a non-secured item of a same file type as the secured
`
`item.
`
`58.
`
`(New) The tangible computer readable medium as recited in claim 57, the
`
`instruction further comprising:
`
`instructions to intercept an item when the item is retrieved from _a storage
`
`device; and
`
`instructions to determine whetherthe intercepted item is secured.
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`Reply to Office Action ofMay 26, 2011
`59.
`(New) The tangible computer _readable medium as recited in claim 58.
`
`-18-
`
`wherein the instructions to determine the security level comprise instructions to activate
`
`a client module in response to a determination that the item is secured.
`
`60.
`
`(New) The tangible computer readable medium as recited in claim 59. the
`
`instructions further comprising:
`
`instructions to determine security information associated with the secured item,
`
`wherein the security information includes information regardingthe security level of the
`
`secured item.
`
`/
`(New) The tangible computer readable medium as recited in claim_57,
`
`61.
`
`wherein the default icon is associated with an executable program.
`
`62.
`
`(New) The tangible computer readable medium as recited in claim 57,
`
`wherein the security icon includes a visual object and a transparent background.
`
`63._(New) The tangible computer readable medium _as recited in claim 62,
`
`wherein the instructions to superimpose the security icon corresponding to the security
`
`level over the default icon comprise instructions to overlay the visual object onto the
`
`default icon such that the default icon is at least partially visible.
`
`64.
`
`(New) The tangible computer readable medium as recited in claim 62,
`
`wherein the instructions to superimpose the security icon corresponding to the security
`
`level over the default
`
`icon comprise instructions to_generate_a_ superimposed icon
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`;
`Reply to Office Action of May 26, 2011
`
`-19-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`including the default icon with the visual object superimposed thereon such that the
`
`default iconis at least partially visible.
`
`65.
`
`(New) The tangible computer readable medium as recited in claim 64.
`
`wherein the default icon is associated with an executable program.
`
`66.
`
`(Cancelled)
`
`67.
`
`(New) A tangible computer readable medium having instructions stored
`
`thereon, the instructions comprising:
`
`instructions to intercept an item being retrieved from a storage device;
`
`instructions to determine whetherthe item is secured;
`
`in response to a determination that the item is secured,
`
`instructions to
`
`determinea security level of the secured item; and
`
`instructions to generate a superimposed icon based, at least in part, on the
`
`determined security level for graphically displaying the secured item.
`
`68.
`
`(New) The tangible computer readable medium as recited in claim 67,
`
`wherein the instructions to generate the superimposed icon comprise:
`
`instructions to determine a security icon for the secured item based, at
`
`least in part. on the determined security level; and
`
`instructions to superimpose the security icon over a default icon, wherein
`
`the default icon is configured to represent_a non-secured item from which the secured
`
`item was derived.
`
`1368659-1
`
`Atty. Dkt. No, 2222.540REIO
`
`
`
`Reply to Office Action of May 26, 2011
`
`-20-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`69.
`
`(New) The tangible computer readable medium _as recited in claim 68,
`
`wherein the security icon includes a visual object and a transparent background.
`
`70,
`
`(New) The tangible computer readable medium as recited in claim 69.
`
`wherein the instructions to superimpose the security icon over the default icon comprise
`
`instructions to overlay the visual object onto the default icon such that_the default icon is _
`
`at least partially visible.
`
`1368659-1
`
`Atty. Dkt. No. 2222.540REi0
`
`

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site