`
`-2-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Amendments to the Claims
`
`This listing of claims will replaceall prior versions, and listings, of claims in the
`
`application. The claimidentifiers, or lack thereof, below conform tothe rules for reissue
`
`amendments set
`
`forth in 37 C.F.R. 88 1.1730)2),
`
`(©) (), and (©).
`
`Gee also,
`
`M.P.E.P. §§ 1453 (ID), (IV), and (V)).
`
`1,
`(Twice Amended)
`A method for graphically [indicating, representing
`secured items on a computer [in a program for displaying contents in a selected place],
`
`[the method] comprising:
`
`determining a security level of each of the secured items [, wherein each of the
`
`secured items has a default icon associated with if the each of the secured items is
`
`otherwise not secured]; and
`
`forxrarhically distlaving the secureditems, superimposing [an appropriate] for
`
`each secured item a security icon corresponding to the security level of that item over
`
`[the] a default icon [without losing original indications of the default icon], wherein the
`
`defaulticonrepresentsacorresponding non-secured item ofasamefiletypeasthe
`
`respectivesecureditem.
`
`2.
`
`(Once Amended)
`
`The method as
`
`recited in claim 1,
`
`further
`
`comprising:
`
`intercepting [files from the selected place when the files are selected by the
`
`program for displaying the contents in the selected place} itemswhen.theitemsare
`
`retrievedfromastorasedevice; and
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of March 29, 2012
`
`-3-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[checking if] determining whether any of the [secured] intercepted items are
`
`[included in the files] secured.
`
`3.
`
`(Once Amended)
`
`The method as recited in claim 2, wherein said
`
`determining a security level [of each of the secured items] comprises activating a client
`
`
`module [when said checking indicates that there are] in response to adeterminationthat
`
`at [lease] least one of the [secured] items is [includedin the files] secured.
`
`4,
`
`(Once Amended)
`
`The method as recited in claim 3, wherein the client
`
`
`module [operates] isconfixuredtooperate in [a] an operating system supporting [the] a
`
`program.
`
`5.
`
`(Once Amended)
`
`The method as recited in claim 4, wherein [the
`
`selected place is a folder andj the operating system [is] comprises a graphic windows
`
`operating system and the program [is] comprises a utility [for a user] configured to
`
`display [the] contents [in] of the [folder] storage device.
`
`6.
`
`(Once Amended)
`
`The method as
`
`recited in claim 3,
`
`further
`
`comprising:
`
`[wherein the client module is configured to look into] determining security
`
`information associated with the at least one [of the secured items] secured item, [and]
`
`wherein the security information includes information regarding the security level of the
`
`at least one |of the secured items} secured item.
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of March 29, 2012
`
`-4-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`2.
`
`(Once Amended)
`
`The method as recited in claim 6, wherein the
`
`security level includes at least one level of security [to indicate that the at least one of the
`
`secured itemsis secured, differentiating from the rest of thefiles].
`
`8.
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the default icon thereofis clicked, the executable program will be activated].
`
`9.
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`[appropriate] security icon includes a visual object and a transparent background.
`
`10.
`
`{Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises overlaying the visual object onto the default icon such that at least_a
`
`portion [without obscuring the rest] of the default icon is visible.
`
`Li.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises generating a superimposed icon including the default icon with the
`
`visual object superimposed thereon such that at least.a portion of [without obscuring the
`
`rest of] the default icon is visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`-5-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`12.
`
`(Once Amended)
`
`The method as recited in claim 10, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the superimposed icon thereof is clicked,
`
`the obscuring program will be
`
`activated].
`
`13.
`
`(Cancelled)
`
`14.
`
`(Twice Amended)
`
`A computer-implemented method [for graphically
`
`indicating secured items in a program for displaying contents in a selected place, the
`
`method] comprising:
`
`[retrievingall files in the selected place;]
`
`intercepting [the files when metadata of the files are being loaded into the
`
`program]itemsbeingretrievedfrom a storaxe device;
`
`[checking if there is] determining whether at least one of the [secured] retrieved
`
`items[includedin thefiles] is secured;
`
`inresponsetoadeterminationthatat.least_oneoftheitemsissecured,
`
`
`
`determiningasecurityleveloftheleastonesecureditem [activating a client module to
`
`determine how the at least one of the secured items is secured, whenit is checked that the
`
`at least one of the secured itemsis includedin thefiles]; and
`
`generating a superimposedicon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based, at
`
`leastin part,onthedeterminedsecuritylevel for: grashically displayingtheatleastone
`
`
`secured item.
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of March 29, 2012
`
`-6-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`15.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 14, wherein [there is an appropriate icon for the at least one of the secured items
`
`whenthe at least one of the secured items is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determining a security icon for the at least one [of the
`
`secured items] secureditembased,at least in part. on thedeterminedsecuritylevel; and
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`thedefault icon is confizuredtorepresentanon-secureditemfrom which the at least one
`
`secured item wasderived[associated with, without losing original indications of the
`
`default icon].
`
`16.
`
`(Twice Amended)
`
`The computer-imylemented method as recited in
`
`claim 15, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`17.
`
`(Twice Amended)
`
`The computer-imelemented method as recited in
`
`claim 16, wherein said superituposing [the appropriate icon over the default
`
`icon}
`
`comprises overlaying the visual object onto the default icon suchthatatleastaportion
`
`[without obscuring the rest] of the default iconis visible.
`
`18.
`
`(Once Amended)
`
`[A computer
`
`for graphically indicating secured
`
`items in a program for displaying contents in a selected place, the computer] Anarticle
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of March 29, 2012
`
`-7-
`
`Nalini J. PRA®ASH
`Appl. No. 11/889,685
`
`ofmanufactureincludingacomputer-readablemedium having instructions.stored
`
`thereon,execution of whichbyacomputingdevicecausesthecomputingdeviceto
`
`perform operations comprising:
`
`[at least a processor;|
`
`[a first memory space for storing a client module;]
`
`[a second memory space, coupled to the processor, for storing code as a graphic
`
`operating system,
`
`the code, when executed by the processor, causing the graphic
`
`operating system to support the program for displaying the contents in the selected place
`
`and perform operationsof:]
`
`[retrievingall files in the selected place;]
`
`interceptingitemsbeingretrievedfrom_astoragedevice:
`
`[checkingif there is] determining whether at least one of the [secured] retrieved
`
`items [includedin the files] is secured;
`
`in_ responsetoadetermination that at leastoneoftheitems is secured,
`
`determining asecuritylevelofthe at least onesecureditem[activating the client module
`
`to determine how theat least one of the secured items is secured, when it is checked that
`
`the at least one of the secured itemsis includedin the files]; and
`
`generating a superimposed icon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based, at
`
`
`
`least_inpart,onthedeterminedsecurity level tographicallydisplaytheatleastone
`
`secured item.
`
`Atty. Dkt. No. 2222. 540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`-8-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`19.
`
`(Once Amended)
`
`The feomputer] articleofmanufacture as recited in
`
`claim 18, wherein [there is an appropriate icon for the at least one ofthe securediterns
`
`when the at least one of the secured iterns is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determining a security icon for the at least one [of the
`secured items] secureditem based, at least.inpart,onthedetermined security level; and
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`thedefaulticonisconfizured torepresentanon-secureditemfromwhichtheatleastonelerr
`
`
`secureditemwasderived [associated with, without losing original indications of the
`
`default icon].
`
`20.
`
`(Once Amended)
`
`The [method] article of manufacture as recited in
`
`claim 19, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`21.
`
`(Once Amended)
`
`The [method} articleofmanufacture as recited in
`
`claim 20, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`comprises overlaying the visual object onto the default icon such that atleastaportion
`
`[without obscuring the rest] of the default icon is visible.
`
`22.
`
`(Once Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`-9-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`
`having instructionsstoredthereon, the instructions comprising:
`
`[program code for determining] instructionstodetermine a security level of each
`
`of [the] secured items [, wherein each of the secured items has a default icon associated
`
`with if the each of the secured items is otherwise not secured]; and
`
`[program code for superimposing] forraphicallydisplayingthesecured items.
`
`instructionstosuperimpose [an appropriate] foreachsecured.itemasecurity icon
`
`corresponding to the security level of that item over [the] a default icon [without losing
`
`original
`
`indications of the default
`
`icon] .whereinthe default
`
`icon representsa
`
`correspondingnon-secureditemfromwhichtherespective secureditemwasderived.
`
`23.
`
`(Once Amended)
`
`The tangible computer readable mediumasrecited
`
`in claim 22,
`
`the instructions further comprising:
`
`[program code for intercepting] instructionstointercept [files from the selected
`
`place when the files are selected by the program for displaying the contents in the
`
`selected place] items whentheitemsareretrieved from a storazedevice; and
`
`[program code for checking if] instructions to determinewhether any of the
`
`[secured] intercepted itemsare [included in the files] secured.
`
`24.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 23, wherein the [program code for determining] the instruction todetermine the
`
`security level [of the each of the secured items comprises program code for activating]
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`- 10-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[secured] itemsis [included in the files] secured.
`
`25.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 24,the instructionsfurthercomprising:
`
`[wherein the client module is configured to look into] instructionstodetermine
`
`security information associated with the at least one [of the secured items] secured item,
`
`[and] wherein the security information includes information regarding the security level
`
`of the at least one [of the] secured [items] iter.
`
`26.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the default icon is associated with an executable program [, when
`
`the each of the secured items or the default icon thereof is clicked, the executable
`
`program will be activated].
`
`27.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`28.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 27, wherein the [program code for superimposing] instructions to superimpose
`
`the [appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code for overlaying] compriseinstructionsto.overlay the visual
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`-ll-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`object onto the default icon suchthat at least_a portion [without obscuring therest] of the
`
`default icon is visible.
`
`29.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`the [appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code
`
`for generating] compriseinstructions.to#enerate a
`
`superimposed icon including the default
`
`icon with the visual object superimposed
`
`thereon suchthatatleast_aportion [without obscuring the rest] of the default icon is
`
`visible.
`
`30.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 29, wherein the default icon is associated with an executable program [, when
`
`the each of the secured items or the superimposed icon thereofis clicked, the obscuring
`
`program will be activated].
`
`31.
`
`(Cancelled)
`
`32.
`
`(Once Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`havinginstructions stored thereon, the instructions comprising:
`
`[program code forretrieving all files in the selected place;]
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`-12-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`{program codefor intercepting] instructionstointercept [the files when metadata
`
`of the files are being loaded into the program] items being retrievedfromastoraye
`
`device;,
`
`[program code for checkingif there is] instructionstodeterminewhetherat least
`
`one ofthe [secured] retrieved items [includedin the files file] is secured;
`
`in_respensefoadeterminationthatat least one of the items is secured,
`
`instructionstodetermineasecurity level of the at least one secured item [program code
`
`for activating a client module to determine how the at least one of the secured itemsis
`
`secured, when it is checked that the at least one of the secured items is included in the
`
`files]; and
`
`[program code for generating] instructionstosenerate a superimposed icon [to
`
`indicate the at least one of the secured items is secured, different from the rest of the files
`
`when displayed in the program] based.atleastinpart,onthedeterminedsecuritylevel
`
`forgraphicallydisplayingtheatleastonesecureditem.
`
`33.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 32, [wherein there is an appropriate icon for the at least one of the secured items
`
`whenthe at least one of the secured items is not secured, and] wherein the [program code
`
`for generating] instructionstogenerate the superimposed icon [[comprises]] comprise:
`
`[program code for choosing an appropriate] instructions to determine a security
`
`icon for the at least one [of the] secured [items] itembased,atleastinpart,on.the
`
`determinedsecuritylevel; and
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of March 29, 2012
`
`~13-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[program code for superimposing] instructionstosuperimpose the [appropriate]
`
`security icon over [the] a default icon,whereinthedefaulticon is configured to represent.
`
`
`
`a.non-secureditemfromwhichtheatleast secureditemwas derived [associatedone
`
`
`
`with, without losing original indications of the default icon].
`
`34,
`
`(Once Amended)
`
`The [method] tangiblecomputer readable medium
`
`as recited in claim 33, wherein the [appropriate] security icon includes a visual object
`
`and a transparent background.
`
`35.
`
`(Once Amended)
`
`The [method] tangiblecomputerreadable medium
`
`as recited in claim 34, wherein the [program code for superimposing] instructions to
`
`superimpose the [appropriate] security icon over the default icon [comprise program
`
`code for overlaying] compriseinstructionstooverlay the visual object onto the default
`
`icon suchthatatleastasortion [without obscuring the rest] of the default icon is visible.
`
`36.......<ew) Amethodon acomputer,comprising:
`
`determiningasecuritylevelofasecureditem:and
`
`forgraphicallydisplayingthesecureditem.superimposingasecurityicon
`
`corressiondingtothesecuritylevel of the secured item over a default icon, wherein the
`
`
`defaulticonrepresents a non-secured itemfrom which thesecureditemwas derived.
`
`37.New}Themethodasrecitedinclaim36,furthercomprising:
`
`reneeet!
`intercettinganitemwhentheitemisretrievedfromastoragedevice: and
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`-14-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`determiningwhethertheintercepteditemis secured.
`
`38...(New)Themethodasrecitedinclaim37,whereinsaiddetermining4
`
`security level comprises activatingaclientmoduleinresronsetoa determination that the
`
`item is secured.
`
`39.{New}Themethodasrecitedinclaim38.whereintheclientmoduleis
`
`configuredtooperateinanoperatingsystemsupportingaprovram,
`
`40.{New} Themethodasrecitedinclaim39.whereinthe operating system
`
`oh
`comprises a graphicwindowsoperatinysystemand the program comprises autility
`
`configuredtodisplaycontentofthestoragedevice.
`
`41.<New}Themethodasrecitedin claim38.furthercomprising:
`
`
`determining security informationassociatedwiththesecureditem. wherein the
`
`securityinformation includes informationregardingthesecurity level of the secured
`
`item.
`
`
`
`42.{New}The methodasrecited inclaim41.whereinthesecuritylevel
`
`
`
`includesatleastonelevelofsecurity.
`
`manetagnee
`en
`
`
`43. ‘New}Themethodasrecitedin claim36,whereinthedefaulticonis
`
`
`associatedwithanexecutable program.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`-15-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`44._¢Kew}Themethodasrecitedinclaim36,whereinthesecurityicon
`
`includes a visual objectandatransparentbackground.
`
`45.(New)Themethod as recitedinclaim44, wherein saidsuperimposing
`
`comprisesoverlayingthevisualobjectontothedefaulticonsuchthatthedefaulticonis
`
`atleastpartiallyvisible.
`
`
`
`46. _<New)Themethod_asrecitedinclaim44,whereinsaidsuperimposing
`EERE
`
`
`comprises generatingasuperimposediconincluding.thedefaulticonwiththe visual
`
`
`objectsuperimposedthereonsuchthatthedefaulticonisatleastpartiallyvisible.
`
`47._(iew}Themethodasrecitedin claim45,whereinthedefaulticon.is
`
`associatedwithanexecutableprovram.
`
`48.
`
`(Cancelled)
`
`49.{New}Acomputer-implementedmethodcomprising:
`Kae
`
`
`intercepting an itembeingretrievedfromastoraxedevice:
`
`determiningwhethertheitemissecured:
`
`
`
`inresponseto_adeterminationthattheitemis secured,determiningasecurity
`
`levelofthesecured.item;and
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`- 16-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`generatingasuperimposedicon.based,at leastinpart,onthedetermined security:
`
`levelforgraphicallydisplaying the secured item,PaREARNNERSUSANSANE
`
`z‘
`
`nuetac
`yeemereSeay
`Soe
`
`50. (New} Thecomputer-implementedmethodas.recitedinclaim 49.
`
`
`
`penta
`whereinsaidgeneratingasuperimposediconcomprises:
`
`
`determininga security icon for thesecureditembased.atleast.inpart, on the
`
`determinedsecuritylevel:and
`
`superimposingthe securityiconoveradefaulticon,wherein the default icon is
`
`configured torewresentanon-secureditemofa same file tyre as the secureditem.
`
`51.¢New}Thecomputer-implementedmethodasrecitedinclaim50,
`
`whereinthesecurityicon includes a visual object andatransparentbacksround.
`
`52.{New}Thecomputer-implementedmethod as recited in claim 51.
`
`*
`whereinsaidsuperimposingcomprisesoverlayingthevisual objectontothedefaulticon
`
`suchthatthedefaulticonisatleastpartially’ visible.
`
`53,€Sew}Anarticleofmanufactureincluding.acomputer-readablemedium
`
`havininstructions storedthereon,executionofwhichby a computing device causes the
`
`computindevicetoperformoperations comprising:
`
`interceptinganitembeingretrieved from a storage device:
`
`determiningwhether the item is secured:
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`-17-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`inresponsetoadetermination that theitemis secured,determininga security
`
`levelofthesecured item; and
`
`
`generating a superimeosediconbased,atleast.in yart,onthedetermined security
`
`leveltogratshicallydisplaythesecured item.
`
`54,{New}Thearticleofmanufactureasrecitedinclaim53.whereinsaid
`
`
`
`generatingasuperimposedicon comprises:
`
`
`
`
`
`determiningasecurityiconforthesecured itembased,atleastinpart,on the
`
`determinedsecuritylevel:and
`
`superimposinsthesecurity icon over a default icon. whereinthedefaulticonis
`
`
`
`configuredtoresresent.anon-secured itemfromwhichthesecureditemwasderived.
`
`
`
`
`
`55.(New)Thearticleofmanufactureasrecitedinclaimthe54,wherein.
`
`Raye
`security icon includesavisualobjectandatransparent backround.
`
`Miphatee
`56
`(ew)Thearticleofmanufacture as recited in claim 55, wherein said
`
`
`superimposingcomprises overlaying the visual objectontothedefaulticonsuchthatthe
`
`default icon is at leastpartiallyvisible.
`
`57...(New)Atangiblecomputerreadablemedium havinginstructions stored
`
`thereon,theinstructionscomprising:
`
`Rtas
`instructions to determine a security levelofasecureditem:and
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of March 29, 2012
`
`- 18-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`forgraphically displayingthesecureditem,instructions to superimmoseasecurity
`
`
`
`icon correspondingtothesecuritylevelofthesecureditemoveradefaulticon,wherein
`
`thedefault iconrepresentsanon-secured item of a samefiletypeasthesecureditem.
`
`58.(New}Thetangiblecomguterreadablemediumasrecited
`
`inclaim57,the
`
`instructionfurther comprising:
`
`instructionstointerceptanitemwhentheitem is retrievedfromastoragedevice:
`
`and
`
`instructionsto,determinewhethertheintercepteditemissecured.
`
`
`
`59.___iNew}The tangiblecomputerreadablemediumasrecited inclaim58.
`
`
`
`
`
`
`
`whereintheinstructionstodeterminethesecuritylevelcompriseinstructionstoactivate
`
`
`
`
`
`aclientmoduleinresponsetoadeterminationthattheitemis secured.
`
`60...New}Thetanziblecomputerreadablemediumasrecitedinclaim59..the
`
`
`
`instructionstodeterminesecurityinformationassociatedwiththesecureditem.
`
`
`
`whereinthesecurityinformationincludesinformation regardingthesecurity levelofthe
`
`
`
`secured item.
`
`es
`
`
`
`
`61.¢New)Thetangiblecomputerreadablemedium_as recitedinclaim 57,
`
`SN
`
`
`whereinthedefaulticon is associatedwithanexecutableprogram.
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`Reply to Office Action of March 29, 2012
`
`-19-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`62...New?Thetangiblecomputerreadablemedium_as recited in claim57,
`
`
`whereinthesecurityiconincludesavisualobjectand a transparent background.
`
`63...(sew)Thetangiblecomputer readable mediumasrecitedinclaim.62.
`
`whereintheinstructionstosuperimposethesecurityiconcorrespondinytothesecurity
`
`leveloverthedefaulticoncompriseinstructionstooverlaythevisualobjectontothe
`
`defaulticonsuchthatthedefaulticonisatleastpartiallyvisible.
`
`
`
`66.
`
`(Cancelled)
`
`FeRaraRaaneaASLOD
`
`INLSaRai
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Reply to Office Action of March 29, 2012
`
`- 20 -
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`inresponsetoadetermination that theitemissecured,instructionstodeterminea
`
`securitylevelofthesecured item: and
`
`
`
`instructionsto generateasuperimposediconbased, at
`
`least
`
`in part.onthe
`
`determined securitylevelforgraphicallydisplayingthe secured item.
`
`68.{New}.Thetangible computer readablemediumasrecitedinclaim67,
`
`whereintheinstructions to zeneratethesuperimposediconcomprise:
`
`instructionstodetermineasecurityiconforthesecured item based, at least in
`
`part,onthedeterminedsecuritylevel:and
`
`instructionstosuperimposethesecurity icon over a default icon, wherein the
`
`
`
`
`
`defaulticonisconfisuredtorepresentanon-secureditemfromwhichthesecureditem
`
`was derived.
`
`69.(New)Thetangiblecomputerreadablemediumasrecitedinclaim68.
`
`
`
`
`
`whereinthesecurityiconincludesavisualobjectandatransparentbackground.
`
`70,{New}The tangible computer readable medium as recited in claim 69,
`
`wherein the instructions to suyserimposethesecurity.iconoverthedefaulticoncomprise
`
`instructionstooverlaythevisualobjectontothedefaulticonsuchthatthedefaulticonis
`
`atleastpartiallyvisible.
`
`Atty. Dkt. No. 2222.540REIO
`
`