Reply to Office Action of March 29, 2012
`
`-2-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Amendments to the Claims
`
`This listing of claims will replaceall prior versions, and listings, of claims in the
`
`application. The claimidentifiers, or lack thereof, below conform tothe rules for reissue
`
`amendments set
`
`forth in 37 C.F.R. 88 1.1730)2),
`
`(©) (), and (©).
`
`Gee also,
`
`M.P.E.P. §§ 1453 (ID), (IV), and (V)).
`
`1,
`(Twice Amended)
`A method for graphically [indicating, representing
`secured items on a computer [in a program for displaying contents in a selected place],
`
`[the method] comprising:
`
`determining a security level of each of the secured items [, wherein each of the
`
`secured items has a default icon associated with if the each of the secured items is
`
`otherwise not secured]; and
`
`forxrarhically distlaving the secureditems, superimposing [an appropriate] for
`
`each secured item a security icon corresponding to the security level of that item over
`
`[the] a default icon [without losing original indications of the default icon], wherein the
`
`defaulticonrepresentsacorresponding non-secured item ofasamefiletypeasthe
`
`respectivesecureditem.
`
`2.
`
`(Once Amended)
`
`The method as
`
`recited in claim 1,
`
`further
`
`comprising:
`
`intercepting [files from the selected place when the files are selected by the
`
`program for displaying the contents in the selected place} itemswhen.theitemsare
`
`retrievedfromastorasedevice; and
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of March 29, 2012
`
`-3-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[checking if] determining whether any of the [secured] intercepted items are
`
`[included in the files] secured.
`
`3.
`
`(Once Amended)
`
`The method as recited in claim 2, wherein said
`
`determining a security level [of each of the secured items] comprises activating a client
`
`
`module [when said checking indicates that there are] in response to adeterminationthat
`
`at [lease] least one of the [secured] items is [includedin the files] secured.
`
`4,
`
`(Once Amended)
`
`The method as recited in claim 3, wherein the client
`
`
`module [operates] isconfixuredtooperate in [a] an operating system supporting [the] a
`
`program.
`
`5.
`
`(Once Amended)
`
`The method as recited in claim 4, wherein [the
`
`selected place is a folder andj the operating system [is] comprises a graphic windows
`
`operating system and the program [is] comprises a utility [for a user] configured to
`
`display [the] contents [in] of the [folder] storage device.
`
`6.
`
`(Once Amended)
`
`The method as
`
`recited in claim 3,
`
`further
`
`comprising:
`
`[wherein the client module is configured to look into] determining security
`
`information associated with the at least one [of the secured items] secured item, [and]
`
`wherein the security information includes information regarding the security level of the
`
`at least one |of the secured items} secured item.
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of March 29, 2012
`
`-4-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`2.
`
`(Once Amended)
`
`The method as recited in claim 6, wherein the
`
`security level includes at least one level of security [to indicate that the at least one of the
`
`secured itemsis secured, differentiating from the rest of thefiles].
`
`8.
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the default icon thereofis clicked, the executable program will be activated].
`
`9.
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`[appropriate] security icon includes a visual object and a transparent background.
`
`10.
`
`{Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises overlaying the visual object onto the default icon such that at least_a
`
`portion [without obscuring the rest] of the default icon is visible.
`
`Li.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises generating a superimposed icon including the default icon with the
`
`visual object superimposed thereon such that at least.a portion of [without obscuring the
`
`rest of] the default icon is visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`-5-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`12.
`
`(Once Amended)
`
`The method as recited in claim 10, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the superimposed icon thereof is clicked,
`
`the obscuring program will be
`
`activated].
`
`13.
`
`(Cancelled)
`
`14.
`
`(Twice Amended)
`
`A computer-implemented method [for graphically
`
`indicating secured items in a program for displaying contents in a selected place, the
`
`method] comprising:
`
`[retrievingall files in the selected place;]
`
`intercepting [the files when metadata of the files are being loaded into the
`
`program]itemsbeingretrievedfrom a storaxe device;
`
`[checking if there is] determining whether at least one of the [secured] retrieved
`
`items[includedin thefiles] is secured;
`
`inresponsetoadeterminationthatat.least_oneoftheitemsissecured,
`
`
`
`determiningasecurityleveloftheleastonesecureditem [activating a client module to
`
`determine how the at least one of the secured items is secured, whenit is checked that the
`
`at least one of the secured itemsis includedin thefiles]; and
`
`generating a superimposedicon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based, at
`
`leastin part,onthedeterminedsecuritylevel for: grashically displayingtheatleastone
`
`
`secured item.
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of March 29, 2012
`
`-6-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`15.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 14, wherein [there is an appropriate icon for the at least one of the secured items
`
`whenthe at least one of the secured items is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determining a security icon for the at least one [of the
`
`secured items] secureditembased,at least in part. on thedeterminedsecuritylevel; and
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`thedefault icon is confizuredtorepresentanon-secureditemfrom which the at least one
`
`secured item wasderived[associated with, without losing original indications of the
`
`default icon].
`
`16.
`
`(Twice Amended)
`
`The computer-imylemented method as recited in
`
`claim 15, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`17.
`
`(Twice Amended)
`
`The computer-imelemented method as recited in
`
`claim 16, wherein said superituposing [the appropriate icon over the default
`
`icon}
`
`comprises overlaying the visual object onto the default icon suchthatatleastaportion
`
`[without obscuring the rest] of the default iconis visible.
`
`18.
`
`(Once Amended)
`
`[A computer
`
`for graphically indicating secured
`
`items in a program for displaying contents in a selected place, the computer] Anarticle
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of March 29, 2012
`
`-7-
`
`Nalini J. PRA®ASH
`Appl. No. 11/889,685
`
`ofmanufactureincludingacomputer-readablemedium having instructions.stored
`
`thereon,execution of whichbyacomputingdevicecausesthecomputingdeviceto
`
`perform operations comprising:
`
`[at least a processor;|
`
`[a first memory space for storing a client module;]
`
`[a second memory space, coupled to the processor, for storing code as a graphic
`
`operating system,
`
`the code, when executed by the processor, causing the graphic
`
`operating system to support the program for displaying the contents in the selected place
`
`and perform operationsof:]
`
`[retrievingall files in the selected place;]
`
`interceptingitemsbeingretrievedfrom_astoragedevice:
`
`[checkingif there is] determining whether at least one of the [secured] retrieved
`
`items [includedin the files] is secured;
`
`in_ responsetoadetermination that at leastoneoftheitems is secured,
`
`determining asecuritylevelofthe at least onesecureditem[activating the client module
`
`to determine how theat least one of the secured items is secured, when it is checked that
`
`the at least one of the secured itemsis includedin the files]; and
`
`generating a superimposed icon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based, at
`
`
`
`least_inpart,onthedeterminedsecurity level tographicallydisplaytheatleastone
`
`secured item.
`
`Atty. Dkt. No. 2222. 540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`-8-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`19.
`
`(Once Amended)
`
`The feomputer] articleofmanufacture as recited in
`
`claim 18, wherein [there is an appropriate icon for the at least one ofthe securediterns
`
`when the at least one of the secured iterns is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determining a security icon for the at least one [of the
`secured items] secureditem based, at least.inpart,onthedetermined security level; and
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`thedefaulticonisconfizured torepresentanon-secureditemfromwhichtheatleastonelerr
`
`
`secureditemwasderived [associated with, without losing original indications of the
`
`default icon].
`
`20.
`
`(Once Amended)
`
`The [method] article of manufacture as recited in
`
`claim 19, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`21.
`
`(Once Amended)
`
`The [method} articleofmanufacture as recited in
`
`claim 20, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`comprises overlaying the visual object onto the default icon such that atleastaportion
`
`[without obscuring the rest] of the default icon is visible.
`
`22.
`
`(Once Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`-9-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`
`having instructionsstoredthereon, the instructions comprising:
`
`[program code for determining] instructionstodetermine a security level of each
`
`of [the] secured items [, wherein each of the secured items has a default icon associated
`
`with if the each of the secured items is otherwise not secured]; and
`
`[program code for superimposing] forraphicallydisplayingthesecured items.
`
`instructionstosuperimpose [an appropriate] foreachsecured.itemasecurity icon
`
`corresponding to the security level of that item over [the] a default icon [without losing
`
`original
`
`indications of the default
`
`icon] .whereinthe default
`
`icon representsa
`
`correspondingnon-secureditemfromwhichtherespective secureditemwasderived.
`
`23.
`
`(Once Amended)
`
`The tangible computer readable mediumasrecited
`
`in claim 22,
`
`the instructions further comprising:
`
`[program code for intercepting] instructionstointercept [files from the selected
`
`place when the files are selected by the program for displaying the contents in the
`
`selected place] items whentheitemsareretrieved from a storazedevice; and
`
`[program code for checking if] instructions to determinewhether any of the
`
`[secured] intercepted itemsare [included in the files] secured.
`
`24.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 23, wherein the [program code for determining] the instruction todetermine the
`
`security level [of the each of the secured items comprises program code for activating]
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`- 10-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[secured] itemsis [included in the files] secured.
`
`25.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 24,the instructionsfurthercomprising:
`
`[wherein the client module is configured to look into] instructionstodetermine
`
`security information associated with the at least one [of the secured items] secured item,
`
`[and] wherein the security information includes information regarding the security level
`
`of the at least one [of the] secured [items] iter.
`
`26.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the default icon is associated with an executable program [, when
`
`the each of the secured items or the default icon thereof is clicked, the executable
`
`program will be activated].
`
`27.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`28.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 27, wherein the [program code for superimposing] instructions to superimpose
`
`the [appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code for overlaying] compriseinstructionsto.overlay the visual
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`-ll-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`object onto the default icon suchthat at least_a portion [without obscuring therest] of the
`
`default icon is visible.
`
`29.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`the [appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code
`
`for generating] compriseinstructions.to#enerate a
`
`superimposed icon including the default
`
`icon with the visual object superimposed
`
`thereon suchthatatleast_aportion [without obscuring the rest] of the default icon is
`
`visible.
`
`30.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 29, wherein the default icon is associated with an executable program [, when
`
`the each of the secured items or the superimposed icon thereofis clicked, the obscuring
`
`program will be activated].
`
`31.
`
`(Cancelled)
`
`32.
`
`(Once Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`havinginstructions stored thereon, the instructions comprising:
`
`[program code forretrieving all files in the selected place;]
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`-12-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`{program codefor intercepting] instructionstointercept [the files when metadata
`
`of the files are being loaded into the program] items being retrievedfromastoraye
`
`device;,
`
`[program code for checkingif there is] instructionstodeterminewhetherat least
`
`one ofthe [secured] retrieved items [includedin the files file] is secured;
`
`in_respensefoadeterminationthatat least one of the items is secured,
`
`instructionstodetermineasecurity level of the at least one secured item [program code
`
`for activating a client module to determine how the at least one of the secured itemsis
`
`secured, when it is checked that the at least one of the secured items is included in the
`
`files]; and
`
`[program code for generating] instructionstosenerate a superimposed icon [to
`
`indicate the at least one of the secured items is secured, different from the rest of the files
`
`when displayed in the program] based.atleastinpart,onthedeterminedsecuritylevel
`
`forgraphicallydisplayingtheatleastonesecureditem.
`
`33.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 32, [wherein there is an appropriate icon for the at least one of the secured items
`
`whenthe at least one of the secured items is not secured, and] wherein the [program code
`
`for generating] instructionstogenerate the superimposed icon [[comprises]] comprise:
`
`[program code for choosing an appropriate] instructions to determine a security
`
`icon for the at least one [of the] secured [items] itembased,atleastinpart,on.the
`
`determinedsecuritylevel; and
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of March 29, 2012
`
`~13-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[program code for superimposing] instructionstosuperimpose the [appropriate]
`
`security icon over [the] a default icon,whereinthedefaulticon is configured to represent.
`
`
`
`a.non-secureditemfromwhichtheatleast secureditemwas derived [associatedone
`
`
`
`with, without losing original indications of the default icon].
`
`34,
`
`(Once Amended)
`
`The [method] tangiblecomputer readable medium
`
`as recited in claim 33, wherein the [appropriate] security icon includes a visual object
`
`and a transparent background.
`
`35.
`
`(Once Amended)
`
`The [method] tangiblecomputerreadable medium
`
`as recited in claim 34, wherein the [program code for superimposing] instructions to
`
`superimpose the [appropriate] security icon over the default icon [comprise program
`
`code for overlaying] compriseinstructionstooverlay the visual object onto the default
`
`icon suchthatatleastasortion [without obscuring the rest] of the default icon is visible.
`
`36.......<ew) Amethodon acomputer,comprising:
`
`determiningasecuritylevelofasecureditem:and
`
`forgraphicallydisplayingthesecureditem.superimposingasecurityicon
`
`corressiondingtothesecuritylevel of the secured item over a default icon, wherein the
`
`
`defaulticonrepresents a non-secured itemfrom which thesecureditemwas derived.
`
`37.New}Themethodasrecitedinclaim36,furthercomprising:
`
`reneeet!
`intercettinganitemwhentheitemisretrievedfromastoragedevice: and
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`-14-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`determiningwhethertheintercepteditemis secured.
`
`38...(New)Themethodasrecitedinclaim37,whereinsaiddetermining4
`
`security level comprises activatingaclientmoduleinresronsetoa determination that the
`
`item is secured.
`
`39.{New}Themethodasrecitedinclaim38.whereintheclientmoduleis
`
`configuredtooperateinanoperatingsystemsupportingaprovram,
`
`40.{New} Themethodasrecitedinclaim39.whereinthe operating system
`
`oh
`comprises a graphicwindowsoperatinysystemand the program comprises autility
`
`configuredtodisplaycontentofthestoragedevice.
`
`41.<New}Themethodasrecitedin claim38.furthercomprising:
`
`
`determining security informationassociatedwiththesecureditem. wherein the
`
`securityinformation includes informationregardingthesecurity level of the secured
`
`item.
`
`
`
`42.{New}The methodasrecited inclaim41.whereinthesecuritylevel
`
`
`
`includesatleastonelevelofsecurity.
`
`manetagnee
`en
`
`
`43. ‘New}Themethodasrecitedin claim36,whereinthedefaulticonis
`
`
`associatedwithanexecutable program.
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`-15-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`44._¢Kew}Themethodasrecitedinclaim36,whereinthesecurityicon
`
`includes a visual objectandatransparentbackground.
`
`45.(New)Themethod as recitedinclaim44, wherein saidsuperimposing
`
`comprisesoverlayingthevisualobjectontothedefaulticonsuchthatthedefaulticonis
`
`atleastpartiallyvisible.
`
`
`
`46. _<New)Themethod_asrecitedinclaim44,whereinsaidsuperimposing
`EERE
`
`
`comprises generatingasuperimposediconincluding.thedefaulticonwiththe visual
`
`
`objectsuperimposedthereonsuchthatthedefaulticonisatleastpartiallyvisible.
`
`47._(iew}Themethodasrecitedin claim45,whereinthedefaulticon.is
`
`associatedwithanexecutableprovram.
`
`48.
`
`(Cancelled)
`
`49.{New}Acomputer-implementedmethodcomprising:
`Kae
`
`
`intercepting an itembeingretrievedfromastoraxedevice:
`
`determiningwhethertheitemissecured:
`
`
`
`inresponseto_adeterminationthattheitemis secured,determiningasecurity
`
`levelofthesecured.item;and
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`- 16-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`generatingasuperimposedicon.based,at leastinpart,onthedetermined security:
`
`levelforgraphicallydisplaying the secured item,PaREARNNERSUSANSANE
`
`z‘
`
`nuetac
`yeemereSeay
`Soe
`
`50. (New} Thecomputer-implementedmethodas.recitedinclaim 49.
`
`
`
`penta
`whereinsaidgeneratingasuperimposediconcomprises:
`
`
`determininga security icon for thesecureditembased.atleast.inpart, on the
`
`determinedsecuritylevel:and
`
`superimposingthe securityiconoveradefaulticon,wherein the default icon is
`
`configured torewresentanon-secureditemofa same file tyre as the secureditem.
`
`51.¢New}Thecomputer-implementedmethodasrecitedinclaim50,
`
`whereinthesecurityicon includes a visual object andatransparentbacksround.
`
`52.{New}Thecomputer-implementedmethod as recited in claim 51.
`
`*
`whereinsaidsuperimposingcomprisesoverlayingthevisual objectontothedefaulticon
`
`suchthatthedefaulticonisatleastpartially’ visible.
`
`53,€Sew}Anarticleofmanufactureincluding.acomputer-readablemedium
`
`havininstructions storedthereon,executionofwhichby a computing device causes the
`
`computindevicetoperformoperations comprising:
`
`interceptinganitembeingretrieved from a storage device:
`
`determiningwhether the item is secured:
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`-17-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`inresponsetoadetermination that theitemis secured,determininga security
`
`levelofthesecured item; and
`
`
`generating a superimeosediconbased,atleast.in yart,onthedetermined security
`
`leveltogratshicallydisplaythesecured item.
`
`54,{New}Thearticleofmanufactureasrecitedinclaim53.whereinsaid
`
`
`
`generatingasuperimposedicon comprises:
`
`
`
`
`
`determiningasecurityiconforthesecured itembased,atleastinpart,on the
`
`determinedsecuritylevel:and
`
`superimposinsthesecurity icon over a default icon. whereinthedefaulticonis
`
`
`
`configuredtoresresent.anon-secured itemfromwhichthesecureditemwasderived.
`
`
`
`
`
`55.(New)Thearticleofmanufactureasrecitedinclaimthe54,wherein.
`
`Raye
`security icon includesavisualobjectandatransparent backround.
`
`Miphatee
`56
`(ew)Thearticleofmanufacture as recited in claim 55, wherein said
`
`
`superimposingcomprises overlaying the visual objectontothedefaulticonsuchthatthe
`
`default icon is at leastpartiallyvisible.
`
`57...(New)Atangiblecomputerreadablemedium havinginstructions stored
`
`thereon,theinstructionscomprising:
`
`Rtas
`instructions to determine a security levelofasecureditem:and
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of March 29, 2012
`
`- 18-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`forgraphically displayingthesecureditem,instructions to superimmoseasecurity
`
`
`
`icon correspondingtothesecuritylevelofthesecureditemoveradefaulticon,wherein
`
`thedefault iconrepresentsanon-secured item of a samefiletypeasthesecureditem.
`
`58.(New}Thetangiblecomguterreadablemediumasrecited
`
`inclaim57,the
`
`instructionfurther comprising:
`
`instructionstointerceptanitemwhentheitem is retrievedfromastoragedevice:
`
`and
`
`instructionsto,determinewhethertheintercepteditemissecured.
`
`
`
`59.___iNew}The tangiblecomputerreadablemediumasrecited inclaim58.
`
`
`
`
`
`
`
`whereintheinstructionstodeterminethesecuritylevelcompriseinstructionstoactivate
`
`
`
`
`
`aclientmoduleinresponsetoadeterminationthattheitemis secured.
`
`60...New}Thetanziblecomputerreadablemediumasrecitedinclaim59..the
`
`
`
`instructionstodeterminesecurityinformationassociatedwiththesecureditem.
`
`
`
`whereinthesecurityinformationincludesinformation regardingthesecurity levelofthe
`
`
`
`secured item.
`
`es
`
`
`
`
`61.¢New)Thetangiblecomputerreadablemedium_as recitedinclaim 57,
`
`SN
`
`
`whereinthedefaulticon is associatedwithanexecutableprogram.
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`Reply to Office Action of March 29, 2012
`
`-19-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`62...New?Thetangiblecomputerreadablemedium_as recited in claim57,
`
`
`whereinthesecurityiconincludesavisualobjectand a transparent background.
`
`63...(sew)Thetangiblecomputer readable mediumasrecitedinclaim.62.
`
`whereintheinstructionstosuperimposethesecurityiconcorrespondinytothesecurity
`
`leveloverthedefaulticoncompriseinstructionstooverlaythevisualobjectontothe
`
`defaulticonsuchthatthedefaulticonisatleastpartiallyvisible.
`
`
`
`66.
`
`(Cancelled)
`
`FeRaraRaaneaASLOD
`
`INLSaRai
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Reply to Office Action of March 29, 2012
`
`- 20 -
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`inresponsetoadetermination that theitemissecured,instructionstodeterminea
`
`securitylevelofthesecured item: and
`
`
`
`instructionsto generateasuperimposediconbased, at
`
`least
`
`in part.onthe
`
`determined securitylevelforgraphicallydisplayingthe secured item.
`
`68.{New}.Thetangible computer readablemediumasrecitedinclaim67,
`
`whereintheinstructions to zeneratethesuperimposediconcomprise:
`
`instructionstodetermineasecurityiconforthesecured item based, at least in
`
`part,onthedeterminedsecuritylevel:and
`
`instructionstosuperimposethesecurity icon over a default icon, wherein the
`
`
`
`
`
`defaulticonisconfisuredtorepresentanon-secureditemfromwhichthesecureditem
`
`was derived.
`
`69.(New)Thetangiblecomputerreadablemediumasrecitedinclaim68.
`
`
`
`
`
`whereinthesecurityiconincludesavisualobjectandatransparentbackground.
`
`70,{New}The tangible computer readable medium as recited in claim 69,
`
`wherein the instructions to suyserimposethesecurity.iconoverthedefaulticoncomprise
`
`instructionstooverlaythevisualobjectontothedefaulticonsuchthatthedefaulticonis
`
`atleastpartiallyvisible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

Connectivity issues with tsdrapi.uspto.gov. Try again now (HTTP Error 429: ).

Refresh this Document
Go to the Docket