`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Amendments to the Claims
`
`This listing of claims will replace all prior versions, and listings, of claims in the
`
`application. The claim identifiers, or lack thereof, below conform to the rules for reissue
`
`amendments set
`
`forth in 37 C.F.R. §§ 1.173(b)(2),
`
`(c),
`
`(d), and (e).
`
`(See also,
`
`MPEP. 8§ 1454 GD, GV), and CV).
`
`1.
`
`(Thrice Amended)
`
`A method for graphically [indicating] representing
`
`secured items on a computer [in a program for displaying contents in a selected place],
`
`[the method] comprising:
`
`determining a security level of each of the secured items, wherein the determined
`
`
`security level correspondsto a securitylevelfromasetofapluralityofsecuritylevels [,
`
`wherein each of the secured items has a default icon associated with if the each of the
`
`secured items is otherwise not secured]; and
`
`for graphically displaying the secured items, superimposing [an appropriate] for
`
`
`ASARRPANPRRRRRSLA
`
`[the] a default icon [without losing original indications of the default icon], wherein the
`
`
`
`defaulticonrepresentsacorrespondingnon-secureditemofasamefiletyreasthe
`
`respectivesecureditem.
`
`2.
`
`(Once Amended)
`
`The method as
`
`recited in claim 1,
`
`further
`
`comprising:
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`-3-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`intercepting [files from the selected place when the files are selected by the
`
`
`program for displaying the contents in the selected place] items whentheitemsare
`
`retrievedfromastoragedevice; and
`
`[checking if] determining whether any of the [secured] intercepted items are
`
`
`[includedin the files] secured.
`
`3.
`
`(Once Amended)
`
`The method as recited in claim 2, wherein said
`
`determining a security level [of each of the secured items] comprisesactivating a client
`
`module [when said checking indicates that there are] inresponse to a determinationthat
`
`at [lease] least one of the [secured] itemsis [includedin the files] secured.
`
`4.
`
`(Once Amended)
`
`The methodasrecited in claim 3, wherein the client
`
`ONLnatantnetwonene
`
`program.
`
`5.
`
`(Once Amended)
`
`The method as recited in claim 4, wherein [the
`
`selected place is a folder and] the operating system [is] comprises a graphic windows
`
`operating system and the program [is] comprises a utility [for a user] configured to
`
`display [the] contents[in] of the [folder] storage device.
`
`6.
`
`(Once Amended)
`
`The method as
`
`recited in claim 3,
`
`further
`
`comprising:
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`4.
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[wherein the client module is configured to look into] determining security
`
`information associated with the at least one [of the secured items] secured item, [and]
`
`wherein the security information includes information regarding the security level of the
`
`at least one [of the secured items] secured item.
`
`7.
`
`8.
`
`(Cancelled)
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the default icon thereofis clicked, the executable program will be activated].
`
`9.
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`[appropriate] security icon includes a visual object and a transparent background.
`
`10.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises overlaying the visual object onto the default icon such that at least a
`
`portion [without obscuring the rest] of the default icon is visible.
`
`11.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises generating a superimposed icon including the default icon with the
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`-5-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`visual object superimposed thereon suchthatatleast a portion of [without obscuring the
`
`rest of] the default icon is visible.
`
`12.
`
`(Once Amended)
`
`The method as recited in claim 10, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the superimposed icon thereof is clicked,
`
`the obscuring program will be
`
`activated].
`
`13.
`
`(Cancelled)
`
`14.
`
`(Thrice Amended)
`
`A computer-implemented method [for graphically
`
`indicating secured items in a program for displaying contents in a selected place, the
`
`method] comprising:
`
`[retrieving all files in the selected place;]
`
`intercepting [the files when metadata of the files are being loaded into the
`
`program] itemsbeingretrievedfromastorazedevice;
`
`[checking if there is] determining whetherat least one of the [secured] retrieved
`
`items [includedin thefiles] is secured;
`
`in_responsetoadeterminationthatatleast.oneoftheitemsissecured,
`
`determiningasecurityleveloftheleastonesecureditem,wherein
`
`thedetermined
`
`security level correspondstoasecuritylevelfromasetof a plurality of securitylevels
`
`[activating a client module to determine how the at least one of the secured items is
`
`Atty. Dkt. No. 2222,540REIO
`
`
`
`-6-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`secured, whenit is checked that the at least one of the secured items is included in the
`
`files]; and
`
`generating a superimposed icon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based, at
`
`leastinpart,onthedeterminedsecurityjevelforgraphicallydisplavingthealJeastone
`
`secured item.
`
`15.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 14, wherein [there is an appropriate icon for the at least one of the secured items
`
`when the at least one of the secured items is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determining a security icon for the at least one [of the
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`the default icon is confizuredtorepresentanon-secureditemfromwhich the at least one
`
`secured item was derived [associated with, without losing original indications of the
`
`default icon].
`
`16.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 15, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-7-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`17.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 16, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`comprises overlaying the visual object onto the default icon such that at least a portion
`
`[without obscuring the rest] of the default icon is visible.
`
`18.
`
`(Twice Amended)
`
`[A computer for graphically indicating secured
`
`items in a program for displaying contents in a selected place, the computer] An article
`
`
`
`ofmanufactureincludingacomputer-readablemediuminstructionsstoredhaving
`
`
`
`fananaaaannahannamats
`
`ES
`
`nentalphaen
`
`perform operations comprising:
`
`[at least a processor;]
`
`[a first memory space for storing a client module;]
`
`[a second memory space, coupled to the processor, for storing code as a graphic
`
`operating system,
`
`the code, when executed by the processor, causing the graphic
`
`operating system to support the program for displaying the contents in the selected place
`
`and perform operationsof:]
`
`[retrievingall files in the selected place;]
`
`
`interceptingitemsbeingretrievedfromastoragedevice:
`
`[checking if there is] determining whether at least one of the [secured] retrieved
`
`items [included in thefiles} is secured;
`
`
`
`
`
`in_ressonsetoa.determinationthatatleastoneoftheitemsis secured,
`
`determining a security level of theatleastonesecureditem,wherein the determined
`
`security level corresponds to.asecuritylevelfromasetofaplurality of security levels
`
`Atty. Dkt. No. 2222. 540REIO
`
`
`
`-8-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[activating the client module to determine how the at least one of the secured items is
`
`secured, when it is checked that the at least one of the secured items is included in the
`
`files]; and
`
`generating a superimposed icon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based,at
`
`secured item.
`
`19,
`
`(Once Amended)
`
`The [computer] article of manufacture as recited in
`
`claim 18, wherein [there is an appropriate icon for the at least one of the secured items
`
`whenthe at least one of the secured items is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determiningasecurity icon for the at least one [of the
`
` secured items] secureditembased,atleast.inpart, on the determined securitylevel; and
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`
`
`
`
`thedefaulticonisconfiguredtorepresentanon-securedfromwhichtheatleastoneitem
`
`default icon].
`
`20.
`
`(Once Amended)
`
`The [method] articleofmanufacture as recited in
`
`claim 19, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-9-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`21.
`
`(Once Amended)
`
`The [method] article of manufacture as recited in
`
`claim 20, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`comprises overlaying the visnal object onto the default icon suchthatatleastaportion
`
`[without obscuring the rest] of the default icon is visible.
`
`22.
`
`(Twice Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`
`havinginstructionsstoredthereon,theinstructions comprising:
`
`[program code for determining] instructions to determine a security level of each
`
`of [the] secured items, wherein the determined security level corresponds to a security
`
`levelfromasetofapluralityofsecuritylevels [, wherein each of the secured itemshasa
`
`default icon associated with if the each of the secured items is otherwise not secured];
`
`and
`
`[program code for superimposing] for graphicallydisplayingthesecureditems,
`
`instructions to superimpose [an appropriate] for each secured item a security icon
`
`corresponding to the security level of that item over [the] a default icon [without losing
`
`original
`
`indications of the default
`
`icon}, wherein,thedefaulticonrepresentsa
`
`correspondingnon-secured item from which the resrective secured itemwasderived.
`
`23.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 22,
`
`the instructions further comprising:
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`[program code for intercepting] instructionstointercept [files from the selected
`
`-10-
`
`place when the files are selected by the program for displaying the contents in the
`
`selected place] items when the items are retrieved from a storage device; and
`
`[program code for checking if] instructions to determine whether any of the
`
`[secured] intercepted items are [included in the files] secured.
`
`24.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 23, wherein the [program code for determining] the instruction to determine the
`
`security level [of the each of the secured items comprises program codefor activating]
`
`comprise instructions to activate a client module [when the program code for checking
`
`indicates that there are] in resyonse to a determination that at [lease} least one of the
`
`[secured] itemsis [includedin thefiles] secured.
`
`25.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 24,the instructions further comprising:
`
`security information associated with the at least one [of the secured items] secured item,
`
`[and] wherein the security information includes information regarding the security level
`
`of the at least one [of the] secured [items] item.
`
`26.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the default icon is associated with an executable program [, when
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-11-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`the each of the secured items or the default icon thereof is clicked, the executable
`
`program will be activated].
`
`27.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`28.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 27, wherein the [program code for superimposing] instructions to superimpose
`
`the [appropriate{ security
`
`
`
`icon corresponding to the security level over the default icon
`
`
`[comprises program code for overlaying] compriseinstructions to overlay the visual
`
`default icon is visible.
`
`29.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 27, wherein the [program code for superimposing] instructions to superimpose
`
`the [appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code
`
`for generating]
`
`comprise.instructionstogenerate a
`
`superimposed icon including the default
`
`icon with the visual object superimposed
`
`thereon such that at least a portion [without obscuring the rest] of the default icon is
`
`visible.
`
`Atty. Dkt. No. 2222. 540REIO
`
`
`
`-12-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`30.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 29, wherein the default icon is associated with an executable program [, when
`
`the each of the secured items or the superimposed icon thereofis clicked, the obscuring
`
`program will be activated].
`
`31.
`
`(Cancelled)
`
`32.
`
`(Twice Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`havinginstructionsstoredthereon,theinstructions comprising:
`
`[program codeforretrieving all files in the selected place;]
`
`[program code for intercepting] instructions to intercest [the files when metadata
`
`of the files are being loaded into the program] items being retrieved from_a storage
`
`device;
`
`[program code for checking if there is] instructionstodeterminewhetherat least
`
`one of the [secured] retrieved items [included inthefiles file] is secured;
`
`inresponsetoadeterminationthatatleastoneofthe itemsissecured,
`
`instructions to determineasecurityleveloftheatleastonesecureditem, wherein the
`
`determined security level corresponds to a securitylevelfromasetofapluralityof
`
`security levels [program code for activating a client module to determine how theat least
`
`one of the secured items is secured, whenit is checked that the at least one of the secured
`
`items is includedin thefiles]; and
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`-13-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[program code for generating] instructions to generate a superimposed icon [to
`
`indicate the at least one of the secured itemsis secured, different from the rest ofthe files
`
`when displayed in the program] based,atleastinpart.onthedeterminedsecurity:level
`
`for graphically displaying
`
`
`
`
`the atleastonesecureditem.
`
`
`33.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 32, [wherein there is an appropriate icon for the at least one of the secured items
`
`when theat least one of the secured items is not secured, and] wherein the [program code
`
`
`for generating] instructions to generate the superimposed icon [[comprises]] comprise:
`
`[program code for choosing an appropriate] instructions to determine a security
`
`icon for the at least one [of the] secured [items] itembased.atleastinwart,onthe
`
`determinedsecuritylevel; and
`
`[program code for superimposing] instructionstosusserimposethe [appropriate]
`
`security icon over[the] a default icon, wherein the default icon is configuredtorepresent
`
`a non-secured item from which the at least one secured item was derived [associated
`
`with, without losing original indications of the default icon].
`
`34.
`
`(Once Amended)
`
`The [method] tangible computerreadablemedium
`
`as recited in claim 33, wherein the [appropriate] security icon includes a visual object
`
`and a transparent background.
`
`35.
`
`(Once Amended)
`
`The [method] tangiblecomputerreadablemedium
`
`as recited in claim 34, wherein the [program code for superimposing] instructions to
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-14-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`superimpose the [appropriate] security icon over the default icon [comprise program
`
`code for overlaying] compriseinstructionstooverlaythe visual object onto the default
`
`icon such that at least a yortion [without obscuring the rest] of the default icon is visible.
`
`36.Cvew}Amethodonacomputer,comprising:
`
`determining a security level of a secured item; and
`
`forgraphicallydisplayingthesecureditem,superimposinga_securityicon
`
`correspondinstothesecuritylevelofthesecureditemoveradefaulticon,whereinthe
`
`determined security, level corresponds toa security level from a set of a plurality of
`
`
`
`securitylevels,andwhereinthedefaulticonrepresentsanon-secureditem,fromwhich
`
`thesecureditemwasderived.
`
`37...{New}Themethod as recited in claim 36, further comprising:
`
`
`intercesting an item when the item is retrieved from.a storaze device; and
`
`determininzwhethertheintercepteditemissecured.
`
`38...(New)The method as recited in claim 37. wherein said determining a
`
`security level comprises activatingaclient module in responsetoadeterminationthatthe
`
`item is secured.
`
`
`
`39,(New)Themethodasrecited inclaim38.whereintheclientmoduleis
`
`
`
`
`
`configuredtooperate in an operating system supporting
`
`
`
` program,
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-15-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`AMSCORE.RETED,SECORSOOShatinnenSREeseae DAanN
`
`wenatteeeEESRIeRUtneetecniLamrenelnSEAR
`
`
`determining security information associatedwiththesecureditem,whereinthe
`
`security.informationincludesinformationregarding the security level of the secured
`
`item.
`
`42.
`
`(Cancelled)
`
`wees!
`os
`atetndanano aa ana tae
`diesel
`
`43...{ew} The methodasrecitedinclaim36,whereinthedefaulticonis
`
`associated with an executable program.
`
`
`
`44,{Sew}Themethodasrecited in claim36.whereinthesecurityicon
`
`
`
`includesavisualobjectandatransparentbackground.
`
`45.{New}The method as recited in claim44.whereinsaid superlmposing
`
`comprisesoverlayingthevisualobjectonto the defaulticonsuchthatthedefault iconis
`
`atleastpartiallyvisible.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 16-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`46.{New}Themethodasrecitedinclaim44.whereinsaidsuperimposing
`
`comprisesgeneratingasuperimposediconincludingthedefaulticonwiththevisual
`
`objectsuperimposedthereonsuchthatthedefaulticonisatleastsartiallyvisible.
`
`
`
`47,New}Themethodasrecitedinclaim45.whereinthedefaulticon is
`
`
`
`associated with an executable program.
`
`48.
`
`(Cancelled)
`
`49.
`
`(New) A comsuter-implementedmethodcomnrising:
`
`interceptinganitembeiny retrievedfroma storagedevice:
`
`determiningwhethertheitemissecured:
`
`levelfromasetofaplurality
`
`of security levels: and
`
`
`generatinyasuperimposediconbased, atleast in yart.onthedetermined security
`
`levelforgraxhically displayingthesecureditem,
`
`ieeeeetrntennercea
`
`50...{New}The computer-implementedmethodasrecitedinclaim49,
`
`whereinsaidgeneratingasuperimposed
`
`iconcomprises:
`
`determining a securityiconforthesecured item based,atleastinpart, on the
`
`determinedsecuritylevel:and
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-17-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`superimposingthe securityicon over a default icon. wherein the default icon is
`
`configuredtorepresentanon-secureditemof asamefiletype as the secured item.
`
`51.
`
`(New; The computer-implemented method asrecitedinclaim50,
`
`whereinthesecurityiconincludesavisualobjectandatransparent backround.
`
`
`
`whereinsaidsuperimposing comprises overlaying the visual object ontothedefaulticon
`
`suchthatthedefaulticonisatleastpartiallyvisible.
`
`
`
`53, {ew}Anarticleofmanufactureincludingacomputer-readablemedium
`
`having instructions stored thereon, execution ofwhichbyacomputingdevicecauses the
`
`interceptinganitembeingretrievedfromastorasedevice:
`
`determining whether the item is secured:
`
`inresponse to a determination that the itemissecured,determining a security
`
`levelofthesecureditem,whereinthe determined security levelcorrespondstoasecurity
`
`
`
`levelfromasetofapluralityofsecuritylevels;and
`
`generating a superimposed icon based,atleastinwart,onthe determined security
`
`leveltographicallydisplaythesecureditem.
`
`24...(sew)Thearticleofmanufactureasrecited
`
`inclaim53.whereinsaid
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`-18-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`determiningasecurityiconforthesecureditembased.atleastinpart.on,the
`
`determinedsecuritylevel:and
`
`surerimposing the security icon over a default icon, wherein the default icon is
`
`configuredtorewresentanon-secureditemfromwhichthesecureditemwasderived.
`
`
`
`55. iNew} The article of manufacture as recited in claim 54, wherein the
`
`securityiconincludesavisualobjectandatransyarentbackground.
`
`36........{New}Thearticleofmanufactureasrecitedinclaim55,whereinsaid
`
`superimposingcomprises overlaying the visual obiect onto the default iconsuchthatthe
`
`
`
`
`defaulticonisatleastpartiallyvisible.
`
` iNew} Atangiblecomputerreadablemediumhavinginstructionsstored
`
`thereon, the instructions comprising:
`
`
`
`determinedsecuritylevelcorrespondstoasecuritylevelfrom a set of a plurality of
`
`security levels; and
`
`forgraphically dislaying the secured item, instructionstosuperimposeasecurity
`
`
`iconcorrespondingtothesecuritylevelofthesecureditemoveradefaulticon,wherein
`
`58.
`
`(ew) The tangible computer readablemediumasrecitedinclaim57,the
`
`instructionfurthercomprising:
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`instructionstointerceptanitemwhentheitemisretrievedfromastoraxedevice:
`
`- 19-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`and
`
`instructionstodeterminewhether the intercepted itemissecured.
`
`59.____{New}Thetangiblecomputerreadablemediumasrecited in claim58.
`
`
`
`whereintheinstructionstodeterminesecuritylevelcompriseinstructionstoactivatethe
`
`
`
`
`
`aclientmoduleinresnonsetoadeterminationthattheitemissecured.
`
`60.{New}Thetangiblecomputerreadablemediumasrecitedinclaim59,the
`
`instructionsfurthercomprising:
`
`ilaratin
`instructionstodetermine security informationassociatedwiththesecured item,
`
`
`
`
`
`whereinthesecurityinformationincludesinformationregardingthesecuritylevelofthe
`
`secured item.
`
`
`
`63.
`
`(New? Thetangiblecomputerreadable medium as recited in claim 62.
`
`whereintheinstructionstosuperimsose the security icon correspondingtothesecurity
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`- 20 -
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`
`levelover,thedefaulticon compriseinstructionstooverlay the visual object onto the
`
`
`
`
`
`defaulticonsuchthatthedefaulticonisatleastpartially visible.
`
`64.€New} The tangible computerreadablemediumasrecitedinclaim62,
`
`whereintheinstructionstosuperimposethesecurity iconcorrespondingtothesecurity
`
`level_overthedefaulticoncompriseinstructionstogenerateasuperimposed.icon
`
`includingthedefaulticon with the visual objectsuperimposedthereonsuchthatthe
`
`defaulticonis at least yartiallyvisible.
`
`65.{New}Thetansible computer readablemediumasrecitedinclaim64,
`
`whereinthedefaulticonisassociatedwithanexecutableprogram.
`
`66.
`
`(Cancelled)
`
`67.
`
`(New) A tangible computerreadablemediumhavinginstructions stored
`
`thereon,theinstructions comgising:
`
`instructions to intercestanitembeingretrieved froma storaxe device:
`
`instructionstodeterminewhether the item is secured:
`
`inresponsetoadetermination thattheitemissecured,instructionstodetermine a
`
`securitylevelofthesecureditem, whereinthedeterminedsecurity level correspondsto a
`
`instructionstogenerateasuperimposed icon based. at
`
`least inpart,onthe
`
`determinedsecuritylevelforgraphically displayiniz thesecureditem.
`
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-21-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`68.{New}Thetangiblecomputerreadable medium_asrecitedin claim 67.
`
`
`
`
`
`
`
`whereintheinstructionstoxenerate the superimposediconcomprise:
`
`instructionstodetermineasecurityiconforthesecureditembased,atleastin
`
`partonthedeterminedsecuritylevel.and
`
`instructionstosuperimposethesecurityiconoveradefaulticon,whereinthe
`
`defaulticonisconfigured to represent a non-secured item from which the secured item
`
`was derived.
`
`ennELRraaaniaartneteeeeeenenSeaheaeNENEeRERREEEEENR
`69.
`iNew} The tangible computer readable medium as recited in claim 68.
`
`whereinthesecurityiconincludes a visual object and a transparent background.
`
`70.(New}Thetangiblecomputerreadablemediumasrecitedinclaim69,
`
`instructionstooverlaythevisualobjectontothedefaulticonsuchthatthedefaulticonis
`
`at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`