-2-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Amendments to the Claims
`
`This listing of claims will replace all prior versions, and listings, of claims in the
`
`application. The claim identifiers, or lack thereof, below conform to the rules for reissue
`
`amendments set
`
`forth in 37 C.F.R. §§ 1.173(b)(2),
`
`(c),
`
`(d), and (e).
`
`(See also,
`
`MPEP. 8§ 1454 GD, GV), and CV).
`
`1.
`
`(Thrice Amended)
`
`A method for graphically [indicating] representing
`
`secured items on a computer [in a program for displaying contents in a selected place],
`
`[the method] comprising:
`
`determining a security level of each of the secured items, wherein the determined
`
`
`security level correspondsto a securitylevelfromasetofapluralityofsecuritylevels [,
`
`wherein each of the secured items has a default icon associated with if the each of the
`
`secured items is otherwise not secured]; and
`
`for graphically displaying the secured items, superimposing [an appropriate] for
`
`
`ASARRPANPRRRRRSLA
`
`[the] a default icon [without losing original indications of the default icon], wherein the
`
`
`
`defaulticonrepresentsacorrespondingnon-secureditemofasamefiletyreasthe
`
`respectivesecureditem.
`
`2.
`
`(Once Amended)
`
`The method as
`
`recited in claim 1,
`
`further
`
`comprising:
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`-3-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`intercepting [files from the selected place when the files are selected by the
`
`
`program for displaying the contents in the selected place] items whentheitemsare
`
`retrievedfromastoragedevice; and
`
`[checking if] determining whether any of the [secured] intercepted items are
`
`
`[includedin the files] secured.
`
`3.
`
`(Once Amended)
`
`The method as recited in claim 2, wherein said
`
`determining a security level [of each of the secured items] comprisesactivating a client
`
`module [when said checking indicates that there are] inresponse to a determinationthat
`
`at [lease] least one of the [secured] itemsis [includedin the files] secured.
`
`4.
`
`(Once Amended)
`
`The methodasrecited in claim 3, wherein the client
`
`ONLnatantnetwonene
`
`program.
`
`5.
`
`(Once Amended)
`
`The method as recited in claim 4, wherein [the
`
`selected place is a folder and] the operating system [is] comprises a graphic windows
`
`operating system and the program [is] comprises a utility [for a user] configured to
`
`display [the] contents[in] of the [folder] storage device.
`
`6.
`
`(Once Amended)
`
`The method as
`
`recited in claim 3,
`
`further
`
`comprising:
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`4.
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[wherein the client module is configured to look into] determining security
`
`information associated with the at least one [of the secured items] secured item, [and]
`
`wherein the security information includes information regarding the security level of the
`
`at least one [of the secured items] secured item.
`
`7.
`
`8.
`
`(Cancelled)
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the default icon thereofis clicked, the executable program will be activated].
`
`9.
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`[appropriate] security icon includes a visual object and a transparent background.
`
`10.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises overlaying the visual object onto the default icon such that at least a
`
`portion [without obscuring the rest] of the default icon is visible.
`
`11.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises generating a superimposed icon including the default icon with the
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`-5-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`visual object superimposed thereon suchthatatleast a portion of [without obscuring the
`
`rest of] the default icon is visible.
`
`12.
`
`(Once Amended)
`
`The method as recited in claim 10, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the superimposed icon thereof is clicked,
`
`the obscuring program will be
`
`activated].
`
`13.
`
`(Cancelled)
`
`14.
`
`(Thrice Amended)
`
`A computer-implemented method [for graphically
`
`indicating secured items in a program for displaying contents in a selected place, the
`
`method] comprising:
`
`[retrieving all files in the selected place;]
`
`intercepting [the files when metadata of the files are being loaded into the
`
`program] itemsbeingretrievedfromastorazedevice;
`
`[checking if there is] determining whetherat least one of the [secured] retrieved
`
`items [includedin thefiles] is secured;
`
`in_responsetoadeterminationthatatleast.oneoftheitemsissecured,
`
`determiningasecurityleveloftheleastonesecureditem,wherein
`
`thedetermined
`
`security level correspondstoasecuritylevelfromasetof a plurality of securitylevels
`
`[activating a client module to determine how the at least one of the secured items is
`
`Atty. Dkt. No. 2222,540REIO
`
`

`

`-6-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`secured, whenit is checked that the at least one of the secured items is included in the
`
`files]; and
`
`generating a superimposed icon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based, at
`
`leastinpart,onthedeterminedsecurityjevelforgraphicallydisplavingthealJeastone
`
`secured item.
`
`15.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 14, wherein [there is an appropriate icon for the at least one of the secured items
`
`when the at least one of the secured items is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determining a security icon for the at least one [of the
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`the default icon is confizuredtorepresentanon-secureditemfromwhich the at least one
`
`secured item was derived [associated with, without losing original indications of the
`
`default icon].
`
`16.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 15, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`-7-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`17.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 16, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`comprises overlaying the visual object onto the default icon such that at least a portion
`
`[without obscuring the rest] of the default icon is visible.
`
`18.
`
`(Twice Amended)
`
`[A computer for graphically indicating secured
`
`items in a program for displaying contents in a selected place, the computer] An article
`
`
`
`ofmanufactureincludingacomputer-readablemediuminstructionsstoredhaving
`
`
`
`fananaaaannahannamats
`
`ES
`
`nentalphaen
`
`perform operations comprising:
`
`[at least a processor;]
`
`[a first memory space for storing a client module;]
`
`[a second memory space, coupled to the processor, for storing code as a graphic
`
`operating system,
`
`the code, when executed by the processor, causing the graphic
`
`operating system to support the program for displaying the contents in the selected place
`
`and perform operationsof:]
`
`[retrievingall files in the selected place;]
`
`
`interceptingitemsbeingretrievedfromastoragedevice:
`
`[checking if there is] determining whether at least one of the [secured] retrieved
`
`items [included in thefiles} is secured;
`
`
`
`
`
`in_ressonsetoa.determinationthatatleastoneoftheitemsis secured,
`
`determining a security level of theatleastonesecureditem,wherein the determined
`
`security level corresponds to.asecuritylevelfromasetofaplurality of security levels
`
`Atty. Dkt. No. 2222. 540REIO
`
`

`

`-8-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[activating the client module to determine how the at least one of the secured items is
`
`secured, when it is checked that the at least one of the secured items is included in the
`
`files]; and
`
`generating a superimposed icon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based,at
`
`secured item.
`
`19,
`
`(Once Amended)
`
`The [computer] article of manufacture as recited in
`
`claim 18, wherein [there is an appropriate icon for the at least one of the secured items
`
`whenthe at least one of the secured items is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determiningasecurity icon for the at least one [of the
`
` secured items] secureditembased,atleast.inpart, on the determined securitylevel; and
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`
`
`
`
`thedefaulticonisconfiguredtorepresentanon-securedfromwhichtheatleastoneitem
`
`default icon].
`
`20.
`
`(Once Amended)
`
`The [method] articleofmanufacture as recited in
`
`claim 19, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`-9-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`21.
`
`(Once Amended)
`
`The [method] article of manufacture as recited in
`
`claim 20, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`comprises overlaying the visnal object onto the default icon suchthatatleastaportion
`
`[without obscuring the rest] of the default icon is visible.
`
`22.
`
`(Twice Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`
`havinginstructionsstoredthereon,theinstructions comprising:
`
`[program code for determining] instructions to determine a security level of each
`
`of [the] secured items, wherein the determined security level corresponds to a security
`
`levelfromasetofapluralityofsecuritylevels [, wherein each of the secured itemshasa
`
`default icon associated with if the each of the secured items is otherwise not secured];
`
`and
`
`[program code for superimposing] for graphicallydisplayingthesecureditems,
`
`instructions to superimpose [an appropriate] for each secured item a security icon
`
`corresponding to the security level of that item over [the] a default icon [without losing
`
`original
`
`indications of the default
`
`icon}, wherein,thedefaulticonrepresentsa
`
`correspondingnon-secured item from which the resrective secured itemwasderived.
`
`23.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 22,
`
`the instructions further comprising:
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`Nalini J. PRAKASH
`Appl. No. 11/889,685
`[program code for intercepting] instructionstointercept [files from the selected
`
`-10-
`
`place when the files are selected by the program for displaying the contents in the
`
`selected place] items when the items are retrieved from a storage device; and
`
`[program code for checking if] instructions to determine whether any of the
`
`[secured] intercepted items are [included in the files] secured.
`
`24.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 23, wherein the [program code for determining] the instruction to determine the
`
`security level [of the each of the secured items comprises program codefor activating]
`
`comprise instructions to activate a client module [when the program code for checking
`
`indicates that there are] in resyonse to a determination that at [lease} least one of the
`
`[secured] itemsis [includedin thefiles] secured.
`
`25.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 24,the instructions further comprising:
`
`security information associated with the at least one [of the secured items] secured item,
`
`[and] wherein the security information includes information regarding the security level
`
`of the at least one [of the] secured [items] item.
`
`26.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the default icon is associated with an executable program [, when
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`-11-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`the each of the secured items or the default icon thereof is clicked, the executable
`
`program will be activated].
`
`27.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 22, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`28.
`
`(Once Amended)
`
`The tangible computer readable medium as recited
`
`in claim 27, wherein the [program code for superimposing] instructions to superimpose
`
`the [appropriate{ security
`
`
`
`icon corresponding to the security level over the default icon
`
`
`[comprises program code for overlaying] compriseinstructions to overlay the visual
`
`default icon is visible.
`
`29.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 27, wherein the [program code for superimposing] instructions to superimpose
`
`the [appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code
`
`for generating]
`
`comprise.instructionstogenerate a
`
`superimposed icon including the default
`
`icon with the visual object superimposed
`
`thereon such that at least a portion [without obscuring the rest] of the default icon is
`
`visible.
`
`Atty. Dkt. No. 2222. 540REIO
`
`

`

`-12-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`30.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 29, wherein the default icon is associated with an executable program [, when
`
`the each of the secured items or the superimposed icon thereofis clicked, the obscuring
`
`program will be activated].
`
`31.
`
`(Cancelled)
`
`32.
`
`(Twice Amended)
`
`A tangible computer readable medium [containing
`
`program code executable by a computing device for graphically indicating secured items
`
`in a program for displaying contents in a selected place, the computer readable medium]
`
`havinginstructionsstoredthereon,theinstructions comprising:
`
`[program codeforretrieving all files in the selected place;]
`
`[program code for intercepting] instructions to intercest [the files when metadata
`
`of the files are being loaded into the program] items being retrieved from_a storage
`
`device;
`
`[program code for checking if there is] instructionstodeterminewhetherat least
`
`one of the [secured] retrieved items [included inthefiles file] is secured;
`
`inresponsetoadeterminationthatatleastoneofthe itemsissecured,
`
`instructions to determineasecurityleveloftheatleastonesecureditem, wherein the
`
`determined security level corresponds to a securitylevelfromasetofapluralityof
`
`security levels [program code for activating a client module to determine how theat least
`
`one of the secured items is secured, whenit is checked that the at least one of the secured
`
`items is includedin thefiles]; and
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`-13-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`[program code for generating] instructions to generate a superimposed icon [to
`
`indicate the at least one of the secured itemsis secured, different from the rest ofthe files
`
`when displayed in the program] based,atleastinpart.onthedeterminedsecurity:level
`
`for graphically displaying
`
`
`
`
`the atleastonesecureditem.
`
`
`33.
`
`(Once Amended)
`
`The tangible computer readable medium asrecited
`
`in claim 32, [wherein there is an appropriate icon for the at least one of the secured items
`
`when theat least one of the secured items is not secured, and] wherein the [program code
`
`
`for generating] instructions to generate the superimposed icon [[comprises]] comprise:
`
`[program code for choosing an appropriate] instructions to determine a security
`
`icon for the at least one [of the] secured [items] itembased.atleastinwart,onthe
`
`determinedsecuritylevel; and
`
`[program code for superimposing] instructionstosusserimposethe [appropriate]
`
`security icon over[the] a default icon, wherein the default icon is configuredtorepresent
`
`a non-secured item from which the at least one secured item was derived [associated
`
`with, without losing original indications of the default icon].
`
`34.
`
`(Once Amended)
`
`The [method] tangible computerreadablemedium
`
`as recited in claim 33, wherein the [appropriate] security icon includes a visual object
`
`and a transparent background.
`
`35.
`
`(Once Amended)
`
`The [method] tangiblecomputerreadablemedium
`
`as recited in claim 34, wherein the [program code for superimposing] instructions to
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`-14-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`superimpose the [appropriate] security icon over the default icon [comprise program
`
`code for overlaying] compriseinstructionstooverlaythe visual object onto the default
`
`icon such that at least a yortion [without obscuring the rest] of the default icon is visible.
`
`36.Cvew}Amethodonacomputer,comprising:
`
`determining a security level of a secured item; and
`
`forgraphicallydisplayingthesecureditem,superimposinga_securityicon
`
`correspondinstothesecuritylevelofthesecureditemoveradefaulticon,whereinthe
`
`determined security, level corresponds toa security level from a set of a plurality of
`
`
`
`securitylevels,andwhereinthedefaulticonrepresentsanon-secureditem,fromwhich
`
`thesecureditemwasderived.
`
`37...{New}Themethod as recited in claim 36, further comprising:
`
`
`intercesting an item when the item is retrieved from.a storaze device; and
`
`determininzwhethertheintercepteditemissecured.
`
`38...(New)The method as recited in claim 37. wherein said determining a
`
`security level comprises activatingaclient module in responsetoadeterminationthatthe
`
`item is secured.
`
`
`
`39,(New)Themethodasrecited inclaim38.whereintheclientmoduleis
`
`
`
`
`
`configuredtooperate in an operating system supporting
`
`
`
` program,
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`-15-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`AMSCORE.RETED,SECORSOOShatinnenSREeseae DAanN
`
`wenatteeeEESRIeRUtneetecniLamrenelnSEAR
`
`
`determining security information associatedwiththesecureditem,whereinthe
`
`security.informationincludesinformationregarding the security level of the secured
`
`item.
`
`42.
`
`(Cancelled)
`
`wees!
`os
`atetndanano aa ana tae
`diesel
`
`43...{ew} The methodasrecitedinclaim36,whereinthedefaulticonis
`
`associated with an executable program.
`
`
`
`44,{Sew}Themethodasrecited in claim36.whereinthesecurityicon
`
`
`
`includesavisualobjectandatransparentbackground.
`
`45.{New}The method as recited in claim44.whereinsaid superlmposing
`
`comprisesoverlayingthevisualobjectonto the defaulticonsuchthatthedefault iconis
`
`atleastpartiallyvisible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`- 16-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`46.{New}Themethodasrecitedinclaim44.whereinsaidsuperimposing
`
`comprisesgeneratingasuperimposediconincludingthedefaulticonwiththevisual
`
`objectsuperimposedthereonsuchthatthedefaulticonisatleastsartiallyvisible.
`
`
`
`47,New}Themethodasrecitedinclaim45.whereinthedefaulticon is
`
`
`
`associated with an executable program.
`
`48.
`
`(Cancelled)
`
`49.
`
`(New) A comsuter-implementedmethodcomnrising:
`
`interceptinganitembeiny retrievedfroma storagedevice:
`
`determiningwhethertheitemissecured:
`
`levelfromasetofaplurality
`
`of security levels: and
`
`
`generatinyasuperimposediconbased, atleast in yart.onthedetermined security
`
`levelforgraxhically displayingthesecureditem,
`
`ieeeeetrntennercea
`
`50...{New}The computer-implementedmethodasrecitedinclaim49,
`
`whereinsaidgeneratingasuperimposed
`
`iconcomprises:
`
`determining a securityiconforthesecured item based,atleastinpart, on the
`
`determinedsecuritylevel:and
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`-17-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`superimposingthe securityicon over a default icon. wherein the default icon is
`
`configuredtorepresentanon-secureditemof asamefiletype as the secured item.
`
`51.
`
`(New; The computer-implemented method asrecitedinclaim50,
`
`whereinthesecurityiconincludesavisualobjectandatransparent backround.
`
`
`
`whereinsaidsuperimposing comprises overlaying the visual object ontothedefaulticon
`
`suchthatthedefaulticonisatleastpartiallyvisible.
`
`
`
`53, {ew}Anarticleofmanufactureincludingacomputer-readablemedium
`
`having instructions stored thereon, execution ofwhichbyacomputingdevicecauses the
`
`interceptinganitembeingretrievedfromastorasedevice:
`
`determining whether the item is secured:
`
`inresponse to a determination that the itemissecured,determining a security
`
`levelofthesecureditem,whereinthe determined security levelcorrespondstoasecurity
`
`
`
`levelfromasetofapluralityofsecuritylevels;and
`
`generating a superimposed icon based,atleastinwart,onthe determined security
`
`leveltographicallydisplaythesecureditem.
`
`24...(sew)Thearticleofmanufactureasrecited
`
`inclaim53.whereinsaid
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`-18-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`determiningasecurityiconforthesecureditembased.atleastinpart.on,the
`
`determinedsecuritylevel:and
`
`surerimposing the security icon over a default icon, wherein the default icon is
`
`configuredtorewresentanon-secureditemfromwhichthesecureditemwasderived.
`
`
`
`55. iNew} The article of manufacture as recited in claim 54, wherein the
`
`securityiconincludesavisualobjectandatransyarentbackground.
`
`36........{New}Thearticleofmanufactureasrecitedinclaim55,whereinsaid
`
`superimposingcomprises overlaying the visual obiect onto the default iconsuchthatthe
`
`
`
`
`defaulticonisatleastpartiallyvisible.
`
` iNew} Atangiblecomputerreadablemediumhavinginstructionsstored
`
`thereon, the instructions comprising:
`
`
`
`determinedsecuritylevelcorrespondstoasecuritylevelfrom a set of a plurality of
`
`security levels; and
`
`forgraphically dislaying the secured item, instructionstosuperimposeasecurity
`
`
`iconcorrespondingtothesecuritylevelofthesecureditemoveradefaulticon,wherein
`
`58.
`
`(ew) The tangible computer readablemediumasrecitedinclaim57,the
`
`instructionfurthercomprising:
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`instructionstointerceptanitemwhentheitemisretrievedfromastoraxedevice:
`
`- 19-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`and
`
`instructionstodeterminewhether the intercepted itemissecured.
`
`59.____{New}Thetangiblecomputerreadablemediumasrecited in claim58.
`
`
`
`whereintheinstructionstodeterminesecuritylevelcompriseinstructionstoactivatethe
`
`
`
`
`
`aclientmoduleinresnonsetoadeterminationthattheitemissecured.
`
`60.{New}Thetangiblecomputerreadablemediumasrecitedinclaim59,the
`
`instructionsfurthercomprising:
`
`ilaratin
`instructionstodetermine security informationassociatedwiththesecured item,
`
`
`
`
`
`whereinthesecurityinformationincludesinformationregardingthesecuritylevelofthe
`
`secured item.
`
`
`
`63.
`
`(New? Thetangiblecomputerreadable medium as recited in claim 62.
`
`whereintheinstructionstosuperimsose the security icon correspondingtothesecurity
`
`Atty. Dkt. No. 2222.540REI0
`
`

`

`- 20 -
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`
`levelover,thedefaulticon compriseinstructionstooverlay the visual object onto the
`
`
`
`
`
`defaulticonsuchthatthedefaulticonisatleastpartially visible.
`
`64.€New} The tangible computerreadablemediumasrecitedinclaim62,
`
`whereintheinstructionstosuperimposethesecurity iconcorrespondingtothesecurity
`
`level_overthedefaulticoncompriseinstructionstogenerateasuperimposed.icon
`
`includingthedefaulticon with the visual objectsuperimposedthereonsuchthatthe
`
`defaulticonis at least yartiallyvisible.
`
`65.{New}Thetansible computer readablemediumasrecitedinclaim64,
`
`whereinthedefaulticonisassociatedwithanexecutableprogram.
`
`66.
`
`(Cancelled)
`
`67.
`
`(New) A tangible computerreadablemediumhavinginstructions stored
`
`thereon,theinstructions comgising:
`
`instructions to intercestanitembeingretrieved froma storaxe device:
`
`instructionstodeterminewhether the item is secured:
`
`inresponsetoadetermination thattheitemissecured,instructionstodetermine a
`
`securitylevelofthesecureditem, whereinthedeterminedsecurity level correspondsto a
`
`instructionstogenerateasuperimposed icon based. at
`
`least inpart,onthe
`
`determinedsecuritylevelforgraphically displayiniz thesecureditem.
`
`
`Atty. Dkt. No. 2222.540REIO
`
`

`

`-21-
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`68.{New}Thetangiblecomputerreadable medium_asrecitedin claim 67.
`
`
`
`
`
`
`
`whereintheinstructionstoxenerate the superimposediconcomprise:
`
`instructionstodetermineasecurityiconforthesecureditembased,atleastin
`
`partonthedeterminedsecuritylevel.and
`
`instructionstosuperimposethesecurityiconoveradefaulticon,whereinthe
`
`defaulticonisconfigured to represent a non-secured item from which the secured item
`
`was derived.
`
`ennELRraaaniaartneteeeeeenenSeaheaeNENEeRERREEEEENR
`69.
`iNew} The tangible computer readable medium as recited in claim 68.
`
`whereinthesecurityiconincludes a visual object and a transparent background.
`
`70.(New}Thetangiblecomputerreadablemediumasrecitedinclaim69,
`
`instructionstooverlaythevisualobjectontothedefaulticonsuchthatthedefaulticonis
`
`at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

HTTP Error 400: Found

Refresh this Document
Go to the Docket