`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Amendments to the Claims
`
`This listing of claims will replace all prior versions, and listings, of claims in the
`
`application. The claim identifiers, or lack thereof, below conform to the rules for reissue
`
`amendments set
`
`forth in 37 C.F.R. §§ 1.173(b)(2),
`
`(c),
`
`(d), and (e).
`
`(See also,
`
`M.P.E.P. §§ 1453 (iD, (IV), and (V)).
`
`1.
`
`(Four Times Amended)
`
`A method for graphically
`
`[indicating]
`
`representing secured items on_a computer [in a program for displaying contents in a
`
`selected place], [the method] comprising:
`
`determining a security level of each of the secured items, wherein the determined
`
`
`securitylevelcorrespondsto a securitylevelfrom a set of a pluralityof securitylevels [,
`
`wherein each of the secured items has a default icon associated with if the each of the
`
`secured items is otherwise not secured]; and
`
`
`for graphically displaying thesecureditems, superimposing [an appropriate] for
`
`each secured itema security icon corresponding to the security level of that item over
`
`[the] a default icon [without losing original indications of the default icon], wherein the
`
`security icon is superimposed on the sameyortion of the default icon rexzardless ofthe
`
`correspondingsecuritylevel and uniquely represents thatsecuritylevel,andwhereinthe
`
`default icon represents a correspondingnon-secureditem ofa samefiletysieas the
`
`respective secureditem.
`
`
`2.
`
`(Once Amended)
`
`The method as
`
`recited in claim 1,
`
`further
`
`comprising:
`
`Atty. Dkt. No. 2222.540REI0
`
`
`
`-3-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`intercepting [files from the selected place when the files are selected by the
`
`
`program for displaying the contents in the selected place] items when_theitems are
`
`retrievedfromastoraxedevice; and
`
`[checking if] determining whether any of the [secured] intercepted items are
`
`[includedin the files] secured.
`
`3.
`
`(Once Amended)
`
`The method as recited in claim 2, wherein said
`
`determining a security level [of each of the secured items] comprises activating a client
`
`module [when said checking indicates that there are] inresponse to a determination that
`
`
`at [lease] least one of the [secured] itemsis [included in the files] secured.
`
`4,
`
`(Once Amended)
`
`The methodas recited in claim 3, wherein the client
`
`
`module [operates] is configuredtooperate in [a] an operating system supporting [the] a
`
`program.
`
`5.
`
`(Once Amended)
`
`The method as recited in claim 4, wherein [the
`
`selected place is a folder and] the operating system [is] comprises a graphic windows
`
`operating system and the program [is] comprises a utility [for a user] configured to
`
`display [the] contents [in] of the [folder] storage device.
`
`6.
`
`(Once Amended)
`
`The method as
`
`recited in claim 3,
`
`further
`
`comprising:
`
`[wherein the client module is configured to look into} determining security
`
`information associated with the at least one [of the secured items] secured item, [and]
`
`Atty. Dkt. No. 2222 540REIO
`
`
`
`~4-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`wherein the security information includes information regarding the security level of the
`
`at least one [of the secureditems] secured item.
`
`7.
`
`8.
`
`(Cancelled)
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the default icon thereofis clicked, the executable program will be activated].
`
`9,
`
`(Once Amended)
`
`The method as recited in claim 1, wherein the
`
`[appropriate] security icon includes a visual object and a transparent background.
`
`10.
`
`(Once Amended)
`
`Tne method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises overlaying the visual object onto the default icon such that at least a
`
`portion [without obscuring the rest] of the default icon is visible.
`
`11.
`
`(Once Amended)
`
`The method as recited in claim 9, wherein said
`
`superimposing [an appropriate icon corresponding to the security level over the default
`
`icon] comprises generating a superimposed icon including the default icon with the
`
`visual object superimposed thereon suchthatatleast_aportionof [without obscuring the
`
`rest of] the default icon is visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-5-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`12.
`
`(Once Amended)
`
`The method as recited in claim 10, wherein the
`
`default icon is associated with an executable program [, when the each of the secured
`
`items or the superimposed icon thereof is clicked,
`
`the obscuring program will be
`
`activated].
`
`13.
`
`(Cancelled)
`
`14.
`
`(Four Times Amended)
`
`A computer-implemented method
`
`[for
`
`graphically indicating secured items in a program for displaying contents in a selected
`
`place, the method] comprising:
`
`[retrieving all files in the selected place;
`
`intercepting [the files when metadata of the files are being loaded into the
`
`program] itemsbeing retrieved froma storaze device;
`
`[checkingif there is] determining whetherat least one of the [secured] retrieved
`
`items [includedin the files] is secured;
`
`
`in_response_toadetermination,atleast oneoftheitemsis.secured.that
`
`
`
`
`
`
`determiningasecuritylevel of theleastonesecured item, whereinthe determined
`
`securitylevelcorresondsto_asecuritylevelfromasetofapluralityofsecuritylevels
`
`[activating a client module to determine how the at least one of the secured itemsis
`
`secured, when it is checked that the at least one of the secured items is included in the
`
`files]; and
`
`generating a superimposed icon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based, at
`least.inpart,onthedeterminedsecuritylevelfor graphically displayingtheatleast one
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-6-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`secureditem, wherein thesuserimposedicon is superimposed onasameportion
`
`regardlessofthecorrespondingsecuritylevelanduniquely representsthatsecuritylevel.
`
`15,
`
`(Twice Amended)
`
`The computer-implemented. method as recited in
`
`claim 14, wherein [there is an appropriate icon for the at least one of the secured items
`
`when the at least one of the secured items is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`[choosing an appropriate] determinins a security icon for the at least one [of the
`
`secured items] secureditembased.at least in part,onthedeterminedsecuritylevel; and
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`thedefault icon is configured to representanon-secureditemfrom whichthe at least one
`
`secured item was derived[associated with, without losing original indications of the
`
`default icon].
`
`16.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 15, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`17.
`
`(Twice Amended)
`
`The computer-implemented method as recited in
`
`claim 16, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`comprises overlaying the visual object onto the default icon suchthatatleastaportion
`
`[without obscuring the rest] of the default icon is visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-7-
`.
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`18.
`
`(Thrice Amended)
`
`| [A computer for graphically indicating secured
`
`items in a program for displaying contents in a selected place, the computer] Anarticle
`of manufactureincluding.a_computer-readable medium.having.instructionsstored
`
`
`
`thereon,execution ofwhichbyacomputing device causesthecomputingdevice to
`
`perform operations comprising:
`
`[at least a processor;]
`
`[a first memory space for storing a client module;|
`
`[a second memory space, coupled to the processor, for storing code as a graphic
`
`operating system,
`
`the code, when executed by the processor, causing the graphic
`
`operating system to support the program for displaying the contents in the selected place
`
`and perform operationsof:]
`
`[retrievingall files in the selected place;]
`
` intercenting items beingretrieved from a storaxedevice:
`
`[checking if there is] determining whether at least one of the [secured] retrieved
`
`items [includedin the files] is secured;
`
`
`determiningasecuritylevel of theat leastone secured item,wherein thedetermined
`Seeeaneeiraeeaee
`
`securitylevelcorrespondstoasecuritylevel from asetofapluralityof securitylevels
`
`[activating the client module to determine how the at least one of the secured items is
`
`secured, when it is checked that the at least one of the secured items is included in the
`
`files]; and
`
`generating a superimposed icon [to indicate the at least one of the secured items
`
`is secured, different from the rest of the files when displayed in the program] based, at
`
`least_inpart,onthe determined.securityleveltographicallydisplaytheatleast one
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-8-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`secured item.whereinthe superimposedicon is superimposedonasameportion
`
`regardlessofthecorrespondingsecuritylevelanduniguelyrepresentsthatsecuritylevel.
`
`19.
`
`(Once Amended)
`
`The [computer} article of manufacture as recited in
`
`claim 18, wherein [there is an appropriate icon for the at least one of the secured items
`
`whenthe at least one of the secured items is not secured, and wherein] said generating a
`
`superimposed icon comprises:
`
`
`
`secured items] secured item based,at least in part.onthedeterminedsecuritylevel; and
`
`superimposing the [appropriate] security icon over [the] a default icon, wherein
`
`the default icon is configuredtorepresentanon-secured item from which the at least one
`
`secureditemwasderived [associated with, without losing original indications of the
`
`default icon].
`
`20.
`
`(Once Amended)
`
`The [method] articleofmanufacture as recited in
`
`claim 19, wherein the [appropriate] security icon includes a visual object and a
`Rs
`
`transparent background.
`
`21.
`
`(Once Amended)
`
`The [method] articleofmanufacture as recited in
`
`claim 20, wherein said superimposing [the appropriate icon over the default
`
`icon]
`
`
`
`[without obscuring the rest] of the default icon is visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-9-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`
`
`22. A_non-transitory(Thrice Amended) computer readable medium
`
`[containing program code executable by a computing device for graphically indicating
`
`secured items in a program for displaying contents in a selected place, the computer
`
`readable medium] havinginstructionsstoredthereon, the instructions comprising:
`
`of [the] secured items, wherein the determinedsecuritylevelcorressondstoa security
`
`levelfromaset of a plurality of securitylevels [, wherein each of the secured items has a
`
`default icon associated with if the each of the secured items is otherwise not secured];
`
`and
`
`[program code for superimposing] for zrahicallydisslavingthesecureditems,
`
`
`eeceaeaceaESOR
`instructionstosuperimpose [an appropriate] for each secured item a security icon
`
`corresponding to the security level of that item over [the] a default icon [without losing
`
`original indications of the default icon], whereinthesecurityicon is suserimposed on the
`
`
`
`23.
`
`(Twice Amended)
`
`The computer readable medium as recited in claim
`
`22,
`
`the instructions further comprising:
`
`[program code for intercepting] instructions to intercept [files from the selected
`
`place when the files are selected by the program for displaying the contents in the
`
`eeee
`
`[program code for checking if] instructionstodeterminewhether any ofthe
`
`[secured] intercepted items are [includedin the files] secured.
`
`Atty. Dkt. No. 2222,540REIO
`
`
`
`- 10-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`24.
`
`(Twice Amended)
`
`The computer readable medium as recited in claim
`
`
`23, wherein the [program code for determining] instruction to determine the security
`
`level [of the each of the secured items comprises program code for activating] comprise
`
`instructions to activate a client module [when the program code for checking indicates
`
`that there are] inresponsetoadetermination that at [lease] least one of the [secured]
`
`
`items is [included in the files] secured.
`
`25.
`
`(Twice Amended)
`
`The computer readable medium asrecited in claim
`
`
`
`[wherein the client module is configured to look into] instructionsto determine
`
`security information associated with the at least one [of the secured items] secured item,
`
`[and] wherein the security information includes information regarding the security level
`
`of the at least one [of the] secured [items] item.
`
`26.
`
`(Twice Amended)
`
`The computer readable medium asrecited in claim
`
`22, wherein the default icon is associated with an executable program [, when the each of
`
`the secured items or the default icon thereof is clicked, the executable program will be
`
`activated].
`
`27.
`
`(Twice Amended)
`
`The computer readable medium asrecited in claim
`
`22, wherein the [appropriate] security icon includes a visual object and a transparent
`
`background.
`
`Atty. Dkt. No. 2222,540REIO
`
`
`
`-11-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`28.
`
`(Twice Amended)
`
`The computer readable medium as recited in claim
`
`27, wherein the [program code for superimposing] instructionstosuperimpose the
`
`[appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code for overlaying] compriseinstructions to overlay the visual
`
`object onto the default icon suchthatatleastaportion [without obscuring the rest] of the
`
`default icon is visible.
`
`29,
`
`(Pwice Amended)
`
`The computer readable medium asrecited in claim
`
`27, wherein the [program code for superimposing] instructionstosuperimpose the
`
`[appropriate] security icon corresponding to the security level over the default icon
`
`[comprises program code
`
`for generating] comprise_instructions
`
`to generate a
`
`superimposed icon including the default
`
`icon with the visual object superimposed
`
`
`thereon suchthatatleastaportion [without obscuring the rest] of the default icon is
`
`visible.
`
`30.
`
`(Twice Amended)
`
`The computer readable medium asrecited in claim
`
`29, wherein the default icon is associated with an executable program [, when the each of
`
`the secured items or the superimposed icon thereofis clicked, the obscuring program will
`
`be activated].
`
`31.
`
`(Cancelled)
`
`32.
`
`(Thrice Amended)
`
`A non-transitory
`
`computer
`
`readable medium
`
`[containing program code executable by a computing device for graphically indicating
`
`Atty. Dkt. No. 2222. 540REIO
`
`
`
`-12-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`secured items in a program for displaying contents in a selected place, the computer
`
`
`readable medium] having instructionsstored thereon,the instructions comprising:
`
`[program codeforretrieving all files in the selected place;]
`
`
`[program code for intercepting] instructionstointercept [the files when metadata
`
`of the files are being loaded into the program] itemsbeing retrieved. from, a storaxe
`
`device;
`
`[program code for checkingif there is] instructions to determinewhetherat least
`
`one of the [secured] retrieved items [included in the filesfile] is secured;
`
`in_responseto a determinationthatatleast one of the items is secured,
`
`instructionstodetermineasecurityleveloftheatleastonesecureditem,whereinthe
`
`determined securitylevelcorrespondstoasecuritylevelfromaset of a pluralityof
`
`security levels [program code for activating a client module to determine howtheat least
`
`one ofthe secured items is secured, when it is checked that the at least one of the secured
`
`items is includedin the files]; and
`
`indicate the at least one of the secured items is secured, different from the rest of the files
`
`Netgear etoNoWONAOeR
`
`when displayed in the program] based,at least inpart, on the determined security level
`
`for srarhicallydisplayingtheatleastone secured item,whereinthesuperimposed icon is
`
`(onaneae
`Oe
`superimposedonasameportionregardlessofthe correspondingsecurity level and
`
`
`uniguelyresresents thatsecurity level.
`
`33.
`
`(Twice Amended)
`
`The computer readable medium as recited in claim
`
`32, [wherein there is an appropriate icon for the at least one of the secured items when
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-13-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`the at least one of the secured items is not secured, and] wherein the [program code for
`
`
`generating] instructions to generate the superimposed icon [comprises] comprise:
`
`[program code for choosing an appropriate] instructionstodetermine a security
`
`icon for the at least one [of the] secured [items] itembased,atleast_insart. on the
`
`determinedsecuritylevel; and
`
`[program code for superimposing] instructions to superimpose the [appropriate]
`
`ee RRRnhlRARLARENnia
`
`security icon over [the] a default icon, wherein the default icon is confieuredtoresresent
`
`
`a non-secured itemfromwhich theat least_one secured. itemwasderived [associated
`
`with, without losing original indications of the default icon].
`
`34.
`
`(Twice Amended)
`
`The [method] computer readable medium asrecited
`
`in claim 33, wherein the [appropriate] security icon includes a visual object and a
`
`transparent background.
`
`35.
`
`(Twice Amended)
`
`The [method] comguter readablemedium asrecited
`
`in claim 34, wherein the [program code for superimposing] instructions to superimpose
`
`
`the [appropriate] security icon over the default
`
`icon [comprise program code for
`
`overlaying] comprise instructions to overlay the visual object onto the default icon such
`
`
`
`
`
`
`
`
`36. iNew}Amethodonacomputer,comprising:
`
`determining asecurity level ofasecured item: and
`
`forsraphicallydisplayingthe secured item, superimposingasecurityicon
`
`correspondingtothesecuritylevelofthe secured itemoveradefaulticon,wherein.the
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 14-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`determined securitylevel correspondsto asecuritylevel from a,setofaplurality of
`
`
`
`securitylevels,whereinthesecurityiconissugerimposedonthesameportionofthe
`
`defaulticonrexardlessofthecorrespondingsecuritylevelanduniquely represents that
`
`
`
`
`
`securitylevel,andwhereinthedefaulticonrepresentsanon-secureditemfromwhichthe
`
`secureditemwasderived.
`
`
`
`37.___..{New},Themethodasrecited inclaim36.furthercomprising:
`
`
`
`interceptinganitemwhenthe item is retrievedfrom a storage device: and
`
`
`
`determiningwhethertheintercepteditemissecured.
`
`38.{New}Themethodasrecitedinclaim37,whereinsaid.determininga
`
`
`
`securitylevelcomprisesactivatingaclientmodule inresponsetoa.determinationthatthe
`
`item is secured.
`
`
`
`39.(New)Themethodasrecitedinclaim38,whereintheclientmodule.is
`
`configuredto operateinanoperatingsystemsupporting a
`
`
`program.
`
`
`
`
`
`40.
`iNew}Themethodasrecited in claim 39. wherein the operating system
`
`comprises a graphicwindowsoperatingsystemandtheprogramcomprises a utility
`
`configuredtodisplaycontentofthestoragedevice.
`
`41.(New)Themethodasrecitedinclaim38.furthercomprising:
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-15-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`42.
`
`(Cancelled)
`
`
`
`43.ew}Themethodasrecitedin claim36.whereinthedefaulticonis
`
`associated with an executable program.
`
`
`
` 45. {New} The method as recited in claim 44. wherein said superimposing
`
`
`comprisesoverlayingthevisualobject onto thedefaulticonsuchthatthedefaulticonis
`
`eter Se
`
`comprises generating asurerimposediconincludingthe default icon with the visual
`
`
`object superimposed thereonsuchthatthedefaulticonisatleastpartiallyvisible.
`
`47.{New}The method as recited in claim 45, whereinthe default icon is
`
`associated withan executable sroeram.
`
`48.
`
`(Cancelled)
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 16-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`49.{New}Acomputer-implementedmethodcomprising:
`
`interceptinganitem beingretrievedfromastoraxe device:
`
`determiningwhethertheitemissecured:
`
`inresponseto.adetermination.thatthe itemissecured.determiningasecurity
`
`levelofthesecureditem,whereinthedeterminedsecuritylevelcorrespondstoasecurity
`
`levelfrom.aset of a plurality of securitylevels:and
`
`generating a superimposediconbased.atleastinpart.onthedeterminedsecurity
`
`levelforgraphicallydisplayinethesecureditem. wherein the superimp
`
`
`superimposed onasameportionrevardlessof the corresponding,securityleveland.
`
`uniquelyrepresentsthatsecurity level.
`
`
`
`
`wherein said generatingasuperimposediconcomprises:
`
`
`determininga security iconforthesecureditembased,atleastin.part.onthe
`
`determinedsecuritylevel:and
`
`
`
`
`
`51.iNew)The.computer-implemented method as recitedinclaim50.
`
`wherein the security icon includes a visual objectandatranssarentbackground.
`
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-17-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`
`‘New) Thecomputer-implemented__method.as_recited inclaim51,
`
`
`
`whereinsuperimposingcomprisesoverlayingthevisualobjectontothedefaulticonsaid
`
`
`
`such that the defaulticonisatleastpartially visible.
`
`53._few} Anarticle of manufactureincluding a comsuter-readable medium
`
`
`
`havinginstructionsstoredthereon,executionofwhichcomputingdevicecausestheby a
`
`
`
`computingdevicetoperformoperationscomprising:
`
`interceptinganitembeingretrievedfroma storagedevice:
`
`determiningwhether the item is secured:
`
`inresponse to_a determinationthatthe item is secured... determiningasecurity
`
`level of the secured item,whereinthedetermined security level correspondstoasecurity
`
`levelfromasetofapluralityofsecuritylevels:and
`
`
`generatingasuperimposedicon based,at least in part, on the determined security
`
`levelto.graphicallydisplaythesecured.item.whereinthesuperimposedicon_is
`
`superimposedona same portion regardlessof the corresponding security level and
`
`uniguelyrepresentsthatsecuritylevel.
`
`54.{New}The articleofmanufacture as recited in claim 53. wherein said
`
`Monsen
`generatiny a sunerimposed icon comprises:
`
`determininz a security icon forthesecured itembased, at least_in part, on the
`
`determined security level:and
`
`superimposingthesecurityicon over a default icon. wherein the default icon is
`
`
`
`configuredtorepresent a non-secureditemfromwhichthesecureditemwasderived.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 18 -
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH.
`Appl. No. 11/889,685
`
`
`
`55.{New}Thearticleofmanufactureasrecited inclaim54. whereinthe
`
`securityiconincludesavisualobjectandatransparent backround.
`
`
`
`
`
`56.New)Thearticleofmanufactureasrecitedinclaim55.whereinsaid
`
`sutierimposing comprises overlayingthe visual object.ontothedefaulticon such that the
`
`defaulticonisat leastpartially visible.
`
`57.
`
`See
`iNew}A.non-transitorycomputer readable medium having instructions
`
`instructionstodetermine a security levelofasecured item.wherein the
`
`determinedsecurity levelcorrespondstoasecuritylevelfromasetof a plurality of
`
`security levels; and
`
`
`
`
`icon corresponding tothesecurity levelofthesecureditemoveradefaulticon,wherein
`
`the security icon is suserimposed onthesame portion of the default iconregardlessof
`
`thecorrespondingsecuritylevelanduniquely represents thatsecuritylevel,andwherein
`
`the defaulticonrepresents a non-secured item ofasamefiletypeasthesecured item.
`
`58. {New} The computer readablemedium as recited in.claim57,the
`
`
`
`instructionstointercept an itemwhen theitemisretrievedfromastorazedevice;
`
`and
`
`SeaNAA
`instructions to determinewhetherthe intercested item is secured.
`
`Atty. Dkt. No. 2222.540REI0O
`
`
`
`-19-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`59...{New}The computerreadablemediumasrecited
`inclaim 58. wherein, the
`
`instructionstodeterminethesecuritylevelcompriseinstructionstoactivateaclient
`
`moduleinresponseto a determination that theitem is secured.
`
`
`
`60._¢New}Thecomputerreadablemediumasrecitedinclaim59.the
`
`instructionsfurthercomprising:
`
`
`instructionstodetermine security informationassociatedwiththesecureditem,
`
`
`
`whereinthesecurity information includesinformationregardingthesecuritylevelofthe
`
`secured item.
`
`61.{New}Thecomputer readablemedium asrecitedinclaim57,.whereinthe
`
`62...
`
`
`€New). The comsuterreadablemediumasrecitedinclaim 57, whereinthe
`
`security icon includes a visualobject.anda transparent backzround.
`
`63.____
`
`Poh
`{New} The computerreadablemediumasrecitedinclaim 62. whereinthe
`
`instructionstoesunerimpose the security icon correspondingto the security level over the
`
`default icon compriseinstructionstooverlaythevisual object onto the default icon such
`
`
`
`64.
`
`
`€New} The computer readablemediumasrecited inclaim62. wherein the
`
`instructions to superimpose the securityiconcorrespondingtothesecurityleveloverthe
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 20 -
`Reply to Office Action of December12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`
`
`iconwiththe visual object superimposedthereonsuchthatthedefaulticonisatleast
`
`partially visible.
`
`
`
`
`
`65. {New}Thecomputerreadablemediumasrecitedinclaim64,whereinthe
`
`
`
`defaultassociatedwithanexecutableprogram.icon is
`
`
`
`
`
`66.
`
`(Cancelled)
`
`instructionsto intercept an itembeingretrievedfromastorazedevice:
`
`instructionstodetermine whether the item is secured;
`
`inresponsetoadeterminationthattheitemissecured.instructionstodeterminea
`
`security level of the secured item, whereinthedetermined securitylevel corresponds to a
`
`
`security level from a set of a pluralityofsecuritylevels:and
`
`
`instructions to#enerateasuperimposediconbased. at
`
`least in part.on the
`
`nameee
`ASN
`determined securitylevelforgraphically displaying the secured item, wherein the
`
`suyserimposediconissuperimposed ona sameportionregardlessofthecorresponding
`
`security level and uniguely representsthat securitylevel.
`
`
`
`PCRROOAER
`instructionstodetermineasecurityiconforthesecureditembased, at least in
`
`part. on the determined security level: and
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-21-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`instructions to superimosethe security icon over_a defaulticon, wherein the
`
`
`
`
`default icon is configuredtorepresent_anon-secureditem. fromwhichthesecureditem
`
`
`
`was derived.
`
`securityiconincludes a visualobjectandatransparentbackground.
`
`
`
`
`
`70...{New}.Tkecomputerreadablemediumasrecitedin claim69.whereinthe
`
`instructionsto suyerimpose the securityiconover the default iconcompriseinstructions
`tooverlaythevisual object ontothedefaulticonsuchthatthedefaulticonisat least
`
`
`
`partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site