`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`Appendix — Claim Amendments Relative to Prior Repiy
`
`The following claim listing is provided for the purpose of facilitating review of
`
`the claim amendments. This claim listing illustrates the status of the claims as amended
`
`by this Reply, and includes only those claims being amendedbythis reply.
`
`1.
`
`(Currently Amended) A method for graphically representing secured
`
`items on a computer, comprising:
`
`determining a security level of each of the secured items, wherein the determined
`
`security level correspondsto a security level from a set of a plurality of security levels;
`
`and
`
`for graphically displaying the secured items, superimposing for each secured item
`
`a security icon corresponding to the security level of that item over a default icon,
`
`whereinthesecurityiconissuperimposedonthesameportionofthedefaulticon
`
`Mraet
`
`rezardless of the correspondingsecuritylevelanduniguely represents that security level,
`
`and wherein the default icon represents a corresponding non-secured item of a samefile
`
`type as the respective secured item.
`
`14.
`
`(Currently Amended) A computer-implemented method comprising:
`
`intercepting iterns being retrieved from a storage device;
`
`determining whether at least one of the retrieved items is secured;
`
`in response to a determination that at
`
`least one of the items is secured,
`
`determining a security level of the least one secured item, wherein the determined
`
`Atty. Dkt. No. 2222, 540REI0
`
`
`
`-31-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`security level corresponds to a security level from a set of a plurality of security levels;
`
`and
`
`generating a superimposed icon based, at least in part, on the determined security
`
`level for graphically displaying the at least one secured item,whereinthesuperimposed
`
`iconissuperimposed on a same portion regardlessofthecorrespondingsecuritylevel
`
`anduniquelyrepresentsthatsecuritylevel.
`
`18.
`
`(Currently Amended) An article of manufacture including a computer-
`
`readable medium having instructions stored thereon, execution of which by a computing
`
`device causes the computing device to perform operations comprising:
`
`intercepting items being retrieved from a storage device;
`
`determining whetherat least one of the retrieved items is secured;
`
`in response to a determination that at
`
`least one of the items is secured,
`
`determining a security level of the at least one secured item, wherein the determined
`
`security level corresponds to a security level from a set of a plurality of security levels;
`
`and
`
`generating a superimposed icon based, at least in part, on the determined security
`
`
` issuperimposedonasameportion reg
`
`uniquelyrepresents that security level.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 32 -
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`22.
`
`(Currently Amended) A tangible
`
`non-transitory
`
`computer
`
`readable
`
`medium having instructions stored thereon, the instructions comprising:
`
`instructions to determine a security level of each of secured items, wherein the
`
`determined security level corresponds to a security level from a set of a plurality of
`
`security levels; and
`
`for graphically displaying the secured items, instructions to superimpose for each
`
`secured item a security icon corresponding to the security level of that item over a
`
`default icon, whereinthesecurity icon is surerimposedonthesameportion of the default
`
`
`eeees berated
`iconregardlessofthecorressondins securitylevel and uniguely represents that security
`
`level, and wherein the default icon represents a corresponding non-secured item from
`
`whichthe respective secured item was derived.
`
`23.
`
`(Currently Amended) The tangible computer readable mediumasrecited
`
`in claim 22, the instructions further comprising:
`
`instructions to intercept items when the itemsare retrieved from a storage device;
`
`and
`
`instructions to determine whether any of the intercepted items are secured.
`
`24.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 23, wherein the the instruction to determine the security level comprise
`
`instructions to activate a client module in response to a determination that at least one of
`
`the items is secured.
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 33-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`25.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 24, the instructions further comprising:
`
`instructions to determine security information associated with the at least one
`
`secured item, wherein the security information includes information regarding the
`
`security level of the at least one secured item.
`
`26.
`
`(Currently Amended) The tangible computer readable medium as recited
`
`in claim 22, wherein the default icon is associated with an executable program.
`
`27.
`
`(Currently Amended) The tangible computer readable medium as recited
`
`in claim 22, wherein the security icon includes a visual object and a transparent
`
`background.
`
`28.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 27, wherein the instructions to superimpose the security icon corresponding to
`
`the security level over the default icon comprise instructions to overlay the visual object
`
`onto the default icon such that at least a portion of the default icon is visible.
`
`29.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 27, wherein the instructions to superimpose the security icon corresponding to
`
`the security level over the default icon comprise instructions to generate a superimposed
`
`icon including the default icon with the visual object superimposed thereon such that at
`
`least a portion of the default iconis visible.
`
`Atty. Dkt. No. 2222.540REi0
`
`
`
`- 34 -
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`30.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 29, wherein the default icon is associated with an executable program.
`
`32.
`
`(Currently Amended) A tengible
`
`non-transitory
`
`computer
`
`readable
`
`medium having instructions stored thereon, the instructions comprising:
`
`instructions to intercept items being retrieved from a storage device;
`
`instructions to determine whetherat least one of the retrieved items is secured;
`
`in response to a determination that at
`
`least one of the items is secured,
`
`instructions to determine a security level of the at least one secured item, wherein the
`
`determined security level corresponds to a security level from a set of a plurality of
`
`security levels; and
`
`instructions to generate a superimposed icon based, at
`
`least
`
`in part, on the
`
`determined security level for graphically displaying the at
`
`least one secured item,
`
`se
`whereinthesuperimposediconis sugerimposedonasameportionregardlessofthe
`
`correspondingsecuritylevelanduniuelyrepresentsthatsecurits:level.
`
`33.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 32, wherein the instructions to generate the superimposed icon comprise:
`
`instructions to determine a security icon for the at least one secured item based, at
`
`least in part, on the determined security level; and
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 35 -
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`instructions to superimpose the security icon over a default icon, wherein the
`
`default icon is configured to represent a non-secured item from which the at least one
`
`secured item was derived.
`
`34.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 33, wherein the security icon includes a visual object and a transparent
`
`background.
`
`35.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 34, wherein the instructions to superimpose the security icon over the default
`
`icon comprise instructions to overlay the visual object onto the default icon such that at
`
`least a portion of the default iconis visible.
`
`36.
`
`(Currently Amended) A method on a computer, comprising:
`
`determining a security level of a secured item; and
`
`for graphically displaying the secured item, superimposing a security icon
`
`corresponding to the security level of the secured item over a default icon, wherein the
`
`determined security level corresponds to a security level from a set of a plurality of
`
`
`security levels, wherein thesecurityicon is superimposedonthe same portionofthe
`
`defaulticonregardlessofthecorrespondingsecuritylevelanduniquelyrepresentsthat
`
`security level, and wherein the default icon represents a non-secured item from which the
`
`secured item was derived.
`
`Atty, Dkt. No. 2222.540REIO
`
`
`
`- 36-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`49,
`
`(Currently Amended) A computer-implemented method comprising:
`
`intercepting an item being retrieved from a storage device;
`
`determining whether the item is secured;
`
`in response to a determination that the item is secured, determining a security
`
`level of the secured item, wherein the determined security level corresponds to a security
`
`level from a set of a plurality of security levels; and
`
`generating a superimposed icon based, at least in part, on the determined security
`
`level for graphically displaying the secured item, wherein the superimposed icon. is
`
`St nee
`superimposed _on_asame portionregardless of the corresponding security level and
`
`53.
`
`(Currently Amended) An article of manufacture including a computer-
`
`readable medium having instructions stored thereon, execution of which by a computing
`
`device causes the computing device to perform operations comprising:
`
`intercepting an item being retrieved from a storage device;
`
`determining whether the item is secured;
`
`in response to a determination that the item is secured, determining a security
`
`level of the secured item, wherein the determined security level correspondsto a security
`
`level from a set of a plurality of security levels; and
`
`generating a superimposed icon based, at least in part, on the determined security
`
`level
`
`to graphically display the secured item, wherein the superimposed icon is
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`-37-
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`superimposedon a sameportion regardlessofthecorrespondingsecuritylevel and
`
`uniguelyregresents that security level.
`
`57.
`
`(Currently Amended) A éangible
`
`non-transitory
`
`computer
`
`readable
`
`medium having instructions stored thereon, the instructions comprising:
`
`instructions to determine a security level of a secured item, wherein the
`
`determined security level corresponds to a security level from a set of a plurality of
`
`security levels; and
`
`for graphically displaying the secured item, instructions to superimpose a security
`
`icon corresponding to the security level of the secured item over a default icon, wherein
`
`thesecurityiconissuperimposedon.thesamesortionofthedefaulticonregardlessof
`
`thecorrespondingsecuritylevelanduniquelyrepresentsthatsecuritylevel.and wherein
`
`the default icon represents a non-secured item of a samefile type as the secured item.
`
`58.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 57, the instruction further comprising:
`
`instructions to intercept an item when the item is retrieved from a storage device;
`
`and
`
`instructions to determine whether the intercepted item is secured.
`
`Atty. Dkt. No. 2222,540REIO
`
`
`
`- 38 -
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`59.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 58, wherein the instructions to determine the security level comprise instructions
`
`to activate a client module in response to a determination that the item is secured.
`
`60.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 59, the instructions further comprising:
`
`instructions to determine security information associated with the secured item,
`
`wherein the security information includes information regarding the security level of the
`
`secured item.
`
`61.
`
`(Currently Amended) The tangible computer readable medium as recited
`
`in claim 57, wherein the default icon is associated with an executable program.
`
`62.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 57, wherein the security icon includes a visual object and a transparent
`
`background.
`
`63.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 62, wherein the instructions to superimpose the security icon corresponding to
`
`the security level over the default icon comprise instructions to overlay the visual object
`
`onto the default icon such that the default icon is at least partially visible.
`
`64.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 62, wherein the instructions to superimpose the security icon corresponding to
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 39 -
`Reply to Office Action of December 12, 2012
`
`Nalini J. PRAKASH
`Appl. No. 11/889,685
`
`the security level over the default icon comprise instructions to generate a superimposed
`
`icon including the default icon with the visual object superimposed thereon suchthat the
`
`default iconis at least partially visible.
`
`65.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 64, wherein the default icon is associated with an executable program.
`
`67.
`
`(Currently Amended) A tangible
`
`non-transitory
`
`computer
`
`readable
`
`medium havinginstructions stored thereon, the instructions comprising:
`
`instructions to intercept an item being retrieved from a storage device;
`
`instructions to determine whetherthe item is secured;
`
`in response to a determination that the item is secured, instructionsto determine a
`
`security level of the secured item, wherein the determined security level correspondsto a
`
`security level fromaset of a plurality of security levels; and
`
`instructions to generate a superimposed icon based, at
`
`least
`
`in part, on the
`
`determined security level for graphically displaying the secured item, wherein the
`
`superimposediconis superimposedon a sameportion regardless ofthecorresponding
`
`security level anduniquelyrepresents that security level.
`
`68.
`
`(Currently Amended) The tangible computer readable medium as recited
`
`in claim 67, wherein the instructions to generate the superimposed icon comprise:
`
`Atty. Dkt. No. 2222.540REIO
`
`
`
`- 40 -
`Reply to Office Action of December 12, 2012
`
`Nalini 3, PRAKASH
`Appl. No. 11/889,685
`
`instructions to determine a security icon for the secured item based, at least in
`
`part, on the determined security level; and
`
`instructions to superimpose the security icon over a default icon, wherein the
`
`default icon is configured to represent a non-secured item from which the secured item
`
`was derived.
`
`69.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 68, wherein the security icon includes a visual object and a transparent
`
`background.
`
`70.
`
`(Currently Amended) The tangible computer readable medium asrecited
`
`in claim 69, wherein the instructions to superimpose the security icon over the default
`
`icon comprise instructions to overlay the visual object onto the default icon such that the
`
`default icon is at least partially visible.
`
`Atty. Dkt. No. 2222.540REIO
`
`

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site