throbber
IN THE CLAIMS:
`
`1.
`
`(Four Times Amended) A methodof operating a computer system capable of
`
`exchanging data across a network of one or more computers and havingatleast a first and
`
`second electronic data processor capable of executing instructions using a commonoperating
`
`system, comprising[ the steps of]:
`
`executing a first web browser processinstructions, capable of accessing data of a website
`
`via the network,in a first logical process within the common operating system usingthefirst
`
`electronic data processor, wherein the first logical process is capable of accessing data contained
`
`in a first memory space[ and a second memoryspace];
`
`executing a second web browser processimstractions in a second logical process within
`
`the commonoperating system using the second electronic data processor, wherein the second
`
`logical process is capable of accessing data contained in the second memoryspace[, the second
`
`logical process being further capable of exchanging data across a network of one or more
`
`computers];and
`
`displaying[, in a windowed format on a display terminal,] data from thefirst logical
`
`process and the second logical process, wherein a video processor is adapted to combine data
`
`from the first and second logical processes and transmit the combined data to [the]a display[
`
`terminal];
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`corruption by a malware process downloaded from the network and executing as part of the
`
`second web browserlesieal process.
`
`ARAC-OIRE1
`
`Page 3 of 44
`
`

`

`2.
`
`(Twice Amended) The method of claim 1 wherein the[ first memory space and
`
`the] second memory space [comprise separate regions of a common memoryspace is]comprises
`
`memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory
`
`(RAM): and
`
`both volatile and nonvolatile memory.
`
`3.
`
`(Twice Amended) The methodof claim 1 wherein thefirst logical process is
`
`
`
`capable of accessing data contained in the second memory spacesecondtesicalproeessis
`
`
`
`4,
`
`(Original) The methodof claim 1 wherein the first logical process receives user
`
`interface data, and passes the user interface data to the second logical process.
`
`5.
`
`(Original) The methodof claim 1 wherein the first and second electronic data
`
`processors are part of a multi-core electronic data processor.
`
`6.
`
`(Twice Amended) The method of claim 1 and further comprising[ the step of]
`
`restoring at least one corrupted data file[ residing on the second memory space] from [an]a
`
`protected image[ residing on the first memory space].
`
`7.
`
`(Amended) The method of claim | and further comprising[ the step of]
`
`automatically deleting at least one datafile residing on the second memory space when the
`
`second logical process is terminated.
`
`ARAC-OIRE1
`
`Page 4 of 44
`
`

`

`8.
`
`(Amended) The method of claim | and further comprising[ the steps of]:
`
`encrypting data with the first logical process;
`
`transferring the encrypted data from thefirst logical process to the second logical
`
`process;_and
`
`transferring the encrypted data from the secondlogical process to the network interface
`
`device.
`
`9.
`
`(Amended) The method of claim 8 and further comprising[ the steps of]:
`
`decrypting the data with the network interface device;_and
`
`transferring the decrypted data from the network interface device to the network.
`
`10.
`
`(Four Times Amended) A multi-processor computer system using a common
`
`operating system capable of exchanging data across a network of one or more computers via a
`
`network interface device, comprising:
`
`a first electronic data processor capable of executing a first web browser
`
`processimstructions using the commonoperating system and communicatively coupledtoafirst
`
`memory space[ and a second memoryspace], the first web browser process capable of accessing
`
`data of a website via the network;
`
`a second electronic data processor capable of executing a second web browser
`
`processinstructions using the commonoperating system and communicatively coupled to [the]a
`
`second memory space[ and a network interface device, wherein the second electronic data
`
`processor is capable of exchanging data across a network of one or more computers via the
`
`network interface device];_and
`
`a video processor adapted to combine video data from thefirst and second electronic data
`
`processors and transmit the combined video data to a display[ terminal for displaying the
`
`ARAC-OIRE1
`
`Page 5 of 44
`
`

`

`combines video data in a windowed format];
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`corruption by a malware process downloaded from the network and executing as part of the
`
`second web browser processenthe-secondelectronic-data-processor.
`
`11.
`
`(Twice Amended) The computer system of claim 10 wherein the[ first memory
`
`space and the] second memoryspace[ comprise separate regions of a common memory spaceis]
`
`comprises memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory
`
`(RAM); and
`
`both volatile and nonvolatile memory.
`
`12.
`
`(Original) The computer system of claim 10 wherein the first and second
`
`electronic data processors are part of a dual processor computer system.
`
`13.
`
`(Original) The computer system of claim 10 wherein the second electronic data
`
`processor andthe video processor are co-located on a circuit card, the circuit card being
`
`communicatively coupled to the first electronic data processor.
`
`14.
`
`(Original) The computer system of claim 10 wherein the computer system is
`
`configured such that the first electronic data processor is protected from executing instructions
`
`initiated by a malware process downloaded from the network and executing on the second
`
`electronic data processor.
`
`15.
`
`(Four Times Amended) A multi-processor computer system using a common
`
`operating system_capable of exchanging data across a network of one or more computers,
`
`ARAC-OIRE1
`
`Page 6 of 44
`
`

`

`comprising:
`
`at least a first and second electronic data processor capable of executing instructions
`
`using the commonoperating system;
`
`at least a first and second memory space;_and
`
`a video processor;
`
`wherein the first and second electronic data processors, first and second memoryspace,
`
`and video processor are configured to:[for performingthe steps of;]
`
`[executing]execute a first web browser processimstructions, capable of accessing
`
`data of a website via the network, in a first logical process with the first electronic data
`
`processor, wherein the first logical process is executing within the common operating system and
`
`is capable of accessing data contained in the first memory space;
`
`[executing]execute a second web browser processimstructions in a second logical
`
`process with the second electronic data processor, wherein the secondlogical process is
`
`executing within the commonoperating system andis capable of accessing data contained in the
`
`second memory space[, the second logical process being further capable of exchanging data
`
`across a network of one or more computers];_and
`
`[displaying, in a windowedformat on a display terminal,]display data from the
`
`first logical process and the second logical process, wherein the video processoris adapted to
`
`combinedata from the first and second logical processes and transmit the combined data to
`
`[the]a display[ terminal];
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`ARAC-OIRE1
`
`Page 7 of 44
`
`

`

`corruption by a malware process downloaded from the network and executing as part of the
`
`second web browserlesieal process.
`
`16.
`
`(Original) The computer system of claim 15 wherein the computer system is
`
`further configured such that the first logical process is protected from executing instructions
`
`initiated by a malware process downloaded from the network and executing as part of the second
`
`logical process.
`
`17.
`
`(Twice Amended) The computer system of claim 15 and further comprising[:] at
`
`least one network interface device capable of exchanging data with[ both the secondlogical
`
`process and with] the network and with a logical process that comprises a process selected from
`
`the group consisting of:
`
`the first logical process; and
`
`the second logical process.
`
`18.
`
`(Original) The computer system of claim 17 wherein the network interface device
`
`is capable of decrypting data received from the secondlogical process and transmitting the
`
`decrypted data to the network while preventing the second logical process from accessing the
`
`decrypted data.
`
`19.
`
`(Amended) The computer system of claim 15 wherein the at least one electronic
`
`data processor[is]comprises a processor selected from the group consisting of[:] a multi-core
`
`electronic data processor; dual electronic data processors; and multiple electronic data
`
`processors.
`
`20.
`
`(Twice Amended) The computer system of claim 15 and further configured to
`
`restore[for performing the step of: restoring] at least one corrupted datafile[ residing on the
`
`second memoryspace] from [an]a protected image[ residing on the first memory space].
`
`ARAC-OIRE1
`
`Page 8 of 44
`
`

`

`21.
`
`New) A portable computer capable of executing instructions using
`
`a common
`
`operating system, comprising:
`
`a network interface device configured to exchange data across a network of one or more
`
`computers and access at least one website;
`
`at least a first memory space and a second memoryspace,the first memory space
`
`containing at least one system file;
`
`at least one electronic data processor communicatively coupled to the network interface
`
`device, the first and second memoryspace, and to a user interface, wherein the user interface is
`
`configured to receive input from a computer user;
`
`the at least one electronic data processor configured to execute a first web browser
`
`process, capable of accessing data of the at least one website via the network,inafirst logical
`
`process within the common operating system, wherein the first logical process is capable of
`
`accessing data contained in the first memory space;
`
`the at least one electronic data processor further configured to execute a second web
`
`browser process in a second logical process within the common operating system, wherein the
`
`second logical process is capable of accessing data contained in the second memoryspace andis
`
`further capable of generating video data from the at least one website accessed via the network;
`
`and
`
`a video processor configured to process video data from the second web browser process
`
`for display;
`
`wherein the first web browserprocess is capable of opening the second web browser
`
`process andis further capable of passing data to the second web browser process;
`
`wherein further the portable computer is configured such that the at least one system file
`
`ARAC-OIRE1
`
`Page 9 of 44
`
`

`

`residing on the first memory space is protected from corruption by a malware process
`
`downloaded from the network and executing within the second web browserprocess.
`
`22.
`
`New) The portable computer of Claim 21 wherein the first web browser process
`
`is capable of directly exchanging data with the network interface device and with the second web
`
`browser process.
`
`23.
`
`New) The portable computer of Claim 22 wherein thefirst web browser process
`
`is capable of passing data downloaded from the network to the second web browserprocess.
`
`24.
`
`New) The portable computer of Claim 21 wherein the second web browser
`
`process is capable of directly exchanging data with the network interface device and with the
`
`first web browser process.
`
`25.
`
`New) The portable computer of Claim 21 wherein the at least one electronic data
`
`processor comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`26.
`
`New) The portable computer of Claim 21 wherein the second memory space
`
`comprises memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory
`
`(RAM); and
`
`both volatile and nonvolatile memory.
`
`ARAC-OIRE1
`
`Page 10 of 44
`
`

`

`27.
`
`New) The portable computer of Claim 21 configured such that at least one
`
`corrupted file required for a web browser process is capable of being restored from a protected
`
`image.
`
`28.
`
`New) The portable computer of Claim 27 wherein the protected image is stored
`
`at a location selected from the group consisting of:
`
`a removable drive;
`
`the first memory space;
`
`a partition on a memory device; and
`
`a nonvolatile memory disk.
`
`29.
`
`New) The portable computer of Claim 21 configured to close the second web
`
`browser process and automatically delete at least one file selected from the group consisting of a
`
`temporary internetfile, a cookie and a corruptedfile.
`
`30.
`
`New) The portable computer of Claim 21 configured such that the first web
`
`browser process is protected from executing instructions initiated by a malware process
`
`downloaded from the network and executing as part of the second web browser process.
`
`31.
`
`New) The portable computer of Claim 21 wherein attempts by malware to
`
`record data entry by the computer user are effectively blocked.
`
`32.
`
`New) A method of operating a portable computer capable of executin
`
`instructions using a common operating system and having at least one electronic data processor
`
`communicatively coupled to a first and second memory space and to a network interface device,
`
`comprising:
`
`exchanging data across a network of one or more computers with the network interface
`
`device and accessing at least one website;
`
`ARAC-OIRE1
`
`Page 11 of 44
`
`

`

`storing at least one system file within the first memory space;
`
`executing a first web browser process, capable of accessing data of the at least one
`
`website via the network,inafirst logical process within the common operating system using the
`
`at least one electronic data processor, wherein the first logical process is configured to access
`
`data containedin the first memory space;
`
`executing a second web browser process in a second logical process within the common
`
`operating system using the at least one electronic data processor, wherein the second logical
`
`process is configured to access data contained in the second memory space andis further
`
`configured to generate video data;
`
`opening the second web browser process on instruction from the first web browser
`
`process;
`
`passing data from the first web browser process to the second web browser process; and
`
`displaying website video data from the second web browserprocess;
`
`wherein the portable computer is configured such that the at least one system file residing
`
`on the first memory space is protected from corruption by a malware process downloaded from
`
`the network and executing as part of the second web browser process.
`
`33.
`
`New) The method of Claim 32 wherein the portable computer is configured such
`
`that the first web browser process is capable of directly exchanging data with the network
`
`interface device and with the second web browserprocess.
`
`34.
`
`New) The method of Claim 33 and further comprising downloading data from
`
`the network and passing the data from the first web browser process to the second web browser
`
`process.
`
`ARAC-OIRE1
`
`Page 12 of 44
`
`

`

`35.
`
`New) The method of Claim 32 wherein the portable computer is configured such
`
`that the second web browserprocess is capable of directly exchanging data with the network
`
`interface device and with the first web browserprocess.
`
`36.
`
`New) The method of Claim 32 wherein the second memory space comprises
`
`memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory
`
`(RAM); and
`
`both volatile and nonvolatile memory.
`
`37.
`
`New) The method of Claim 32 and further comprising ——restoring at least one
`
`corrupted file from a protected image.
`
`38.
`
`New) The method of Claim 37 wherein the protected image is stored at a
`
`location selected from the group consisting of:
`
`a removable drive;
`
`the first memory space;
`
`a partition on a memory device; and
`
`a nonvolatile memory disk.
`
`39.
`
`New) The method of Claim 32 and further comprising ——deleting at least one
`
`corrupted data file residing on the second memory space when the second logical process is
`
`terminated.
`
`AO.
`
`New) The method of Claim 32 wherein the at least one electronic data processor
`
`comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`ARAC-OIRE1
`
`Page 13 of 44
`
`

`

`a Field Programmable Gate Array;
`
`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`Al.
`
`New) The method of Claim 32 wherein the first web browser
`
`process is protected
`
`from executing instructions initiated by a malware process downloaded from the network and
`
`executing as part of the second web browserprocess.
`
`42.
`
`New) The method of Claim 32 and further comprising displaying video data
`
`from the first web browser process.
`
`43.
`
`New) The method of Claim 32 wherein attempts by malware to record data entr
`
`by the computeruser are effectively blocked.
`
`44.
`
`New) A method of operating a portable computer capable of executin
`
`instructions using a common operating system and comprising a network interface device,at
`
`least a first memory space and a second memoryspace, and at least one electronic data processor
`
`communicatively coupled to the network interface device, the first and second memory space,
`
`and to a user interface, comprising:
`
`exchanging data across a network of one or more computers with the network interface
`
`device and accessing at least one website;
`
`storing at least one system file in the first memory space;
`
`opening a first web browser process capable of accessing data of the at least one website
`
`via the network, wherein the first web browser process is capable of accessing data contained in
`
`the first memory space;
`
`opening a second web browser process, wherein the second web browserprocess is
`
`capable of accessing data contained in the second memoryspace, andis further capable of
`
`ARAC-OIRE1
`
`Page 14 of 44
`
`

`

`generating data for video display; and
`
`passing data from the first web browser process to the second web browser process;
`
`wherein the portable computer is configured such that the at least one system file residing
`
`on the first memory space is protected from corruption by a malware process downloaded from
`
`the network and executing as part of the second web browser process.
`
`45.
`
`New) The method of Claim 44 wherein the first web browser process is capable
`
`of directly exchanging data with the network interface device and with the second web browser
`
`process.
`
`46.
`
`New) The method of Claim 45 and further comprising ——downloading data
`
`from the network and passing the downloaded data from the first web browser process to the
`
`second web browser process.
`
`47.
`
`New) The method of Claim 46 and further comprising storing the downloaded
`
`data on the second memoryspace.
`
`48.
`
`New) The method of Claim 44 wherein the second web browserprocess is
`
`capable of directly exchanging data with the network interface device and with the first web
`
`browser process.
`
`49.
`
`New) The method of Claim 44 and further comprising ——restoring at least one
`
`corrupted file from a protected image.
`
`50.
`
`New) The method of Claim 49 wherein the protected image is stored at a
`
`location selected from the group consisting of:
`
`a removabledrive;
`
`the first memory space;
`
`ARAC-OIRE1
`
`Page 15 of 44
`
`

`

`a partition on a memory device; and
`
`a non-volatile memory disk.
`
`51.
`
`New) The method of Claim 44 further comprising closing the second web
`
`browser process and automatically deleting at least one file selected from the group consisting of
`
`a temporary internetfile, a cookie and a corruptedfile.
`
`52.
`
`New) The method of Claim 44 wherein the first web browser
`
`process is
`
`protected from executing instructions initiated by a malware process downloaded from the
`
`network and executing as part of the second web browserprocess.
`
`53.
`
`New) The method of Claim 44 and further comprising the first web browser
`
`process instructing the second web browserprocess to open.
`
`54.
`
`New) The method of Claim 44 wherein attempts by malware to record data entr
`
`by a computer user are effectively blocked.
`
`55.
`
`New) The method of Claim 44 wherein the at least one electronic data processor
`
`comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`56.
`
`New) The method of Claim 44 wherein the second memory space comprises
`
`memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`ARAC-OIRE1
`
`Page 16 of 44
`
`

`

`random access memory
`
`(RAM); and
`
`both volatile and nonvolatile memory.
`
`57.
`
`New) The method of Claim 44 and further comprising the first web browser
`
`process opening a plurality of second web browserprocesses.
`
`58.
`
`New) The portable computer of Claim 21 wherein the network interface device
`
`is capable of exchanging data with the network using a wireless connection.
`
`59.
`
`New) The portable computer of Claim 58 wherein the network comprises a
`
`cellular data carrier network.
`
`60.
`
`New) The method of Claim 32 wherein the network interface device is capable
`
`of exchanging data with the network using a wireless connection.
`
`61.
`
`New) The method of Claim 60 wherein the network comprisesa cellular data
`
`carrier network.
`
`62.
`
`New) The method of Claim 44 wherein the network interface device is capable
`
`of exchanging data with the network using a wireless connection.
`
`63.
`
`New) The method of Claim 62 wherein the network comprisesa cellular data
`
`carrier network.
`
`64.
`
`New) A computer program product comprising a program code stored in a non-
`
`transitory computer readable medium operable on computer capable of executing instructions
`
`using a common operating system and having at least one electronic data processor
`
`communicatively coupled to a first and second memory space and to a network interface device
`
`configured to exchange data across a network of one or more computers and access at least one
`
`website, configured to:
`
`store at least one system file within the first memory space;
`
`ARAC-OIRE1
`
`Page 17 of 44
`
`

`

`open a first web browser process, capable of accessing data of the at least one website via
`
`the network,in a first logical process, the first logical process being configured to access data
`
`contained in the first memory space;
`
`open a second web browser process in a second logical process, the secondlogical
`
`process being configured to access data contained in the second memory space; and
`
`pass data from the first web browser process to the second web browser process, wherein
`
`the at least one system file residing on the first memory space is protected from corruption by a
`
`malware process downloaded from the network and executing as part of the second web browser
`
`process.
`
`65.
`
`New) The computer program product of Claim 64 wherein the first web browser
`
`process is capable of opening the second web browser process and the program code stored in
`
`the non-transitory computer readable medium is further configured to pass data to the second
`
`web browserprocess.
`
`66.
`
`New) The computer program product of Claim 64 wherein the second logical
`
`process is configured to generate data for display and the program code stored in the non-
`
`transitory computer readable medium is further configured to process website video data from
`
`the second web browserprocess.
`
`67.
`
`New) The computer program product of Claim 64 wherein the first web browser
`
`process is capable of directly exchanging data with the network interface device and the second
`
`web browserprocess or the second web browser process is capable of directly exchanging data
`
`with the network interface device and the first web browser process.
`
`68.
`
`New) The computer program product of Claim 64 wherein at least one corrupted
`
`file for a web browser process is capable of being restored from a protectedfile.
`
`ARAC-OIRE1
`
`Page 18 of 44
`
`

`

`69.
`
`New) The computer program product of Claim 64 configured to close the
`
`second web browser process and automatically delete at least one file selected from the group
`
`consisting of a temporary internet file, a cookie and a corruptedfile.
`
`70.
`
`New) The computer program product of Claim 64 wherein the first web browser
`
`process is protected from executing instructions initiated by a malware process downloaded from
`
`the network and executing as part of the second web browser process.
`
`71.
`
`New) The computer program product of Claim 64 wherein attempts by malware
`
`to record data entry by a computeruser are effectively blocked.
`
`72.
`
`New) The computer program product of Claim 64 wherein the network interface
`
`device is capable of exchanging data with the network using a wireless connection.
`
`73.
`
`New) The computer program product of Claim 72 wherein the network
`
`comprises a cellular data carrier network.
`
`ARAC-OIRE1
`
`Page 19 of 44
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket