throbber
IN THE CLAIMS:
`
`1.
`
`(Thrice Amended) A methodof operating a computer system capable of
`
`exchanging data across a network of one or more computers and havingatleast a first and
`
`second electronic data processor capable of executing instructions using a commonoperating
`
`system, comprising[ the steps of]:
`
`executing a first browser processimstructions in a first logical process within the common
`
`operating system using the first electronic data processor, wherein the first logical process is
`
`capable of accessing data containedin a first memory space[ and a second memoryspace];
`
`executing a second browser processimstructions in a second logical process within the
`
`commonoperating system using the second electronic data processor, wherein the secondlogical
`
`process is capable of accessing data contained in the second memory space[, the secondlogical
`
`process being further capable of exchanging data across a network of one or more computers];
`
`and
`
`displaying[, in a windowed format on a display terminal,] data from thefirst logical
`
`process and the second logical process, wherein a video processor is adapted to combine data
`
`from the first and second logical processes and transmit the combined data to [the]a display[
`
`terminal];
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`corruption by a malware process downloaded from the network and executing as part of the
`
`second browserlesieat process.
`
`ARAC-OIRE1
`
`Page 3 of 47
`
`

`

`2.
`
`(Twice Amended) The method of claim 1 wherein the[ first memory space and
`
`the] second memory space [comprise separate regions of a common memoryspace is]comprises
`
`memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory
`
`(RAM): and
`
`both volatile and nonvolatile memory.
`
`3.
`
`(Twice Amended) The methodof claim 1 wherein thefirst logical process is
`
`
`
`capable of accessing data contained in the second memory spacesecondtesicalproeessis
`
`
`
`4,
`
`(Original) The methodof claim 1 wherein the first logical process receives user
`
`interface data, and passes the user interface data to the second logical process.
`
`5.
`
`(Original) The methodof claim 1 wherein the first and second electronic data
`
`processors are part of a multi-core electronic data processor.
`
`6.
`
`(Twice Amended) The method of claim 1 and further comprising[ the step of]
`
`restoring at least one corrupted data file[ residing on the second memory space] from [an]a
`
`protected image[ residing on the first memory space].
`
`7.
`
`(Amended) The method of claim | and further comprising[ the step of]
`
`automatically deleting at least one datafile residing on the second memory space when the
`
`second logical process is terminated.
`
`ARAC-OIRE1
`
`Page 4 of 47
`
`

`

`8.
`
`(Amended) The method of claim | and further comprising[ the steps of]:
`
`encrypting data with the first logical process;
`
`transferring the encrypted data from thefirst logical process to the second logical
`
`process;_and
`
`transferring the encrypted data from the secondlogical process to the network interface
`
`device.
`
`9.
`
`(Amended) The method of claim 8 and further comprising[ the steps of]:
`
`decrypting the data with the network interface device;_and
`
`transferring the decrypted data from the network interface device to the network.
`
`10.
`
`(Thrice Amended) A multi-processor computer system using a common
`
`operating system capable of exchanging data across a network of one or more computers via a
`
`network interface device, comprising:
`
`a first electronic data processor capable of executing a first browser processinstructons
`
`using the commonoperating system and communicatively coupled to a first memory space[ and
`
`a second memoryspace];
`
`a second electronic data processor capable of executing a second browser
`
`processinstructions using the commonoperating system and communicatively coupled to [the]a
`
`second memory space[ and a network interface device, wherein the second electronic data
`
`processor is capable of exchanging data across a network of one or more computers via the
`
`network interface device];_and
`
`a video processor adapted to combine video data from thefirst and second electronic data
`
`processors and transmit the combined video data to a display[ terminal for displaying the
`
`combines video data in a windowed format];
`
`ARAC-OIRE1
`
`Page 5 of 47
`
`

`

`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`corruption by a malware process downloaded from the network and executing as part of the
`
`second browser processenthe-secondelectronic-data-processor.
`
`11.
`
`(Twice Amended) The computer system of claim 10 wherein the[ first memory
`
`space and the] second memoryspace[ comprise separate regions of a common memory spaceis]
`
`comprises memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory
`
`(RAM); and
`
`both volatile and nonvolatile memory.
`
`12.
`
`(Original) The computer system of claim 10 wherein the first and second
`
`electronic data processors are part of a dual processor computer system.
`
`13.
`
`(Original) The computer system of claim 10 wherein the second electronic data
`
`processor andthe video processor are co-located on a circuit card, the circuit card being
`
`communicatively coupled to the first electronic data processor.
`
`14.
`
`(Original) The computer system of claim 10 wherein the computer system is
`
`configured such that the first electronic data processor is protected from executing instructions
`
`initiated by a malware process downloaded from the network and executing on the second
`
`electronic data processor.
`
`15.
`
`(Thrice Amended) A multi-processor computer system using a common
`
`operating system_capable of exchanging data across a network of one or more computers,
`
`comprising:
`
`ARAC-OIRE1
`
`Page 6 of 47
`
`

`

`at least a first and second electronic data processor capable of executing instructions
`
`using the commonoperating system;
`
`at least a first and second memory space;_and
`
`a video processor;
`
`wherein the first and second electronic data processors, first and second memoryspace,
`
`and video processor are configured to:[for performingthe steps of;]
`
`[executing]execute a first browser processimstructiens in a first logical process
`
`with the first electronic data processor, wherein the first logical process is executing within the
`
`commonoperating system and is capable of accessing data contained in the first memory space;
`
`[executing]execute a second browser processimstructions in a secondlogical
`
`process with the second electronic data processor, wherein the secondlogical process is
`
`executing within the commonoperating system andis capable of accessing data contained in the
`
`second memory space[, the second logical process being further capable of exchanging data
`
`across a network of one or more computers];_and
`
`[displaying, in a windowedformat on a display terminal,]display data from the
`
`first logical process and the second logical process, wherein the video processoris adapted to
`
`combinedata from the first and second logical processes and transmit the combined data to
`
`[the]a display[ terminal];
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`corruption by a malware process downloaded from the network and executing as part of the
`
`second browserlesieat process.
`
`ARAC-OIRE1
`
`Page 7 of 47
`
`

`

`16.
`
`(Original) The computer system of claim 15 wherein the computer system is
`
`further configured such that the first logical process is protected from executing instructions
`
`initiated by a malware process downloaded from the network and executing as part of the second
`
`logical process.
`
`17.
`
`(Twice Amended) The computer system of claim 15 and further comprising[:] at
`
`least one network interface device capable of exchanging data with[ both the secondlogical
`
`process and with] the network and with a logical process that comprises a process selected from
`
`the group consisting of:
`
`the first logical process; and
`
`the second logical process.
`
`18.
`
`(Original) The computer system of claim 17 wherein the network interface device
`
`is capable of decrypting data received from the secondlogical process and transmitting the
`
`decrypted data to the network while preventing the second logical process from accessing the
`
`decrypted data.
`
`19.
`
`(Amended) The computer system of claim 15 wherein the at least one electronic
`
`data processor[is]comprises a processor selected from the group consisting of[:] a multi-core
`
`electronic data processor; dual electronic data processors; and multiple electronic data
`
`processors.
`
`20.
`
`(Twice Amended) The computer system of claim 15 and further configured to
`
`restore[for performing the step of: restoring] at least one corrupted datafile[ residing on the
`
`second memoryspace] from [an]a protected image[ residing on the first memory space].
`
`21.
`
`New) A portable computer capable of executing instructions using
`
`a common
`
`operating system, comprising:
`
`ARAC-OIRE1
`
`Page 8 of 47
`
`

`

`a network interface device configured to exchange data across a network of one or more
`
`computers and access at least one website;
`
`at least a first memory space and a second memoryspace,the first memory space
`
`containing at least one system file;
`
`at least one electronic data processor communicatively coupled to the network interface
`
`device, the first and second memoryspace, and to a user interface, wherein the user interface is
`
`configured to receive input from a computer user;
`
`the at least one electronic data processor configured to execute a first browser process in
`
`a first logical process within the common operating system, wherein the first logical process is
`
`capable of accessing data contained in the first memory space;
`
`the at least one electronic data processor further configured to execute a second browser
`
`process in a secondlogical process within the common operating system, wherein the second
`
`logical process is capable of accessing data contained in the second memory space andis further
`
`capable of generating video data from a website accessed via the network; and
`
`a video processor configured to process video data from the second browserprocess for
`
`display;
`
`wherein the first browser process is capable of opening the second browser process andis
`
`further capable of passing data to the second browserprocess;
`
`wherein further the portable computer is configured such that the at least one system file
`
`residing on the first memory space is protected from corruption by a malware process
`
`downloaded from the network and executing within the second browser process.
`
`ARAC-OIRE1
`
`Page 9 of 47
`
`

`

`22.
`
`New) The portable computer of Claim 21 wherein the first browser process is
`
`capable of directly exchanging data with the network interface device and with the second
`
`browser process.
`
`23.
`
`New) The portable computer of Claim 22 wherein the first browser process is
`
`capable of passing data downloaded from the network to the second browserprocess.
`
`24.
`
`New) The portable computer of Claim 21 wherein the second browserprocess is
`
`capable of directly exchanging data with the network interface device and with the first browser
`
`process.
`
`25.
`
`New) The portable computer of Claim 21 wherein the at least one electronic data
`
`processor comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`26.
`
`New) The portable computer of Claim 21 wherein the second memory space
`
`comprises memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory
`
`(RAM): and
`
`both volatile and nonvolatile memory.
`
`27.
`
`New) The portable computer of Claim 21 configured such that at least one
`
`corrupted file required for a browser process is capable of being restored from a protected image.
`
`ARAC-OIRE1
`
`Page 10 of 47
`
`

`

`28.
`
`New) The portable computer of Claim 27 wherein the protected image is stored
`
`at a location selected from the group consisting of:
`
`a removable drive;
`
`the first memory space;
`
`a partition on a memory device; and
`
`a nonvolatile memory disk.
`
`29.
`
`New) The portable computer of Claim 21 configured such that at least one
`
`corrupted file residing on the second memoryspace is capable of being automatically deleted
`
`when the second browser process is terminated.
`
`30.
`
`New) The portable computer of Claim 21 configured such that the first browser
`
`process is protected from executing instructions initiated by a malware process downloaded from
`
`the network and executing as part of the second browserprocess.
`
`31.
`
`New) The portable computer of Claim 21 wherein attempts by malware to
`
`record data entry by the computer user are effectively blocked.
`
`32.
`
`New) A method of operating a portable computer capable of executin
`
`instructions using a common operating system and having at least one electronic data processor
`
`communicatively coupled to a first and second memory space and to a network interface device,
`
`comprising:
`
`exchanging data across a network of one or more computers with the network interface
`
`device and accessing at least one website;
`
`storing at least one system file within the first memory space;
`
`executing a first browser process in a first logical process within the commonoperating
`
`system using the at least one electronic data processor, wherein the first logical process is
`
`ARAC-OIRE1
`
`Page 11 of 47
`
`

`

`configured to access data contained in the first memory space;
`
`executing a second browserprocess in a second logical process within the common
`
`operating system using the at least one electronic data processor, wherein the second logical
`
`process is configured to access data contained in the second memory space andis further
`
`configured to generate video data;
`
`opening the second browser process on instruction from the first browser process;
`
`passing data from the first browser process to the second browser process; and
`
`displaying website video data from the second browser process;
`
`wherein the portable computer is configured such that the at least one system file residing
`
`on the first memory space is protected from corruption by a malware process downloaded from
`
`the network and executing as part of the second browserprocess.
`
`33.
`
`New) The method of Claim 32 wherein the portable computer is configured such
`
`that the first browser process is capable of directly exchanging data with the network interface
`
`device and with the second browserprocess.
`
`34,
`
`New) The method of Claim 33 and further comprising downloading data from
`
`the network and passing the data from the first browser process to the second browser process.
`
`35.
`
`New) The method of Claim 32 wherein the portable computer is configured such
`
`that the second browser process is capable of directly exchanging data with the network interface
`
`device and with the first browser process.
`
`36.
`
`New) The method of Claim 32 wherein the second memory space comprises
`
`memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`ARAC-OIRE1
`
`Page 12 of 47
`
`

`

`random access memory
`
`(RAM): and
`
`both volatile and nonvolatile memory.
`
`37.
`
`New) The method of Claim 32 and further comprising restoring at least one
`
`corrupted file from a protected image.
`
`38.
`
`New) The method of Claim 37 wherein the protected image is stored at a
`
`location selected from the group consisting of:
`
`a removable drive;
`
`the first memory space;
`
`a partition on a memory device; and
`
`a nonvolatile memory disk.
`
`39.
`
`New) The method of Claim 32 and further comprising deleting at least one
`
`corrupted data file residing on the second memory space when the second logical process is
`
`terminated.
`
`AO.
`
`New) The method of Claim 32 wherein the at least one electronic data processor
`
`comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`Al.
`
`New) The method of Claim 32 wherein the first browser process is protected
`
`from executing instructions initiated by a malware process downloaded from the network and
`
`executing as part of the second browserprocess.
`
`ARAC-OIRE1
`
`Page 13 of 47
`
`

`

`42.
`
`New) The method of Claim 32 and further comprising displaying video data
`
`from the first browser process.
`
`43.
`
`New) The method of Claim 32 wherein attempts by malware to record data entr
`
`by the computeruser are effectively blocked.
`
`44.
`
`New) A method of operating a portable computer comprising a network
`
`interface device, at least a first memory space and a second memoryspace,and at least one
`
`electronic data processor communicatively coupled to the network interface device, the first and
`
`second memoryspace, and to a user interface, comprising:
`
`exchanging data across a network of one or more computers with the network interface
`
`device and accessing at least one website;
`
`storing at least one system file in the first memory space;
`
`opening a first browser process, wherein the first browser process is capable of accessing
`
`data containedin the first memory space;
`
`opening a second browserprocess, wherein the second browserprocess is capable of
`
`accessing data contained in the second memory space, and is further capable of generating data
`
`for video display; and
`
`passing data from the first browser process to the second browserprocess;
`
`wherein the portable computer is configured such that the at least one system file residing
`
`on the first memory space is protected from corruption by a malware process downloaded from
`
`the network and executing as part of the second browserprocess.
`
`45.
`
`New) The method of Claim 44 wherein the first browser process is capable of
`
`directly exchanging data with the network interface device and with the second browser process.
`
`ARAC-OIRE1
`
`Page 14 of 47
`
`

`

`46.
`
`New) The method of Claim 45 and further comprising downloading data from
`
`the network and passing the downloaded data from the first browser process to the second
`
`browser process.
`
`47.
`
`New) The method of Claim 46 and further comprising storing the downloaded
`
`data on the second memoryspace.
`
`A8.
`
`New) The method of Claim 44 wherein the second browser process is capable of
`
`directly exchanging data with the network interface device and with the first browser process.
`
`49.
`
`New) The method of Claim 44 and further comprising restoring at least one
`
`corrupted file from a protected image.
`
`50.
`
`New) The method of Claim 49 wherein the protected image is stored at a
`
`location selected from the group consisting of:
`
`a removable drive;
`
`the first memory space;
`
`a partition on a memory device; and
`
`a non-volatile memory disk.
`
`51.
`
`New) The method of Claim 44 wherein at least one corrupted file residing on the
`
`second memory space is capable of being automatically deleted when the second browser
`
`process is terminated.
`
`52.
`
`New) The method of Claim 44 wherein the first browser process is protected
`
`from executing instructions initiated by a malware process downloaded from the network and
`
`executing as part of the second browserprocess.
`
`53.
`
`New) The method of Claim 44 and further comprising the first browser process
`
`instructing the second browser process to open.
`
`ARAC-OIRE1
`
`Page 15 of 47
`
`

`

`54.
`
`New) The method of Claim 44 wherein attempts by malware to record data entr
`
`by a computer user are effectively blocked.
`
`55.
`
`New) The method of Claim 44 wherein the at least one electronic data processor
`
`comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`56.
`
`New) The method of Claim 44 wherein the second memory space comprises
`
`memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory
`
`(RAM): and
`
`both volatile and nonvolatile memory.
`
`57.
`
`New) The method of Claim 44 and further comprising the first browser process
`
`opening a plurality of second browserprocesses.
`
`58.
`
`New) The portable computer of Claim 21 wherein the network interface device
`
`is capable of exchanging data with the network using a wireless connection.
`
`59.
`
`New) The portable computer of Claim 58 wherein the network comprises a
`
`cellular data carrier network.
`
`60.
`
`New) The method of Claim 32 wherein the network interface device is capable
`
`of exchanging data with the network using a wireless connection.
`
`ARAC-OIRE1
`
`Page 16 of 47
`
`

`

`61.
`
`New) The method of Claim 60 wherein the network comprises a cellular data
`
`carrier network.
`
`62.
`
`New) The method of Claim 44 wherein the network interface device is capable
`
`of exchanging data with the network using a wireless connection.
`
`63.
`
`New) The method of Claim 62 wherein the network comprises a cellular data
`
`carrier network.
`
`64.
`
`New) A computer program product comprising a program code stored in a non-
`
`transitory computer readable medium operable on computer capable of executing instructions
`
`using a common operating system and having at least one electronic data processor
`
`communicatively coupled to a first and second memory space and to a network interface device
`
`configured to exchange data across a network of one or more computers and access at least one
`
`website, configured to:
`
`store at least one system file within the first memory space;
`
`open a first browser process inafirst logical process, the first logical process being
`
`configured to access data contained in the first memory space;
`
`open a second browserprocess in a second logical process, the second logical process
`
`being configured to access data contained in the second memory space; and
`
`pass data from the first browser process to the second browser process, wherein the at
`
`least one system file residing on the first memory space is protected from corruption by a
`
`malware process downloaded from the network and executing as part of the second browser
`
`process.
`
`65.
`
`New) The computer program product of Claim 64 wherein the first browser
`
`process is capable of opening the second browserprocess and the program code stored in the
`
`ARAC-OIRE1
`
`Page 17 of 47
`
`

`

`non-transitory computer readable medium is further configured to pass data to the second
`
`browser process.
`
`66.
`
`New) The computer program product of Claim 64 wherein the second logical
`
`process is configured to generate data for display and the program code stored in the non-
`
`transitory computer readable medium is further configured to process website video data from
`
`the second browserprocess.
`
`67.
`
`New) The computer program product of Claim 64 wherein the first browser
`
`process is capable of directly exchanging data with the network interface device and the second
`
`browser process or the second browserprocess is capable of directly exchanging data with the
`
`network interface device and the first browser process.
`
`68.
`
`New) The computer program product of Claim 64 wherein at least one corrupted
`
`file for a browser process is capable of being restored from a protectedfile.
`
`69.
`
`New) The computer program product of Claim 64 wherein at least one corrupted
`
`file residing on the second memoryspace is capable of being deleted when the second browser
`
`process is terminated.
`
`70.
`
`New) The computer program product of Claim 64 wherein the first browser
`
`process is protected from executing instructions initiated by a malware process downloaded from
`
`the network and executing as part of the second browserprocess.
`
`71.
`
`New) The computer program product of Claim 64 wherein attempts by malware
`
`to record data entry by a computeruser are effectively blocked.
`
`72.
`
`New) The computer program product of Claim 64 wherein the network interface
`
`device is capable of exchanging data with the network using a wireless connection.
`
`ARAC-OIRE1
`
`Page 18 of 47
`
`

`

`73.
`
`New) The computer program product of Claim 72 wherein the network
`
`comprises a cellular data carrier network.
`
`ARAC-OIRE1
`
`Page 19 of 47
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket