throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Virginia 22313-1450
`www.uspto.gov
`
`APPLICATION NO.
`
`
`
`
` FILING DATE
`
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`
`
`
`CONFIRMATIONNO.
`
`12/720, 147
`
`03/09/2010
`
`Allen F. Rozman
`
`ARAC-O1REL
`
`8473
`
`25962
`
`7590
`
`11/14/2011
`
`SLATER & MATSIL, LLP.
`17950 PRESTON RD, SUITE 1000
`DALLAS, TX 75252-5793
`
`LAFORGIA, CHRISTIAN A
`ART UNIT
`PAPER NUMBER
`
`2439
`
`
`
`
`NOTIFICATION DATE
`
`DELIVERY MODE
`
`11/14/2011
`
`ELECTRONIC
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`Notice of the Office communication was sent electronically on above-indicated "Notification Date" to the
`following e-mail address(es):
`docketing @slater-matsil.com
`
`PTOL-90A (Rev. 04/07)
`
`

`

`
`Application No.
`Applicant(s)
`
`Office Action Summary
`
`
` 12/720,147 ROZMAN ETAL.
`Examiner
`Art Unit
`
`2439
`Christian LaForgia
`-- The MAILING DATEof this communication appears on the cover sheet with the correspondence address--
`Period for Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLYIS SET TO EXPIRE 3 MONTH(S) OR THIRTY(30) DAYS,
`WHICHEVER IS LONGER, FROM THE MAILING DATE OF THIS COMMUNICATION.
`Extensions of time may be available under the provisions of 37 CFR 1.136(a).
`In no event, however, may a reply be timely filed
`after SIX (6) MONTHS from the mailing date of this communication.
`If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`Any reply received by the Office later than three months after the mailing date of this communication, evenif timely filed, may reduce any
`earned patent term adjustment. See 37 CFR 1.704(b).
`
`1) Responsive to communication(s)filed on 29 August 2011.
`2a)X] This action is FINAL.
`2b) This action is non-final.
`3)L] An election was made bythe applicant in responseto a restriction requirement set forth during the interview on
`___; the restriction requirement and election have beenincorporated into this action.
`4)L] Sincethis application is in condition for allowance except for formal matters, prosecution as to the merits is
`closed in accordance with the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.
`
`Disposition of Claims
`
`5) Claim(s) 1-73 is/are pending in the application.
`
`5a) Of the above claim(s)
`is/are withdrawn from consideration.
`
`6)L] Claims)
`is/are allowed.
`7)X] Claim(s) 1-73 is/are rejected.
`8)L] Claim(s) ___ is/are objected to.
`9)L] Claim(s)___ are subject to restriction and/or election requirement.
`
`Application Papers
`
`Status
`
` U.S. Patent and Trademark Office
`
`10)L] The specification is objected to by the Examiner.
`11)] The drawing(s)filed on 09 March 2010 is/are: a)X] accepted or b)[_] objected to by the Examiner.
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121(d).
`12)L] The oath or declaration is objected to by the Examiner. Note the attached Office Action or form PTO-152.
`
`Priority under 35 U.S.C. § 119
`
`13)L_] Acknowledgmentis made ofa claim for foreign priority under 35 U.S.C. § 119(a)-(d) or (f).
`a)LJAll b)L] Some*c)L] None of:
`
`1.0] Certified copies of the priority documents have been received.
`2.L] Certified copies of the priority documents have been received in Application No.
`3.L] Copiesof the certified copies of the priority documents have been receivedin this National Stage
`application from the International Bureau (PCT Rule 17.2(a)).
`* See the attached detailed Office action for a list of the certified copies not received.
`
`Attachment(s)
`1) Cc Notice of References Cited (PTO-892)
`2) [J Notice of Draftsperson’s Patent Drawing Review (PTO-948)
`3) XX] Information Disclosure Statement(s) (PTO/SB/08)
`Paper No(s)/Mail Date 9/2/71.
`
`4) | Interview Summary (PTO-413)
`Paper No(s)/Mail Date. __
`5) L] Noticeof Informal Patent Application
`6) C Other:
`
`PTOL-326 (Rev. 03-11)
`
`Office Action Summary
`
`Part of Paper No./Mail Date 20111019
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 2
`
`1.
`
`2.
`
`DETAILED ACTION
`
`The amendmentof 29 August 2011 has been noted and madeof record.
`
`Claims 1-73 have been presented for examination.
`
`Response to Arguments
`
`3.
`
`Applicant's arguments with respect to the prior art rejections, filed 29 August 2011, have
`
`been fully considered but they are not persuasive.
`
`4,
`
`The Applicant argues that the prior art reference, Narin, does not disclose the claimed
`
`invention. Specifically, the Applicant argues that Narin’s disclosure of the secure application
`
`teaches away from thefirst browser process. The Examiner disagrees.
`
`5.
`
`Throughouthis arguments, the Applicant makesreferencethat the first browser processis
`
`a web process. It is noted that the features upon which applicantrelies, that the claimed
`
`browsers are actually web browsers, are not recited in the rejected claims. Although the claims
`
`are interpreted in light of the specification, limitations from the specification are not read into the
`
`claims. See In re Van Geuns, 988 F.2d 1181, 26 USPQ2d 1057 (Fed. Cir. 1993).
`
`6.
`
`Despite the Applicant’s arguments that the claimed browseris a web browser, the
`
`specification appears to give the term a broader meaning. Column 14, lines 27-45 and column
`
`16, lines 25-30 of the Applicant’s specification describe the first logical process as being a video
`
`gameand“including but not [being] limited to a word processor,” respectively. According to the
`
`Applicant’s specification, the claimedfirst logical process or first browser process could include
`
`a web browser, such as Internet Explorer or Netscape; a video game; or a word processor.
`
`7.
`
`Atthe very least, the prior art’s disclosure reads on the Applicant’s video game and word
`
`processor interpretations of browser. Video gamesare metbythe priorart’s disclosure of a
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 3
`
`secure rendering application since video gamesare applications that render interactive
`
`environments for users. Furthermore, the Applicant’s preferred embodiment in column 16, lines
`
`25-30 appears to be clearly anticipated by the Narin reference. The secure rendering application
`
`of Narin meets the limitation of the first browser processin a first logical process whenit is
`
`interpreted in accordance with this preferred embodiment. Therefore, the secure rendering
`
`application of the prior art does teach the first browser processin a first logical process when that
`
`limitation is interpreted in light of the specification to include web browsers, video games, and
`
`wordprocessing applications.
`
`8.
`
`Furthermore,the prior art’s disclosure of the secure rendering application is functionally
`
`equivalent to the Applicant’s claimedfirst browser processinafirst logical process. It is noted
`
`that the features upon which applicantrelies, such as the first browser process accessing Internet
`
`sites and/or data, are not recited in the rejected claims. Although the claims are interpreted in
`
`light of the specification, limitations from the specification are not read into the claims. See Jn
`
`re Van Geuns, 988 F.2d 1181, 26 USPQ2d 1057 (Fed. Cir. 1993). The claims only require that
`
`the first browser process in a logicalfirst process “is capable of accessing data contained in a
`
`first memory space” and being displayed in combination with the second logical process. As
`
`shown below,Narin discloses “a first browser process in a first logical process within the
`
`commonoperating system... wherein thefirst logical process is capable of accessing data
`
`contained in a first memory space” in at least figure 2 and paragraphs 0030 and 0031. Narin also
`
`showsthe first and second logical processes being combinedin a displayin at least figure 5, the
`
`abstract of the patent, and paragraph 0007. Therefore, the secure rendering application of Narin
`
`is at least functionally equivalentto the first browser process in a first logical process.
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 4
`
`9.
`
`The Applicant also argues that prior art does not teach the first and second browser
`
`processes being executed on first and second electronic data processors, respectively. The
`
`Examiner disagrees and arguesthat a prior art reference “may be relied uponforall that it would
`
`have reasonably suggested to one having ordinary skill in the art... 2’ M.P.E.P. § 2123; Merck
`
`& Co. v. Biocraft Laboratories, 874 F.2d 804 (Fed. Cir.), cert. denied, 493 U.S. 975 (1989).
`
`Narin discloses in paragraph 0019 that the prior art invention may be implemented in
`
`multiprocessor systems. Figure 2 illustrates the processes being executed separately, akin to
`
`being on separate processes. Based onat least these two sections, the prior art's disclosure
`
`reasonably suggests a technique for implementing the claimed invention in a multi-processor
`
`system, where the processes are executed on their own respective processor.
`
`10.
`
`See further prior art rejections set forth below.
`
`Information Disclosure Statement
`
`11.
`
`The information disclosure statement (IDS) submitted on 02 September 2011 is in
`
`compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure
`
`statement is being considered by the examiner.
`
`Terminal Disclaimer
`
`12.
`
`The terminal disclaimerfiled on 29 August 2011 disclaiming the terminal portion of any
`
`patent granted on this application which would extend beyond the expiration date of 12/720,207
`
`has been reviewed and is NOTaccepted.
`
`13.
`
`The Applicant used form PTO/SB/26, whichis incorrect since the double patenting
`
`rejection is not over a prior patent, but instead a co-pending application. The proper form is
`
`PTO/SB/25. Appropriate correction is required.
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 5
`
`Claim Rejections - 35 USC § 102
`
`14.
`
`The text of those sections of Title 35, U.S. Code not included in this action can be found
`
`in a prior Office action.
`
`15.
`
`Claims 1, 2, 4,5, 7, 10-12, 14-17, 19, 21-26, 29-48, 51-56, 58-67, and 69-73 are rejected
`
`under 35 U.S.C. 102(b) as being anticipated by U.S. Patent Application Publication No.
`
`2002/0002673 Al to Narin, hereinafter Narin.
`
`16.
`
`Asper claim 1, Narin teaches a methodof operating a computer system capable of
`
`exchanging data across a network of one or more computers and havingatleast a first and
`
`secondelectronic data processor capable of executing instructions using a commonoperating
`
`system, comprising the steps of:
`
`executing a first browser processinafirst logical process within the commonoperating
`
`system using the first electronic data processor, wherein the first logical process is capable of
`
`accessing data containedin a first memory space (Figures 2 [element 210, 212], 3 [element
`
`310]], 4 [step 402], paragraphs 0019, 0030, 0031, 0035, 0036, 0040, 0046, i.e. secure
`
`application);
`
`executing a second browserprocess in a second logical process within the common
`
`operating system using the second electronic data processor, wherein the second logical process
`
`is capable of accessing data contained in the second memory space (Figures 2 [elements 220,
`
`222], 3 [element 320], 4 [step 404], paragraphs 0019, 0032, 0037, 0040-0041, 0050-0051); and
`
`displaying data from the first logical process and the second logical process, wherein a
`
`video processor is adapted to combine data from the first and second logical processes and
`
`transmit the combined datato a display (Figures | [element 190], 5, Abstract, paragraphs 0007,
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 6
`
`0050, 0051, the second process renders its output in a child window ofthe first process, so that
`
`the use of a second process to host non-secure software objects is transparent to the user of the
`
`first process);
`
`wherein the computer system is configured such that data residing on the second
`
`electronic data processor is operating in a protected mode anddata residing on the first memory
`
`space is protected from corruption by a malware process downloaded from the network and
`
`executing as part of the second browserprocess (Abstract, paragraph 0035-0036, 0039, the first
`
`process’s address spaceis inaccessible to the second process; provides defense against from the
`
`non-secure software object (i.e. web browsing functions, from observing or modifying anything
`
`going on with the secure application)).
`
`17.
`
`Regarding claim 2, Narin teaches wherein the second memory space comprises memory
`
`selected from the group consisting of: a memory zone within a physical memory commonto the
`
`first memory space (Figure 2 [element 141], paragraph 0025); a partition on a memorydevice;
`
`random access memory (RAM) (Figure 2 [element 132], paragraph 0023); both volatile and
`
`nonvolatile memory.
`
`18.
`
`Regarding claim 4, Narin teaches wherein thefirst logical process receives user interface
`
`data and passesthe userinterface data to the secondlogical process (Figures 3 [elements 326,
`
`238], 4 [step 408], paragraphs 0037-0038, 0041-0042).
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 7
`
`19,
`
`Regarding claim 5, Narin teaches wherein the first and secondelectronic data processors
`
`are part of a multi-core electronic data processor (paragraph 0019, multi-core electronic data
`
`processor is the functional equivalent of a multiprocessor system, neatly packagedin a single-
`
`chip).
`
`20.
`
`Regarding claim 7, Narin teaches automatically deleting at least one data file residing on
`
`the second memory space whenthe secondlogical process is terminated (Figure 4 [step 412],
`
`paragraph 0044).
`
`21.
`
`Asper claims 10 and 15, Narin teaches a multiprocessor computer system (Figure 1
`
`[element 120], paragraphs 0019, 0021, multiprocessor systems) using a common operating
`
`system capable of exchanging data across a network of one or more computers via a network
`
`interface device, comprising:
`
`a first electronic data processor capable of executing a first browser process using the
`
`commonoperating system and communicatively coupled to a first memory space (Figures 2
`
`[element 210, 212], 3 [element 310]], 4 [step 402], paragraphs 0019, 0030, 0031, 0035, 0036,
`
`0040, 0046, i.e. secure application);
`
`a second electronic data processor capable of executing a second browserprocess using
`
`the commonoperating system and communicatively coupled to a second memory space (Figures
`
`2 [elements 220, 222], 3 [element 320], 4 [step 404], paragraphs 0019, 0032, 0037, 0040-0041,
`
`0050-0051);
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 8
`
`a video processor adapted to combine video data from the first and second electronic
`
`processors and transmit the combinedvideo data to a display (Figures | [element 190], 5,
`
`Abstract, paragraphs 0007, 0050, 0051, the second process renders its output in a child window
`
`of the first process, so that the use of a second process to host non-secure software objects is
`
`transparentto the user of the first process);
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode anddata residing on the first electronic memory spaceis
`
`protected from corruption by a malware process downloaded from the network and executing as
`
`part of the second browserprocess (Abstract, paragraph 0035-0036, 0039, the first process’s
`
`address spaceis inaccessible to the second process; provides defense against from the non-secure
`
`software object (i.e. web browsing functions, from observing or modifying anything going on
`
`with the secure application)).
`
`22.
`
`Regarding claim 11, Narin teaches wherein the second memory space comprises memory
`
`selected from the group consisting of: a memory zone within a physical memory commonto the
`
`first memory space (Figure 2 [element 141], paragraph 0025); a partition on a memorydevice;
`
`random access memory (RAM) (Figure 2 [element 132], paragraph 0023); both volatile and
`
`nonvolatile memory.
`
`23.
`
`Regarding claim 12, Narin teaches wherein the first and second electronic data processors
`
`are part of a dual processor computer system (Figure 1 [element 120], paragraphs 0019, 0021,
`
`multiprocessor systems).
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 9
`
`24.
`
`Regarding claims 14 and 16, Narin teaches wherein the computer system is configured
`
`such that the first electronic data processor is protected from executing instructionsinitiated by a
`
`malware process downloaded from the network and executing on the second electronic data
`
`processor (Abstract, paragraph 0035-0036, 0039, the first process’s address space is inaccessible
`
`to the second process; provides defense against from the non-secure software object (i.e. web
`
`browsing functions, from observing or modifying anything going on with the secure
`
`application)).
`
`25.
`
`Regarding claim 17, Narin teaches at least one network interface device capable of
`
`exchanging data with the network and with a logical process selected from the group consisting
`
`of: the first logical process and the second logical process (paragraph 0036, secure application
`
`312 may provide some type of web-browsing functionality, which would require exchanging
`
`data with the network interface device).
`
`26.
`
`Regarding claim 19, Narin teaches wherein the at least one electronic data processor
`
`comprises a processor selected from the group consisting of: a multi-core electronic data
`
`processor; dual electronic data processors (Figure | [element 120], paragraphs 0019, 0021,
`
`multiprocessor systems).
`
`27.
`
`Asper claim 21, Narin teaches a portable computer capable of executing instructions
`
`using a common operating system (paragraph 0019, i.e. handheld or laptop devices), comprising:
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 10
`
`a network interface device (Figure | [element 170]) configured to exchange data across a
`
`network of one or more computers and accessat least one website (paragraphs 0026, 0027, 0048,
`
`0049);
`
`at least a first memory space (Figure 2 [elements 132, 141, 212]) and a second memory
`
`space (Figure 2 [elements 132, 141, 222]), the first memory space containing at least one system
`
`file (Figure 1 [element 134], paragraphs 0030, 0031);
`
`at least one electronic data processor (Figure 1 [element 120]) communicatively coupled
`
`(Figure | [element 121], system bus) to the network interface device (Figure 1 [element 170]),
`
`the first (Figure 2 [elements 132, 141, 212]) and second memory space (Figure 2 [elements 132,
`
`141, 222]), and to a user interface, wherein the user interface is configured to receive input from
`
`a computer user (Figure | [element 160], paragraph 0025);
`
`the at least one electronic data processor configured to execute a first browser process in
`
`a first logical process, wherein the first logical process is capable of accessing data contained in
`
`the first memory space (Figures 2 [element 210, 212], 3 [element 310]], 4 [step 402], paragraphs
`
`0030, 0031, 0035, 0036, 0040, 0046, i.e. secure application);
`
`the at least one electronic data processor further configured to execute a second browser
`
`process in a second logical process within the commonoperating system (Figures 2 [element
`
`220], 3 [element 320], 4 [step 404], paragraphs 0032, 0037, 0040), wherein the second logical
`
`processis capable of accessing data contained in the second memory space (Figure 2 [elements
`
`220, 222]) and is further capable of generating video data from a website access via the network
`
`(Figures 3 [element 322], 4 [steps 406, 410], paragraphs 0040-0041,0050-0051, rendering
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 11
`
`webpage data, which oneof ordinary skill in the art would construe as containing video data, in
`
`the non-secure process);
`
`a video processor (Figure | [element 190]) configured to transmit video data from the
`
`second browserprocess to a display (Figure 5, Abstract, paragraphs 0007, 0050, 0051, the
`
`second process renders its output in a child window ofthe first process, so that the use of a
`
`second process to host non-secure software objects is transparent to the user of the first process);
`
`wherein the first browser process is capable of opening the second browser process andis
`
`further capable of passing data to the second browserprocess (Figures 3 [elements 326, 238], 4
`
`[step 408], paragraphs 0037-0038, 0041-0042, secure application mayinitiate the hosting of the
`
`non-secure software object by instructing the host application to load and execute a non-secure
`
`software object within the separate process);
`
`wherein further the portable computer is configured such that the at least one system file
`
`residing on the first memory space is protected from corruption by a malware process
`
`downloaded from the network and executing within the second browser process (Abstract,
`
`paragraph 0035-0036, 0039, the first process’s address space is inaccessible to the second
`
`process; provides defense against from the non-secure software object(i.e. web browsing
`
`functions, from observing or modifying anything going on with the secure application)).
`
`28.
`
`Regarding claim 22, Narin teaches wherein the first browser process is capable of
`
`exchanging data with the network interface device (paragraph 0036, secure application 312 may
`
`provide sometype of web-browsing functionality, which would require exchanging data with the
`
`network interface device) and with the second browserprocess (Figures 3 [elements 326, 238], 4
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 12
`
`[step 408], paragraphs 0037-0038, 0041-0042, secure application communicates with hosting
`
`application, which hosts non-secure objects).
`
`29. With regards to claim 23, Narin teaches wherein the first browser process is capable of
`
`passing data downloaded from the network to the second browserprocess (Figures 3 [elements
`
`326, 238], 4 [step 408], paragraphs 0037-0038, 0041-0042).
`
`30.
`
`Regarding claim 24, Narin teaches wherein the second browserprocess is capable of
`
`exchanging data with the network interface device (paragraph 0036, non-secure software object
`
`is a web browser, which includes the second process exchanging data via the network interface
`
`device) and with the first browser process (Figure 5, Abstract, paragraphs 0007, 0050, 0051, the
`
`second process communicates with the first process for the purpose of rendering its output in a
`
`child window ofthe first process).
`
`31.
`
`Regarding claim 25, Narin teaches wherein the at least one electronic data processoris
`
`selected from the group consisting of: an Application Specific Integrated Circuit; a Field
`
`Programmable Gate Array; a plurality of electronic data processors (Figure | [element 120],
`
`paragraphs 0019, 0021, multiprocessor systems); a multi-core electronic data processor.
`
`32.
`
`Regarding claim 26, Narin teaches wherein the second memory spaceis selected from the
`
`group consisting of: a memory zone within a physical memory commonto the first memory
`
`space (Figure 2 [element 141], paragraph 0025); a partition on a memory device; random access
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 13
`
`memory (RAM)(Figure 2 [element 132], paragraph 0023); both volatile and nonvolatile
`
`memory.
`
`33.
`
`Regarding claim 29, Narin teaches at least one corruptedfile residing on the second
`
`memoryspaceis capable of being automatically deleted when the second browserprocessis
`
`terminated (Figure 4 [step 412], paragraph 0044).
`
`34.
`
`Regarding claim 30, Narin teaches that the first browser process is protected from
`
`executing instructions initiated by a malware process downloaded from the network and
`
`executing as part of the second browser process (Abstract, paragraph 0035-0036, the first
`
`process’s address space is inaccessible to the second process).
`
`35.
`
`Regarding claim 31, Narin teaches wherein attempts by malware to record data entry by
`
`the computer user are effectively blocked (paragraph 0035, provide defense against observation
`
`and/or modification).
`
`36.
`
`Asper claim 32, Narin teaches a method of operating a portable computer (paragraph
`
`0019, i.e. handheld or laptop devices) capable of executing instructions using a common
`
`operating system and havingat least one electronic data processor (Figure | [element 120])
`
`communicatively coupled (Figure | [element 121], system bus) to a first (Figure 2 [elements
`
`132, 141, 212]) and second memoryspace (Figure 2 [elements 220, 222]) and to a network
`
`interface device (Figure 1 [element 170]), comprising:
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 14
`
`exchanging data across a network of one or more computers with the network interface
`
`device and accessing at least one website (paragraphs 0026, 0027, 0048, 0049);
`
`storing at least one system file within the first memory space (Figures | [element 134], 2
`
`[elements 132, 141, 212], paragraphs 0030, 0031);
`
`executing a first browser process inafirst logical process within the commonoperating
`
`system using the at least one electronic data processor, wherein the first logical process is
`
`configured to access data contained in the first memory space (Figures 2 [element 210, 212], 3
`
`[element 310]], 4 [step 402], paragraphs 0030, 0031, 0035, 0036, 0040, 0046, i.e. secure
`
`application);
`
`executing a second browserprocessin a second logical process within the common
`
`operating system using the at least one electronic data processor (Figures 2 [element 220], 3
`
`[element 320], 4 [step 404], paragraphs 0032, 0037, 0040), wherein the second logical process is
`
`configured to access data contained in the second memoryspace (Figure 2 [elements 220, 222])
`
`and is further configured to generate video data (Figures 3 [element 322], 4 [steps 406, 410],
`
`paragraphs 0040-0041,0050-0051, rendering webpage data, which one of ordinary skill in the art
`
`would construe as containing video data, in the non-secure process);
`
`opening the second browserprocess on instruction from the first browser process
`
`(Figures 3 [elements 326, 238], 4 [step 408], paragraphs 0037-0038, 0041-0042, secure
`
`application mayinitiate the hosting of the non-secure software object by instructing the host
`
`application to load and execute a non-secure software object within the separate process);
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 15
`
`passing data from the first browser process to the second browserprocess (Figures 3
`
`[elements 326, 238], 4 [step 408], paragraphs 0037-0038, 0041-0042, secure application
`
`communicates with hosting application, which hosts non-secure objects);
`
`displaying website video data from the second browser process (Figure 5, Abstract,
`
`paragraphs 0007, 0050, 0051, the second process renders its output in a child window ofthefirst
`
`process, so that the use of a second process to host non-secure software objects is transparent to
`
`the user of the first process);
`
`wherein the portable computer is configured such that the at least one system file residing
`
`on the first memory space is protected from corruption by a malware process downloaded from
`
`the network and executing as part of the second browserprocess (Abstract, paragraph 0035-
`
`0036, 0039, the first process’s address space is inaccessible to the second process; provides
`
`defense against from the non-secure software object (i.e. web browsing functions, from
`
`observing or modifying anything going on with the secure application)).
`
`37.
`
`Regarding claim 33, Narin teaches wherein the portable computer is configured such that
`
`the first browser process is capable of exchanging data with the network interface device
`
`(paragraph 0036, secure application 312 may provide some type of web-browsing functionality,
`
`which would require exchanging data with the network interface device) and with the second
`
`browserprocess (Figures 3 [elements 326, 238], 4 [step 408], paragraphs 0037-0038, 0041-0042,
`
`secure application communicates with hosting application, which hosts non-secure objects).
`
`38. With regards to claim 34, Narin teaches downloading data from the network and passing
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 16
`
`the data from the first browser process to the second browserprocess (Figures 3 [elements 326,
`
`238], 4 [step 408], paragraphs 0037-0038, 0041-0042).
`
`39,
`
`Regarding claim 35, Narin teaches wherein the portable computer is configured such that
`
`the second browserprocess is capable of directly exchanging data with the networkinterface
`
`device (paragraph 0036, non-secure software object is a web browser, which includes the second
`
`process exchanging data via the network interface device) and with the first browser process
`
`(Figure 5, Abstract, paragraphs 0007, 0050, 0051, the second process communicates with the
`
`first process for the purpose of rendering its output in a child windowofthefirst process).
`
`AQ.
`
`Regarding claim 36, Narin teaches wherein the second memory spaceis selected from the
`
`group consisting of: a memory zone within a physical memory commonto the first memory
`
`space (Figure 2 [element 141], paragraph 0025); random access memory (RAM)(Figure 2
`
`[element 132], paragraph 0023); both volatile and nonvolatile memory.
`
`Al.
`
`Regarding claim 39, Narin teaches deleting at least one corrupted datafile residing on the
`
`second memory space whenthe secondlogical process is terminated (Figure 4 [step 412],
`
`paragraph 0044).
`
`42.
`
`Regarding claim 40, Narin teaches wherein the at least one electronic data processoris
`
`selected from the group consisting of: an Application Specific Integrated Circuit; a Field
`
`Programmable Gate Array; a plurality of electronic data processors (Figure | [element 120],
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 17
`
`paragraphs 0019, 0021, multiprocessor systems); a multi-core electronic data processor.
`
`43.
`
`Regarding claim 41, Narin teaches wherein the first browser process is protected from
`
`executing instructions initiated by a malware process downloaded from the network and
`
`executing as part of the second browser process (Abstract, paragraph 0035-0036, the first
`
`process’s address space is inaccessible to the second process).
`
`44.
`
`Regarding claim 42, Narin teaches displaying video data from the first browser process
`
`(Figure 5, Abstract, paragraphs 0007, 0050, 0051, the second process renders its output in a child
`
`windowofthe first process, so that the use of a second processto host non-secure software
`
`objects is transparentto the user of the first process).
`
`45.
`
`Regarding claim 43, Narin teaches wherein attempts by malware to record data entry by
`
`the computer user are effectively blocked (paragraph 0035, provide defense against observation
`
`and/or modification).
`
`46.
`
`Asper claims 44 and 64, Narin teaches a method of and non-transitory computer readable
`
`medium containing instructions for operating a portable computer (paragraph 0019, i.e. handheld
`
`or laptop devices) comprising a network interface device (Figure | [element 170]), at least a first
`
`memoryspace (Figure 2 [elements 132, 141, 212]) and a second memoryspace (Figure 2
`
`[elements 220, 222]), and at least one electronic data processor communicatively coupled (Figure
`
`

`

`Application/Control Number: 12/720,147
`
`Art Unit: 2439
`
`Page 18
`
`1 [element 121], system bus) to the network interface device, the first and second memory space,
`
`and to a user interface, comprising:
`
`exchanging data across a network of one or more computers with the networkinterface
`
`device and accessing at least one website (paragraphs 0026, 0027, 0048, 0049);
`
`storing at least one system file in the first memory space (Figures | [element 134], 2
`
`[elements 132, 141, 212], paragraphs 0030, 0031);
`
`opening a first browser process, wherein the first browser process is capable of accessing
`
`data containedin the first memory space (Figures 2 [element 210, 212], 3 [element 310]], 4 [step
`
`402], paragraphs 0030, 0031, 0035, 0036, 0040, 0046, i.e. secure application);
`
`opening a second browserprocess (Figures 2 [element 220], 3 [element 320], 4 [step
`
`404], paragraphs 0032, 0037, 0040), wherein the second browserprocess is capable of accessing
`
`data contained in the second memoryspace (Figure 2 [elements 220, 222]), and is further
`
`capable of generating data for video display (Figures 3 [element 322], 4 [steps 406, 410],
`
`paragraphs 0040-0041,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket