throbber
REMARKS
`
`The Applicants have carefully considered this application in connection with the
`
`Examiner’s Office Action and respectfully request reconsideration of this application in view of
`
`the foregoing amendments and the following remarks.
`
`The Applicants previously submitted Claims 1-73 in the application. While Claims 1, 10,
`
`15, 21-24, 27, 29, 30, 32-35, 41, 42, 44-46, 48, 51-53, 57 and 64-70 have been amended, no
`
`claims have been cancelled herein. For the Examiner’s benefit, the Applicants have provided an
`
`Appendix II to clearly show the amendmentsto the specification and claims from the amendment
`
`filed on April 29, 2011. Also, the Examiner has indicated that Claims 8, 9, 13 and 18 would be
`
`allowable if rewritten in independent form including all of the limitations of the base claim and
`
`any intervening claims. Accordingly, Claims 1-73 are currently pending in the application.
`
`I,
`
`Rejections under 35 U.S.C. §102
`
`The Examinerhas rejected Claims 1, 2, 4, 5, 7, 10-12, 14-17, 19, 21-26, 29-48, 51-56,
`
`58-67 and 69-73 under 35 U.S.C. §102(b) as being anticipated by U.S. Patent Application
`
`Publication No. 2002/0002673 to Narin. As the Examineris no doubt aware, anticipation
`
`requires that each and every limitation of the claimed invention be disclosed in a single prior art
`
`reference. The disclosed limitations must either be disclosed expressly or inherently and must be
`
`arrangedas in the rejected claims.
`
`Regarding independentClaims 1, 10, 15, 21, 32, 44 and 64 of the present application, the
`
`Applicants have amended the claims in accordance with the Examiner suggestion to further the
`
`prosecution thereof in an expeditious manner. (Examiner’s Office Action, pp. 2-4.) In
`
`ARAC-OIRE1
`
`Page 20 of 44
`
`

`

`accordance therewith, the Applicants believe that Narin does not disclose a computer system,
`
`portable computer, computer program product or related methodas recited in ones of
`
`independent Claims 1, 10, 15, 21, 32, 44 and 64 of the present application. In particular, the
`
`Applicants believe that Narin fails to disclose, among other things, a computer system, portable
`
`computer, computer program product or related method configured to execute (or open)afirst
`
`web browser process capable of accessing data of a website via a network of one or more
`
`computers(e.g., the internet) as recited in ones of independent Claims 1, 10, 15, 21, 32, 44 and
`
`64 of the present application.
`
`Narin, therefore, fails to disclose the limitations of independent Claims 1, 10, 15, 21, 32,
`
`44 and 64, and the claims dependent thereon. Accordingly, the Applicants respectfully request
`
`the Examiner to withdraw the §102 rejection in view thereof with respect to Claims 1, 2, 4, 5, 7,
`
`10-12, 14-17, 19, 21-26, 29-48, 51-56, 58-67 and 69-73 of the present application.
`
`IL.
`
`Rejections under 35 U.S.C. §103(a)
`
`The Examinerhas rejected Claims 3 and 57 under 35 U.S.C. § 103(a) as being
`
`unpatentable over Narin. The Examinerhas rejected Claims 6, 20, 27, 28, 37, 38, 49, 50 and 68
`
`under 35 U.S.C. § 103(a) as being unpatentable over Narin in view of U.S. Patent No. 7,024,581
`
`to Wang,ef al. (‘Wang’’). For the reasons as set forth herein, Narin fails to teach or suggest a
`
`method of operating a computer system, a multi-processor computer system, a portable computer
`
`and method of operating the same, and a computer program productas recited in ones of
`
`independentClaims 1, 15, 21, 32, 44 and 64, and Wangfails to cure the deficiencies thereof.
`
`Thus, since Narin fails to teach or suggestall of the limitations of independent Claims 1, 15, 21,
`
`32, 44 and 64, and the secondaryreferencefails to cure the deficiencies thereof, the Examiner
`
`ARAC-OIRE1
`
`Page 21 of 44
`
`

`

`cannotestablish a prima facie case of obviousness of Claims3, 6, 20, 27, 28, 37, 38, 49, 50, 57
`
`and 68, which depend from ones thereof. Accordingly, the Applicants respectfully request the
`
`Examinerto withdraw the §103 rejection with respect to Claims 3, 6, 20, 27, 28, 37, 38, 49, 50,
`
`57 and 68 of the present application.
`
`II.
`
`Double Patenting
`
`The Examinerhas provisionally rejected Claims 21-73 on the groundsof nonstatutory
`
`double patenting over Claims 21-55 of co-pending U.S. Patent Application Serial No.
`
`12/720,207 to Rozman,et al. Although the Applicants do not necessarily agree, the Applicant
`
`has filed a Terminal Disclaimer herewith directed to U.S. Patent Application Serial No.
`
`12/720,207 in compliance with 37 CFR §1.321 to overcome the Examiner’s rejection thereto.
`
`ARAC-OIRE1
`
`Page 22 of 44
`
`

`

`IV.
`
`Conclusion
`
`In view of the foregoing amendments and remarks, the Applicants nowseeall of the
`
`claims currently pending in this application to be in condition for allowance and therefore
`
`earnestly solicit a Notice of Allowancetherefor.
`
`The Applicants request that the Examiner telephone the undersigned attorney of record at
`
`(972) 732-1001 if such would further expedite the prosecution of the present application. If the
`
`enclosed fees are insufficient, the Commissioner is hereby authorized to charge any additionalfees,
`
`or credit any overpayments, to Deposit Account No. 50-1065.
`
`Respectfully submitted,
`
`/Glenn W. Boisbrun/
`
`Glenn W. Boisbrun
`Attorney for Applicant
`Reg. No. 39,615
`
`January 24, 2012
`
`Date
`
`Slater & Matsil, L.L.P.
`17950 Preston Rd., Suite 1000
`Dallas, Texas 75252-5793
`Tel. 972-732-1001
`
`Fax: 972-732-9218
`
`ARAC-OIRE1
`
`Page 23 of 44
`
`

`

`APPENDIXI
`
`STATUS OF CLAIMS AND
`SUPPORT FOR CLAIM CHANGES
`
`
`Four Times|Col 9 lines 30-37 Col 11 lines 2-4 Col 16 lines 24-30
`
`Amended
`Fig. 1, 190, 195
`Fig. 1, 120, 191,
`Col 6 lines 56-60
`Col 18 lines 3-5
`190, 110, 130
`Col 10 line 67
`Claim 3
`
`Amended
`
`Col 16 lines 44-47
`
`Col 10 lines 34-37
`
`eoAmended
`——————————EEE
`Twice
`Fig.aE420 See12 lines 46-58
`
`S|Original
`
`Amended
`7|Amended|Col 18 lines 49-52, [||
`8|Amended|Col 18lines53-60 [||
`}9__|Amended_|Col 18lines61-65 ||
`
`
`Four Times|Col 9 lines 30-37 Col 11 lines 2-4 Col 16 lines 24-30
`
`Amended
`Fig. 1, 190, 195
`Fig. 1, 120, 191,
`Col 6 lines 56-60
`Col 18 lines 3-5
`190, 110, 130
`Col 10 line 67
`Claim 3
`
`Twice
`
`Col 18 lines 30-33
`
`Col 16 lines 19-21
`
`Col 9 lines 48-52
`
`Amended ae16 lines 44-47 ae10 lines 34-37
`p12|Original3oo
`4OriginalEEE
`
`
`Four Times|Col 9 lines 30-37 Col 11 lines 2-4 Col 16 lines 24-30
`
`Amended
`Fig. 1, 190, 195
`Fig. 1, 120, 191,
`Col 6 lines 56-60
`190, 110, 130
`Col 10 line 67
`
`16Original=|
`17
`Twice
`
`a3
`
`Fig. 1, 120, 191,nnTe
`
`
`
`PrPins[PEETO
`mene
`
`
`
`21 Fig. 1, 120, 150, 160|Fig. 1, 120, 140Col 9 lines 30-37
`
`Fig. 1, 190
`Col 16 lines 24-30
`Fig. 1, 140, 170, 180
`Col 7 lines 63-67
`Col 6 lines 56-60
`Col 18 lines 23-28
`Col 9 line 53
`Col 10 line 67
`Col 18 lines 3-5
`
`ARAC-OIRE1
`
`Page 24 of 44
`
`

`

`Col 8 lines 1-6
`190, 110, 130
`[Fig1,120,191,190]|
`
`rEe€
`e€|
`
`‘WwW
`
`‘WwW
`
`Cw
`
`e
`
`‘WwW
`
`190, 195
`
`.|Fig.1,140,190|1, 140, pO
`
`
`|Col14lines62-67_|Col9lines30-47[|
`-
`-
`
`COLTSTines30-38Col 16 lines 44-47 Col 10 lines 34-37
`
`Zz
`
`
`
`Ww
`|Fig.4,420|Col12lines46-58
`‘WwW
`Col 7 lines 13-16
`[Col8lines23-260|
`[Col19lines33-37,|
`[Col7lines58-62|
`Col 9 lines 30-37
`Col 16 lines 24-30
`Fig. 1, 190
`Col 6 lines 56-60
`Col 7 lines 63-67
`Col 10 line 67
`Col 9 line 53
`Col 11 lines 2-4
`Fig. 1, 120, 191,
`Col 8 lines 1-6
`190, 110, 130
`Fig. 1,120,191,190[Po
`Zze€
`‘WwW
`Fig. 1,120,191,|Col 11 lines 38-41
`190, 195
`Fig. 1,140,190 |
`Col 18 lines 30-33
`Col 16 lines 19-21
`Col 16 lines 44-47
`Fig. 4, 420
`Col 12 lines 46-58
`Col 12 lines 46-58
`Col 7 lines 13-16
`ColSlines 23-36 |
`Col 14 lines 62-67
`Col 9 lines 30-47
`Pp
`
`e€
`
`e€
`e
`‘WwW
`ew
`ew
`
`‘WwW
`
`e€|
`e€|
`
`e€
`
`‘WwW
`
`cei
` Z,o=
`Col7lines58-62[|=|il
`
` New
`
`Fig. 1, 120, 140
`Fig. 1, 140, 170, 180
`Col 18 lines 23-28
`Claim 3
`
`Col 9 lines 48-52
`Col 10 lines 34-37
`
`Col 19 lines 33-37
`Fig.
`1, 120, 170,
`171, 180
`
`‘WwW
`
`Cw
`
`e€
`
`e€
`
`‘WwW
`
`‘WwW
`
`‘WwW
`
`‘WwW
`
`e
`e
`ew
`
`ew
`
`Col 9 lines 30-37
`Fig. 1, 190
`Col 7 lines 63-67
`Col 9 line 53
`Fig. 1, 120, 191,
`190, 110, 130
`45|New|Fig.1,120,191,190]|
`
`Col 16 lines 24-30
`Col 6 lines 56-60
`Col 10 line 67
`Col 11 lines 2-4
`Col 8 lines 1-6
`
`Fig. 1, 120, 140
`Fig. 1, 140, 170, 180
`Col 18 lines 25-28
`Claim 3
`
`190, 195
`47|NewFig.3,320,|
`48 Fig. 1, 140, 190 New
`
`
`
`ARAC-OIRE1
`
`Page 25 of 44
`
`

`

`
`
`49
`
`1Olines19-22,| |
`ff
` Z,o=
`e€i
`
`
`New
`‘WwW
`Ne
`Cw
`
`Cw
`
`N N N
`
`Fig. 4, 420
`Col 12 lines 46-58
`Pp
`Col 12 lines 46-58
`Col 7 lines 13-16
`- ee
`Col 8 lines 23-26
`ee
`Col 19 lines 33-37
`Fig2.22000|
`‘WwW
`e
`[Col7lines58-62||
`‘WwW
`Ne
`
`|Col14lines62-67|Col9lines30-47,[|
`‘WwW
`Ne
`‘WwW
`Col 18 lines 30-33
`Col 16 lines 19-21
`Col 9 lines 48-52
`Ne
`
`"
`
`eee[attetnes447|Cottotines3237
`
`e€
`‘WwW
`[Col
`e€
`‘WwW
`Col 1 and 2
`US PAT6216,112 |
`e€
`‘WwW
`CollOlines 19-22,||
`e€
`‘WwW
`Col 1 and 2
`US PAT6,216,112 |
`‘WwWe
`ew[Col10lines19-22,|
`ew
`
`Col 9 lines 30-37
`Fig. 1, 190
`Col 7 lines 63-67
`Col 9 line 53
`Fig. 1, 120, 191,
`190, 110, 130
`Fig.
`1, 120, 191,
`Col 11 lines 38-41
`190, 195
`Col 13 lines 22-24
`Fig}|e€
`‘WwW
`e€
`‘WwW
`
`‘WwW
`
`e|
`
`Col 16 lines 24-30
`Col 6 lines 56-60
`Col 10 line 67
`Col 11 lines 2-4
`Col 8 lines 1-6
`
`Fig. 1, 120, 140
`Fig. 1, 140, 170, 180
`Col 18 lines 25-28
`Claim 3
`
`Fig 2, 220
`
`Cw
`
`[Col8lines23-26|
`e€
`‘WwW
`w[Col19lines33-37,|
`ew |Col7lines58-62|
`
`ew[Col10lines19-22|
`Zz,
`ew
`Col 1 and 2
`US PAT 6,216,112
`~ uo
`
`ARAC-OIRE1
`
`Page 26 of 44
`
`

`

`APPENDIX II
`
`SPECIFICATION AS AMENDED ACCORDING TO STANDARD AMENDMENT
`FORMAT
`
`Kindly amend the “Cross Reference to Multiple Reissue Applications” section as set
`
`forth below:
`
`Cross Reference to Multiple Reissue Applications
`
`This application is a reissue application of U.S. Patent No. 7,484,247, entitled “System
`
`and Method for Protecting a Computer System from Malicious Software,” issued on January 27,
`
`2009, and is related to another reissue application designated U.S. Patent Application Serial No.
`
`12/720,207 from U.S. Patent No. 7,484,247 filed concurrently herewith, which are incorporated
`
`herein by reference. This application is also related to another reissue application designated
`
`U.S. Patent Application Serial No. 12/854,149 (now, U.S. Patent No. RE43,103) from U.S.
`
`Patent No. 7,484,247 filed on August 10, 2010 and a continuation application therefrom
`
`designated U.S. Patent Application Serial No. 13/015,186 filed on January 27, 2011, which are
`
`incorporated herein by reference. This application is also related to another reissue application
`
`designated U.S. Patent Application Serial No. 12/941,067 from U.S. Patent No. 7,484,247 filed
`
`on November7, 2010, which is incorporated herein by reference.
`
`ARAC-OIRE1
`
`Page 27 of 44
`
`

`

`CLAIMS AS AMENDED ACCORDING TO STANDARD AMENDMENT FORMAT
`
`1.
`
`(Currently Amended) A methodof operating a computer system capable of
`
`exchanging data across a network of one or more computers and havingatleast a first and
`
`second electronic data processor capable of executing instructions using a commonoperating
`
`system, comprising:
`
`executing a first webbrowser process, capable of accessing data of a website via the
`
`network, in a first logical process within the commonoperating system using thefirst electronic
`
`data processor, wherein the first logical process is capable of accessing data containedinafirst
`
`memory space;
`
`executing a second webbrowserprocess in a second logical process within the common
`
`operating system using the second electronic data processor, wherein the second logical process
`
`is capable of accessing data contained in the second memoryspace; and
`
`displaying data from thefirst logical process and the second logical process, wherein a
`
`video processor is adapted to combine data from the first and second logical processes and
`
`transmit the combined datato a display;
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`corruption by a malware process downloaded from the network and executing as part of the
`
`second webbrowserprocess.
`
`2.
`
`(Previously Presented) The method of claim | wherein the second memory space
`
`comprises memory selected from the group consisting of:
`
`ARAC-OIRE1
`
`Page 28 of 44
`
`

`

`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory (RAM); and
`
`both volatile and nonvolatile memory.
`
`3.
`
`(Previously Presented) The method of claim | wherein thefirst logical process is
`
`capable of accessing data contained in the second memory spaces.
`
`4,
`
`(Previously Presented) The method of claim | wherein the first logical process
`
`receives user interface data, and passesthe user interface data to the second logical process.
`
`5.
`
`(Previously Presented) The method of claim | wherein the first and second
`
`electronic data processors are part of a multi-core electronic data processor.
`
`6.
`
`(Previously Presented) The method of claim | and further comprising restoring at
`
`least one corrupted data file from a protected image.
`
`7.
`
`(Previously Presented) The method of claim | and further comprising
`
`automatically deleting at least one datafile residing on the second memory space when the
`
`second logical process is terminated.
`
`8.
`
`(Previously Presented) The method of claim | and further comprising:
`
`encrypting data with the first logical process;
`
`transferring the encrypted data from thefirst logical process to the second logical
`
`process; and
`
`transferring the encrypted data from the secondlogical process to the network interface
`
`device.
`
`ARAC-OIRE1
`
`Page 29 of 44
`
`

`

`9.
`
`(Previously Presented) The method of claim 8 and further comprising:
`
`decrypting the data with the network interface device; and
`
`transferring the decrypted data from the network interface device to the network.
`
`10.
`
`(Currently Amended) A multi-processor computer system using a common
`
`operating system capable of exchanging data across a network of one or more computers via a
`
`network interface device, comprising:
`
`a first electronic data processor capable of executing a first webbrowser process using
`
`the commonoperating system and communicatively coupled to a first memory space, the first
`
`web browserprocess capable of accessing data of a website via the network;
`
`a second electronic data processor capable of executing a second webbrowser process
`
`using the commonoperating system and communicatively coupled to a second memory space;
`
`and
`
`a video processor adapted to combine video data from thefirst and second electronic data
`
`processors and transmit the combined video data to a display;
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`corruption by a malware process downloaded from the network and executing as part of the
`
`second webbrowserprocess.
`
`11.
`
`(Previously Presented) The computer system of claim 10 wherein the second
`
`memory space comprises memoryselected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`ARAC-OIRE1
`
`Page 30 of 44
`
`

`

`random access memory (RAM); and
`
`both volatile and nonvolatile memory.
`
`12.
`
`(Previously Presented) The computer system of claim 10 wherein the first and
`
`second electronic data processors are part of a dual processor computer system.
`
`13.
`
`(Previously Presented) The computer system of claim 10 wherein the second
`
`electronic data processor and the video processorare co-located on a circuit card, the circuit card
`
`being communicatively coupledto the first electronic data processor.
`
`14.
`
`(Previously Presented) The computer system of claim 10 wherein the computer
`
`system is configured suchthat the first electronic data processor is protected from executing
`
`instructionsinitiated by a malware process downloaded from the network and executing on the
`
`secondelectronic data processor.
`
`15.
`
`(Currently Amended) A multi-processor computer system using a common
`
`operating system capable of exchanging data across a network of one or more computers,
`
`comprising:
`
`at least a first and second electronic data processor capable of executing instructions
`
`using the commonoperating system;
`
`at least a first and second memory space; and
`
`a video processor;
`
`wherein the first and second electronic data processors, first and second memoryspace,
`
`and video processor are configured to:
`
`execute a first webbrowser process, capable of accessing data of a website via the
`
`network, in a first logical process with the first electronic data processor, wherein the first logical
`
`process is executing within the common operating system and is capable of accessing data
`
`ARAC-OIRE1
`
`Page 31 of 44
`
`

`

`contained in the first memory space;
`
`execute a second webbrowser process in a second logical process with the second
`
`electronic data processor, wherein the second logical process is executing within the common
`
`operating system and is capable of accessing data contained in the second memory space; and
`
`display data from the first logical process and the secondlogical process, wherein
`
`the video processor is adapted to combine data from the first and second logical processes and
`
`transmit the combined datato a display;
`
`wherein the computer system is configured such that the second electronic data processor
`
`is Operating in a protected mode and data residing on the first memory space is protected from
`
`corruption by a malware process downloaded from the network and executing as part of the
`
`second webbrowserprocess.
`
`16.
`
`(Previously Presented) The computer system of claim 15 wherein the computer
`
`system is further configured such that the first logical process is protected from executing
`
`instructionsinitiated by a malware process downloaded from the network and executing as part
`
`of the second logical process.
`
`17.
`
`(Previously Presented) The computer system of claim 15 and further comprising
`
`at least one network interface device capable of exchanging data with the network and with a
`
`logical process that comprises a process selected from the group consisting of:
`
`the first logical process; and
`
`the second logical process.
`
`18.
`
`(Previously Presented) The computer system of claim 17 wherein the network
`
`interface device is capable of decrypting data received from the second logical process and
`
`ARAC-OIRE1
`
`Page 32 of 44
`
`

`

`transmitting the decrypted data to the network while preventing the second logical process from
`
`accessing the decrypted data.
`
`19.
`
`(Previously Presented) The computer system of claim 15 wherein the at least one
`
`electronic data processor comprises a processor selected from the group consisting of a multi-
`
`core electronic data processor; dual electronic data processors; and multiple electronic data
`
`processors.
`
`20.
`
`(Previously Presented) The computer system of claim 15 and further configured
`
`to restore-at least one corrupted data file from a protected image.
`
`21.
`
`(Currently Amended) A portable computer capable of executing instructions
`
`using a common operating system, comprising:
`
`a networkinterface device configured to exchange data across a network of one or more
`
`computers and access at least one website;
`
`at least a first memory space and a second memoryspace,the first memory space
`
`containing at least one system file;
`
`at least one electronic data processor communicatively coupled to the network interface
`
`device, the first and second memoryspace, and to a user interface, wherein the user interface is
`
`configured to receive input from a computer user;
`
`the at least one electronic data processor configured to execute a first webbrowser
`
`process, capable of accessing data of the at least one website via the network,in a first logical
`
`process within the commonoperating system, wherein thefirst logical process is capable of
`
`accessing data contained in the first memory space;
`
`the at least one electronic data processor further configured to execute a second web
`
`browserprocess in a second logical process within the commonoperating system, wherein the
`
`ARAC-OIRE1
`
`Page 33 of 44
`
`

`

`second logical process is capable of accessing data contained in the second memory space andis
`
`further capable of generating video data from [[a]]the at least one website accessed via the
`
`network; and
`
`a video processor configured to process video data from the second webbrowser process
`
`for display;
`
`wherein the first webbrowser process is capable of opening the second webbrowser
`
`process andis further capable of passing data to the second webbrowserprocess;
`
`wherein further the portable computer is configured such that the at least one system file
`
`residing on the first memory space is protected from corruption by a malware process
`
`downloaded from the network and executing within the second webbrowserprocess.
`
`22.
`
`(Currently Amended) The portable computer of Claim 21 wherein the first web
`
`browserprocess is capable of directly exchanging data with the network interface device and
`
`with the second webbrowserprocess.
`
`23.
`
`(Currently Amended) The portable computer of Claim 22 wherein the first web
`
`browserprocess is capable of passing data downloaded from the network to the second web
`
`browserprocess.
`
`24.
`
`(Currently Amended) The portable computer of Claim 21 wherein the second
`
`webbrowserprocess is capable of directly exchanging data with the networkinterface device
`
`and with the first webbrowserprocess.
`
`25.
`
`(Previously Presented) The portable computer of Claim 21 wherein theat least
`
`one electronic data processor comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`ARAC-OIRE1
`
`Page 34 of 44
`
`

`

`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`26.
`
`(Previously Presented) The portable computer of Claim 21 wherein the second
`
`memory space comprises memoryselected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory (RAM); and
`
`both volatile and nonvolatile memory.
`
`27.
`
`(Currently Amended) The portable computer of Claim 21 configured such that at
`
`least one corruptedfile required for a webbrowserprocess is capable of being restored from a
`
`protected image.
`
`28.
`
`(Previously Presented) The portable computer of Claim 27 wherein the protected
`
`imageis stored at a location selected from the group consistingof:
`
`a removabledrive;
`
`the first memoryspace;
`
`a partition on a memory device; and
`
`a nonvolatile memory disk.
`
`29.
`
`(Currently Amended) The portable computer of Claim 21 configured saeh+thatat
`
`
`
`
`
`deleted-whenthe-secondbrowserprocessisterminatedto close the second web browser process
`
`and automatically delete at least one file selected from the group consisting of a temporary
`
`internet file, a cookie and a corruptedfile.
`
`ARAC-OIRE1
`
`Page 35 of 44
`
`

`

`30.
`
`(Currently Amended) The portable computer of Claim 21 configured such that
`
`the first webbrowserprocess is protected from executing instructionsinitiated by a malware
`
`process downloaded from the network and executing as part of the second webbrowserprocess.
`
`31.
`
`(Previously Presented) The portable computer of Claim 21 wherein attempts by
`
`malware to record data entry by the computer user are effectively blocked.
`
`32.
`
`(Currently Amended) A methodof operating a portable computer capable of
`
`executing instructions using a common operating system and havingat least one electronic data
`
`processor communicatively coupledto a first and second memory space and to a network
`
`interface device, comprising:
`
`exchanging data across a network of one or more computers with the network interface
`
`device and accessing at least one website;
`
`storing at least one system file within the first memory space;
`
`executing a first webbrowser process, capable of accessing data of the at least one
`
`website via the network, in a first logical process within the common operating system using the
`
`at least one electronic data processor, wherein the first logical process is configured to access
`
`data containedin the first memory space;
`
`executing a second webbrowserprocess in a second logical process within the common
`
`operating system using the at least one electronic data processor, wherein the second logical
`
`process is configured to access data contained in the second memoryspace andis further
`
`configured to generate video data;
`
`opening the second webbrowserprocess on instruction from the first webbrowser
`
`process;
`
`passing data from the first web browserprocess to the second web browser process; and
`
`ARAC-OIRE1
`
`Page 36 of 44
`
`

`

`displaying website video data from the second webbrowserprocess;
`
`wherein the portable computer is configured such that the at least one system file residing
`
`on the first memory space is protected from corruption by a malware process downloaded from
`
`the network and executing as part of the second webbrowserprocess.
`
`33.
`
`(Currently Amended) The method of Claim 32 wherein the portable computeris
`
`configured such that the first webbrowser process is capable of directly exchanging data with
`
`the network interface device and with the second webbrowserprocess.
`
`34.
`
`(Currently Amended) The method of Claim 33 and further comprising
`
`downloading data from the network and passing the data from the first webbrowserprocess to
`
`the second webbrowserprocess.
`
`35.
`
`(Currently Amended) The method of Claim 32 wherein the portable computeris
`
`configured such that the second webbrowser process is capable of directly exchanging data with
`
`the network interface device and with the first webbrowser process.
`
`36.
`
`(Previously Presented) The method of Claim 32 wherein the second memory
`
`space comprises memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory (RAM); and
`
`both volatile and nonvolatile memory.
`
`37.
`
`(Previously Presented) The method of Claim 32 and further comprising
`
`restoring at least one corruptedfile from a protected image.
`
`38.
`
`(Previously Presented) The method of Claim 37 wherein the protected imageis
`
`stored at a location selected from the group consisting of:
`
`ARAC-OIRE1
`
`Page 37 of 44
`
`

`

`a removabledrive;
`
`the first memoryspace;
`
`a partition on a memory device; and
`
`a nonvolatile memory disk.
`
`39,
`
`(Previously Presented) The method of Claim 32 and further comprising
`
`deleting at least one corrupted data file residing on the second memory space whenthe second
`
`logical process is terminated.
`
`AQ.
`
`(Previously Presented) The method of Claim 32 wherein the at least one
`
`electronic data processor comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`Al,
`
`(Currently Amended) The method of Claim 32 wherein the first webbrowser
`
`process is protected from executing instructions initiated by a malware process downloaded from
`
`the network and executing as part of the second webbrowserprocess.
`
`42.
`
`(Currently Amended) The method of Claim 32 and further comprising
`
`displaying video data from the first webbrowserprocess.
`
`43.
`
`(Previously Presented) The method of Claim 32 wherein attempts by malware to
`
`record data entry by the computeruserare effectively blocked.
`
`44.
`
`(Currently Amended) A methodof operating a portable computer capable of
`
`executing instructions using a common operating system and comprising a networkinterface
`
`device, at least a first memory space and a second memoryspace,andat least one electronic data
`
`ARAC-OIRE1
`
`Page 38 of 44
`
`

`

`processor communicatively coupled to the network interface device, the first and second memory
`
`space, and to a userinterface, comprising:
`
`exchanging data across a network of one or more computers with the network interface
`
`device and accessing at least one website;
`
`storing at least one system file in the first memory space;
`
`opening a first webbrowser process_capable of accessing data of the at least one website
`
`via the network, wherein the first webbrowser process is capable of accessing data contained in
`
`the first memoryspace;
`
`opening a second webbrowserprocess, wherein the second webbrowserprocess is
`
`capable of accessing data contained in the second memoryspace,andis further capable of
`
`generating data for video display; and
`
`passing data from the first webbrowserprocess to the second webbrowserprocess;
`
`wherein the portable computer is configured such that the at least one system file residing
`
`on the first memory space is protected from corruption by a malware process downloaded from
`
`the network and executing as part of the second webbrowserprocess.
`
`45,
`
`(Currently Amended) The method of Claim 44 wherein the first webbrowser
`
`process is capable of directly exchanging data with the network interface device and with the
`
`second webbrowserprocess.
`
`46.
`
`(Currently Amended) The method of Claim 45 and further comprising
`
`downloading data from the network and passing the downloaded data from the first webbrowser
`
`process to the second webbrowser process.
`
`47.
`
`(Previously Presented) The method of Claim 46 and further comprising storing
`
`the downloaded data on the second memoryspace.
`
`ARAC-OIRE1
`
`Page 39 of 44
`
`

`

`A8.
`
`(Currently Amended) The method of Claim 44 wherein the second webbrowser
`
`process is capable of directly exchanging data with the network interface device and with the
`
`first webbrowserprocess.
`
`49.
`
`(Previously Presented) The method of Claim 44 and further comprising
`
`restoring at least one corruptedfile from a protected image.
`
`50.
`
`(Previously Presented) The method of Claim 49 wherein the protected imageis
`
`stored at a location selected from the group consisting of:
`
`a removabledrive;
`
`the first memory space;
`
`a partition on a memory device; and
`
`a non-volatile memorydisk.
`
`
`
`51. (Currently Amended) The method of Claim 44whereinatleastone-corruptedte
`
`
`
`
`
`
`
`browser-processisterminatedfurther comprising closing the second web browser process and
`
`automatically deleting at least one file selected from the group consisting of a temporary internet
`
`file, a cookie and a corruptedfile.
`
`52.
`
`(Currently Amended) The method of Claim 44 wherein the first webbrowser
`
`process is protected from executing instructions initiated by a malware process downloaded from
`
`the network and executing as part of the second webbrowserprocess.
`
`53.
`
`(Currently Amended) The method of Claim 44 and further comprising thefirst
`
`webbrowserprocess instructing the second webbrowserprocess to open.
`
`54.
`
`(Previously Presented) The method of Claim 44 wherein attempts by malware to
`
`record data entry by a computeruserare effectively blocked.
`
`ARAC-OIRE1
`
`Page 40 of 44
`
`

`

`55.
`
`(Previously Presented) The method of Claim 44 wherein the at least one
`
`electronic data processor comprises a processor selected from the group consisting of:
`
`an Application Specific Integrated Circuit;
`
`a Field Programmable Gate Array;
`
`a plurality of electronic data processors; and
`
`a multi-core electronic data processor.
`
`56.
`
`(Previously Presented) The method of Claim 44 wherein the second memory
`
`space comprises memory selected from the group consisting of:
`
`a memory zone within a physical memory commonto the first memory space;
`
`a partition on a memory device;
`
`random access memory (RAM); and
`
`both volatile and nonvolatile memory.
`
`57.
`
`(Currently Amended) The method of Claim 44 and further comprising thefirst
`
`webbrowserprocess opening a plurality of second webbrowserprocesses.
`
`58.
`
`(Previously Presented) The portable computer of Claim 21 wherein the network
`
`interface device is capable of exchanging data with the network using a wireless connection.
`
`59.
`
`(Previously Presented) The portable computer of Claim 58 wherein the network
`
`comprises a cellular data carrier network.
`
`60.
`
`(Previously Presented) The method of Claim 32 wherein the network interface
`
`device is capable of exchanging data with the network using a wireless connection.
`
`61.
`
`(Previously Presented) The method of Claim 60 wherein the network comprises a
`
`cellular data carrier network.
`
`ARAC-OIRE1
`
`Page 41 of 44
`
`

`

`62.
`
`(Previously Presented) The method of Claim 44 wherein the network interface
`
`device is capable of exchanging data with the network using a wireless connection.
`
`63.
`
`(Previously Presented) The method of Claim 62 wherein the network comprises a
`
`cellular data carrier network.
`
`64.
`
`(Currently Amended) A computer program product comprising a program code
`
`stored in a non-transitory computer readable medium operable on computer capable of executing
`
`instructions using a common operating

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket