Spm
Sud Ss Sarvedsrty Or
Sle 2072
For: Wey TK 76104
DLA Piper LLP WS) Beste
pera: PATENT GROUT "
WA Freedom Ve Ste BOO
Reston VA QO19X0IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
Applicant/Assignee:
Eighth Street Solutions LLC
Application No: 90/014,625 Confirmation No. 7681
Filed: 2020-DEC-09 Art Unit: 3992
Title: System and Method to Secure a | Examiner: Lee, Christopher E.
Computer System by Selective Control of
Write Access to a Data Storage Medium
Inventor: Safa, John
Attorney Docket No.: ESS-007 - Reexam
RESPONSE TO FINAL OFFICE ACTION OF AUGUST 6, 2021
Applicant respectfully submits the following remarks and amendments to overcome the
grounds of rejection under pre-AIA § 103(a) as to Claims 1-11 as set forth in the Re-Examination
Final Office Action of August 6, 2021. Considering the remarks and amendments made herein,
Applicant has fully responded to the Final Office Action and respectfully requests the Examiner’s
reconsideration, allowance of the claims, and issuance of the re-examination certificate.
Amendments to the Specification begin at page 2.
Amendments to the Claims begin at page 3.
Amendments to the Drawings begin at page 7.
Remarks and Arguments begin at page 8.
Reexam 90/014,625 — Response to Final Office Action
/
i
|
i
|Amendments to the Specification
Not Applicable.
Reexam 90/014,625 — Response to Final Office ActionAmendments to the Claims
This listing of claims will replace all prior versions, and listings, or claims in the
application/patent. Claims 1 and 9 (amended) and Claims 2-8, 10, and 11 (original) remain
pending. Support for these amendments can be found in at least columns 7-8 of the specification
of U.S, Patent No. 7,664,924. Claims 1 and 9 have been amended to include a vault system which
can enable applications and data to be recovered if they are destroyed or corrupted by a virus or
other malicious code.
Claims 1-11 remain pending.
Claims
1. (presently amended) In a computer comprising a storage medium and an application
running on said computer, a method of controlling write access to said storage medium by said
application comprising:
detecting a[[n]] first attempt by the application to write data to said storage medium of a
first computer;
in response to said first write attempt, attempting to retrieve a permission value from a
database comprised of data elements encoding at least one permission value associated with one
or more applications;
in the case that no permission value for the running application is found in the database,
transmitting to a central server operatively connected to the first computer and to at least one
additional computer, a query comprised of an indicia of identity associated with said running
application;
receiving from said central server, data that represents the collective response of the user
of the at least one additional computer to requests by the same application running on said at least
Reexam 90/014,625 — Response to Final Office Actionone additional computer to access the storage medium that comprises said at least one additional
computer;
encrypting or compressing a copy of said data received from the central server;
saving all or part of the encrypted or compressed copy of said data received from the central
server to said storage medium,
detecting a second attempt by the application to write data to said storage medium of a first
computer;
in response to said second write attempt, attempting to test the integrity of said encrypted
or compressed copy of said data received from the central sever;
in the case that an error for the running application is found, transmitting to a vault system
operatively connected to the first computer, a request to decrypt or decompress said encrypted or
compressed copy associated with said running application:
receiving from said vault system, all or part of the encrypted or compressed copy of said
data received from the central server.
2. (original) The method of claim 1 further comprising displaying on the user interface of
said computer graphical forms representative of said collective response data.
3. (original) The method of claim 1 where the data that represents the collective response
data includes a percentage of other computer uscrs who have approved the application writing to
the storage medium associated with their respective at least one additional computer.
4. (original) The method of claim 1 where the data that represents the collective response
data includes a number which is the number of other users that have approved the application
writing to the storage medium associated their respective at least one additional computer.
Reexam 90/014,625 — Response to Final Office Action5. (original) The method of claim 1 where the data that represents the collective response
data includes at least one statement characterizing the reason that said at least one additional
computer user selected a particular permission value.
6. (original) The method of claim 5 where the reason is a spyware.
7. (original) The method of claim 5 where the reason is a virus.
8. (original) The method of claim 5 where the reason is a trojan.
9. (currently amended) In a computer comprising a storage medium and an application
running on said computer, a method of controlling write access to said storage medium by said
application comprising:
detecting an attempt by the application to write data to said storage medium;
in response to said write attempt, attempting to retrieve a permission value from a database
comprised of data elements encoding at least one permission value associated with one or more
applications;
in the case that no permission value for the running application is found, transmitting to a
central server operatively connected to the computer a query comprised of an indicia of identity
associated with said running application;
receiving from said central server information collective response data of at least one other
computer user’s to the request by the same application running on said other computer use’s
computers to access the storage medium that comprises said at least one other computer user’s
computers;
receiving from said central server information transmitted to said central server, said
information comprising other user’s critique of said at least one other computer user’s response;
Reexam 90/014,625 — Response to Final Office Action
|
i
i
|encrypting or compressing a copy of said information comprising other user’s critique of
said at least one other computer user’s response:
saving all or part of the encrypted or compressed copy of said information comprising other
user’s critique of said at least one other computer user's response to said storage medium;
detecting a second attempt by the application to write data to said storage medium of a first
computer;
in response to said second write attempt, attempting to test the integrity of said encrypted
or compressed copy of said information comprising other user’s critique of said at least one other
computer user’s response;
in the case that an error for the running application is found, transmitting to a vault system
operatively connected to the first computer, a request to decrypt or decompress said encrypted or
compressed copy associated with said running application:
receiving from said vault system, all or part of the encrypted or compressed copy of said
information comprising other user’s critique of said at least one other computer user’s response.
10. (original) A system comprised of a data storage medium, a central processing unit and
a main memory, where said central processing unit executes any of the methods of claims 1-8 or
9.
11. (original) A data storage medium containing digital data that, when loaded into a
computer and executed as a program, causes the computer to execute any of the methods of claims
1-8 or 9.
Reexam 90/014,625 — Response to Final Office ActionAmendments to the Drawings
Not applicable. |
/
|
:
:
Reexam 90/014,625 — Response to Final Office ActionRemarks and Arguments
In response to the Re-Examination Final Office Action dated August 6, 2021, Applicant
has amended Claims 1 and 9 and provides the following remarks and arguments traversing the
stated Pre-AIA § 103(a) rejections of the Final Office Action. Support for the amendments appears
throughout the specification, but at a minimum specific support is found in columns 7 and 8 of the
specification. No new matier has been entered through this response and the scope of the pending
claims has not been enlarged. Claims 1-11 remain pending.
A. Grounds of Rejection
1. Claims 1, 5-7, and 9 stand rejected under pre-AIA § 103(a) as unpatentable over Cook
(US 2005/0257265 Al) (“Cook”) in view of Williams (US 2005/0210285 A1) (“Williams”).
2. Claims 2-4, 8, 10, and 11 stand rejected under pre-AIA § 103(a) as unpatentable over
Cook in view of Williams as applied to Claim 1, 5-7, and 9, and further in view of Freund (US
2004/0019807 Al) (“Freund”).
B. Cook in view of Williams (Claims 1, 5-7, 9)
Claim 1
Claims 1, 5-7, and 9 stand finally rejected under pre-AIA §103(a) as unpatentable over
Cook and Williams. While Applicant respectfully disagrees with the maintaining of this rejection,
Applicant has amended claim 1 to include a vault system which allows applications or data to be
recovered in real-time if they are destroyed by a virus or other malicious code See, e.g., U.S. Patent
No. 7,664,924 (the “924 patent”) at 7:48-50. Notably, as applications or data are processed in
real-time by the operating system, a vaulted file can be created for restoration purposes. The
following passage from the ’924 patent provides a corresponding explanation:
Reexam 90/014,625 — Response to Final Office Action