Download as pdf
Download as pdf
You are on page 1of 14
Spm Sud Ss Sarvedsrty Or Sle 2072 For: Wey TK 76104 DLA Piper LLP WS) Beste pera: PATENT GROUT " WA Freedom Ve Ste BOO Reston VA QO19X0 IN THE UNITED STATES PATENT AND TRADEMARK OFFICE Applicant/Assignee: Eighth Street Solutions LLC Application No: 90/014,625 Confirmation No. 7681 Filed: 2020-DEC-09 Art Unit: 3992 Title: System and Method to Secure a | Examiner: Lee, Christopher E. Computer System by Selective Control of Write Access to a Data Storage Medium Inventor: Safa, John Attorney Docket No.: ESS-007 - Reexam RESPONSE TO FINAL OFFICE ACTION OF AUGUST 6, 2021 Applicant respectfully submits the following remarks and amendments to overcome the grounds of rejection under pre-AIA § 103(a) as to Claims 1-11 as set forth in the Re-Examination Final Office Action of August 6, 2021. Considering the remarks and amendments made herein, Applicant has fully responded to the Final Office Action and respectfully requests the Examiner’s reconsideration, allowance of the claims, and issuance of the re-examination certificate. Amendments to the Specification begin at page 2. Amendments to the Claims begin at page 3. Amendments to the Drawings begin at page 7. Remarks and Arguments begin at page 8. Reexam 90/014,625 — Response to Final Office Action / i | i | Amendments to the Specification Not Applicable. Reexam 90/014,625 — Response to Final Office Action Amendments to the Claims This listing of claims will replace all prior versions, and listings, or claims in the application/patent. Claims 1 and 9 (amended) and Claims 2-8, 10, and 11 (original) remain pending. Support for these amendments can be found in at least columns 7-8 of the specification of U.S, Patent No. 7,664,924. Claims 1 and 9 have been amended to include a vault system which can enable applications and data to be recovered if they are destroyed or corrupted by a virus or other malicious code. Claims 1-11 remain pending. Claims 1. (presently amended) In a computer comprising a storage medium and an application running on said computer, a method of controlling write access to said storage medium by said application comprising: detecting a[[n]] first attempt by the application to write data to said storage medium of a first computer; in response to said first write attempt, attempting to retrieve a permission value from a database comprised of data elements encoding at least one permission value associated with one or more applications; in the case that no permission value for the running application is found in the database, transmitting to a central server operatively connected to the first computer and to at least one additional computer, a query comprised of an indicia of identity associated with said running application; receiving from said central server, data that represents the collective response of the user of the at least one additional computer to requests by the same application running on said at least Reexam 90/014,625 — Response to Final Office Action one additional computer to access the storage medium that comprises said at least one additional computer; encrypting or compressing a copy of said data received from the central server; saving all or part of the encrypted or compressed copy of said data received from the central server to said storage medium, detecting a second attempt by the application to write data to said storage medium of a first computer; in response to said second write attempt, attempting to test the integrity of said encrypted or compressed copy of said data received from the central sever; in the case that an error for the running application is found, transmitting to a vault system operatively connected to the first computer, a request to decrypt or decompress said encrypted or compressed copy associated with said running application: receiving from said vault system, all or part of the encrypted or compressed copy of said data received from the central server. 2. (original) The method of claim 1 further comprising displaying on the user interface of said computer graphical forms representative of said collective response data. 3. (original) The method of claim 1 where the data that represents the collective response data includes a percentage of other computer uscrs who have approved the application writing to the storage medium associated with their respective at least one additional computer. 4. (original) The method of claim 1 where the data that represents the collective response data includes a number which is the number of other users that have approved the application writing to the storage medium associated their respective at least one additional computer. Reexam 90/014,625 — Response to Final Office Action 5. (original) The method of claim 1 where the data that represents the collective response data includes at least one statement characterizing the reason that said at least one additional computer user selected a particular permission value. 6. (original) The method of claim 5 where the reason is a spyware. 7. (original) The method of claim 5 where the reason is a virus. 8. (original) The method of claim 5 where the reason is a trojan. 9. (currently amended) In a computer comprising a storage medium and an application running on said computer, a method of controlling write access to said storage medium by said application comprising: detecting an attempt by the application to write data to said storage medium; in response to said write attempt, attempting to retrieve a permission value from a database comprised of data elements encoding at least one permission value associated with one or more applications; in the case that no permission value for the running application is found, transmitting to a central server operatively connected to the computer a query comprised of an indicia of identity associated with said running application; receiving from said central server information collective response data of at least one other computer user’s to the request by the same application running on said other computer use’s computers to access the storage medium that comprises said at least one other computer user’s computers; receiving from said central server information transmitted to said central server, said information comprising other user’s critique of said at least one other computer user’s response; Reexam 90/014,625 — Response to Final Office Action | i i | encrypting or compressing a copy of said information comprising other user’s critique of said at least one other computer user’s response: saving all or part of the encrypted or compressed copy of said information comprising other user’s critique of said at least one other computer user's response to said storage medium; detecting a second attempt by the application to write data to said storage medium of a first computer; in response to said second write attempt, attempting to test the integrity of said encrypted or compressed copy of said information comprising other user’s critique of said at least one other computer user’s response; in the case that an error for the running application is found, transmitting to a vault system operatively connected to the first computer, a request to decrypt or decompress said encrypted or compressed copy associated with said running application: receiving from said vault system, all or part of the encrypted or compressed copy of said information comprising other user’s critique of said at least one other computer user’s response. 10. (original) A system comprised of a data storage medium, a central processing unit and a main memory, where said central processing unit executes any of the methods of claims 1-8 or 9. 11. (original) A data storage medium containing digital data that, when loaded into a computer and executed as a program, causes the computer to execute any of the methods of claims 1-8 or 9. Reexam 90/014,625 — Response to Final Office Action Amendments to the Drawings Not applicable. | / | : : Reexam 90/014,625 — Response to Final Office Action Remarks and Arguments In response to the Re-Examination Final Office Action dated August 6, 2021, Applicant has amended Claims 1 and 9 and provides the following remarks and arguments traversing the stated Pre-AIA § 103(a) rejections of the Final Office Action. Support for the amendments appears throughout the specification, but at a minimum specific support is found in columns 7 and 8 of the specification. No new matier has been entered through this response and the scope of the pending claims has not been enlarged. Claims 1-11 remain pending. A. Grounds of Rejection 1. Claims 1, 5-7, and 9 stand rejected under pre-AIA § 103(a) as unpatentable over Cook (US 2005/0257265 Al) (“Cook”) in view of Williams (US 2005/0210285 A1) (“Williams”). 2. Claims 2-4, 8, 10, and 11 stand rejected under pre-AIA § 103(a) as unpatentable over Cook in view of Williams as applied to Claim 1, 5-7, and 9, and further in view of Freund (US 2004/0019807 Al) (“Freund”). B. Cook in view of Williams (Claims 1, 5-7, 9) Claim 1 Claims 1, 5-7, and 9 stand finally rejected under pre-AIA §103(a) as unpatentable over Cook and Williams. While Applicant respectfully disagrees with the maintaining of this rejection, Applicant has amended claim 1 to include a vault system which allows applications or data to be recovered in real-time if they are destroyed by a virus or other malicious code See, e.g., U.S. Patent No. 7,664,924 (the “924 patent”) at 7:48-50. Notably, as applications or data are processed in real-time by the operating system, a vaulted file can be created for restoration purposes. The following passage from the ’924 patent provides a corresponding explanation: Reexam 90/014,625 — Response to Final Office Action

You might also like