Ex Parte LeRose - Page 2

                 Appeal 2007-1289                                                                                     
                 Application 10/425,899                                                                               
                        21.  A method of securing a computer file, the method comprising the                          
                 steps of:                                                                                            
                        substantially attaching a memory device to a first computer, said                             
                 memory device comprising a USB flash drive having operating software                                 
                 loaded thereon and a preloaded file structure, and said operating software                           
                 configured to recognize the computer file, and for operating the software on                         
                 the memory device;                                                                                   
                        transferring the computer file to the memory device from the                                  
                 computer by operating the software on the memory device;                                             
                        compressing and encrypting the computer file by operating the                                 
                 software on the memory device, and applying a file extension to said                                 
                 compressed and encrypted computer file indicating the file is encrypted;                             
                        substantially unattaching the memory device from the first computer;                          
                        substantially attaching the memory device with the encrypted file to a                        
                    second computer; and                                                                              
                        decrypting the computer file by operating the software on the memory                          
                    device, whereby a user knows the file is to be decrypted from                                     
                    said file extension.                                                                              
                        The following references are relied upon or made reference to by the                          
                        Examiner:                                                                                     
                 Mooney    US 6,351,813 B!   Feb. 26, 2002                                                            
                 Sabet-Shanghi  US 2002/0186842 A1  Dec. 12, 2002                                                     
                                                                                  (Filed Dec. 6, 2001)                
                 Koh    US 6,757,783 B2   Jun. 29, 2004                                                               
                                                                               (Filed Nov. 28, 2001)                  

                        In considering the merits of the rejection of the claims on appeal, we                        
                 have made reference to the Appeal Brief filed on May 30, 2006, and the                               
                 amended, corrected Appeal Brief filed on October 6, 2006.  Likewise, we                              

                                                          2                                                           

Page:  Previous  1  2  3  4  5  6  7  8  Next

Last modified: September 9, 2013