Ex Parte COX et al - Page 6




             Appeal No. 2002-1707                                                          Page 6              
             Application No. 09/211,527                                                                        


             and determine that communications between host1 and host2 are to be modified in                   
             some way, e.g., encryption, decryption, address translation, etc."  Id. at ll. 55-58.  "All       
             modifications, i.e., encryption, decryption, signing and address translation are                  
             performed on a selective basis in accordance with the contents of the rule base."                 
             Col. 13, ll. 10-13.  Although we understand the examiner to read the claimed content,             
             policies, and network device on the reference's packets, rules, and firewall, respectively,       
             we are uncertain on what portion of Shewd the examiner reads the claimed session                  
             dependent data.  We will not "resort to speculation," In re Warner, 379 F.2d 1011, 1017,          
             154 USPQ 173, 178 (CCPA 1967), as to the examiner's position.                                     


                   For its part, Belfiore "provides an intelligent mechanism for automatically initiating      
             a search when a user enters text that cannot be properly interpreted as a [uniform                
             resource locator] URL."  Col. 3, ll. 59-62.  The examiner relies on the abstract of the           
             reference to teach modifying content provided to a user of a device.  (Final Rej. at 3.)          
             The abstract discloses that a web "browser may modify a returned web page to highlight            
             search terms used in the query."  Abs., ll. 21-23.                                                


                   Even if Belfiore's teaching of highlighting searched terms in a returned web page           
             had been combined with Shewd's teaching of encrypting, decrypting, signing, or                    
             translating the address of packets based on the contents of a firewall's rule base, we            








Page:  Previous  1  2  3  4  5  6  7  8  9  Next 

Last modified: November 3, 2007