Ex Parte Bleizeffer et al - Page 7



             Appeal No. 2006-2354                                                  Page 7                     
             Application No. 09/877,157                                                                          
                   9. The policy manager also allows different users to be grouped together.                     
                          Moriconi, col. 6, lines 28-29.                                                         
                   10. For example, Moriconi teaches that “[u]sers granted to a role are the                     
                          members of that role.”  Moriconi, col. 7, lines 56-57.                                 
                   11. In this example, the data elements in Moriconi are the individual users                   
                          and the data elements (users) are combined into a named group                          
                          (corresponding to a role), that is defined by the administrator, and the               
                          security policy is then generated based on these groups by assigning                   
                          the certain privileges to the users within the named group.  Moriconi,                 
                          col. 7, lines 42-54 and col. 9, lines 61-63.                                           
                   12. The data elements (users) in the group, as in the claimed invention, all                  
                          share common properties, viz, they share the same role or job.                         
                   13. We find that Abraham similarly discloses a method for creating a                          
                          security policy that includes creating a policy group, adding data                     
                          elements to the group, and generating a security policy based on the                   
                          group.                                                                                 
                   14. Specifically, the system of Abraham discloses a method for a system                       
                          administrator to set specific policies for the users of a local area                   
                          network regarding what type of services and information each user                      
                          may have access to on the Internet.  Abraham, page 8, lines 4-6.                       
                   15. The system administrator uses a graphical user interface to set policies                  
                          for each user and information about the policies is stored in tables in a              
                          database.  Abraham, page 10, lines 20-22; see also page 12, lines 10-                  
                          13.                                                                                    





Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next 

Last modified: November 3, 2007