Ex Parte Bleizeffer et al - Page 8



             Appeal No. 2006-2354                                                  Page 8                     
             Application No. 09/877,157                                                                          
                   16. Abraham discloses allowing system administrators to group users of                        
                          the LAN together.  Abraham, page 14, lines 30-32.                                      
                   17. The system administrator can create (“add”) subgroups to a root group                     
                          and then move the data elements (“add users as members”) to the                        
                          subgroup via the graphical user interface.  Abraham, page 15, lines 8-                 
                          13; see also page 29, lines 19-27.                                                     
                   18. Abraham teaches that the user inherits all of the policies and quotas of                  
                          the group to which it has become a member.  Abraham, page 30, lines                    
                          2-3.                                                                                   
                   19. After the system administrator has added a new group, a record for the                    
                          group is added to a user group table in a database.  Moriconi, page 28,                
                          lines 3-5.                                                                             
                   20. A record for a user is added to a transmit list stored in a database and                  
                          is used to construct a user policy table that is ultimately provided to                
                          the filter executive.  Moriconi, page 24, lines 25-32.                                 
                   21. A filter executive loads the policies for each user from the database                     
                          and generates a policy (“set of rules”) for each user.  These rules are                
                          used by the filter engine to block unauthorized services or                            
                          information.  Abraham, page 10, lines 32-34; see also page 13, lines                   
                          26-31 and Figures 15A-15C.                                                             
                   22. As such, we find that both prior art references teach or suggest the                      
                          method of claim 1 except that the method is used to generate a                         
                          security policy instead of a privacy policy.                                           







Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next 

Last modified: November 3, 2007