Ex Parte Brown et al - Page 5

                Appeal 2007-0716                                                                              
                Application 09/946,201                                                                        
                4. The web browser (610) then processes the ARI tags in the webpage to                        
                determine the user’s level of access to the content of the webpage. (Id.)                     
                5. The web browser (610) subsequently restricts the client’s access to the                    
                content of the webpage based upon the client’s determined level of access.2                   
                (Id.)                                                                                         
                                         The Prior Art Relied upon                                            
                6.  Schreiber teaches a method and system for controlling client’s access                     
                to digital images referenced in a webpage located on a server.  (Abstract and                 
                col. 6, ll. 24-30.)                                                                           
                7.  Schreiber teaches a dialog box (Figure 12) for allowing an                                
                administrator to enter authentication data (such as password, webpage) to                     
                access a designated webpage and to set or update the protection status of the                 
                images residing on the webpage.  (Col. 21, ll. 53-59 and col. 22, ll. 37-44.)                 
                8. The administrator uses HTML tags to designate selected images                              
                referenced within the webpage as “protected” or “not protected.”  (Col. 23,                   
                l. 58-col. 24, l. 2.)                                                                         
                9. The client computer (106) through its resident browser (112) issues a                      
                request to the server (100) to access a webpage (902) on a first server (900)                 
                referencing a protected (encrypted) image and residing on a second server                     
                (906).  (Col. 20, ll. 27-36.)                                                                 
                10. Upon receiving the request, the server (900) (1) parses the webpage to                    
                locate the encrypted image, (2) downloads the encrypted image to create an                    
                alias (908), which the server (900) subsequently converts to generate a                       
                                                                                                             
                2 Based on the ARI tags associated in the requested content of the webpage,                   
                various functions (e.g. print, save, copy) may be enabled or disabled in the                  
                browser.  ARI tags include identifiers pertaining to costs, payee, user info,                 
                time, printing, copy, save, path and degrade.  Specification 9 and 15.                        
                                                      5                                                       

Page:  Previous  1  2  3  4  5  6  7  8  9  Next

Last modified: September 9, 2013