Ex Parte Lim et al - Page 5

                  Appeal 2007-1731                                                                                           
                  Application 10/796,051                                                                                     
                         The statement of rejection with respect to claim 7 refers to Figures 1                              
                  and 3, and column 4, lines 1 through 22, and column 7, lines 3 through 16,                                 
                  as teaching the feature in controversy.  (Answer 4.)                                                       
                         We find that Baker describes a system that includes a relational                                    
                  database to determine access rights to information or services to public or                                
                  uncontrolled databases such as those that may be found on the Internet.                                    
                  Resource identifiers (URLs) are associated with a particular access rating.  A                             
                  request from a user for a particular resource will only be passed on from the                              
                  local network to a server providing a link to the resource if the URL has an                               
                  access rating for which the user has been assigned specific permissions by                                 
                  an administrator or manager.  The invention may be implemented as part of                                  
                  a proxy server within the user’s local network.  Baker, col. 3, ll. 8-32.                                  
                         In Baker Figures 1 and 3, proxy server 112 provides a connection                                    
                  from processor 111 to public network 100 via firewall 113.  Requests from                                  
                  user terminals 107-109 for access to network services 101-105 through                                      
                  public network 100 are submitted to processor 111 within proxy server 112.                                 
                  Processor 111 determines the identity of the requesting user terminal and                                  
                  compares the user’s particular rating class with the rating associated with the                            
                  particular URL.  Baker, col. 3, l. 65 - col. 4, l. 43.  When a requesting user                             
                  terminal transmits a URL via LAN 110 (Fig. 1), processor 111 receives the                                  
                  URL and the requesting user terminal identification code.  Assuming that the                               
                  user (e.g., terminal 107) has sufficient clearance for the requested URL,                                  
                  processor 111 forwards the URL to public network 100 via firewall 113.                                     
                  Assuming availability of the resource, the public network returns the                                      
                  requested information to user terminal 107 via firewall 113, processor 111                                 
                  and LAN 110.  Baker, col. 5, ll. 8-40.                                                                     

                                                             5                                                               

Page:  Previous  1  2  3  4  5  6  7  8  9  Next

Last modified: September 9, 2013