Ex parte HRUSKA et al. - Page 3




          Appeal No. 1997-2158                                       Page 3           
          Application No. 08/234,239                                                  


          the check to the workstation.  Under this arrangement,                      
          validity checking software need only be stored on the server.               
          Updating of validity checking program files and data files,                 
          moreover, need only be done to the server.                                  


               Claim 1, which is representative for our purposes,                     
          follows:                                                                    
                    Claim 1. A method for checking the validity of                    
               an item of data stored for access by a first data                      
               processor of a data processing network comprising at                   
               least two interconnected data processors, the method                   
               comprising the steps of:                                               
                    storing for access by a second data processor a                   
               plurality of definitions of forms of data indicative                   
               of invalidity of items of data;                                        
                    causing the first data processor to provide the                   
               second data processor with a copy of the item of                       
               data;                                                                  
                    determining, using the second data processor,                     
               whether any of the stored forms of data are present                    
               in the item of data and declaring the item of data                     
               invalid if any of the stored forms of data are                         
               present in the item of data;                                           
                    reporting to the first data processor on the                      
               validity of the item of data; and                                      
                    causing the first data processor to prevent                       
               access to the item of data if the item of data is                      
               declared as invalid.                                                   








Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  Next 

Last modified: November 3, 2007