Appeal No. 2003-0425 Application 08/773,692 and second computer networks based on the type of communication protocol being used and the type of protocol commands exchanged between the first and second computer networks, wherein restricting access is determined dynamically based on environmental changes. Representative claim 1 is reproduced as follows: 1. A method of controlling data transfers between a first and a second computer network, the method comprising: monitoring protocol commands by a proxy coupled between the first and second computer networks; interpreting protocol commands exchanged between the first and second computer networks; determining the type of protocol being used; and restricting access to certain resources within the first and second computer networks based on the type of communications protocol being used and the type of protocol commands exchanged between the first and second computer networks, wherein restricting access is determined dynamically based on environmental changes. The examiner relies on the following references: Baker et al. (Baker) 5,678,041 Oct. 14, 1997 (filed Aug. 25, 1995) Shwed et al. (Shwed) 5,835,726 Nov. 10, 1998 (filed June 17, 1996) Dascalu 5,958,015 Sep. 28, 1999 (filed Oct. 29, 1996) Claims 1, 3, 4, 6, 8-23 and 25-29 stand rejected under 35 U.S.C. § 103(a). As evidence of obviousness the examiner offers -2-Page: Previous 1 2 3 4 5 6 7 8 9 NextLast modified: November 3, 2007