Appeal No. 2004-1668 Application No. 09/466,529 computer generated message to create a key used to address a message action file which tells the computer monitoring system how to respond to the message (col. 8, lines 12-15). The failures indicated by the messages are tallied (col. 8, lines 52-53). Daniel discloses code points which are strings of bits generated in response to an event in a device attached to a network and are used to index predefined tables that contain relatively short units of text messages to be used in building an operator’s information display (col. 2, lines 3-7). The examiner argues that “Pickett and Daniel et al did not further suggest calculating a hash of the key to form an association. However, Iddon et al suggest such (col. 3, line 66 - col. 4, line 11; col. 7, line 9 - col. 8, line 4)” (answer, pages 4, 6 and 7). Iddon discloses “a system employing a sufficient number of network nodes connected throughout a computer network adapted to collect network data, wherein each such node has a network interface to translate the electronic signals on the network into a digital form, a memory for storing the digital form, and a CPU for processing the digital form in accordance with software 3Page: Previous 1 2 3 4 5 6 7 8 9 NextLast modified: November 3, 2007