Appeal No. 2006-1785 Page 14 Application No. 10/768,827 Therefore, we find that McLain teaches every limitation of claim 26, arranged as claimed, as shown infra: 26. A method of emulating a target See col. 3, lines 10 and 11: “emulating a computing system, comprising: telecommunications network.” receiving a request; See col. 9, lines 64-67: “A command field 1414 identifies a particular command that can be received by TND emulator 126.” obtaining a response associated with said See col. 9, lines 64-67: “A response field request from a data source, said data source1416 provides an appropriate response for containing a plurality of requests acceptablethe command identified in field 1414.” to said target computing system and a See also plural “command fields 1414” and plurality of responses, “requests,” col. 10, lines 11 and 21. The claimed “data source” is taught by the command response table shown in fig. 14, and described in columns 9 –11, particularly at col. 9, lines 43-67. each acceptable request being associated See col. 10, lines 6-14: “Command response with a response that describes the expectedmanager 216 uses a message pointer to behavior of said target computing system determine which entry will control response upon receiving said acceptable request; andgeneration. The message pointer can be part responding as described by said response of a command control vector. On associated with said request. initialization, the message pointer is positioned at the first entry in a command response table. When a command is received from network interface 212, a command column containing command fields 1414 is searched for a match. If the command is found in the command column, command response manager 216 takes action as indicated by an associated response field 1416.” responding as described by said response See col. 10, lines 15-19: “Actions can associated with said request. include a first level of response for unintelligently responding to certain inputs, a second level of response for intelligently responding to certain inputs using simple commands and a third level of response for providing detailed logical responses by invoking a script.”Page: Previous 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 NextLast modified: November 3, 2007