Ex Parte Genkin et al - Page 14




             Appeal No. 2006-1785                                                        Page 14               
             Application No. 10/768,827                                                                        


                   Therefore, we find that McLain teaches every limitation of claim 26,                        

             arranged as claimed, as shown infra:                                                              

             26. A method of emulating a target         See col. 3, lines 10 and 11:   “emulating a            
             computing system, comprising:              telecommunications network.”                           
             receiving a request;                       See col. 9, lines 64-67: “A command field              
                                                        1414 identifies a particular command that              
                                                        can be received by TND emulator 126.”                  
             obtaining a response associated with said  See col. 9, lines 64-67: “A response field             
             request from a data source, said data source1416 provides an appropriate response for              
             containing a plurality of requests acceptablethe command identified in field 1414.”                 
             to said target computing system and a      See also plural “command fields 1414” and              
             plurality of responses,                    “requests,” col. 10, lines 11 and 21.                  
                                                        The claimed “data source” is taught by the             
                                                        command response table shown in fig. 14,               
                                                        and described in columns 9 –11, particularly           
                                                        at col. 9, lines 43-67.                                
             each acceptable request being associated   See col. 10, lines 6-14: “Command response             
             with a response that describes the expectedmanager 216 uses a message pointer to                  
             behavior of said target computing system   determine which entry will control response            
             upon receiving said acceptable request; andgeneration. The message pointer can be part            
             responding as described by said response   of a command control vector. On                        
             associated with said request.              initialization, the message pointer is                 
                                                        positioned at the first entry in a command             
                                                        response table. When a command is                      
                                                        received from network interface 212, a                 
                                                        command column containing command fields               
                                                        1414 is searched for a match. If the                   
                                                        command is found in the command column,                
                                                        command response manager 216 takes                     
                                                        action as indicated by an associated                   
                                                        response field 1416.”                                  
             responding as described by said response   See col. 10, lines 15-19: “Actions can                 
             associated with said request.              include a first level of response for                  
                                                        unintelligently responding to certain inputs,          
                                                        a second level of response for intelligently           
                                                        responding to certain inputs using simple              
                                                        commands and a third level of response for             
                                                        providing detailed logical responses by                
                                                        invoking a script.”                                    














Page:  Previous  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  Next 

Last modified: November 3, 2007