Appeal No. 2006-2354 Page 6 Application No. 09/877,157 2. In particular, we find that Moriconi describes a process for creating and customizing rules to manage a security policy from a centralized server in a distributed computer network. Moriconi, col. 3, lines 50- 54 and 57-63 and col. 4, lines 19-22. 3. Moriconi discloses that an administrator can use a policy manager to create a global policy that specifies access privileges of the user to securable components of the network. Moriconi, col. 4, lines 25-26. 4. The policy manager allows privileges to be grouped together and granted to a role. 5. Moriconi teaches, “Roles are named groups of privileges that are granted to users or other roles.” Moriconi, col. 7, lines 55-56. 6. “A role is often used to represent the set of privileges needed to perform a job function.” Moriconi, col. 7, lines 57-58. 7. Moriconi discloses that the administrator may add global roles (912) and local roles (916) on a server or client using the policy manager (210), thereby teaching that the administrator can create policy groups. Moriconi, col. 12, lines 35-39, see also col. 12, lines 55-61. 8. In this case, the data elements in Moriconi are the individual privileges and the data elements (privileges) are combined into a named group (based on a role), which has been defined by the administrator creating the security policy, and the security policy is then generated based on these groups (by assigning the privileges associated with that role to the designated user(s)).Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 NextLast modified: November 3, 2007