Appeal No. 2006-2354 Page 7 Application No. 09/877,157 9. The policy manager also allows different users to be grouped together. Moriconi, col. 6, lines 28-29. 10. For example, Moriconi teaches that “[u]sers granted to a role are the members of that role.” Moriconi, col. 7, lines 56-57. 11. In this example, the data elements in Moriconi are the individual users and the data elements (users) are combined into a named group (corresponding to a role), that is defined by the administrator, and the security policy is then generated based on these groups by assigning the certain privileges to the users within the named group. Moriconi, col. 7, lines 42-54 and col. 9, lines 61-63. 12. The data elements (users) in the group, as in the claimed invention, all share common properties, viz, they share the same role or job. 13. We find that Abraham similarly discloses a method for creating a security policy that includes creating a policy group, adding data elements to the group, and generating a security policy based on the group. 14. Specifically, the system of Abraham discloses a method for a system administrator to set specific policies for the users of a local area network regarding what type of services and information each user may have access to on the Internet. Abraham, page 8, lines 4-6. 15. The system administrator uses a graphical user interface to set policies for each user and information about the policies is stored in tables in a database. Abraham, page 10, lines 20-22; see also page 12, lines 10- 13.Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 NextLast modified: November 3, 2007