Appeal No. 2006-2354 Page 8 Application No. 09/877,157 16. Abraham discloses allowing system administrators to group users of the LAN together. Abraham, page 14, lines 30-32. 17. The system administrator can create (“add”) subgroups to a root group and then move the data elements (“add users as members”) to the subgroup via the graphical user interface. Abraham, page 15, lines 8- 13; see also page 29, lines 19-27. 18. Abraham teaches that the user inherits all of the policies and quotas of the group to which it has become a member. Abraham, page 30, lines 2-3. 19. After the system administrator has added a new group, a record for the group is added to a user group table in a database. Moriconi, page 28, lines 3-5. 20. A record for a user is added to a transmit list stored in a database and is used to construct a user policy table that is ultimately provided to the filter executive. Moriconi, page 24, lines 25-32. 21. A filter executive loads the policies for each user from the database and generates a policy (“set of rules”) for each user. These rules are used by the filter engine to block unauthorized services or information. Abraham, page 10, lines 32-34; see also page 13, lines 26-31 and Figures 15A-15C. 22. As such, we find that both prior art references teach or suggest the method of claim 1 except that the method is used to generate a security policy instead of a privacy policy.Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 NextLast modified: November 3, 2007