Appeal No. 2006-1084 Reexamination Control No. 90/006,334 1 destination nodes and contextual information for said 2 individual node-to-node transmissions; and 3 4 applying access rules to said assembled multi- 5 packet communications in determinations of whether said 6 individual node-to-node transmissions are restricted 7 transmissions, including basing said determinations on 8 said identifying said source and destination nodes and 9 said contextual information, wherein said steps of 10 monitoring, assembling, identifying and applying are 11 executed non-intrusively with respect to said restricted 12 transmissions and with respect to node-to-node 13 transmissions determined to be unrestricted transmissions 14 upon applying said access rules to said assembled multi- 15 packet communications of said unrestricted 16 transmissions, such that traffic flow of data packets from 17 said source nodes to said destination nodes is unaffected 18 by said steps. 19 20 11. A method of providing access control to 21 resources that are internal to and external of a network of 22 nodes, including computing devices of users of said 23 network, said method comprising steps of: 24 25 generating a rules base related to restricting access 26 to said resources by said nodes of said network, including 27 forming a first set of rules specific to access to external 28 resources and a second set of rules specific to access 29 internal resources; 30 31 monitoring transmissions that include one of said 32 computing devices; 33 34 acquiring information regarding each said 35 transmission, including determining information relating 36 to at least Layers 2, 3 and 7 of the ISO model, wherein 7Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next
Last modified: September 9, 2013