Appeal No. 2006-1084 Reexamination Control No. 90/006,334 1 said steps of monitoring and acquiring include receiving 2 and assembling data packets to form a multi-packet 3 communication for each said transmission, said acquiring 4 including using said multi-packet communications to 5 determine said information; and 6 7 applying said rules base to said acquired 8 information to detect transmissions in which access to 9 said resources is restricted by said rules base, including 10 initiating a predetermined action in response to detecting 11 that a specific transmission relates to an access that is 12 restricted. 13 14 15. A system for providing access control to resources 15 of a network comprising: 16 17 a plurality of nodes, including computing devices; 18 19 means for non-intrusively intercepting data packets 20 to and from said nodes such that said intercepting is 21 substantially transparent to continuous packet flow 22 within said network, said data packets being intact 23 packets consistent with a packet protocol for 24 transmissions within said network; 25 26 means for identifying said data packets of discrete 27 transmissions and assembling said data packets, said 28 means for identifying and assembling having an output of 29 an assembled multi-packet communication for each said 30 discrete transmission, said means for identifying and 31 assembling being non-intrusive with respect to said 32 continuous packet flow of said data packets within said 33 network; 34 35 means connected to said output for determining 36 sources and destinations of said discrete transmissions 8Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next
Last modified: September 9, 2013