Ex Parte Tarquini et al - Page 4

                 Appeal 2007-0477                                                                                      
                 Application 10/003,510                                                                                

            1           The Examiner contends monitoring system 22 and translation                                     
            2    module 32 are integrated in network based alert management system 10 of                               
            3    Porras.  (Answer 8:20-9:9).                                                                           
            4           We affirm.                                                                                     
            5                                          ISSUE                                                           
            6           Have Appellants shown that the Examiner has failed to establish that                           
            7    Porras describes “an intrusion detection application” having both                                     
            8    “identifying” and “decoding” as required by claims 1 and 10?                                          
            9                                                                                                          
           10                                  FINDINGS OF FACT                                                        
           11           Appellants invented a method and computer readable medium for                                  
           12    integrating a decode engine with an intrusion detection system.                                       
           13    (Specification 1, ll. 7-9).                                                                           
           14           Porras describes a network-based alert management system 10 (i.e., an                          
           15    intrusion detection application) meeting all the limitations of claim 10 and                          
           16    all the limitations of claim 1 except “archiving” (col. 3, l. 16 to col. 4, l. 25).                   
           17           Porras describes that system 10 includes fault monitoring systems 22                           
           18    for identifying intrusions (col. 3, ll. 30-37, and col. 3, l. 54 to col. 4, l. 1).                    
           19           Porras describes that system 10 includes translation module 32 (i.e.,                          
           20    decoding engine) (col. 3, ll. 30-37, and col. 3, l. 54 to col. 4, l. 1).                              
           21           Trcka describes using archival data in a network security system                               
           22    (col. 11, ll. 27-48).                                                                                 
           23                                                                                                          





                                                          4                                                            

Page:  Previous  1  2  3  4  5  6  7  8  9  Next

Last modified: September 9, 2013