Appeal 2007-0716 Application 09/946,201 4. The web browser (610) then processes the ARI tags in the webpage to determine the user’s level of access to the content of the webpage. (Id.) 5. The web browser (610) subsequently restricts the client’s access to the content of the webpage based upon the client’s determined level of access.2 (Id.) The Prior Art Relied upon 6. Schreiber teaches a method and system for controlling client’s access to digital images referenced in a webpage located on a server. (Abstract and col. 6, ll. 24-30.) 7. Schreiber teaches a dialog box (Figure 12) for allowing an administrator to enter authentication data (such as password, webpage) to access a designated webpage and to set or update the protection status of the images residing on the webpage. (Col. 21, ll. 53-59 and col. 22, ll. 37-44.) 8. The administrator uses HTML tags to designate selected images referenced within the webpage as “protected” or “not protected.” (Col. 23, l. 58-col. 24, l. 2.) 9. The client computer (106) through its resident browser (112) issues a request to the server (100) to access a webpage (902) on a first server (900) referencing a protected (encrypted) image and residing on a second server (906). (Col. 20, ll. 27-36.) 10. Upon receiving the request, the server (900) (1) parses the webpage to locate the encrypted image, (2) downloads the encrypted image to create an alias (908), which the server (900) subsequently converts to generate a 2 Based on the ARI tags associated in the requested content of the webpage, various functions (e.g. print, save, copy) may be enabled or disabled in the browser. ARI tags include identifiers pertaining to costs, payee, user info, time, printing, copy, save, path and degrade. Specification 9 and 15. 5Page: Previous 1 2 3 4 5 6 7 8 9 Next
Last modified: September 9, 2013