Ex Parte Tarquini et al - Page 5

                    Appeal 2007-1276                                                                                                      
                    Application 10/001,446                                                                                                
                            feature group address" that is reserved for LAN security features.                                            
                            (Col. 2, ll. 60-65.)                                                                                          

                      3. In a discovery phase, the managed hub of Holloway determines the                                                 
                            interconnect devices (such as switches, bridges, and routers) in the                                          
                            network that are capable of supporting the LAN security feature and                                           
                            builds a table of those interconnect devices.  (Col. 2, l. 66 to col. 3,                                      
                            l. 4; col. 3, ll. 25-28.)  The managed hub maintains a list of authorized                                     
                            Media Access Control (MAC) addresses for each of its ports.  (Col. 3,                                         
                            ll. 4-6.)  In a detection phase, the managed hub compares the MAC                                             
                            addresses on each port against the list of authorized MAC addresses in                                        
                            order to detect a security breach.  (Col. 3, ll. 34-36.)  The code to                                         
                            implement the discovery and detection phases runs within the                                                  
                            managed hub.  (Col. 9, ll. 33-36; col. 11, ll. 30-32.)                                                        

                      4. If the managed hub detects an unauthorized station connecting to the                                             
                            LAN, it disables the port and transmits a "security breach detected                                           
                            frame" to the LAN security feature group address.  (Col. 3, ll. 6-9, 36-                                      
                            40.)  When a LAN interconnection device receives the security breach                                          
                            detected frame, it sets up a filter for the intruding MAC address and                                         
                            forwards the security breach detected frame to other LAN segments                                             
                            attached to the interconnection device.  (Col. 3, ll. 9-17, 42-49.)                                           

                      5. Holloway teaches that a network management station can monitor the                                               
                            progress of the security breach detected frame though information that                                        
                            it receives in "trap frames" from the managed hub and the                                                     

                                                                    5                                                                     

Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  Next

Last modified: September 9, 2013