Appeal 2007-1731 Application 10/796,051 The statement of rejection with respect to claim 7 refers to Figures 1 and 3, and column 4, lines 1 through 22, and column 7, lines 3 through 16, as teaching the feature in controversy. (Answer 4.) We find that Baker describes a system that includes a relational database to determine access rights to information or services to public or uncontrolled databases such as those that may be found on the Internet. Resource identifiers (URLs) are associated with a particular access rating. A request from a user for a particular resource will only be passed on from the local network to a server providing a link to the resource if the URL has an access rating for which the user has been assigned specific permissions by an administrator or manager. The invention may be implemented as part of a proxy server within the user’s local network. Baker, col. 3, ll. 8-32. In Baker Figures 1 and 3, proxy server 112 provides a connection from processor 111 to public network 100 via firewall 113. Requests from user terminals 107-109 for access to network services 101-105 through public network 100 are submitted to processor 111 within proxy server 112. Processor 111 determines the identity of the requesting user terminal and compares the user’s particular rating class with the rating associated with the particular URL. Baker, col. 3, l. 65 - col. 4, l. 43. When a requesting user terminal transmits a URL via LAN 110 (Fig. 1), processor 111 receives the URL and the requesting user terminal identification code. Assuming that the user (e.g., terminal 107) has sufficient clearance for the requested URL, processor 111 forwards the URL to public network 100 via firewall 113. Assuming availability of the resource, the public network returns the requested information to user terminal 107 via firewall 113, processor 111 and LAN 110. Baker, col. 5, ll. 8-40. 5Page: Previous 1 2 3 4 5 6 7 8 9 Next
Last modified: September 9, 2013