throbber
Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 53
`
`al. also disclose that after a user of the newly connected client logs in, the filter sequence
`associated with the client device is changed to another sequence. For example:
`
`"The SMS maintains a series of filtering profiles, each of which includes one or more of filtering
`rules. The SMS sets a default filter sequence for the newly connected client system by
`downloading the sequence by the SMS to the ANCS .... Subsequently, the packet filter uses the
`rules of the login filtering profile sequence to selectively forward or discard IP packets
`originating from the client system. This filtering sequence will allow newly connected client
`systems to perform login but nothing else." (3 :5- 22, emphasis added]
`
`"A preferred embodiment of the present invention also generates or selects filtering profiles for
`users. With the login filtering profile sequence in place, a user can use the newly connected
`.client system to login to the network. The user login is monitored by the SMS. If the user login
`is successful, the SMS selects or generates a user filtering profile sequence. The user filtering
`profile sequence is then downloaded by the SMS to the ANCS .... Subsequently, the new packet
`filter uses the rules of the user filtering profile sequence to selectively forward or discard IP
`packets originating from the client system." [3:34-50, emphasis added]
`
`However, Radia et al. do not explicitly disclose utilizing the login filtering sequence for an
`initial period of time. (Instead Radia et al. only disclose utilizing the login filtering sequence
`until the user logs in.)
`
`Coss et al. disclose that the individualized rule set includes an initial temporary rule set and a
`standard rule set, and wherein the firewall 211 is configured to utilize the temporary rule set for
`an initial period of time and to thereafter utilize the standard rule set.
`
`For instance, Coss et al. disclose:
`
`"Exemplary dynamic rules include a 'one-time' rule which is only used for a single session; a
`time-limited rule which is used only for a specified time period, and a threshold rule which is
`used only when certain conditions are satisfied." [8:37-40, emphasis added]
`
`Accordingly, Coss et al. disclose utilizing an initial rule set being a set of rules including the
`time-limited rule before the specified time period has expired, and utilizing a standard rule set
`being the set of rules not including the time-limited rule after the specified time period has
`expired.
`
`Since each individual element and its function are shown in the prior art, albeit shown in. separate
`references, the difference between the claimed subject matter and the prior art rests not on any
`individual element or function but in the very combination itself-that is in the substitution of the
`firewall 211 of Coss for the router I 06 in Fig. I of Radia. Thus, the simple substitution of one
`
`Panasonic-1014
`Page 451 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 54
`
`known element (i.e. firewall 211 for the router 106) for another producing a predictable result
`renders the claim obvious.
`
`53. The system of claim 1, wherein the individualized rule set includes at least one rule
`allowing access based on a request type and a destination address.
`
`Radia et al. disclose that the individualized rule set includes at least one rule allowing access
`based on a type of IP (Internet Protocol) packet and destination address.
`
`For instance, Radia et al. disclose:
`
`"In FIG. 5; it may be seen that each filtering rule 404 includes an action 500. Action 500
`specifies the disposition of IP packets that match by a particular filtering rule 404. In particular,
`action 500 may indicate that a matched IP packet will be forwarded, or that a matched IP
`packet will be discarded." [6:14-18]
`
`"Filtering rule 404 also includes a protocol type 506. Protocol type 506 corresponds to the
`protocol type of an IP packet. Thus, the protocol type 506 of each filtering rule 404 has a value
`that corresponds to an IP packet type, such as TCP, UDP, ICMP, etc. To match a particular
`filtering rule 404, an IP packet must have a protocol" type that matches the protocol type 506
`included in the filtering rule 404" [6:30-36, emphasis added]
`
`"Filtering rule 404 also includes a destination IP address 502 and a destination IP mask 504.
`Destination IP address 502 corresponds to the destination address included in the header of an IP
`packet. Destination IP mask 504 is similar to destination IP address 502 but corresponds to a
`range of dest.ination addresses. To match a particular filtering rule 404, an IP packet must
`either have a destination address that matches the destination address 502 included in the
`filtering rule 404 or have a destination address that is covered by the destination address mask
`504 of the filtering rule 404." [6:18-29, emphasis added]

`

`
`However, Radia et al. do not explicitly disclose the individualized rule set includes at least one
`. rule allowing access based on a request type and a destination address.
`
`Coss et al. disclose that the individualized rule set includes at least one rule allowing access
`based on a request type and a destination address.
`
`For instance, Coss et al. disclose:
`
`Rule No. 40 in Figure 3 allowing access (i.e., action= "PASS") based on a request type of
`"MAIL" and a destination host of "D".
`
`"In FIG. 3, the categories "Source Host," "Destination Host" and "Service" impose conditions
`which must be satisfied by data included in a packet for the specified action to be taken on that
`packet." [4:2-11, emphasis added]
`
`Panasonic-1014
`Page 452 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 55
`
`Since each individual element and its function are shown in the prior art, albeit shown in separate
`references, the difference between the claimed subject matter and the prior art rests not on any
`individual element or function but in the very combination itself-that is in the substitution of the
`firewall 211 of Coss for the router 106 in Fig. 1 of Radia. Thus, the simple substitution of one
`. known element (i.e. firewall 211 for the router 106) for another producing a predictable result
`renders the claim obvious.
`
`54. The system of claim 44, wherein the individualized rule set includes at least one rule
`.
`redirecting the data to a new destination address based on a request type and an attempted
`destination address.
`
`.
`
`Radia et al. do not explicitly disclose that the individualized rule set includes at least one rule ·
`redirecting the data to a new destination address based on a request type and an attempted
`destination address.
`
`However, Coss et al. disclose that the individualized rule set include.s at least one rule
`redirecting the data to a new destination address based on a request type and an attempted
`destination address.
`
`For instance, Coss et al. disclose:
`
`Rule No. 30 in Figure 3 redirecting data (i.e., action
`"TELNET" and attempted destination host of "C".
`
`"PROXY") based on a request type of
`
`"In FIG. 3, the categories "Source Host," "Destination Host" and "Service" impose conditions
`which must be satisfied by data included in a packet for the specified action to be taken on that
`packet." [4:2-11, emphasis added]
`
`Since each individual element and its function are shown in the prior art, albeit shown in separate
`references, the difference between the claimed subject mat1:er and the prior art rests not on any
`individual element or function but in the very combination itself-that is in the substitution of the
`firewall 211 of Coss for the router 106 in Fig. 1 of Radia. Thus, the simple substitution of one
`known element (i.e. firewall 211 for the router 106) for another producing a predictable result
`renders the claim obvious.
`
`55. The ~ystem of claim 44, wherein the redirection server is configured to redirect data
`from
`the users' computers by replacing a first destination address in an IP (Internet protocol)
`packet ~eader by a second destination address as a function of the individualized rule set.
`
`Radia et al. do not disclose that the redirection server is configured to redirect data from the users
`computers by replacing a first destination address in an IP (Internet protocol) packet header by a
`second destination address as a function of the individualized rule set.
`
`Panasonic-1014
`Page 453 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 56
`
`However, Coss et al. disclose that firewall 211 is configured to redirect data from the users'
`computers by replacing a first destination address in an IP (Internet protocol) packet header by a
`second destination address as a function of the individualized rule set.
`
`For instance, Coss et al. disclose:
`
`"As illustrated in FIG. 3, such a table can provide for categories including rule number,
`designations of source and destination hosts, a designation of a special service which can be
`called for in a packet, and a specification of an action to be taken on a packet." [ 4: 1-6,
`emphasis added]
`
`"1004: if the action indicates a remote proxy, the packet's destination address is replaced with the
`address of the remote proxy; if configured, the destination port can be changed as well; the
`original packet header data is recorded in the session cache along with any changed values;"
`[9:39-44, emphasis added]
`
`Since each individual element and its function are shown in the prior art, albeit shown in separate
`references, the difference between the claimed subject matter and the prior art rests not on any
`individual element or function but in the very combination itself-that is in the substitution of the
`firewall 211 of Coss for the router 106 in Fig. 1 of Radia. Thus, the simple substitution of one
`known element (i.e. firewall 211 for the router 106) for another producing a predictable result
`renders the claim obvious.
`
`56. In a system comprising
`
`Radia et al. Figure I: computer network 100 is a system
`
`a database with entries correlating each of a plurality of user IDs with an individualized
`rule set;
`
`Radia et al. Figure 3: filtering profiles 316 are a database with entries correlating each of a
`plurality of user IDs with an individualized rule set.
`
`For instance, Radia et al. disclose:
`
`"In step 908, which follows, a sequence of filtering profiles 400 associated with the user are
`retrieved, by SMS 114, from filtering profile database 316. In general, it may be appreciated
`that various users of network 100 will have varying types of allowed access. As a result, different
`network users will require different filtering profiles 400. Generally, these filtering profiles 400
`are defined separately for each user using either automatic or manual generation techniques. For
`the present invention, these filtering profiles 400 are preferably maintained in filtering profile
`database 316 and retrieved using the identity of the particular user." [9:46-56, emphasis
`added]
`
`Panasonic-1014
`Page 454 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 57 ·
`
`a dial-up network server that receives user IDs from users' computers;
`
`Radia et al. disclose in Figure 1 that modems 104 (which may be telephone - i.e., dial-up) and
`DHCP server 110 establish a communications link with the user's PC. A login applet on the
`user's computer (one of PCs 102) allows users to login to the network 100.
`
`For instance, Radia et al. disclose:
`
`"A cable modem 104 is connected to each client system 102." [1: 11-12, emphasis added]
`
`"For example, an internet service provider (ISP) may have users who connect, login, logoff and
`disconnect to its network over time telephone or able moderns." [2:45-48, emphasis
`added]
`
`"The client systems, which are typically personal computers using cable modems, connect to the
`router. As part of the connection process, each client system receives a dynamically
`allocated IP address from the DHCP server." [2:67-3:4, emphasis added]
`
`"For a preferred embodiment of network 100, user logins are handled by downloading small,
`specifically tailored applications, known as "login applets," to client systems 102. The login
`applets are downloaded from a server system, such as server system 108, or in some cases, from
`SMS 114." [8:30~34, emphasis.added]
`
`"More specifically, as discussed with regard to method 700, for a preferred embodiment of
`network 100, users login to network 100 using a login applet that communicates with a login
`server, such as SMS 114." [9:39-42, emphasis added]
`
`However, Radia et al. do not explicitly disclose a dial-up network server that receives user IDs
`from users' computers.
`
`Admitted prior art (APA) systems in Figure 1 of the '118 patent include a dial-up networking
`server 102 that receives user IDs from users' computers I 00.
`
`The APA systems are described as follows:
`
`"In prior art systems as shown in FIG. 1 when an Internet user establishes a connection with an
`Internet Service Provider (ISP), the user first makes a physical connection between their
`computer 100 and a dial-up networking server 102, the user provides to the dial-up
`networking server their user ID and password. The dial-up networking server then passes the
`user ID and password, along with a temporary Internet Protocol (IP) address for use by the user
`to the ISP's authentication and accounting server I 04. A detailed description of the IP
`communications protocol is discussed in Internetworking with TCP/IP, 3rd ed., Douglas Comer,
`Prentice Hall, 1995, which is fully incorporated herein by reference. The authentication and
`accounting server, upon verification of the user ID and password using ·a database 106 would
`
`Panasonic-1014
`Page 455 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 58
`
`send an authorization message to the dial-up networking server 102 to allow the user to use the
`temporary IP address assigned to that user by the dial-up networking server and then logs
`the connection and assigned IP address." [" 118 patent, I st paragraph of Background of the
`Invention section, emphasis added]
`
`It would have been obvious to substitute the DHCP server 110 and login applet disclosed by
`Radia et al with the dial-up networking server 102 included in the APA systems to thereby obtain
`the predictable results of: 1) allowing dial-up users to login through the dial-up networking
`server rather than through at applet running on the user's computer, and 2)
`assigning a temporary IP.address to the user's computer by the dial-up networking server 102
`rather than by the DHCP server 110.
`
`a redirection server connected between the dial-up network server and a public network,
`and
`
`Radia et al. Figure 1 : router 106 is connected to the dial-up network server (substituted for
`DHCP server 110 and login applet) and server systems 108 of the network I 00. Router I 06 is
`similar to a redirection server because router 106 is connected between the user's computer (PC
`102) and the network's server systems I 08, and controls the user's access to the network's server
`systems 108.
`
`Radia et al. further disclose that the network is a public network such as the Internet:
`
`"For example, assume that a company uses a router to link its internal intranet with an external
`network, such as the Internet." [2:5-7, emphasis added]

`
`However, Radia et al. do not explicitly disclose that the router 106 controls the user's access to
`the public network by utilizing redirection functionality.
`
`Coss et al. disclose a firewall that is connected between a user's computer and a public network
`that controls the user's access to t~e network by utilizing redirection functionality.
`
`For instance, Coss et al. disclose:
`
`"FIG. 2 shows a user site 201 connected to the Internet 105 via a firewall processor 211 ." [3:53-
`54]
`
`"This invention relates to the prevention of unauthorized access in computer networks and,
`more particularly, to firewall protection within computer networks." [I :6-8, emphasis]
`
`"Dynamic rules are rules which are included with the access rules as a need arises, for processing
`along with the access rules, e.g., by a rule processing engine. Dynamic rules can include unique,
`current information such as, for example, specific source and destination port numbers. They can
`
`Panasonic-1014
`Page 456 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 59
`
`be loaded at any time by trusted parties, e.g., a trusted application, remote proxy or
`firewall administrator, to authorize specific network sessions." [8:24-31, emphasis added]
`
`"To unburden the firewall of application proxies, the firewall can be enabled to redirect a
`network session to a separate server for processing." [ Abstract, emphasis added]
`
`"Proxy reflection in accordance with the. present invention involves redirecting a network session
`to another, "remote" proxy server for processing, and then later passing it back via the firewall to
`the intended destination. When a new session enters the firewall, a decision is made to determine
`whether service by a proxy server is required. If so, the firewall replaces the destination
`address in the packet with the host address of the proxy application and, if necessary, it can
`also change the service port." [Coss et al., col. 8, lines 56-65,
`emphasis added]
`
`It would be obvious to replace the router 106 of Radia et al. with the :firewall 211 of Coss et al. to
`not only allow discarding and forwarding traffic as taught by Radia et al., but to also allow
`controlling the user's access to the network by redirecting traffic at the :firewall 211 to thereby
`prevent the router 106 from having to utilize application proxies, as suggested by Coss et al.
`
`Radia et al. further disclose that other networking technologies may be used instead of router
`106, stating:
`
`"The use of cable router 106 and cable modems 1 0d is also intended to be exemplary and it
`should be appreciated that other networking technologies and topologies are equally
`practical." [ 1: 13-16, emphasis added]
`
`Therefore, it would have been further obvious to a person of ordinary skill in the art that the
`firewall 211 of Coss et al. could substitute the router 106 because the firewall 211 disclosed by
`Coss et al. is another type of networking technology and Radia et al. suggest other types of
`network technology is equally practical.
`
`It would have been further obvious that simple substitution of the known firewall 211 for the
`router 106 obtains predictable results that the network 100 of Radia et al. may now benefit from
`the redirection functionality included in firewall 211.
`
`an authentication accounting server connected to the database, the dial-up network
`server and the redirection server,
`
`Radia et al. Figure 1 disclose access network control server ANCS 112 and services management
`system SMS 114 together are an authentication accounting server because ANCS 112 and SMS
`114 are connected to the database (:filtering profiles 316 within SMS 114 - see Figure 3), the dial(cid:173)
`up network server (substituted for DHCP server 110 and login applet), and the redirection server
`(Coss' :firewall 211 in the position of router 106 in Radia's
`FIG. 1).
`
`Panasonic-1014
`Page 457 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 60
`
`Radia et al. further disclose that the ANCS 112 and SMS 114 determine whether a user ID is
`authorized to access the network.
`
`For instance, Radia et al. disclose:
`
`"FIG. 9 is a flowchart showing the steps associated with a preferred embodiment of a method for
`allocation of privileges to a user in a computer network." [ 4:59-61, emphasis added]
`
`"Method 900 includes step performed by SMS 114 and ANCS 112." [9:35-36, emphasis
`added]
`
`"In step 908, which follows, a sequence of filtering profiles 400 associated with the user are
`retrieved, by SMS 114, from filtering profile database 316. In general, it may be appreciated that
`various users of network 100 will have varying types of allowed access." [9:46-50, emphasis
`added]
`
`"In FIG. 1, ANCS 112 and SMS 114 are shown as separate entities. It should be appreciated,
`however, that the present invention specifically anticipates that ANCS 112 and SMS 114 maybe
`implemented using a single computer system that includes ANCS process 214, SMS process
`314 and filtering profile database 316." [5:65-6:4, emphasis added]
`
`a method comprising the steps of:
`
`Method disclosed by Radia et al. in Figure 9
`
`communicating a first user ID for one of the users' computers and a temporarily assigned
`network address for the first user ID from the dial-up network server to the authentication
`accounting server;
`
`Radia et al. disclose a login applet on a PC I 02 and the DHCP server 110 respectively
`communicate a first user ID (entered using the login applet) for one of the users' computers (one
`of PCs 102) and a temporarily assigned network address (dynamically assigned IP address) for
`the first user ID to the authentication accounting server (SMS 114).
`
`For instance, Radia et al. disclose the login applet communicates from PC 102 to SMS 114:
`
`"Method 900 begins with step 906 where SMS 114 waits for a user login. More specifically, as
`discussed with regard to method 700, for a preferred embodiment of network 100, users login to
`network 100 using a login applet that communicates with a login server, such as SMS 114."
`[9:37-42, emphasis added]
`
`Radia et al. also disclose the DHCP server 110 passes the temporarily assigned network address
`for the first user ID to the SMS 114:

`
`Panasonic-1014
`Page 458 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 61
`
`'.'Method 700 begins with step 706 where SMS 114 waits for the allocation of an IP address to
`a client system 102. More specifically, for a preferred embodiment of network 100, power-on or
`reset of a client system 102 is followed by connection of the client system 102 to router 106. As
`part of this connection, the connecting client system 102 requests and receives a dynamically
`allocated IP address from DHCP server 110. This allocation requires that a number of messages
`pass between DHCP server 110 and the client system 102 requesting a new IP address. The last
`of these messages is a DHCPACK message sent by the DHCP server 110 to the client system
`102. To monitor the allocation of IP addresses, SMS 114 monitors DHCP messages within
`network 100. Step 706 corresponds, in a general sense, to the
`methods and procedures that are executed by SMS 114 to wait for and detect DHCPACK
`messages within network 100." [7:21-34, emphasis added]
`
`With reference to FIG. 9, it is inherent that the SMS 114 also receives the IP address of the client
`system 102 from the dial-up network server because Radia et al. disclose "At the same time,
`the IP address of the client system 102 acting as a host for the user is passed by the SMS
`114 to the ANCS 112." [9:62-64, emphasis added]
`
`Radia et al. further disclose that the IP address of the client system ( one of PCs 102) is
`temporarily assigned:
`
`"More specifically, in systems that use the DHCP protocol for allocation of IP addresses, each IP
`address is allocated for a finite period of time. Systems that do not renew their IP address leases
`may lose their allocated IP addresses." [7:51-55, emphasis added]
`
`However, Radia et al. do not explicitly disclose communicating a first user ID for one of the
`users' computers and a temporarily assigned network address for the first user ID from the dial-
`up network server to the authentication accounting server.

`
`In the admitted prior art (APA) system of FIG. 1, the dial-up network server 102 communicates a
`first user ID for one of the users' computers 100 and a temporarily assigned network address for
`the first user ID to the authentication accounting server 104.
`
`For instance, the APA systems are described as follows:
`
`"The dial-up networking server then passes the user ID and password, along ·with a temporary
`Internet Protocol (IP) address for use by the user to the ISP's authentication and accounting
`server 104." (" 118 patent, 1st paragraph of Background of the Invention section, emphasis added]
`
`It would have been obvious to not remove these useful features of the AP A systems when
`substituting the AP A dial-up networking server 102 for the DHCI' server 110 and login applet in
`FIG .. 1 of Radia et al. This would have been obvious because simple substitution of the known
`dial-up networking server 102 for the DHCP server 110 and login applet obtains predictable
`results that the dial-up networking server 102 continues to include the above disclosed features.
`
`Panasonic-1014
`Page 459 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 62
`
`It would further have been obvious that the dial-up network server should continue to behave in
`this way because, rather than the SMS 114 receiving the user ID and IP address respectively
`from the login applet and DHCP server 110, the SMS l l4 would receive this information from
`the dial-up networking server, as suggested by the AP A
`
`communicating the individualized rule set that correlates with the first user ID
`and the temporarily assigned network address to the redirection server from the
`authentication accounting server;
`
`Radia et al. disclose the ANCS 112 and SMS 114 access the database 316 and communicate the
`(identity of the user) and the temporarily assigned network address (dynamic IP address) to the
`router 106.
`
`For instance, Radia et al. disclose:
`
`FIG. 9: step 906 "wait for user login", step 908 "retrieve user filter profile from database", step
`919 "download user profile to ancs", and step 920 "reconfigure network components"
`
`"In step 908, which follows, a sequence of filtering profiles 400 associated with the user are
`retrieved, by SMS 114, from filtering profile database 316". [9:46-48, emphasis added]
`
`"For the present invention, these filtering profiles 400 are preferably maintained in filtering
`profile database 316 and retrieved using the identity of the particular user." [9:53 -56,
`emphasis added]
`
`"Step 908 is followed by step 910 where the sequence of user filtering profiles 400 is
`downloaded by SMS 114 to ANCS 112. At the same time, the IP address of the client system
`102 acting as a host for the user is passed by the SMS 114 to the ANCS 112." [9:60-64, emphasis
`added]
`
`"In the following step, the ANCS 112 uses each of the filtering rules 404 included in the
`sequence of user filtering profiles 400 to establish a packet filter for IP packets originating
`from the client system 102 acting as a host for the user." [9:64-10: 1, emphasis added]
`
`"The packet filter is established by reconfiguring one or more of the components of the network
`100 that forward packets originating at the client system I 02 acting as a host for the user. For
`example, in some cases, the packet filter may be established by reconfiguring the modem 104
`connected to the client system 102. Alternatively, the packet filter may be established by
`reconfiguring router 106." [10:1-7, emphasis added]
`
`It is inherent that the "packet filter for Ii> packets originating from the client system 102"
`communicated to the router 106 includes the temporarily assigned (i.e., dynamic) IP address of
`the client system 102 in order to identify the IP packets originating from the client system 102.
`
`Panasonic-1014
`Page 460 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992·
`
`Page 63
`
`However, Radia et al. do not explicitly disclose communicating the individualized rule set that
`correlates with ·the first user ID and the temporarily assigned network address to the redirection
`server from the ANCS 112 and SMS 114.
`
`It would have been obvious to have the ANCS 112 and SMS 114 access the database 316 and
`communicate the individualized rule set that correlates with the first user ID and the temporarily
`assigned network address to the firewall 211 of Coss ·et al. A first reason is Radia et al. teach
`reconfiguring one or more network components that forward packets originating at the client
`system 102, and the firewall 211 of Coss et al. is a network component that forwards packets
`originating at a client system. As such, Radia et al. suggest reconfiguring the firewall 211.
`
`It would have further been obvious to use a known technique (i.e., communicating an
`individualized rule set to thereby reconfiguring a router 106) to improve a similar device
`(firewall 211) in the same way.
`
`Additionally, Coss et al. disclose dynamic rules can be loaded into the firewall 211 at any time
`by trusted applications to thereby authorize specific network sessions. For instance, Coss et al.
`teach:
`
`"Dynamic rules can include unique, current information such as, for example, specific source
`and-destination port numbers. They can be loaded at any time by trusted parties, e.g., a trusted
`application, remote proxy or firewall administrator, to authorize specific network sessions."
`[8:26-31, emphasis added]
`
`It therefore would have further been obvious to have the ANCS 112 communicate the
`individualized rule set to the firewall 211 of Coss et al. because the ANCS 112 is a trusted
`application that authorizes specific network sessions, as suggested by Cosset al.
`
`and processing data directed toward the public network from the one of the users'
`computers according to the individualized rule set.
`
`Radia et aL disclose processing data directed
`toward the public network from the one of the user
`computers ( one of PCs 102) according to the
`individualized rule set.
`
`For instance, Radia et al. disclose:
`
`"Subsequently, the packet filter established by the ANCS 112 is used to filter IP packets that
`originating from the client system 102 acting as a host for the user, allowing the packets that are
`associated with the network privileges of the user." [10: 11-14,emphasis added]
`
`57. The method of claim 56, further including the step of controlling a plurality of data to
`and from the users' computers as a function of the individualized rule set.
`
`Panasonic-1014
`Page 461 of 1980
`
`

`

`Application/Control Number: 95/002,035 and 90/012,342
`Art Unit: 3992
`
`Page 64
`
`Radia et al disclose that router 106 in FIG. 1 further provides control over a plurality of data
`from the users' computers as a function of the individualized rule set (FIG. 6, step 606, "filter IP
`packets in accordance with filtering profile" and col. 10, lines 6-14).
`
`Radia et al. do not explicitly disclose the step of computers as a function of the individualized
`rule set.
`
`However, Coss et al. disclose firewall 211 further provides control over a plurality of data to and
`from the users' computers as a function of the individualized rule set.
`
`For instance, Coss et al. disclose:
`
`"The latter embodiment can allow the firewall techniques of the invention to provide, for
`example, parental control oflntemet and video access in the home." [2:57-60]
`
`See FIG. 3, rule No. IO controlling FTP data to host B, and rule No. 30 controlling Telnet data
`from host B.
`
`Coss et al. also disclose rule set categories such as "Source host group identifier or IP address",
`"Destination host group identifier or IP address", and "Rule action, e.g., 'pass', 'drop', or 'proxy"'
`[4:39-43] allowing the firewall 211 to control data to and from the users' computers as a function
`of the individualized rule set.
`
`Since each individual element and its function are shown in the prior art, albeit shown in separate
`references, the difference between the claimed subject matter and the prior art rests not on any
`individual element or function but in the very combination itself-that is in the substitution of the
`firewall 211 of Coss for the router I 06 in Fig. 1 of Radia. Thus, the simple substitution of one
`known element (i.e. firewall 211 for the router 106) for another producing a predictable result
`. renders the claim obvious.
`
`58. The method of claim 56, further including the step of blocking the data to and from the
`users' computers as a function of the individualized rule set.
`
`Radia et al disclose that router 106 in FIG. 1 further blocks data from the users' computers as a
`function of the individualized rule set (FIG. 6, step 606, "filter IP packets in acc.ordance with
`filtering profile" and co

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket