"Those skilled in the art will recognize (1) there are many ways in which security events can be divided into categories and types and (2) said invention is independent of the categories and types which are selected." . . . .