. . . . "One ordinarily skilled in the art will appreciate the wide range of rules for compression, encryption, security and other characteristics of the proxied connection 202-20" .