Ex Parte Rinkevich et al - Page 2


                  Appeal 2007-1317                                                                                          
                  Application 09/731,623                                                                                    
                  respect to the rejection of dependent claim 11, the Examiner has indicated on                             
                  page 11 of the Answer that the rejection of claim 11 has been reconsidered                                
                  and withdrawn. However, on pages 4 and 6 of the Answer we find the                                        
                  Examiner nevertheless maintains a rejection for claim 11 as being                                         
                  unpatentable over Savill in view of Wu.  In order to avoid unnecessary delay                              
                  and expedite the prosecution of this appeal, we will consider claim 11 as                                 
                  standing rejected as set forth on pages 4 and 6 of the Answer. We note that                               
                  Appellants address the Examiner’s rejection of claims 1-24 in the Brief and                               
                  there is no Reply Brief.                                                                                  

                                                   THE INVENTION                                                            
                         The disclosed invention relates generally to data processing systems,                              
                  and more particularly, to user authentication and access in a data processing                             
                  system (Specification 1).  The disclosed invention provides a system and                                  
                  method for aggregating authenticated identities.  A security context created                              
                  in response to a first user logon is saved in response to a second logon.  A                              
                  composite or aggregate security context is created based on the identity                                  
                  passed in the second logon.  Access may then be granted (or denied) based                                 
                  on the current, aggregated security context.  Upon logout of the user based                               
                  on the second identity, the aggregate security context is destroyed, and the                              
                  security context reverts to the context previously saved.  Alternatively, in                              
                  another embodiment, all security contexts, including those on the stack, may                              
                  be destroyed (Specification 8).                                                                           




                                                             2                                                              

Page:  Previous  1  2  3  4  5  6  7  8  9  10  Next

Last modified: September 9, 2013