Appeal No. 1997-1117 Application No. 08/300,703 has relied on for disclosing the claimed two-level verification feature. Upon careful review of the Warren reference, we are in agreement with the Examiner’s position as stated in the Answer. The disclosure at column 16, lines 1-58 of Warren describes an initial access verification performed by comparing a portion of an input code with a stored access code and a second verification performed by determining whether access is permitted to a selected container by examining a “device” portion of the input code. Additionally, in our view, the description in column 16 of Warren has relevance to independent claim 33 which is directed to the verification of the input of a selected code and additional information. As alluded to by the Examiner at page 11 of the Answer, Warren provides for the enablement of control of a particular device according to the input of an additional “device” code after analysis of the input selected access code. Further, to the extent that Appellant is correct in challenging Warren’s use of a dynamic non-predictable code, the disclosure of Weiss, which is included in the Examiner’s proposed combination, provides a clear teaching of this feature. For the above 10Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 NextLast modified: November 3, 2007