Appeal No. 1999-2747 Application 08/757,979 array. The final subparagraph of this claim reads: "storing to and retrieving data from remaining portions of the array, wherein the step of setting a flag comprises setting a set invalid bit in a flag field of a line in the storage array." Lefsky discloses that his system maps out defective cache11 cells so that operation of the rest of the cache system can continue, and that the output enable means suppresses a cache12 cell output when the force bit is set so that as long as one cache cell in each set of the cache memory remains operational, the system can continue operation. Furthermore, the force bit is clearly the set invalid bit in a flag field of a line in the storage array of Lefsky. Therefore, upon considering Lefsky as a whole, we find that Lefsky discloses all of the limitations of claim 20. As we have found above that Lefsky, discloses all the limitations of claim 20, this claim is obvious over Lefsky. "[A] disclosure that anticipates under Section 102 also renders the 11Column 12, lines 65-67. 12Column 3, lines 9-24. 10Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 NextLast modified: November 3, 2007