Ex Parte ENDICOTT et al - Page 4




          Appeal No. 2000-1973                                                        
          Application 08/890,906                                                      

               The examiner relies on the following references:                       
          Kelly, Jr. et al. (Kelly)     5,129,084         July 7, 1992                
          Endicott et al. (Endicott)    5,404,525        April 4, 1995                
          Tanaka et al. (Tanaka)        5,539,909        July 23, 1996                
          Yoshihiro Watabe et al. (Yoshihiro) JP 2-165223  June 26, 1990              
          (Japanese Kokai)                                                            
               Claims 2-6, 21, and 22 stand rejected under 35 U.S.C.                  
          § 103(a) as being unpatentable over Kelly and Endicott.                     
               Claims 12-16 stand rejected under 35 U.S.C. § 103(a) as                
          being unpatentable over Kelly, Endicott, and Tanaka.                        
               Claims 17-20 stand rejected under 35 U.S.C. § 103(a) as                
          being unpatentable over Kelly, Endicott, Tanaka, and Yoshihiro.             
               We refer to the rejection (Paper No. 5) (pages referred to             
          as "R__") and the examiner's answer (Paper No. 11) (pages                   
          referred to as "EA__") for a statement of the examiner's                    
          rejection, and to the brief (Paper No. 9) (pages referred to as             
          "Br__") for a statement of appellants' arguments thereagainst.              
                                       OPINION                                        
               The examiner finds that Kelly teaches "first object data and           
          a first at least one method program associated with said first              
          object" in the abstract (EA3).  The examiner finds (EA3-4) that             
          the access control list and access mask (at col. 23, Table 2)               
          constitute "a storage protection mechanism which enforces                   
          encapsulation of said first object . . . by restricting access to           
          said first object data to only first authorized method programs             

                                        - 4 -                                         





Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  Next 

Last modified: November 3, 2007