Appeal No. 2002-1868 Application 09/059,033 Yuasa discloses several embodiments for "transferring under user control at least one of the stored user commands from the log file to the macro file." In embodiment 1, a program is generated having functions equivalent to the entire sequence of the command strings (col. 21, lines 58-60; col. 22, lines 48-52); in embodiment 2, a program based on a portion of the sequence of command strings is generated by specifying an end point to the chaining relationship (col. 22, lines 52-55; col. 23, lines 1-7); in embodiment 3, an intermediate portion of a sequence of commands may be generated as a program by specifying change points (col. 25, lines 2-6; col. 25, line 45 to col. 26, line 56); in figure 5, the operator can arbitrarily specify a plurality of execution results to automatically generate a program equivalent to sequences of command series (col. 30, lines 48-54). Yuasa discloses that "[i]tems such as commands previously inputted by the operator can be specified thereafter as commands or operands in a subsequent operation by use of identifiers, icons, function keys, or the like" (col. 34, lines 13-16). While it appears that claim 1 is anticipated by Yuasa, the rejection is maintained under § 103. Thus, we sustain the rejection of claims 1-3 and 12-14 based on Yuasa alone. - 8 -Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 NextLast modified: November 3, 2007