Appeal No. 2004-1702 Application 09/182,745 publication data can include text, image data and/or layout data for a particular publication item" (col. 2, lines 8-9), which we interpret to broadly be multimedia files. We agree with the examiner that it would have been obvious to apply the access control teachings of Gill to Syeda since it was notoriously well known in the art to provide access control to computers and databases. And, we find that there must inherently be some program code to control access. However, the claims require more than just access control, and we do not see how Gill meets the limitations of: (1) "an editable layer allowing the programmer to program selective control of access by the IMV to the multimedia files"; and (2) "the programmed selective control in the editable layer restricts selected multimedia files from being accessed by the IMV." There is no teaching in Gill of an "editable layer" that allows a "programmer" to "program selective control." Instead, the selective control of access appears to be accomplished by built-in access control function using a logon ID and password. Although appellants' arguments are very general and do not mention Gill or focus on these limitations, we cannot ignore major limitations which constitute over half of the claim limitations. "All words in a claim must be considered in judging the patentability of that claim against the prior art." In re Wilson, 424 F.2d 1382, 1385, 165 USPQ 494, 496 (CCPA 1970). We do not find where the examiner addresses these particular - 8 -Page: Previous 1 2 3 4 5 6 7 8 9 10 11 NextLast modified: November 3, 2007