Appeal 2006-2971 Application 10/015,256 allowing security and authorization users access to said profiles; and determining whether breaches in security of said data processing system have occurred in each phase of development of a computer application program. REFERENCES The references relied on by the Examiner are as follows: Sziklai US 6,341,287 B1 Jan. 22, 2002 Java Web Start 1.4.2 Release Notes, http://java.sun.com/j2se/1.4.2/docs/guide/jws/relnotes.html (last visited Sep. 7, 2006). It is observed that the Java Release Notes are cited to show an inherent characteristic of the teaching of the primary reference, Sziklai, under an exception to the usual reliance on a single reference in a rejection under 35 U.S.C. § 102. See Continental Can Co. USA v. Monsanto Co., 948 F.2d 1264, 1268, 20 USPQ2d 1746, 1749 (Fed. Cir 1991). The date of a document cited for that purpose may have a later date than the application’s effective filing date. See In re Wilson, 311 F.2d 266, 135 USPQ 442 (CCPA 1962). REJECTION AT ISSUE Claims 1 to 21 stand rejected under 35 U.S.C. § 102(e) as being anticipated by Sziklai et al (Sziklai). 3Page: Previous 1 2 3 4 5 6 7 8 Next
Last modified: September 9, 2013