Appeal 2006-2971 Application 10/015,256 line analysis indicates that a number of the claim limitations are not fairly read on that reference. Claim 1 contains the following limitations: 1. A method for tracking custom computer application development profiles in a data processing system, said method comprising: creating said profiles with a first database tool; gathering requirements of said profiles with a second database tool; tracking modifications of said profiles with a third database tool; allowing security and authorization users access to said profiles; and determining whether breaches in security of said data processing system has [have]2 occurred in each phase of development of a computer application program. Sziklai’s system addresses the application of a myriad of regulations of various types in a software-based business enterprise, and provides a method and system for tracking the changes, and applying them to the underlying business so the latter can conform to the requirements of said regulations. Though not exactly analogous to the claimed method for tracking custom computer application development profiles, the teachings of Sziklai include information that can be read on the application development profiles in some respects. 2 Grammatical correction was proposed in Appellants’ unentered amendment filed on March 1, 2005. 5Page: Previous 1 2 3 4 5 6 7 8 Next
Last modified: September 9, 2013