Appeal 2007-0663 Application 09/825,661 10. He discloses that "[a] synchronous or asynchronous method can be used for communication between a client and a server." (Col. 1, ll. 28-29.) 11. "There have been proposals of lock algorithms . . . for the synchronous method." (Col. 2, ll. 16-17.) 12. More specifically, He describes a "Basic 2 Phase Lock (B2PL)" algorithm, (id. l. 23), and a "Cashing [sic] 2PL (C2PL)" algorithm. (Col. 3, l. 4.) 13. Because the B2PL's "sequence of operations consists of two phases: a locking phase for reads or writes and an unlocking phase for a commit or an abort, it is called a Two Phase Lock algorithm." (Col. 2, ll. 64-67.) 14. The C2PL "algorithm is the same as B2PL in that the server places a shared lock (read lock) or exclusive lock (write or update lock)," (col. 3, ll. 5-7), followed by a commit or an abort. (Id. ll. 32-36.) 15. The passage of He cited by the Examiner, (Answer1 4), follows. FIG. 20 shows the operation of client A requesting a commit by the server of the update request described above. Client A sends commitRequest( ) to the server. Then the server returns commitReturn( ). Similarly, for abort operation, an abort request and abort return are transferred. In this case, since the 1 We rely on and refer to the substitute Examiner's Answer, in lieu of the original Examiner's Answer, because the latter was defective. The original was not considered in deciding this appeal. 5Page: Previous 1 2 3 4 5 6 7 8 9 10 Next
Last modified: September 9, 2013