Appeal 2007-1317 Application 09/731,623 Independent claim 1 is illustrative: 1. An authentication method comprising the steps of: generating a first security context in response to a first user authentication; generating a second security context in response to a second user authentication, wherein said second security context is an aggregate of said first security context and a security context corresponding to an identity in said second user authentication. THE REFERENCES The Examiner relies upon the following references as evidence of unpatentability: Wu US 5,774,551 Jun. 30, 1998 John Savill, “Where can I find a Unix SU (substitute user) like utility?” InstantDoc #15120, Dec. 10, 1999. THE REJECTION The following rejection is on appeal before us: 1. Claims 1-6, 8-14, 16-22, and 24 stand rejected under 35 U.S.C. § 103(a) as being unpatentable over the teachings of Savill in view of Wu. Rather than repeat the arguments of Appellants or the Examiner, we make reference to the Brief and the Answer for the respective details thereof. OPINION Only those arguments actually made by Appellants have been considered in this decision. It is our view, after consideration of the record 3Page: Previous 1 2 3 4 5 6 7 8 9 10 Next
Last modified: September 9, 2013