Appeal 2007-1720 Application 09/148,832 8. Ginter’s object may also contain permission records (PERCs): Logical object structure 800 shown in FIG. 17 may also include one or more PERCs 808. PERCs 808 govern the use of an object 300, specifying methods or combinations of methods that must be used to access or otherwise use the object or its contents. The permission records 808 for an object may include key block(s) 810, which may store decryption keys for accessing the content of the encrypted content stored within the object 300. (Ginter, col. 135, ll. 51-58.) As such, Ginter discloses a data package or “object” which contains attribute data (e.g., permission records). 9. The permission records within the objects describe the scope of the data that may be accessed and therefore the boundary of the data that is accessible. 10. Each of the Ginter’s object types has a format that differs in size and content from one another. Further, each instance of each of these objects has variable content that results in its size and contents differing from other instances of the same object. 11. A different size implies a different boundary. The maximum boundary of the data is defined by the number of data blocks within the object, which would be implicit in the identification of the object provided in the header (Ginter, col. 135, ll. 20-24). 12. Thus, the type of object and the number of blocks are attributes for the transaction that affect the defined boundary. 6Page: Previous 1 2 3 4 5 6 7 8 9 Next
Last modified: September 9, 2013