Ex Parte ESLINGER et al - Page 2




              Appeal No. 2003-0033                                                                                        
              Application No. 09/186,546                                                                                  


                                                    BACKGROUND                                                            
                     Appellants’ invention relates to a secure memory management unit which uses                          
              multiple cryptographic algorithms.  An understanding of the invention can be derived                        
              from a reading of exemplary claim 1, which is reproduced below.                                             
                     1.     A method by which an integrated circuit accesses first encrypted                              
                     data stored in a first external memory and accesses second encrypted                                 
                     data stored in a second external memory, the first external memory and                               
                     the second external memory being external to the integrated circuit, the                             
                     method comprising the following steps:                                                               
                            (a) when accessing a first portion of the first encrypted data stored                         
                     in the first external memory, performing the following substep:                                      
                                   (a.1) using a first algorithm to decrypt the first portion of the                      
                     first encrypted data, decryption using the first algorithm being performed                           
                     within the integrated circuit; and,                                                                  
                            (b) when accessing a first portion of the second encrypted data                               
                     stored in the second external memory, performing the following substep:                              
                                   (b.1) using a second algorithm to decrypt the first portion of                         
                     the second encrypted data, decryption using the second algorithm being                               
                     performed within the integrated circuit, wherein the second algorithm is                             
                     different than the first algorithm.                                                                  

                     The prior art references of record relied upon by the examiner in rejecting the                      
              appealed claims are:                                                                                        
              Abadi et al. (Abadi)                5,268,962                           Dec. 7, 1993                        
              Sourgen et al. (Sourgen)            5,850,452                           Dec. 15, 1998                       



                                                            2                                                             





Page:  Previous  1  2  3  4  5  6  7  8  9  Next 

Last modified: November 3, 2007