Ex Parte Cromer et al - Page 8

                 Appeal No.  2006-1734                                                                                    
                 Application 09/855,624                                                                                   


                 replacement files to every authorized client.” Column 2, lines 58 through 61.                            
                 We also make specific reference to the first paragraph of the Summary of the                             
                 Invention at column 4 of Aziz.                                                                           
                         The requirements of address matching for communication purposes is                               
                 well known in the Internet communication art and is mentioned briefly at the                             
                 end of the first paragraph of the Background of the Invention at column 1 of                             
                 Aziz.  It is indicated there that just as a person who sends a letter through a                          
                 normal postal service needs to know the recipient address, a client that                                 
                 communications with a host via computer network also needs to know the                                   
                 host network address.  This requires a matching function and clearly any                                 
                 time an address of a host computer would change on a network, the artisan                                
                 would well appreciate that this address information would have to be                                     
                 updated in a clients’ memory files for bidirectional communication to occur.                             
                         Even in a secure communication environment, such as discussed at                                 
                 column 3 and throughout Aziz, cryptographic methodology known in the art                                 
                 requires a certain degree of matching of address information and other data                              







                                                            8                                                             


Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  Next 

Last modified: November 3, 2007