Appeal No. 2000-1308 Application 08/550,909 More particularly, the invention is directed to encryption and decryption techniques which help eliminate the pirating of the protected material by unauthorized users. Representative claim 18 is reproduced as follows: 18. For an encryption system which includes sub-systems which (1) communicate with each other using communication channels, and (2) cooperate to deliver to subscribers encrypted material and encrypted keys, a method comprising the following steps: a) when the encrypted keys are stored in a sub-system, storing them in encrypted form; and b) prior to transferring a stored encryption key from one sub-system to another, i) de-crypting the stored key into plain text, ii) encrypting the plain text into cypher text, and iii) transferring the cypher text to the other system. The examiner relies on the following references: Rivest et al. (Rivest) 4,405,829 Sep. 20, 1983 Mason 4,736,422 Apr. 05, 1988 Inoue 5,195,134 Mar. 16, 1993 Pires 5,204,900 Apr. 20, 1993 Rager et al. (Rager) 5,363,447 Nov. 08, 1994 Finkelstein et al. 5,410,602 Apr. 25, 1995 (Finkelstein) The following rejections are on appeal before us: 1. Claims 18-22 and 25-29 stand rejected under 35 U.S.C. § 112, first paragraph, as being based on an insufficient disclosure. 2Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 NextLast modified: November 3, 2007