Appeal No. 2000-1362 Application 08/914,165 information about messages in their "mailbox" (col. 3, lines 45-47). It is important that a user get his and only his messages. The integrity of stored message security is vulnerable if the VM system should fail in the process of updating pointers on the disk which identify a particular user's message, in which case another user B's directory may point to a message that in reality belongs to user A (col. 1, lines 22-34, 60-65). Olson discloses encryption for a particular message for a designated user where the encoding key is stored in the designated user's message directory (col. 1, lines 47-57; figure 3A; col. 4, lines 15-35). When the user enters a mailbox number and password number, the VM system attaches the key to the channel and the encrypted message is retrieved from disk and played through the channel using the key (figure 3B; col. 4, lines 36-45). If any disk errors occur or the system retrieves an incorrect message, the encrypted message will not be decrypted by the other mailbox and there will no be any playing of unauthorized voice messages to a non-designated user (col. 4, lines 46-51). Claims 82, 86, and 87 stand rejected under 35 U.S.C. § 103(a) as being unpatentable over Bieselin and Olson. We refer to the first Office action (Paper No. 4), the final rejection (Paper No. 8) (pages referred to as "FR__") and the examiner's answer (Paper No. 16) for a statement of the examiner's rejection, and to the brief (Paper No. 15) (pages - 3 -Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 NextLast modified: November 3, 2007