Appeal No. 2000-1508 Page 3 Application No. 08/810,442 computation means, for decrypting a relatively stronger second key, which encrypts said first key (SK); and c) means for receiving all externally supplied input, including all program content and all keys, on a single input port, and delivering said input to the first and second computation means. The prior art applied by the examiner in rejecting the claims follows: Gammie et al. (“Gammie”) 5,237,610 Aug. 17, 1993 Piosenka et al. (“Piosenka”) 5,389,738 Feb. 14, 1995 Schneier, Applied Cryptography, 265-78 and 357-63 (2d ed. 1995). Claims 3 and 5 stand rejected under 35 U.S.C. § 112, ¶ 2, as indefinite. Claims 3 and 10 stand rejected under 35 U.S.C. § 112, ¶ 1, as non-enabled. Claim 10 stands rejected under § 112, ¶ 1, as lacking a written description. Claims 1, 5, 8, and 10 stand rejected under 35 U.S.C. § 102(b) as anticipated by Gammie. Claims 2 and 3 stand rejected under 35 U.S.C. § 103(a) as obvious over Gammie in view of Schneier. Claim 5 stands rejected under § 103(a) as obvious over Gammie in view of Piosenka.Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 NextLast modified: November 3, 2007