Ex Parte NIELSEN - Page 11




          Appeal No. 2001-0331                                      Page 11           
          Application No. 09/122,982                                                  


          identity from a comparison of an individual’s biometrics sample             
          and personal identification code gathered during a bid step with            
          biometrics sample and personal identification code for that                 
          individual gathered during a registration step and stored at a              
          remote site wherein there is a data processing center.”  Hoffman            
          discloses the use of e-mail including encryption of messages                
          (col. 33, lines 25-68), with public and private keys (col. 31,              
          lines 27-30), and electronic signatures (col. 31, lines col. 32,            
          line 65 through col. 33, line 14).  Netscape 2 discloses (page              
          287) that some fire walls allow e-mail traffic, which limits                
          security to "mail bombs" and other e-mail based attacks.                    
          Netscape 2 also discloses encryption (page 288) and storing                 
          copies of outgoing messages (page 330).  Pegasus discloses                  
          encryption of e-mails as well as automatically sending a copy of            
          the message to the sender.  It is disclosed that Pegasus will               
          remember your preferences from one session to the next.  Thus, we           
          find that the references generally teach the use of e-mail with             
          encryption of the data sent.                                                
               As stated by the court in In re Hiniker Co., 150 F.3d 1362,            
          1369, 47 USPQ2d 1523, 1529 (Fed. Cir. 1998) “[t]he name of the              
          game is the claim.”  Claims will be given their broadest                    
          reasonable interpretation consistent with the specification, and            







Page:  Previous  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  Next 

Last modified: November 3, 2007