Appeal No. 2001-0331 Page 11 Application No. 09/122,982 identity from a comparison of an individual’s biometrics sample and personal identification code gathered during a bid step with biometrics sample and personal identification code for that individual gathered during a registration step and stored at a remote site wherein there is a data processing center.” Hoffman discloses the use of e-mail including encryption of messages (col. 33, lines 25-68), with public and private keys (col. 31, lines 27-30), and electronic signatures (col. 31, lines col. 32, line 65 through col. 33, line 14). Netscape 2 discloses (page 287) that some fire walls allow e-mail traffic, which limits security to "mail bombs" and other e-mail based attacks. Netscape 2 also discloses encryption (page 288) and storing copies of outgoing messages (page 330). Pegasus discloses encryption of e-mails as well as automatically sending a copy of the message to the sender. It is disclosed that Pegasus will remember your preferences from one session to the next. Thus, we find that the references generally teach the use of e-mail with encryption of the data sent. As stated by the court in In re Hiniker Co., 150 F.3d 1362, 1369, 47 USPQ2d 1523, 1529 (Fed. Cir. 1998) “[t]he name of the game is the claim.” Claims will be given their broadest reasonable interpretation consistent with the specification, andPage: Previous 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 NextLast modified: November 3, 2007