Ex Parte GUPTA et al - Page 24




                Appeal No. 2002-1527                                                                             Page 24                    
                Application No. 08/885,817                                                                                                  


                the destination address is an IP multicast address, it will use the group IK [sic] Kg to                                    
                decrypt the packet encryption key KP."  Col. 15, ll. 55-59.                                                                 


                        As mentioned regarding claim 1 and 3, nodes operating as firewalls route                                            
                packets.  The appellants admit, moreover, that "[r]outers are . . . implicit in Aziz." (Supp.                               
                Appeal Br. at 8.)  Accordingly, we find that the firewalls or the implicit routers use the                                  
                aforementioned destination IP address to distinguish between public and private                                             
                multicasts.  Therefore, we affirm the rejection of claim 14 and of claim 17, which falls                                    
                therewith.                                                                                                                  


                                                               J. CLAIM 16                                                                  
                        Noting that "Aziz discloses that the public keys are included in the DH certificates                                
                which are issued by a multi-tier certificate structure which also tracks the ownership of                                   
                IP addresses (col 16, line 60 - col 17, line 11)," (Supp. Examiner's Answer at 18), the                                     
                examiner "infers that the certification authority of Aziz . . . binds public keys to IP                                     
                addresses."  (Id.)  The appellants argue, "Aziz does not teach or suggest . . . a                                           
                'certification authority' storing 'records relating to a network address or alias with a                                    
                public key'. . . ." (Supp. Appeal Br. at 8.)                                                                                











Page:  Previous  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  Next 

Last modified: November 3, 2007