Appeal No. 2002-1527 Page 24 Application No. 08/885,817 the destination address is an IP multicast address, it will use the group IK [sic] Kg to decrypt the packet encryption key KP." Col. 15, ll. 55-59. As mentioned regarding claim 1 and 3, nodes operating as firewalls route packets. The appellants admit, moreover, that "[r]outers are . . . implicit in Aziz." (Supp. Appeal Br. at 8.) Accordingly, we find that the firewalls or the implicit routers use the aforementioned destination IP address to distinguish between public and private multicasts. Therefore, we affirm the rejection of claim 14 and of claim 17, which falls therewith. J. CLAIM 16 Noting that "Aziz discloses that the public keys are included in the DH certificates which are issued by a multi-tier certificate structure which also tracks the ownership of IP addresses (col 16, line 60 - col 17, line 11)," (Supp. Examiner's Answer at 18), the examiner "infers that the certification authority of Aziz . . . binds public keys to IP addresses." (Id.) The appellants argue, "Aziz does not teach or suggest . . . a 'certification authority' storing 'records relating to a network address or alias with a public key'. . . ." (Supp. Appeal Br. at 8.)Page: Previous 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 NextLast modified: November 3, 2007