Ex Parte Dimenstein - Page 3



          Appeal No. 2004-1324                                                         
          Application No. 09/495,116                                                   
               The Examiner relies on the following references in rejecting            
          the claims:                                                                  
          Toader                        5,774,869            Jun. 30, 1998             
          Alles et al. (Alles)          6,425,010            Jul. 23, 2002             
                                                 (filed Jan. 22, 1999)                 
          Kupka et al. (Kupka)          6,434,535            Aug. 13, 2002             
                                                 (filed Nov. 13, 1998)                 
               Claims  14, 15, 17-19, 21-31, 33-35, 37-43, 45-47 and 49-56             
          stand rejected under 35 U.S.C. § 103(a) as being unpatentable                
          over Alles, Toader and Kupka.                                                
               We make reference to the answer (Paper No. 16, mailed                   
          October 28, 2003) for the Examiner’s reasoning and to the appeal             
          brief (Paper No. 15, filed July 23, 2003) and the reply brief                
          (paper No. 17, filed December 18, 2003) for Appellant’s arguments            
          thereagainst.                                                                
                                       OPINION                                         
               The Examiner relies on Alles for teaching the claimed method            
          steps except for accessing over the Internet that would comprise             
          downloading over the Internet which is disclosed by Toader as                
          allowing the authorized user to download information (answer,                
          pages 4 & 5).  The Examiner further relies on Kupka for teaching             
          the transmission of encryption key and encryption information                
          which would have prevented unauthorized access to the information            
          being transmitted over the internet (answer, page 6).                        
                                          3                                            




Page:  Previous  1  2  3  4  5  6  7  8  Next 

Last modified: November 3, 2007