Appeal No. 2006-0655 Application 09/459,287 Representative independent claim 1 is reproduced below: 1. A method for authenticating digital data in a system for writing digital data entered from an input device to a memory device and transferring the digital data written in the memory device to a receiving device, said method comprising the steps of: performing a first device authentication between the input device and the memory device when writing digital data from the input device to the memory device; and performing a second device authentication between the memory device and the receiving device when transferring the digital data from the memory device to the receiving device. The following references are relied on by the examiner: Altschuler et al. (Altschuler) 5,465,300 Nov. 7, 1995 Traw et al. (Traw) 5,949,877 Sep. 7, 1999 (Filed Jan. 30, 1997) Steinberg 6,510,520 Jan. 21, 2003 (Filed Jun. 26, 1998) Schneier, Bruce, Applied Cryptography, Second Edition, 1996 John Wiley & Sons, p.455 Claims 1 through 5, 8 and 10 through 22 stand rejected under 35 U.S.C. § 103. As to claims 1 through 3, 5, 8, 10 through 12, 14 through 19 and 21, the examiner relies upon Steinberg in view of Traw. To this first stated rejection the examiner adds Altschuler as to claim 4, and separately adds Schneier as to claims 13, 20 and 22 in a third stated rejection. Rather than repeat the positions of the appellants and the examiner, reference is made to the brief (no reply brief has been filed) for appellants’ positions, and to the answer for the examiner’s positions. 2Page: Previous 1 2 3 4 5 6 7 8 9 NextLast modified: November 3, 2007