Ex Parte Dathathraya - Page 8


               Appeal No. 2006-3120                                                                         
               Application No. 09/944,695                                                                   


               secure transmission protocol (e.g., Secure Sockets Layer (SSL) or Transport                  
               Layer Security (TLS)).  Upon receipt, the print node:                                        
                      (1) generates a unique symmetric encryption key;                                      
                      (2) encrypts the data with the symmetric key;                                         
                      (3) encrypts the symmetric key with the print node’s public key; and                  
                      (4) stores the encrypted data.                                                        
               [Mazzagatte, Fig. 5, steps S502-505; emphasis added].                                        
                      The remainder of the process varies depending on whether the print node               
               is (1) an image forming device (i.e., a printer), or (2) a gateway to multiple image         
               forming devices.  If the print node is a printer, then the process detailed in the           
               embodiment of Fig. 6 applies.  Otherwise, the embodiments of Figs. 7A, 7B, or 8              
               apply [see Mazzagatte, col. 3, lines 22-40; col. 9, lines 35-40].                            
                      We turn our attention first to Fig. 7A (print node is a gateway).  In that            
               embodiment, after authenticating the intended recipient, the print node:                     
                      (1) obtains the encrypted symmetric key;                                              
                      (2) retrieves the encrypted print data;                                               
                      (3) decrypts the symmetric key with its private key;1                                 
                      (4) transmits the encrypted print data and decrypted symmetric key to the             
               printer via secure transmission protocol;                                                    
                      Following these steps, the printer:                                                   
                      (1) decrypts the print data with the symmetric key; and                               
                                                                                                            
               1 Although this step is not specifically shown in the flowchart in Fig. 7A, it is described in col. 11,
               lines 17-22.                                                                                 

                                                     8                                                      


Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  Next

Last modified: September 9, 2013