Appeal No. 2006-3120 Application No. 09/944,695 secure transmission protocol (e.g., Secure Sockets Layer (SSL) or Transport Layer Security (TLS)). Upon receipt, the print node: (1) generates a unique symmetric encryption key; (2) encrypts the data with the symmetric key; (3) encrypts the symmetric key with the print node’s public key; and (4) stores the encrypted data. [Mazzagatte, Fig. 5, steps S502-505; emphasis added]. The remainder of the process varies depending on whether the print node is (1) an image forming device (i.e., a printer), or (2) a gateway to multiple image forming devices. If the print node is a printer, then the process detailed in the embodiment of Fig. 6 applies. Otherwise, the embodiments of Figs. 7A, 7B, or 8 apply [see Mazzagatte, col. 3, lines 22-40; col. 9, lines 35-40]. We turn our attention first to Fig. 7A (print node is a gateway). In that embodiment, after authenticating the intended recipient, the print node: (1) obtains the encrypted symmetric key; (2) retrieves the encrypted print data; (3) decrypts the symmetric key with its private key;1 (4) transmits the encrypted print data and decrypted symmetric key to the printer via secure transmission protocol; Following these steps, the printer: (1) decrypts the print data with the symmetric key; and 1 Although this step is not specifically shown in the flowchart in Fig. 7A, it is described in col. 11, lines 17-22. 8Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next
Last modified: September 9, 2013