Appeal No. 2006-3120 Application No. 09/944,695 (2) prints the image based on the print data. [Mazzagatte, Fig. 7A, steps S702-S712; col. 10, line 41 – col. 11, line 22; emphasis added]. As indicated above, the print data is encrypted with the symmetric key that is, in turn, encrypted with the print node’s public key. Although the print node’s public key encrypts the symmetric key that, in turn, encrypts the print data, the public key nonetheless encrypts the print data -- albeit indirectly. That is, the documents are encrypted by the print node’s public key via the encrypted symmetric key. Likewise, although the print node’s private key decrypts the symmetric key that, in turn, decrypts the print data, the corresponding private key nonetheless decrypts the print data -- albeit indirectly. That is, the private key decrypts the print data via decrypting the symmetric key. We further note the embodiment of Fig. 8 (print node is a gateway). In that embodiment, after authenticating the intended recipient, the print node: (1) obtains the encrypted symmetric key; (2) retrieves the encrypted print data; (3) decrypts the symmetric key with its public key; (4) re-encrypts the symmetric key with the printer’s public key; and (5) transmits the encrypted print data and encrypted symmetric key to the printer; Following these steps, the printer: 9Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next
Last modified: September 9, 2013