Ex Parte Dathathraya - Page 9


               Appeal No. 2006-3120                                                                         
               Application No. 09/944,695                                                                   


                      (2) prints the image based on the print data.                                         
               [Mazzagatte, Fig. 7A, steps S702-S712; col. 10, line 41 – col. 11, line 22;                  
               emphasis added].                                                                             
                      As indicated above, the print data is encrypted with the symmetric key that           
               is, in turn, encrypted with the print node’s public key.  Although the print node’s          
               public key encrypts the symmetric key that, in turn, encrypts the print data, the            
               public key nonetheless encrypts the print data -- albeit indirectly.  That is, the           
               documents are encrypted by the print node’s public key via the encrypted                     
               symmetric key.                                                                               
                      Likewise, although the print node’s private key decrypts the symmetric key            
               that, in turn, decrypts the print data, the corresponding private key nonetheless            
               decrypts the print data -- albeit indirectly.  That is, the private key decrypts the         
               print data via decrypting the symmetric key.                                                 
                      We further note the embodiment of Fig. 8 (print node is a gateway).  In               
               that embodiment, after authenticating the intended recipient, the print node:                
                      (1) obtains the encrypted symmetric key;                                              
                      (2) retrieves the encrypted print data;                                               
                      (3) decrypts the symmetric key with its public key;                                   
                      (4) re-encrypts the symmetric key with the printer’s public key; and                  
                      (5) transmits the encrypted print data and encrypted symmetric key to the             
               printer;                                                                                     
                      Following these steps, the printer:                                                   


                                                     9                                                      


Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  Next

Last modified: September 9, 2013