Ex Parte Graunke et al - Page 3



               Appeal 2007-0463                                                                                                        
               Application 09/896,537                                                                                                  

               of encrypted sections 104, 106, 108, 110, 112, where each section corresponds to                                        
               one of L through N levels of access (L<N), with L being the lowest level of access                                      
               (e.g., lowest resolution) and N being the highest level of access (e.g., highest                                        
               resolution) (id. at 6-7, para. 0021).  That is, sections 104, 106, 108, 110, 112 are                                    
               encrypted using respective different keys 114 (K_1), 116 (K_2), 118 (K_3), 120                                          
               (K_4), and 122 (K_5), of which key K_5 represents the highest level of access.                                          



















                       As illustrated in Figure 2 (reproduced below), a server 200 and a client 202                                    
               create a secure authenticated channel 204 that connects a digital rights management                                     


                                                                  3                                                                    



Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next

Last modified: September 9, 2013