Ex Parte Graunke et al - Page 5



               Appeal 2007-0463                                                                                                        
               Application 09/896,537                                                                                                  

               authorized access level.  Referring to the example depicted in FIG. 3 (reproduced                                       
               below), using base key 300 (i.e., the key commensurate with the client's                                                
               subscription, or rights, which is K_3 in this example), the agent 208 can create all                                    
               of the appropriate lower level keys (302 and 304 in this example) (id. at 7, para.                                      
               0024).  Once all appropriate keys 300, 302, 304 have been obtained or created, the                                      
               encrypted                                                                                                               


















               content 102 is decrypted into accessible content 306, i.e., sections 308, 310, and                                      
               312 of the content 100 (id.).                                                                                           


                                                                  5                                                                    



Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next

Last modified: September 9, 2013