Ex Parte FOX et al - Page 9




          Appeal No. 2003-0072                                                        
          Application No. 09/032,407                                                  


          specifically disclose the performance of electronic commerce                
          transactions over an unsecure network, and turns to Schneier for            
          such a teaching, specifically citing pages 37, and 483-502, for             
          performance of such transactions and for the teaching of a                  
          “Digital Signature Algorithm without encryption” (page 37), it is           
          clear from even the title of Schneier (“Applied Cryptography”)              
          that Schneier is concerned with encryption.                                 
               But, even assuming, arguendo, that the cited portion of                
          Schneier, at page 37, is suggesting that a digital signature can            
          be employed over an unsecure network where there is no encryption           
          employed, there would appear to be no reason for the artisan to             
          combine any such teaching with Ginter since Ginter is not                   
          interested in performing transactions over a network unless there           
          is encryption, i.e., Ginter is not interested in using unsecure             
          networks.                                                                   
               Furthermore, the examiner’s rationale for combining the                
          various references is suspect.  It is proposed to “add the                  
          modifications of Schneier to the method disclosed by Ginter                 
          because such modifications would have provided ‘a separate                  
          algorithm for digital signatures that cannot be used for                    
          encryption’” (answer-page 6, without the underlining of the                 
          examiner).  But, why provide this separate algorithm in Ginter?             

                                         -9–                                          





Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  Next 

Last modified: November 3, 2007