Ex Parte PATEL - Page 5




          Appeal No.2003-0446                                                         
          Application No.09/127767                                                    


          as well as in combination with each other depending on the type             
          of security sought (e.g., random numbers concatenated to                    
          timestamps or count values in a protocol guarantees that a                  
          pseudonumber will not be duplicated)(Menezes, pages 398-400).               
          The protocol referred to in Menezes on page 402 follows the 9798-           
          2 mechanism disclosed on page 401 with some modifications as                
          shown.  The 9798-2 mechanism provides in pertinent part that "in            
          these mechanisms, the timestamp may be replaced by a sequence               
          number" and "to avoid reliance on timestamps, the timestamp may             
          be replaced by a random number, at the cost of an additional                
          message".  Thus, Menezes clearly discloses that timestamps,                 
          random numbers and sequences (i.e., count values) are                       
          interchangeable.  Thus, in the SKID3 protocol the random number             
          can be interchanged with a count value since a random number can            
          be interchanged with a timestamp to reduce the amount of message            
          sent (Menezes, page 401), and the timestamp can be interchanged             
          with a count value to increase the uniqueness and security of the           
          protocol (count values do not need time synchronization like                
          timestamps do) (Menezes, page 398, 401).                                    
               The appellant also presented the argument (Brief, pages 16-            
          17) that even if the second challenge (random number) were                  
          modified to include a count number in the SKID3 protocol, the               
          resulting algorithm would not be the same as the one claimed                


                                          5                                           





Page:  Previous  1  2  3  4  5  6  7  8  9  10  Next 

Last modified: November 3, 2007