Ex Parte Haff et al - Page 5



            Appeal 2007-1554                                                                                  
            Application 10/844,387                                                                            
            SOAP to provide connectivity and interoperability between companies. Microsoft                    
            Computer Dictionary, Fifth Edition, 564 (2002).  We thus understand that a “web                   
            service” could be any service that is conducted on the web, including the sale of                 
            goods over the World Wide Web as described by Robinson at col. 6, ll. 56-58.                      
                   Robinson discloses creating the transaction record based upon details of a                 
            completed transaction (Robinson, col. 4, ll. 25-33).                                              
                   Robinson discloses sending the transaction record to a computer that                       
            digitally signs (Robinson, col. 5, ll. 37-38) and encrypts the record (Robinson, col.             
            5, ll. 11-20).                                                                                    
                   Robinson discloses forming a digital receipt comprising the encrypted                      
            transaction record (Robinson, col. 5, ll. 66-67, col.6, ll. 1-5).                                 
                   Robinson discloses configuring the digital receipt page (step 118) on the                  
            internet e.g., a web page, to enable display in a Web page (steps 124,125)                        
            (Robinson, col. 6 ll. 23-36); and returning the digital receipt to at least one party             
            e.g., the merchant, to the completed transaction.                                                 
                   Robinson discloses using public key infrastructure (PKI) as part of the                    
            receipt encryption process (Robinson, col. 5, ll. 40-52, col. 8, ll. 1-17).                       
                   Robinson discloses that although the merchant is in control of the computer                
            98 responsible for generating the digital receipt through exclusive access using a                
            personal secret key (Robinson, col. 5 ll. 42-50), the customer, rather than the                   
            merchant, may present the digital receipt to the receipt generating computer 98                   
            using the merchant’s key (Robinson, col. 5, ll. 46-50) to retrieve the transaction                
            data but cannot alter the data (Robinson, col. 8, ll. 38-45).                                     

                                                      5                                                       



Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next

Last modified: September 9, 2013