Ex Parte Haff et al - Page 6



            Appeal 2007-1554                                                                                  
            Application 10/844,387                                                                            
                   Robinson discloses verification of the receipt contents by verification                    
            comprising extracting the digital receipt, decrypting the transaction record and                  
            returning details of the transaction to the presenting party (Robinson, col. 8,                   
            ll. 45-57), and wherein the presenting party, e.g., one of the merchant or customer,              
            may then compare the transaction details to any previously stored version of the                  
            transaction details that the presenting party possesses (Robinson, col. 8, ll. 58-61).            
                   Claim 34 recites only that the transaction record be protected from                        
            modification by the parties to the transaction, but says nothing about prohibiting                
            viewing of transaction data by any party to the transaction.                                      
                   The Examiner found that in Robinson, the merchant computer 98                              
            responsible for generating the digital receipt, “may in fact be operated not directly             
            by the merchant but rather by an electronic transaction service provider in close                 
            cooperation with and under the authority of the merchant” (Robinson col. 7,                       
            ll. 39-42).                                                                                       
                   Robinson does not explicitly disclose protecting the details in the transaction            
            record from modification by the parties to the transaction because the transaction                
            record was originally encrypted under the direction of the merchant, e.g. a party to              
            the transaction, and the merchant computer simply uses the same private key to                    
            extract the transaction data (Robinson col. 8, ll. 49-52) which may allow the                     
            merchant the opportunity to modify the transaction data during the original                       
            encryption process.                                                                               




                                                      6                                                       



Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next

Last modified: September 9, 2013