Appeal No. 1997-3178 Application 08/464,069 The arguments with respect to method claim 32 are similar to claim 25. In addition, claim 32 recites "the trustee using said digital data structure to confirm the identity of the legitimate computer user, and after positive confirmation of identity, recovering the secret digital information." We do not find these limitations in Dziewit even giving the limitations a very broad interpretation. The trustee in Dziewit is merely a third person used for security reasons and the Examiner does not explain how the trustee acts to confirm a legitimate computer user. The rejection of claims 32, 33, 36, 37, and 44-46 is reversed for the reasons stated in connection with claim 25 and because Dziewit does not teach the steps performed by the trustee. Kaufman The Examiner states that the limitations of the digital data structure are found in "Kaufman at col. 6, lines 41-49" (EA5) and "with Kaufman public key certificates and encrypted 'long term' credentials are provided" (EA5). Kaufman, column 6, lines 41-49 states: - 15 -Page: Previous 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 NextLast modified: November 3, 2007