Appeal No. 1997-3178 Application 08/464,069 LA-PUB, to form {{U} , H2}H1 LA-PUB, which corresponds to the claimed "secret encrypted digital information other than said identifying information" stored in the "digital data structure." The CSS 24 is "coupled to said processor" of the legitimate user, i.e., to workstation 12. Although the "wherein" clause of claim 25 is a mere statement of intended use, the LA node 26 acts as a "trustee" and "the digital data structure is used by a trustee to confirm the identity of the legitimate computer user and to recover the secret encrypted digital information." That is, LA 26 recovers the secret digital information {U} by decrypting using the H1 private key LA-PRIV as shown in figure 5 and stripping H2. The user identity is confirmed for a given user name N if the hash total H2 from the decrypted credential {U} , H2 H1 associated with the name N matches the hash total H2A received from the workstation (col. 8, lines 11-24). Remember that claim 25 states that the digital data structure is used to confirm the identity, not just the identifying information portion of the data structure. Claim 25 is open ended does not exclude the numerous additional and complicated steps in Kaufman. Neither - 17 -Page: Previous 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 NextLast modified: November 3, 2007