Appeal No. 2003-0072 Application No. 09/032,407 specifically disclose the performance of electronic commerce transactions over an unsecure network, and turns to Schneier for such a teaching, specifically citing pages 37, and 483-502, for performance of such transactions and for the teaching of a “Digital Signature Algorithm without encryption” (page 37), it is clear from even the title of Schneier (“Applied Cryptography”) that Schneier is concerned with encryption. But, even assuming, arguendo, that the cited portion of Schneier, at page 37, is suggesting that a digital signature can be employed over an unsecure network where there is no encryption employed, there would appear to be no reason for the artisan to combine any such teaching with Ginter since Ginter is not interested in performing transactions over a network unless there is encryption, i.e., Ginter is not interested in using unsecure networks. Furthermore, the examiner’s rationale for combining the various references is suspect. It is proposed to “add the modifications of Schneier to the method disclosed by Ginter because such modifications would have provided ‘a separate algorithm for digital signatures that cannot be used for encryption’” (answer-page 6, without the underlining of the examiner). But, why provide this separate algorithm in Ginter? -9–Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 NextLast modified: November 3, 2007