Appeal No. 2003-0325 Application No. 08/775,077 Page 5 object, and that authentication agent 512 of Loucks relates to appellants' authentication agent. Appellants assert (brief, page 5) that Loucks is silent as to an information object including an information segment, and (brief, page 6) that: There is no information object that automatically establishes communications with a predetermined authenticator for the purpose of authenticating an information segment. Authentication in Loucks does not occur as a result of an attempt to access an information segment in an automatically-authenticating information object, but rather as a result of the first computer directing a service request to a known service provider. It is further argued (id.) that: Applying the Examiner’s rationale, this would require that the authentication agent 512 of Loucks be configured to authenticate the service 514. However, the authentication agent 512 of Loucks is instead configured to authenticate that the requestor 504 is authorized to use the service 514. and that (id.): Loucks nowhere suggests that the service 514 invokes the authentication agent 512 for the purpose of authenticating the service 514 itself. From our review of Loucks, we find that Loucks is directed to providing authentication 502, 512 to enable a requestor 504 to access a service 514 (figure 5). As shown in the figure, a requestor 504 requests authentication from authentication agent 502 through messages 520. A second machine 513 contains aPage: Previous 1 2 3 4 5 6 7 8 9 10 11 12 NextLast modified: November 3, 2007