Ex Parte HUGHES - Page 9




                 Appeal No. 2003-1942                                                                                  Page 9                     
                 Application No. 09/260,796                                                                                                       


                 combination of binary digits is utilized to form the key for operating the cryptographic                                         
                 device that develops [a] first cipher block.  Then, a portion of the first cipher block is                                       
                 stored and the remaining portion is combined with the same randomly generated binary                                             
                 digits to form a second ciphertext.  The second ciphertext and the stored portion of the                                         
                 first cipher text are then combined to form a new composite cipher block that                                                    
                 is transmitted."  Col. 2, ll. 30-42.  Furthermore, we agree with the examiner that                                               
                 "Carter's elaborat[ion] that the user inputs a user identifier and password; the member                                          
                 definitions of the collaborative document are searched in order to locate the member                                             
                 identifier corresponding to the user identifier," (Examiner's Answer at 13), constitutes an                                      
                 access formula expressing a logical combination of at least one group for which access                                           
                 to information will be granted.                                                                                                  




                         The examiner does not allege, let alone show, that the teachings from Carter and                                         
                 Feistel would have suggested using the Carter's member definitions and public key for                                            
                 each group granted access to the information to encrypt asymmetrically Feistel's                                                 
                 random combination of binary digits.  Absent a teaching or suggestion of using an                                                
                 access formula and the public key for each group granted access to information to                                                
                 encrypt asymmetrically a randomly generated number, we are unpersuaded of a prima                                                









Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  Next 

Last modified: November 3, 2007