Appeal No. 2003-1942 Page 9 Application No. 09/260,796 combination of binary digits is utilized to form the key for operating the cryptographic device that develops [a] first cipher block. Then, a portion of the first cipher block is stored and the remaining portion is combined with the same randomly generated binary digits to form a second ciphertext. The second ciphertext and the stored portion of the first cipher text are then combined to form a new composite cipher block that is transmitted." Col. 2, ll. 30-42. Furthermore, we agree with the examiner that "Carter's elaborat[ion] that the user inputs a user identifier and password; the member definitions of the collaborative document are searched in order to locate the member identifier corresponding to the user identifier," (Examiner's Answer at 13), constitutes an access formula expressing a logical combination of at least one group for which access to information will be granted. The examiner does not allege, let alone show, that the teachings from Carter and Feistel would have suggested using the Carter's member definitions and public key for each group granted access to the information to encrypt asymmetrically Feistel's random combination of binary digits. Absent a teaching or suggestion of using an access formula and the public key for each group granted access to information to encrypt asymmetrically a randomly generated number, we are unpersuaded of a primaPage: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 NextLast modified: November 3, 2007