Appeal No. 2005-0986 Application No. 09/727,904 blinded ciphertext technique, but does disclose, at column 13, lines 48-52, receiving from the user a first ciphertext portion of the signed ciphertext, and, at column 3, lines 16-61, and, at column 11, lines 15-67, that the user receives this in conjunction with a request from the user for purchase of the given information item from the merchant. The examiner further contends that Nishioka discloses, at column 2, lines 33-67, and column 7, lines 42-62, decrypting the first ciphertext portion and returning to the user the resulting decrypted version of the first ciphertext portion, wherein the resulting decrypted portion provides information that is utilized by the user in conjunction with accessing the given information item in a manner such that the merchant is unable to identify the given information item purchased by the user. In order to supply the alleged deficiency in Nishioka, the examiner turns to Kyojima for authenticating and controlling access to digital data by applying a blinding effect and decryption technique to ciphertext that can securely transmit a specific piece of information to a decryption device while keeping the blindness of the data to be delegated (pointing to column 4, lines 57-65, column 6, lines 1-7, and 33-45, and column 8, lines 5-41, of Kyojima). The examiner alleges that Kyojima -4-Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 NextLast modified: November 3, 2007