Appeal No. 2006-2189 Application No. 09/843,403 application to store and administrate various kinds of data for authentication, increasing the load on each device. The examiner responds by arguing that the claim limitation of “generation of the access permissions in a form independently usable for the service provider” may be interpreted broadly, yet reasonably, so that Doyle anticipates. In particular, the examiner contends that Doyle’s gateway system generates the certificate and signature in response to a request by a user for certification information and the certification information is authenticated at the host system in order to grant the requesting user access to the desired applications. It is the examiner’s position that this certification information meets the limitation of the claimed access permissions, and that because the gateway system generates the certification information for the host computer to authenticate the user’s application request, the certification information is generated in a form independently usable by the host computer (answer-page 7). Moreover, the examiner contends that since the host computer is the only party in the system of Doyle capable of authenticating the user’s request based on the certification information, this meets the instant claim language regarding “independently usable for the service provider.” Since the outcome of this case depends on whether the examiner’s broad interpretation of the phrase, “generates the access permissions in a form independently usable for the service provider” is warranted, it would be helpful to determine what, exactly, appellants intended by that language. Page 9, lines 17-20, and page 10, lines 16-18, of the instant specification, referenced by appellants at page 3 of the brief for an understanding of -4-Page: Previous 1 2 3 4 5 6 7 NextLast modified: November 3, 2007