Ex Parte Garay et al - Page 2

               Appeal 2007-0930                                                                             
               Application 10/014,763                                                                       
           1                                   INVENTION                                                    
           2          The invention is directed to a method of generating secure digital                    
           3   signatures with user devices that have limited computational resources (i.e.                 
           4   mobile phone, PDA etc).  The user device of limited computational                            
           5   resources generates a first digital signature which can be generated easily;                 
           6   this digital signal is transmitted through an intermediary to a verification unit            
           7   which after verifying the first digital signature, generates and transmits a                 
           8   second more computationally complex digital signature.  See page 3 of                        
           9   Appellants’ Specification.  Claim 1 is representative of the invention and                   
          10   reproduced below:                                                                            
          11          1. A method for use in generating digital signatures in an information                
          12   processing system, the system including at least a user device, an                           
          13   intermediary device and a verifier, the method comprising the steps of:                      
          14                                                                                                
          15          generating in the user device a first digital signature; and                          
          16                                                                                                
          17          sending the first digital signature to the verifier;                                  
          18                                                                                                
          19          wherein the verifier sends the first digital signature to the intermediary            
          20          device, and the intermediary device checks that the first digital                     
          21          signature is a valid digital signature for the user device and if the first           
          22          digital signature is valid generates a second digital signature which is              
          23          returned to the verifier as a signature generated by the user device.                 
          24                                                                                                
          25                                                                                                
          26                                  REFERENCES                                                    
          27          The references relied upon by the Examiner are:                                       
          28          Micali  US 5,016,274  May 14, 1991                                                    
          29          Aura   US 6,711,400 B1  Mar. 23, 2004                                                 
          30                                                 (filed Oct. 14, 1999)                          



                                                     2                                                      


Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next

Last modified: September 9, 2013