Ex Parte Kim - Page 5

                Appeal 2007-2437                                                                             
                Application 09/816,080                                                                       
                      Appellant argues that Mayers discloses a method for testing the                        
                security of a quantum cryptographic system used for quantum key                              
                distribution.  Appellant argues that Mayers method utilizes polarization                     
                states of photons with the photons possessing quantum states satisfying                      
                certain relationships between three bases (Br. 6).  Appellant argues that the                
                presently claimed invention concerns a key arrangement method including a                    
                first system that encodes a bit sequence and sends it to a second system (Br.                
                7).  The second system decodes the received signals and measures the signal                  
                values.  In contrast to the Mayers’s system, in the presently claimed                        
                invention, the second system records some second values, which are above a                   
                predetermined value, and tells the first system the bit positions of the                     
                selected bits (Br. 7).   The first system selects values corresponding to those              
                bit positions, and discards the rest of the values (Br. 7).   Appellant argues               
                that in comparing the present invention to Mayers, it is clear that Mayers                   
                does not adopt only bits having a measured value beyond a threshold value                    
                (Br. 7).  Appellant argues that as disclosed in Mayers, if a sufficient number               
                of bits meet a parity test, it is concluded that there is no eavesdropping                   
                activity.  The bits that have been tested or discarded in a shared key is                    
                produced from the remaining random series of bits (Br. 7).   Appellant                       
                argues that in contrast, and as recited in claim 1, the second system adopts                 
                only those bits having a measured value beyond the threshold value, and                      
                informs the first system of the bit positions of the selected bits.  The adopted             
                bits are then used as a key string for the first and second systems (Br. 7).                 
                Appellant argues that Mayers discloses instead to discard the bits that are                  
                actually tested, and utilize the remaining random series of bits to form a                   
                shared key (Br. 7-8), and that in the present invention, it is the second                    

                                                     5                                                       

Page:  Previous  1  2  3  4  5  6  7  8  9  Next

Last modified: September 9, 2013