Free
Message: Friday Rant...

Following ( excerpts ) remarks was given by Mary Fales to USPTO in May , 11, 2017 in regard to unique technology of "Synap" patent. 

 

 

Applicants claims are directed to the patent eligible concept of sensors being used in a novel and unconventional way to generate an improved encryption key.
Security technology is improved by increasing the level of security and making it harder for a third party to break the claimed encryption key , because a third party is not privy to the encryption key"s  sharing between users / servers.
A real world example of the problem the claims are solving  :  user A has a public key store on an certification server. User A has communicated the key to the server or vice versa.  User B  accesses the server to get a copy of user A "s public key to send them an encrypted message. However , a third party eavesdropper (Eve ) has already hacked into the server and obtained the public keys. Or Eve has listened in on the communication of the key being sent and has obtained a copy. Eve then interprets user B"s message and is able to easily decrypt it using the copy of the public key. Public keys are typically generated using some mathematical algorithm  , and the keys are shared ( communicated ) between the users and servers. If user B wanted to have a copy of user A"s public key without accessing it from a sever , user A have to communicate a copy to user B directly.

 

The claimed subject matter is an improvement to the technology . The claimed subject matter is able to create a key that both user A and user B would have without user A or B  ever having to share it between themselves  or to a certificate server. It would cut out the need for a certification server ( key bank ) if they wanted altogether. Thus , Eve can not hack a server to obtain a copy , nor can Eve listen in on the key being transmitted to obtain a copy , because it isn't transmitted.Eve would have to be physically present ( collocated ) during the sensor collection of user A and user B and the privy to the same collection pattern etc. to even get close to obtaining a copy of the key as claimed.
Share
New Message
Please login to post a reply