DETAILED ACTION
Continued Examination Under 37 CFR 1.114
A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 1/8/2026 has been entered.
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Response to Amendment
Applicant presents amendments to claims 1–8 and 15–20. All amendments have been fully considered.
Applicant’s amendments to the claims are sufficient to overcome the previous reference and combination of references serving as the basis for the previous rejections under 35 U.S.C. 102 and 103, respectively. Therefore, a new search was conducted and new prior art was identified, which serves as the basis for the new rejections under the same statutes. The mapping of the new references to the claims are presented below.
Response to Arguments
Applicant presents arguments with respect to pending claims 1–8 and 15–20. All arguments have been fully considered.
The Examiner agrees that the previous reference and combination of references fail to disclose the presently amended subject matter. As mentioned above, a new search was conducted and new rejections are presented below.
Claim Rejections - 35 USC § 102
The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action:
A person shall be entitled to a patent unless –
(a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention.
Claims 1–2, 4, 6–8, 15–16, 18, 20 rejected under 35 U.S.C. 102(a)(1) as being anticipated by Fu (US 10,305,873 B2, issued May 28, 2019).
Regarding claims 1 and 15, Fu discloses: a method for decentralized cryptography and encryption comprising: accessing a network of decentralized nodes (interconnected network of key management devices. Fu 5:35–63.); a first node receiving a request from the network to generate a share of a network private key (QSKS device receives a request for acquiring an authorized private key from a QSKD device of a requester, which forwards the request to a predetermined number of QSKD devices (second QSKD devices). Fu Figure 5, elements 201–202 and 12:34–42.); the first node generating a share of a network private key in response to the request, wherein a second node on the network generates a second share of the network private key (in response to the received request, the predetermined number of second QSKD devices generate a plurality of authorized sub-private keys based on the identifier information of the requester and from a plurality of system sub-private keys. Fu Figure 5, element 203 and 12:43–46.); wherein the first share and the second share are on separate nodes (the plurality of second QSKD devices are different devices and directly connected with each other or connected with each other through a routing device having a key relaying function. Fu Figure 4, element 122 and 6:23–25, 9:34–42.); the first node receiving a request from the network to use the network private key share (QSKD device of a requester forwards the request to QSKD devices (second QSKD devices). Fu Figure 5, elements 201–202 and 12:34–42.); performing an operation with the network private key share, wherein the operation produces a result (the first QSKD device reconstructs an identity-based authorized private key by using the threshold secret sharing mechanism in accordance with the acquired authorized sub-private keys. Fu Figure 5, element 205 and 13:4–7.); and, providing the result of the operation performed with the network private key share to the network (using a reconstruction algorithm of the threshold secret sharing mechanism based on Lagrange interpolation, generates an identity-based signature certificate in accordance with the identity-based authorized private key. Fu 13:8–13.).
Regarding claims 2 and 16, Fu discloses the limitations of claims 1 and 15, respectively, further comprising: receiving a request from a user of the network to generate a signature share of the network private key share (QSKS device receives a request for acquiring an authorized private key from a QSKD device of a requester, which forwards the request to a predetermined number of QSKD devices (second QSKD devices). Fu Figure 5, elements 201–202 and 12:34–42.); generating a signature share of the network private key share; and, providing the signature share to the user over the network (using a reconstruction algorithm of the threshold secret sharing mechanism based on Lagrange interpolation, generates an identity-based signature certificate in accordance with the identity-based authorized private key. Fu 13:8–13.).
Regarding claims 4 and 18, Fu discloses the limitations of claims 1 and 15, respectively, further comprising: receiving a request from a user of the network to generate a decryption share of the network private key share (QSKS device receives a request for acquiring an authorized private key from a QSKD device of a requester, which forwards the request to a predetermined number of QSKD devices (second QSKD devices). Fu Figure 5, elements 201–202 and 12:34–42.); and, generating a decryption share of the network private key share; and, providing the decryption share to the user over the network (the requestor owned first QSKD device acquires the authorized sub-private keys from the nodes. Fu Figure 5, element 205 and 13:4–7.).
Regarding claims 6 and 20, Fu discloses the limitations of claims 1 and 15, respectively, wherein the request comprises executable code and further comprising executing the code to define the use of the network private key share (QSKS device receives a request for acquiring an authorized private key from a QSKD device of a requester, which forwards the request to a predetermined number of QSKD devices (second QSKD devices). Fu Figure 5, elements 201–202 and 12:34–42.).
Regarding claim 7, Fu discloses the limitations of claim 6, wherein the use of the network private key share comprises generating a signature share of the network private key share (using a reconstruction algorithm of the threshold secret sharing mechanism based on Lagrange interpolation, generates an identity-based signature certificate in accordance with the identity-based authorized private key. Fu 13:8–13.).
Regarding claim 8, Fu discloses the limitations of claim 6, wherein the use of the network private key share comprises generating a decryption share of the network private key share (using a reconstruction algorithm of the threshold secret sharing mechanism based on Lagrange interpolation, generates an identity-based signature certificate in accordance with the identity-based authorized private key. Fu 13:8–13.).
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
Claims 3, 5, 17, 19 rejected under 35 U.S.C. 103 as being unpatentable over Fu in view of Zappier (US 2018/0204213 A1, published Jul. 19, 2018).
Regarding claims 3, 5, 17 and 19, Fu discloses the limitations of claims 2 and 16, respectively. Fu does not disclose: further comprising: receiving with the request access control conditions for the network private key; verifying the access control conditions are met before generating the signature share.
However, Zappier does disclose: further comprising: receiving with the request access control conditions for the network private key; verifying the access control conditions are met before generating the signature share (nodes are configured to require authentication to access any portion of the blockchain. Zappier ¶ 40.).
Therefore, it would have been prima facie obvious to one of ordinary skill in the art prior to the effective filing date of the claimed invention to modify the generation of isolated sub-private keys by network nodes for a providing a requested threshold encryption key of Fu with requiring access control conditions for receiving a private network key based upon the teachings of Zappier. The motivation being to restrict access to the cryptographic security mechanics of the blockchain to protect the system. Zappier ¶ 40.
Conclusion
The prior art made of record and not relied upon is considered pertinent to applicant's disclosure: Yakira (US 2022/0038264 A1, published Feb. 3, 2022), decentralized key generation and distribution over a network or connected nodes.
Any inquiry concerning this communication or earlier communications from the examiner should be directed to VANCE M LITTLE whose telephone number is (571) 270-0408. The examiner can normally be reached on Monday - Friday 9:30am - 5:30pm.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jung (Jay) Kim can be reached on (571) 272-3804. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/VANCE M LITTLE/Primary Examiner, Art Unit 2493