throbber
Example 37 – Relocation of Icons on a Graphical User Interface
`
`Background:
`
`Subject Matter Eligibility Examples: Abstract Ideas
`
`The following examples should be used in conjunction with the 2019 Revised Patent Subject
`Matter Eligibility Guidance (2019 PEG). The examples below are hypothetical and only
`intended to be illustrative of the claim analysis under the 2019 PEG. These examples should
`be interpreted based on the fact patterns set forth below as other fact patterns may have
`different eligibility outcomes. That is, it is not necessary for a claim under examination to
`mirror an example claim to be subject matter eligible under the 2019 PEG. All of the claims
`are analyzed for eligibility in accordance with their broadest reasonable interpretation.
`Note that the examples herein are numbered consecutively beginning with number 37,
`because 36 examples were previously issued.
`The examples are illustrative only of the patent-eligibility analysis under the 2019 PEG. All
`claims must be ultimately analyzed for compliance with every requirement for patentability,
`including 35 U.S.C. 102, 103, 112, and 101 (utility, inventorship and double patenting) and
`non-statutory double patenting. The analyses provided below do not address considerations
`other than subject matter eligibility under Section 101.
`Traditionally, computer users are limited in the ways in which they can organize icons on
`their display. Additionally, computer users may have a large number of icons on their
`display, making it difficult to find the icons most used. The typically available ways to
`organize icons are alphabetically, by file size, and by file type. If a computer user wants a
`non-typical arrangement of icons, the user would need to manually manipulate the icons on
`their display. For example, traditional software does not automatically organize icons so
`that the most used icons are located near the “start” or “home” icon, where they can be easily
`accessed. Therefore, what is needed is a method that allows for such non-traditional
`arrangements to be performed automatically.
`Accordingly, applicant’s invention addresses this issue by providing a method for
`rearranging icons on a graphical user interface (GUI), wherein the method moves the most
`used icons to a position on the GUI, specifically, closest to the “start” icon of the computer
`system, based on a determined amount of use. In a first preferred embodiment, the amount
`of use of each icon is automatically determined by a processor that tracks the number of
`times each icon is selected or how much memory has been allocated to the individual
`processes associated with each icon over a period of time (e.g., day, week, month, etc.). In
`another embodiment, the user can choose to manually enter which icons are used most often
`using any of a number of ordering and/or ranking systems known to those skilled in the art.
`
`2019-01-07
`
`1
`
`Gree Exhibit 2005
`Supercell Oy v. Gree, Inc.
`PGR2020-00063
`Page 00001
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`Step
`
`Analysis
`
`A method of rearranging icons on a graphical user interface (GUI) of a computer system,
`the method comprising:
`
`receiving, via the GUI, a user selection to organize each icon based on a specific
`criteria, wherein the specific criteria is an amount of use of each icon;
`
`determining, by a processor, the amount of use of each icon over a predetermined
`period of time; and
`
`automatically moving the most used icons to a position on the GUI closest to the
`start icon of the computer system based on the determined amount of use.
`1: Statutory Category?
`Yes. The claim recites a series of steps and,
`therefore, is a process.
`2A - Prong 1: Judicial Exception
`Yes. The claim recites the limitation of
`Recited?
`determining the amount of use of each icon over
`a predetermined period of time. This limitation,
`as drafted, is a process that, under its broadest
`reasonable interpretation, covers performance of
`the limitation in the mind but for the recitation of
`generic computer components. That is, other
`than reciting “by a processor,” nothing in the
`claim element precludes the step from practically
`being performed in the mind. For example, but
`for the “by a processor” language, the claim
`encompasses the user manually calculating the
`amount of use of each icon. The mere nominal
`recitation of a generic processor does not take
`the claim limitation out of the mental processes
`grouping. Thus, the claim recites a mental
`process.
`Yes. The claim recites the combination of
`additional elements of receiving, via a GUI, a user
`selection to organize each icon based on the
`amount of use of each icon, a processor for
`performing the determining step, and
`automatically moving the most used icons to a
`position on the GUI closest to the start icon of the
`computer system based on the determined
`amount of use. The claim as a whole integrates
`the mental process into a practical application.
`Specifically, the additional elements recite a
`specific manner of automatically displaying icons
`
`2
`
`2A - Prong 2: Integrated into a
`Practical Application?
`
`
`Claim 1:
`
`
`
`2019-01-07
`
`PGR2020-00063 Page 00002
`
`

`

`N/A.
`
`Step
`
`Analysis
`
`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`
`to the user based on usage which provides a
`specific improvement over prior systems,
`resulting in an improved user interface for
`electronic devices. Thus, the claim is eligible
`because it is not directed to the recited judicial
`exception.
`2B: Claim provides an Inventive
`Concept?
` Claim 2:
`A method of rearranging icons on a graphical user interface (GUI) of a computer system,
`the method comprising:
`receiving, via the GUI, a user selection to organize each icon based on a specific
`
`criteria, wherein the specific criteria is an amount of use of each icon;
`
`determining the amount of use of each icon using a processor that tracks how much
`memory has been allocated to each application associated with each icon over a
`predetermined period of time; and
`
`automatically moving the most used icons to a position on the GUI closest to the
`start icon of the computer system based on the determined amount of use.
`
`1: Statutory Category?
`Yes. The claim recites a series of steps and,
`therefore, is a process.
`2A - Prong 1: Judicial Exception
`No. The claim does not recite any of the judicial
`Recited?
`exceptions enumerated in the 2019 PEG. For
`instance, the claim does not recite a mental
`process because the claim, under its broadest
`reasonable interpretation, does not cover
`performance in the mind but for the recitation of
`generic computer components. For example, the
`“determining step” now requires action by a
`processor that cannot be practically applied in
`the mind. . In particular, the claimed step of
`determining the amount of use of each icon by
`tracking how much memory has been allocated
`to each application associated with each icon
`over a predetermined period of time is not
`practically performed in the human mind, at least
`because it requires a processor accessing
`computer memory indicative of application
`usage. Further, the claim does not recite any
`
`3
`
`2019-01-07
`
`PGR2020-00063 Page 00003
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`method of organizing human activity, such as a
`fundamental economic concept or managing
`interactions between people. Finally, the claim
`does not recite a mathematical relationship,
`formula, or calculation. Thus, the claim is
`eligible because it does not recite a judicial
`exception.
`
`N/A.
`
`
`
`
`Claim 3:
`
`2A - Prong 2: Integrated into a
`Practical Application?
`2B: Claim provides an Inventive
`Concept?
`A method of ranking icons of a computer system, the method comprising:
`determining, by a processor, the amount of use of each icon over a predetermined
`
`period of time; and
`
`ranking the icons, by the processor, based on the determined amount of use.
`
`1: Statutory Category?
`Yes. The claim recites a series of steps and,
`therefore, is a process.
`2A - Prong 1: Judicial Exception
`Yes. The claim recites the limitations of
`Recited?
`determining the amount of use of each icon over
`a predetermined period of time and ranking the
`icons based on the determined amount of use.
`The determining limitation, as drafted, is a
`process that, under its broadest reasonable
`interpretation, covers performance of the
`limitation in the mind but for the recitation of
`generic computer components. That is, other
`than reciting “by a processor,” nothing in the
`claim precludes the determining step from
`practically being performed in the human mind.
`For example, but for the “by a processor”
`language, the claim encompasses the user
`manually calculating the amount of use of each
`icon. This limitation is a mental process.
` The ranking limitations, as drafted, is also a
`process that, under its broadest reasonable
`
`
`2019-01-07
`
`N/A.
`
`Step
`
`Analysis
`
`4
`
`PGR2020-00063 Page 00004
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`
`2A - Prong 2: Integrated into a
`Practical Application?
`
`2B: Claim provides an Inventive
`Concept?
`
`
`2019-01-07
`
`interpretation, covers performance of the
`limitation in the mind but for the recitation of
`generic computer components. That is, other
`than reciting “by a processor,” nothing in the
`claim precludes the ranking step from practically
`being performed in the human mind. For
`example, but for the “by a processor” language,
`the claim encompasses the user thinking that the
`most-used icons should be ranked higher than
`the least-used icons. Thus, this limitation is also a
`mental process.
`No. The claim recites one additional element:
`that a processor is used to perform both the
`ranking and determining steps.
`The processor in both steps is recited at a high
`level of generality, i.e., as a generic processor
`performing a generic computer function of
`processing data (the amount of use of each icon,
`or the ranking of the icons based on the
`determined amount of use). This generic
`processor limitation is no more than mere
`instructions to apply the exception using a
`generic computer component. Accordingly, this
`additional element does not integrate the
`abstract idea into a practical application because
`it does not impose any meaningful limits on
`practicing the abstract idea.
`The claim is directed to the abstract idea.
`No. As discussed with respect to Step 2A Prong
`Two, the additional element in the claim amounts
`to no more than mere instructions to apply the
`exception using a generic computer component.
`The same analysis applies here in 2B, i.e., mere
`instructions to apply an exception using a generic
`computer component cannot integrate a judicial
`exception into a practical application at Step 2A
`or provide an inventive concept in Step 2B. The
`claim is ineligible.
`
`
`
`5
`
`PGR2020-00063 Page 00005
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`Example 38 – Simulating an Analog Audio Mixer
`
`Background:
`
`Audiophiles are people interested in high-fidelity audio reproduction. For many, this means
`listening to music in its analog form, as digital audio files are considered to “lose” much of
`the sound quality in the conversion from analog to digital. Prior inventions attempted to
`create digital simulations of analog audio mixers to simulate the sounds from analog circuits.
`However, the prior art audio mixer simulations do not produce the same sound quality as
`the actual analog circuits.
`Applicant’s invention seeks to more closely replicate the sound quality of an analog audio
`mixer by accounting for the slight variances in analog circuit values that are generated
`during the circuit’s manufacturing. By simulating these variances, a more authentic sound
`can be created that is preferential for the listener. The method begins with a model of an
`analog circuit representing an audio mixing console. The model includes a location of all the
`circuit elements within the circuit, an initial value for each of the circuit elements, and a
`manufacturing tolerance range for each of the circuit elements. A randomized working value
`of each element is then determined using a normally distributed pseudo random number
`generator (PRNG) based on the initial value of the circuit element and the manufacturing
`tolerance range. The model is then simulated using a bilinear transformation to create a
`digital representation of the analog circuit. This digital representation is then presented to
`the user through a graphical user interface as an operational digital audio mixer. The user
`can use the graphical user interface to test the sound quality of the digital representation. If
`the sound quality is not acceptable to the user, the user can generate new randomized
`working values for all the circuit elements and simulate another digital representation of the
`analog audio mixer.
`A method for providing a digital computer simulation of an analog audio mixer comprising:
`initializing a model of an analog circuit in the digital computer, said model including
`a location, initial value, and a manufacturing tolerance range for each of the circuit
`elements within the analog circuit;
`generating a normally distributed first random value for each circuit element, using
`a pseudo random number generator, based on a respective initial value and manufacturing
`tolerance range; and
`simulating a first digital representation of the analog circuit based on the first
`random value and the location of each circuit element within the analog circuit.
`
`
`
`
`2019-01-07
`
`
`Claim:
`
`
`
`6
`
`PGR2020-00063 Page 00006
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`
`Step
`
`1: Statutory Category?
`2A - Prong 1: Judicial
`Exception Recited?
`
`2A - Prong 2: Integrated into
`a Practical Application?
`2B: Claim provides an
`Inventive Concept?
`
`
`
`
`Analysis
`
`Yes. The claim recites a series of steps and, therefore, is
`a process.
`No. The claim does not recite any of the judicial
`exceptions enumerated in the 2019 PEG. The claim does
`not recite a mathematical relationship, formula, or
`calculation. While some of the limitations may be based
`on mathematical concepts, the mathematical concepts
`are not recited in the claims. With respect to mental
`processes, the claim does not recite a mental process
`because the steps are not practically performed in the
`human mind. Finally, the claim does not recite a certain
`method of organizing human activity such as a
`fundamental economic concept or commercial and legal
`interactions. The claim is eligible because it does not
`recite a judicial exception.
`
`N/A.
`
`N/A.
`
`2019-01-07
`
`
`
`7
`
`PGR2020-00063 Page 00007
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`Example 39 - Method for Training a Neural Network for Facial Detection
`
`Background:
`
`Facial detection is a computer technology for identifying human faces in digital images. This
`technology has several different potential uses, ranging from tagging pictures in social
`networking sites to security access control. Some prior methods use neural networks to
`perform facial detection. A neural network is a framework of machine learning algorithms
`that work together to classify inputs based on a previous training process. In facial detection,
`a neural network classifies images as either containing a human face or not, based upon the
`model being previously trained on a set of facial and non-facial images. However, these prior
`methods suffer from the inability to robustly detect human faces in images where there are
`shifts, distortions, and variations in scale and rotation of the face pattern in the image.
`Applicant’s invention addresses this issue by using a combination of features to more
`robustly detect human faces. The first feature is the use of an expanded training set of facial
`images to train the neural network. This expanded training set is developed by applying
`mathematical transformation functions on an acquired set of facial images. These
`transformations can include affine transformations, for example, rotating, shifting, or
`mirroring or filtering transformations, for example, smoothing or contrast reduction. The
`neural networks are then trained with this expanded training set using stochastic learning
`with backpropagation which is a type of machine learning algorithm that uses the gradient
`of a mathematical loss function to adjust the weights of the network. Unfortunately, the
`introduction of an expanded training set increases false positives when classifying non-facial
`images. Accordingly, the second feature of applicant’s invention is the minimization of these
`false positives by performing an iterative training algorithm, in which the system is retrained
`with an updated training set containing the false positives produced after face detection has
`been performed on a set of non-facial images. This combination of features provides a robust
`face detection model that can detect faces in distorted images while limiting the number of
`false positives.
`A computer-implemented method of training a neural network for facial detection
`comprising:
`
`collecting a set of digital facial images from a database;
`
`applying one or more transformations to each digital facial image including
`mirroring, rotating, smoothing, or contrast reduction to create a modified set of digital
`facial images;
`
`creating a first training set comprising the collected set of digital facial images, the
`modified set of digital facial images, and a set of digital non-facial images;
`
`training the neural network in a first stage using the first training set;
`2019-01-07
`
`
`
`Claim:
`
`8
`
`PGR2020-00063 Page 00008
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`Step
`
`Analysis
`
`creating a second training set for a second stage of training comprising the first
`
`training set and digital non-facial images that are incorrectly detected as facial images after
`the first stage of training; and
`
`training the neural network in a second stage using the second training set.
`
`1: Statutory Category?
`Yes. The claim recites a series of steps and, therefore,
`is a process.
`2A - Prong 1: Judicial
`No. The claim does not recite any of the judicial
`Exception Recited?
`exceptions enumerated in the 2019 PEG. For instance,
`the claim does not recite any mathematical
`relationships, formulas, or calculations. While some of
`the limitations may be based on mathematical
`concepts, the mathematical concepts are not recited in
`the claims. Further, the claim does not recite a mental
`process because the steps are not practically
`performed in the human mind. Finally, the claim does
`not recite any method of organizing human activity
`such as a fundamental economic concept or managing
`interactions between people. Thus, the claim is
`eligible because it does not recite a judicial exception.
`
`
`
`
`
`N/A.
`
`N/A.
`
`2A - Prong 2: Integrated into a
`Practical Application?
`2B: Claim provides an
`Inventive Concept?
`
`
`
`2019-01-07
`
`
`
`9
`
`PGR2020-00063 Page 00009
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`Example 40 – Adaptive Monitoring of Network Traffic Data
`
`Background:
`
`Network visibility tools enable close monitoring of computer network traffic, applications,
`performance, and resources. The data acquired through these network visibility tools is
`extremely useful in optimizing network performance, resolving network issues, and
`improving network security. One industry standard network visibility protocol is NetFlow.
`In a typical setup, a NetFlow exporter generates and exports network traffic statistics (in the
`form of NetFlow records) to at least one NetFlow collector that analyzes the statistics.
`Because NetFlow records are very large, the continual generation and export of NetFlow
`records in such a setup substantially increases the traffic volume on the network, which
`hinders network performance. Moreover, continual analysis of the network is not always
`necessary when the network is performing under normal conditions.
`Applicant’s invention addresses this issue by varying the amount of network data collected
`based on monitored events in the network. That is, the system will only collect NetFlow
`protocol data and export a NetFlow record when abnormal network conditions are detected.
`In practice, during normal network conditions, a network appliance collects network data
`relating to network traffic passing through the network appliance. This network data, for
`example, could include network delay, packet loss, or jitter. Periodically, the network data
`is compared to a predefined quality threshold. If this network data is greater than the
`predefined quality threshold, an abnormal condition is detected. When an abnormal
`condition is present, the system begins collecting NetFlow protocol data, which can later be
`used for analyzing the abnormal condition. During this time, the network appliance
`continues to monitor the network conditions (i.e., comparing collected network data to the
`predetermined quality threshold) and when the abnormal condition no longer exists,
`NetFlow protocol data is no longer collected.
`A method for adaptive monitoring of traffic data through a network appliance connected
`between computing devices in a network, the method comprising:
`collecting, by the network appliance, traffic data relating to the network traffic
`passing through the network appliance, the traffic data comprising at least one of network
`delay, packet loss, or jitter;
`comparing, by the network appliance, at least one of the collected traffic data to a
`predefined threshold; and
`collecting additional traffic data relating to the network traffic when the collected
`traffic data is greater than the predefined threshold, the additional traffic data comprising
`Netflow protocol data.
`
`
`Claim 1:
`
`
`
`
`2019-01-07
`
`
`
`10
`
`PGR2020-00063 Page 00010
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`
`Step
`
`1: Statutory Category?
`2A - Prong 1: Judicial
`Exception Recited?
`
`2A - Prong 2: Integrated into
`a Practical Application?
`
`2B: Claim provides an
`Inventive Concept?
`2019-01-07
`
`Analysis
`
`Yes. The claim recites a series of steps and, therefore, is
`a process.
`Yes. The claim recites the limitation of comparing at
`least one of the collected traffic data to a predefined
`threshold. This limitation, as drafted, is a process that,
`under its broadest reasonable interpretation, covers
`performance of the limitation in the mind but for the
`recitation of generic computer components. That is,
`other than reciting “by the network appliance,” nothing
`in the claim element precludes the step from practically
`being performed in the mind. For example, but for the
`“by the network appliance” language, the claim
`encompasses a user simply comparing the collected
`packet loss data to a predetermined acceptable quality
`percentage in his/her mind. The mere nominal recitation
`of a generic network appliance does not take the claim
`limitation out of the mental processes grouping. Thus,
`the claim recites a mental process.
`Yes. The claim recites the combination of additional
`elements of collecting at least one of network delay,
`packet loss, or jitter relating to the network traffic
`passing through the network appliance, and collecting
`additional Netflow protocol data relating to the network
`traffic when the collected network delay, packet loss, or
`jitter is greater than the predefined threshold. Although
`each of the collecting steps analyzed individually may be
`viewed as mere pre- or post-solution activity, the claim
`as a whole is directed to a particular improvement in
`collecting traffic data. Specifically, the method limits
`collection of additional Netflow protocol data to when
`the initially collected data reflects an abnormal condition,
`which avoids excess traffic volume on the network and
`hindrance of network performance. The collected data
`can then be used to analyze the cause of the abnormal
`condition. This provides a specific improvement over
`prior systems, resulting in improved network
`monitoring. The claim as a whole integrates the mental
`process into a practical application. Thus, the claim is
`eligible because it is not directed to the recited judicial
`exception.
`
`N/A.
`
`
`
`11
`
`PGR2020-00063 Page 00011
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`
`Step
`
`Analysis
`
` Claim 2:
`A method for monitoring of traffic data through a network appliance connected between
`computing devices in a network, the method comprising:
`collecting, by the network appliance, traffic data relating to the network traffic
`passing through the network appliance, the traffic data comprising at least one of network
`delay, packet loss, or jitter; and
`comparing, by the network appliance, at least one of the collected traffic data to a
`predefined threshold.
`
`1: Statutory Category? Yes. The claim recites a series of steps and, therefore, is a
`process.
`2A - Prong 1: Judicial
`Yes. The claim recites the limitation of comparing at least one
`Exception Recited?
`of the collected traffic data to a predefined threshold. This
`limitation, as drafted, is a process that, under its broadest
`reasonable interpretation, covers performance of the limitation
`in the mind but for the recitation of generic computer
`components. That is, other than reciting “by the network
`appliance,” nothing in the claim element precludes the step
`from practically being performed in the mind. For example, but
`for the “by the network appliance” language, the claim
`encompasses a user simply comparing the collected packet loss
`data to a predetermined acceptable quality percentage in
`his/her mind. The mere nominal recitation of a generic
`network appliance does not take the claim limitation out of the
`mental processes grouping. Thus, the claim recites a mental
`process.
`
`
`network traffic passing through the network appliance, and 2A - Prong 2: Practical Application? No. The claim recites two additional elements: collecting at
`Integrated into a
`least one of network delay, packet loss, or jitter relating to the
`that a generic network appliance performs the comparing step.
`The collecting step is recited at a high level of generality (i.e., as
`a general means of gathering network traffic data for use in the
`comparison step), and amounts to mere data gathering, which
`is a form of insignificant extra-solution activity. The network
`appliance that performs the comparison step is also recited at a
`high level of generality, and merely automates the comparison
`step. Each of the additional limitations is no more than mere
`instructions to apply the exception using a generic computer
`component (the network appliance).
`
`12
`
`2019-01-07
`
`PGR2020-00063 Page 00012
`
`

`

`2B: Claim provides an
`Inventive Concept?
`
`
`
`
`
`Subject Matter Eligibility Examples: Abstract Ideas
`
`The combination of these additional elements is no more than
`mere instructions to apply the exception using a generic
`computer component (the network appliance). Accordingly,
`even in combination, these additional elements do not integrate
`the abstract idea into a practical application because they do
`not impose any meaningful limits on practicing the abstract
`idea.
`The claim is directed to the abstract idea.
`No. As discussed with respect to Step 2A Prong Two, the
`additional elements in the claim amount to no more than mere
`instructions to apply the exception using a generic computer
`component. The same analysis applies here in 2B, i.e., mere
`instructions to apply an exception on a generic computer
`cannot integrate a judicial exception into a practical application
`at Step 2A or provide an inventive concept in Step 2B.
`Under the 2019 PEG, a conclusion that an additional element is
`insignificant extra-solution activity in Step 2A should be re-
`evaluated in Step 2B. Here, the collecting step was considered
`to be extra-solution activity in Step 2A, and thus it is re-
`evaluated in Step 2B to determine if it is more than what is
`well-understood, routine, conventional activity in the field. The
`background of the example does not provide any indication
`that the network appliance is anything other than a generic, off-
`the-shelf computer component, and the Symantec, TLI, and OIP
`Techs. court decisions cited in MPEP 2106.05(d)(II) indicate
`that mere collection or receipt of data over a network is a well-
`understood, routine, and conventional function when it is
`claimed in a merely generic manner (as it is here). Accordingly,
`a conclusion that the collecting step is well-understood,
`routine, conventional activity is supported under Berkheimer
`Option 2.
`For these reasons, there is no inventive concept in the claim,
`and thus it is ineligible.
`
`
`2019-01-07
`
`
`
`13
`
`PGR2020-00063 Page 00013
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`Example 41 – Cryptographic Communications
`
`Background:
`Security of information is of increasing importance in computer technology. It is critical that
`data being sent from a sender to a recipient is unable to be intercepted and understood by
`an intermediate source. In addition, authentication of the source of the message must be
`ensured along with the verification of and security of the message content. Various
`cryptographic encoding and decoding methods are available to assist with these security and
`authentication needs. However, many of them require expensive encoding and decoding
`hardware as well as a secure way of sharing the private key used to encrypt and decrypt the
`message. There is a need to perform these same security and authentication functions
`efficiently over a public key system so that information can be shared easily between users
`who do not know each other and have not shared the key used to encrypt and decrypt the
`information.
`To solve these problems, applicants have invented a method for establishing cryptographic
`communications using an algorithm to encrypt a plaintext into a ciphertext. The invention
`includes at least one encoding device and at least one decoding device, which are computer
`terminals, and a communication channel, where the encoding and decoding devices are
`coupled to the communication channel. The encoding device is responsive to a precoded
`message-to-be-transmitted M and an encoding key E to provide a ciphertext word C for
`transmission to a particular decoding device. The message-to-be-transmitted is precoded
`by converting it to a numerical representation which is broken into one or more blocks MA
`of equal length. This precoding may be done by any conventional means. The resulting
`message MA is a number representative of a message-to-be-transmitted, where 0 ≤ MA ≤ n-1,
`where n is a composite number of the form n=p*q, where p and q are prime numbers. The
`encoding key E is a pair of positive integers e and n, which are related to the particular
`decoding device. The encoding device distinctly encodes each of the n possible messages.
`The transformation provided by the encoding device is described by the relation CA=MAe
`(mod n) where e is a number relatively prime to (p-1)*(q-1). The encoding device transmits
`the ciphertext word signal CA to the decoding device over the communications channel. The
`decoding device is responsive to the received ciphertext word CA and a decoding key to
`transform the ciphertext to a received message word MA’.
`The invention improves upon prior methods for establishing cryptographic communications
`because by using only the variables n and e (which are publicly known), a plaintext can be
`encrypted by anyone. The variables p and q are only known by the owner of the decryption
`key d and are used to generate the decryption key (private key d is not claimed below). Thus,
`the security of the cipher relies on the difficulty of factoring large integers by computers, and
`there is no known efficient algorithm to recover the plaintext given the ciphertext and the
`public information (n, e) (assuming that p and q are sufficiently large).
`Claim:
`A method for establishing cryptographic communications between a first computer
`terminal and a second computer terminal comprising:
`2019-01-07
`
`
`
`
`14
`
`PGR2020-00063 Page 00014
`
`

`

`Subject Matter Eligibility Examples: Abstract Ideas
`
`
`
`Step
`
`Analysis
`
`
`
`
`receiving a plaintext word signal at the first computer terminal;
`
`transforming the plaintext

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket