Skip to main content Skip to footer
HomeHome
 
  • Homepage
  • Searching for patents

    Patent knowledge

    Access our patent databases and search tools.

    Go to overview 

    • Overview
    • Technical information
      • Overview
      • Espacenet - patent search
      • European Publication Server
      • EP full-text search
    • Legal information
      • Overview
      • European Patent Register
      • European Patent Bulletin
      • European Case Law Identifier sitemap
      • Third-party observations
    • Business information
      • Overview
      • PATSTAT
      • IPscore
      • Technology insight reports
    • Data
      • Overview
      • Technology Intelligence Platform
      • Linked open EP data
      • Bulk data sets
      • Web services
      • Coverage, codes and statistics
    • Technology platforms
      • Overview
      • Plastics in transition
      • Water innovation
      • Space innovation
      • Technologies combatting cancer
      • Firefighting technologies
      • Clean energy technologies
      • Fighting coronavirus
    • Helpful resources
      • Overview
      • First time here?
      • Asian patent information
      • Patent information centres
      • Patent Translate
      • Patent Knowledge News
      • Business and statistics
      • Unitary Patent information in patent knowledge
    Image
    Plastics in Transition

    Technology insight report on plastic waste management

  • Applying for a patent

    Applying for a patent

    Practical information on filing and grant procedures.

    Go to overview 

    • Overview
    • European route
      • Overview
      • European Patent Guide
      • Oppositions
      • Oral proceedings
      • Appeals
      • Unitary Patent & Unified Patent Court
      • National validation
      • Request for extension/validation
    • International route (PCT)
      • Overview
      • Euro-PCT Guide – PCT procedure at the EPO
      • EPO decisions and notices
      • PCT provisions and resources
      • Extension/validation request
      • Reinforced partnership programme
      • Accelerating your PCT application
      • Patent Prosecution Highway (PPH)
      • Training and events
    • National route
    • Find a professional representative
    • MyEPO services
      • Overview
      • Understand our services
      • Get access
      • File with us
      • Interact with us on your files
      • Online Filing & fee payment outages
    • Forms
      • Overview
      • Request for examination
    • Fees
      • Overview
      • European fees (EPC)
      • International fees (PCT)
      • Unitary Patent fees (UP)
      • Fee payment and refunds
      • Warning

    UP

    Find out how the Unitary Patent can enhance your IP strategy

  • Law & practice

    Law & practice

    European patent law, the Official Journal and other legal texts.

    Go to overview 

    • Overview
    • Legal texts
      • Overview
      • European Patent Convention
      • Official Journal
      • Guidelines
      • Extension / validation system
      • London Agreement
      • National law relating to the EPC
      • Unitary patent system
      • National measures relating to the Unitary Patent
    • Court practices
      • Overview
      • European Patent Judges' Symposium
    • User consultations
      • Overview
      • Ongoing consultations
      • Completed consultations
    • Substantive patent law harmonisation
      • Overview
      • The Tegernsee process
      • Group B+
    • Convergence of practice
    • Options for professional representatives
    Image
    Law and practice scales 720x237

    Keep up with key aspects of selected BoA decisions with our monthly "Abstracts of decisions”

  • News & events

    News & events

    Our latest news, podcasts and events, including the European Inventor Award.

    Go to overview 

     

    • Overview
    • News
    • Events
    • European Inventor Award
      • Overview
      • The meaning of tomorrow
      • About the award
      • Categories and prizes
      • Meet the finalists
      • Nominations
      • European Inventor Network
      • The 2024 event
    • Young Inventor Prize
      • Overview
      • About the prize
      • Nominations
      • The jury
      • The world, reimagined
    • Press centre
      • Overview
      • Patent Index and statistics
      • Search in press centre
      • Background information
      • Copyright
      • Press contacts
      • Call back form
      • Email alert service
    • Innovation and patenting in focus
      • Overview
      • Water-related technologies
      • CodeFest
      • Green tech in focus
      • Research institutes
      • Women inventors
      • Lifestyle
      • Space and satellites
      • The future of medicine
      • Materials science
      • Mobile communications
      • Biotechnology
      • Patent classification
      • Digital technologies
      • The future of manufacturing
      • Books by EPO experts
    • "Talk innovation" podcast

    Podcast

    From ideas to inventions: tune into our podcast for the latest in tech and IP

  • Learning

    Learning

    The European Patent Academy – the point of access to your learning

    Go to overview 

    • Overview
    • Learning activities and paths
      • Overview
      • Learning activities
      • Learning paths
    • EQE and EPAC
      • Overview
      • EQE - European qualifying examination
      • EPAC - European patent administration certification
      • CSP – Candidate Support Programme
    • Learning resources by area of interest
      • Overview
      • Patent granting
      • Technology transfer and dissemination
      • Patent enforcement and litigation
    • Learning resources by profile
      • Overview
      • Business and IP managers
      • EQE and EPAC Candidates
      • Judges, lawyers and prosecutors
      • National offices and IP authorities
      • Patent attorneys and paralegals
      • Universities, research centres and technology transfer centres (TTOs)
    Image
    Patent Academy catalogue

    Have a look at the extensive range of learning opportunities in the European Patent Academy training catalogue

  • About us

    About us

    Find out more about our work, values, history and vision

    Go to overview 

    • Overview
    • The EPO at a glance
    • 50 years of the EPC
      • Overview
      • Official celebrations
      • Member states’ video statements
      • 50 Leading Tech Voices
      • Athens Marathon
      • Kids’ collaborative art competition
    • Legal foundations and member states
      • Overview
      • Legal foundations
      • Member states of the European Patent Organisation
      • Extension states
      • Validation states
    • Administrative Council and subsidiary bodies
      • Overview
      • Communiqués
      • Calendar
      • Documents and publications
      • Administrative Council
    • Principles & strategy
      • Overview
      • Our mission, vision, values and corporate policy
      • Strategic Plan 2028
      • Towards a New Normal
    • Leadership & management
      • Overview
      • President António Campinos
      • Management Advisory Committee
    • Sustainability at the EPO
      • Overview
      • Environmental
      • Social
      • Governance and Financial sustainability
    • Services & activities
      • Overview
      • Our services & structure
      • Quality
      • Consulting our users
      • European and international co-operation
      • European Patent Academy
      • Chief Economist
      • Ombuds Office
      • Reporting wrongdoing
    • Observatory on Patents and Technology
      • Overview
      • Innovation actors
      • Policy and funding
      • Tools
      • About the Observatory
    • Procurement
      • Overview
      • Procurement forecast
      • Doing business with the EPO
      • Procurement procedures
      • Sustainable Procurement Policy
      • About eTendering and electronic signatures
      • Procurement portal
      • Invoicing
      • General conditions
      • Archived tenders
    • Transparency portal
      • Overview
      • General
      • Human
      • Environmental
      • Organisational
      • Social and relational
      • Economic
      • Governance
    • Statistics and trends
      • Overview
      • Statistics & Trends Centre
      • Patent Index 2024
      • EPO Data Hub
      • Clarification on data sources
    • History
      • Overview
      • 1970s
      • 1980s
      • 1990s
      • 2000s
      • 2010s
      • 2020s
    • Art collection
      • Overview
      • The collection
      • Let's talk about art
      • Artists
      • Media library
      • What's on
      • Publications
      • Contact
      • Culture Space A&T 5-10
      • "Long Night"
    Image
    Patent Index 2024 keyvisual showing brightly lit up data chip, tinted in purple, bright blue

    Track the latest tech trends with our Patent Index

 
Website
cancel
en de fr
  • Language selection
  • English
  • Deutsch
  • Français
Main navigation
  • Homepage
    • Go back
    • New to patents
  • New to patents
    • Go back
    • Your business and patents
    • Why do we have patents?
    • What's your big idea?
    • Are you ready?
    • What to expect
    • How to apply for a patent
    • Is it patentable?
    • Are you first?
    • Patent quiz
    • Unitary patent video
  • Searching for patents
    • Go back
    • Overview
    • Technical information
      • Go back
      • Overview
      • Espacenet - patent search
        • Go back
        • Overview
        • National patent office databases
        • Global Patent Index (GPI)
        • Release notes
      • European Publication Server
        • Go back
        • Overview
        • Release notes
        • Cross-reference index for Euro-PCT applications
        • EP authority file
        • Help
      • EP full-text search
    • Legal information
      • Go back
      • Overview
      • European Patent Register
        • Go back
        • Overview
        • Release notes archive
        • Register documentation
          • Go back
          • Overview
          • Deep link data coverage
          • Federated Register
          • Register events
      • European Patent Bulletin
        • Go back
        • Overview
        • Download Bulletin
        • EP Bulletin search
        • Help
      • European Case Law Identifier sitemap
      • Third-party observations
    • Business information
      • Go back
      • Overview
      • PATSTAT
      • IPscore
        • Go back
        • Release notes
      • Technology insight reports
    • Data
      • Go back
      • Overview
      • Technology Intelligence Platform
      • Linked open EP data
      • Bulk data sets
        • Go back
        • Overview
        • Manuals
        • Sequence listings
        • National full-text data
        • European Patent Register data
        • EPO worldwide bibliographic data (DOCDB)
        • EP full-text data
        • EPO worldwide legal event data (INPADOC)
        • EP bibliographic data (EBD)
        • Boards of Appeal decisions
      • Web services
        • Go back
        • Overview
        • Open Patent Services (OPS)
        • European Publication Server web service
      • Coverage, codes and statistics
        • Go back
        • Weekly updates
        • Updated regularly
    • Technology platforms
      • Go back
      • Overview
      • Plastics in transition
        • Go back
        • Overview
        • Plastics waste recovery
        • Plastics waste recycling
        • Alternative plastics
      • Innovation in water technologies
        • Go back
        • Overview
        • Clean water
        • Protection from water
      • Space innovation
        • Go back
        • Overview
        • Cosmonautics
        • Space observation
      • Technologies combatting cancer
        • Go back
        • Overview
        • Prevention and early detection
        • Diagnostics
        • Therapies
        • Wellbeing and aftercare
      • Firefighting technologies
        • Go back
        • Overview
        • Detection and prevention of fires
        • Fire extinguishing
        • Protective equipment
        • Post-fire restoration
      • Clean energy technologies
        • Go back
        • Overview
        • Renewable energy
        • Carbon-intensive industries
        • Energy storage and other enabling technologies
      • Fighting coronavirus
        • Go back
        • Overview
        • Vaccines and therapeutics
          • Go back
          • Overview
          • Vaccines
          • Overview of candidate therapies for COVID-19
          • Candidate antiviral and symptomatic therapeutics
          • Nucleic acids and antibodies to fight coronavirus
        • Diagnostics and analytics
          • Go back
          • Overview
          • Protein and nucleic acid assays
          • Analytical protocols
        • Informatics
          • Go back
          • Overview
          • Bioinformatics
          • Healthcare informatics
        • Technologies for the new normal
          • Go back
          • Overview
          • Devices, materials and equipment
          • Procedures, actions and activities
          • Digital technologies
        • Inventors against coronavirus
    • Helpful resources
      • Go back
      • Overview
      • First time here?
        • Go back
        • Overview
        • Basic definitions
        • Patent classification
          • Go back
          • Overview
          • Cooperative Patent Classification (CPC)
        • Patent families
          • Go back
          • Overview
          • DOCDB simple patent family
          • INPADOC extended patent family
        • Legal event data
          • Go back
          • Overview
          • INPADOC classification scheme
      • Asian patent information
        • Go back
        • Overview
        • China (CN)
          • Go back
          • Overview
          • Facts and figures
          • Grant procedure
          • Numbering system
          • Useful terms
          • Searching in databases
        • Chinese Taipei (TW)
          • Go back
          • Overview
          • Grant procedure
          • Numbering system
          • Useful terms
          • Searching in databases
        • India (IN)
          • Go back
          • Overview
          • Facts and figures
          • Grant procedure
          • Numbering system
        • Japan (JP)
          • Go back
          • Overview
          • Facts and figures
          • Grant procedure
          • Numbering system
          • Useful terms
          • Searching in databases
        • Korea (KR)
          • Go back
          • Overview
          • Facts and figures
          • Grant procedure
          • Numbering system
          • Useful terms
          • Searching in databases
        • Russian Federation (RU)
          • Go back
          • Overview
          • Facts and figures
          • Numbering system
          • Searching in databases
        • Useful links
      • Patent information centres (PATLIB)
      • Patent Translate
      • Patent Knowledge News
      • Business and statistics
      • Unitary Patent information in patent knowledge
  • Applying for a patent
    • Go back
    • Overview
    • European route
      • Go back
      • Overview
      • European Patent Guide
      • Oppositions
      • Oral proceedings
        • Go back
        • Oral proceedings calendar
          • Go back
          • Calendar
          • Public access to appeal proceedings
          • Public access to opposition proceedings
          • Technical guidelines
      • Appeals
      • Unitary Patent & Unified Patent Court
        • Go back
        • Overview
        • Unitary Patent
          • Go back
          • Overview
          • Legal framework
          • Main features
          • Applying for a Unitary Patent
          • Cost of a Unitary Patent
          • Translation and compensation
          • Start date
          • Introductory brochures
        • Unified Patent Court
      • National validation
      • Extension/validation request
    • International route
      • Go back
      • Overview
      • Euro-PCT Guide
      • Entry into the European phase
      • Decisions and notices
      • PCT provisions and resources
      • Extension/validation request
      • Reinforced partnership programme
      • Accelerating your PCT application
      • Patent Prosecution Highway (PPH)
        • Go back
        • Patent Prosecution Highway (PPH) programme outline
      • Training and events
    • National route
    • MyEPO services
      • Go back
      • Overview
      • Understand our services
        • Go back
        • Overview
        • Exchange data with us using an API
          • Go back
          • Release notes
      • Get access
        • Go back
        • Overview
        • Release notes
      • File with us
        • Go back
        • Overview
        • What if our online filing services are down?
        • Release notes
      • Interact with us on your files
        • Go back
        • Release notes
      • Online Filing & fee payment outages
    • Fees
      • Go back
      • Overview
      • European fees (EPC)
        • Go back
        • Overview
        • Decisions and notices
      • International fees (PCT)
        • Go back
        • Reduction in fees
        • Fees for international applications
        • Decisions and notices
        • Overview
      • Unitary Patent fees (UP)
        • Go back
        • Overview
        • Decisions and notices
      • Fee payment and refunds
        • Go back
        • Overview
        • Payment methods
        • Getting started
        • FAQs and other documentation
        • Technical information for batch payments
        • Decisions and notices
        • Release notes
      • Warning
    • Forms
      • Go back
      • Overview
      • Request for examination
    • Find a professional representative
  • Law & practice
    • Go back
    • Overview
    • Legal texts
      • Go back
      • Overview
      • European Patent Convention
        • Go back
        • Overview
        • Archive
          • Go back
          • Overview
          • Documentation on the EPC revision 2000
            • Go back
            • Overview
            • Diplomatic Conference for the revision of the EPC
            • Travaux préparatoires
            • New text
            • Transitional provisions
            • Implementing regulations to the EPC 2000
            • Rules relating to Fees
            • Ratifications and accessions
          • Travaux Préparatoires EPC 1973
      • Official Journal
      • Guidelines
        • Go back
        • Overview
        • EPC Guidelines
        • PCT-EPO Guidelines
        • Unitary Patent Guidelines
        • Guidelines revision cycle
        • Consultation results
        • Summary of user responses
        • Archive
      • Extension / validation system
      • London Agreement
      • National law relating to the EPC
        • Go back
        • Overview
        • Archive
      • Unitary Patent system
        • Go back
        • Travaux préparatoires to UP and UPC
      • National measures relating to the Unitary Patent 
    • Court practices
      • Go back
      • Overview
      • European Patent Judges' Symposium
    • User consultations
      • Go back
      • Overview
      • Ongoing consultations
      • Completed consultations
    • Substantive patent law harmonisation
      • Go back
      • Overview
      • The Tegernsee process
      • Group B+
    • Convergence of practice
    • Options for professional representatives
  • News & events
    • Go back
    • Overview
    • News
    • Events
    • European Inventor Award
      • Go back
      • Overview
      • The meaning of tomorrow
      • About the award
      • Categories and prizes
      • Meet the inventors
      • Nominations
      • European Inventor Network
        • Go back
        • 2024 activities
        • 2025 activities
        • Rules and criteria
        • FAQ
      • The 2024 event
    • Young Inventors Prize
      • Go back
      • Overview
      • About the prize
      • Nominations
      • The jury
      • The world, reimagined
      • The 2025 event
    • Press centre
      • Go back
      • Overview
      • Patent Index and statistics
      • Search in press centre
      • Background information
        • Go back
        • Overview
        • European Patent Office
        • Q&A on patents related to coronavirus
        • Q&A on plant patents
      • Copyright
      • Press contacts
      • Call back form
      • Email alert service
    • In focus
      • Go back
      • Overview
      • Water-related technologies
      • CodeFest
        • Go back
        • CodeFest Spring 2025 on classifying patent data for sustainable development
        • Overview
        • CodeFest 2024 on generative AI
        • CodeFest 2023 on Green Plastics
      • Green tech in focus
        • Go back
        • Overview
        • About green tech
        • Renewable energies
        • Energy transition technologies
        • Building a greener future
      • Research institutes
      • Women inventors
      • Lifestyle
      • Space and satellites
        • Go back
        • Overview
        • Patents and space technologies
      • Healthcare
        • Go back
        • Overview
        • Medical technologies and cancer
        • Personalised medicine
      • Materials science
        • Go back
        • Overview
        • Nanotechnology
      • Mobile communications
      • Biotechnology
        • Go back
        • Overview
        • Red, white or green
        • The role of the EPO
        • What is patentable?
        • Biotech inventors
      • Classification
        • Go back
        • Overview
        • Nanotechnology
        • Climate change mitigation technologies
          • Go back
          • Overview
          • External partners
          • Updates on Y02 and Y04S
      • Digital technologies
        • Go back
        • Overview
        • About ICT
        • Hardware and software
        • Artificial intelligence
        • Fourth Industrial Revolution
      • Additive manufacturing
        • Go back
        • Overview
        • About AM
        • AM innovation
      • Books by EPO experts
    • Podcast
  • Learning
    • Go back
    • Overview
    • Learning activities and paths
      • Go back
      • Overview
      • Learning activities: types and formats
      • Learning paths
    • EQE and EPAC
      • Go back
      • Overview
      • EQE - European Qualifying Examination
        • Go back
        • Overview
        • Compendium
          • Go back
          • Overview
          • Paper F
          • Paper A
          • Paper B
          • Paper C
          • Paper D
          • Pre-examination
        • Candidates successful in the European qualifying examination
        • Archive
      • EPAC - European patent administration certification
      • CSP – Candidate Support Programme
    • Learning resources by area of interest
      • Go back
      • Overview
      • Patent granting
      • Technology transfer and dissemination
      • Patent enforcement and litigation
    • Learning resources by profile
      • Go back
      • Overview
      • Business and IP managers
        • Go back
        • Overview
        • Innovation case studies
          • Go back
          • Overview
          • SME case studies
          • Technology transfer case studies
          • High-growth technology case studies
        • Inventor's handbook
          • Go back
          • Overview
          • Introduction
          • Disclosure and confidentiality
          • Novelty and prior art
          • Competition and market potential
          • Assessing the risk ahead
          • Proving the invention
          • Protecting your idea
          • Building a team and seeking funding
          • Business planning
          • Finding and approaching companies
          • Dealing with companies
        • Best of search matters
          • Go back
          • Overview
          • Tools and databases
          • EPO procedures and initiatives
          • Search strategies
          • Challenges and specific topics
        • Support for high-growth technology businesses
          • Go back
          • Overview
          • Business decision-makers
          • IP professionals
          • Stakeholders of the Innovation Ecosystem
      • EQE and EPAC Candidates
        • Go back
        • Overview
        • Paper F brain-teasers
        • Daily D questions
        • European qualifying examination - Guide for preparation
        • EPAC
      • Judges, lawyers and prosecutors
        • Go back
        • Overview
        • Compulsory licensing in Europe
        • The jurisdiction of European courts in patent disputes
      • National offices and IP authorities
        • Go back
        • Overview
        • Learning material for examiners of national officers
        • Learning material for formalities officers and paralegals
      • Patent attorneys and paralegals
      • Universities, research centres and TTOs
        • Go back
        • Overview
        • Modular IP Education Framework (MIPEF)
        • Pan-European Seal Young Professionals Programme
          • Go back
          • Overview
          • For students
          • For universities
            • Go back
            • Overview
            • IP education resources
            • University memberships
          • Our young professionals
          • Professional development plan
        • Academic Research Programme
          • Go back
          • Overview
          • Completed research projects
          • Current research projects
        • IP Teaching Kit
          • Go back
          • Overview
          • Download modules
        • Intellectual property course design manual
        • PATLIB Knowledge Transfer to Africa
          • Go back
          • The PATLIB Knowledge Transfer to Africa initiative (KT2A)
          • KT2A core activities
          • Success story: Malawi University of Science and Technology and PATLIB Birmingham
  • About us
    • Go back
    • Overview
    • The EPO at a glance
    • 50 years of the EPC
      • Go back
      • Official celebrations
      • Overview
      • Member states’ video statements
        • Go back
        • Albania
        • Austria
        • Belgium
        • Bulgaria
        • Croatia
        • Cyprus
        • Czech Republic
        • Denmark
        • Estonia
        • Finland
        • France
        • Germany
        • Greece
        • Hungary
        • Iceland
        • Ireland
        • Italy
        • Latvia
        • Liechtenstein
        • Lithuania
        • Luxembourg
        • Malta
        • Monaco
        • Montenegro
        • Netherlands
        • North Macedonia
        • Norway
        • Poland
        • Portugal
        • Romania
        • San Marino
        • Serbia
        • Slovakia
        • Slovenia
        • Spain
        • Sweden
        • Switzerland
        • Türkiye
        • United Kingdom
      • 50 Leading Tech Voices
      • Athens Marathon
      • Kids’ collaborative art competition
    • Legal foundations and member states
      • Go back
      • Overview
      • Legal foundations
      • Member states
        • Go back
        • Overview
        • Member states by date of accession
      • Extension states
      • Validation states
    • Administrative Council and subsidiary bodies
      • Go back
      • Overview
      • Communiqués
        • Go back
        • 2024
        • Overview
        • 2023
        • 2022
        • 2021
        • 2020
        • 2019
        • 2018
        • 2017
        • 2016
        • 2015
        • 2014
        • 2013
      • Calendar
      • Documents and publications
        • Go back
        • Overview
        • Select Committee documents
      • Administrative Council
        • Go back
        • Overview
        • Composition
        • Representatives
        • Rules of Procedure
        • Board of Auditors
        • Secretariat
        • Council bodies
    • Principles & strategy
      • Go back
      • Overview
      • Mission, vision, values & corporate policy
      • Strategic Plan 2028
        • Go back
        • Driver 1: People
        • Driver 2: Technologies
        • Driver 3: High-quality, timely products and services
        • Driver 4: Partnerships
        • Driver 5: Financial sustainability
      • Towards a New Normal
      • Data protection & privacy notice
    • Leadership & management
      • Go back
      • Overview
      • About the President
      • Management Advisory Committee
    • Sustainability at the EPO
      • Go back
      • Overview
      • Environmental
        • Go back
        • Overview
        • Inspiring environmental inventions
      • Social
        • Go back
        • Overview
        • Inspiring social inventions
      • Governance and Financial sustainability
    • Procurement
      • Go back
      • Overview
      • Procurement forecast
      • Doing business with the EPO
      • Procurement procedures
      • Dynamic Purchasing System (DPS) publications
      • Sustainable Procurement Policy
      • About eTendering
      • Invoicing
      • Procurement portal
        • Go back
        • Overview
        • e-Signing contracts
      • General conditions
      • Archived tenders
    • Services & activities
      • Go back
      • Overview
      • Our services & structure
      • Quality
        • Go back
        • Overview
        • Foundations
          • Go back
          • Overview
          • European Patent Convention
          • Guidelines for examination
          • Our staff
        • Enabling quality
          • Go back
          • Overview
          • Prior art
          • Classification
          • Tools
          • Processes
        • Products & services
          • Go back
          • Overview
          • Search
          • Examination
          • Opposition
          • Continuous improvement
        • Quality through networking
          • Go back
          • Overview
          • User engagement
          • Co-operation
          • User satisfaction survey
          • Stakeholder Quality Assurance Panels
        • Patent Quality Charter
        • Quality Action Plan
        • Quality dashboard
        • Statistics
          • Go back
          • Overview
          • Search
          • Examination
          • Opposition
        • Integrated management at the EPO
      • Consulting our users
        • Go back
        • Overview
        • Standing Advisory Committee before the EPO (SACEPO)
          • Go back
          • Overview
          • Objectives
          • SACEPO and its working parties
          • Meetings
          • Single Access Portal – SACEPO Area
        • Surveys
          • Go back
          • Overview
          • Detailed methodology
          • Search services
          • Examination services, final actions and publication
          • Opposition services
          • Formalities services
          • Customer services
          • Filing services
          • Key Account Management (KAM)
          • Website
          • Archive
      • Our user service charter
      • European and international co-operation
        • Go back
        • Overview
        • Co-operation with member states
          • Go back
          • Overview
        • Bilateral co-operation with non-member states
          • Go back
          • Overview
          • Validation system
          • Reinforced Partnership programme
        • Multilateral international co-operation with IP offices and organisations
        • Co-operation with international organisations outside the IP system
      • European Patent Academy
        • Go back
        • Overview
        • Partners
      • Chief Economist
        • Go back
        • Overview
        • Economic studies
      • Ombuds Office
      • Reporting wrongdoing
    • Observatory on Patents and Technology
      • Go back
      • Overview
      • Innovation against cancer
      • Innovation actors
        • Go back
        • Overview
        • Startups and SMEs
      • Policy and funding
        • Go back
        • Overview
        • Financing innovation programme
          • Go back
          • Overview
          • Our studies on the financing of innovation
          • EPO initiatives for patent applicants
          • Financial support for innovators in Europe
        • Patents and standards
          • Go back
          • Overview
          • Publications
          • Patent standards explorer
      • Tools
        • Go back
        • Overview
        • Deep Tech Finder
      • About the Observatory
        • Go back
        • Overview
        • Work plan
    • Transparency portal
      • Go back
      • Overview
      • General
        • Go back
        • Overview
        • Annual Review 2023
          • Go back
          • Overview
          • Foreword
          • Executive summary
          • 50 years of the EPC
          • Strategic key performance indicators
          • Goal 1: Engaged and empowered
          • Goal 2: Digital transformation
          • Goal 3: Master quality
          • Goal 4: Partner for positive impact
          • Goal 5: Secure sustainability
        • Annual Review 2022
          • Go back
          • Overview
          • Foreword
          • Executive summary
          • Goal 1: Engaged and empowered
          • Goal 2: Digital transformation
          • Goal 3: Master quality
          • Goal 4: Partner for positive impact
          • Goal 5: Secure sustainability
      • Human
      • Environmental
      • Organisational
      • Social and relational
      • Economic
      • Governance
    • Statistics and trends
      • Go back
      • Overview
      • Statistics & Trends Centre
      • Patent Index 2024
        • Go back
        • Insight into computer technology and AI
        • Insight into clean energy technologies
        • Statistics and indicators
          • Go back
          • European patent applications
            • Go back
            • Key trend
            • Origin
            • Top 10 technical fields
              • Go back
              • Computer technology
              • Electrical machinery, apparatus, energy
              • Digital communication
              • Medical technology
              • Transport
              • Measurement
              • Biotechnology
              • Pharmaceuticals
              • Other special machines
              • Organic fine chemistry
            • All technical fields
          • Applicants
            • Go back
            • Top 50
            • Categories
            • Women inventors
          • Granted patents
            • Go back
            • Key trend
            • Origin
            • Designations
      • Data to download
      • EPO Data Hub
      • Clarification on data sources
    • History
      • Go back
      • Overview
      • 1970s
      • 1980s
      • 1990s
      • 2000s
      • 2010s
      • 2020s
    • Art collection
      • Go back
      • Overview
      • The collection
      • Let's talk about art
      • Artists
      • Media library
      • What's on
      • Publications
      • Contact
      • Culture Space A&T 5-10
        • Go back
        • Catalyst lab & Deep vision
          • Go back
          • Irene Sauter (DE)
          • AVPD (DK)
          • Jan Robert Leegte (NL)
          • Jānis Dzirnieks (LV) #1
          • Jānis Dzirnieks (LV) #2
          • Péter Szalay (HU)
          • Thomas Feuerstein (AT)
          • Tom Burr (US)
          • Wolfgang Tillmans (DE)
          • TerraPort
          • Unfinished Sculpture - Captives #1
          • Deep vision – immersive exhibition
          • Previous exhibitions
        • The European Patent Journey
        • Sustaining life. Art in the climate emergency
        • Next generation statements
        • Open storage
        • Cosmic bar
      • "Long Night"
  • Boards of Appeal
    • Go back
    • Overview
    • Decisions of the Boards of Appeal
      • Go back
      • Overview
      • Recent decisions
      • Selected decisions
    • Information from the Boards of Appeal
    • Procedure
    • Oral proceedings
    • About the Boards of Appeal
      • Go back
      • Overview
      • President of the Boards of Appeal
      • Enlarged Board of Appeal
        • Go back
        • Overview
        • Pending referrals (Art. 112 EPC)
        • Decisions sorted by number (Art. 112 EPC)
        • Pending petitions for review (Art. 112a EPC)
        • Decisions on petitions for review (Art. 112a EPC)
      • Technical Boards of Appeal
      • Legal Board of Appeal
      • Disciplinary Board of Appeal
      • Presidium
        • Go back
        • Overview
    • Code of Conduct
    • Business distribution scheme
      • Go back
      • Overview
      • Technical boards of appeal by IPC in 2025
      • Archive
    • Annual list of cases
    • Communications
    • Annual reports
      • Go back
      • Overview
    • Publications
      • Go back
      • Abstracts of decisions
    • Case Law of the Boards of Appeal
      • Go back
      • Overview
      • Archive
  • Service & support
    • Go back
    • Overview
    • Website updates
    • Availability of online services
      • Go back
      • Overview
    • FAQ
      • Go back
      • Overview
    • Publications
    • Ordering
      • Go back
      • Overview
      • Patent Knowledge Products and Services
      • Terms and conditions
        • Go back
        • Overview
        • Patent information products
        • Bulk data sets
        • Open Patent Services (OPS)
        • Fair use charter
    • Procedural communications
    • Useful links
      • Go back
      • Overview
      • Patent offices of member states
      • Other patent offices
      • Directories of patent attorneys
      • Patent databases, registers and gazettes
      • Disclaimer
    • Contact us
      • Go back
      • Overview
      • Filing options
      • Locations
    • Subscription centre
      • Go back
      • Overview
      • Subscribe
      • Change preferences
      • Unsubscribe
    • Official holidays
    • Glossary
    • RSS feeds
Board of Appeals
Decisions

Recent decisions

Overview
  • 2025 decisions
  • 2024 decisions
  • 2023 decisions
  1. Home
  2. T 1948/15 (Mutual device authentication/FUJITSU) 30-01-2018
Facebook X Linkedin Email

T 1948/15 (Mutual device authentication/FUJITSU) 30-01-2018

European Case Law Identifier
ECLI:EP:BA:2018:T194815.20180130
Date of decision
30 January 2018
Case number
T 1948/15
Petition for review of
-
Application number
07109695.2
IPC class
G06F 21/00
Language of proceedings
EN
Distribution
NO DISTRIBUTION (D)

Download and more information:

Decision in EN 432.18 KB
Documentation of the appeal procedure can be found in the European Patent Register
Bibliographic information is available in:
EN
Versions
Unpublished
Application title

Security and authentication of information processing apparatus

Applicant name
FUJITSU LIMITED
Opponent name
-
Board
3.5.06
Headnote
-
Relevant legal provisions
European Patent Convention Art 56 1973
Keywords
Inventive step (no)
Catchword
-
Cited decisions
T 1121/10
Citing decisions
-

I. The appeal is against the decision of the examining division, with reasons dated 21 April 2015, to refuse European patent application No. 07109695.2 for lack of inventive step in view of

D1: WO 02/03178 A.

II. Notice of appeal was filed on 15 June 2015, the appeal fee being paid on the same day. A statement of grounds of appeal was received on 20 August 2015. The appellant requested that the decision be set aside and that a patent be granted on the basis of amended claims 1-4 according to a main or an auxiliary request as filed with the grounds of appeal, in combination with the description and the drawings as originally filed.

III. In an annex to a summons to oral proceedings, the board informed the appellant of its preliminary opinion that the claimed invention lacked inventive step over D1, Article 56 EPC 1973.

IV. In response to the summons, by letter dated 29 December 2017, the appellant filed amendments to claims 1-4 of the main and the first auxiliary request, and new claims 1-4 of a second and a third auxiliary request.

V. Claim 1 of the main request reads as follows:

"A safety judgment system for judging safety of an information processing apparatus, the system comprising the information processing apparatus, a first authentication apparatus and a second authentication apparatus which are connected through a communication network, wherein

said information processing apparatus (1) comprises:

biometric information receiving means (112) for receiving biometric information of a user of the information processing apparatus;

environment information collecting means (51) for collecting environment information of the information processing apparatus wherein the environment information includes information about name or version of installed software, equipment name or version of connected peripheral equipment, or device name or version of said information processing apparatus (1);

encrypting means (51) for encrypting the biometric information received by said biometric information receiving means (112) and the environment information collected by said environment information collecting means (51), with a secret key issued by said second authentication apparatus (3);

encrypted information transmitting means (51) for transmitting, when communicating with the first authentication apparatus (2), an electronic certificate issued by said second authentication apparatus (3) and the encrypted biometric information and environment information to said first authentication apparatus (2);

sub-electronic certificate authenticating means (51) for decrypting encrypted environment information about the first authentication apparatus (2) with a public key which is acquired from the transmitted electronic certificate by using a public key acquired from said second authentication apparatus (3), and judging whether or not the decrypted environment information is proper, wherein the encrypted environment information about the first authentication apparatus (2) is sent from the first authentication apparatus (2) after the first authentication apparatus (2) judges the information processing apparatus (1) to be safe;

sub-environment information authenticating means (51) for judging whether or not the transmitted environment information about the first authentication apparatus is proper with reference to a sub-environment information database (151), which stores environment conditions classified according to information to be transmitted and received, and the decrypted environment information; and

sub-safety judging means (51) for judging said first authentication apparatus (2) to be safe when all the authentications performed by said sub-biometric information authenticating means (51), said sub-environment information authenticating means (51) and said sub-electronic certificate authenticating means (51) are successful and said safety judging means (51) judges that said information processing apparatus (1) is safe; and

said first authentication apparatus (2) comprises:

electronic certificate authenticating means (21) for decrypting the encrypted biometric information and environment information with a public key, which is acquired from the transmitted electronic certificate by using a public key acquired from said second authentication apparatus (3), and judging whether or not the decrypted biometric information and environment information are proper;

environment information authenticating means (21) for judging whether or not the transmitted environment information is proper with reference to an environment information database (251), which stores environment conditions classified according to information to be transmitted and received, and the decrypted environment information;

biometric information authenticating means (21) for judging whether or not the biometric information is proper by comparing the decrypted biometric information with pre-stored biometric information;

safety judging means (21) for judging said information processing apparatus (1) to be safe when all the authentications performed by said biometric information authenticating means (21), said environment information authenticating means (21) and said electronic certificate authenticating means (21) are successful;

sub-biometric information receiving means (212) for receiving biometric information acquired at the first authentication apparatus after the safety judging means (21) judges the information processing apparatus (1) to be safe;

sub-biometric information authenticating means (21) for judging whether or not the biometric information received by said sub-biometric information receiving means (212) is proper;

sub-environment information collecting means (21) for collecting environment information about the first authentication apparatus including information about name or version of installed software, equipment name or version of connected peripheral equipment, or device name or version of the first authentication apparatus (2) after the safety judging means (21) judges the information processing apparatus (1) to be safe;

sub-encrypting means (21) for encrypting the environment information collected by said sub-environment information collecting means (21), with a secret key issued by said second authentication apparatus (3); and

sub-encrypted information transmitting means (21) for transmitting an electronic certificate issued by said second authentication apparatus (3) and the encrypted environment information to said information processing apparatus (1);

whereby when all of the biometric information authentication, environment information authentication and electronic certificate authentication are judged to be successful in both the information processing apparatus (1) and the first authentication apparatus (2), the information processing apparatus (1) and the first authentication apparatus (2) are judged to be safe, and subsequent transmission and reception of information are permitted."

VI. Claim 1 of the first auxiliary request reads as follows. The differences over claim 1 of the main request have been highlighted by the board.

"A safety judgment system for judging safety of an information processing apparatus, the system comprising the information processing apparatus, a first authentication apparatus and a second authentication apparatus which are connected through a communication network, wherein

said information processing apparatus (1) comprises:

biometric information receiving means (112) for receiving biometric information of a user of the information processing apparatus;

biometric information authenticating means (51) for judging whether the biometric information received by said biometric information receving means (112) is proper or not by comparing the decrypted biometric information with pre-stored biometric information;

environment information collecting means (51) for collecting environment information of the information processing apparatus wherein the environment information includes information about name or version of installed software, equipment name or version of connected peripheral equipment, or device name or version of said information processing apparatus (1);

encrypting means (51) for encrypting the biometric information indicating the biometric information received by said biometric information receiving means (112) is proper or not and the environment information collected by said environment information collecting means (51), with a secret key issued by said second authentication apparatus (3);

encrypted information transmitting means (51) for transmitting, when communicating with the first authentication apparatus (2), an electronic certificate issued by said second authentication apparatus (3) and the encrypted biometric information and environment information to said first authentication apparatus (2);

sub-electronic certificate authenticating means (51) for decrypting encrypted biometric information and encrypted environment information about the first authentication apparatus (2) with a public key which is acquired from the transmitted electronic certificate by using a public key acquired from said second authentication apparatus (3), and judging whether or not the decrypted biometric information and the decrypted environment information are [deleted: is] proper, wherein the encrypted environment information about the first authentication apparatus (2) is sent from the first authentication apparatus (2) after the first authentication apparatus (2) judges the information processing apparatus (1) to be safe;

sub-environment information authenticating means (51) for judging whether or not the transmitted environment information about the first authentication apparatus is proper with reference to a sub-environment information database (151), which stores environment conditions classified according to information to be transmitted and received, and the decrypted environment information;

sub-biometric information authenticating means (51) for judging whether or not the biometric information decrypted by the sub-electronic certificate authenticating means (51) is proper; and

sub-safety judging means (51) for judging said first authentication apparatus (2) to be safe when all the authentications performed by said sub-biometric information authenticating means (51), said sub-environment information authenticating means (51) and said sub-electronic certificate authenticating means (51) are successful and said safety judging means (51) judges that said information processing apparatus (1) is safe; and

said first authentication apparatus (2) comprises:

electronic certificate authenticating means (21) for decrypting the encrypted biometric information [deleted: and] [deleted: the encrypted] environment information with a public key, which is acquired from the transmitted electronic certificate by using a public key acquired from said second authentication apparatus (3), and judging whether or not the decrypted biometric information and the environment information are proper;

environment information authenticating means (21) for judging whether or not the transmitted environment information is proper with reference to an environment information database (251), which stores environment conditions classified according to information to be transmitted and received, and the decrypted environment information;

biometric information authenticating means (21) for judging whether or not the transmitted biometric information is proper [deleted: by comparing the decrypted biometric information with pre-stored biometric information];

safety judging means (21) for judging said information processing apparatus (1) to be safe when all the authentications performed by said biometric information authenticating means (21), said environment information authenticating means (21) and said electronic certificate authenticating means (21) are successful;

sub-biometric information receiving means (212) for receiving biometric information acquired at the first authentication apparatus after the safety judging means (21) judges the information processing apparatus (1) to be safe;

sub-biometric information authenticating means (21) for judging whether or not the biometric information received by said sub-biometric information receiving means (212) is proper;

sub-environment information collecting means (21) for collecting environment information about the first authentication apparatus including information about name or version of installed software, equipment name or version of connected peripheral equipment, or device name or version of the first authentication apparatus (2) after the safety judging means (21) judges the information processing apparatus (1) to be safe;

sub-encrypting means (21) for encrypting the environment information collected by said sub-environment information collecting means (21) and the biometric information indicating the biometric information received by the sub-biometric information receiving means (212) is proper or not, with a secret key issued by said second authentication apparatus (3); and

sub-encrypted information transmitting means (21) for transmitting an electronic certificate issued by said second authentication apparatus (3) and the encrypted environment information and encrypted biometric information to said information processing apparatus (1);

whereby when all of the biometric information authentication, environment information authentication and electronic certificate authentication are judged to be successful in both the information processing apparatus (1) and the first authentication apparatus (2), the information processing apparatus (1) and the first authentication apparatus (2) are judged to be safe, and subsequent transmission and reception of information are permitted."

Claim 1 of the second and third auxiliary requests differs from claim 1 of the main and first auxiliary requests, respectively, in that the various means are renamed. For example, the "sub-safety judging means" is now referred to as "safety judging sub-means", and the other "sub-means" are renamed accordingly. This follows an observation on this matter in the decision under appeal and the board's preliminary opinion (see point 5).

All requests also contain an independent method claim 4 which corresponds to independent system claim 1.

VII. By letter dated 18 January 2018 the appellant indicated its intention not to attend the oral proceedings, and by further letter dated 25 January 2018 it withdrew its request for oral proceedings. The oral proceedings were then cancelled.

Decision in the appellant's absence

1. According to Article 15(3) RPBA, the board is not obliged to delay any step in the proceedings, including its decision, by reason only of the absence at the oral proceedings of any party duly summoned. Therefore, and likewise in accordance with Article 15(3) RPBA, the board here treats the appellant as relying only on its written case. The reasons given below are based on the board's preliminary opinion, while taking account of the appellant's submission dated 29 December 2017.

The invention

2. The application generally concerns the safety of computing transactions, in particular of electronic commerce transactions initiated from a ­­mobile telephone. The claims refer more generally to an "infor­ma­tion pro­cessing apparatus" which, as the description states, could also be any PC, fax machine, refrigerator or micro­­wave oven (see original application, page 1, lines 16-21).

2.1 When the information processing apparatus has initi­a­ted a "transaction" (e.g. after a customer presses a BUY button on the web page of an online shop, see figure 6 and page 45, lines 8-23), a "safety judg­ment subroutine" is entered, which checks a number of "creden­tials" be­fore the transaction is cleared. This safety judgment sub­routine involves three devices: an "informa­tion pro­cessing apparatus for pro­­cessing a trans­action" (e.g. the mobile telephone), a "first authen­tication appa­­ra­tus" (or "safety judgment center", see figure 1) and a "se­­cond authentication server" (or "cer­ti­­ficate autho­ri­ty", see figure 1).

2.2 The safety judgment subroutine validates three different credentials relating to the information processing apparatus or its user: bio­me­tric information of the user, a certificate authenticating the public key of the information processing apparatus, and the "safety posture" of the information processing apparatus. When the bio­metrics and the certificate are validated and the safe­ty posture is verified to be high enough in view of "the degree of security of the transaction informa­tion" (e.g. the higher the value of a transaction, the higher the required security level), the safety test is determined to be successful and the transaction is cleared. "Trans­action informa­tion", typically compri­sing "order information" such as price and product in­for­mation, will then be transmitted to the shop compu­ter (see figure 12, No. 122).

2.3 The biometric measurement of the user is made at the information processing apparatus: typically, a fingerprint is taken, but alternatives are also disclosed (see page 37, lines 6-19). This data is verified (as be­ing "pro­per") by the infor­ma­tion processing apparatus or one of the authenti­ca­tion apparatuses (see page 47, paragraph 2). Then, also at the infor­mation processing appa­ratus, "environment information" is "collected". This in­formation relates to the information processing apparatus itself (device name and version), to peripheral equip­ment connected to it ­and to software installed on it. The environment information is used to assess, at the "first authentication apparatus", the security level of the information processing appara­tus.

2.4 The transaction information (e.g. the order and payment information) is digitally signed (encryp­ted) using the secret key issued to the information processing apparatus. The first authen­tication apparatus validates the trans­action information by decrypting the signature with a public key issued to the information processing appar­atus. This public key is obtained from a certificate signed by the second authentication apparatus, i.e. the cer­tificate authority, which in turn is va­li­dated via the certificate authority's public key.

2.5 The application also discloses that, once the first authentication apparatus has successfully authenticated the information processing apparatus, the information processing apparatus may, in turn, have to authenticate the first authentication apparatus in essentially the same way (see figure 11 and 24 to 27, as well as page 3, lines 14-15, and page 76, especially lines 6-7).

The prior art

3. D1 discloses a network server establishing whether a workstation requesting a network service is a sufficiently "trusted" platform or not. Online shopping is not specifically mentioned, but in its background section D1 discusses "Web sites" which "attempt to verify the security of the client host [...] before allowing trans­actions from that host" and, more specifically, "bank­ing applications" (page 3, lines 7-10). The network ser­ver decides whe­ther to process the re­quest from the workstation "based on the user cre­den­tials and/or the workstation creden­tials" in view of a given "security policy" or which "level of network service" may alternatively "be supplied to the workstation" (see page 4, lines 25-29; page 6, paragraph 1).

3.1 When a workstation requests some service at a server, a "workstation assess­ment service" examines it so as to determine its "actual or potential vulnerabilities" or "security risks" (see page 11, lines 33-35; page 12, lines 33-35; page 15, lines 6-12). D1 does not detail the "workstation credentials" on which this assessment is based, but refers in general to "workstation integrity information" and "workstation security posture" (page 9, line 1; page 20, line 1). Based on the assessment, a "score" is compu­ted. In the system of D1, different "levels of service" are defined, each requiring the workstation to have at least a mini­mal score. That is, in view of the security score, a requested level of service may not be granted. Proposals may be made as to how to repair a detected vulnerability, and sometimes a suitable tool may be able do this automatically (page 15, lines 33-35; page 8, lines 2-3).

3.2 After the workstation credentials, the system assesses user credentials, such as passwords, biometrics and smart cards (page 2, lines 9-11 and last paragraph; page 3, lines 1-2). D1 teaches that checking user credentials only after successfully checking workstation credentials has the benefit of reducing the risk that user credentials are stolen (page 13, lines 27-30).

3.3 This process is referred to as an "extend[ed] log-in process" (abstract and page 7, lines 25-31). On the basis of the security assessment, the network service decides whether to process the service request. Optionally, it may decide to provide a "degraded level of service" which is con­­sistent with the perceived security vul­ne­ra­bility of the workstation (see page 4, first and pen­ultimate paragraphs; page 6, paragraph 1; page 19, line 33, to page 20, line 2).

The decision and the appeal

4. Apart from a few clarity objections made in a section entitled "Further Remarks" regarding the claim language, the decision under appeal turns on inventive step over D1.

5. The examining division summarised the differences between claim 1 of the then requests in the following three groups (reasons 1.2). In the claimed invention, but not in D1,

1. secure transmission was based on asymmetric encryption and a trusted third party,

2. the assessment of whether environment information is "proper" was made with reference to a database, and

3. not only was the information processing apparatus (mobile phone) authenticated by the first authentication apparatus (center server) but also vice versa and both in the equivalent ways.

The use of biometric authentication was not accepted as a further difference (reasons 2), following the decision in appeal case T 1121/10 relating to the earlier application of which this is a divisional application.

5.1 These differences were said to improve security, one way or another, but not to interact synergistically so that their inventive merit could be considered separately (reasons 1.3 and 1.4). It was then argued:

1. that the use of asymmetric encryption and PKI infrastructures according to difference 1 was "notorious" (reasons 1.5, paragraph 1),

2. that the use of a database according to difference 2 was an obvious choice (reasons 1.5, paragraph 2), and

3. that the decision "which entities to trust and which not to trust" and so which "requir[ed] authentica­tion" was a non-technical requirement; that there­fore the objective technical problem solved by this feature could legitimately be formulated as: "also [authenticating] the first authentication appara­tus" (see reasons 1.3, item 3); and that it was "the most straightforward choice" to implement this requirement by re-using the existing authentication mechanism (reasons 1.5, paragraphs 3 and 4).

5.2 The appellant did not challenge this grouping of differences or the assertion that differences 1 and 2 were obvious to the skilled person. Moreover, as regards difference 3, the appellant primarily challenged the assumption that the authentication of the center server was a given requirement but not that, if it was a given, the symmetric implementation itself was obvious (see the grounds of appeal, in particular page 4, last two paragraphs, and page 5, paragraphs 4 to 6). The appellant did, however, explain why two particular features of that implementation solved technical problems in a non-obvious manner (see the grounds of appeal, page 5, paragraph 9 et seq., page 7, penultimate paragraph et seq., and the discussion below).

Article 56 EPC 1973

Main request

6. In view of the above, the central contentious point in this appeal is whether mutual authentication of the two apparatuses would have been obvious to the skilled person in view of D2 and, if so, why.

7. The examining division referred to "the entity responsible for the security policy of the system in general" as the skilled person in question.

7.1 The appellant challenged this notion by saying that there was "no entity responsible for the security policy on the internet" (see grounds of appeal, page 5, paragraph 1).

7.2 However, the above-mentioned "system in general" does not refer to the Internet as a whole. Rather, both D1 and the invention disclose transaction systems which use a network such as the Internet as a platform. Obviously, in the board's view, a person or a team of persons is responsible for setting up such a transaction system, for instance an individual service provider such as a bank, possibly in co-operation with the providers of client software and hardware. The board agrees with the examining division that it is the task of these persons to identify and define security requirements of the system, and to design it so as to satisfy those requirements.

8. The examining division took the view that "stipulating which entities to trust" did "not require any technical knowledge but rather knowledge which is non-technical in nature, such as who has access to the entity resources and how trustworthy these people are, as well as how easy it would be for a malicious entity to gain access to the entity's resources (e.g. how secure is the building in which this entity is located)".

8.1 The board agrees with the appellant that there are reasons to be sceptical about these statements in their generality. While non-technical considerations may play a role - even a major one - in determining which parties to trust, the board is unable to see why an assessment of how well a system's resources are protected against a malicious entity is not a technical issue. The invention proposes that a transaction should be permitted only if, inter alia, "environment information" about the software or hardware constitu­ting the first authentication apparatus is found to be "proper". Again, even acknowledging that the claims do not specify how that decision is made in an individual case, the board is unable to see why the fact that the software and hardware equipment of the center server is security-relevant is not a technical issue.

8.2 The board therefore agrees with the appellant that the claimed mutual authentication is a technical feature rather than a non-technical requirement of the claimed invention, and it accepts that the claimed invention solves the objective technical problem proposed by the appellant (see the decision under appeal, page 12, paragraph 3): how to improve the security of the system of D1.

8.3 The appellant correctly observes that D1 does not disclose or suggest the need to address possible vulnerabilities of the server. It takes this line to argue that D1 too does not motivate the skilled person to consider authenticating the server (see grounds of appeal, page 5, paragraph 6). The board takes this argument to mean that the skilled person, setting out to solve the above-mentioned problem, could, but would not, consider improving security in the claimed manner.

8.4 However, the board considers that security architects do not blindly try to "improve system security", but consider what potential vulnerabilities there are and address those.

8.5 If there were no actual or potential security problem with the servers, mutual authentication would be pointless. In fact, though, such security problems were known before the priority date of the present application. The board considers that this statement needs no documentary proof and made a statement to that effect in its preliminary opinion (see point 9.6), which the appellant did not challenge.

8.6 D1 discloses that sensitive data may be stolen when a workstation (i.e. a client computer) has been compromised (see page 3, paragraph 1). In principle, this risk is symmetric: for instance, malware running on a server might steal a client user's biometric data. While in many cases "servers" might be less prone to attacks than clients, the skilled person would be aware that this is not always the case. More specifically, the skilled person would have known at the priority date that any Internet node could be set up to run a "server program" so that the existence of a "network service" on the Internet did not allow any conclusion about the security of that service.

8.7 In that light the board takes the following view: The skilled person setting out to increase the security of the system of D1 would first assess the risks of that system. He would then realise, without exercising inventive skill, that servers might also be compromised and that therefore their security might have to be assessed, too. The board agrees with the examining division that, with this insight, it would have been obvious for the skilled person to task the "information processing apparatus" with authenticating the server in the same manner as it was known for the latter to authenticate the former.

9. The appellant explained that it was technically advanta­geous - in terms of security and time efficiency - if the "terminal" was authenticated before the "server", because "the terminal tend[ed] to have lower safety than the server" and because it was computationally more demanding to "confirm[] the safety of the ser­ver" (see grounds of appeal, e.g. paragraphs 1 and 11). The appellant also argued (see its letter of 29 December 2017, page 1, last paragraph) that "it would be clear to the skilled person in the art [...] that the first authentication apparatus has a larger hardware and software resources (and provides more functions) than the information processing apparatus", such that there would be "a clear distinction between the 'information processing apparatus' and the 'first authentication apparatus' as regards their relative security or the relative cost of establishing their security".

9.1 The board disagrees.

9.1.1 Firstly, the board doubts that, in general, terminals are less safe than servers and that it is computationally more demanding to confirm server safety. If, for example, the "information processing apparatus" is a preconfigured hardware token and the server runs on a private PC, it may well be argued that the former is less vulnerable than the latter.

9.1.2 And secondly, the board notes that the claims give no hint as to the "hardware and software resources" or the "functions" provided by the two apparatuses. Also, the amendment (to all present requests) whereby the transmission from the "second authentication apparatus [...] to [the] first authenticat[ion] apparatus" took place "when communicating with the first authentication apparatus" (see the appellant's letter of 29 December 2017, page 2, paragraph 2) does not add information in this regard.

9.1.3 The board thus concludes that the claims, even in the light of the description, do not allow any conclusion regarding the relative security, or the relative cost of establishing the security, of the two apparatuses.

9.2 Moreover, the board takes the view that the order of steps cannot be inventive. Firstly, since there are only three possibilities for the order of two authentication steps (A before B, B before A, or both in parallel), the skilled person would, without exercising inventive skill, select any of these alternatives after weighing up their relative advantages and disadvantages. Secondly, none of the advantages of the claimed order are discussed in the application, and, as just explained, no potential advantage of the claimed order can be derived from the relative security of the two apparatuses (see the appellant's letter of 29 December 2017, page 1, paragraph 2). And thirdly, the claimed efficiency advantage is relevant only if authentication fails, and it is thus immaterial for the typical and more frequent case where a transaction is eventually allowed.

9.3 Hence, the board does not accept that the claimed order of the authentication procedures establishes an inventive step over D1.

10. Thus, the appellant's submission of 29 December 2017 has not swayed the board's preliminary opinion that the independent claims of the main request do not comply with Article 56 EPC 1973.

Auxiliary request 1

11. The independent claims of the first auxiliary request specify that the information processing apparatus validates the biometric information and sends only a success flag to the first authentication apparatus (see the grounds of appeal, in particular page 3, paragraph 5, and page 7, penultimate paragraph; description page 46, lines 18-22, and figure 7, S73-S75 and S77).

11.1 Firstly, the board takes the view that sending a "success flag" is essentially redundant in this situation. In an equivalent manner, the information processing apparatus could terminate the entire process if (and only if) the biometric data could not be validated, and could dispense with the success flag altogether.

11.2 Secondly, it is considered obvious to store the biometric information at the device at which the user has provided it, and to validate it locally as well. Inter alia, there are known login procedures which rely on locally obtained biometric information and validate it locally, too (see also D2, page 2, lines 4-7).

11.3 The board thus considers that the features added to claim 1 of the auxiliary request do not change the inventive step assessment of the main request.

Auxiliary requests 2 and 3

12. The small clarifications made in the claims of the second and third auxiliary requests leave the substance of the claims unchanged. The inventive step assessment of the main and first auxiliary requests thus applies to these requests as well.

Order

For these reasons it is decided that:

The appeal is dismissed.

Footer - Service & support
  • Service & support
    • Website updates
    • Availability of online services
    • FAQ
    • Publications
    • Procedural communications
    • Contact us
    • Subscription centre
    • Official holidays
    • Glossary
Footer - More links
  • Jobs & careers
  • Press centre
  • Single Access Portal
  • Procurement
  • Boards of Appeal
Facebook
European Patent Office
EPO Jobs
Instagram
EuropeanPatentOffice
Linkedin
European Patent Office
EPO Jobs
EPO Procurement
X (formerly Twitter)
EPOorg
EPOjobs
Youtube
TheEPO
Footer
  • Legal notice
  • Terms of use
  • Data protection and privacy
  • Accessibility