Skip to main content Skip to footer
HomeHome
 
  • Homepage
  • Searching for patents

    Patent knowledge

    Access our patent databases and search tools.

    Go to overview 

    • Overview
    • Technical information
      • Overview
      • Espacenet - patent search
      • European Publication Server
      • EP full-text search
    • Legal information
      • Overview
      • European Patent Register
      • European Patent Bulletin
      • European Case Law Identifier sitemap
      • Third-party observations
    • Business information
      • Overview
      • PATSTAT
      • IPscore
      • Technology insight reports
    • Data
      • Overview
      • Technology Intelligence Platform
      • Linked open EP data
      • Bulk data sets
      • Web services
      • Coverage, codes and statistics
    • Technology platforms
      • Overview
      • Plastics in transition
      • Water innovation
      • Space innovation
      • Technologies combatting cancer
      • Firefighting technologies
      • Clean energy technologies
      • Fighting coronavirus
    • Helpful resources
      • Overview
      • First time here?
      • Asian patent information
      • Patent information centres
      • Patent Translate
      • Patent Knowledge News
      • Business and statistics
      • Unitary Patent information in patent knowledge
    Image
    Plastics in Transition

    Technology insight report on plastic waste management

  • Applying for a patent

    Applying for a patent

    Practical information on filing and grant procedures.

    Go to overview 

    • Overview
    • European route
      • Overview
      • European Patent Guide
      • Oppositions
      • Oral proceedings
      • Appeals
      • Unitary Patent & Unified Patent Court
      • National validation
      • Request for extension/validation
    • International route (PCT)
      • Overview
      • Euro-PCT Guide – PCT procedure at the EPO
      • EPO decisions and notices
      • PCT provisions and resources
      • Extension/validation request
      • Reinforced partnership programme
      • Accelerating your PCT application
      • Patent Prosecution Highway (PPH)
      • Training and events
    • National route
    • Find a professional representative
    • MyEPO services
      • Overview
      • Understand our services
      • Get access
      • File with us
      • Interact with us on your files
      • Online Filing & fee payment outages
    • Forms
      • Overview
      • Request for examination
    • Fees
      • Overview
      • European fees (EPC)
      • International fees (PCT)
      • Unitary Patent fees (UP)
      • Fee payment and refunds
      • Warning

    UP

    Find out how the Unitary Patent can enhance your IP strategy

  • Law & practice

    Law & practice

    European patent law, the Official Journal and other legal texts.

    Go to overview 

    • Overview
    • Legal texts
      • Overview
      • European Patent Convention
      • Official Journal
      • Guidelines
      • Extension / validation system
      • London Agreement
      • National law relating to the EPC
      • Unitary patent system
      • National measures relating to the Unitary Patent
    • Court practices
      • Overview
      • European Patent Judges' Symposium
    • User consultations
      • Overview
      • Ongoing consultations
      • Completed consultations
    • Substantive patent law harmonisation
      • Overview
      • The Tegernsee process
      • Group B+
    • Convergence of practice
    • Options for professional representatives
    Image
    Law and practice scales 720x237

    Keep up with key aspects of selected BoA decisions with our monthly "Abstracts of decisions”

  • News & events

    News & events

    Our latest news, podcasts and events, including the European Inventor Award.

    Go to overview 

     

    • Overview
    • News
    • Events
    • European Inventor Award
      • Overview
      • The meaning of tomorrow
      • About the award
      • Categories and prizes
      • Meet the finalists
      • Nominations
      • European Inventor Network
      • The 2024 event
    • Young Inventor Prize
      • Overview
      • About the prize
      • Nominations
      • The jury
      • The world, reimagined
    • Press centre
      • Overview
      • Patent Index and statistics
      • Search in press centre
      • Background information
      • Copyright
      • Press contacts
      • Call back form
      • Email alert service
    • Innovation and patenting in focus
      • Overview
      • Water-related technologies
      • CodeFest
      • Green tech in focus
      • Research institutes
      • Women inventors
      • Lifestyle
      • Space and satellites
      • The future of medicine
      • Materials science
      • Mobile communications
      • Biotechnology
      • Patent classification
      • Digital technologies
      • The future of manufacturing
      • Books by EPO experts
    • "Talk innovation" podcast

    Podcast

    From ideas to inventions: tune into our podcast for the latest in tech and IP

  • Learning

    Learning

    The European Patent Academy – the point of access to your learning

    Go to overview 

    • Overview
    • Learning activities and paths
      • Overview
      • Learning activities
      • Learning paths
    • EQE and EPAC
      • Overview
      • EQE - European qualifying examination
      • EPAC - European patent administration certification
      • CSP – Candidate Support Programme
    • Learning resources by area of interest
      • Overview
      • Patent granting
      • Technology transfer and dissemination
      • Patent enforcement and litigation
    • Learning resources by profile
      • Overview
      • Business and IP managers
      • EQE and EPAC Candidates
      • Judges, lawyers and prosecutors
      • National offices and IP authorities
      • Patent attorneys and paralegals
      • Universities, research centres and technology transfer centres (TTOs)
    Image
    Patent Academy catalogue

    Have a look at the extensive range of learning opportunities in the European Patent Academy training catalogue

  • About us

    About us

    Find out more about our work, values, history and vision

    Go to overview 

    • Overview
    • The EPO at a glance
    • 50 years of the EPC
      • Overview
      • Official celebrations
      • Member states’ video statements
      • 50 Leading Tech Voices
      • Athens Marathon
      • Kids’ collaborative art competition
    • Legal foundations and member states
      • Overview
      • Legal foundations
      • Member states of the European Patent Organisation
      • Extension states
      • Validation states
    • Administrative Council and subsidiary bodies
      • Overview
      • Communiqués
      • Calendar
      • Documents and publications
      • Administrative Council
    • Principles & strategy
      • Overview
      • Our mission, vision, values and corporate policy
      • Strategic Plan 2028
      • Towards a New Normal
    • Leadership & management
      • Overview
      • President António Campinos
      • Management Advisory Committee
    • Sustainability at the EPO
      • Overview
      • Environmental
      • Social
      • Governance and Financial sustainability
    • Services & activities
      • Overview
      • Our services & structure
      • Quality
      • Consulting our users
      • European and international co-operation
      • European Patent Academy
      • Chief Economist
      • Ombuds Office
      • Reporting wrongdoing
    • Observatory on Patents and Technology
      • Overview
      • Innovation actors
      • Policy and funding
      • Tools
      • About the Observatory
    • Procurement
      • Overview
      • Procurement forecast
      • Doing business with the EPO
      • Procurement procedures
      • Sustainable Procurement Policy
      • About eTendering and electronic signatures
      • Procurement portal
      • Invoicing
      • General conditions
      • Archived tenders
    • Transparency portal
      • Overview
      • General
      • Human
      • Environmental
      • Organisational
      • Social and relational
      • Economic
      • Governance
    • Statistics and trends
      • Overview
      • Statistics & Trends Centre
      • Patent Index 2024
      • EPO Data Hub
      • Clarification on data sources
    • History
      • Overview
      • 1970s
      • 1980s
      • 1990s
      • 2000s
      • 2010s
      • 2020s
    • Art collection
      • Overview
      • The collection
      • Let's talk about art
      • Artists
      • Media library
      • What's on
      • Publications
      • Contact
      • Culture Space A&T 5-10
      • "Long Night"
    Image
    Patent Index 2024 keyvisual showing brightly lit up data chip, tinted in purple, bright blue

    Track the latest tech trends with our Patent Index

 
Website
cancel
en de fr
  • Language selection
  • English
  • Deutsch
  • Français
Main navigation
  • Homepage
  • New to patents
    • Go back
    • Overview
    • What's your big idea?
    • Are you ready?
    • What to expect
    • How to apply for a patent
    • Your business and patents
    • Is it patentable?
    • Are you first?
    • Why do we have patents?
    • Patent quiz
    • Unitary patent video
  • Searching for patents
    • Go back
    • Overview
    • Technical information
      • Go back
      • Overview
      • Espacenet - patent search
        • Go back
        • Overview
        • National patent office databases
        • Global Patent Index (GPI)
        • Release notes
      • European Publication Server
        • Go back
        • Overview
        • Release notes
        • Cross-reference index for Euro-PCT applications
        • EP authority file
        • Help
      • EP full-text search
    • Legal information
      • Go back
      • Overview
      • European Patent Register
        • Go back
        • Overview
        • Release notes archive
        • Register documentation
          • Go back
          • Overview
          • Deep link data coverage
          • Federated Register
          • Register events
      • European Patent Bulletin
        • Go back
        • Overview
        • Download Bulletin
        • EP Bulletin search
        • Help
      • European Case Law Identifier sitemap
      • Third-party observations
    • Business information
      • Go back
      • Overview
      • PATSTAT
      • IPscore
        • Go back
        • Release notes
      • Technology insight reports
    • Data
      • Go back
      • Overview
      • Technology Intelligence Platform
      • Linked open EP data
      • Bulk data sets
        • Go back
        • Overview
        • Manuals
        • Sequence listings
        • National full-text data
        • European Patent Register data
        • EPO worldwide bibliographic data (DOCDB)
        • EP full-text data
        • EPO worldwide legal event data (INPADOC)
        • EP bibliographic data (EBD)
        • Boards of Appeal decisions
      • Web services
        • Go back
        • Overview
        • Open Patent Services (OPS)
        • European Publication Server web service
      • Coverage, codes and statistics
        • Go back
        • Weekly updates
        • Updated regularly
    • Technology platforms
      • Go back
      • Overview
      • Plastics in transition
        • Go back
        • Overview
        • Plastics waste recovery
        • Plastics waste recycling
        • Alternative plastics
      • Innovation in water technologies
        • Go back
        • Overview
        • Clean water
        • Protection from water
      • Space innovation
        • Go back
        • Overview
        • Cosmonautics
        • Space observation
      • Technologies combatting cancer
        • Go back
        • Overview
        • Prevention and early detection
        • Diagnostics
        • Therapies
        • Wellbeing and aftercare
      • Firefighting technologies
        • Go back
        • Overview
        • Detection and prevention of fires
        • Fire extinguishing
        • Protective equipment
        • Post-fire restoration
      • Clean energy technologies
        • Go back
        • Overview
        • Renewable energy
        • Carbon-intensive industries
        • Energy storage and other enabling technologies
      • Fighting coronavirus
        • Go back
        • Overview
        • Vaccines and therapeutics
          • Go back
          • Overview
          • Vaccines
          • Overview of candidate therapies for COVID-19
          • Candidate antiviral and symptomatic therapeutics
          • Nucleic acids and antibodies to fight coronavirus
        • Diagnostics and analytics
          • Go back
          • Overview
          • Protein and nucleic acid assays
          • Analytical protocols
        • Informatics
          • Go back
          • Overview
          • Bioinformatics
          • Healthcare informatics
        • Technologies for the new normal
          • Go back
          • Overview
          • Devices, materials and equipment
          • Procedures, actions and activities
          • Digital technologies
        • Inventors against coronavirus
    • Helpful resources
      • Go back
      • Overview
      • First time here?
        • Go back
        • Overview
        • Basic definitions
        • Patent classification
          • Go back
          • Overview
          • Cooperative Patent Classification (CPC)
        • Patent families
          • Go back
          • Overview
          • DOCDB simple patent family
          • INPADOC extended patent family
        • Legal event data
          • Go back
          • Overview
          • INPADOC classification scheme
      • Asian patent information
        • Go back
        • Overview
        • China (CN)
          • Go back
          • Overview
          • Facts and figures
          • Grant procedure
          • Numbering system
          • Useful terms
          • Searching in databases
        • Chinese Taipei (TW)
          • Go back
          • Overview
          • Grant procedure
          • Numbering system
          • Useful terms
          • Searching in databases
        • India (IN)
          • Go back
          • Overview
          • Facts and figures
          • Grant procedure
          • Numbering system
        • Japan (JP)
          • Go back
          • Overview
          • Facts and figures
          • Grant procedure
          • Numbering system
          • Useful terms
          • Searching in databases
        • Korea (KR)
          • Go back
          • Overview
          • Facts and figures
          • Grant procedure
          • Numbering system
          • Useful terms
          • Searching in databases
        • Russian Federation (RU)
          • Go back
          • Overview
          • Facts and figures
          • Numbering system
          • Searching in databases
        • Useful links
      • Patent information centres (PATLIB)
      • Patent Translate
      • Patent Knowledge News
      • Business and statistics
      • Unitary Patent information in patent knowledge
  • Applying for a patent
    • Go back
    • Overview
    • European route
      • Go back
      • Overview
      • European Patent Guide
      • Oppositions
      • Oral proceedings
        • Go back
        • Oral proceedings calendar
          • Go back
          • Calendar
          • Public access to appeal proceedings
          • Public access to opposition proceedings
          • Technical guidelines
      • Appeals
      • Unitary Patent & Unified Patent Court
        • Go back
        • Overview
        • Unitary Patent
          • Go back
          • Overview
          • Legal framework
          • Main features
          • Applying for a Unitary Patent
          • Cost of a Unitary Patent
          • Translation and compensation
          • Start date
          • Introductory brochures
        • Unified Patent Court
      • National validation
      • Extension/validation request
    • International route
      • Go back
      • Overview
      • Euro-PCT Guide
      • Entry into the European phase
      • Decisions and notices
      • PCT provisions and resources
      • Extension/validation request
      • Reinforced partnership programme
      • Accelerating your PCT application
      • Patent Prosecution Highway (PPH)
        • Go back
        • Patent Prosecution Highway (PPH) programme outline
      • Training and events
    • National route
    • MyEPO services
      • Go back
      • Overview
      • Understand our services
        • Go back
        • Overview
        • Exchange data with us using an API
          • Go back
          • Release notes
      • Get access
        • Go back
        • Overview
        • Release notes
      • File with us
        • Go back
        • Overview
        • What if our online filing services are down?
        • Release notes
      • Interact with us on your files
        • Go back
        • Release notes
      • Online Filing & fee payment outages
    • Fees
      • Go back
      • Overview
      • European fees (EPC)
        • Go back
        • Overview
        • Decisions and notices
      • International fees (PCT)
        • Go back
        • Reduction in fees
        • Fees for international applications
        • Decisions and notices
        • Overview
      • Unitary Patent fees (UP)
        • Go back
        • Overview
        • Decisions and notices
      • Fee payment and refunds
        • Go back
        • Overview
        • Payment methods
        • Getting started
        • FAQs and other documentation
        • Technical information for batch payments
        • Decisions and notices
        • Release notes
      • Warning
    • Forms
      • Go back
      • Overview
      • Request for examination
    • Find a professional representative
  • Law & practice
    • Go back
    • Overview
    • Legal texts
      • Go back
      • Overview
      • European Patent Convention
        • Go back
        • Overview
        • Archive
          • Go back
          • Overview
          • Documentation on the EPC revision 2000
            • Go back
            • Overview
            • Diplomatic Conference for the revision of the EPC
            • Travaux préparatoires
            • New text
            • Transitional provisions
            • Implementing regulations to the EPC 2000
            • Rules relating to Fees
            • Ratifications and accessions
          • Travaux Préparatoires EPC 1973
      • Official Journal
      • Guidelines
        • Go back
        • Overview
        • EPC Guidelines
        • PCT-EPO Guidelines
        • Unitary Patent Guidelines
        • Guidelines revision cycle
        • Consultation results
        • Summary of user responses
        • Archive
      • Extension / validation system
      • London Agreement
      • National law relating to the EPC
        • Go back
        • Overview
        • Archive
      • Unitary Patent system
        • Go back
        • Travaux préparatoires to UP and UPC
      • National measures relating to the Unitary Patent 
    • Court practices
      • Go back
      • Overview
      • European Patent Judges' Symposium
    • User consultations
      • Go back
      • Overview
      • Ongoing consultations
      • Completed consultations
    • Substantive patent law harmonisation
      • Go back
      • Overview
      • The Tegernsee process
      • Group B+
    • Convergence of practice
    • Options for professional representatives
  • News & events
    • Go back
    • Overview
    • News
    • Events
    • European Inventor Award
      • Go back
      • Overview
      • The meaning of tomorrow
      • About the award
      • Categories and prizes
      • Meet the inventors
      • Nominations
      • European Inventor Network
        • Go back
        • 2024 activities
        • 2025 activities
        • Rules and criteria
        • FAQ
      • The 2024 event
    • Young Inventors Prize
      • Go back
      • Overview
      • About the prize
      • Nominations
      • The jury
      • The world, reimagined
      • The 2025 event
    • Press centre
      • Go back
      • Overview
      • Patent Index and statistics
      • Search in press centre
      • Background information
        • Go back
        • Overview
        • European Patent Office
        • Q&A on patents related to coronavirus
        • Q&A on plant patents
      • Copyright
      • Press contacts
      • Call back form
      • Email alert service
    • In focus
      • Go back
      • Overview
      • Water-related technologies
      • CodeFest
        • Go back
        • CodeFest Spring 2025 on classifying patent data for sustainable development
        • Overview
        • CodeFest 2024 on generative AI
        • CodeFest 2023 on Green Plastics
      • Green tech in focus
        • Go back
        • Overview
        • About green tech
        • Renewable energies
        • Energy transition technologies
        • Building a greener future
      • Research institutes
      • Women inventors
      • Lifestyle
      • Space and satellites
        • Go back
        • Overview
        • Patents and space technologies
      • Healthcare
        • Go back
        • Overview
        • Medical technologies and cancer
        • Personalised medicine
      • Materials science
        • Go back
        • Overview
        • Nanotechnology
      • Mobile communications
      • Biotechnology
        • Go back
        • Overview
        • Red, white or green
        • The role of the EPO
        • What is patentable?
        • Biotech inventors
      • Classification
        • Go back
        • Overview
        • Nanotechnology
        • Climate change mitigation technologies
          • Go back
          • Overview
          • External partners
          • Updates on Y02 and Y04S
      • Digital technologies
        • Go back
        • Overview
        • About ICT
        • Hardware and software
        • Artificial intelligence
        • Fourth Industrial Revolution
      • Additive manufacturing
        • Go back
        • Overview
        • About AM
        • AM innovation
      • Books by EPO experts
    • Podcast
  • Learning
    • Go back
    • Overview
    • Learning activities and paths
      • Go back
      • Overview
      • Learning activities: types and formats
      • Learning paths
    • EQE and EPAC
      • Go back
      • Overview
      • EQE - European Qualifying Examination
        • Go back
        • Overview
        • Compendium
          • Go back
          • Overview
          • Paper F
          • Paper A
          • Paper B
          • Paper C
          • Paper D
          • Pre-examination
        • Candidates successful in the European qualifying examination
        • Archive
      • EPAC - European patent administration certification
      • CSP – Candidate Support Programme
    • Learning resources by area of interest
      • Go back
      • Overview
      • Patent granting
      • Technology transfer and dissemination
      • Patent enforcement and litigation
    • Learning resources by profile
      • Go back
      • Overview
      • Business and IP managers
        • Go back
        • Overview
        • Innovation case studies
          • Go back
          • Overview
          • SME case studies
          • Technology transfer case studies
          • High-growth technology case studies
        • Inventor's handbook
          • Go back
          • Overview
          • Introduction
          • Disclosure and confidentiality
          • Novelty and prior art
          • Competition and market potential
          • Assessing the risk ahead
          • Proving the invention
          • Protecting your idea
          • Building a team and seeking funding
          • Business planning
          • Finding and approaching companies
          • Dealing with companies
        • Best of search matters
          • Go back
          • Overview
          • Tools and databases
          • EPO procedures and initiatives
          • Search strategies
          • Challenges and specific topics
        • Support for high-growth technology businesses
          • Go back
          • Overview
          • Business decision-makers
          • IP professionals
          • Stakeholders of the Innovation Ecosystem
      • EQE and EPAC Candidates
        • Go back
        • Overview
        • Paper F brain-teasers
        • Daily D questions
        • European qualifying examination - Guide for preparation
        • EPAC
      • Judges, lawyers and prosecutors
        • Go back
        • Overview
        • Compulsory licensing in Europe
        • The jurisdiction of European courts in patent disputes
      • National offices and IP authorities
        • Go back
        • Overview
        • Learning material for examiners of national officers
        • Learning material for formalities officers and paralegals
      • Patent attorneys and paralegals
      • Universities, research centres and TTOs
        • Go back
        • Overview
        • Modular IP Education Framework (MIPEF)
        • Pan-European Seal Young Professionals Programme
          • Go back
          • Overview
          • For students
          • For universities
            • Go back
            • Overview
            • IP education resources
            • University memberships
          • Our young professionals
          • Professional development plan
        • Academic Research Programme
          • Go back
          • Overview
          • Completed research projects
          • Current research projects
        • IP Teaching Kit
          • Go back
          • Overview
          • Download modules
        • Intellectual property course design manual
        • PATLIB Knowledge Transfer to Africa
          • Go back
          • The PATLIB Knowledge Transfer to Africa initiative (KT2A)
          • KT2A core activities
          • Success story: Malawi University of Science and Technology and PATLIB Birmingham
  • About us
    • Go back
    • Overview
    • The EPO at a glance
    • 50 years of the EPC
      • Go back
      • Official celebrations
      • Overview
      • Member states’ video statements
        • Go back
        • Albania
        • Austria
        • Belgium
        • Bulgaria
        • Croatia
        • Cyprus
        • Czech Republic
        • Denmark
        • Estonia
        • Finland
        • France
        • Germany
        • Greece
        • Hungary
        • Iceland
        • Ireland
        • Italy
        • Latvia
        • Liechtenstein
        • Lithuania
        • Luxembourg
        • Malta
        • Monaco
        • Montenegro
        • Netherlands
        • North Macedonia
        • Norway
        • Poland
        • Portugal
        • Romania
        • San Marino
        • Serbia
        • Slovakia
        • Slovenia
        • Spain
        • Sweden
        • Switzerland
        • Türkiye
        • United Kingdom
      • 50 Leading Tech Voices
      • Athens Marathon
      • Kids’ collaborative art competition
    • Legal foundations and member states
      • Go back
      • Overview
      • Legal foundations
      • Member states
        • Go back
        • Overview
        • Member states by date of accession
      • Extension states
      • Validation states
    • Administrative Council and subsidiary bodies
      • Go back
      • Overview
      • Communiqués
        • Go back
        • 2024
        • Overview
        • 2023
        • 2022
        • 2021
        • 2020
        • 2019
        • 2018
        • 2017
        • 2016
        • 2015
        • 2014
        • 2013
      • Calendar
      • Documents and publications
        • Go back
        • Overview
        • Select Committee documents
      • Administrative Council
        • Go back
        • Overview
        • Composition
        • Representatives
        • Rules of Procedure
        • Board of Auditors
        • Secretariat
        • Council bodies
    • Principles & strategy
      • Go back
      • Overview
      • Mission, vision, values & corporate policy
      • Strategic Plan 2028
        • Go back
        • Driver 1: People
        • Driver 2: Technologies
        • Driver 3: High-quality, timely products and services
        • Driver 4: Partnerships
        • Driver 5: Financial sustainability
      • Towards a New Normal
      • Data protection & privacy notice
    • Leadership & management
      • Go back
      • Overview
      • About the President
      • Management Advisory Committee
    • Sustainability at the EPO
      • Go back
      • Overview
      • Environmental
        • Go back
        • Overview
        • Inspiring environmental inventions
      • Social
        • Go back
        • Overview
        • Inspiring social inventions
      • Governance and Financial sustainability
    • Procurement
      • Go back
      • Overview
      • Procurement forecast
      • Doing business with the EPO
      • Procurement procedures
      • Dynamic Purchasing System (DPS) publications
      • Sustainable Procurement Policy
      • About eTendering
      • Invoicing
      • Procurement portal
        • Go back
        • Overview
        • e-Signing contracts
      • General conditions
      • Archived tenders
    • Services & activities
      • Go back
      • Overview
      • Our services & structure
      • Quality
        • Go back
        • Overview
        • Foundations
          • Go back
          • Overview
          • European Patent Convention
          • Guidelines for examination
          • Our staff
        • Enabling quality
          • Go back
          • Overview
          • Prior art
          • Classification
          • Tools
          • Processes
        • Products & services
          • Go back
          • Overview
          • Search
          • Examination
          • Opposition
          • Continuous improvement
        • Quality through networking
          • Go back
          • Overview
          • User engagement
          • Co-operation
          • User satisfaction survey
          • Stakeholder Quality Assurance Panels
        • Patent Quality Charter
        • Quality Action Plan
        • Quality dashboard
        • Statistics
          • Go back
          • Overview
          • Search
          • Examination
          • Opposition
        • Integrated management at the EPO
      • Consulting our users
        • Go back
        • Overview
        • Standing Advisory Committee before the EPO (SACEPO)
          • Go back
          • Overview
          • Objectives
          • SACEPO and its working parties
          • Meetings
          • Single Access Portal – SACEPO Area
        • Surveys
          • Go back
          • Overview
          • Detailed methodology
          • Search services
          • Examination services, final actions and publication
          • Opposition services
          • Formalities services
          • Customer services
          • Filing services
          • Key Account Management (KAM)
          • Website
          • Archive
      • Our user service charter
      • European and international co-operation
        • Go back
        • Overview
        • Co-operation with member states
          • Go back
          • Overview
        • Bilateral co-operation with non-member states
          • Go back
          • Overview
          • Validation system
          • Reinforced Partnership programme
        • Multilateral international co-operation with IP offices and organisations
        • Co-operation with international organisations outside the IP system
      • European Patent Academy
        • Go back
        • Overview
        • Partners
      • Chief Economist
        • Go back
        • Overview
        • Economic studies
      • Ombuds Office
      • Reporting wrongdoing
    • Observatory on Patents and Technology
      • Go back
      • Overview
      • Innovation against cancer
      • Innovation actors
        • Go back
        • Overview
        • Startups and SMEs
      • Policy and funding
        • Go back
        • Overview
        • Financing innovation programme
          • Go back
          • Overview
          • Our studies on the financing of innovation
          • EPO initiatives for patent applicants
          • Financial support for innovators in Europe
        • Patents and standards
          • Go back
          • Overview
          • Publications
          • Patent standards explorer
      • Tools
        • Go back
        • Overview
        • Deep Tech Finder
      • About the Observatory
        • Go back
        • Overview
        • Work plan
    • Transparency portal
      • Go back
      • Overview
      • General
        • Go back
        • Overview
        • Annual Review 2023
          • Go back
          • Overview
          • Foreword
          • Executive summary
          • 50 years of the EPC
          • Strategic key performance indicators
          • Goal 1: Engaged and empowered
          • Goal 2: Digital transformation
          • Goal 3: Master quality
          • Goal 4: Partner for positive impact
          • Goal 5: Secure sustainability
        • Annual Review 2022
          • Go back
          • Overview
          • Foreword
          • Executive summary
          • Goal 1: Engaged and empowered
          • Goal 2: Digital transformation
          • Goal 3: Master quality
          • Goal 4: Partner for positive impact
          • Goal 5: Secure sustainability
      • Human
      • Environmental
      • Organisational
      • Social and relational
      • Economic
      • Governance
    • Statistics and trends
      • Go back
      • Overview
      • Statistics & Trends Centre
      • Patent Index 2024
        • Go back
        • Insight into computer technology and AI
        • Insight into clean energy technologies
        • Statistics and indicators
          • Go back
          • European patent applications
            • Go back
            • Key trend
            • Origin
            • Top 10 technical fields
              • Go back
              • Computer technology
              • Electrical machinery, apparatus, energy
              • Digital communication
              • Medical technology
              • Transport
              • Measurement
              • Biotechnology
              • Pharmaceuticals
              • Other special machines
              • Organic fine chemistry
            • All technical fields
          • Applicants
            • Go back
            • Top 50
            • Categories
            • Women inventors
          • Granted patents
            • Go back
            • Key trend
            • Origin
            • Designations
      • Data to download
      • EPO Data Hub
      • Clarification on data sources
    • History
      • Go back
      • Overview
      • 1970s
      • 1980s
      • 1990s
      • 2000s
      • 2010s
      • 2020s
    • Art collection
      • Go back
      • Overview
      • The collection
      • Let's talk about art
      • Artists
      • Media library
      • What's on
      • Publications
      • Contact
      • Culture Space A&T 5-10
        • Go back
        • Catalyst lab & Deep vision
          • Go back
          • Irene Sauter (DE)
          • AVPD (DK)
          • Jan Robert Leegte (NL)
          • Jānis Dzirnieks (LV) #1
          • Jānis Dzirnieks (LV) #2
          • Péter Szalay (HU)
          • Thomas Feuerstein (AT)
          • Tom Burr (US)
          • Wolfgang Tillmans (DE)
          • TerraPort
          • Unfinished Sculpture - Captives #1
          • Deep vision – immersive exhibition
          • Previous exhibitions
        • The European Patent Journey
        • Sustaining life. Art in the climate emergency
        • Next generation statements
        • Open storage
        • Cosmic bar
      • "Long Night"
  • Boards of Appeal
    • Go back
    • Overview
    • Decisions of the Boards of Appeal
      • Go back
      • Overview
      • Recent decisions
      • Selected decisions
    • Information from the Boards of Appeal
    • Procedure
    • Oral proceedings
    • About the Boards of Appeal
      • Go back
      • Overview
      • President of the Boards of Appeal
      • Enlarged Board of Appeal
        • Go back
        • Overview
        • Pending referrals (Art. 112 EPC)
        • Decisions sorted by number (Art. 112 EPC)
        • Pending petitions for review (Art. 112a EPC)
        • Decisions on petitions for review (Art. 112a EPC)
      • Technical Boards of Appeal
      • Legal Board of Appeal
      • Disciplinary Board of Appeal
      • Presidium
        • Go back
        • Overview
    • Code of Conduct
    • Business distribution scheme
      • Go back
      • Overview
      • Technical boards of appeal by IPC in 2025
      • Archive
    • Annual list of cases
    • Communications
    • Annual reports
      • Go back
      • Overview
    • Publications
      • Go back
      • Abstracts of decisions
    • Case Law of the Boards of Appeal
      • Go back
      • Overview
      • Archive
  • Service & support
    • Go back
    • Overview
    • Website updates
    • Availability of online services
      • Go back
      • Overview
    • FAQ
      • Go back
      • Overview
    • Publications
    • Ordering
      • Go back
      • Overview
      • Patent Knowledge Products and Services
      • Terms and conditions
        • Go back
        • Overview
        • Patent information products
        • Bulk data sets
        • Open Patent Services (OPS)
        • Fair use charter
    • Procedural communications
    • Useful links
      • Go back
      • Overview
      • Patent offices of member states
      • Other patent offices
      • Directories of patent attorneys
      • Patent databases, registers and gazettes
      • Disclaimer
    • Contact us
      • Go back
      • Overview
      • Filing options
      • Locations
    • Subscription centre
      • Go back
      • Overview
      • Subscribe
      • Change preferences
      • Unsubscribe
    • Official holidays
    • Glossary
    • RSS feeds
Board of Appeals
Decisions

Recent decisions

Overview
  • 2025 decisions
  • 2024 decisions
  • 2023 decisions
  1. Home
  2. T 1813/19 (Malware detection/WITHSECURE) 26-04-2023
Facebook X Linkedin Email

T 1813/19 (Malware detection/WITHSECURE) 26-04-2023

European Case Law Identifier
ECLI:EP:BA:2023:T181319.20230426
Date of decision
26 April 2023
Case number
T 1813/19
Petition for review of
-
Application number
09782681.2
IPC class
G06F 21/00
Language of proceedings
EN
Distribution
NO DISTRIBUTION (D)

Download and more information:

Decision in EN 403.15 KB
Documentation of the appeal procedure can be found in the European Patent Register
Bibliographic information is available in:
EN
Versions
Unpublished
Application title

MALWARE DETECTION METHOD AND APPARATUS

Applicant name
WithSecure Corporation
Opponent name
-
Board
3.5.06
Headnote
-
Relevant legal provisions
European Patent Convention Art 56
European Patent Convention Art 84
Rules of procedure of the Boards of Appeal Art 12(4)
Keywords

Claims - clarity (no)

Inventive step - (no)

Catchword
-
Cited decisions
-
Citing decisions
-

I. The appeal is against the decision of the examining division, dated 8 February 2019, to refuse European patent application No. 09782681.

II. The examining division refused the application on the basis that the claims according to a main request and first and second auxiliary requests did not fulfill the requirement of inventive step, Article 56 EPC, starting from the following document:

D6:|US 6,928,550 B1 (J.-F. Le Pennec et al.) 9 August 2005|

Claim 1 according to the first auxiliary request was also found to infringe the requirements of Article 123(2) EPC.

III. Notice of appeal was filed on 11 April 2019, the appeal fee being paid on the same day. With the grounds of appeal, filed on 7 June 2019, the appellant requested that the decision of the examining division be set aside and that a patent be granted on the basis of a main request or one of two auxiliary requests, all filed with the statement of grounds of appeal. Oral proceedings were conditionally requested.

The main request and the second auxiliary request are the same as those underlying the decision under appeal.

IV. In a communication pursuant to Article 15(1) RPBA sent on 9 February 2023 together with a summons to oral pro­ceedings, the board provided its preliminary opinion on the appeal. The claims according to all requests appeared not to meet the requirements of Articles 84 and 56 EPC.

V. With a reply received on 31 March 2023, the appellant indicated that it would not attend the oral proceedings and requested a decision according to the state of the file, without commenting in substance on the board's preliminary opinion.

VI. The oral proceedings were thereupon cancelled.

VII. Independent claim 1 according to the main request reads as follows:

"A malware detection method implemented within a computer and comprising:

for a given electronic file, determining if the file is associated with a valid digital signature using a trust verification system of an operating system of the computer (S4); and

if it is, then verifying that the signature belongs to a trusted source (S8), wherein the trusted source authored or published the file and created the signature, and if so then excluding said file from a malware scan (S10), and if the signature cannot be verified as belonging to a trusted source then including said file in the malware scan (Sll);

wherein said digital signature relies upon a public key infrastructure and the step of verifying that the signature belongs to a trusted source comprises maintaining a database of trusted public keys, identifying a public key used to verify the digital signature, and determining if the public key is contained in the database of trusted public keys."

VIII. Independent claim 1 according to auxiliary request 1 reads as follows:

"A malware detection method implemented within a computer by means of an anti-virus application and comprising:

for a given electronic file, determining if the file is associated with a valid digital signature using a trust verification system of an operating system of the computer (S4), by making a call to an embedded Trust Verification Application Programming Interface, API, of the operating system; and

if it is, then verifying that the signature belongs to a trusted source (S8), wherein the trusted source authored or published the file and created the signature, and if so then excluding said file from a malware scan (S10), and if the signature cannot be verified as belonging to a trusted source then including said file in the malware scan (Sll);

wherein said digital signature relies upon a public key infrastructure and the step of verifying that the signature belongs to a trusted source comprises maintaining a database of trusted public keys within the computer including receiving public keys from a service provider, identifying a public key used to verify the digital signature, and determining if the public key is contained in the database of trusted public keys."

IX. Independent claim 1 according to auxiliary request 2 reads as follows:

"A malware detection method for detecting malware on a computer and comprising:

maintaining a database of trusted public keys in the computer, said step of maintaining comprising,

identifying at a network based service, public keys belonging to a public key infrastructure architecture and which are used to digitally sign electronic files,

verifying that these public keys belong to a trusted source, and

securely sending the trusted public keys to the computer;

for a given electronic file, determining if the file is associated with a valid digital signature using a trust verification system of an operating system of the computer (S4); and

if it is, then verifying that the signature belongs to a trusted source (S8), wherein the trusted source authored or published the file and created the signature, and if so then excluding said file from a malware scan (S10), and if the signature cannot be verified as belonging to a trusted source then including said file in the malware scan (Sll);

wherein the step of verifying that the signature belongs to a trusted source comprises identifying a public key used to verify the digital signature, and determining if the public key is contained in the database of trusted public keys."

The application

1. The application relates to the detection of malware, e.g. a virus, in a computer.

2. A conventional approach involves an anti-virus software on the computer scanning files on the basis of a database of known virus signatures. In another approach, a hash of the file is computed and compared with a list of hash values of trusted files provided by the anti-virus provider. In both approaches, the data­base of virus signatures or the list of trusted files are large, they consume a significant amount of memory and must be maintained (page 1, line 5 to page 3, line 17, of the description).

3. The application proposes that files be trusted - and thus excluded from a malware scan - if they have been "supplied, published or authored" by a "trusted source", i.e. a source considered trustworthy by the anti-virus provider. This is realised as follows.

For a given electronic file, a first check is performed, involving determining whether the file is "associated" with a "valid digital signature". The signature may be embedded in the file or the file may be listed in a catalog file that has itself been signed (page 6, lines 18-20).

If the outcome of the first check is positive, it is determined, in a second check, whether the signature belongs to a trusted source. If the outcome is again positive, the file is excluded from the malware scan.

If either the first or the second check fails, the file is included in the malware scan (which may be performed using conventional approaches).

4. The digital signature is generated using public key cryptography.

The application explains that in a con­ventional approach to generate and verify digital sig­natures, a hash value of the file is signed (en­crypted) using the signer's private key. The signature may then be veri­fied using the signer's public key. The signer's public key, together with the identity of the signer, are in­cluded in a "digital certificate", which is itself signed by a certification authority. The digital certi­ficate may be embedded in the signed document. This enables one to retrieve the public key of the signer, to verify the signature of the file (and there­by also the file integrity) using that public key and to verify the identity of the signer (the certification authority being trustworthy; cf. page 6, line 25 to page 7, line 14).

5. In a preferred embodiment of the proposed malware detection method, the anti-virus software performs the first check, i.e. the determination of whether the file is associated with a valid digital signature, by using the "WinVerifyTrustEx" API included in the Windows operating system. The second check is performed by using a database of trusted public keys, said database being supplied and maintained by the anti-virus provi­der (page 6, lines 14-23; page 7, line 16 to page 8, line 8; page 8, line 19 to page 11, line 5).

6. According to the application, the proposed approach "remov[es] the burden placed on the anti-virus provider to maintain and update a trusted file list" as it will "only be required to supply and maintain a database of public keys belonging to trusted sources". The computer system does also "not need to store a list containing a large number of hash values for trusted files that are not actually on the [computer system], reducing the memory consumed by such a list and reducing the data traffic that would otherwise be required" for regularly updating the list. It further "reduces the processing burden by minimising the number of files that require a full malware scan" (page 11, lines 7-20).

Main request - Claim construction and Article 84 EPC

7. The method of claim 1 involves a first step of "determining if the file is associated with a valid digital signature using a trust verification system of an operating system of the computer". Claim 1 specifies also that the digital signature relies upon a public key infrastructure.

7.1 The determination of whether a digital signature is "valid" is understood by the board as a verification that the signature, after decryption, matches a hash of the file, as in the conventional approach to digital signature verification described on page 6, lines 28-31. This verification would confirm the integrity of the file (that it has not been altered since it was signed) and that the public key provided for the decryption of the signature corresponds to the private key that was used to sign the file. It would however not involve any determination of whether the source associated to these keys is a "trusted source" in the sense that files signed by this source may be assumed to be malware-free.

7.2 The board considers the term "trust verification system of an operating system" as used in claim 1 to be unclear, Article 84 EPC.

It is understood that this expression is meant to generalise the "WinVerifyTrustEx" function of the Windows operating system that is used in the preferred embodiment, so as not to be limited to that particular function and/or operating system (page 6, lines 16-18; page 10, lines 13-18).

While it is clear that the "WinVerifyTrustEx" function falls within the scope of the term "trust verification system", the boundary of that scope does not appear to be sufficiently clear.

It is in particular unclear what kind of "trust" is being referred to. A first possibility would be that a "trust verification system" within the meaning of claim 1 is a system that merely provides for the verification that a digital signature is valid and that it may, for that very reason, be "trusted". Another possibility would be that the system provides a complete determina­tion of whether a file is from a "trusted source" - in the same sense as this term is used in the application, i.e. the file may be assumed to be malware-free - and that this determination involves - but might go well beyond - performing a verification of the validity of the digital signature associated to the file.

In the following, and notwithstanding its clarity ob­jec­tion, the board adopts the first, broader interpre­tation, as the only functionality of the "trust verifi­cation system" being used in the claimed method is that of verifying the validity of a digital signature. This appears to be coherent with the functionality of the Trust Verification API of Windows that is emphasised in the description (page 6, lines 14-23). The appellant did not object to that interpretation.

8. The method of claim 1 involves a second step of "verifying that the signature belongs to a trusted source (S8), wherein the trusted source authored or published the file and created the signature".

8.1 From the claim wording, it is unclear, Article 84 EPC, whether the claimed verification involves not only verifying (1) that the source to which the signature belongs is a "trusted source" but also (2) whether that source actually "authored or published the file and created the signature".

8.2 The description only discloses a computer-implemented verification of (1) (see e.g. page 8, lines 3-8). There is in particular no disclosure of a computer-implemen­ted verification that the source actually "authored or published the file". The feature "wherein the trusted source authored or published the file" does thus not appear to imply any technical feature of the computer-implemented method. It may at best be considered to merely limit the claim to a particular circumstance of use, namely one in which the source having signed the file was actually its author or publisher. This is taken into account in the assessment of inventive step.

8.3 The board notes further that claim 1 does not specify which entity carries out the second step. Claim 1 does in particular not exclude that this step is also carried out by a computer program that is part of the operating system.

Main request - Article 56 EPC

9. It is common ground that document D6 is a suitable starting point for assessing inventive step of claim 1.

9.1 D6 discloses a method in which a "web/file server (101)" storing a file may request a "virus-free cer­ti­ficate authority server (102)" to perform a "full anti-virus checking" of the file and, if the file is found to be virus-free, to issue a "virus-free certificate" for the file (see D6, col. 6, line 60 to col. 7, line 12; figure 1; col. 8, line 30 to col. 9, line 10).

9.2 A "client workstation (100)" downloading the file from the web/file server is then provided with the asso­cia­ted virus-free certificate. The anti-virus software running on the client workstation verifies the validity of the virus-free certificate. If the certificate is found to be valid, on the basis of the public key of the virus-free certification authority (VCA), the file needs no further check by the anti-virus software. Otherwise, if the file has no valid virus-free certi­ficate, it is subjected to a conventional anti-virus check (D6, col. 9, line 17 to col. 10, line 31).

9.3 D6 explains that the aim of the method is to "speed up and improve the anti-virus processing" (D6, col. 5, lines 45-49).

9.4 D6 mentions that, preferably, the VCA generates the virus-free certificate using two different pairs of public/private keys. A first private key is used to sign a hash of the file. The signature together with a first public key, corresponding to the first private key, are included in a digital certificate which the VCA generates using a second private key corresponding to the VCA's (general) public key. The rationale for the use of two different pairs of keys is that the first pair may be given a validity period differing from that of the VCA's general pair of keys and does also not need to be as complex (D6, col. 7, lines 30-51).

D6 mentions that "[t]he VCA public key is in the workstation or if not must be retrieved through a secure channel" and that "[t]he VCA server may be authenticated by another CA having the required public key" (D6, col. 9, lines 42-48).

9.5 The anti-virus software on the workstation authenti­cates first the virus-free certificate using the VCA public key, then verifies the validity of the file sig­nature contained in the virus-free certificate using the public key that is also contained in it (D6, col. 9, lines 41-48 and 63-67).

10. D6 discloses thereby, using the wording of claim 1, "a malware detection method implemented within a computer by means of an anti-virus application", the latter one being the anti-virus software running on the worksta­tion.

The method of D6 involves with the step of checking, by the anti-virus software, whether the signature included in the certificate is valid a step of "determining", for a given electronic file, "if the file is associated with a valid digital signature".

It involves also with the step of authenticating the virus-free certificate using the VCA public key a step of "verifying that the signature belongs to a trusted source", as it is implicit in D6 that the anti-virus software trusts the VCA. The VCA has also "created the signature".

If the file passes both verification steps, the method of D6 involves "excluding [the] file from a malware scan" and, otherwise, "including [the] file in the malware scan", as in the method of claim 1.

Finally, the digital signature in D6 "relies upon a public-key infrastructure".

11. The method of claim 1 thus differs from the method disclosed in D6 in the following:

(i) the determination that the digital signature is valid is performed "using a trust verification system of an operating system of the computer";

(ii) the verification that the signature belongs to a trusted source is carried out after the determination of the validity of the digital signature;

(iii) the verification that the signature belongs to a trusted source is carried out by "identifying a public key used to verify the digital signature" and by determining whether it is contained in a database of trusted public keys that is being "maintained";

(iv) the fact that trusted source has "authored or published the file".

12. Differentiating features (i) and (iii) correspond to differentiating features A and B identified by the examining division (decision under appeal, point 12) and the appellant (statement of grounds of appeal,

page 2).

The examining division argued that these were juxtaposed features not producing a synergetic effect, which could thus be separately examined (decision under appeal, point 12).

The appellant contested this finding, arguing that "feature A [feature (i)] when implemented alone will both verify a signature and generate an indication of trust, but that indication of trust is limited and under the control of the OS provider and the CAs" and that "[b]y introducing feature B [feature (iii)], the claimed invention allows a third party to be respon­sible for public key verification, solving the problem identified with feature A [feature (i)]" (statement of grounds of appeal, page 3).

13. The board agrees with the examining division and con­siders that distinguishing features (i)-(iv) are not functionally interrelated so as to achieve any syner­gistic technical effect and that they may therefore be separately examined for inventive step. It is in parti­cular noted that any of the measures specified by these features could be implemented independently of the others.

14. The board is not convinced by the appellant's argumen­tation for the following reasons.

Feature (i), interpreted as explained at point 7.2 above, does not go beyond specifying that the verifi­ca­tion of the digital signature is carried out by a com­ponent of the operating system. It does not imply the provision of any "indication of trust" by the operating system, where "trustworthy" would refer to being malware-free, as apparently argued by the appellant.

Furthermore, as noted at point 8.3 above, claim 1 does not exclude that the two verification steps are imple­mented completely as part of the operating system. The claim does not specify or imply the involvement of any "third party" that would be distinct from the operating system (OS) supplier of a certification authority (CA), as argued by the appellant.

15. Re feature (iii)

Starting from D6, it would be obvious to a skilled person that the virus-free certification service offered by the VCA could as well be offered by various VCAs. This would require the anti-virus software to have access to the public keys of VCAs that are to be trusted, e.g. in the form of a database of trusted VCAs with their public keys, maintained and made accessible or supplied to the workstation by the provider of the anti-virus software. This would lead to feature (iii).

The board is therefore not convinced by the appellant's argument that the skilled person would not have been motivated to modify the teaching of D6 to include a step of checking if the VCA's public key is in a data­base of trusted public keys (statement of grounds of appeal, page 4).

16. Re feature (iv)

This feature limits the claimed method to a special circumstance of use without any associated technical effect and cannot therefore support an inventive step.

In any case, it is obvious in the context of the method of D6 in view of the following considerations. A VCA may itself make electronic files available for download. It would be obvious to provide also for such files a virus-free certificate. When a workstation would verify the virus-free certificate, the identified source would be a trusted source that, incidentally, has authored or published the file, hence feature (iv).

17. Re feature (ii)

No technical effect appears to be achieved by the par­ti­cular order in which the two verification steps are carried out as the decision to exclude the file from malware detection requires in any case, in D6 as well as in claim 1, that the file passes both veri­fi­cation steps. Hence, no inventive step can be acknow­ledged on the basis of feature (ii).

18. Re feature (i)

18.1 As acknowledged in the present application (page 6, lines 14-23, page 8, line 31 to page 9, line 2, page 10, lines 13-15), at the relevant date, the Windows operating system provided functionality for assessing the trustworthiness of electronic files based on asso­ciated digital signatures, such as via the "Trust Veri­fication API" and the "WinVerifyTrustEx" function. The existence of this functionality will have been part of the common general knowledge of a person skilled in the field of computer security given the notoriety of the Windows operating system.

18.2 Starting from D6, a first obvious consideration for a skilled person would thus have been that the method disclosed therein could similarly be implemented as part of an operating system, i.e. that the functiona­li­ty of the anti-virus software, including the two veri­fication steps, could be integrated in the operating system. Feature (i) would thereby be realised and is thus obvious already for that reason. This is indepen­dent of whether any of features (ii)-(iv) is also adop­ted for the reasons given above.

18.3 Furthermore, it would also have been obvious to a skilled person to consider whether existing imple­men­tations of cryptographic routines might be re-used. Where the operating system provides for implementation of basic cryptographic operations, such as verifying the validity of a digital signature, it would have been an obvious option to consider using that implementation for this step of the method disclosed in D6. This is an alternative line of argumentation leading to the con­clu­sion that the provision of feature (i) is obvious.

19. The appellant argued in the statement of grounds of appeal that "[t]he inventors have recognised that, for many files, the author or publisher of files will be security checking and signing files with their own keys (provided to them by a CA)", that one "cannot rely on this 100%, as an author or publisher's certificate may be compromised or the author or publisher may them­selves start to generate malware, which may go undetec­ted by the CAs and the OS supplier", and that therefore a "whitelist [...] containing certificates that we know to be trusted" is generated, e.g. "using crowd-sourced data".

The board does not find this argument relevant as it is not concerned with what would have been obvious or not obvious to a skilled person starting from D6, instead of what may have been the inventors' starting point. Furthermore, this argument relies on a number of features which are not present in claim 1.

20. It follows that claim 1 of the main request does not involve an inventive step, Article 56 EPC, starting from D6.

Auxiliary request 1

21. Claim 1 of auxiliary request 1 differs from claim 1 of the main request in the following underlined features:

(a) "a malware detection method implemented within a computer by means of an anti-virus application",

(b) "for a given electronic file, determining if the file is associated with a valid digital signature using a trust verification system of an operating system of the computer (S4), by making a call to an embedded Trust Verification Application Programming Interface, API, of the operating system",

(c) "maintaining a database of trusted public keys within the computer including receiving public keys from a service provider".

22. Compared with claim 1 of the auxiliary request 1 on which the decision under appeal was based, present claim 1 differs only in the wording of the first step, which reads in that previous request as follows:

"for a given electronic file, making a call to an embedded Trust Verification Application Programming Interface, API, of an operating system of the computer to determine if the file is associated with a valid digital signature using a trust verification system (S4)".

The examining division objected to this wording under Article 123(2) EPC as it introduced the possibility that the signature would not be validated by the operating system itself but by another entity called by the operating system. Claim 1 was also objected to under Article 56 EPC for essentially the same reasons as the main request.

23. The board exercised its discretion under Article 12(4) RPBA 2007 to admit auxiliary request 1 as it addresses the objection under Article 123(2) EPC without changing the subject-matter to be examined for inventive step.

24. The board considers that the amendments have a basis in the application as filed (for (a): see page 6, line 5, and figure 1; for (b): see page 8, line 31 to page 9, line 4, and page 10, lines 13-15; for (c): see page 7, lines 26-27) and that the examining division's objection under Article 123(2) EPC is thus overcome.

25. Claim 1 fails however to meet the requirements of Article 84 EPC for the reasons provided at points 7 to 8.2 above in respect of the main request.

26. Furthermore, the expression "an embedded Trust Veri­fi­cation Application Programming Interface, API, of the operating system" is unclear, Article 84 EPC. From the description (page 6, lines 16-18, and page 10, lines 13-15), it appears to refer to a specific API existing in the Windows operating system. Claim 1 is how­ever not limited to that operating system and the claim does also not appear to be limited to that speci­fic API. Like for the expression "trust verification system", it is not clear what the boundaries of the scope of the term "Trust Verification Application Pro­gramming Interface, API" are supposed to be. This renders claim 1 unclear, Article 84 EPC.

27. As regards inventive step, the board considers that the objection against claim 1 of the main request still applies to claim of auxiliary request 1, in particular in view of the line of argumentation described at point 18.3 above, which provides for the added features (a) and (b). Feature (c) was already covered by the argumentation in point 15 above.

Auxiliary request 2

28. Claim 1 of auxiliary request 1 differs from claim 1 of the main request in that the claimed method comprises the following steps:

"maintaining a database of trusted public keys in the computer, said step of maintaining comprising,

- identifying at a network based service, public keys belonging to a public key infrastructure architecture and which are used to digitally sign electronic files,

- verifying that these public keys belong to a trusted source, and

- securely sending the trusted public keys to a computer"

instead of the related features which were contained at the end of claim 1 of the main request.

29. The objections under Article 84 EPC against claim 1 of the main request (points 7 and 8 above) apply similarly against claim 1 of auxiliary request 2.

30. The objection under Article 56 EPC against claim 1 of the main request applies as well against claim 1 of auxiliary request 2.

The new features have been essentially covered by the argumentation in point 15 above. In the case of mul­tiple VCAs providing virus-free certificates, the provider of the anti-software (whether an independent software vendor or the OS supplier if the anti-virus functionality is to be implemented as part of the operating system) would regularly update its database of trustworthy VCA and would verify their public keys (to be included in the database) on the basis of digital certificates issued for the VCAs by another certification authority (see D6, col. 9, lines 46-48).

Order

For these reasons it is decided that:

The appeal is dismissed.

Footer - Service & support
  • Service & support
    • Website updates
    • Availability of online services
    • FAQ
    • Publications
    • Procedural communications
    • Contact us
    • Subscription centre
    • Official holidays
    • Glossary
Footer - More links
  • Jobs & careers
  • Press centre
  • Single Access Portal
  • Procurement
  • Boards of Appeal
Facebook
European Patent Office
EPO Jobs
Instagram
EuropeanPatentOffice
Linkedin
European Patent Office
EPO Jobs
EPO Procurement
X (formerly Twitter)
EPOorg
EPOjobs
Youtube
TheEPO
Footer
  • Legal notice
  • Terms of use
  • Data protection and privacy
  • Accessibility