T 0901/10 (Tracking electronic content/LEVEL 3) of 6.6.2014

European Case Law Identifier: ECLI:EP:BA:2014:T090110.20140606
Date of decision: 06 June 2014
Case number: T 0901/10
Application number: 99941101.0
IPC class: G06F 1/00
Language of proceedings: EN
Distribution: C
Download and more information:
Decision text in EN (PDF, 390 KB)
Documentation of the appeal procedure can be found in the Register
Bibliographic information is available in: EN
Versions: Unpublished
Title of application: SYSTEM FOR TRACKING END-USER ELECTRONIC CONTENT USAGE
Applicant name: Level 3 Communications, LLC
Opponent name: -
Board: 3.5.06
Headnote: -
Relevant legal provisions:
European Patent Convention 1973 Art 56
European Patent Convention 1973 R 30
European Patent Convention 1973 R 67
European Patent Convention R 137(3)
European Patent Convention R 137(4)
Keywords: Substantial procedural violation - (no)
Amendments - non-conformance with Rule 137 (4) EPC not established
Amendments - main request admitted
Remittal to the department of first instance for further prosecution, possibly involving an additional search
Catchwords:

See points 1.-1.3; 8.-9.3; 13.-13.4

Cited decisions:
T 0643/00
T 0708/00
T 1394/04
T 0747/06
T 1515/07
T 1866/08
Citing decisions:
-

Summary of Facts and Submissions

I. The appeal lies against the decision of the examining division, with reasons dispatched on 17 November 2009, to refuse the application pursuant to Article 113 (2) EPC because, after a main and five auxiliary requests had not been admitted under Rules 137 (3) and (4) EPC, there was no agreed and admitted text of the claims. In a section entitled "Obiter Dictum", the examining divi­sion argued that the last admitted set of claims lacked an inventive step over the document

D1: WO 97/43717 A1

as an obvious implementation of a business require­ment, Ar­ticle 56 EPC.

II. The file history, insofar as it is relevant for this decision, can be summarized as follows.

a) The International Searching Authority (ISA) per­formed a Partial International Search and invited the applicant to pay two additional search fees in view of its fin­ding that the ori­gi­nal claims covered three inven­tions vis-à-vis what was later labelled

D2: WO 98/13970 A1.

b) These fees were paid and the International Search Re­port consequently covered all claims. Also the In­ter­na­tional Preliminary Examination Report covered all in­ventions in which the first and second inventions were found to be inventive over D1 and the other available prior art.

c) The application entered the European phase in Feb­ru­­­a­ry 2001. In February 2007, the examining divi­sion in­­­­vited the appellant to elect one invention for fur­ther examination. The applicant chose the first inven­tion. In its first substantive communi­ca­­tion, the exa­mi­ning division found the claims of the first in­ven­tion to lack an in­ventive step over D1 as the ob­vi­­ous imple­men­tation of a "business re­quire­ment", the "trace­abi­li­ty of data dis­tri­bu­tion".

d) In preparation for oral proceedings the appellant filed claim sets of a main and two auxiliary re­quests. During the hearing it filed further third to fifth auxil­iary request claim sets. The exami­ning division de­cided not to admit any of these requests, leading to the refusal of the applica­tion under Article 113 (2) EPC.

III. A notice of appeal was filed on 12 January 2010, the appeal fee being paid on the same day. A statement of grounds of appeal was received on 19 March 2010, along with which the appellant re-filed the six refused sets of claims according to a main and five auxiliary re­quests. In the grounds of appeal, the appellant re­ques­ted that the de­ci­sion be set aside and a pa­tent be issued on the basis of claims according to the main re­quest or, alter­na­tive­ly, on the basis of any of the auxiliary requests, and that the appeal fee be reim­bursed. In the notice of appeal the appellant had re­quested that the decision be reversed and a patent be granted and, failing that, that oral proceedings be arranged.

IV. With a notice dated 8 May 2014, the board informed the appellant of its intention to set aside the deci­sion, to remit the case to the first instance for fur­ther pro­secution and to refuse the request for reim­burse­ment of the appeal fee and inquired whether, under these cir­cumstances, the request for oral proceedings was maintained.

V. With letter dated 28 May 2014 the appellant confirmed that "all requests as currently on file [were] main­tained". "For the avoidance of doubt", however, the appellant declared it to be "acceptable to forego oral proceedings before the Appeal Board at this stage, if the appli­ca­tion is remitted to the Examining Division as set out in the communication" of the board dated 8 May 2014. The maintained re­quest for oral proceedings would, in case of a remittal, "apply to an opportunity for Oral Pro­ceedings before the Examining Division", and fur­ther, if "Appeal proceedings became necessary after re­mission to the Examining Division", "to an oppor­tu­nity for Oral Proceedings before the Appeal Board at that stage."

VI. Independent claims 1 and 14 according to the main request read as follows:

"1. A method operable in an electronic content distribution system (100) comprising an electronic clearinghouse (105) that enables securely providing data (113) to a user device (109), the electronic clearinghouse being capable of communicating with said user device (109), the method comprising:

(A) said content provider (101):

(a1) encrypting said data with a symmetric key (623) to generate encrypted data; and

(a2) encrypting said symmetric key with a second encryption key (621) to generate an encrypted symmetric key, said second encryption key having a corresponding second decryption key, wherein the second encryption key is a public key of the electronic clearinghouse (105) and the second decryption key is a corresponding private key of the electronic clearinghouse;

(a3) providing usage conditions (517) for said data;

(a4) providing said encrypted data to a content hosting site (111), and

(a5) providing said usage conditions (517) and said encrypted symmetric key to an electronic digital content store (103);

(B) the electronic digital content store (103) providing transaction data (640) including store usage conditions (519) for said data;

(C) transferring the encrypted symmetric key and the transaction conditions (640) from the electronic digital content store (103) to the user device (109);

(D) the user device (109) transferring (i) the encrypted symmetric key, and (ii) the store usage conditions (519) from the user device (109) to an electronic clearinghouse (105) that possesses said second decryption key;

(E) said electronic clearinghouse (105)) verifying:

(i) that the store usage conditions (519) are consistent with the usage conditions (517) for said data set by the content provider (101); and,

based at least in part upon said verifying, if said verifying is successful, said electronic clearinghouse (105):

(e1) decrypting the encrypted symmetric key to obtain said symmetric key; and

(e2) re-encrypting the symmetric key with a third encryption key, said third encryption key having a corresponding third decryption key, wherein the third encryption key is a public key of the user device, and said third decryption key is a corresponding private key of the user device; and

(e3) transferring the re-encrypted symmetric key to the user device. [sic]

(F) decrypting the encrypted data obtained from said content hosting site (111) in the user device (109).

14. An electronic content distribution system comprising an electronic clearinghouse (105) that enables securely providing data (113) to a user device (109), the electronic clearinghouse being capable of communicating with a user device (109), the system comprising:

means at a content provider (101) for encrypting data with a symmetric key (623) to generate encrypted data;

means for encrypting said symmetric key with a second encryption key (621) to generate an [sic] symmetric key, said second encryption key having a corresponding second decryption key,

wherein the second encryption key is a public key of the electronic clearinghouse (105) and the second decryption key is a corresponding private key of the electronic clearinghouse;

means for transferring the encrypted data from a content hosting site (111) to the user device (109);

means for providing usage conditions (517) for said data;

means for providing said usage conditions (517) and said encrypted symmetric key to an electronic digital content store (103);

means for the electronic digital content store (103) providing store usage conditions (519) for said data;

means for transferring the encrypted symmetric key and said store usage conditions (519) from a from an [sic] electronic digital content store (103) to the user device; and

means for transferring (i) the enecrypted symmetric key, and (ii) the store usage conditions (519) from the user device (109) to a clearinghouse (105) that possesses said second decryption key;

means for receiving at said clearinghouse (105) the encrypted symmetric key, and (ii) the store usage conditions (519) from the user device;

means at said electronic clearinghouse (105) for verifying that the store usage conditions (519) are consistent with the usage conditions (517) for said data set by the content provider (101); and

means at said electronic clearinghouse (105) for, based upon verifying performed by said means for verifying, if said verifying is successful:

decrypting the encrypted symmetric key to obtain said symmetric key; and

re-encrypting the symmetric key with a third encryption key, said third encryption key having a corresponding third decryption key, wherein the third encryption key is a public key of the user device, and said third decryption key is a corresponding private key is a corresponding private key of the user device; and

transferring the re-encrypted symmetric key to the user device."

The wording of the claims according to the auxiliary requests is of no importance for the board's decision.

Reasons for the Decision

The request for oral proceedings

1. In its letter dated 28 May 2014 the appellant first stated that all requests on file were maintained, the request for oral proceedings included. Then it ex­plained that oral proceedings before the board of appeal "at this stage" could be foregone, but that the request would "apply" to the examining division after remittal or to a future board of appeal in a further appeal case.

1.1 The board interprets the appellant's requests as follows: The request for oral proceedings before the board of appeal in the present appeal proceedings is withdrawn on condition that the case is remitted to the first instance for further prosecution, but it is requested to hold oral pro­ceedings in the subsequent examination proceedings be­fore the competent body, be it the examining division or a fu­ture board of appeal.

1.2 With the withdrawal of the request for oral proceedings in the present appeal proceedings, the board of appeal is in a position to remit the case without holding oral proceedings.

1.3 The appellant should be aware, however, that a request for oral proceedings before the examining division or a future board of appeal cannot be made at this stage. As explained in decision T 1866/08 (rea­sons 10), it is established jurisprudence of the boards of appeal that the appeal procedure is separate from the exa­mination procedure; as a consequence, ­a re­quest for oral pro­ceedings to be held before the exa­mining division made du­ring the appeal proceedings will have to be filed again before the exa­mi­ning division. A fortiori, a re­quest for oral procee­dings in a possible further appeal proceedings in the future will have to be requested again during these appeal proceedings.

The invention

2. The invention relates to secure distribution of content over a network of computers based on an interaction be­tween, especially, one or more content pro­viders, elec­tro­nic stores, end user devices and electronic clea­ring houses (see figs. 5 and 6).

2.1 The content providers (p. 13, no. 1) define "meta­data", especially "usage con­di­tions" (p. 13, lines 20-22 and 27-28), to apply to the provided con­tent, en­crypt the content with a symme­tric key and make the en­crypted con­tent and the metadata avai­lable to the elec­tro­nic stores. The symmetric encryp­tion key is made avai­lable to a clearing house, itself encrypted with the public key of that clearing house (see e.g. origi­nal claim 7).

2.2 End users, at their "end user devices", may request to use a piece of content from an elec­tro­nic store (see p. 14, no. 2) which delivers the requested con­tent to the customer (p. 14, lines 14-16) along with the usage con­di­tions. The store is respon­sible for authorizing the clea­ring house to release the decryption key (p. 14, lines 22-23; p. 31, lines 6-11), e.g. after the cus­to­mer has paid for the requested service.

2.3 Finally, the end user con­tacts the clearing house and requests the "decryption key for the content" (p. 15, 2nd par.). The clearing house validates the integ­ri­ty and au­thenticity of the information in the re­quest, veri­fies that the request was authorized and checks the usage conditions requested by the end user against those specified by the content provider (p. 15, lines 14-15; p. 25, lines 2-5).

2.4 Only once these checks are successful is the decryption key sent to the end user (p. 15, lines 17-19), this time re-encrypted with the end user's public key (see e.g. p. 25, lines 6-8). The end user having thus obtained both content and symmetric key can now decrypt and access the content.

2.5 The description stresses that the invention is "for tracking usage of content data" (p. 5, lines 19-30), that the clearing house provides the "record keeping for all trans­actions" (p. 15, lines 10 and 20) and re­gu­larly "transmits summary trans­action reports" (p. 31, lines 12-14), but the clearing house is also res­pon­sible for "licensing authoriza­tion" (p. 15, line 10). It is explained that the symmetric key, encrypted with the pub­lic key of the clearing house, "can be trans­mitted anywhere with­out compr[om]ising the security of the con­tent" since only the clearing house, a trusted enti­ty, can decrypt it (p. 23, lines 21-25; p. 28, lines 19-20). It is disclosed that the clea­ring house may al­so "handle the billing" (p. 44, lines 5-8). It is fur­ther explained that the clearing house allows con­tent to be distributed before the release date for the sale which can, at the release date, be immediately opened "without having to conten[d] for bandwidth and download time" on that date (when there is likely to be high demand; see p. 55, lines 8-14).

The prior art referred to

3. The decision refers only to a short passage in D1 which discloses that data is encrypted using a symmetric en­cryption key (e.g. DES), that this key is encrypted using the recipient's public key and that the encrypted DES key will be sent to the recipient along with the encrypted data (see D1, p. 32, lines 15-24 and de­ci­sion, reasons 30.1). This passage is part of a section within D1 entitled "Public Key and Digital Signature Technology" (p. 30 ff.) which explains "conventional cryptography", i.e. what was considered to be common knowledge in public key cryptography at the time.

4. In the decision (reasons 31), D2 was only referred to with respect to the dependent claims and only curso­ri­ly. D2 also was the basis of the ISA's unity assessment and is mentioned in the corresponding invitation to pay additional search fees as disclosing a clearing house which is able to provide encrypted data to a system. Apart from that, D2 did not play a significant role during examination.

Rules 137 (3) EPC and 137 (4) EPC pre-2010

5. The examining division considered that "prima facie" the added references to "usage conditions" in the claims of, in particular, the main request contra­vened Rule 137 (4) EPC pre-2010 and, on this basis, used their discretion under Rule 137 (3) EPC not to admit the main request (see decision under appeal, esp. rea­sons 12 and 17).

5.1 More specifically, the examining division pointed out that none of the claims of the first invention as ori­gi­nally filed re­ferred to the feature "usage con­di­tions" (reasons 13, 2nd par.) and argued with reference to the search exa­mi­ner's summary of the first invention (in the invi­ta­tion to pay additional fees) that the first invention "related to securely providing data using encryption key and is not related in any way to the feature 'usage condi­tions'" (reasons 14.1). Speci­fi­cally, the term "au­thoriza­tion" referred to in ori­gi­nal claim 9, which was part of the first group of claims, had to be con­strued as "payment authorization" rather than more broad­ly so as to sub­sume "usage con­di­tions" (reasons 15.2). The exa­mi­ning division further argued that this feature rather related to the second invention searched (reasons 14.2). It was concluded that "the amendments relate[d] to subject-matter of a non-unitary invention which the applicant chose not to to continue with" and "to unsearched subject-matter, Rule 137 (4) EPC" and therefore did not give its con­sent to the amendments pursuant to Rule 137 (3) EPC.

5.2 Essentially the same reasoning was used for some of the auxiliary requests, which are, however, not relevant for the present decision.

6. The board considers the following.

Rule 137 (4) EPC

7. It is a matter of fact that "usage conditions" were not mentioned in any of the original claims 1-9 of the first invention.

7.1 Claim 9 does not specify the nature of the "authori­za­tion for the data" to be performed prior to trans­mission. In the description it is disclosed that the electronic digital content store "is responsible for authorizing" the clearing house to release the decryp­tion key and "authorizes the download" of the con­tent (p. 14, lines 21-26). The clearing house veri­fies that a received request was so authorized (see p. 15, lines 13-14). It is disclosed that, normally, the store performs the "financial settlement" (p. 22, line 23; p. 24, lines 21-26), notwithstanding the fact that also the clearing house "may handle the billing" (p. 44, line 8). It is also clear from the description that the store will give its authorization only once the re­ques­ted content was paid for (p. 24, line 27). Notably, however, the "credit card autho­ri­zation" and "payment authorization" (p. 24, line 21; p. 29, line 10) it may receive in the process must be distinguished from the "au­thori­zation" it eventually gives. The store is how­ever disclosed to also "assist with" a few other things including "metadata extraction, secondary usage condi­tions, SC packaging, and tracking" (see p. 14, lines 16-20). The board thus agrees with the decision that the "authorization" checked according to claim 9 will in particular depend on the financial settlement, but disagrees that the term "authorization" must be construed as mere "payment authorization".

7.2 On the other hand, it is disclosed that the clearing house verifies compliance with the usage condi­­tions (p. 11, lines 19-21; p. 15, lines 11-15) in addition to and separately from verifying the authorization. There­fore, the description also does not justify the conclu­sion that "authorization for the data" as claimed sub­sumes usage conditions.

7.3 On this account, the board also notes that original claim 9 depended on original claim 7 which specified a system by an unclear reference to "said method" compri­sing certain steps to be performed by a clearing house. In the board's view this has the consequence that claim 9, when it speci­fies the system to "further compris[e] authorization for the data", does not unambiguously im­ply this "autho­rization" to take place at the clea­ring house. Ra­ther, the language of claims 7 and 9 does not exclude the reading that the claimed authori­za­tion re­fers to that given by the store to the clea­ring house and which also precedes any content trans­mission to the end user at the "second system".

8. The board agrees with the appellant that an individual feature may be disclosed to be rele­vant for several inventions which lack unity amongst themselves (grounds of appeal, p. 6, 2nd par.). The fact that the feature "usage conditions" was originally part of the second invention claimed but not mentioned in any of the claims of the first invention is not per se sufficient to establish that the incorporation of that feature into the first invention causes a lack of unity.

9. The appellant refers to T 708/00 and T 643/00 to argue that for "amendments that only limit the claims, there is no room for [a non-unity] objection" (grounds of appeal, p. 7, 2nd par.).

9.1 In its headnote III, decision T 708/00 states that "[a] subsequent amendment to limit the subject-matter of the main claim by additional features disclosed in the appli­­­cation as filed does not generally affect the no­tion of unity of invention under either Rule 86(4) or Rule 46(1) EPC.". The board notes that this sentence sets out a general rule to which there may however be excep­tions. Also T 643/00 (reasons 3) in stating "[t]he amendments to the claims, however, only narrowed the scope of the original claims 1 and 5 without intro­du­cing any alternative solutions so that the subject-matter of the amended claims cannot be nor include 'other inventions' within the meaning of Rule 46(1) EPC" allows for amendments which do introduce alter­na­tive solutions and thus warrant a different conclu­sion. In decision T 1394/04 (reasons 5) such a situation is specifically described as follows: "[I]t may occur that the description of the application contains a further general inventive concept, distinct from that underly­ing the main claim and its dependent claims, if any, but not clearly identified or declared as such in the description. In such a case, if the subject-matter of the main claim based on the first inventive concept had to be amended, on account of lack of novelty resulting from too broad terms used in the wording, any amendment of the claim pertaining exclusively to said further in­ven­tive concept could justify an objection of lack of unity 'a posteriori'."

9.2 An objection under Rule 137 (4) EPC is, therefore, not in principle unfounded simply because the amendment in question was a limitation of the main claim - or one of the main claims, as the case may be; notably in the pre­­sent case the first invention contained three inde­pendent claims, namely original claims 1, 2 and 7.

9.3 Specifically, the board considers that a lack of unity cannot ensue between a claim and that claim amended by incorporation of a new feature, i.e. between a claim having feature A and an amended version having features A and B, but possibly between the so-amended claim and a previous dependent claim with a different special tech­­nical feature (see Rule 30 EPC 1973), i.e. between the amended claim with features A and B and the previ­ous dependent claim with features A and C.

10. It must, therefore, be determined, whether amended claim 1 according to the main request lacks unity with original claims 1-9 according to the first invention.

10.1 Amended claim 1 incorporates all the features of the originally claimed first invention except those of ori­ginal claims 6 and 9, comprising, respectively, "con­­firming that the data was paid" and "authorization for the data prior to transferring the ... data". Both of these features relate to controlling the re­lease of the "first decrypting key" and thus the access to the en­cryp­ted content. The new feature of claim 1 about the clearing house verifying "usage conditions" as a pre­condition for decrypting, re-encrypting and trans­ferring the symmetric, first decryption key re­lates to a similar kind of transmission control.

10.2 The board thus is of the opinion that no lack of unity arises between amended claim 1 of the main request and any of the claims of the first invention due to the in­corporation of the features relating to "usage con­di­tions" into claim 1.

Rule 137 (3) EPC

11. The examining division exercised their discretion not to admit the new requests in view of their findings under Rule 137 (4) EPC.

11.1 While the board disagrees with the finding that the amendment contravenes Rule 137 (4) EPC, the observa­tions made by the examining division are not entirely without merit: As already mentioned, the "usage condi­tions" had not been originally claimed. The board also agrees that the usage conditions do not specify the handling (i.e. de­cryption/re-encryption) of the first decryption key (see decision, reasons 16.7).

11.2 The board however notes that all independent claims 1, 2 and 7 of the first group of inventions relate to the clearing house. In the first system overview given by the de­scription (p. 10, line 15 ff.), main functions of the clearing house are disclosed to be the transmission of the (re-)encrypted decryption key and the validation and verification of a number of preconditions for that transmission, the latter including the verification of the usage conditions (p. 15, lines 14-15).

11.3 The board thus concurs with the appellant that the in­tro­duction of the pertinent feature is a reasonable re­action of the applicant to the inventive step objection raised by the examining division.

11.4 The board therefore admits the present main request into the procedure.

Scope of the search

12. The examining division stated that amen­ded claim 1 of the main request was not searched. The board agrees with the appellant that, to the extent that this is the case, an additional search has to be carried out now (see grounds of appeal, p. 7, lines 4-7).

Substantial procedural violation and

Reimbursement of the appeal fee

13. The appellant requested the reimbursement of the appeal fee since "proper conduct of the examination procee­dings would have avoided the necessity of an appeal" (see grounds of appeal last page, point VII). In view of Rule 67 EPC 1973, the board understands the appellant to imply that the way in which the exa­mining division had applied Rules 137 (3) and (4) EPC amounted to a substantial procedural violation. The following reasons were given:

a) Rejection of the amendments, which directly respon­­ded to objections raised by the examining divi­sion, as late - under Rule 137 (3) EPC - was in­appro­priate, in particular after the examination of an appli­ca­tion has suffered undue delays (grounds of appeal, p. 3, 3rd par.).

b) The way the examining division applied Rule 137 (4) EPC was incorrect and coloured by their precon­ceived view on the invention (grounds of appeal, par. bridging pp. 7-8).

c) Instead of not admitting the requests the exami­ning division should have had an additional search carried out. Not doing this although it was mani­fest­ly necessary was a substantial procedural vio­la­tion according to T 1515/07 and T 747/06 (grounds of appeal, p. 7, 1st par.).

13.1 Re. a) The appellant refers to the fact that after the application had entered the European phase no examina­tion report was issued for six years, and even this on­ly after the applicant had ex­press­ly requested accele­ra­ted examination. The board agrees with the appellant that this is an undesirably long delay. The board dis­agrees however that such de­lays, undesirable as they may be, oblige the exa­mi­ning division to be more leni­ent in applying Rule 137 (3) EPC.

13.2 Re. b) The examining division provided detailed reasons for its de­cision not to admit the auxiliary requests under Rule 137 (3) and (4) EPC, and the applicant was heard on these during oral proceedings. That the board has come to a different conclu­sion on this issue con­stitutes a difference in judgment rather than an error of proce­dure. The board therefore cannot see that the examining division has committed a substantial proce­dural violation by applying Rules 137 (3) and (4) in­­appropriately.

13.3 Re. c) The decisions cited by the appellant are not per­tinent in the present case. In T 1515/07, the board decided about a case in which no search had initially been carried out. Later on, the examining division had conceded a particular feature to constitute a technical solution to a technical problem but not carried out an additional search for the sake of expediency due to their finding that the invention lacked an inventive step al­ready in view of prior art cited in the applica­tion. In the case at issue in T 747/06, independent claims 1 and 25 were searched as a first invention but none of the dependent claims. The board found that this dis­tinction was wrong and that at least some of the de­pen­dent claims should have been searched as part of the first invention mentioned in the claims. Furthermore, the refusal of the examining division to perform an addi­tio­nal search in this situation - so as to complete the initial search - was found to constitute a sub­stan­tial procedural violation. Neither of these cases warrants the conclusion for the present case that the examining division should have performed an additional search on a claim which was amended by an unsearched fea­ture and which the exami­ning division decided ipso facto not to admit. The question of whether or not an additional search has to be carried out for amended sets of claims only arises if and when these claims are admitted.

13.4 The board comes to the conclusion that the examining division has not committed a substantial procedural violation.

14. As a consequence, the appeal fee cannot be reimbursed (see Rule 67 EPC 1973).

Article 56 EPC 1973 over D1

15. In a section entitled "obiter dictum" the decision referred to the "last admitted set of claims ... dated 24 September 2008" which it argued to lack an inventive step over D1.

15.1 The decision found (reasons 30.1 and 30.2) that "the subject-matter of [the independent claims], insofar as understood in the light of the description, differ[ed] from the disclosure in D1 in that

(i) the encrypted data is sent from a content hosting site ... to the user data system (109),

(ii) there is further comprised a clearinghouse 105 which is exclusively capable of decrypting the en­crypted first symmetric key 6233 ... for the user data system."

15.2 According to the decision (reasons 30.4, 1st par.), diffe­rence (i) is "one of the two obvious options", name­ly whether the "encrypted key" and the "encrypted data" are sent to the user "by the same or by two enti­ties". The skilled person would choose between them "in accordance to circumstances" and, furthermore, "which entity sends which information is dependent on the busi­ness requirement of the system (e.g. who is paid for doing what)."

15.3 With regard to difference (ii), it is argued that a clea­­ring house is an obvious implementation of the "bu­si­ness requirement that the decryption of the encrypted first symmetric key ... is securely traceable to the con­tent provider" (reasons 30.4, 2nd par.).

16. In the board's view, amended claim 1 of the main re­quest differs from D1, especially the cited passage on page 32, lines 15-24, in the following ways:

a) The existence of a clearing house (step E), especially one which checks usage conditions and con­trols the eventual release of the symmetric decryp­­tion key (steps i) and e3));

b) the separate distribution of the data and the key, directly to the end user respectively via the clearing house;

c) the encryption of the symmetric key with the key of the clearing house and its re-encryption on release; and

d) the usage conditions being transferred to the user and then forwarded to the clearing house to be veri­fied against the usage conditions "set by the content provider" (steps B) and E) i)).

16.1 The analysis of the decision under appeal is therefore incomplete with regard to the amended claims of the main request: Difference (ii) reflects the control of the clearing house over the release of the symmetric de­­cryption key. Difference (i), in combination with diffe­rence (ii), corresponds to above-mentioned diffe­rence b). Not addressed are the differences relating to the fea­ture "usage conditions", namely a) insofar as it re­lates to the clearing house checking the usage condi­tions and difference d), but also difference c) is not addressed.

16.2 As regards difference (ii) the board further notes the follow­ing: At the clearing house, the encrypted symme­tric de­cryp­tion key is first decrypted and then re-encrypted for the end user device. While this decryp­tion may be "traced" at the clearing house, the clea­ring house seems unable to trace the eventual decryp­tion of the re-encrypted symmetric key at the user de­vice. More­over, if it were not for the clearing house, the symme­tric key would not have to be encrypted and re-encryp­ted in the first place: An encryption with the public key of the end user device would suffice. Hence, the board does not follow the reasoning in the decision that the clearing house serves to make "decryption of the encrypted first symmetric key ... traceable" and is an obvious implementation to achieve this effect.

16.3 Finally, the examining division has argued that the feature "usage conditions" has not been searched. Since the board decides to admit the main request now, an additional search has to be performed.

17. From the foregoing, the board concludes that the in­de­pendent claims of the main request have not been ex­haustive­ly assessed for inventive step yet. The board therefore exercises its discretion under Article 111 (1) EPC and remits the case to the first instance for further prosecution.

Order

For these reasons it is decided that:

1. The decision under appeal is set aside.

2. The request for reimbursement of the appeal fee is refused.

3. The case is remitted to the department of first instance for further prosecution on the basis of the main request as filed with the grounds of appeal.

Quick Navigation