Decision Nº O/566/14 from Intellectual Property Office - (Patent decisions), 23 December 2014

JudgeMr P Slater
Patent NumberGB1312146.2
Administrative Decision NumberO/566/14
Date23 December 2014
PartiesRecipero Ltd
BL O/566/14
23 December 2014
APPLICANT
Recipero Ltd
ISSUE
Whether patent application number GB1312146.2
complies with section 1(2)
HEARING OFFICER
Mr Peter Slater
DECISION
1 Patent application GB1312146.2 entitled “System for generating a security
document” was filed on the 5th July 2013 by Recipero Ltd.
2 Following several rounds of examination and amendment, the examiner remained of
the view that the claimed invention was excluded from patentability under section
1(2). With the situation unresolved the applicant asked to be heard and the matter
came before me at a hearing on the 21st October 2014. The applicant was
represented by Mr Freddie Noble and Mr Marc Maidment of Albright Patents LLP.
The examiner Sally Vinall was also present.
3 The examiner also raised objections in relation to clarity, consistency and support.
However, these matters have been deferred pending the outcome of the hearing.
The Invention
4 The invention relates to a system for generating electronic security documents on a
computing system, where the security documents can be used by third parties to
certify that certain articles of value, such as a mobile phone, have not been the
subject of an insurance claim, reported stolen, or blocked by mobile phone networks
etc. Such security documents or certificates issued by a trusted authority can
increase the resale value of articles such as mobile phones. These certificates can
be tied to a particular article by using the device serial number as a certificate or
security document identifier and authentication can be provided by an online
database that can allow the retrieval of the original certificate and thus verify the
authenticity of the issued certificate. Fraudulent traders can however exploit such
verification systems by changing the serial number of a stolen article to match the
serial number shown in a genuine certificate or by obtaining certificates that have
serial numbers that differ only slightly to the serial number of the stolen article.
5 Known large scale systems for generating and storing security documents that can
handle large volumes of authentication requests typically comprise a plurality of

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT