EP3262579A1 - An anti-counterfeiting method in which a product code is associated to a dynamic code - Google Patents
An anti-counterfeiting method in which a product code is associated to a dynamic codeInfo
- Publication number
- EP3262579A1 EP3262579A1 EP16724969.7A EP16724969A EP3262579A1 EP 3262579 A1 EP3262579 A1 EP 3262579A1 EP 16724969 A EP16724969 A EP 16724969A EP 3262579 A1 EP3262579 A1 EP 3262579A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- code
- product
- static
- dynamic
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000003068 static effect Effects 0.000 claims description 55
- 238000003780 insertion Methods 0.000 claims description 13
- 230000037431 insertion Effects 0.000 claims description 13
- 150000002500 ions Chemical class 0.000 claims description 9
- 150000001768 cations Chemical class 0.000 claims description 6
- KRTSDMXIXPKRQR-AATRIKPKSA-N monocrotophos Chemical compound CNC(=O)\C=C(/C)OP(=O)(OC)OC KRTSDMXIXPKRQR-AATRIKPKSA-N 0.000 claims description 2
- 241000234435 Lilium Species 0.000 claims 1
- 239000002966 varnish Substances 0.000 description 5
- 239000000463 material Substances 0.000 description 3
- 241001212789 Dynamis Species 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 2
- VOXZDWNPVJITMN-ZBRFXRBCSA-N 17β-estradiol Chemical compound OC1=CC=C2[C@H]3CC[C@](C)([C@H](CC4)O)[C@@H]4[C@@H]3CCC2=C1 VOXZDWNPVJITMN-ZBRFXRBCSA-N 0.000 description 1
- 235000008733 Citrus aurantifolia Nutrition 0.000 description 1
- 235000009421 Myristica fragrans Nutrition 0.000 description 1
- 241000282320 Panthera leo Species 0.000 description 1
- 101150034459 Parpbp gene Proteins 0.000 description 1
- 235000011941 Tilia x europaea Nutrition 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 235000013305 food Nutrition 0.000 description 1
- 230000005802 health problem Effects 0.000 description 1
- 230000007794 irritation Effects 0.000 description 1
- 239000004571 lime Substances 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 239000001115 mace Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Definitions
- the invention refers Lc an innovative method that, allows not only to acquire information on the product, and check the authenticity thereof, but also to impede the further counterfeiting of products destined to the market.
- the e exist systems that", foresee, for example, the use of Q CODE, or bi -dimensional codes which can be read through a palmtop and that allow to check if the product on which such, a QR_CODE is placed is original or not.
- This is possible Lhanks to the fact LhaL the QR CODt; allows to transport. with itself multiple in ormation Lhut resid s in electronic form on a server to which the access is mace following the T r eading of the QR_CODE itse1f .
- a QR Code can be photographed and copied ithfully to be then applied to a fake product, therefore deceiving the consumer although the access Lo the web age shows the originality of the product.
- the removal of the covering varnish allows o bring the code to light and to bo able zo read it to chock Lhe authenticity of the product.
- the remov l of the varnish in order to briny the code to Lig L, is an immediate i.ndi cation of the fact that such a code has ready been read and therefore is an indicator of a sort of possi le manumission of the product that wants to be. purchased.
- an ant i-counterfe i. t ing system sim lar Lo the ones cited above is, for example, described in Lhe applioati on US2004 /034579.
- the present method comprises the operations of:
- Each identification static code of the product be it a QR_Codo or another code, can obviously be copied arid duplicated easily to be then applied on fakes to place on the ma ket..
- the server (3) contains; a data-base in which said static codes (1) are included and, for each static code (1) , the algorithm of generation of the dynamic code associated to it.
- the server system gives immediately back the resul of the check.
- the dynamic code inserted or re d in/by the device (2) s created by a specific, processing device programmed with a specific algorithm, the same algorithm of generation of the dynamic code being present In the server that makes the compa- i on .
- the static code (1) of identific tion of the product can be a bi-dimensi nal code (QR_Code) .
- QR_Code i.s capable of providing mul iple ' in orma ion, creating a direct .link: with an Internet page.
- Advant geously such a st tic code (1) of ident f . cation of the product, can be applied di ectly on the product .
- a central server (3) requesting the insertion of the dynamic code (10) and checking the oompat ibili y between the dynami code inserted and the static code (1) of identification of the producr.
- the central server (3) having a data-base in which said static codes ( 1. ) are included and, for each static code (1) , the algorithm of generation of the dynamic code associated to it i such a way as to check the compa i lity thereof.
- said device (2) is a mobile telephony device, the access to the server being made automatically through the reading of the static code (1) with said mobile telephony device.
- Advant.agcou.jly the reading of said static code (1) foresees the acquisition of the image of the static code (1) , preferably a Q _Code , through said mobile telephony devi c; .
- the access to the server can be done manually through said do vice (2) and, subsequently, the manual insertion of the static code (1) and of the dynamic code (10) is requested.
- the server opens a session that foresees the option of purchase of the product.
- the server sends a second code (Password) to said e-mail address, eliminating the association between the dynamic code (10) and the static code ( 1 ) .
- Password a second code
- an operation of geo-localizat ion is foreseen of the reading/inser ion made, the server ha vine:) in memory the positions of the products and generating an alarm when the reading localization does not coincide with one memorized .
- the device 2 that reads or in which the static code is inserted, if in fact provided with a GPS, allows to send to the server the position where the read ing or the insertion of the static code has been made .
- the server is programmed to generate a third static code that is associated Lo the combined product.
- a dynamic code (10) for the generation of a dynamic code (10) .Conned by a variable sequence of codes generated in accordance with a pre-detertnincd algorithm, the dynamic code (10) being associ a ted to said stat c code (I) of identification of the product;
- a central server (3) is foreseen accessible through the internet and programmed to operate a comparison between the static code (1) of identification of the product and the dynamic code (10) generated by the device (60) in such a way as to check the correct- association of s id two codes and i e a result of comparison back when sa i d codes are i nserted.
- said central server contains a data-base i which said static codes (1 ) are included and, for each static code (1), the algo ithm of generation of the dynamic code associated to it in such a way as to check the correct association when it receives a comparison request, between two codes inserted.
- Figure 1 shows schematically an example of QR_Code
- Figure 2 ows a mobile telephony device (for example, an I -Phone or a smartphone) which reads a QR__Code to then create a connection to a dedicated server 3;
- a mobile telephony device for example, an I -Phone or a smartphone
- Figure 3 shows an association of a QR__Code with a dynamic code
- FIG. 4 and figure b show an example ot plate applicable to a product to place on the market and an example of a bottle on which such a plate is applied;
- igure 7 and iigure 8 show flowcharts with relation Lo the check of authenti i y of the product and w th relation Lo the purchase of the product.
- Figure 1 shows schematically a QR_code.
- Tile QR_code technology (bi-dimens onal code) is well known in the state of the art.
- Lhe bi-dimensional bar codes present themselves in quadrangular form and are suitable to be framed, for example, with normal palmtops or amartphon.es , already of common use (see, lor example, figure 2) - F.ach code is different, from the others, since its bt-dimensional combination allows an infinity of combin tions, all d ferent one from the other. It is enough to install on the own palmtop 2 a specifi.n application, frcc of charge, which permits the purchase o£ the mage and the subsequent translation of the same, obtaining a connection on the internet to a specific server 3.
- the server will open one or more specific pages, visible on the palmtop and rel tive to the electro ic address of the QR Code.
- Figure 2 shows schematically, as a way of example, Lhe acquisition o£ Lhe code through a palmtop 2 and the subsequent protected connection to a server 3 that, allows the openi. rig directly on the palmtop of one or more dedicated pages, corresponding to the address crypt ographed by the code.
- the QR Code i a first elemen tha i s used to check e authenticit f the product. It is now, however, coupled to a dynamic code ,
- the dynamic code is per se known and widely used in other technical fields but, naturally, not .lasociated to a code, such as a specific QR Code.
- the dynaiL.ic code is based on an algorithm that allows to generate a sequence of code, for example numerical, every time differenI but whose generation is not casual, and follows a specific logic.
- An electronic device is therefore foreseen which has processor programmed to generate such a code (numerical or of another type) on the basis o£ the specific algor hm foreseen. It. is then foresee a receiving server, i turn progra:rimed with the same algor thm.
- the server is capable of checking if the code received is compatible with the algorithm of generation, therefore checking the authenticity of the code itself.
- the technology of the dynamic code its, for example, widely used i the banking field, in particular in Home- Banki g .
- the br nch of the bank gives to each current: account holder an electronic key that generates every time the numerical code that is continuously modif ed on the basis of a pre-determ ned lgo ithm.
- the access to the private areas of the bank' websit is therefore allowed to the client not only through the insertion of a password and of a user ID, but also through the insertion oi the dynamic code that is generated by the electronic key provided.
- the user inserts the dynamic code that appears at that moment displayed, on the key and the server of the bank checks if the code inserted corresponds to he correc code and to do this, il cheek.a if such a code .received is compatible with the algorithm foreseen. II Lhe code results to be correct access is given to the private area .
- each client has an own key which has an own algoriLhm associated to the subject in question.
- the subject X does not have access to the reserved area of Lhe subject Y if he inser-S the dynamic code of the own key and not that generated by the key provided to the subject. Y .
- the generation of the code every time different, can take place, for example, at the moment. of the activation of the key or there can exist keys that generate at a continuous cycle such codes and with a battery that has them active 24/24 hours for several ye s .
- each QR Code is therefore associated to a specific dynamic- code.
- Figure 3 therefore shows, just as a way of example, a plurality of QR _Codes, each one of which is associated to a specific dynamic code 10. This means that, once a QR_Code has been produced for a certain product or a. range o.t products, to t is QR_Code is coupled w th a specific algorithm of genera Lion of a dynamic code.
- QR Code (Type 1 - fig. 3) can, for example, be associated a dynamic code. (Type 1 ⁇ fig. 3) whose algoriLhm foresees that the sum of the numbers that compose i f. results Lo bo always the same as a certain pre-fixed number .
- the server 3 will check if the dynamic code inserted is comp tible, or corresponding, with Ihe one foreseen for said QR Code (therefore check if the atsaociation foreseen is correct by checking if the code received, on the basis of the algorithm, has a sum of the numbers that compose it equal to said pre-fixed. number) .
- the server 3 therefore, contains a data-base in which all the static codes of the products are contained (for example, the QR Code) and. has a processor programmed w th the algorithms to check the correctness of the dynamic codes associated to the static codes.
- the device of generation o£ the dynamic code provided, with the product will naturally have a processor that contains the same algorithm of generation contained, in the central .server.
- the product can, for example, be furnished with such a QR_Code, together wi h a device that generates a dynamic code for such a specific product.
- Figure 4 schematizes, therefore, in a possible solution, a device that, can be applied to the product, for example in the form ol a plate .1 00 , which contains a. display 110 for the visualization of the dynamic code and the QR Code associated, to it.
- the device that generates the dynamic code could be furnished separately, for example ir. the form of a key, while the QR_Code can be printed on a classic label, for example in paper or in any other material, and appl ied or anyway appli ab e to the product. to be placed on the market .
- both the QR Code and the dynamic code could. be furnished separately and not nccoasarily applied directly on the product.
- the entire functioning system of the .same, as clarified below, is managed by a central server 3 to which a connection can be made via Internet for a check.
- multi le QR Code (static codes) are printed, each one of which is then appli d or associated to a- series of products that are furnished to the market, for am le to enc or more re-s llera.
- a re-seller 50 is represented, therefore a first subject (X) , to which a plurality of products tha. he. will sell, are provided.
- the server 3 to which there can be a connect on through the reading of such codes QR Code (QUI, ...QRn), w ll have in menory the associ tion between said QR Codes arid the algorithm relative to the dynamic code that can be generated every time by the device 60 provided to the specific re-sell r 50.
- QR Code QUI, ...QRn
- the purchaser itself reads with the ow.i sniartphone the QR Code applied to the product that wants to be purchased (for exam le, the watch of iigu e 6 indicated with pi) .
- the reading of the QR_Code is simulated in figure 2.
- Such a reading gives access, through the Internet, to the Internet page managed by Lho server 3 where it will be requested to insert, in a specif ⁇ c section, the dynami code.
- the dynamic code is generated and inserted in the specific request area, in such a way that the server receives it and checks _t, activating the check 1gorithm.
- the algorithm will check that the dynamic code is correct, as wel X as that the association of t to the. relative QR Code is correct.
- the system checks that the dynamic- code (n) generated is correct and compatible with the QR__Code (n) associated to it.
- the server 3 in fact, has in memory the associat on between the QR_Cede (QH ' I, ...QRn) of the products of the reseller 50 and the specific dynamic code (that is the correct algorithm) that can be generated by the device 60 l ays in possession of the re -seller 50. Tn that sense, coming the dynamic code from the correct device 60 associated, the check in. thi case will give but an exact correspondonce .
- the access to the specific page in which the insertion of the dynamic code is requested can eventually provide one or more generic pieces of inforir.at i. on on :he product that is goinq to foe purchased.
- an alarm of any type can be generated, for example a sound alarm, which indicates the non-originality of the product.
- the systen is very efficient because, by associating two distinct elements, that is (JR_Codc and dynamic code, it results to be difficult to place on the market, copied products. In fact, when a product is exposed, it would be possible for an ill- ntentioned pe-son to take pictures of the; QR_Code in order to reproduce it in great quantities and apply It on fake products to be placed in the commero i a 1 network.
- the purchase of the product allows to formalize, in an electronic manner, a change of ownership.
- a window w l open that requests if the purchase of the product wants to be completed.
- the server 3 requests the insertion of an electronic e-mail address of the sub ect-purchaser and to which a new Password will be Sent .
- the server when this purchase! operation ';akt?s place, memorizes the .tact that the QR_Code of the purchased product, (in this case QR1, of the watch) is not associated anymore to the dynamic code generated by the device 60 but rather to the new fixed password, generated. T.n this way, the. subject X (the shop owner) is not memorized anymore as owner and the new owner (the purchaser) will have its recognition password as owner associated to the QR1.
- the server 3 has in memory for each QR Code a specific algori.-hm. of dynamic: code associated to it and that can be generated y the own specific device.
- the produc L 200 results to be associated to the QR_Code 201 and to the dynamic code 20 and the whole i s memorized in the memory of the server 3.
- the QR Code is read and then the dynamic code which appears on the plate 100 is inserted.
- the di f rence with respect, to the preceding case, is that in this case the ' -e exists a device that generates the own dynamic code for each QR Code, that. is for each object, put on sale.
- the procedure of change of ownership may be updated without sending the password but updating the personal data of the new owner.
- the server 3 can be in fact contained he information that indicates tor each QR_ ode who is tiie subjec that owns it (this is obviously updated, as described, also in case of change? of ownership) .
- the QR1 is associated to the watch f figure 6 and the same QR1 is copied and applied on a fake that is given to a re-seller who ignores the situation.
- the unaware rev-seller uses the own dynamic code (in ease he is in possession of a dynamic, code) the result will be ,3 fake since that QRl cannot, correspond to dynamic codes belonging to other subjects.
- the server in that case, may be able to arrive to the information o the person who i s in possession of the original bject, corresponding to said QRl .
- the readings of the QR_Code being done every time through mobile devices that arc connected to the Internet, llow every time to memorize where su h a reading has been done (through the geo-iocalizator) , when it has been done and also by whom it has been done.
- a historical archive can thus be created of the readings done.
- the central server memorizeii for each QR Code read the position in which the reading has been done.
- This aspect reinforces the safety since it is possible to update every time the data-base of the acrver not only by loading the various QR_Cod.es and relative dynamic codes lor the products placed on the market but the geographical coordinates can also be inserted of the place where destined for saie/distribution. Therefore, if a reading is done in positions that do not correspond to those memorized, then the server can generate an alarm.
- the example can be a boat, engine and relative boat.
- the re-seller purchases the two products and assembles them for the sale it i s possible to make a specific request to the server that, automatic lly, generates a univocal oryptographcd Q _Code that jroupa the two codes QR previously associated, thus creating a further univocal QR Code in addition to the two preceding ones that remain valid.
- the new QR Code. generated represents the authentic ty of the combined product, engine and boat, and with an associated dynamic code that can be one of the previous two dynam c codes.
- the present invention with any type of code, be it QR___0ode, which have the advantage of being able to memorize a lot of pieces of information, different, one from the o he , and. allow a connection au omatically to the server through the image acquisition, but also o h codes such as the bar codes,
- the access to the server 3 is done manually through an electronic processor that can obviously coitipr.se also a normal mobile telephony device such s preciscy the said I-Phone or smartphone .
- an electronic processor that can obviously coitipr.se also a normal mobile telephony device such s preciscy the said I-Phone or smartphone .
- Ones the ' internet address has been in erted and. we have had access to the dedicated page, then the manual insertion of the bar code (or other code) and of the dynamic code is done.
Landscapes
- Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ITFI2015A000053A ITFI20150053A1 (en) | 2015-02-27 | 2015-02-27 | AN ANTI-COUNTERFEITING METHOD IN WHICH A PRODUCT CODE IS ASSOCIATED WITH A DYNAMIC CODE |
PCT/IB2016/051056 WO2016135682A1 (en) | 2015-02-27 | 2016-02-26 | An anti-counterfeiting method in which a product code is associated to a dynamic code |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3262579A1 true EP3262579A1 (en) | 2018-01-03 |
Family
ID=52727226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16724969.7A Withdrawn EP3262579A1 (en) | 2015-02-27 | 2016-02-26 | An anti-counterfeiting method in which a product code is associated to a dynamic code |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3262579A1 (en) |
IT (1) | ITFI20150053A1 (en) |
WO (1) | WO2016135682A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140067675A1 (en) * | 2012-09-06 | 2014-03-06 | American Express Travel Related Services Company, Inc. | Authentication using dynamic codes |
US9747598B2 (en) * | 2007-10-02 | 2017-08-29 | Iii Holdings 1, Llc | Dynamic security code push |
US20120187185A1 (en) * | 2011-01-20 | 2012-07-26 | Eugene Sayan | System and method for detecting counterfeit products and documents, and tracking and authenticating documents |
US9697526B2 (en) * | 2013-07-17 | 2017-07-04 | Covectra, Inc. | Systems and methods for authenticating goods |
-
2015
- 2015-02-27 IT ITFI2015A000053A patent/ITFI20150053A1/en unknown
-
2016
- 2016-02-26 WO PCT/IB2016/051056 patent/WO2016135682A1/en active Application Filing
- 2016-02-26 EP EP16724969.7A patent/EP3262579A1/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO2016135682A1 (en) | 2016-09-01 |
ITFI20150053A1 (en) | 2016-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109345264B (en) | Wine product traceability anti-counterfeiting system and method based on block chain | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
US7387249B2 (en) | Product verification and authentication system and method | |
CN101410853B (en) | Method and device for obtaining item information using RFID tags | |
US20020178363A1 (en) | System and method for authentication of items | |
US20190347888A1 (en) | Document authentication system | |
US20120310848A1 (en) | Anti-counterfeiting marking with asymmetrical concealment | |
CN103797475A (en) | Anti-counterfeiting marking with asymmetrical concealment | |
WO2017116303A1 (en) | Secure dual-mode anti-counterfeit product authentication methodology and system | |
US20140324716A1 (en) | Method and system for deterring product counterfeiting | |
CN104680226A (en) | Method For Protecting The Authenticity Of An Article From Imitation And Counterfeit | |
CN108629603B (en) | Commodity anti-counterfeiting method based on two-dimensional code | |
US20080253560A1 (en) | Duo Codes for Product Authentication | |
CN101356538A (en) | Method of authentication of items put into circulation field | |
US20130077778A1 (en) | Duo Codes for Product Authentication | |
CN109359983B (en) | Multi-code mutual correction method and system | |
US10599898B2 (en) | Warranty tracking method for a consumer product | |
EP3262579A1 (en) | An anti-counterfeiting method in which a product code is associated to a dynamic code | |
RU2608240C2 (en) | Method of protecting products from forgery and checking authenticity of counterfeit-protected products | |
CN112308683A (en) | Block chain-based steel quality guarantee book generation and management method and system | |
RU2787209C2 (en) | Method and system for marking finished products to detect unauthorized refilling | |
CN110060067A (en) | The method for tracing of the guarantee of consumer products | |
WO2023105041A1 (en) | Method for assigning information referring to a physical object to a nonfungible token | |
CN114331478A (en) | Three-right discrete anti-counterfeiting system and method based on state cryptographic algorithm | |
AU2013101090A4 (en) | Secure Object System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20170915 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20190129 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20220901 |