EP1221222A2 - Systeme et procede de marquage - Google Patents

Systeme et procede de marquage

Info

Publication number
EP1221222A2
EP1221222A2 EP99954325A EP99954325A EP1221222A2 EP 1221222 A2 EP1221222 A2 EP 1221222A2 EP 99954325 A EP99954325 A EP 99954325A EP 99954325 A EP99954325 A EP 99954325A EP 1221222 A2 EP1221222 A2 EP 1221222A2
Authority
EP
European Patent Office
Prior art keywords
marking
information
product
permit
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99954325A
Other languages
German (de)
English (en)
Other versions
EP1221222A4 (fr
Inventor
Elad Barkan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP1221222A2 publication Critical patent/EP1221222A2/fr
Publication of EP1221222A4 publication Critical patent/EP1221222A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07758Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07798Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card part of the antenna or the integrated circuit being adapted for rupturing or breaking, e.g. record carriers functioning as sealing devices for detecting not-authenticated opening of containers

Definitions

  • This invention concerns systems for marking objects, and more particularly such systems which include electronic means for holding digital documents and are attachable to an object to be marked, and methods for secure interface with the object.
  • a major producer of software packages decided to attach a hologram to its products to prevent the marketing of counterfeit products.
  • the hologram did not help, as competitors succeeded in illegally copying the hologram.
  • Another purpose of marking is to reliably describe the product.
  • Providing a reliable product description allows to use or sell the product, for example. At present, it is difficult to reliably mark a product in a way that will make it difficult for unauthorized people to change that marking.
  • a gun for example, must have an owner. Ownership may change from the manufacturer to an authorized dealer to a licensed user. It is of paramount importance to achieve a reliable marking of that ownership. At present, labels or paper documents can be easily falsified, this making crime control more difficult.
  • Yet another problem with objects marking is to indicate changes in ownership or other important events in the lifetime of a product. For example, a buyer of a car may be interested in prior ownership information, as well as accidents information, tickets and other relevant information relating to the history of that car.
  • paper documents may be used to indicate part of the above information, however paper documents can be falsified using advanced digital technology like scanners, digital picture processing, color laser printing and more. Thus, paper documents or labels on the product may not provide a reliable indication as to the history of a product.
  • a product is marked with an electronic device attached to the product.
  • the device includes an input/output channel for accepting an inquiry and for answering with the marking information stored in the device.
  • the device includes means to securely attach it to the marked product, thus addressing a possible danger that the device may be deliberately removed from the legitimate product and attached to a fake. If the marking device is removed from the marked product, it will cease to function as a marking device and cannot be tampered with.
  • each marking device is devised to include a unique identity, that may include, for example, a unique public/private key pair embedded in the device.
  • the unique identity may be contained in a certificate.
  • a certificate is a digital document signed with a private key, that is associated with a known public key. The document links the identification of the marking device with that public key.
  • each marking device is equipped with a basic set of instructions or rules and parameters that govern its operation, to achieve a secure and reliable marking device.
  • the marking device may hold three types of digital documents that define its operation: a certificate to identify the device, one or more permits to define permissible operations and relevant parameters, and one or more permits from certified authorities that the marking device operates according to predefined rules and a required standard.
  • a permit is a digital document issued and signed by an entity having an unique identification, the document including some piece of information.
  • the marking device includes means for accepting additional information, operating rules and parameters which govern its subsequent operation.
  • the marking device checks the validity of each requirement, according to information and rules already stored therein. Only valid requests will be honored. After the initial marking of the device, others may write additional permits into the marking device, provided these latter permits are not in conflict with the conditions and/or rules in previously written permits.
  • a multi-level permit structure is disclosed, with decisions at each level being linked to decisions at adjacent lower and higher levels.
  • Complex decisions can be implemented using logic rules at each level in a multi-level hierarchical structure.
  • a marking system may include two hierarchical structures: a first hierarchy corresponding to the decision levels in a permit (before marking) and a second hierarchy relating to information and/or other features added after marking.
  • the marking device may be programmed to respond only after a self-test, so that a response will be issued only if the device has not been tampered with. Moreover, the answer may be conditional upon a specific inquiry, according to predefined rules programmed into the marking device.
  • Fig. 1 illustrates an object with electronic marking means attached thereto.
  • Fig. 2 details the structure of a marking means attached to an object.
  • Figs. 3A, 3B and 3C detail a method for attaching certificates and permits to a marking device and for their subsequent use, with Fig. 3A detailing the writing of the initial certificate and first permits, Fig. 3B illustrating the process of writing additional information into the marking device, and Fig. 3C illustrating the process of reading the marking information stored in the device.
  • Fig. 4 details a method for answering inquiries relating to the marking information for a marked object.
  • Fig. 5 illustrates a multi-level decision structure in a MOL permit.
  • Figs. 6A and 6B illustrate an example of a multi-level structure, with Fig. 6A detailing the hierarchical issuance of permits, and Fig. 6B detailing part of the vector relating to ownership information. Modes for Carrying out the Invention
  • Fig. 1 illustrates an object 1 to be marked, with an electronic marking device 2 attached thereto.
  • the marking device 2 includes an input/output channel 21 for reading inquiries and for sending out the marking information, an optional power supply input 22 for receiving electrical energy for its operation from an external source, and attaching means 23 to secure device 2 to the marked object 1 .
  • marking of an object 1 is implemented using electronic hardware means 2 holding the marking information therein.
  • the marking information is stored as one or a plurality of digital documents, as detailed below.
  • the combination of digital documents and an electronic device securely attached to an object achieves a reliable means for marking the product 1 .
  • the electronic marking device may be better trusted to indicate that the information presented about the product is true, and that it refers to the product the marking device is attached thereto.
  • the marking device 2 is an integral part of the product to be marked.
  • a product may be manufactured with the marking device included therein.
  • the marking device 2 may also be used to control an object it is attached to.
  • the marking device 2 may be connected to control inputs in a product.
  • the marked product may be a tape recorder. The marking device 2 then controls the functions of the tape (rewind, play, record) responsive to user's commands.
  • the marking device Only the legitimate user can communicate with the marking device, since the channel is protected with encryption procedures. Similarly, the user can receive information regarding the status of the tape recorder or read information recorded on the tape, through the marking device 2.
  • Various electrical appliances may be thus controlled through a secure channel using the marking device 2.
  • a marking device 2 attached to a gun will only allow operation of the gun when the legitimate user is identified by the device 2.
  • the marking device 2 when attached to an object, may be used as a secure interface with that object .
  • the marking device 2 provides basic services: a reliable indication who is the owner of the device, presentation of certificates, optional addition of information. These are generic functions of the marking device according to the present invention.
  • the device 2 may also provide extended services, that are adapted to the properties of each object being marked. These may include audio controls in a stereo system, play/record/rewind functions in a tape recorder, immobilizer functions in a gun, etc.
  • the user may be provided with a remote control unit that can communicate with the marking device over a secure channel.
  • the extended functions may be either performed with controls on a remote panel, or using controls on the object itself, with the remote control only used to enable those functions.
  • a simple implementation of the latter implementation is a remote control of the ON/OFF function of a device. When the device is OFF, then all its local controls are inactive. When the device is turned ON through the secure channel and the marking device 2, then the local controls on the object itself may be used .
  • one control unit may be used to control a plurality of objects, each with a marking device attached thereto.
  • Each device may have a different channel parameters.
  • a secure channel with the marking device may be achieved using encryption means.
  • Fig. 2 details the structure of a marking device 2 attached to an object 1 to be marked.
  • the marking device 2 includes an input/output channel 21 for receiving requests for information and for outputting the response with the marking information for the product 1 .
  • the information concerning the identity of the product as well as various parameters, the history of the product and operating rules are stored as digital documents in storage means 25.
  • the marking device 2 may hold three types of digital documents that define its operation: a certificate 251 to identify the device, a permit 252 from a certified authority to attest that the marking device operates according to predefined rules and a specific standard, and one or more permits 253, 254 to define permissible operations and relevant parameters.
  • each marking device 2 is devised to include a unique identity indicated in certificate 251 , that may be include for example a unique public/private key pair embedded in the device.
  • the ID is unique but the encryption key is random.
  • an encryption pair may be generated locally using for example a random numbers generator. In this embodiment, each key needs not be unique.
  • the certificate 251 is a digital document that may be signed with a private key associated with a known public key, the document linking the identification of the marking device with that public key. In another implementation, the document may be encrypted with the private key. A digital signature or encryption may be implemented as known in the art.
  • a permit is a digital document issued and signed by an entity having a unique identification.
  • the permit includes some piece of information.
  • permit 252 indicates that the marking device 2 operates according to predefined rules and a specific standard pertaining to marking devices.
  • the marking device may be equipped with a basic set of instructions or rules and parameters that govern its operation, to achieve a secure and reliable marking device which are contained, in the example as illustrated, in permits 253 and 254. These are implemented in the software and/or hardware of the marking device.
  • permits 253 or 254 may be used to give the credentials of the ID holder and/or for other information.
  • a permit like 254 may include authorization to issue additional permits. This may be used to achieve a permits hierarchy, where entities at various levels may issue permits, being authorized to do so by entities at higher levels in the hierarchy.
  • a controller 24 may accept a request from the channel 21 , and decide whether to honor that request according to rules and/or parameters stored for example in permits 252, 253 and/or 254. If the decision is positive ( to honor the request ) , then controller 24 assembles a response with predefined parts of the information stored in means 25, and sends the answer out through channel 21 . More details on this process are to be found in a later part of the present disclosure.
  • Controller 24 may be implemented using digital circuits as known in the art to implement devices capable of reading and writing digital data and making decisions according to a predefined computer program.
  • Microcontrolled logic may be used or a central processing unit with adequate peripheral components.
  • device 2 is implemented as a smart card processing unit SCPU that can be attached to an object 1 to be marked.
  • the SCPU may include means to remove all its memory if someone is tampering with the device.
  • the marking device 2 is secured to the object to be marked 1 using attaching means 23.
  • Means 23 are so devised that removal of device 2 will disable the marking device, to prevent its unauthorized removal from the correct object 1 and its subsequent attachment to another object, which may mislead a user. Thus, if marking device 2 is removed from the object 1 it is intended to mark, then the attaching means 23 causes it to cease its operation.
  • One possible embodiment of means 23 is a strong glue attached to the microchip itself on the side the electronic circuit is etched thereon, so that the removal by force of device 2 will damage the chip.
  • Another embodiment may include a glue with a plurality of fine wires (not shown) immersed therein, so that removal of marking device 2 breaks the wires and device 2 becomes permanently damaged.
  • the marking device 2 may be securely attached to the marked product 1 , to address a possible danger of the device being deliberately removed from the legitimate product and attached to a fake.
  • the marking device may be attached during the manufacture of the product 1 , or may be made an integral part thereof.
  • the marking device 2 Since the marking device 2 is an electronic device, it needs a source of electrical power to operate.
  • a battery (not shown) may be used for that purpose. This may have disadvantages, like a higher cost, larger size and/or the need to periodically replace the battery.
  • the device includes a power supply input 22 for the application of power when a user desires to read the marking information, or to program additional information like permits into it.
  • Power supply input 22 may include (not shown) electrical contacts for the direct connection to an external electrical source, or a radiation receiver means for the noncontact application of power.
  • a solar cell may be used to convert light energy into electrical power.
  • a coil may be used to transfer energy to the device 2 through an alternating magnetic field.
  • power supply 22 may include energy storage means like a capacitor (not shown), that may be charged from an external source.
  • sensor means in the device activate the device to communicate with the outside. In this state, the marking device 2 has enough energy to complete its task, and is thus independent of external energy sources.
  • a capacitor may be otherwise used together with an internal battery or an external energy source.
  • one device may implement both the input/output channel 21 and the power supply input 22, using a common channel for both conveying the information to/from the marking device and applying electrical energy to the device.
  • the marking device 2 may include means for communicating with other marking devices. This may be used to exchange information and/or permits between marking devices, or to achieve a hierarchical marking structure. For example, various parts in a vehicle may each have its separate marking device. All these marking devices may be connected to each other in a network and to a marking device that communicates with the outside, for example with the vehicle computer. This allows the vehicle computer to ensure the integrity of the car, without the user need to communicate with each marking device for each part in the car.
  • a case 26 may be used to contain all the parts of the marking device 2, to provide mechanical protection.
  • Figs. 3A, 3B and 3C detail a method for attaching certificates and/or permits to a marking device and for their subsequent use, with Fig. 3A detailing the writing of the initial certificate 251 and first permits 252 and 253.
  • the marking device 2 may be implemented as a monolithic integrated circuit IC, a module or another implementation of an electronic circuit.
  • the device 2 is produced by a marking device manufacturer 31 .
  • a certificate C1 251 which includes unique identification information for each device 2, is permanently written into the marking device 2.
  • the certificate 251 may be written during the production of the chip, using for example a mask in the IC or a Read Only Memory ROM. In another implementation, the certificate may be programmed in the field, using for example a Programmable Read Only Memory PROM, an EPROM, EEPROM or flash memory as known in the art.
  • the certificate is written by the manufacturer 31 of the device 2, to ensure that each marking device 2 has an unique identification.
  • the manufacturer 31 receives from a standards institute 315 a digital document attesting to the compliance of marking device 2 with predefined rules and a required standard.
  • the manufacturer issues a digital document under that one which is written into device 2 as permit 252.
  • the document may be read by users, to ensure that the marking device may be trusted to act in a reliable way.
  • a certificate authority 316 may create a certificate for the device. Alternately, the certificate may be created by one of the manufacturers 31 or 32.
  • a manufacturer of products 32 attaches the marking device 2 to a product and writes additional information relating to that manufacturer and the product the marking device 2 is attached thereto.
  • the manufacturer 32 may receive marking authorization as a permit called "Marker Operating License” or MOL, from a marking authority 325.
  • That authorization may be included in the permit written into device 2 by manufacturer 32, so that the permit in device 2 may be traced to authority 325 to allow users to verify that the marking was indeed authorized.
  • the marking device 2 includes means (not shown) for only allowing a single session of certificate or encryption keys programming therein. After the unique identification of the marking device 2 is written in, the device 2 will not allow subsequent changes in the identification information. For example, if the identification information is written in a mask ROM by the device manufacturer, the inherent structure of this memory prevents subsequent changes therein. If the identification is programmed in the field in an EPROM for example, that EPROM may include an additional bit, the enable bit. After entering the identification information for the device 2, the enable bit is programmed into a state that prevents (disables) further programming of the marking device 2.
  • the certificate or identification information is written into a programmable memory according to information received from outside, however the controller in device 2 is so programmed as to prevent such writing if a certificate or identification information was already written into device 2.
  • device 2 includes means for creating an encryption key pair comprising a public and a private key.
  • the private key is written into the internal memory of device 2 and is not available outside.
  • the public key is sent out, to be encrypted or signed digitally by an outside authority like a manufacturer, importer, a government agency or another certificate-issuing authority.
  • the resulting digital document or certificate is transferred back to device 2 and is written therein as part of its identification.
  • a manufacturer may create locally the encryption key pair using a random generator and write these keys in the marking device 2.
  • the private/public keys are allowed to be changed, as long as there is an ID that remains unchanged. After a change, a new certificate may be needed.
  • a possible problem with marking devices is false marking.
  • the private key and the ID can then be written to another, false product or to a plurality of false products.
  • the private key may only be generated by a certified manufacturer.
  • the private key is generated in the marking device itself. The private key in the marking device cannot be read by users.
  • a third digital document is written in device 2, that is the permit P2 253.
  • the permit 253 may define the basic mode of operation of the device 2. For example, it may define the use of the certificate 251 and the encryption keys therein. It may define a marking authority, that is an authority to mark various products, for example the Government of a country or a specific Governmental Department or Ministry. Permit 253 may actually mark the product, to indicate that it is an object of a specific kind. In one embodiment of the invention, after receiving a permit indicating the type of product, the marking device 2 will not accept another permit claiming the product to be different than that initial marking. Certificates and permits may be attested to by the issuing authority (the authority that prepared these digital documents) using one of two possible methods: either the document is encrypted with the private key of the issuer, or a digital signature is added to the document, with the document itself not being encrypted.
  • only authorized parties may mark a device 2, as indicated in a permit called "Marker Operating License” or MOL.
  • MOL Marker Operating License
  • device 2 receives a request by an objects manufacturer 32 to mark the device, manufacturer 32 has to present a permit or MOL signed by that marking authority, indicating that manufacturer 32 indeed has the right to mark products.
  • a permit may be transferable in a predefined hierarchical structure, that is a marking authority may empower others to mark products as well.
  • an authorized party may present a plurality of permits, which may be used to track their authorization to an ultimate, publicly known marking authority.
  • device 2 will accept a digital document or permit P2 253 and will write that permit in the permanent, nonvolatile memory of device 2.
  • the first permit will be accepted without check of originator ID.
  • a digital document may include information, rules and/or parameters, all signed by the marking entity.
  • the document includes any permit or permits attesting to the authority of that entity to perform that marking.
  • the reliability of the information therein may be evaluated based on those permits, so the reader may decide for himself whether that marking is acceptable.
  • the marking device includes means for accepting additional information and operating rules, which govern its subsequent operation, in the form of digital documents like MOLs in a specific marking format.
  • the marking device When required to store additional information and/or rules, the marking device checks the validity of each requirement, according to information and rules already stored therein. Only valid requests will be honored.
  • the permit 253 is encrypted or signed by manufacturer 32, for example using their private encryption key. This enables each manufacturer 32 of products to reliably mark their products and be responsible for the product and its marking.
  • the permit presented by manufacturer 32 may also state whether the permit is transferable, that is whether manufacturer 32 may empower others to write marking information into device 2.
  • the highest marking authority may be the Government of a country where the marking device is used.
  • a marking device 2 may be devised to accept either a single mark or a plurality of marks. In the former case, device 2 is programmed to accept only a single permit or marking information. It may also accept updates to the information stored therein, for example the same information signed with another digital key, or an enlarged package containing the previous information with additions that are in compliance with that prior information. The device may be programmed to accept an update, even if it contains new information, from the same source, that is a completely new permit may be issued by the same authority that issued the original permit.
  • the marking device 2 will accept a plurality of permits, rules and/or parameters and will store all the information in the marking device, to be presented to users (readers of the marking).
  • a marking device in a car may include an original description from the manufacturer of that car.
  • the vehicle registration authority there may add another permit reflecting the authorization/registration of the vehicle in that country. That second permit may be written into the marking device by the importer of the car.
  • the marking device may allow cancellation of marks therein by an authorized entity, if the initial permit stored therein permits it.
  • a hierarchy of certificates may thus be formed, wherein for example a first person who is marking devices 2 has a certificate from a second person to do so, with that second person, among others, having a certificate from a third person.
  • the first person When the first person marks a product, he also attaches to the document written therein the certificates from the second and third person. Thus, anyone reading the certificate in device 2 can verify all the certificates to ensure that the issuing authority (the first person) indeed has authorization ultimately derived from the third person.
  • a certificate or permit may be updated, subject to predefined rules written therein. For example, a new certificate will be accepted as long as it contains the same information (the same identity number or public key for the marking device) .
  • An update may reflect, for example, a new public key used by the known authority, the third person.
  • An update may reflect, for example, a new public key used by the known authority, the third person.
  • a hierarchical certificates structure when a center or member of that structure changes its encryption keys, it may be necessary for all certificates to update so as to use the new keys.
  • the marking device supports the hierarchical certificates structure with the means for updating certificates contained therein.
  • the mechanism for certificates updating may be used to achieve a dynamic marking device, which is capable of multiple updates.
  • a marking device may include means for automatically updating a certificate to an updated version. For example, when the device is presented with a certificate issued at a later date than that of a corresponding certificate stored in the device, the marking device may automatically replace the stored certificate with the new, updated certificate.
  • One of the parameters written into the marking device indicates whether a permit or certificate may be updated or not. Various change limitations may be included, relating to the various digital documents in the marking device. Another parameter indicates whether the marking device will accept just one permit or a plurality thereof.
  • the life cycle of a marked product thus may include the following stages:
  • the device includes a controller or computer. Writing an identification digital information package into the storage means in the device.
  • the information uniquely identifies each marking device. This may include, for example, the programming of an ID or certificate into the marking device. Only one identification information may be programmed, however that information may be later updated if the device is programmed to accept updates.
  • a permit indicating the device operates according to specific standards for permits, and basic rules or code that govern its operation are then written into the marking device.
  • marking information into the storage means in the marking device may include, for example, a marking permit written into the device.
  • a marking permit written into the device In single marking mode, the device will accept only one permit, but may allow later updates to it, if the device is programmed to accept updates.
  • marking device including presenting the marking information to the public and/or authorized persons, and/or updating the permit or certificate therein. This stage may be performed many times.
  • step (A) the marking device will generate an encryption key pair, as detailed elsewhere in the present disclosure.
  • step (D) also includes writing additional permits into the device, as well as updates of each permit.
  • a "Marker Operating License” or MOL may include the following information:
  • Receiver identification a) Issuer identification (ID corresponding, for example to Government or a designated Department or Agency, having a specific ID) b) Receiver identification (Marker's ID) c) Permit type: MOL for example d) Serial number
  • a single layer of marking authorities may be defined, or a hierarchical structure (tree-like for example) may be implemented by forbidding or permitting propagation, respectively. Date control may be implemented. 3. On expiration activities
  • the MOL may include an expiry date, in which case its validity has a limited time interval. Additional information in the MOL may specify what is to be done when that expiry date is met. One possibility is to kill the permit, that is to destroy all the information therein. Another possibility is to "vegetate” , that is do nothing until a specific event happens. This may allow for "revival" of the MOL under certain terms, or to allow only specific activities. For example, the device may only report its identity, without additional information.
  • Marking limitations a set of rules for specific activities, together with various limitations, for example relating to specific products or types of products, or referring to specific lists. These lists may be included in the device or may appear in other permits.
  • Timing limitations may be set, for example timing limits between the various markings.
  • a limit to the number and/or types of products that can be marked may be set as well.
  • Other limitations may be included.
  • Fig. 3B illustrates a possible process of writing additional information into the marking device 2.
  • a request from marking authority 33 to add to the information in device 2 will be evaluated according to the certificate 251 and permits 252, 253 already written in device 2. If the permit presented by authority 33 is acceptable, that is the permit is traceable to the higher marking authority indicated in the digital documents in device 2, then device 2 will accept a permit P3 254 and will write it in the digital nonvolatile memory of the device.
  • Authority 33 may write information regarding changes in ownership, for example. Only information that does not contradict the information and/or rules already written into the marking device 2 will be accepted.
  • device 2 is used to mark a car, then an authorized change in ownership may be recorded therein, together with additional relevant information like the date, name of new owner and more.
  • the police or insurance company may write details regarding that accident in device 2.
  • the present invention gives an "identity" and "history" to an object that previously was indistinguishable and without a readily available record of past events. Although objects are being marked at present, the marking may be tampered with relative ease. Although some records on objects are kept at present in various locations, these records may not be readily accessible and/or may be tampered with.
  • the present disclosure relates to electronic marking means that reliably assign an identity and a history to various objects or products.
  • device 2 may include a list of allowed and/or forbidden activities as stated in the MOL.
  • a controller in the product may check that list in the marking device to decide whether to allow that activity. For example, the marking device in a car may only permit its use by the registered owner.
  • the car computer may connect to the marking device, check the operation rules/permits and operate the car accordingly.
  • a communication link between the marking device and the car computer allows the transmission of a question or inquiry to the marking device. If the requested operation is permitted, then the marking device will issue a permit to the car computer.
  • all the requests to a car may pass through the marking device.
  • the marking device may contain a list of permissible operations/information to disclose, together with an indication of the person or persons allowed to do each one.
  • a request to the marking device will include the desired operation together with the identification of the person requiring it.
  • the marking device will present the information or perform as required if the request and ID of inquirer are compatible with that list.
  • the dialog with the marking device may include a challenge as known in the art.
  • the list of permissible operations may be hierarchical, as detailed below.
  • a permit may include various rules and/or parameters, as well as pointers to other permits or locations where other permits may be found.
  • a multi-level, interdepartmental permit may be achieved, allowing a product to receive several permits from several authorities, without the need to actually contact all those authorities personally each time. This may lessen the bureaucratic burden associated with the issuance of multiple permits for a product.
  • the MOL companion may include the required additional permits, to allow a reader to evaluate the MOL.
  • Fig. 3C illustrates the process of reading the marking information stored in device 2.
  • a user communicates with device 2 and, if predefined conditions are met, then device 2 presents all or part of the marking information stored therein.
  • the predefined conditions are optional - in another embodiment the device will unconditionally present the marking information .
  • the presented information may include, for example, a permit or permits together with the permits and/or certificate of the marking party.
  • User 34 may thus obtain information relating to the marked product, like the identity of that product, details on the manufacturer of the product and production date, as well as various events in the past of the product like changes in ownership, accidents, repairs etc.
  • Fig. 4 details an example of a method for answering inquiries relating to the marking information relating to a marked object and for writing additional information in the device.
  • the marking device becomes active when power is applied to the device (state 41 ), that is when the device is to be read or additional information is to be written therein.
  • the state 41 is not necessary when the device is continuously connected to a source of electrical power, however this may not be a practical solution.
  • the device enters a waiting state 42, waiting for an input signal from an external source, indicating a request for information or a request to write new information into the device. When such a request is received, then the device steps to state 43 (step C) .
  • step C The device checks for its integrity and the attachment to an object being marked in state 43. If the device functions OK and no tampering with was detected, then go to step E (state 45), otherwise go to step D
  • the device ceases all its activities and will communicate no longer with any external device (state 44). No marking information will be presented any longer, this preventing the attachment of the device to a false product .
  • the controller in the marking device may write in an internal nonvolatile memory the fact that the device was tampered with. This may be subsequently read in step (C) the next time, so even if an unauthorized person may later overcome the protection means of the marking device, the marking device will cease to function as such.
  • the memory of the device is erased or destroyed in an irreversible operation.
  • E The information from the external source is evaluated against the information stored in the marking device, including the certificate and permits, in state 45
  • the marking device answers by sending out the marking information stored therein
  • the request is only checked for its being a request for information, so that practically the device responds to anyone
  • the marking device only responds to legitimate users, that is users who can present a predefined permit signed by a specific authority
  • the information in the device is compartmentalized, with various parts of the information being made available to authorized users For example, the identification of a car including its manufacturer and date of production may be presented to anyone Information relating to present ownership may be presented only to police officers Still more sensitive information relating for example to past owners, accidents or traffic offenses may be only presented to persons authorized to receive this information F.
  • the device next checks (state 46) whether new information is to be written into the marking device. If yes, then go to step G, else go to step H (state 48) to go back to the waiting state 42 (step B).
  • the device receives information to be written therein, as digital documents or permits. If the new information corresponds to the permits in the device (that is, the information is written by a marking authority having the right permit to do so), then the new information is written in the marking device (state 47).
  • Steps (C), (D) provide the protection against tampering with the device if the device does not include means for self-destruction when it is being removed from the marked product. Even when such means are present as detailed above, the software protection achieved in these steps provide an additional layer of protection.
  • the marking device may be programmed to respond only after a self-test, so that a response will be issued only if the device has not been tampered with. Moreover, the answer may be conditional, according to predefined rules programmed into the marking device in a permit.
  • a Government or other highest marking authority may issue permits or a Marker Operating License (MOL) to the people or firms or organizations that perform the actual marking of products. The actual marking may be done by importers and/or manufacturers of the relevant products.
  • the MOL may be self-contained, or may indicate other permits that are to be included as attachments or may be found elsewhere. A web of permits may thus be formed, with a permit indicating other permit or permits that are to be included in the device or are to be found elsewhere.
  • a permit may indicate the properties of a marked product, and may include all or part of the following items:
  • Marking propagation a) Can the marker allow other entities to mark in his name and, if so, what are the limitations for that propagation. b) Is the marker limited in the number of marks he can create. c) Is the marker operation limited in time and, if so, the date of expiry of their authorization.
  • Marking limitations a) What type of object or product can be marked, and what are the actions and rules to follow. A list of products or product types may be included. A standard list may be referenced, possibly with additions and/or exclusions. The list may be made of object limitations. 3. Object limitations
  • Some products require a special license of a new owner. For example, a car may require a driving license, or a gun may require a license to hold it.
  • An object may be required to report its ownership when asked to do so, or may not report ownership, or may report ownership under certain conditions. For example, an object may not report its ownership to anyone but a police officer.
  • the marking device for an object may optionally store and report a list of prior owners of the marked object.
  • Temporal usage information a) Temporal usage information. Specific criteria may be defined and checked, referring to services beyond the basic services being requested by someone who is not the present owner of the object. These services refer to control or use of the object without an ownership thereto.
  • Service usage limitations vector Several criteria may be checked when a service is asked, for example:
  • Limitations of use - a car may not be allowed to exceed a predefined speed, however a special license may permit that.
  • a special license may permit that.
  • another license may be required, like a technician license.
  • Basic services may include, for example:
  • Change properties when the marking device is required to change certain properties of a service.
  • a request should include information indicating what service to change, and what change is required.
  • the marking device may initially assign default values to all the properties therein, according to the MOL.
  • the default properties preferably refer to the extended services.
  • Remove extended service an optional basic service that allows to remove extended services.
  • Extended services are additional services that are application-dependent.
  • the data in the vector may include:
  • a list may be actually included or reference may be made to an external list to be found in another location.
  • a list there may be included additions to the list or items to be excluded therefrom.
  • Fig 5 illustrates a multi-level decision structure in a MOL permit
  • the list of permissible operations may be hierarchical, including for example levels 51 , 52, 53 and 54, each level corresponding to a permit level
  • a typical level 52 includes a header 521 and a footer 522.
  • the header 521 and the footer 522 include logical rules and may include function calls referring to adjacent levels in the hierarchy
  • Each set of rules is a Boolean function, with the result being 1 or 0, corresponding to True or False
  • Controller 24 makes an inquiry, for which a decision is required The inquiry is presented to the header 51 1 in the first level 51 of the permit
  • header 51 1 The logic rules in header 51 1 are evaluated to reach a decision One of the rules in header 51 1 indicates whether additions to the rules is allowed If negative, then the final decision is reached in header 51 1 If positive, then the rules in the adjacent lower level 521 are evaluated next.
  • the rules in header 521 are evaluated, and the lower adjacent header in level 53 is activated if necessary Similarly, the decision rules evaluation is passed to headers in lower levels If a final decision is reached at in one of the headers, the result is transferred up, from one level to the adjacent higher level, up to the highest level 51 where the result is delivered to controller 24.
  • the inquiry is passed from one footer to the next higher footer for rules evaluation there, until a level is reached where a final decision is made.
  • the decision, or result of the Boolean rules is sent down, that is from one footer to the adjacent lower footer, down to the footer in the lowest level 54.
  • the decision is passed up through adjacent headers, until the decision reaches the header 51 1 in level 51 .
  • level 52 includes a header 521 that may call header 531 , so that the lower level 53 may participate in the decision taking.
  • level 51 includes header 51 1 and footer 512; level 54 includes header 541 and footer 542.
  • the footer 522 includes default rules for the level 52. These rules can call footer 512.
  • the footer at the first level 51 cannot reference a previous footer since there is none.
  • Each of the illustrated levels 51 , 52, 53 and 54 thus includes a header with logic rules and links to adjacent levels.
  • a vector may be assigned to each operation, including the various rules at a given level in the hierarchy, as well as rules connecting to the two adjacent levels therein.
  • the rules may be written in the Java language for example.
  • a marking system there may be two hierarchies: One hierarchy corresponding to the decision levels in a permit, and a second hierarchy relating to the limitations after a product has been marked.
  • a permit called "Marker Operating License” or MOL may be built of several permit levels. Every entity that receives a MOL can issue a next level permit, under the authorization of the permit it got from the previous level.
  • a first (highest) level may be a Government authorizing a car importer to mark a car.
  • a second level may be the car importer, authorizing a worker to mark a car.
  • a third level may be the worker authorizing the car to be of a specific kind. Each next level is issued under the limitations of the previous level.
  • the whole permit list is called a MOL, and there are levels as described above.
  • the definition of actions may appear in the MOL in object properties of each level. Also, after an object has been marked, there can be addition outside of the MOL (external levels).
  • a vector may be provided, which may contain the following data:
  • action name is a name for the action to be described.
  • the action code may be a Java code to be performed when this action is executed.
  • the code may reference other actions to be performed. It is preferably supplied internally or by first level.
  • Limitations may be implemented as Boolean functions. These functions may be implemented in the Java language for example.
  • Limitations are evaluated to give a result that is either TRUE or FALSE. According to the result, the requested action will be performed or denied.
  • Each action's limitations are evaluated when the action is requested.
  • MOL external levels can be added. They are single level permits from the entity that is issuing to the SCPU, and contain data similar to a MOL level. MOL external addition limitations are evaluated when there is a request to add an external level.
  • MOL external removal limitations are evaluated when there is a request to remove the last external addition.
  • the limitations may appear on each level of the MOL.
  • the first, or highest level has full freedom of action.
  • each level may include limitations set by higher levels.
  • Each level may also set a default choice, possibly in the footer, indicative of lower levels it may reference.
  • the limitations are established as detailed below.
  • Each level either regular or external has two places to hold limitations, that is a header and a footer.
  • Each one of the header and footer includes a Boolean (logic) expression that may be evaluated to give either a true or false result.
  • the expression may reference any kind of variables, functions and/or constants in the system.
  • Each header may reference the next (lower) level header, for example by calling the next level header function which may be generally named "NextLevel” .
  • NextLevel This function gets a true or false value, depending on the result of the evaluation at the lower level.
  • the footer may reference the previous (higher) level footer in the same way. The above applies to all levels except the first (highest level) footer, which is not allowed to reference the previous level, since there is none.
  • the header of the last level is followed by the footer of the last level.
  • Figs. 6A and 6B illustrate an example of a multi-level decision
  • Fig. 6A detailing the hierarchical issuance of permits.
  • MOL permit to the car manufacturer 36, that is a first level permit.
  • the car manufacturer 36 may now issue a MOL marking permit under it, to the car 37 itself. This MOL is a second level permit.
  • the Government 35 demands that a car would reveal its ownership information when asked to by a police officer. Also, the Government allows lower levels in the hierarchy to set other conditions in which a car would reveal the ownership information.
  • the above terms are defined in the Boolean equations in header 551 of level 55 in the permit.
  • Level 55 see Fig. 6B , details part of the first level MOL permit.
  • Fig. 6B details part of the vector relating to ownership information.
  • the car manufacturer 36 added the second level 56 of the permit, indicating that a car should reveal ownership information to a qualified technician during working hours, that is when the time is between 8:00 and 17:00 .
  • NextLevel references in the lowest level always go to the footer in the same level.
  • the footer 562 references to NextLevel, thus the next footer is evaluated.
  • the next footer is footer 552 in the level 55 that is adjacent to level 56.
  • the value of footer 552 is False, therefore the NextLevel variable receives a False value, and the whole process gives a False result.
  • the final result is that the ownership information will not be revealed in this case.
  • a possible embodiment of the marking device is as a device embedded in a personal computer.
  • the device may be implemented as an integrated circuit, a module or a board.
  • the device may be embedded as a component that is part of the motherboard or other part of the computer.
  • the marking device is electrically connected to the computer to allow communications between the computer and the marking device.
  • the computer may read the marking information and perform various tasks accordingly.
  • the device may thus be used to mark a computer, so that computer acquires a unique identity.
  • a marked computer There may be various uses to such a marked computer, for example to permit software packages to run only on a specific computer. This may help eliminate software piracy and allow elaborate uses such as pay-for-use software.
  • the marking device may be used to mark cellular phones. This is useful to help prevent cloning of cellular phones.
  • a cellular system may identify each wireless phone, to prevent fraud.
  • the marking device of the present invention may also be used to control an object it is attached to.
  • the marking device may be connected to control inputs in a product.
  • the marking device when attached to an object, may be used as a secure interface with that object .
  • a simple implementation of the latter implementation is a remote control of the ON/OFF function of a device. When the device is OFF, then all its local controls are inactive. When the device is turned ON through the secure channel and the marking device , then the local controls on the object itself may be used .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • General Factory Administration (AREA)

Abstract

L'invention concerne un dispositif de marquage d'un produit, comprenant: un canal d'entrée/sortie permettant d'accepter une interrogation et de répondre à celle-ci au moyen d'informations de marquage enregistrés dans le dispositif; des moyens permettant de solidariser le dispositif sur le produit marqué; une mémoire numérique destinée au stockage des informations de marquage; et un contrôleur permettant de recevoir une interrogation via le canal d'entrée/sortie. L'invention concerne également un procédé de marquage d'un produit, consistant: A) à fabriquer un dispositif de marquage électronique comprenant un canal d'entrée/sortie, des moyens permettant de solidariser ledit dispositif sur le produit marqué, une mémoire numérique destinée au stockage des informations de marquage et d'informations supplémentaires, et des moyens de commande; B) à fixer le dispositif de marquage sur un produit à marquer; et C) à procéder à l'écriture d'informations de marquage dans la mémoire.
EP99954325A 1998-11-10 1999-11-10 Systeme et procede de marquage Withdrawn EP1221222A4 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IL12698898A IL126988A0 (en) 1998-11-10 1998-11-10 Marking system and method
IL12698898 1998-11-10
PCT/IL1999/000603 WO2000028508A2 (fr) 1998-11-10 1999-11-10 Systeme et procede de marquage

Publications (2)

Publication Number Publication Date
EP1221222A2 true EP1221222A2 (fr) 2002-07-10
EP1221222A4 EP1221222A4 (fr) 2006-01-04

Family

ID=11072126

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99954325A Withdrawn EP1221222A4 (fr) 1998-11-10 1999-11-10 Systeme et procede de marquage

Country Status (4)

Country Link
EP (1) EP1221222A4 (fr)
AU (1) AU1073100A (fr)
IL (1) IL126988A0 (fr)
WO (1) WO2000028508A2 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10336321A1 (de) * 2003-08-05 2005-03-03 Deutsche Telekom Ag Sensitives Smart-Label
US20070278285A1 (en) * 2004-02-19 2007-12-06 Cypak Ab Secure Data Management Device and Method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3313481A1 (de) * 1983-04-14 1984-10-25 Daimler-Benz Ag, 7000 Stuttgart Einrichtung zur kennzeichnung und indentifizierung von kraftfahrzeugen
EP0292249A2 (fr) * 1987-05-19 1988-11-23 THE GENERAL ELECTRIC COMPANY, p.l.c. Système de mémorisation de données
EP0586192A1 (fr) * 1992-08-29 1994-03-09 Pilkington Micro-Electronics Limited Système électronique d'identification avec protection contre l'effraction
US5539828A (en) * 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
WO1997011440A2 (fr) * 1995-09-14 1997-03-27 Elsdale Limited Procede et systeme permettant de simplifier des operations d'ordre administratif et la gestion d'une pluralite de vehicules

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5047928A (en) * 1986-10-24 1991-09-10 Wiedemer John D Billing system for computer software
US5212729A (en) * 1992-01-22 1993-05-18 Schafer Randy J Computer data security device and method
US5473692A (en) * 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
DE69532434T2 (de) * 1994-10-27 2004-11-11 Mitsubishi Corp. Gerät für Dateiurheberrechte-Verwaltungssystem
US5845303A (en) * 1994-12-06 1998-12-01 Netpodium, Inc. Document processing using frame-based templates with hierarchical tagging
US5692049A (en) * 1995-02-13 1997-11-25 Eta Technologies Corporation Personal access management system
US5826011A (en) * 1995-12-26 1998-10-20 Rainbow Technologies, Inc. Method of metering and protecting computer software
DE19549014C1 (de) * 1995-12-28 1997-02-20 Siemens Ag Verfahren zum Aktivieren und Ausführen von gesicherten Funktionen in einem Kommunikationssystem
US5758361A (en) * 1996-03-20 1998-05-26 Sun Microsystems, Inc. Document editor for linear and space efficient representation of hierarchical documents

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3313481A1 (de) * 1983-04-14 1984-10-25 Daimler-Benz Ag, 7000 Stuttgart Einrichtung zur kennzeichnung und indentifizierung von kraftfahrzeugen
EP0292249A2 (fr) * 1987-05-19 1988-11-23 THE GENERAL ELECTRIC COMPANY, p.l.c. Système de mémorisation de données
EP0586192A1 (fr) * 1992-08-29 1994-03-09 Pilkington Micro-Electronics Limited Système électronique d'identification avec protection contre l'effraction
US5539828A (en) * 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
WO1997011440A2 (fr) * 1995-09-14 1997-03-27 Elsdale Limited Procede et systeme permettant de simplifier des operations d'ordre administratif et la gestion d'une pluralite de vehicules

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO0028508A2 *

Also Published As

Publication number Publication date
AU1073100A (en) 2000-05-29
WO2000028508A3 (fr) 2000-11-09
WO2000028508A8 (fr) 2001-01-18
IL126988A0 (en) 1999-09-22
EP1221222A4 (fr) 2006-01-04
WO2000028508A2 (fr) 2000-05-18

Similar Documents

Publication Publication Date Title
US4549075A (en) Method for certifying the origin of at least one item of information stored in the memory of a first electronic device and transmitted to a second electronic device, and system for carrying out the method
JP4276259B2 (ja) タグ読み取り機能を備えた移動通信端末機及び真正品認証サービス提供方法
US5351302A (en) Method for authenticating objects identified by images or other identifying information
JP4434549B2 (ja) 管理装置および管理方法
KR100404869B1 (ko) 상품의 진위여부 확인방법 및 이를 위한 시스템
JP2015149083A (ja) 管理システム
JP2009535900A (ja) リンク不可能な識別子を使用して、プライバシー強化された識別子スキーム
CA2208055A1 (fr) Systeme de verification de l'utilisation d'une carte de credit/d'identite, a enregistrement des attributs physiques des utilisateurs non autorises
CN105393517A (zh) 外部安全单元
US9111082B2 (en) Secure electronic identification device
CN103186846A (zh) 一种智能电子印章系统及其授权控制方法
RU2199781C1 (ru) Способ маркировки товара, или изделия, или конструкции с последующей идентификацией (варианты) и система проведения идентификации товара или изделия, или конструкции с указанной маркировкой (варианты)
WO2009081570A1 (fr) Système d'authentification et verrou électronique
JPH1145366A (ja) 個人確認システム
JPH10154131A (ja) ファイルアクセス管理システム
EP1221222A2 (fr) Systeme et procede de marquage
RU2281552C2 (ru) Способ маркировки и идентификации объекта (варианты) и система проведения идентификации объекта с указанной маркировкой (варианты)
RU2412484C2 (ru) Защищенный переносной терминал для электронных транзакций и защищенная система электронных транзакций
JP2502052B2 (ja) 複数の個人識別情報を持つicカ−ド
US20120210418A1 (en) Security element having an electronic display device for displaying security-relevant information or patterns
JP4607483B2 (ja) Idタグおよびリーダ・ライタ
WO2008135921A1 (fr) Procédé et système destiné à préparer, personnaliser et émettre des jetons d'identification
JP4724408B2 (ja) 保護情報のセキュリティ方法及びそのシステム
RU24025U1 (ru) Система маркировки и проведения идентификации объекта с указанной маркировкой (варианты)
US20040131409A1 (en) Method for providing identification codes for articles

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20010822

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

A4 Supplementary search report drawn up and despatched

Effective date: 20051123

17Q First examination report despatched

Effective date: 20090220

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20090703