EP1287221A1 - Verfahren und vorrichtung zur zugangskontrolle zu einem gesicherten ort, insbesondere einem kraftfahrzeug - Google Patents
Verfahren und vorrichtung zur zugangskontrolle zu einem gesicherten ort, insbesondere einem kraftfahrzeugInfo
- Publication number
- EP1287221A1 EP1287221A1 EP00969282A EP00969282A EP1287221A1 EP 1287221 A1 EP1287221 A1 EP 1287221A1 EP 00969282 A EP00969282 A EP 00969282A EP 00969282 A EP00969282 A EP 00969282A EP 1287221 A1 EP1287221 A1 EP 1287221A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- electronic key
- base station
- communication mode
- received
- response signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000008569 process Effects 0.000 claims abstract description 8
- 230000004044 response Effects 0.000 claims description 32
- 230000003595 spectral effect Effects 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005284 excitation Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00341—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one limited data transmission ranges
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00555—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks comprising means to detect or avoid relay attacks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00777—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by induction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00793—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
Definitions
- the invention relates to a method and a device for access control to a secure location, in particular to a motor vehicle, in which these devices exchange authentication data wirelessly between an electronic key and a base station in an active or a passive communication mode, the base station being activated at the beginning of this authentication process the electronic key sends a call signal and this responds to the call signal with a response signal, and in the active communication mode a security procedure is carried out against a radio link extension, and a device for performing this method.
- the intercepted signal via a radio link change to another attacker who is in the vicinity of the electronic key is located, forwarded and the other attacker then the response signal of the electronic key to the call signal of the base station over the radio link extension back to first attacker and sends back to the base station via this
- the known method provides that the electronic key transmits a signal to the base station, which is converted into spectral data by the base station. The base station then only grants access to the secure location if the Transmission of the authentication data, these spectral data correspond to a spectral signature of the electronic key stored in the base station.
- the signal transmitted by the electronic key has at least two tones with different frequencies f-
- the base station examines the response signal it received from the electronic key in which communication mode this response signal was received, and in that the base station in the event that the response signal of the electronic key was received in the active communication mode , sends a first selection command to the electronic key, which causes the electronic key to carry out the subsequent communication in the active communication mode and, in the event that the response signal of the electronic key was received in the passive communication mode, unites the base station to the electronic key sends a second selection command, which causes the electronic key to carry out the subsequent communication in passive communication mode
- the inventive method advantageously ensures that even in passive communication mode between the electronic key and the base station, a corresponding attack by an unauthorized person can be warded off by the base station being active in the type of communication in which it receives the response signal from the electronic Key receives, reacts If the response signal occurs in the active communication mode, the further authentication procedure is carried out in the active communication mode and a radio link extension can be excluded by the known security procedure.
- the base station receives the response signal of the electronic key in passive communication mode, it prevents until the completion of the Access procedure in an advantageous manner, a communication between the base station and the key via the first, active communication mode. It is therefore not possible for an on gripper performs a radio link extension over a frequency of the active communication mode
- Figure 1 is a schematic diagram of an embodiment of the method.
- FIG. 1 is the starting point of the method described below for access control to a secure location, here to a motor vehicle F.
- a base station 10 is arranged in the motor vehicle F, which wirelessly exchanges authentication data with an electronic key 20 in order to ensure that only the owner of the electronic key 20 can gain access to the secure location.
- the base station 10 sends out a call signal WA for the electronic key 20 in an active, first communication mode when an actuator B, e.g. B. a door handle on the motor vehicle F is operated.
- the electronic key 20 then responds in the active communication mode with a corresponding response signal R, whereby a communication connection running in the active communication mode is established between the electronic key 20 and the base station 10.
- the data transmitted between the electronic key 20 and the base station 10 are determined by a communication protocol which is known per se and is therefore no longer described, which the electronic key 20 and the base station 10 follow and the transmission of authentication data from the electronic key 20 to the Base station 10 includes.
- Access to the secured motor vehicle F is only permitted by the base station 10 if the authentication data transmitted by the electronic key 20 match the authentications stored by the base station 10. It is provided here that the signals emitted by the electronic key 20 and / or by the base station 10 have only a limited range, in order to prevent the base station 10 from granting access to the secured motor vehicle F even when the electronic key is located 20 is not within a defined environment - typically a few meters - of the motor vehicle F.
- Radio link extension V forwards to a second attacker B, who then passes the call signal WA of the base station 10 to the electronic key 20 which is out of the range of the base station 10, forwards the response signal R of the electronic key 20 via the radio link extension V to the first attacker A and forwards it then forwards the response signal R of the electronic key 20 to the base station 10, it is provided that the communication taking place between the electronic key 20 and the base station 10 in the first, active communication mode also has a security procedure which allows such a radio link extension V of the corresponding one To recognize signals WA, R and, if necessary, then to terminate the communication.
- the electronic key 20 transmits an identification signal within the framework of its response signal R generated in response to the call signal WA of the base station 10
- Base station 10 converts into spectral data and only continues the communication with the electronic key 20 if the spectral data received by it matches the spectral signature of the electronic key 20, which is stored in the base station 10, in particular it is provided here that the electronic keys 20 two tones with the frequency f-
- the base station 10 not only evaluates the information content of the signals supplied to it, in particular the response signal R of the key 20, but also examines whether the signals supplied to it by the electronic key 20 are in the first, active communication mode or are received in the second, passive communication mode.
- the base station 10 If the base station 10 receives the response signal R generated by the electronic key 20 in response to a call command WA sent by it in the first, active communication mode, it sends in response to the response signal R of the electronic signal received in the active communication mode Final ice 20 to this a first selection signal S1, which - in addition to the usual functions of a selection signal - causes at least the security-relevant and preferably all further communication between the electronic key 20 and the base station 10 can be carried out in the first, active communication mode and the implementation of the remaining authentication process in the passive communication mode is prevented.
- This has the advantage that a radio link extension V can be detected by the security procedure of the active communication mode and, if necessary, appropriate measures are taken against an attack by a non-authorized person can
- the base station 10 of the motor vehicle F receives the response signal R of the electronic key 20 in the second, passive communication mode, it sends a second selection signal S2 in response to the electronic key 20, which in a corresponding manner causes the communication of the further authentication process is carried out in the second, passive communication mode, and the implementation of the remaining authentication process in the first communication mode is prevented. It is therefore a working in the active communication mode Attackers using radio link extension V are no longer able to use it successfully.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19949970 | 1999-10-16 | ||
DE19949970A DE19949970A1 (de) | 1999-10-16 | 1999-10-16 | Verfahren und Vorrichtung zur Zugangskontrolle zu einem gesicherten Ort, insbesondere einem Kraftfahrzeug |
PCT/EP2000/009276 WO2001029352A1 (de) | 1999-10-16 | 2000-09-22 | Verfahren und vorrichtung zur zugangskontrolle zu einem gesicherten ort, insbesondere einem kraftfahrzeug |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1287221A1 true EP1287221A1 (de) | 2003-03-05 |
EP1287221B1 EP1287221B1 (de) | 2006-05-10 |
Family
ID=7925919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP00969282A Expired - Lifetime EP1287221B1 (de) | 1999-10-16 | 2000-09-22 | Verfahren und vorrichtung zur zugangskontrolle zu einem gesicherten ort, insbesondere einem kraftfahrzeug |
Country Status (6)
Country | Link |
---|---|
US (1) | US6954007B1 (de) |
EP (1) | EP1287221B1 (de) |
JP (1) | JP2003512549A (de) |
CN (1) | CN1285815C (de) |
DE (2) | DE19949970A1 (de) |
WO (1) | WO2001029352A1 (de) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10246060B4 (de) * | 2002-10-02 | 2012-06-28 | Robert Bosch Gmbh | Vorrichtung zur sicheren Signalerzeugung |
CN1813271B (zh) | 2003-06-25 | 2010-12-01 | Nxp股份有限公司 | 用于提高应答器系统-尤其是针对接近汽车的应答器系统的安全性的方法和装置 |
CN1977279B (zh) * | 2004-06-15 | 2011-02-23 | Nxp股份有限公司 | 具有附加近距离校验的无线电识别 |
DE102005061660A1 (de) * | 2005-12-22 | 2007-06-28 | Giesecke & Devrient Gmbh | Tragbarer Datenträger mit aktiver Kontaktlosschnittstelle |
US20100274570A1 (en) * | 2009-04-24 | 2010-10-28 | Gm Global Technology Operations, Inc. | Vehicle charging authorization |
US8725330B2 (en) | 2010-06-02 | 2014-05-13 | Bryan Marc Failing | Increasing vehicle security |
CN102201135A (zh) * | 2011-05-26 | 2011-09-28 | 深圳中兴力维技术有限公司 | 一种应用于基站的门禁管理方法 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2239571B (en) * | 1989-12-29 | 1994-08-03 | Schlumberger Ind Ltd | Transponder |
DE4003280C5 (de) * | 1990-02-03 | 2007-06-28 | Bayerische Motoren Werke Ag | Sicherheitseinrichtung für Kraftfahrzeuge |
DE4226053C2 (de) * | 1991-08-09 | 1994-12-01 | Alps Electric Co Ltd | Fernbedienungseinrichtung für eine KFZ-Schließanlage |
DE4329697C2 (de) | 1993-09-02 | 1995-10-05 | Siemens Ag | Fernsteuerbare Zugangskontrolleinrichtung |
EP0659963A1 (de) * | 1993-12-20 | 1995-06-28 | Siemens Aktiengesellschaft | Elektronische Wegfahrsperre für ein Kraftfahrzeug |
DE4409167C1 (de) * | 1994-03-17 | 1995-06-29 | Siemens Ag | Schlüssellose Zugangskontrolleinrichtung |
DE4440855C2 (de) * | 1994-11-15 | 2000-04-06 | Simons & Vos Identifikationssy | Kontrollsystem |
DE19539851C2 (de) | 1995-10-26 | 1999-01-07 | Daimler Benz Ag | Schlüssel-Fahrzeug-Kommunikationseinrichtung zur Ansteuerung einer Wegfahrsperre und einer fernbedienbaren Funktion |
DE19632025C2 (de) * | 1996-08-08 | 1998-07-23 | Daimler Benz Ag | Authentikationseinrichtung mit elektronischer Authentikationskommunikation |
US6323566B1 (en) * | 1996-10-10 | 2001-11-27 | Texas Instruments Incorported | Transponder for remote keyless entry systems |
EP0848123B1 (de) | 1996-10-10 | 2004-12-08 | Texas Instruments Deutschland Gmbh | Fernbedienbares schlüsselloses Eingangssystem |
US5883443A (en) * | 1997-06-27 | 1999-03-16 | Ut Automotive Dearborn, Inc. | Countermeasure method and system for securing a remote keyless entry system |
DE19802526B4 (de) * | 1998-01-26 | 2006-02-09 | Robert Bosch Gmbh | Vorrichtung zur Kontrolle der Zugangsberechtigung |
DE19818158A1 (de) * | 1998-04-23 | 1999-10-28 | Huf Huelsbeck & Fuerst Gmbh | Fernbedienungssystem zum Ansteuern für an Fahrzeugen befindlichen Zugangs-Kontrolleinrichtungen |
AU743933B2 (en) * | 1998-07-20 | 2002-02-07 | Robert Bosch Gmbh | An entry system |
DE19836957C1 (de) * | 1998-08-14 | 1999-09-30 | Siemens Ag | Diebstahlschutzeinrichtung für ein Kraftfahrzeug und Verfahren zum Betreiben der Diebstahlschutzeinrichtung |
JP2000160896A (ja) * | 1998-12-01 | 2000-06-13 | Tokai Rika Co Ltd | 車両用遠隔操作装置 |
-
1999
- 1999-10-16 DE DE19949970A patent/DE19949970A1/de not_active Withdrawn
-
2000
- 2000-09-22 JP JP2001532319A patent/JP2003512549A/ja active Pending
- 2000-09-22 EP EP00969282A patent/EP1287221B1/de not_active Expired - Lifetime
- 2000-09-22 WO PCT/EP2000/009276 patent/WO2001029352A1/de active IP Right Grant
- 2000-09-22 CN CN00814391.9A patent/CN1285815C/zh not_active Expired - Fee Related
- 2000-09-22 US US10/110,825 patent/US6954007B1/en not_active Expired - Fee Related
- 2000-09-22 DE DE50012740T patent/DE50012740D1/de not_active Expired - Lifetime
Non-Patent Citations (1)
Title |
---|
See references of WO0129352A1 * |
Also Published As
Publication number | Publication date |
---|---|
CN1379841A (zh) | 2002-11-13 |
US6954007B1 (en) | 2005-10-11 |
EP1287221B1 (de) | 2006-05-10 |
JP2003512549A (ja) | 2003-04-02 |
CN1285815C (zh) | 2006-11-22 |
DE19949970A1 (de) | 2001-04-19 |
WO2001029352A1 (de) | 2001-04-26 |
DE50012740D1 (de) | 2006-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60226097T2 (de) | Passives Zugangssystem mit Antidiebstahlsfunktion | |
DE10109869B4 (de) | System und Verfahren zur automatischen Funktionsbestätigung mit gesteuerter Distanzkommunikation mit fahrzeugbasierter Frequenzauswahl | |
DE102017210523B3 (de) | Verfahren zum Betreiben einer passiven funkbasierten Schließvorrichtung und passive funkbasierte Schließvorrichtung | |
EP1136955A2 (de) | Anordnung für ein Zugangssicherungssystem | |
DE102004047187B4 (de) | Verfahren zur Vermeidung eines unberechtigten Zugriffs auf ein passives Zugangsberechtigungssystem eines Kraftfahrzeugs | |
DE102019120207A1 (de) | Passives schlüsselloses Zugangssystem | |
DE112018005901T5 (de) | Verfahren und system zur verhinderung von relais-angriffen | |
EP3504688A1 (de) | FUNKSCHLÜSSEL-SCHLIEßVORRICHTUNG FÜR EIN KRAFTFAHRZEUG, KRAFTFAHRZEUG UND VERFAHREN ZUM BETREIBEN DER SCHLIEßVORRICHTUNG | |
EP1287221B1 (de) | Verfahren und vorrichtung zur zugangskontrolle zu einem gesicherten ort, insbesondere einem kraftfahrzeug | |
WO2018145826A1 (de) | Verfahren zur positionsbestimmung eines mobilen ble-geräts | |
EP1081000B1 (de) | Sicherungseinrichtung | |
EP1020335B1 (de) | Verfahren zum Authentisieren eines Ersatzschlüssels zum Benutzen eines Fahrzeugs | |
EP1317824A2 (de) | Verfahren und system zur zugangskontrolle | |
EP3777282B1 (de) | Erkennung von angriffen auf funkautorisierungssysteme | |
EP0999103B1 (de) | Benutzeridentifikationsvorrichtung | |
EP1246137A1 (de) | Identifikationssystem zum Nachweis einer Berechtigung für den Zugang zu einem Objekt oder die Benutzung eines Objekts, insbesondere eines Kraftfahrzeugs | |
DE10143203B4 (de) | Elektonische Steuereinheit für eine variable Datenübertragung mit Impulsbreitenmodulation | |
DE112020001878T5 (de) | Kommunikationssystem und Steuervorrichtung | |
DE102016201786A1 (de) | Zusatzgerät zur Verwendung mit einem intelligenten Gerät sowie System und Verfahren mit einem solchen Zusatzgerät | |
EP0923054A2 (de) | Verfahren und Vorrichtung zur Prüfung der Nutzungsberechtigung für Zugangskontrolleinrichtungen | |
DE102008007842B3 (de) | Synchronisation der Kommunikation zwischen Identifikationsgeber und Fahrzeugstation einer Zugangsvorrichtung | |
EP2469481B1 (de) | Sicherungssystem und Sicherungsverfahren | |
EP1227017B1 (de) | Verfahren zum Betreiben eines Zugangskontrollsystems, insbesondere für ein Kraftfahrzeug, und Zugangskontrollsystem | |
DE10027380A1 (de) | Vorrichtung und Verfahren zum Betreiben eines Berechtigungssystems | |
EP3530022B1 (de) | Maschine zur verarbeitung von lebensmitteln und verpackungsprodukten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20020724 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): DE FR GB IT |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB IT |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 20060510 |
|
REF | Corresponds to: |
Ref document number: 50012740 Country of ref document: DE Date of ref document: 20060614 Kind code of ref document: P |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20070213 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 16 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 17 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20170926 Year of fee payment: 18 Ref country code: GB Payment date: 20170929 Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20171002 Year of fee payment: 18 Ref country code: DE Payment date: 20170930 Year of fee payment: 18 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 50012740 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20180922 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180922 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190402 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180930 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180922 |