EP1314114A4 - Procede et appareil utilisant un code d'adressage indirect pour distribuer un article physique - Google Patents

Procede et appareil utilisant un code d'adressage indirect pour distribuer un article physique

Info

Publication number
EP1314114A4
EP1314114A4 EP01906680A EP01906680A EP1314114A4 EP 1314114 A4 EP1314114 A4 EP 1314114A4 EP 01906680 A EP01906680 A EP 01906680A EP 01906680 A EP01906680 A EP 01906680A EP 1314114 A4 EP1314114 A4 EP 1314114A4
Authority
EP
European Patent Office
Prior art keywords
iac
address
deliverable
item
recipient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP01906680A
Other languages
German (de)
English (en)
Other versions
EP1314114A1 (fr
Inventor
William Deans
Prasanna Mulgaonkar
Gregory Myers
J Peter Marcotullio
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ADDRESSFREE Corp
Original Assignee
ADDRESSFREE CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ADDRESSFREE CORP filed Critical ADDRESSFREE CORP
Publication of EP1314114A1 publication Critical patent/EP1314114A1/fr
Publication of EP1314114A4 publication Critical patent/EP1314114A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management

Definitions

  • the field of the invention is delivery systems for physical items.
  • the NCOA database attempts to provide data to enable evaluation of a former deliverable address into a current deliverable address.
  • the address on the mail piece may not be susceptible to evaluation into the recipient's current deliverable address by that system.
  • the address may be illegible or it may not have a corresponding entry in the NCOA database (entries in the NCOA expire after a certain amount of time.)
  • a more efficient system might decrease the quantity of items requiring NCOA evaluation while at the same time reducing the cost, inconvenience and potential for error.
  • P.O. Boxes Another way of dealing with a highly mobile society is through the use of Post Office Boxes (P.O. Boxes), because the P.O. Box allows a recipient to move locally and still maintain the same mailing address.
  • P.O. Boxes a problem with P.O. Boxes is that it is often necessary for the recipient to travel to the location of the box. Therefore, if the person has moved out of the local area, it may be inconvenient for them to retrieve mail from the box.
  • the use of the deliverable address may be undesirable for a variety of reasons, many of which amount to a loss of privacy.
  • a deliverable address can often be used as a unique identifier for a customer, enabling the correlation of customer purchases with customer identity.
  • the result of such a correlation is a "profile" of the customer's interests and buying habits, and while such a profile may allow the business to tailor its services to the customer, it may also expose the customer to unwanted solicitations.
  • the risk is not imaginary.
  • One method that contemplates the use of an undeliverable address is the method proposedby iprivacy.com. .privacy's method contemplates an online purchaser downloading software that encrypts the purchaser's identity and address into a "private" identity and address.
  • the "private" data is communicated to the online vendor who does not become aware of the "true" identity and address of the purchaser.
  • Decryption software is required by the entity that decrypts the "private" address into a "true” address, iprivacy's method is inadequate, however, because a method that relies on software to enable decryption of a "private” address is subject to security breaches by anyone who can obtain the software and thus the decryption algorithm.
  • a better system may make use of a secure database to cross reference an undeliverable address with a deliverable address.
  • the present invention provides systems and methods for delivering a physical item by associating an Indirect Address Code (IAC) to the item, placing the physical item into the stream of delivery, using a reference file to derive a deliverable address from the IAC, associating the deliverable address to the item, and then physically delivering the item by transporting it to the deliverable address.
  • IAC Indirect Address Code
  • the IAC may be obtained from the item via optical character recognition (an automation process which is already in use at the USPS and other delivers), and evaluation of the IAC into the deliverable address is done automatically by accessing the file using the IAC as a key.
  • optical character recognition an automation process which is already in use at the USPS and other delivers
  • evaluation of the IAC into the deliverable address is done automatically by accessing the file using the IAC as a key.
  • IACs may evaluate to the same delivery address. This would be desirable, for instance, if several entities reside at the same deliverable address. Any or all of the information in an IAC database record can be mutable. For example, when the entity associated with an IAC moves, the former deliverable address can be replaced with the new deliverable address. In addition, the IAC itself (and the associated record) may be deleted from the database. This may happen exclusive of the request of the recipient or at the request of the recipient, and may have the effect of destroying the mapping from the IAC to a deliverable address. In some variations, an IAC might allow for only a single use (i.e. a single query by the deliverer for the deliverable address) and expire thereafter.
  • the process of adding the deliverable address to the physical item has many variations. It is contemplated that the deliverable address may be added to the physical item by affixing a label. In alternative embodiments, the deliverable address is added by printing or spraying on the physical item or by affixing a barcode label. In a particular embodiment, the deliverable address may obscure the IAC. By performing this process in a secure environment, the anonymity of the addressee can be preserved to all but the deliverer who physically transfers the item to the deliverable address.
  • the IAC can comprise a 'smart code' that may have at least one internal mechanism for ensuring its integrity or otherwise assessing its validity. It is contemplated that the IAC may have a checksum digit that will be used to validate the IAC, and possibly correct errors in its interpretation. Other contemplated versions enable integrity checks of the IAC through at least one of a cyclic redundancy check, a parity check, and an error correction code.
  • Another way of viewing the inventive subject matter is a method of conducting business that involves assigning an IAC to an entity, accepting an order, associating the order with a deliverable shipping address, and shipping the item to the deliverable shipping address. It is contemplated that assignment of the IAC will occur under the authority of a single secure provider.
  • the secure provider may be a new company or an existing entity, such as the United States Postal Service (USPS), and the secure provider may maintain an account on behalf of each recipient that will accrue shipping and purchasing costs.
  • USPS United States Postal Service
  • Yet another way of viewing the inventive subject matter is a method of delivering a physical item to a recipient who is determined by the sender of the item.
  • the sender may not rely upon access to the physical location of the recipient, but the item may nevertheless be delivered because the item is associated with an IAC which is associated with the recipient's deliverable address.
  • An additional aspect is a method of shipping an ordered item where an order is placed requesting delivery to an IAC.
  • a deliverable shipping address may be derived from the IAC.
  • Fig. 1 is a schematic of the creation of an indirect address code.
  • Fig. 2 is a schematic of the path of an item through the system.
  • Fig. 3 is a schematic of a transaction with a mail order vendor or online vendor.
  • Fig. 4 is a schematic of a change of address using an indirect address code.
  • Figure 1 depicts a process of creating an indirect address code (IAC).
  • a user 80 fills out a Request for an IAC form 18, and submits the form 18 to a secure provider 30.
  • the secure provider 30 enters information from the form 18 into a database 32, and creates an IAC 14 that is then sent to the user 80, who may provide it to a vendor 70 and/or a shipper 20.
  • an "indirect address code” is defined as a unique set of characters that can be evaluated into a fully specified deliverable address only through the use of a reference table.
  • the unique set of characters that comprise the IAC have no human discemable indication of the deliverable address. Specifically, there is no human discemable street number, street name, city, state or zip code.
  • a "fully specified deliverable address” (throughout this document referred to simply as a “deliverable address”) is defined as sufficient information to enable a deliverer or other entity to transport an item, preferably to an intended geographical location associated with the full specified deliverable address. Hence "undeliverable" refers to insufficient information to enable the deliverer or other entity to transport the item.
  • a postal code such as a ZJP+4+2 or other ZIP code, is not an IAC because it does not necessarily require a reference table to obtain a deliverable address.
  • a coded address such as "The White House” is not an IAC because it provides a human discemable indication of the deliverable address, and it is susceptible to evaluation without the reference table.
  • a Post Office Box number is not an IAC because it can be associated with a particular post office without the use of a reference table.
  • An electronic mail address is not an IAC because it is a deliverable address.
  • An encrypted address is not an IAC because it is susceptible to evaluation without the reference table.
  • the user 80 may be any entity capable of being the recipient of a physical item including an individual person, a family, and a company. Often the user 80 is an individual who desires to make a purchase without revealing his name and address. In other instances, the user 80 may be a company involved in e-commerce that wants its business relationships to remain confidential or persistent across relocations. Another user may be a college student who changes addresses frequently, but does not want to have to notify his friends and family every time he moves.
  • the user 80 preferably fills out a "Request for an IAC" 18 or similar form, having at least one deliverable address.
  • the form 18 may contain any number and variety of fields, a contemplated version has fields for name, deliverable address with corresponding date, alternative delivery address(es), special shipping instructions, demographic and psychographic information, a credit card number and/or bank account number, and authentication information.
  • the secure provider 30 is typically the entity that is responsible for assigning the IAC and maintaining the database.
  • the secure provider 30 may be an authorized carrier, such as the United States Postal Service (USPS), United Parcel ServiceTM, Federal ExpressTM, and DHL Airborne ExpressTM, or their agents.
  • USPS United States Postal Service
  • the secure provider may also be a wholly separate entity.
  • the secure provider 30 can be a sorting facility or an office of the United State Postal Service (USPS) including a General Mail Facility, a Regional Mail Facility, and a Local Post Office.
  • the secure provider 30 is preferably an entity that is trusted to maintain the information securely.
  • the secure provider 30 accepts the "Request for an IAC" form 18 (which may be a paper form, an electronic form or some other medium), enters information from the form 18 into a system having an IAC database 32, and generates an IAC 14. The secure provider 30 may then assign the IAC to the appropriate user 80.
  • the term "allowing the recipient a capability of modifying the deliverable address” includes any way that an entity can accomplish changing the deliverable address including giving an entity a web site where the deliverable address may be changed. Regardless of how the deliverable address is changed, in a preferred embodiment the recipient should be authorized before allowing him to initiate a change to the deliverable address.
  • privileged entities are able to perform a database query (or have a query performed on their behalf). In that manner, a particular entity may have access to only a subset of the fields in the resulting record.
  • the authorized carrier may be allowed to view the deliverable address(es) and the delivery criteria, but may not be privileged to view authentication information or financial information.
  • Other entities might only be privileged to view financial information. Still others might only be privileged with the knowledge that the IAC exists in the database (i.e. that it is a valid IAC).
  • the preferred functions of the IAC database 32 are to store and provide data enabling the evaluation of an IAC into a deliverable address.
  • the database is typically comprised of at least a reference file. It is contemplated that the IAC database 32 is controlled (and accessed) by the secure provider 30. In embodiments where there is an authorized carrier in addition to the secure provider, the authorized carrier is typically given read-only access to the IAC database.
  • the secure provider 30 is responsible for the integrity and security of the data, and the database is advantageously secure from hackers and other unauthorized entities.
  • the IAC database 32 may be any type that can provide a lookup based on the IAC.
  • the database may be distributed among multiple storage devices and processors and may be mirrored any number of times.
  • the IAC database is distributed such that bottlenecks are minimized.
  • the envisioned database comprises at least one file, typically the reference file, having at least a field for the IAC, and at least another field for the related deliverable address.
  • the IAC may be linked to derivative information such as fields that will enable the secure provider 30 to charge purchases and shipping costs to the user 80, and fields that will enable the secure provider to confirm the identity of someone requesting to modify the contents of a field on the database.
  • the IAC may also be linked to at least one email address.
  • the database may contain any number of files and fields including multiple addresses with associated dates, shipping instructions,
  • a customer 100 making an online purchase may choose not to provide his name, address, and credit card number to a vendor 104. Perhaps the vendor's credibility is unknown or the credit card number is susceptible to being stolen. Likewise, the customer's name and address might be susceptible to collection and distribution for the purpose of solicitation or profiling. In such a situation, the IAC 102 may be provided to the vendor 104 instead of a deliverable address. While the IAC 102 itself could in principle be used for solicitation or profiling, the preferred embodiment allows the user 100 to cancel the IAC 102. In another alternative, the IAC 102 expires automatically after some number of uses or a certain period of time.
  • the vendor 104 supplies the IAC 102 to the secure provider 30 who uses the IAC 102 to obtain the customer's credit card number and charge the customer 100 for the amount of the purchase and delivery.
  • the secure provider confirms the charge by returning an authorization 110 to the vendor 104.
  • the vendor 104 provides the IAC 102 to a third party (not shown), such as a credit card company that uses the IAC 102 to obtain authorization information from the IAC database 32.
  • the authorization information may be the information necessary to authorize the purchase and charge the customer 100. Because the credit card number is not passed from the purchaser to the vendor, the threat of misappropriation is greatly reduced.
  • the term "associating” means connecting, either physically or logically. It is contemplated that an IAC may be associated with a physical item by any method that connects the IAC to the physical item including affixing a label, spraying an IAC, and affixing a bar code that evaluates into the IAC. The term “associating” is also used herein to refer to the connection between the deliverable address and the physical item.
  • the vendor 104 associates the IAC 102 to the purchased product 112 and supplies both to the deliverer 114.
  • the deliverer 114 is authorized to use the IAC 102 to obtain a deliverable address 118 from the secure provider 30.
  • the deliverer 114 then associates the deliverable address 118 to the product 112 and subsequently delivers the product 112 to the purchaser 100.
  • Providing an IAC to a vendor may reduce misdelivery of an item.
  • IAC there may be less opportunity to make a mistake in entry of the deliverable address.
  • the vendor of the item may also benefit from the use of an IAC.
  • the IAC will have fewer bytes than a full name and address. Consequently, entry of an order is likely to be faster, contention for system resources may be reduced, and storage requirements may be reduced.
  • vendors could use the validity check to prune their customer databases of obsolete entries, thereby reducing the waste and expense of misdirected advertising. Since upwards of 15% of Americans change address each year and direct mail is not by default forwarded by the USPS change-of- address system, the savings could be quite significant.
  • An IAC may be retained for the life of the recipient.
  • the concept of a permanent address code could eliminate the need to communicate one's new address to multiple parties each time a change of address occurs. Upon notifying the secure provider, all deliveries could be automatically routed to the new address.
  • the IAC for an entity may change, terminate or even be merged with another entity.
  • a family living at a single address may all share the same IAC.
  • a single recipient may also have more than one IAC. For example, the recipient may have one IAC for personal use and another for a home-based business.
  • a recipient 204 may reduce the cost, inconvenience, and potential for error associated with a change of address by providing an IAC 208 instead of an address 200.
  • a sender 206 can send mail or parcels using the IAC 208.
  • the deliverer 114 provides the IAC 208 to the secure provider 30, who returns a deliverable address 214.
  • the deliverable address 214 is added to the mail piece 216 and the mail piece 216 is travels along path 210 to the recipient 204.
  • the secure provider 30 update the deliverable address 214 associated with the recipient's IAC 208. It is not necessary to notify friends, family, business contacts... of the move since they can continue to use the same IAC.
  • the secure provider 30 may automatically return the updated deliverable address 214.
  • the deliverer 114 associates the deliverable address 214 to the mail . piece 216 and delivers the mail piece 216 to the new address 202 via path 220.
  • the process exemplified in Figure 4 significantly simplifies a change of address for both the recipient 204 and the sender 206.
  • Double indirection is also contemplated. Specifically, an IAC could evaluate to a second IAC, which is subsequently evaluated to a deliverable address. Double indirection may be desirable when a user wishes to combine the convenience and continuity of a permanent IAC with the privacy and anonymity of a temporary IAC.
  • the IAC may be made relatively more resistant to error by providing a method of verification that detects and corrects errors within the IAC. Such verification methods could reduce the frequency of errors, especially those associated with transcription. Two contemplated types of error are human error and machine error. In either case, built in verification methods may be used to eliminate many errors.
  • the cyclic redundancy check returns a number that uniquely identifies the data.
  • a first number is derived from a first cyclic redundancy check calculation.
  • a second number is calculated and compared to the first number. If the two numbers match, or are "close enough" in terms of correctability, the IAC can be presumed valid.
  • the IAC may also have a system to reduce interpretation errors by humans or by OCR systems that process a scanned image of the IAC.
  • One such system may limit the character set used by the IAC. For example, it is common for humans and OCR systems to mistake the letter "O” for the number “0” or vice versa.
  • a preferred IAC excludes one or both of the letter “O” and the number "0”.
  • a preferred system excludes one or both of the letter "1" and the number "1”. Another interpretation is that "O" and "0" are treated as the same symbol.
  • both the recipient's name and associated IAC are required to obtain a deliverable address.
  • an error detection and correction procedure may operate on any combination of the name and IAC.
  • the path of an item 12 is followed from shipper 20 to recipient 60.
  • the shipper 20 may assign an IAC to an recipient 60.
  • the assignment of the IAC may also be made by the authorized carrier, common carrier, or any other party authorized to make the assignment.
  • the IAC is added to the item, the item is put into the stream of delivery, and eventually arrives at a sorting facility 30 local to the shipper 20.
  • the IAC 14 is evaluated into a deliverable address 16. Evaluation may be at least partially automatic in that some portion of the step of evaluation is not manual. For instance, a machine scan may be done on the IAC, then the result of the scan may be used to access a record in a reference file.
  • Evaluation preferably yields the deliverable address, which allows the item to be forwarded onto a regional sorting facility 40.
  • the item will end up at another sorting facility 50, local to the recipient 60, where it will be picked up by a delivery person, and physically delivered (transported) to the recipient 60.
  • multiple carriers might be involved in delivering the item, one of which performs the evaluation of the IAC to a deliverable address (or requests that the secure provider perform the evaluation on their behalf). The evaluation might occur more than once in the delivery stream.
  • the deliverable address 16 is preferably associated to the physical item 12 after the item has been placed into the stream of delivery, and in associating the deliverable address 16, the IAC 14 may be obscured. Alternatively, it is contemplated that the IAC may be removable, or added to the item 12, such that the IAC is not obscured. Other proposed embodiments include affixing a label to the item, spraying or printing the deliverable address 16 directly onto the item 12, or adding a barcode.
  • the "stream of delivery” begins once the item leaves the hands of an entity that has a function other than delivering the item. For example, a manufacturer, a • vendor, and a distributor all have functions that do not concern delivery of the item. The stream of delivery continues until the item arrives at the geographic location associated with the deliverable address. Delivery of the item 12 is generally accomplished by the secure provider 30, authorized carrier(s), or other authorized deliverer(s). Preferably a delivery person will obtain an item 12 at a sorting facility 30 located near the shipper 20. The item 12 may be delivered to a regional sorting facility 40, then a local sorting facility 50 before being physically transported to the recipient 60.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Quality & Reliability (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention porte sur des procédés et appareils de distribution d'articles physiques selon lequel on ajoute à un article physique (12) un code d'adressage indirect (IAC) (102), transformé ensuite en adresse de distribution (118), puis associé à l'article pour en permettre la distribution. On obtient ainsi un moyen efficace et sûr de distribution d'articles physiques.
EP01906680A 2000-05-10 2001-01-23 Procede et appareil utilisant un code d'adressage indirect pour distribuer un article physique Withdrawn EP1314114A4 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US20256600P 2000-05-10 2000-05-10
US202566P 2000-05-10
PCT/US2001/002475 WO2001086568A1 (fr) 2000-05-10 2001-01-23 Procede et appareil utilisant un code d'adressage indirect pour distribuer un article physique

Publications (2)

Publication Number Publication Date
EP1314114A1 EP1314114A1 (fr) 2003-05-28
EP1314114A4 true EP1314114A4 (fr) 2006-02-01

Family

ID=22750407

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01906680A Withdrawn EP1314114A4 (fr) 2000-05-10 2001-01-23 Procede et appareil utilisant un code d'adressage indirect pour distribuer un article physique

Country Status (2)

Country Link
EP (1) EP1314114A4 (fr)
WO (1) WO2001086568A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10149621A1 (de) * 2001-10-09 2003-07-03 Deutsche Post Ag Verfahren und Vorrichtung zum Befördern von Postsendungen
GB2382421A (en) * 2001-11-26 2003-05-28 Bybox Holdings Ltd Collection and delivery system
DE102004014135A1 (de) * 2004-03-23 2005-10-20 Manuel Gollner Verfahren und Computersystem zum Bestellen eines Geschenks und/oder einer postalischen Nachricht
FI121501B (fi) * 2008-05-14 2010-12-15 Itella Oyj Järjestelmä, menetelmä, laite ja postinlajittelukone lähetysten saattamiseksi postioperaattorin viestinvälitysverkossa toimitettavaksi
US10810324B2 (en) 2018-04-20 2020-10-20 At&T Intellectual Property I, L.P. Methods, systems and algorithms for providing anonymization

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5003251A (en) * 1989-09-12 1991-03-26 Grumman Aerospace Corporation Bar code reader for printed circuit board
US5860155A (en) * 1995-11-16 1999-01-12 Utek Semiconductor Corporation Instruction decoding mechanism for reducing execution time by earlier detection and replacement of indirect addresses with direct addresses

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
No Search *
See also references of WO0186568A1 *

Also Published As

Publication number Publication date
EP1314114A1 (fr) 2003-05-28
WO2001086568A1 (fr) 2001-11-15

Similar Documents

Publication Publication Date Title
US20080040269A1 (en) Method and apparatus using an indirect address code for delivery of physical article
US20220292439A1 (en) System and method of electronic and physical mail categorization and targeted delivery
US11699126B2 (en) Systems and methods for item delivery using anonymized delivery points
US11907891B2 (en) System and method for generating and implementing a household customer database
US7213748B2 (en) Anonymous mailing and shipping transactions
US8051038B1 (en) Method and system for information distribution
US8812373B2 (en) eDropship: methods and systems for anonymous eCommerce shipment
US20040260653A1 (en) Anonymous transactions
US20230376882A1 (en) Systems and methods for delivering items having encoded delivery points
US20050192913A1 (en) Postal services method and system
US7729359B1 (en) Methods and systems for providing address transparency
US20040068518A1 (en) Layered virtual identity system and method
WO2001086568A1 (fr) Procede et appareil utilisant un code d'adressage indirect pour distribuer un article physique
CA3052935C (fr) Systemes et methodes de livraison d'articles employant les points de livraison anonymes
US20210142321A1 (en) Method and system for anonymous ecommerce shipment
US20210142380A1 (en) Method and system for anonymous ecommerce shipment
MXPA06011422A (en) Method for processing mailings comprising wrong recipient addresses

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20021129

AK Designated contracting states

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

A4 Supplementary search report drawn up and despatched

Effective date: 20051216

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20061005