EP1337985A1 - Security tag - Google Patents
Security tagInfo
- Publication number
- EP1337985A1 EP1337985A1 EP01998947A EP01998947A EP1337985A1 EP 1337985 A1 EP1337985 A1 EP 1337985A1 EP 01998947 A EP01998947 A EP 01998947A EP 01998947 A EP01998947 A EP 01998947A EP 1337985 A1 EP1337985 A1 EP 1337985A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- item
- security tag
- tag
- housing
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/149—Mechanical actuation by lifting or attempted removal of hand-portable articles with electric, magnetic, capacitive switch actuation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/12—Mechanical actuation by the breaking or disturbance of stretched cords or wires
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1445—Mechanical actuation by lifting or attempted removal of hand-portable articles with detection of interference with a cable tethering an article, e.g. alarm activated by detecting detachment of article, breaking or stretching of cable
Definitions
- the card is attached to a flexible bag having electrically conductive wires whose condition can be monitored so that an attempt to break into the bag can be detected.
- the drawback of this device is the need for permanent attachment to the monitoring system.
- US-A-6002343 discloses an electronic tag which can be affixed to an object via a resistive element whose electrical resistivity is monitored by an on-board processor with information being transmitted to a separate detection system if the monitoring indicates that the resistive element has been compromised. This leads to a more flexible system than that described above but does not address attempts which may be made by sophisticated attackers to attack the tag itself.
- US-A-5367289 discloses an electronic article surveillance tag which would typically' be connected to clothing or the like and which includes a piezoelectric film which generates a voltage when subject to mechanical forces.
- the tag includes an alarm which is activated if the voltage exceeds a reference.
- This device has been developed to detect an attempt to detach the tag from the article but in fact achieves this by looking for the application of forces to the tag. The tag could be detached from the article without activating the alarm by carefully severing the connection to the article.
- GB-A-2257278 describes an anti-pilferage tag including a microcircuit to enable data communication between the tag and a host computer. Although there is brief mention of some form of tamper detection, the prime purpose of the tag is to enable the location of stock to be monitored.
- US-A-5099228 describes a security tag which can be attached to an article of merchandise by means of a tack and including a sensor for sensing the presence of the head of the tack. An attempt to tamper with the tack will therefore be detected.
- US-A-6052068 describes a vehicle identification system including a set of vehicle identification tags which are attached to vehicles and which communicate with an interrogator to enable the vehicle identification to be determined.
- each security tag of the prior art suffers from one or more of a number of disadvantages and have devised a new security tag which overcomes all these disadvantages.
- the tag includes an on-board monitoring system so that tampering is detected immediately and not only when the tag is interrogated by a remote host; and in addition the monitoring system monitors not only the securing mechanism by which the tag is secured to an item but also the condition of the housing itself.
- all types of tampering relating to the tag can be detected in contrast to the prior art .
- tampering of the item or container can also be monitored.
- the tag could be remotely powered, for example from a main supply to a GSM/satellite module connected to the tag allowing long distance communication
- the tag includes an on-board power supply. This provides another advantage of having an on-board monitoring system in that use of power from the power supply can be minimized.
- any external connection could provide an access point for any person trying to defeat the system.
- the tag when closed during manufacture would never be reopened unless for service or during attack. Being fully enclosed it makes the system much more resistant to any attack and removes any direct electrical connection to the internal components of the tag.
- the housing can include a conductive portion with the monitoring system being adapted to monitor the electrical properties of the conductive portion to thereby determine the integrity of the housing.
- the monitoring system being adapted to monitor the electrical properties of the conductive portion to thereby determine the integrity of the housing.
- the housing includes piezoelectric material and the monitoring system is adapted to monitor the electrical potential across the piezoelectric material to determine the integrity of the housing. Again, if somebody attempts to interfere with the housing this will generally cause vibrations which will in turn cause the piezoelectric material to generate a potential. This potential can be detected by the monitoring system so that again tampering with the housing is detected.
- the monitoring system preferably includes an item detector to detect the integrity of the item(s) . This may not be required however if the security tag is attached to a secure container, such as a safe, or the like.
- the item(s) are enclosed within a conductive enclosure in which case the item detector is adapted to monitor the electrical properties of the conductive enclosure to determine the integrity of the item(s) .
- cash coins and/or banknotes
- the conductivity of the bag would then be altered if an attempt was made to pierce the bag to extract
- the securing mechanism comprises a conductive member for securing the housing to the item(s) .
- the monitoring system includes a mechanism detector adapted to monitor electrical properties of the conductive member to thereby determine the integrity of the securing mechanism.
- the securing mechanism can include a piezoelectric material.
- the monitoring system may include a mechanism detector adapted to monitor the electrical potential across the piezoelectric material to determine the integrity of the securing mechanism.
- the housing is usually formed from a tamper resistant material such as a lamination of rubber in a reinforced plastic as this is extremely difficult to tamper with.
- the housing usually includes a metal cage to protect at least the store, and also any other delicate electronic components.
- the metal cage will act as a Faraday cage to protect any delicate components included in the tag from EMP (electro magnetic pulse) attack.
- the communication system may be any one of a number of communication systems, such as radio, infra-red, inductive or magnetic communication systems.
- the communications system may comprises a Bluetooth type radio system.
- inductive loop couplings may be provided so that when the security tag is brought in the vicinity of a reader, the tag status and some data can be read out from the store via an inductive loop.
- the communication system is preferably adapted to communicate with the remote host system on at least one of the following occasions: i. At predetermined time intervals; ii. Upon request from remote host systems; or, iii. Upon a change in tag status indicating that the security tags and/or the item(s) have been tampered with.
- the security tag includes a location detector for detecting the location of the tag, the tag status including an indication of the tag location.
- the security companies typically use timed locks to ensure that the items cannot be removed from the container for a predetermined time interval. This may be achieved for example by locking the container in a security van in such a way that the container can only be removed at a predetermined point in time which corresponds to the time at which the driver will reach the desired destination.
- a method of transferring the ownership of item(s) comprises: a. Securely identifying the item(s) by attaching a security tag to the item(s) , the security tag having a monitoring system for monitoring the tag status, the tag status indicating whether the security tag and/or the item(s) have been tampered with; b. Detecting remotely the condition of the monitoring system; and c. Causing the remote host to register a change in ownership of the item(s) when the monitoring system does not indicate a tamper condition.
- the third aspect of the present invention recognises that once the item(s) have been secured, the ownership of the item(s) can be transferred even if the item(s) are not. In addition, the item(s) can be kept under less secure conditions .
- a shop owner may place money taken at the shop in a suitable container and then attach a security tag, as outlined above.
- the cash in the container is securely identified.
- Ownership of the contents of the container can then be transferred to the shop owner's bank, or the like, by registering a change in ownership at the remote host. From this point, the money is effectively owned by the bank which then has responsibility for the money.
- the container remains physically at the same location.
- the item(s) or the tag is tampere en an indication of this can be transferred to the remote host, such as a central control centre, which can identify that there is a security problem.
- the remote host such as a central control centre
- the money can be credited into the shop owner's bank account, allowing the shop owner to make transactions on the account in respect of the money which is still held on the premises.
- the bank can account for the exact location and security of the money at all times.
- the shop owner can then simply arrange for ownership of the money to be transferred back, allowing the shop owner to retrieve the cash from the container in accordance with the bank's instructions. Accordingly, whilst the cash has been owned by the bank for a period of time, it has never left the shop premises. This therefore allows ownership of item(s) to be transferred without the item(s) themselves having to be moved which in turn helps reduce security risks.
- Figure 1 is a plan view of a security tag according to the present invention.
- Figure 2 is a side view of the security tag of Figure l;
- Figure 3a is a cross-sectional view of the mounting of the security tag of Figure 1 along the line A-A';
- Figure 3b is a cross-sectional view of the mounting of Figure 3a along the line B-B';
- Figure 4 is a cross-sectional view of the security tag along the line C-C;
- FIG. 5 is a schematic diagram of the internal components of the security tag of Figure 1;
- Figure 6 is a schematic diagram showing the security tag of Figure 1 attached to a solid container
- Figure 7 is a schematic diagram of the security tag of Figure 1 fitted to a fabric container; and, Figure 8 illustrates a wrapped pack of banknotes attached to a security tag.
- FIGS 1 and 2 show a security tag according to the present invention.
- the security tag includes a housing 1 with an attached mounting pad 2.
- the housing 1 may carry a security device such as a hologram or kinegram.
- a security device such as a hologram or kinegram.
- Provided at respective locations around the perimeter of the housing 1 are four one shot fixings 3, such as rivets, or the like, which can be used on one occasion only to attach the housing 1 to a mounting plate 4.
- a mounting 5 which is adapted to receive an attaching member or clamp 6 as shown.
- the attaching member 6 may be inserted into the mounting 5 in the direction shown by the arrows 9. However, it is impossible to extract the attaching member 6 in the reverse direction. Accordingly, the attaching member 6 can only be removed from the mounting 5 by physically breaking the attaching member and then drawing each of the arms 6a, 6b through the respective channels 7a, 7b independently. As a result, the attaching member 6 can be used to attach the housing to fabric type objects, as will be explained in more detail below.
- FIG. 4 A cross-sectional view of the inside of the housing is shown in Figure 4.
- the housing is formed from a tough, anti-tamper laminated layer 10 formed from a lamination of rubber and high strength reinforced plastic which provides sufficient impact resistance to protect the internal components of the security tag even under extreme attack conditions.
- a printed circuit board (PCB) 11 Positioned inside the housing 1 is a printed circuit board (PCB) 11 on which are mounted the electronic components required to operate the tag.
- the PCB 11 is generally mounted in a layer of impact absorbing material 12 such as sponge, rubber or the like, to provide further impact resistance.
- a piezoelectric film 13 is positioned on the inside of the laminated layer 10, with a protective film 14 being positioned between the piezoelectric film 13 and the impact absorbing material 12.
- a conductive external elastomeric coating may also be provided on the outside of the laminated layer 10, as shown by the dotted line 15.
- a portion of the PCB 11 can also be contained within a metal can 16 which acts as a Faraday cage to protect the electronic components on the PCB from an EMP attack. It should be noted that in this case, sensors typically have to be located on the PCB 11 outside the metal can 16 in order to function correctly. Accordingly, surge arresting devices would be attached to these external sensors .
- each of these sensors form part of a sensing system which is used to monitor the status of the security tag and the items to which the security tag is attached. Signals detected by the sensors are transferred to the processor 20 which is adapted to monitor the signals and determine when these indicate that the security tag and/or the items are being tampered with. Sensitivity of the measurement is set to a level which prevents the processor 20 determining that normal handling constitutes tampering but low enough so that tampering can be detected before the security tag, items or the like, become damaged. This can be done in one of two ways : i. By analysis of the signals; or, ii.
- the processor can be formed from a neural net.
- the neural net is trained under normal operating circumstances so that it learns what signals should be obtained from the sensors 24 when the security tags and items are being handled correctly. As a result, when signals outside the expected range are sensed then the processor determines that either the security tag or the items are being tampered with.
- an indication of the range of acceptable signals that should be obtained from each sensor 24 is stored in the memory 22. Accordingly the processor 20 can compare the obtained signals to the respective range of acceptable signals, and from this determine whether the items or security tag are being tampered with.
- the processor 20 is adapted to transfer a signal via the transceiver 21 to a remote monitoring system 26 indicating that the security tag or the items are under attack, as will be explained in more detail below.
- the security tag In use, the security tag includes a large number of different security features which may be used separately or together in combination depending on the circumstances.
- the security features will now be explained below with reference to Figures 6 and 7.
- Figure 6 shows how the security tag is connected to a sealed container 30.
- the security tag is fitted to the body 32 of the container by placing the mounting pad 2 on a surface 31.
- the mounting pad 2 is formed from a tamper evident double sided adhesive pad which allows the housing 1 to be attached to the surface 31.
- the pad is designed so that if an attempt is made to remove the housing 1 from the surface 30, at least a portion of the pad will remain on the surface 30, whilst a corresponding portion will remain attached to the housing 1, thereby showing that a tag has been removed.
- the one shot fixings 3 are inserted through the container body 30 and attached to the mounting plate 4 as shown, thereby securing the security tag in place .
- the housing sensor system is used to detect the integrity of the housing 1. This is carried out to prevent the security tag being tampered with to destroy the internal workings .
- the housing sensor system is formed from the piezoelectric film 13 and a corresponding one of the sensors 24.
- the sensor 24 is a current sensor, such as an ammeter or the like, which is adapted to detect electric currents generated in the piezoelectric film 13.
- the laminated layer 10 is deformed, for example by an attempt to crush or pierce the housing, this will cause corresponding deformation of the piezoelectric film 13. This will cause the generation of a current within the film which can be detected by the sensor 24.
- the senor 24 can be adapted to measure the conductivity of the elastomeric coating 15.
- the elastomeric coating will have a conductivity which can be measured by a sensor 24. This can be achieved for example by fabricating the sensor to apply a potential across the coating and to measure the current flow through the coating.
- the tag electrometric coating will contain a conductive compound such as graphite or compounds that consist of fine granules that can be added to the elastomer during compounding (manufacture) . This coating can then be monitored in the same way as the strap. In this case, if the elastomeric coating 15 is interfered with, for example if it is pierced, this will change its conductivity, which will be detected by the processor 20 so that an appropriate response can be generated.
- the attachment sensor can be implemented in any one of a number of ways.
- a piezoelectric film (not shown) is sandwiched between the mounting pad 2 and the housing 1. Accordingly, if an attempt is made to remove the housing 1 from the surface 31 of a container, this will deform the piezo-electric film. The piezoelectric film will in turn generate a current which is detected by a current sensor 24.
- the piezoelectric film is replaced by a capacitive film (not shown) .
- the sensor 24 is then adapted to measure the capacitance of the film by applying an RF field to the film and measuring the response of current flow through the film. In this case, any variation in the capacitance indicates that the properties of the film are being effected, which in turn indicates that the coupling of the housing 1 to the container 30 is being tampered with.
- the attaching member 6 is generally formed from a conducting material. Accordingly, a sensor 24 is coupled to the channels 7a, 7b to detect the conductivity of the attaching member. If the conductivity changes are more than a predetermined threshold amount, then this is detected by the microprocessor 20 which determines that the attaching member is being interfered with.
- the tag can be used to secure documents for both identification and transfer purposes. Accordingly, an additional feature of the present invention is that the security tag can be used to transfer ownership of documents such as, for example cash.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Burglar Alarm Systems (AREA)
- Pinball Game Machines (AREA)
- Electronic Switches (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0029392.8A GB0029392D0 (en) | 2000-12-01 | 2000-12-01 | Security tag |
GB0029392 | 2000-12-01 | ||
PCT/GB2001/005267 WO2002045042A1 (en) | 2000-12-01 | 2001-11-29 | Security tag |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1337985A1 true EP1337985A1 (en) | 2003-08-27 |
EP1337985B1 EP1337985B1 (en) | 2006-08-09 |
Family
ID=9904299
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP01998947A Expired - Lifetime EP1337985B1 (en) | 2000-12-01 | 2001-11-29 | Method of transferring the ownership of items using security tags |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP1337985B1 (en) |
JP (1) | JP2004515016A (en) |
CN (1) | CN1478263A (en) |
AT (1) | ATE336054T1 (en) |
AU (1) | AU2002217260A1 (en) |
DE (1) | DE60122202T2 (en) |
GB (1) | GB0029392D0 (en) |
WO (1) | WO2002045042A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9369838B2 (en) | 2011-12-21 | 2016-06-14 | Otodata Wireless Network Inc. | Method and system for estimating a position of a target using a plurality of smartphones |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7102522B2 (en) | 2002-12-24 | 2006-09-05 | 3M Innovative Properties Company | Tamper-indicating radio frequency identification antenna and sticker, a radio frequency identification antenna, and methods of using the same |
US6816125B2 (en) | 2003-03-01 | 2004-11-09 | 3M Innovative Properties Company | Forming electromagnetic communication circuit components using densified metal powder |
JP4699709B2 (en) * | 2004-04-28 | 2011-06-15 | アートウエルド株式会社 | IC tag manufacturing method |
JP4126703B2 (en) * | 2004-12-06 | 2008-07-30 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Product information protection method and product information protection system |
FI20070285A0 (en) * | 2007-04-13 | 2007-04-13 | Ponsec Finland Oy | Procedure and system for calculating a cash register |
KR100974408B1 (en) | 2008-02-04 | 2010-08-05 | 한국남동발전 주식회사 | Tag Fastening Apparatus |
CN102903299B (en) * | 2011-07-29 | 2017-06-13 | 泰科消防及安全有限公司 | Can magnetic release safety label |
ITMI20111465A1 (en) * | 2011-08-01 | 2013-02-02 | Total Prot Service Srl | ANTI-THEFT DEVICE FOR OBJECTS EXPOSED. |
CN102542197B (en) * | 2011-12-05 | 2014-12-24 | 深圳市莱克科技有限公司 | Sensitive data protection system |
CN107784766B (en) * | 2016-08-29 | 2020-02-07 | 启迪市场有限公司 | Flexible anti-theft system, safe traveling bag and anti-invasion clothes based on multiple sensors |
CN107749141A (en) * | 2017-10-27 | 2018-03-02 | 思创医惠科技股份有限公司 | The anti-theft tag and method of article in a kind of monitoring case |
US10276006B1 (en) * | 2017-12-02 | 2019-04-30 | The Boeing Company | Wireless tamper device |
WO2021007861A1 (en) * | 2019-07-18 | 2021-01-21 | 宁波讯强电子科技有限公司 | Anti illegal recording apparatus and system for communication device having photographing function |
CN111539048B (en) * | 2020-05-07 | 2023-12-29 | 深圳市旭锦鹏程科技有限公司 | USB flash disk anti-theft device for electronic commerce data encryption |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5367289A (en) * | 1991-11-27 | 1994-11-22 | Sensormatic Electronics Corporation | Alarm tag for an electronic article surveillance system |
US5650770A (en) * | 1994-10-27 | 1997-07-22 | Schlager; Dan | Self-locating remote monitoring systems |
IL119509A (en) * | 1996-10-28 | 2000-02-17 | Hi G Tek Ltd | Electronic tag |
US5955951A (en) * | 1998-04-24 | 1999-09-21 | Sensormatic Electronics Corporation | Combined article surveillance and product identification system |
WO2000016284A1 (en) * | 1998-09-11 | 2000-03-23 | Key-Trak, Inc. | Tamper detection and prevention for an object control and tracking system |
-
2000
- 2000-12-01 GB GBGB0029392.8A patent/GB0029392D0/en not_active Ceased
-
2001
- 2001-11-29 WO PCT/GB2001/005267 patent/WO2002045042A1/en active IP Right Grant
- 2001-11-29 DE DE60122202T patent/DE60122202T2/en not_active Expired - Lifetime
- 2001-11-29 AT AT01998947T patent/ATE336054T1/en not_active IP Right Cessation
- 2001-11-29 EP EP01998947A patent/EP1337985B1/en not_active Expired - Lifetime
- 2001-11-29 CN CNA018198406A patent/CN1478263A/en active Pending
- 2001-11-29 AU AU2002217260A patent/AU2002217260A1/en not_active Abandoned
- 2001-11-29 JP JP2002547130A patent/JP2004515016A/en active Pending
Non-Patent Citations (1)
Title |
---|
See references of WO0245042A1 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9369838B2 (en) | 2011-12-21 | 2016-06-14 | Otodata Wireless Network Inc. | Method and system for estimating a position of a target using a plurality of smartphones |
Also Published As
Publication number | Publication date |
---|---|
EP1337985B1 (en) | 2006-08-09 |
GB0029392D0 (en) | 2001-01-17 |
AU2002217260A1 (en) | 2002-06-11 |
CN1478263A (en) | 2004-02-25 |
ATE336054T1 (en) | 2006-09-15 |
WO2002045042A1 (en) | 2002-06-06 |
DE60122202T2 (en) | 2006-12-14 |
JP2004515016A (en) | 2004-05-20 |
DE60122202D1 (en) | 2006-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7015814B2 (en) | Security tag | |
US6262664B1 (en) | Tamper detection prevention for an object control and tracking system | |
EP1337985B1 (en) | Method of transferring the ownership of items using security tags | |
CA2083070C (en) | Non-contact tamper sensing by electronic means | |
US7256692B2 (en) | Anti-tamper apparatus | |
USRE43415E1 (en) | Anti-theft method for detecting the unauthorized opening of containers and baggage | |
US7646292B2 (en) | Methods and systems for verifying the position and status of hierarchically arranged objects | |
USRE42777E1 (en) | Anti-theft method for detecting the unauthorized opening of containers and baggage | |
US8284062B2 (en) | Theft deterrent device | |
US7772974B2 (en) | Tamper evident seal system and method | |
US6281793B1 (en) | Electronic monitoring apparatus | |
JP2006519737A (en) | Tamper-evident packaging | |
CN108368710B (en) | Security system with tamper-resistant sensor and network security | |
WO2008002878A2 (en) | Large area distributed sensor | |
CN112053470A (en) | Parcel locking device and system thereof | |
GB2446178A (en) | An electronic seal | |
GB2538071A (en) | An electronic article surveillance tag | |
EP1058918B1 (en) | Method for protecting the identity of objects and device for performing the method | |
KR100946332B1 (en) | Information tag of combined RFID tag and EM label and making method thereof | |
TWM403541U (en) | Anti-theft safe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20030521 |
|
AK | Designated contracting states |
Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: TRIBE, RAGLAN HORATIO ANDREW HAROLD Inventor name: BROOKS, DAVID ALAN Inventor name: ARMANINI, PIETRO Inventor name: IRELAND, PHILLIP MICHAEL WILLIAM |
|
17Q | First examination report despatched |
Effective date: 20040803 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RTI1 | Title (correction) |
Free format text: METHOD OF TRANSFERRING THE OWNERSHIP OF ITEMS USING SECURITY TAGS |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060809 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060809 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060809 Ref country code: CH Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060809 Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060809 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED. Effective date: 20060809 Ref country code: LI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060809 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 60122202 Country of ref document: DE Date of ref document: 20060921 Kind code of ref document: P |
|
REG | Reference to a national code |
Ref country code: SE Ref legal event code: TRGR |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20061109 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20061120 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20061129 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20061130 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070109 |
|
LTIE | Lt: invalidation of european patent or patent extension |
Effective date: 20060809 |
|
NLV1 | Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act | ||
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20070510 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20061110 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060809 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20061129 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060809 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20090122 AND 20090128 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: TP |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20091126 Year of fee payment: 9 Ref country code: SE Payment date: 20091106 Year of fee payment: 9 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20091123 Year of fee payment: 9 Ref country code: GB Payment date: 20091125 Year of fee payment: 9 |
|
REG | Reference to a national code |
Ref country code: SE Ref legal event code: EUG |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20101129 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20110801 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 60122202 Country of ref document: DE Effective date: 20110601 Ref country code: DE Ref legal event code: R119 Ref document number: 60122202 Country of ref document: DE Effective date: 20110531 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101130 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101130 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101129 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110531 |