EP1570451A1 - Image authenticating methods - Google Patents
Image authenticating methodsInfo
- Publication number
- EP1570451A1 EP1570451A1 EP03789477A EP03789477A EP1570451A1 EP 1570451 A1 EP1570451 A1 EP 1570451A1 EP 03789477 A EP03789477 A EP 03789477A EP 03789477 A EP03789477 A EP 03789477A EP 1570451 A1 EP1570451 A1 EP 1570451A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- graphic
- images
- called
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 68
- 230000008569 process Effects 0.000 claims abstract description 9
- 230000005540 biological transmission Effects 0.000 claims description 21
- 230000015654 memory Effects 0.000 claims description 13
- 238000007906 compression Methods 0.000 claims description 8
- 230000006870 function Effects 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 230000006837 decompression Effects 0.000 claims description 3
- 238000012790 confirmation Methods 0.000 claims description 2
- 238000012546 transfer Methods 0.000 claims description 2
- 230000006835 compression Effects 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000013144 data compression Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 239000004065 semiconductor Substances 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000011282 treatment Methods 0.000 description 2
- BQCADISMDOOEFD-UHFFFAOYSA-N Silver Chemical compound [Ag] BQCADISMDOOEFD-UHFFFAOYSA-N 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000012822 chemical development Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/052—Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed
- G08G1/054—Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed photographing overspeeding vehicles
Definitions
- the present invention relates to methods for authenticating images and in particular those of vehicles taken into infringement, such infringements possibly for example relating to exceeding authorized speeds, crossing red lights or even traffic. '' an unauthorized vehicle in a lane reserved for public transport vehicles.
- the report resulting from this finding is then used to penalize the offense and if necessary implement means to make the driver pay the corresponding fines.
- the presence of representatives of the police is then necessary for the observation of the offense. If the offense (s) are contested by the driver (s) concerned, the images recorded at the time of the offense may be extracted from the memory in which they were stored and used.
- new alphanumeric control characters are constructed which are also inserted in the image.
- the photographs corresponding to the infringing vehicles contain both the above characteristic information and the control alphanumeric characters.
- the signature in question being masked, it can be challenged by motorists in breach because it is not an integral part of the elements of the legal file of the offense,
- the object of the present invention is in particular to propose a method for authenticating images and in particular images of vehicles taken into infringement and to this end, a method according to the invention comprises the following steps:
- distribution systems are distributed, arranged so as to allow the taking of images and the entry of elements of identification of the offenders, the shooting means providing data representative of the images taken, hereinafter called data pictures taken,
- the operating systems apply any known processing to the image data taken to improve or maintain the quality of the images in question and / or to reduce the number of data necessary for a reconstruction of these images, without significant loss of their quality , in order to reduce the size of the memories necessary for storing the image data taken and / or the capacity of the means of transmission of this data, the intermediate data representative of images after these treatments being called initial graphic data, the operating systems calculate, from the offense data and a graphic representation of the alphanumeric characters associated with this offense data, new data representative of images, called graphic offense data,
- the operating systems merge the graphical initial data and the graphical offense data in order to obtain a new set of image representative data, called graphical identifying data, in which the graphical initial data and the graphical infraction data constitute accessible subsets of this new data set,
- the operating systems calculate, by application to the graphical identifying data of a non-bijective function denoted f, a set of data, hereinafter called summarized data, so that knowledge of the only summarized data does not allow go back to the qraphic identifying data,
- the operating systems apply to the summarized data a coding method denoted c, having an associated decoding method denoted c "1 , in order to obtain a new set of data called signature data,
- the operating systems calculate, from the signature data and a graphic representation of the alphanumeric characters associated with this signature data, new data representative of images, called graphic signature data,
- the operating systems merge the graphical identifying data and the graphical signature data in order to obtain a new set of data representative of images, in which the graphic identifying data and these graphic signature data constitute accessible subsets of this new set of data, called graphic authenticated data,
- control units are provided which can respectively read and / or receive the authenticated graphic data stored in the second storage and / or transmission means, the data actually read and / or received being called graphic received data,
- control units search among the graphic received data for the subset of the graphic identifying data, hereinafter called the graphic identifying data tested,
- control units search among the graphic received data for the subset of the graphic signature data, hereinafter called tested graphic signature data,
- control units search using tested graphic signature data and a tab : w d ⁇ ? recognition of alphanumeric characters, a set of data representative of the signature data, called tested signature data,
- control units calculate by the application, to the graphical identifying data tested, of the non-bijective function f, a set of data, called tested summary data, - i -
- control units apply to the tested signature data, the decoding method c "1 to obtain a set of data, called summary data received,
- control units compare the received summary data with the tested summary data, and provide an alert signal when these data are not identical and / or a confirmation signal when they are.
- the information systems include means for measuring the speed of vehicles,
- the information systems include means for detecting the presence of an unauthorized vehicle in a reserved lane,
- the information systems include means for detecting the crossing of a red light by a vehicle,
- the coding and / or decoding methods use cryptographic techniques
- the coding methods incorporate into the signature data, a subset of data, an accessible subset and containing the set of alphanumeric characters sufficient to represent the signature data, the operating systems apply successively a compression process and the associated decompression process to the ⁇ nneeb of images taken, and store and / or transfer the data obtained to storage and / or transmission means,
- first storage and / or transmission means and the second storage and / or transmission means are combined
- the character recognition table is developed by applying a character recognition program code
- the character recognition table is developed from the tested graphic signature data.
- FIG. 1 is a schematic view of a method according to the prior art where a vehicle (1) moving on the road (100) in the direction indicated by the arrow (F), is intercepted by the radar beam (200 ) an information system comprising in particular a cinemometer (2), connected to operating systems (4), and to shooting systems (3),
- FIG. 2 is a schematic view of a step of the method according to the invention where a processor (400) of the operating systems merges the initial graphic data (10), of a vehicle (1) taken from the front and comprising identification elements (101) and the graphic infringement data (11), to obtain the graphic identifying data (12),
- FIG. 3 is a schematic view of an intermediate step of the method according to the invention where a processor (400) of operating systems calculates from graphical identifying data (12) and by action of a program code (40 ) suitable placed in a non-volatile storage means, the summarized data (31),
- FIG. 4 is a schematic view of an intermediate step of the method according to the invention where a processor (400) of the operating systems (4) calculates from the summarized data (31) and by the action of an appropriate program code (41) placed in a non-volatile storage means, the signature data (33),
- FIG. 5 is a schematic view of an intermediate step of a method according to the invention where a processor (400) of the operating systems (4) merges the graphic identifying data (12) and the graphic signature data (13) , to constitute the authenticated graphic data (14),
- FIG. 6 is a schematic view showing an example of a sequence of steps of the method according to the invention, the operating systems and the control units, here placed outside so as not to make the figure heavy, being connected by any known means to the different elements.
- the kinemometer can for example be formed from a Doppler radar, magnetic loops buried under the road or a laser system.
- Means are provided for providing associated physical information, such as the time and date of the offense, the location of the device, etc.
- First means are provided for recording and / or transmitting the data representative of the images taken by the shooting systems, hereinafter referred to as captured image data (30) and the data representing physical information, hereinafter called offense data (20), preferably in the form of digital data.
- storage and / or transmission means have been placed at 3 points in the diagram, but such means can obviously be provided at any other point of this diagram at locations naturally determined in a manner known per se by any person skilled in the art.
- the storage means can also be produced in any known manner using, for example, semiconductor, magnetic, etc. memories.
- the data transmission means can be of various natures: transmission by wire, by communication bus or by radio.
- Operating systems (4) are provided to exploit this data.
- the operating systems with one or more processors (400) and first means of volatile and non-volatile storage and / or transmission (430A).
- the processors can be integrated into semiconductor components of the FPGA type or specialized semiconductor components of the ASIC type.
- the content of these first storage means can obviously be read and written by the processors of these operating systems.
- the choice of compression factor can be made, for example during the installation of pressure systems. views, the operating systems recording in the storage means the data representative of images taken for different compression factors, and transmitting the content of these storage means to control units (5), used exceptionally during this installation phase.
- control units have viewing means in order to check the quality of the images reconstructed from this compressed data.
- the operating systems can apply any known processing to the image data taken in order to facilitate the identification of the vehicles in violation.
- graphic initial data 10 which can be stored and / or transmitted.
- Any known storage method can be used, and in particular non-volatile methods.
- Non-volatile storage means are used to store the graphical representation of alphanumeric characters from information systems, these storage means being called non-volatile memory for character fonts (410).
- the non-volatile memory of the character fonts contains the graphic representation of the alphanumeric characters in the form of dot matrices.
- the non-volatile memory of the character fonts contains the graphic representation of the raw alphanu ⁇ ie ⁇ characters in the form of bar codes.
- New data representative of images displaying the offense data are determined from the offense data and from the graphical representation of the alphanumeric characters, these images being for example: 123 km / h -01 / 01 / 02- 10h : 30- Paris Aima
- the graphic initial data and the graphic infringement data are recorded in a memory.
- the dotted lines in the storage and / or transmission means (430A) are a symbolic representation of the fact that the graphic offense data come from the offense data (20) and that the initial graphic data are from the image data taken (30).
- the graphic infringement data and the initial graphic data constitute two accessible subsets of the identifying graphic data.
- the images representing the data of the offense are placed under the images taken by the shooting systems.
- summary data (31).
- the summarized data are then sets of 160 bits of information.
- coded summary data (32) a so-called public key / private key encryption method, as described for example in US Pat. No. 4,405,829, which leads to new data, hereinafter called coded summary data (32).
- program code (41) necessary for the application of the encryption method in question is stored in a non-volatile memory.
- the above private key is known only to authorized personnel.
- the private key can be stored in the operating systems permanently or preferably in volatile memories, which makes it possible to improve the security of the process.
- this key can be downloaded from a highly secure database.
- the private key remains inaccessible, even in the event of analysis of the constituent elements of the device.
- the operating systems merge the summarized data coded with another set of data, called alphabet data (420), for example by placing after the summarized data coded the set of alphanumeric characters. sufficient to represent the summarized coded data.
- the operating systems place after the coded summary data, the alphanumeric characters 0 to 9 and A to F which in this case constitute the alphabet data.
- the alphabet data are placed after the summarized coded data, but that this alphabet data could be placed equivalently before these summarized data encoded or in any other way to reconstruct the entire subset of the alphabet data.
- the coded summary data, possibly merged with the alphabet data, is called signature data (33).
- the graphic representations in question can consist of dot matrices or bar codes for example.
- the graphic identifying data (12) is then merged with the graphic signature data (13), for example, according to the method already used to merge the graphic infringement data (11) with the initial graphic data (10) and we thus obtains the authenticated graphic data (14).
- the images representing the signature data are placed under the images representing the graphic identifying data. It goes without saying that these images representing the signature data could in an equivalent manner be, for example, placed on top of the images representing the graphic identifying data, or on the sides or in any other way.
- the operating systems are furthermore provided with second storage and / or transmission means (430B) in order to allow the dissemination of the authenticated graphic data.
- the operating systems include these second non-volatile storage means, in removable form, for example in the form of a memory card which can be removed from the system by an operator and placed in a control unit. (5).
- Such a control unit can consist of a laptop computer or a much smaller box able to read the content of the card when it is associated with it.
- these removable non-volatile storage means can also be used as first storage means.
- the operating systems include telecommunication means for example, connected to a telephone line, so as to allow the transmission of the graphically authenticatable data to a control unit.
- Such a control unit may consist of a computer provided with a modem connected to a telephone line.
- these transmission means can also be used as first transmission means for telecommunication with the shooting systems.
- the operating systems include wireless telecommunication means and are arranged to transmit the graphically authenticated data to a control unit.
- the control unit can consist of a computer comprising a radio modem.
- the first transmission means can be of the same nature as those above.
- the data actually read and / or received by the control units is called graphical received data (50).
- the control units include one or more processors.
- control units can record in third storage means (530A), such as hard disks for example, the graphic data received in the form of computer files.
- third storage means such as hard disks for example
- These storage means can also be used to contain all the algorithms and data necessary for finding the dimensions and positions of the graphic identifying data and the graphic signature data.
- control units comprise in the non-volatile storage means, a code recognition program (510A) of the characters which converts the tested graphic signature data, into alphanumeric characters to form a new set of data called data signatures tested.
- a code recognition program 510A of the characters which converts the tested graphic signature data, into alphanumeric characters to form a new set of data called data signatures tested.
- tested graphical alphabet data 510B
- the tested signature data (53) is calculated by comparing the tested graphic signature data with the tested graphic alphabet data.
- the storage means can also contain the program execution code of the non-bijective calculation used above, defined by the function f, as well as the code for executing the decoding program c -1 , known by the public key associated with the private key which was used to encode the summarized data.
- the function f is respectively applied to the graphical identifying data tested (51) which leads to new data called tested summary data (55) and the decoding program c "1 to the signature data tested which leads to new data, called data summaries received (54).
- the invention is not limited to the particular embodiment which has just been described; on the contrary, it embraces all variants, in particular that in which the process is implemented when the offense is other than that associated with speeding authorized by a vehicle and for example when it relates to the detection of a person in a protected access area for which he does not have an authorization.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Image Processing (AREA)
- Compression Of Band Width Or Redundancy In Fax (AREA)
- Traffic Control Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0214794 | 2002-11-26 | ||
| FR0214794A FR2847755B1 (en) | 2002-11-26 | 2002-11-26 | IMAGE AUTHENTICATION METHODS |
| PCT/FR2003/003462 WO2004051596A1 (en) | 2002-11-26 | 2003-11-24 | Image authenticating methods |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP1570451A1 true EP1570451A1 (en) | 2005-09-07 |
| EP1570451B1 EP1570451B1 (en) | 2019-02-27 |
Family
ID=32241607
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP03789477.1A Expired - Lifetime EP1570451B1 (en) | 2002-11-26 | 2003-11-24 | Image authenticating methods |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US7333632B2 (en) |
| EP (1) | EP1570451B1 (en) |
| AU (1) | AU2003294060A1 (en) |
| FR (1) | FR2847755B1 (en) |
| WO (1) | WO2004051596A1 (en) |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7516130B2 (en) * | 2005-05-09 | 2009-04-07 | Trend Micro, Inc. | Matching engine with signature generation |
| US7613337B2 (en) * | 2005-09-06 | 2009-11-03 | Intel Corporation | Method and apparatus for identifying mole growth |
| DE102007022373A1 (en) * | 2007-05-07 | 2008-11-13 | Robot Visual Systems Gmbh | Method for conclusively detecting the speed of a vehicle |
| DE102008006840A1 (en) * | 2008-01-30 | 2009-08-13 | Continental Automotive Gmbh | Data transmission method and tachograph system |
| US20090262007A1 (en) * | 2008-04-21 | 2009-10-22 | Kelly James F | Vehicle speed detection device with wireless communications capability and methods of use |
| EA017679B1 (en) * | 2011-08-08 | 2013-02-28 | Общество С Ограниченной Ответственностью "Автодория" | Method and device for controlling traffic offence by vehicles |
| EP3143604A4 (en) * | 2014-04-24 | 2018-03-07 | Safer Place Ltd. | A system and method for efficient video-based monitoring of traffic violations |
| IL256942B (en) * | 2015-07-19 | 2022-08-01 | Kareev Uri | A multi-channel system for traffic enforcement in complex scenarios |
| DE102016110935B3 (en) * | 2016-06-15 | 2017-09-07 | Jenoptik Robot Gmbh | Method and evaluation device for evaluating case data of a traffic monitoring device |
| AU2017352544A1 (en) * | 2016-10-25 | 2019-02-07 | Owl Cameras Inc | Video-based data collection, image capture and analysis configuration |
| CN107346607A (en) * | 2017-08-24 | 2017-11-14 | 重庆市泰福通途智能科技有限公司 | A kind of driving vehicle overrun testing early warning system and its method of work |
| IL301177A (en) | 2020-09-30 | 2023-05-01 | Rekor Systems Inc | Traffic monitoring systems and methods with enhanced privacy protections |
| KR20220143404A (en) * | 2021-04-16 | 2022-10-25 | 현대자동차주식회사 | Method and apparatus for fusing sensor information, and recording medium for recording program performing the method |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE3728401A1 (en) * | 1987-08-26 | 1989-03-09 | Robot Foto Electr Kg | TRAFFIC MONITORING DEVICE |
| NL9300671A (en) * | 1993-04-20 | 1994-11-16 | Gatsometer Bv | Method and device for electronically recording an event, for example a traffic violation. |
| KR960001777A (en) * | 1994-06-01 | 1996-01-25 | 제임스 디. 튜턴 | Frequency Domain Processing Method of Doppler Signal for Vehicle Surveillance System |
| NL1004122C2 (en) * | 1996-04-01 | 1997-10-03 | Gatsometer Bv | Method and device for measuring the speed of a vehicle. |
| US5948038A (en) * | 1996-07-31 | 1999-09-07 | American Traffic Systems, Inc. | Traffic violation processing system |
| US7042345B2 (en) * | 1996-09-25 | 2006-05-09 | Christ G Ellis | Intelligent vehicle apparatus and method for using the apparatus |
| US6269446B1 (en) * | 1998-06-26 | 2001-07-31 | Canon Kabushiki Kaisha | Authenticating images from digital cameras |
| KR100294890B1 (en) * | 1998-07-01 | 2001-07-12 | 윤종용 | Digital video coder and decoder using watermarking and method therefor |
| JP2000152148A (en) * | 1998-11-13 | 2000-05-30 | Hitachi Ltd | Electronic camera |
| US7093131B1 (en) * | 2000-09-29 | 2006-08-15 | Seiko Epson Corporation | Information authenticating apparatus and authenticating station |
| US6512837B1 (en) * | 2000-10-11 | 2003-01-28 | Digimarc Corporation | Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration |
| BR0102542B1 (en) * | 2001-04-04 | 2009-01-13 | method and system for capturing and storing a sequence of images associated with one or more traffic violations. | |
| US6970102B2 (en) * | 2003-05-05 | 2005-11-29 | Transol Pty Ltd | Traffic violation detection, recording and evidence processing system |
| NL1027018C2 (en) * | 2004-09-10 | 2006-03-13 | Gatsometer Bv | Method and system for observing with radar the passing of a point to be monitored on a road through a vehicle. |
-
2002
- 2002-11-26 FR FR0214794A patent/FR2847755B1/en not_active Expired - Fee Related
-
2003
- 2003-11-24 WO PCT/FR2003/003462 patent/WO2004051596A1/en not_active Application Discontinuation
- 2003-11-24 AU AU2003294060A patent/AU2003294060A1/en not_active Abandoned
- 2003-11-24 EP EP03789477.1A patent/EP1570451B1/en not_active Expired - Lifetime
- 2003-11-24 US US10/536,315 patent/US7333632B2/en not_active Expired - Lifetime
Non-Patent Citations (1)
| Title |
|---|
| See references of WO2004051596A1 * |
Also Published As
| Publication number | Publication date |
|---|---|
| US7333632B2 (en) | 2008-02-19 |
| EP1570451B1 (en) | 2019-02-27 |
| US20060072789A1 (en) | 2006-04-06 |
| AU2003294060A1 (en) | 2004-06-23 |
| FR2847755B1 (en) | 2005-04-22 |
| WO2004051596A1 (en) | 2004-06-17 |
| FR2847755A1 (en) | 2004-05-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ES2364056T3 (en) | AUTOMATED SYSTEM FOR MONITORING AND COMMUNICATION OF TRAFFIC INFRACTIONS. | |
| EP1570451B1 (en) | Image authenticating methods | |
| US12002127B2 (en) | Robust selective image, video, and audio content authentication | |
| US7440594B2 (en) | Face identification device and face identification method | |
| JP4602931B2 (en) | How to ensure image set integrity | |
| US8531520B2 (en) | System and method for traffic monitoring | |
| EP2502211B1 (en) | Method and system for automatically checking the authenticity of an identity document | |
| CN106408952A (en) | Vehicle illegal behavior random photographing system and method | |
| EP3069290B1 (en) | Method and system for controlling access to or the exit from an area | |
| CN1889144A (en) | Electronic detecting device for carrying out management to motor vehicles and drivers | |
| CN106652477A (en) | Violation recognition method and device | |
| CA2865587A1 (en) | Method and apparatus for the detection of digital watermarks for instant credential authentication | |
| Lallie | Dashcam forensics: A preliminary analysis of 7 dashcam devices | |
| CA2756910A1 (en) | Method for capturing images of vehicles | |
| JP2020518165A (en) | Platform for managing and validating content such as video images, pictures, etc. generated by different devices | |
| KR101234347B1 (en) | Black box service providing method for vehicles enhanced security based on watermarking technique | |
| US20230008460A1 (en) | Method and system for logging event data | |
| CN111798667A (en) | Monitoring method, monitoring server, monitoring system and storage medium of non-motor vehicle | |
| KR20090073554A (en) | Embedded based vehicle image storage device and method | |
| CN117892334A (en) | Method and apparatus for providing image data | |
| CN106530727A (en) | Traffic violation information processing system | |
| KR102231434B1 (en) | Platform and implementing a method for p2p transaction/sharing service of black box images among drivers based on block chain technology | |
| KR101468407B1 (en) | Digital forensic photographing device and digital forensic photographing system installed in car for preventing abuse of personal image information using the device | |
| EP1683112A1 (en) | System for controlling information relating to a vehicle | |
| EP1526492B1 (en) | Method and apparatus for identifying a moving vehicle |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20050617 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
| DAX | Request for extension of the european patent (deleted) | ||
| 17Q | First examination report despatched |
Effective date: 20110727 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
| GRAJ | Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR1 |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
| GRAJ | Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR1 |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| INTG | Intention to grant announced |
Effective date: 20180607 |
|
| GRAJ | Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR1 |
|
| GRAJ | Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR1 |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
| INTG | Intention to grant announced |
Effective date: 20180619 |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
| INTG | Intention to grant announced |
Effective date: 20180717 |
|
| INTC | Intention to grant announced (deleted) | ||
| INTG | Intention to grant announced |
Effective date: 20180731 |
|
| GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
| REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
| REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1102482 Country of ref document: AT Kind code of ref document: T Effective date: 20190315 |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 60351838 Country of ref document: DE |
|
| REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20190227 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190627 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190527 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190528 |
|
| REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1102482 Country of ref document: AT Kind code of ref document: T Effective date: 20190227 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 60351838 Country of ref document: DE |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 |
|
| PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
| 26N | No opposition filed |
Effective date: 20191128 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 60351838 Country of ref document: DE |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20191130 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20191124 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20191130 |
|
| REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20191130 |
|
| GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20191124 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20191124 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20191124 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20191130 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200603 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20191130 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190227 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20031124 |