EP1710760B1 - Activation sécurisée de dispositifs - Google Patents
Activation sécurisée de dispositifs Download PDFInfo
- Publication number
- EP1710760B1 EP1710760B1 EP05007519.1A EP05007519A EP1710760B1 EP 1710760 B1 EP1710760 B1 EP 1710760B1 EP 05007519 A EP05007519 A EP 05007519A EP 1710760 B1 EP1710760 B1 EP 1710760B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- code
- determined
- parameter
- pin
- control centre
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Not-in-force
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/205—Housing aspects of ATMs
- G07F19/2055—Anti-skimming aspects at ATMs
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/207—Surveillance aspects at ATMs
Definitions
- the invention relates to a method for releasing at least one device in which the release is at least partially controlled by at least one first code. Moreover, the invention relates to a device and a system for calculating a release code. Moreover, the invention relates to a computer program product and a computer program with instructions executable on a processor such that at least one device is released, wherein the release is at least partially controlled by a first code.
- Such codes may be, for example, personal identification numbers (PIN).
- PIN personal identification numbers
- the PIN can be linked to other parameters via an encryption method.
- This is, for example, the 3DES encryption method, which is also used in the banking industry.
- 3DES encryption method using two secret keys in a three-step process, the parameter is encrypted with the first key, decrypted with the second key, and finally encrypted with the second key.
- the result is a PIN that is uniquely linked to the parameter.
- a comparison PIN can then be calculated using the parameters in the device using the identical, secret key.
- the comparison PIN is compared with the entered PIN. If they match, they can be released.
- the publication BE 1006817 A6 generally relates only to a release system in which release keys are communicated in a bidirectional communication between the devices.
- the publication EP 1 260 659 describes a method for controlling an electronic lock. From her is known that a lock can be easily adjusted to the requirements of a user, without the need for a bespoke manufacture of the appropriate locks is required.
- a method for personalizing a key memory in an ATM during commissioning by the service technician using a portable personalization device is known.
- the personalization device is connected to a security module on site.
- a secure connection is established between the security module and the personalizer to unlock.
- the security module sends a public key of a module key pair, whose private key is stored in a secret key memory, to the personalizer.
- the public key of the module key pair is signed by the security module by means of a private key of a signing key pair and transmitted back to the security module.
- the signed, certified key, which is transmitted back to the security module represents a code. After transmission of the code, the connection between personalizer and security module is disconnected and the security module is released and in normal operating condition.
- the WO 03/014858 A2 relates to a method for activating a vending machine.
- a customer identifies the vending machine and, if necessary, the desired product.
- at least the unique serial number of the vending machine is transmitted to a central office.
- a number is calculated using the serial number, a time and a secret mathematical function. This result is transmitted by the control center to the customer. He enters the solution in the vending machines.
- the vending machine knows both his own Serial number, the time as well as the magic mathematical function.
- the vending machine compares the entered result with the result calculated by the vending machine. If the result of the comparison is positive, the vending machine is activated.
- the document DE 100 05 487 A1 describes a method for user identity control at a service terminal.
- a terminal for example a mobile telephone, has a code generation device. With the help of the mobile phone, the payment is made at a service terminal.
- WO 2005/022474 A1 a method for performing electrical online transactions is described.
- a bank customer logs in to an authentication server with a password. This happens via a first communication channel.
- the customer then receives an encrypted unique identifier from a security server via a second communication channel. This identifier is sent back to the authentication server via the first communication channel for authentication, which has also received the identifier from the security server. If the comparison result is positive, the transaction is completed.
- the US 2004/0022542 A1 includes a method and system for wirelessly activating a target object.
- the system includes a target object, a communication device, an activation device, and a central network device.
- the target object used is, for example, a CD or a DVD.
- a user sends a PIN and an identification number of the target object to the central network device. These checks the received data, for example. In the case of a positive check, the central network device sends an activation signal to the communication device. The target object is activated via the activation device.
- a secret PIN known only to the customer
- PINPad a keyboard
- a customer card is used to read a customer number or an account number by means of a card reader, with the aid of which the PIN was generated.
- the PIN is checked in the chip of the customer card or online by querying a central office for accuracy.
- the four-eyes principle is pursued. This principle is based on the fact that two local technicians install and activate the card reader together with the PinPad if necessary. The two service technicians install the card reader in the front panel and connect it to the PinPad. To activate the card reader, the security-relevant data must be fed into the card reader.
- the PIN and the personnel number of the two service technicians are queried in accordance with the four-eye principle.
- a first service technician enters his PIN and personnel number into the PinPad.
- a comparison PIN can be calculated with the help of the personnel number and a partial release can be made if there is a match.
- the second service technician can also enter his PIN and personnel number into the PinPad.
- a check is performed in the PinPad. In the event that both PINs belong to the entered personnel numbers, a release of the PinPad can take place.
- the security-relevant data can then be transmitted to the card reader in order to activate it.
- Facilities may include PinPads, card readers, ATMs, ticket machines, access barriers, Lockers, parking machines, track systems or other technical facilities.
- the release of such a device may be that actions are triggered, data released or transmitted.
- a code is generated which is determined by parameters of at least two entities. These parameters together with the code can be entered into the device and checked there. If the code is suitable for releasing the device, it is released.
- At least two of the entities are spatially separated.
- the spatial separation of the entities and the dependence of the first code on the two entities can ensure that the release of the device is secure. It is not possible that, for example, a person on site alone generates the first code and thus releases the device. Rather, two spatially separated entities must be involved in the generation of the code, which prevents a manipulation by only a single person on the device allows the release.
- At least one entity is a person and the parameters determined by this entity are personal parameters.
- the first code is generated with parameters of at least two persons, which are spatially separated.
- the personal parameters may be, for example, personal data, personnel numbers, names, addresses, dates of birth or other parameters.
- the personal parameters can be specified by the persons themselves.
- At least one entity is the device to be released, and the parameters determined by this entity are device-related parameters.
- Device-related parameters may be, for example, station identifications, manufacturer information or station names.
- the device-related parameters can be determined with the help of the device itself. For example, these can be read on the device or the device outputs this automatically.
- the device is formed of a PinPad and a card reader.
- the device related parameters may be related to both the PinPad and the card reader.
- the parameters related to the card reader may be transferred from the card reader to the PinPad and output from the PinPad.
- a release can be designed particularly reliably if, according to an advantageous exemplary embodiment, the parameters determined by an entity are time-related parameters.
- the time-related parameters may be the current date, the current time, or the number of days since a key date.
- the time-related parameters it is possible that the first code has only a certain validity period.
- a time related parameter may represent a particular day. The code generated with this time-related parameter can then only release on that one day.
- the parameters determined by an entity are order-related parameters.
- order numbers are generated. Each individual release order can thus be assigned a unique number. This allows the release of facilities to be traced back. With the order number can be traced, by means of which entity the code was generated and for which device this code was used. This allows a preservation of evidence in the event of fraud.
- At least one parameter determined by a device-side entity is transmitted to a center remote from the device.
- Device-side entities may be, for example, the device itself, devices connected to the device, or persons working on the device.
- parameters can be determined which can only be determined directly on site at the device. If these parameters, which can only be detected on site, are transmitted to a remote control center and used there to generate a code, it is ensured that no code can be generated in the control center which is not intended directly for a specific device.
- At least one parameter determined by a central-entity and at least one parameter determined by the device-side entity are used for the calculation of the first code.
- the central entity can be a technician in the central office or any device in the central office. This ensures that the first code is dependent on both central and device-side entities. This ensures that the first code can only be calculated by the interaction of the locally separated entities.
- the parameter determined by the central-entity is transmitted to the device.
- the release can only be made with the help of institution-side and central-entity entities. It is no longer possible, for example, for two service technicians to look over the shoulder when entering the personnel number and PIN and thus to spy on each other's PIN in order to be able to manipulate other card readers.
- the at least one parameter determined by the central entity be at least partially encrypted. This prevents the parameter from being made known by the central entity in plain text outside the central.
- the centrally calculated first code is transmitted to the device.
- the centrally calculated first code is entered into the device together with the parameters determined by the central entity in order to be able to check the correctness of the first code.
- the centrally calculated first code is checked on the device side, at least with the aid of the at least one central-side parameter transmitted by the center.
- the first code is entered into the device together with the parameters transmitted by the center.
- the device can then calculate a comparison code and compare it with the first code.
- the first code be calculated on the central side and the device side with the same calculation rule.
- the first code is calculated using the parameters from the central entity and the parameters from the device-side entity.
- the first code is entered together with the parameters determined by the central-entity and the parameters determined by the device-side entity.
- a comparison code can be calculated with the same calculation rule to check whether the first code is actually in the center with the same Information was created. If the first code and the comparison code match, a release can at least partially take place.
- At least the first code is calculated by means of a symmetric encryption method.
- a DES encryption method can be used. It is also possible to use a 3DES encryption method.
- the encryption methods may have key lengths of 56 bits and 112 bits, respectively.
- encryption methods according to the CAST-128 algorithm, the Twofish algorithm, the Blowfish algorithm and the asymmetric IDEA algorithm are possible.
- the release of the device be controlled at least by the first code and a second code.
- the second code may be a PIN entered by a device-side entity as well as a corresponding device-side entity parameter. It is understood that the second code serves as a further safeguard against manipulation attempts. However, release can be done with only the first code, if so specified.
- the second code is determined with the aid of personal parameters.
- a PIN can be generated as a second code.
- the second code can be entered into the facility along with the personal parameters.
- In the device can be a comparison code with the help of personal parameters are compared with the entered second code.
- the names of the codes as the first code and the second code do not specify their order. Rather, the order of the two codes is arbitrary for a release. Also, in addition to the first and the second code even more codes may be necessary for release.
- the first code be transmitted via a direct electronic communication link between the device and the center.
- the electronic communication connection can be wired or wireless, packet-switched or circuit-switched.
- the transmission can be done for example via mobile, wireless LAN, Internet, ISDN or DSL.
- the first code can be transmitted directly from the center to the device without, for example, a service technician is involved in the field in the transmission.
- the on-site service technician could trigger the generation of the first code at headquarters by entering his personal code along with his personal information. After entering his personal code with his personal parameters, the institution may review the personal code. If the check is correct, the center can be automatically prompted by the facility to generate the first code, for example, by the on-site service engineer's personal parameters and facility-related Parameters are transmitted to the control center. In the center then the first code with the personal parameters of the service technician on site, the facility-related parameters and central parameters can be generated and transmitted back to the device.
- the central-side parameters may include, for example, a personnel number and a PIN of an employee in the central office.
- the parameters used to generate the first code are transmitted.
- the device is enabled to generate a comparison code that can be compared to the first code. If there is a match then the complete release can take place.
- a further subject of the invention is a device comprising input means for inputting parameters from at least two entities and for inputting at least one first code, and release means for at least partially releasing the device upon positive verification of at least the first code determined using parameters from at least two entities ,
- An additional subject matter of the invention is a system for calculating a release code, having a previously described device and a control center, characterized in that the control center is set up to calculate at least one first code with the aid of parameters from at least two entities.
- Another aspect of the invention relates to a computer program product and a computer program with instructions executable on a processor such that at least one device is released, wherein the release is at least partially controlled by at least one first code and the first code is determined by means of parameters of at least two entities.
- Fig. 1 shows a vending machine 2 with a housed in a housing 4 PinPad 6 and accommodated in a housing 8 card reader 10.
- the vending machine 2 may for example be a ticket machine or ATM.
- a microprocessor 12 and a memory area 14 are arranged in the housing 4.
- the housing 4 is a "temper responsive" housing, which means that the housing 4 can not be opened nondestructively. When opening the housing 4, all data stored in the microprocessor 12 and memory area 14 is lost.
- a card reader 10, a microprocessor 16 and a memory area 18 are arranged in the vending machine 2 in the housing 8.
- the housing 8 is also a "temper responsive" housing.
- the interfaces may be conventional communication interfaces, such as Firewire (IEEE1394), RS232 or USB.
- the card reader 10 has a chip contacting unit 24 and a card slot 26.
- the housing 8 is designed so that in the vending machine 2 in a front panel only the card reader 10 can be seen and the microprocessor 16 and the memory area 18 are arranged invisibly inside the vending machine 2.
- a customer with a chip card 28 can actuate the vending machine 2.
- the chip card 28 is inserted into the card slot 26 and the chip contacts of the chip 30 contacted by means of the chip contacting unit 24.
- Customer data for example an account number, can be read out via the chip contacts of the chip 30.
- the read-out account number can be transmitted via the microprocessor 16, the interface 22, the data line 24 and the interface 20 to the microprocessor 12.
- the customer can use the PinPad 6 to enter their personal PIN.
- it is encrypted after the input with the aid of the microprocessor 16 and at least one stored in the memory area 14 secret key and sent via a network operator computer to an authorization point.
- the authorization center can verify the PIN online with the help of the account number and correct the action desired by the customer at the vending machine 2 also via the network operator computer.
- An offline PIN check can be carried out in the chip 30 of the chip card 28.
- the PIN entered by a customer into the PinPad 6 is transmitted via the microprocessor 12, the interface 20, the data line 24 and the interface 22 to the microprocessor 16. Since the PIN is transmitted outside the housing 4, 8, and thus is no longer within the "temper responsive" areas, the PIN entered into the PinPad 6 is encrypted in the microprocessor 12 and decrypted after transmission via the data line 24 in the microprocessor 16.
- 16 secret keys are stored in the memory areas 14, 18.
- the decrypted PIN is applied via the chip contacting unit 24 directly to the chip contacts of the chip 30.
- the PIN is applied to the chip contacts of the chip 30 unencrypted.
- a PIN check is performed, and in the case of a positive check, a desired action by the customer at the vending machine 2 is effected via the microprocessor 16.
- the PIN is in plain text.
- the chip contacting unit 24 is connected to the chip contacting unit of the dummy in the front wall of the vending machine 2 via a data line.
- the PIN check in the chip 30 takes place without the customer noticing anything.
- the PIN can be tapped in plain text. If this happens, the attacker can easily use the PIN in the future, possibly triggering a payment transaction with a compromised card at another vending machine.
- the Card reader 10 without losing its functionality, can be removed from the front wall of the vending machine 2 and replaced by a dummy.
- the Card reader 10 is provided with a sensor 32 which detects the removal of the card reader 10 from the front wall of the vending machine 2. In this case, all data stored on the microprocessor 16 and in the storage area 18 is cleared. Characterized in that the data in the microprocessor 16 and in the memory area 18 have been deleted, an encrypted PIN transmitted by the microprocessor 12 in the microprocessor 16 can no longer be decrypted and a plain text transmission of the PIN to the chip contacting unit 24 is impossible.
- the secret information in particular the keys for the decryption of the PIN transmitted encrypted on the data line 24, must be loaded from the PinPad 6 into the card reader 10.
- the 4-eyes principle is used for this.
- a field service technician having installed the card reader 10 in the front wall of the vending machine 2, will be prompted to enter his personal PIN and personnel number into the PinPad 6.
- a comparison PIN is calculated in the microprocessor 12 using at least one secret key and compared with the PIN entered by the service technician. If these two match, the service technician entered the correct PIN associated with his personnel number.
- a second field service technician will then be prompted to enter his PIN and personnel number into the PinPad 6.
- This second PIN is also checked by means of the microprocessor 12.
- all security-relevant keys are loaded from the PinPad 6 in the card reader 10 via the interface 20, the data line 24 and the interface 22.
- the data is encrypted to prevent a tap on the data line 24.
- the keys After the keys have been transmitted, they are stored in the memory area 18 of the card reader 10 and can henceforth be used for the decryption of encrypted PIN.
- the card reader is now again suitable for offline PIN verification.
- a disadvantage of the described method is that two service technicians must be present on site to activate a card reader 10. This is associated with high costs. In addition, it is possible that the service technicians spy and spy on the PIN and personnel number of the other service technician. It would then be possible for a single field service technician to activate an activation of a card reader 10.
- a method has been developed which allows to carry out the exchange and activation of the card reader on site with only one service technician, while maintaining the four-eye principle.
- FIG. 2 shows a system for carrying out the method according to the invention.
- a service technician 34 can service the activation of a card reader 10 in a vending machine 2 on site.
- the service technician 34 or the vending machine 2 is connected via a communication link 36 to a communication network 38.
- the communication link 36 may be, for example be a mobile connection.
- a communication link 40 is made with a central 42.
- a service technician 44 may accompany the activation of the ticket reader for vending machines 2.
- a bidirectional data communication between the control center 42 and service technician 44 and vending machine 2 and service technician 34 is ensured via the communication link 36, the communication network 38 and the communication link 40.
- Fig. 3 shows a flowchart of a method according to the invention.
- a service technician 34 drives to a vending machine 2 to activate a card reader 10.
- the card reader 10 After installation of the card reader 10 in the vending machine 2, this card reader 10 logs on via the data line 24 at the PinPad 6. At registration, for example, the card reader 10 may transmit its terminal identification (TID), station number (STAT_ID) and station issuer number (STAT_ISS) to the PinPad 6. In addition, a further identifier (S & B_ID) and a constant (K1) can be transmitted to the PinPad 6. This information is device-side parameter. The device-side parameters are transmitted from the card reader 10 or the vending machine 2 to the PinPad 6 (50).
- TID terminal identification
- STAT_ID station number
- STAT_ISS station issuer number
- K1 constant
- This information is device-side parameter.
- the device-side parameters are transmitted from the card reader 10 or the vending machine 2 to the PinPad 6 (50).
- the PinPad 6 notifies (52) the service technician 34 that the card reader must be activated. It is also conceivable that the service technician 34 immediately on the PinPad 6 by entering a shortcut activation of a card reader 10 begins.
- the service technician 34 enters his personal identification number (PIN_ST) and his personnel number (PNR_ST) in the PinPad 6 (54).
- PIN_ST the entered PIN_ST is checked in microprocessor 12.
- the operation PIN_ST ( ( 3 ⁇ OF e K SB_Key ( PNR_ST
- the parameters x are encoded in a three-level DES method with two secret keys K SB_Key .
- the PIN_ST entered by the service technician has already been determined with the same parameters and calculation rule. If the PIN_ST entered matches the calculated one, a first step of releasing a card reader 10 has taken place.
- the PinPad 6 notifies the service technician 34 of the successful Partial Release (56) 56. In addition, the PinPad 6 displays the device-related parameters such as TID, STAT_ID, STAT_ISS, DAT, K1 to the service technician 34.
- the service technician 34 transmits (58) the device-related parameters together with his own personnel number (PNR_ST) via a communication link to the control center 42.
- the service technician also transmits a time stamp DAT the central office.
- the timestamp can represent the current day and allows the release to be limited to a specific day.
- the central 42 requests the service technician 44 in the center (60) to announce his personnel number (PNR_RM) and / or his PIN (PIN_RM).
- the service technician 44 transmits (62) his personnel number and / or his PIN to a computer in the center 42.
- the personnel number of the service technician 44 is encrypted in the center.
- the personnel number of the service technician 44 (PNR_RM), the terminal number (TID), a second constant (K2), the additional identifier (S & B_ID) and the current date (DAT) are used for this purpose.
- the current date (DAT) may also have been calculated using a number of days since a key date.
- PNR_RM * ( ( 3 ⁇ OF e K SB_Key ( PNR_RM
- the encrypted personnel number PNR_RM * is truncated to 3 decimal places using MOD 0xF000 and MOD 1000.
- a unique order number (AUFT_ID) is generated in the control center 42.
- AUFT_ID the order number
- PNR_RM * the encrypted personnel number
- DAT the date
- the encrypted order number is truncated to two decimal places using MOD 0xF00.
- the PIN_AT contains an encrypted 6-digit decimal value, which is generated by means of 3-DES from the personnel number of the service technician on site (PNR_ST), the encrypted order number (ORDER *), the terminal number (TID), the station number (STAT_ID) and the station issuer. Number STAT_ISS is formed.
- the entire process of creating the PIN_AT with all associated parameters is archived in the control center 42 in terms of database technology. In cases of fraud or manipulation, it is always possible to comprehend the card reader commissioning completely.
- the data is stored in the control center 42 for at least 3 years.
- the parameters Personnel no. of the technician in the control center PNR-RM, personnel no. Service technician on site PNR_ST, terminal ID TID, order number AUFT_ID, station number STAT_ID, station error STAT_ISS, time stamp DAT.
- the control center 42 transmits (64) to the service technician 34 via the communication network 38 the generated order number AUFT_ID and the PIN_AT containing the encrypted personnel number PNR_RM *.
- the center 42 may also provide this information directly transferred to the PinPad 6.
- a mobile connection for data transmission can be used.
- the service technician 34 enters into the PinPad 6 the data just obtained (66).
- the service technician 34 has already communicated his personnel number PNR_ST to the PinPad 6 (54).
- PIN_AT ( ( 3 ⁇ OF e K SB_Key ( PNR_ST
- the PIN_AT calculated in the PinPad 6 is entered with the PIN_AT entered into the PinPad 6 by the service technician 34 compared (6). In the case of a positive comparison, the service technician 34 is informed of the successful release (68).
- keys (key) for decrypting PIN are transmitted from the PinPad 6 to the card reader 10 via the data line (70).
- the keys (key) are transferred from the memory area 14 via the interface 20, the data line 24 and the interface 22 to the memory area 18.
- the security-relevant data transmitted here, in particular the keys (key) for the offline PIN check, differ regularly from the keys (K SB_Key ) for carrying out the above-described 4-eyes principle by means of 3DES.
- the 3DES encryption is based on the fact that the keys K SB_KEY are secret. If these keys are no longer secret for some reason, it is possible to load new keys K SB_KEY into the memory area 14 of the pin pad 6 by means of a remote transmission so that subsequent checks of the PIN are again safe.
- the inventive method is characterized in particular by the fact that the costs for a second service technician can be saved on site.
- the method according to the invention is further distinguished by the fact that the entities involved in the activation do not know each other and therefore can not spy on each other.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Claims (17)
- Procédé d'activation sécurisée pour un dispositif technique (2, 6, 10), dans lequel l'activation sécurisée est contrôlée, au moins partiellement, par au moins un premier code (PIN_AT),- sachant qu'un paramètre relatif au dispositif (TID, STAT_ID, STAT_ISS), déterminé par le dispositif (2, 6, 10), est transmis à une centrale (42) spatialement éloignée du dispositif,- sachant que le paramètre relatif au dispositif (TID, STAT_ID, STAT_ISS) peut être déterminé au moyen du dispositif (2, 6, 10) lui-même,
caractérisé en ce que- un paramètre relatif à une personne (PNR_ST), déterminé côté dispositif, TID, STAT_ID, STAT_ISS), est transmis à la centrale (42) spatialement éloignée du dispositif,- le paramètre relatif à une personne (PNR_ST), déterminé côté dispositif, est un paramètre relatif à une personne, lequel concerne une première personne (34), qui est présente sur les lieux du dispositif (2, 6, 10),- le premier code (PIN_AT) est calculé dans la centrale, au moyen d'un paramètre relatif à une personne (PNR_RM), déterminé côté centrale, du paramètre relatif à une personne (PNR_ST), déterminé côté dispositif, d'un paramètre (AUFT_ID) côté centrale, déterminé par la centrale (42), et du paramètre relatif au dispositif (TID, STAT_ID, STAT_ISS),- sachant que le paramètre relatif à une personne (PNR_RM), déterminé côté centrale, est un paramètre relatif à une personne, lequel concerne une deuxième personne (44), qui est spatialement séparée de la première personne (34),- sachant que le paramètre côté centrale (AUFT_ID), déterminé par la centrale, est transmis au dispositif (2, 6, 10),- sachant que le premier code (PIN_AT) est transmis au dispositif (2, 6, 10), et- que le premier code est vérifié, côte dispositif, au moins au moyen du paramètre, côté centrale, déterminé par la centrale (42),- sachant que le dispositif (2, 6, 10) est activé, au moins partiellement, quand le résultat de la vérification du premier code (PIN_AT) est positif. - Procédé selon la revendication 1, caractérisé en ce que le paramètre déterminé par le dispositif (2, 6, 10) est un paramètre relatif au temps (DAT).
- Procédé selon l'une des revendications 1 à 2, caractérisé en ce que le paramètre déterminé par le dispositif (2, 6, 10) est un paramètre relatif à un ordre.
- Procédé selon l'une des revendications 1 à 3, caractérisé en ce que le paramètre déterminé par la centrale (42) est codé, au moins partiellement.
- Procédé selon l'une des revendications 1 à 4, caractérisé en ce que le premier code (PIN_AT) est calculé, côté centrale et côté dispositif, selon la même règle de calcul.
- Procédé selon l'une des revendications 1 à 5, caractérisé en ce que le premier code (PIN_AT) est calculé au moyen d'un procédé de codage symétrique.
- Procédé selon l'une des revendications 1 à 6, caractérisé en ce que l'activation sécurisée du dispositif (2, 6, 10) est au moins contrôlée par le premier code (PIN_AT) et par un deuxième code (PIN_ST).
- Procédé selon la revendication 7, caractérisé en ce que le deuxième code (PIN_ST) est déterminé au moyen de paramètres relatifs à une personne (PNR_ST), qui concernent la première personne (34).
- Procédé selon l'une des revendications 7 ou 8, caractérisé en ce que le deuxième code (PIN_ST) est vérifié, côté dispositif, au moins au moyen d'au moins le paramètre relatif à une personne (PNR_ST), qui concerne la première personne (34).
- Procédé selon l'une des revendications 1 à 9, caractérisé en ce que le premier code (PIN_AT) au moins est transmis par l'intermédiaire d'une liaison de communication électronique, directe, entre le dispositif (2, 6, 10) et la centrale (42).
- Système de calcul d'un code d'activation sécurisée,- avec un dispositif technique (2, 6, 10), qui comprend :- avec des moyens de sortie d'un paramètre relatif au dispositif (TID, STAT_ID, STAT_ISS), qui est déterminé par le dispositif (2, 6, 10),- sachant que le paramètre relatif au dispositif (TID, STAT_ID, STAT_ISS) peut être déterminé au moyen du dispositif (2, 6, 10) lui-même,- avec des moyens d'entrée pour l'entré d'un paramètre relatif à une personne (PNR_ST) déterminé côté dispositif,- sachant que le paramètre relatif à une personne (PNR_ST), déterminé côté dispositif, est un paramètre relatif à une personne, lequel concerne une première personne (34), qui est présente sur les lieux du dispositif (2, 6, 10), et- avec une la centrale (42), qui est spatialement séparée du dispositif (2, 6, 10),- sachant que la centrale (42) est aménagés pour le calcul d'un premier code (PIN_AT) au moyen d'un paramètre relatif à une personne (PNR_RM), déterminé côté centrale, du paramètre relatif à une personne (PNR_ST), déterminé côté dispositif, d'un paramètre (AUFT_ID), côté centrale, déterminé par la centrale (42), et du paramètre relatif au dispositif (TID, STAT_ID, STAT_ISS),- sachant que le paramètre relatif à une personne, déterminé côté centrale (PNR_RM) est un paramètre relatif à une personne, lequel concerne une deuxième personne (44), qui est spatialement séparée de la première personne (34),- sachant que les moyens d'entrée sont, de plus, aménagés pour l'entrée du premier code (PIN_AT), déterminé par la centrale, et du paramètre côté centrale (AUFT_ID), déterminé par la centrale (42), et- sachant que le dispositif (2, 6, 10) comprend, de plus, des moyens d'activation sécurisée, qui, lors d'un résultat positif de la vérification du premier code (PIN_AT), activent, au moins partiellement, le dispositif (2, 6, 10), au moyen du paramètre, côté centrale (AUFT_ID), déterminé par la centrale (42).
- Système selon la revendication 11, caractérisé par des moyens de calcul côté dispositif, destinés au calcul d'un code de comparaison, au moins au moyen des paramètres introduits.
- Système selon la revendication 11, caractérisé par des moyens de comparaison côté dispositif, pour la comparaison entre le code de comparaison calculé et le premier code.
- Procédé selon la revendication 11, caractérisé en ce que les moyens d'activation sécurisée sont aménagés pour activer, au moins partiellement, le dispositif en cas de concordance entre au moins le premier code et le code de comparaison.
- Système selon l'une des revendications 11 à 14, caractérisé en ce que les moyens de calcul sont aménagés pour le calcul du code au moyen d'une règle de codage symétrique.
- Programme d'ordinateur, qui peut être exécuté, avec des instructions, sur un processeur, de sorte qu'au moins un dispositif d'un système selon la revendication 11, puisse être activé de manière autorisée au moyen d'un procédé selon la revendication 1.
- Produit de programme d'ordinateur, qui comprend un programme d'ordinateur, qui peut être exécuté, avec des instructions, sur un processeur, de sorte qu'au moins un dispositif d'un système selon la revendication 11, puisse être activé de manière sécurisée au moyen d'un procédé selon la revendication 1.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PL05007519T PL1710760T3 (pl) | 2005-04-06 | 2005-04-06 | Bezpieczne zwalnianie urządzeń |
EP05007519.1A EP1710760B1 (fr) | 2005-04-06 | 2005-04-06 | Activation sécurisée de dispositifs |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05007519.1A EP1710760B1 (fr) | 2005-04-06 | 2005-04-06 | Activation sécurisée de dispositifs |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1710760A1 EP1710760A1 (fr) | 2006-10-11 |
EP1710760B1 true EP1710760B1 (fr) | 2013-11-27 |
Family
ID=34934804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05007519.1A Not-in-force EP1710760B1 (fr) | 2005-04-06 | 2005-04-06 | Activation sécurisée de dispositifs |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1710760B1 (fr) |
PL (1) | PL1710760T3 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2810139C1 (ru) * | 2020-07-01 | 2023-12-22 | Сфинкс Электроникс Гмбх Унд Ко Кг | Способ и система для запуска или администрирования офлайн-устройства управления |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102008021046A1 (de) | 2008-04-26 | 2009-10-29 | Wincor Nixdorf International Gmbh | Verfahren zur Inbetriebnahme einer Tastatur eines Selbstbedienungsterminals |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10005487A1 (de) * | 2000-02-08 | 2001-08-09 | Siemens Ag | Verfahren zur Nutzeridentitätskontrolle |
WO2003014858A2 (fr) * | 2001-08-09 | 2003-02-20 | Scott Edward James Garratt | Procede d'actionnement de distributeur automatique |
WO2004056030A2 (fr) * | 2002-12-17 | 2004-07-01 | Wincor Nixdorf International Gmbh | Personnalisation d'un module de securite |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
BE1006817A6 (nl) * | 1993-03-19 | 1994-12-13 | Laureyssens Dirk | Random slot. |
US5668876A (en) * | 1994-06-24 | 1997-09-16 | Telefonaktiebolaget Lm Ericsson | User authentication method and apparatus |
EP1260659A3 (fr) * | 2001-05-23 | 2004-02-04 | Burg-Wächter Kg | Procédé de contrôle d'une serrure électronique |
-
2005
- 2005-04-06 PL PL05007519T patent/PL1710760T3/pl unknown
- 2005-04-06 EP EP05007519.1A patent/EP1710760B1/fr not_active Not-in-force
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10005487A1 (de) * | 2000-02-08 | 2001-08-09 | Siemens Ag | Verfahren zur Nutzeridentitätskontrolle |
WO2003014858A2 (fr) * | 2001-08-09 | 2003-02-20 | Scott Edward James Garratt | Procede d'actionnement de distributeur automatique |
WO2004056030A2 (fr) * | 2002-12-17 | 2004-07-01 | Wincor Nixdorf International Gmbh | Personnalisation d'un module de securite |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2810139C1 (ru) * | 2020-07-01 | 2023-12-22 | Сфинкс Электроникс Гмбх Унд Ко Кг | Способ и система для запуска или администрирования офлайн-устройства управления |
Also Published As
Publication number | Publication date |
---|---|
PL1710760T3 (pl) | 2014-04-30 |
EP1710760A1 (fr) | 2006-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69031889T2 (de) | Verfahren zur Erzeugung einer einmaligen Zahl für eine Mikroschaltungskarte und Verwendung derselben zur Zusammenarbeit der Karte mit einem Wirtssystem | |
DE3044463C2 (fr) | ||
EP0030381B1 (fr) | Procédé et dispositif pour la production et le contrôle de documents protégés contre des falsifications et document utilisé à cet effet | |
DE69531278T2 (de) | Verfahren und Vorrichtung zum Laden einer geschützten Speicherzone in einem Datenverarbeitungsgerät | |
DE3809170C2 (fr) | ||
EP2215609B1 (fr) | Procédé de déverrouillage d'une fonction de carte à puce au moyen d'un contrôle à distance | |
DE19860177C2 (de) | Verfahren und Vorrichtung zur benutzerkontrollierten Freischaltung von Chipkartenfunktionen | |
EP2949094A1 (fr) | Procédé d'authentification d'un usager vis-à-vis d'un distributeur automatique | |
EP1254436A1 (fr) | Procede de controle de l'identite d'un utilisateur | |
DE102011116489A1 (de) | Mobiles Endgerät, Transaktionsterminal und Verfahren zur Durchführung einer Transaktion an einem Transaktionsterminal mittels eines mobilen Endgeräts | |
EP1687932B1 (fr) | Autorisation d'une transaction | |
WO2011131359A1 (fr) | Procédé de manipulation de billets électroniques | |
WO1998050894A1 (fr) | Systeme permettant une lecture et un traitement proteges de donnees sur des supports de donnees intelligents | |
DE102007041370B4 (de) | Chipkarte, elektronisches Gerät, Verfahren zur Herstellung einer Chipkarte und Verfahren zur Inbenutzungnahme einer Chipkarte | |
EP1710760B1 (fr) | Activation sécurisée de dispositifs | |
EP0117907B1 (fr) | Méthode et module pour l'examen de données électroniques | |
EP2996299B1 (fr) | Procédé et système d'autorisation d'une action sur un système auto-commandé | |
EP2473942A1 (fr) | Procédé et dispositif d'activation d'un support de données portatif | |
WO2001004771A2 (fr) | Systeme pour effectuer une transaction | |
DE69110544T2 (de) | Vorrichtung zur Bearbeitung von Hochsicherheitsdaten mit zwei Betriebsständen. | |
EP1066607B1 (fr) | Appareil et procede pour la distribution securisee de bons de valeur | |
DE10020562C1 (de) | Verfahren zum Beheben eines in einer Datenverarbeitungseinheit auftretenden Fehlers | |
EP1854001A1 (fr) | Procede d'activation de fonction securisee pour des modules | |
EP1650716A1 (fr) | Procédé de gestion des droits d'utilisateur d'un objet protégé par un code | |
DE4201967C2 (de) | Verfahren und Anordnung zum Sicherstellen der Integrität von auszudruckenden oder zu stempelnden Daten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060320 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
17Q | First examination report despatched |
Effective date: 20070111 |
|
AKX | Designation fees paid |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
R17C | First examination report despatched (corrected) |
Effective date: 20100927 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20130426 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
INTG | Intention to grant announced |
Effective date: 20131001 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 642983 Country of ref document: AT Kind code of ref document: T Effective date: 20131215 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: NV Representative=s name: TROESCH SCHEIDEGGER WERNER AG, CH |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 502005014091 Country of ref document: DE Effective date: 20140116 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: T3 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: T3 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140327 |
|
REG | Reference to a national code |
Ref country code: PL Ref legal event code: T3 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140327 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502005014091 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20140828 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502005014091 Country of ref document: DE Effective date: 20140828 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20141231 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140430 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: PL Payment date: 20160331 Year of fee payment: 12 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20050406 Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131127 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IE Payment date: 20160426 Year of fee payment: 12 Ref country code: GB Payment date: 20160422 Year of fee payment: 12 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20170426 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 20170425 Year of fee payment: 13 Ref country code: LU Payment date: 20170425 Year of fee payment: 13 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20170406 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170406 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170406 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20180420 Year of fee payment: 14 Ref country code: DE Payment date: 20180420 Year of fee payment: 14 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20180424 Year of fee payment: 14 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170406 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MM Effective date: 20180501 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20180430 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180406 Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180430 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 502005014091 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MM01 Ref document number: 642983 Country of ref document: AT Kind code of ref document: T Effective date: 20190406 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190430 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20191101 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190430 Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190406 |