EP1854050A1 - Verfahren zur erfassung eines bildes unter verwendung einer vorrichtung und zum erhalten von informationen bezüglich des bildes, wobei das bild eine marke enthält - Google Patents

Verfahren zur erfassung eines bildes unter verwendung einer vorrichtung und zum erhalten von informationen bezüglich des bildes, wobei das bild eine marke enthält

Info

Publication number
EP1854050A1
EP1854050A1 EP05779754A EP05779754A EP1854050A1 EP 1854050 A1 EP1854050 A1 EP 1854050A1 EP 05779754 A EP05779754 A EP 05779754A EP 05779754 A EP05779754 A EP 05779754A EP 1854050 A1 EP1854050 A1 EP 1854050A1
Authority
EP
European Patent Office
Prior art keywords
user
image
tag
data
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05779754A
Other languages
English (en)
French (fr)
Inventor
Roberto Mariani
Shankar Narayanan
Parikshit Paspulati
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tagit Pte Ltd
Original Assignee
Tagit Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from SG200405362A external-priority patent/SG121004A1/en
Priority claimed from SG200407257A external-priority patent/SG123612A1/en
Application filed by Tagit Pte Ltd filed Critical Tagit Pte Ltd
Publication of EP1854050A1 publication Critical patent/EP1854050A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/70Determining position or orientation of objects or cameras

Definitions

  • This invention relates to a system and method for capturing an image and obtaining information regarding the image and refers particularly, though not exclusively, to such a system and method for capturing an image from a television or other image source and using a telecommunications enabled apparatus to obtain information relating to the image.
  • Advertising is now a global industry. In many instances, though, user interaction is not possible, and users cannot readily, and speedily, obtain information relating to the product being advertised. Furthermore, normally a separate and unrelated action is required for following-up a promotion, offer, initiating a commercial transaction, or the like.
  • a method for capturing an image using an apparatus and obtaining information regarding the image, the image containing a tag comprising:
  • the server sending a response message to the apparatus.
  • the information obtained regarding the image may be whether a user is authenticated for a payment transaction, the image being a representation forming a part of a financial instrument, the representation comprising an encrypted version of data pertaining to the user.
  • the data pertaining to the user may be compressed in the image.
  • the data pertaining to the user may be compressed in the server.
  • the data pertaining to the user may comprise at least one selected from the group consisting of: a number of the financial instrument, an expiry date of the financial instrument, the user's name, the user's date of birth, the user's address, and a photograph of the user's face.
  • the financial instrument may be selected from the group consisting of: credit card, debit card and letter of credit.
  • Authentication may comprise:
  • the method may further comprise sending an authentication message to a financial institution.
  • the method may further comprise sending an acknowledgement of authentication.
  • the image may be captured using at least one of: a mobile telephone with a digital camera, a mobile camera phone, a telecommunications enabled PDA with a digital camera, a digital camera able to be connected to a telecommunications enabled computer, a digital camera able to be connected to a mobile telephone, a telecommunications enabled digital camera, and a web cam operatively connected to a computer.
  • the image may be sent by one selected from the group consisting of: MMS, SMS, email, instant message, and digital data transfer.
  • a method for capturing an image using an apparatus and obtaining information regarding the image, the image containing a tag comprising:
  • the information obtained regarding the image may be whether a user is authenticated for a payment transaction, and the captured image containing a representation of encrypted version of data pertaining to the user.
  • the method may further comprise:
  • the representation may form part of a financial instrument.
  • the data pertaining to the user may also be compressed.
  • the data pertaining to the user may comprise at least one selected from the group consisting of: a number of the financial instrument, an expiry date of the financial instrument, the user's name, the user's date of birth, the user's address, and a photograph of the user's face.
  • the financial instrument may be selected from the group consisting of: credit card, debit card, and letter of credit.
  • the method may further comprise sending an authentication message to a financial institution.
  • the method may further comprise sending an acknowledgement of authentication.
  • the apparatus may be selected from the group consisting of: a mobile telephone with built in digital camera, a digital camera with built-in telecommunications ability, and a digital camera operatively connected to a telecommunications enabled computer.
  • the image may be displayed on at least one selected from the group consisting of: television screen, motion picture screen, billboard, computer monitor, a screen of a laptop, notebook or tablet computer; a screen of a portable computing device, a personal digital assistant, mobile or cellular telephone, book, magazine, newspaper, newsletter, and another printed publication.
  • the captured image may be part of an advertisement and is sent to the server using a system selected from the group consisting of: MMS, SMS, email, instant message and to a URL of the server.
  • the tag may comprise:
  • the data may contain an identifier for the tag.
  • the data may also encrypted by the server.
  • the visual guide may comprise a regular geometric shape with a second shape within the regular geometric shape.
  • the regular geometric shape may be a circle, the centre of second shape located in the centre of the circle.
  • the second section may comprise a border, all data being within the border, the border being joined to the visual guide by a link.
  • the tag may further comprise a third section comprising a brand or logo.
  • the second section may comprise a plurality of coloured sections, where each coloured section represents a data value.
  • each coloured section may determine a message and/or processing of the tag.
  • the message may be CRC encoded to ensure data integrity.
  • the response message may comprise at least one selected from the group consisting of:
  • a tag comprising:
  • the tag may be a financial instrument for a payment transaction, the instrument comprising a representation comprising an encrypted version of data pertaining to a user.
  • the data pertaining to the user may also be compressed.
  • the data pertaining to the user may comprise at least one selected from the group consisting of: a number of the financial instrument, an expiry date of the financial instrument, the user's name, the user's date of birth, the user's address, a photograph of the user's face.
  • the financial instrument may be one selected from the group consisting of: credit card, a debit card, a letter of credit, prepaid card, postpaid card, an account, virtual bank account, P2P payment instruments, a payment, receipt, and transfer of funds.
  • a system for capturing an image using an apparatus and obtaining information regarding the image, the image containing a tag, the system comprising:
  • the server being for extracting the tag from the image and processing the tag to extract therefrom data; conducting a match search for the extracted data with stored data in its database; and, upon a match being made, sending a response message to the apparatus.
  • the information obtained regarding the image may be whether a user is authenticated for a payment transaction, the image being a representation forming a part of a financial instrument, the representation comprising an encrypted version of data pertaining to the user.
  • the server may also be for:
  • the apparatus may be selected from the group consisting of: a mobile telephone with built in digital camera, a digital camera with built-in telecommunications ability and a digital camera operatively connected to a telecommunications enabled computer.
  • the captured image may be sent to the server using a system selected from the group consisting of: MMS, SMS, email, and to a URL of the server.
  • the method may further comprise: performing image recognition on a captured digital image to obtain authentication data, the captured digital image being a representation forming a part of a financial instrument, the representation comprising an encrypted version of data pertaining to the user; processing the authentication data by decrypting the encrypted version of data pertaining to the user; and transmitting the decrypted data to a server.
  • a method for producing the representation of the tag according to claim 34 comprising: encrypting the data pertaining to the user with a private key of the Public Key Infrastructure (PKI) key pair, the encrypted data pertaining to the user including trailing identification numbers of the financial instrument, an anti-fraud number and expiration date of the financial instrument; and converting the encrypted version of data pertaining to the user into a predetermined number of slots to define the representation.
  • PKI Public Key Infrastructure
  • the anti-fraud number may be a Card Verification Value (CW) number.
  • CW Card Verification Value
  • the trailing identification numbers may not be a Bank Identification Number (BIN).
  • the slots may be arranged in a matrix.
  • the slots may be circular.
  • a computer usable medium comprising a computer program code that is configured to cause a process or to execute one or more functions to perform the method as described.
  • Figure 1 is a schematic perspective view of apparatus for use in the preferred embodiment
  • Figure 2 is a schematic overall view of the process of the preferred embodiment
  • Figure 3 is front views of three preferred forms of a tag
  • Figure 4 is a flow chart of the process of the preferred embodiment at the transmission site;
  • Figure 5 is a flow chart of the process of the preferred embodiment at a reception site;
  • Figure 6 is a schematic illustration of an authentication system for authenticating a user for a payment transaction
  • FIG. 7 is a schematic illustration of the server architecture of the authentication system of Figure 6;
  • Figure 8 is a flow chart of the authentication process
  • Figure 9 are illustrations of tags comprising a first and second section.
  • Figure 10 is an illustration of an alternative second section for a tag.
  • an apparatus 10 for displaying an image 12 is provided.
  • the apparatus 10 may be a: billboard, movie screen, television screen, computer monitor, a screen of a laptop, notebook or tablet computer, or a screen of a portable device such as, for example a personal digital assistant (PDA), mobile or cellular telephone, or the like.
  • PDA personal digital assistant
  • the image 12 may be in a book, magazine, newspaper, newsletter, or other printed publication.
  • the image 12 may be of a performer, or a product, or of a brand.
  • the image includes or comprises a tag 14.
  • the tag 14 is constituted by a plurality of sections.
  • Figures 3(a) to (c) illustrate a first section 26 containing two concentric circles 11 , 13 that define the location of the tag 14 in a given area, even when the image is captured from a distance and the capturing may include a background; and a second section 28 containing data.
  • the two concentric circles are a circle with a concentric dot.
  • Figure 9 illustrates that rather than a concentric dot 13, any image 13 may be used such as for example, a flower, a bottle cap, or a cartoon character.
  • the image 13 may be selected based on marketing or advertising requirements.
  • a circle 11 with a black dot 13 at its centre is the easiest geometric figure that can be located at any angle.
  • it may be any regular geometric shape such as, for example, an equilateral triangle, a square, regular pentagon, regular hexagon, regular heptagon, regular octagon, and so forth.
  • a regular shape is preferred as all sides are of equal length thus making it the same when viewed from all sides.
  • the dot will be at the geometric centre of the geometric shape.
  • the second section 28 may contain other data, and some or all of the data 21 may be encrypted.
  • the encryption process may be performed by a server 22.
  • the data in second section 28 may be a hash of the image 12.
  • Data 21 may be in the form of encrypted dots, images of faces, image of brands ( Figure 9), and so forth.
  • an alternative second section 28 for a tag 14 is illustrated in both an exploded and actual representation (8x8 mm).
  • Data 21 is contained in the second section 28 in coloured sections.
  • 00 represents black
  • 01 represents green
  • 10 represents red
  • 11 represents blue.
  • These coloured sections correspond to data values.
  • a 4-bit colour element has been described, it is envisaged that more colours may be used.
  • the location of the coloured sections on the tag 14 may determine the message of the second section 28 and processing of the tag 14.
  • the message may be CRC encoded to ensure data integrity by applying, for example, a CRC-CCITT polynomial.
  • the tag 14 may have a third section 24 comprising the brand or logo being promoted as depicted in Figure 3(a).
  • the second section 28 has a border 19 and all data 21 is contained within the border 19.
  • First section 26 is joined to second section 28 by a link 23. In this way when first section 24 is detected, a search of its perimeter 25 will find link 23. Link 23 is followed to border 19. Within border 19 is the data 21.
  • the image 12 is to be captured by a digital camera 16 that is operatively connected to a computer 18 able to send the captured image over the Internet to a URL of server, or by MMS, SMS or email; or by a camera-equipped telephone 20 able to send the captured image by MMS or SMS; or a by digital camera that has a telecommunications module able to send the captured image by SMS or MMS.
  • the tag 14 of Figure 3(b) is suitable for being printed whereas that of Figure 3(c) is suitable for motion pictures, television, video, and so forth.
  • the tag 14 of Figure 3(a) is suitable for all purposes.
  • the tag 14 may be created for a particular advertising campaign, event or promotion.
  • the well known "TIGER BEERTM” is being used during a sporting event broadcast over television.
  • the tag 14 is as described above.
  • the tag 14 is created by creating the image 29 used for third section 24 (30).
  • the data 21 to be inserted in second section 28 determined (31 ) by server 22 and, if required, encrypted (32) as described above.
  • the tag 14 is then "assembled” or created. It is then embedded (34) so that is can be broadcast or displayed (35) during transmissions of the television signal.
  • the second section 28 may also contain other data such as, for example, an identifier for the tag 14 (38).
  • the identifier may be changed by server 22 each time the tag 14 is broadcast or displayed by incrementing or otherwise changing the identifier (36) then re-transmitting or displaying the tag (37).
  • the data 21 may be any required data.
  • the identifier for the tag 14 may be changed for each broadcast of the advertisement containing the tag 14. Therefore, during all or part of an advertising campaign it is possible to track the effectiveness of the placement and/or the advertisement by responses from viewers.
  • the data 21 may include an order identifier so that the tag 14 may be used to initiate a commercial transaction. If the data 21 contains an order identifier, the server 22 proceeds to process the order in accordance with known techniques.
  • the tag 14 identifier may have a limited life, the limit being linked to the proposed length of the advertising campaign.
  • the data 21 may also contain data for a specific activity. In this way, when conducting an event such as, for example, an on-line search, the tag 14 becomes a matter tag for that activity. For example, if the tag 14 appears in a movie or an advertisement for a movie, upon the image being sent to the server 22, the server 22 can search for related matters including, but not limited to one or more of: movies with the same: actor(s), director, producer, subject, and so forth; or related: products, promotional products, or merchandise.
  • the tag 14 is displayed on the apparatus 10 as is shown in Figure 2 (40).
  • An image of the tag 14 is broadcast and camera 16 or telephone 20 is used to capture (41) an image of tag 14. This captured image may be close up, or at a distance depending on the resolution of camera 16 and telephone 20.
  • the captured image is then sent to server 22 via a mobile network operator or the Internet 30 (42).
  • the server 22 receives the image (43) and locates the tag 14 within the image by locating the first section 26 in the image. It then locates the data 21 in tag 14 and, if required, decrypts the data 21 (44).
  • the server 22 matches the data 21 with the data in its database 22A (45). The match may include the matching of the identifier of the tag 14.
  • the server 22 sends a message to the telephone 20/computer 18 (46).
  • the message may contain one or more of: information and/or for audio for display/reproduction on telephone 20/computer 18; an offer; a redemption message; prize draw result; confirmation of receipt of an order; confirmation of placement of the order; and so forth.
  • the message is finally received at the telephone 20/computer 18 (47) and is displayed and/or reproduced.
  • the financial instrument 50 may be a credit card (as shown), debit card, letter of credit, prepaid card, postpaid card, an account, virtual bank account, P2P payment instruments, or other suitable financial instrument.
  • the financial transaction may be a payment, receipt, transfer of funds, or the like.
  • the financial instrument 50 contains financial instrument data 51 relating to the owner, holder or user of the financial instrument 50.
  • financial instrument data 51 may be the account number 53 of the credit card, the expiry date 55 of the credit card, and the name 57 of the card holder.
  • the financial instrument 50 also includes a representation 59 containing an encrypted version of data pertaining to the user.
  • the representation 59 may also be compressed.
  • the data pertaining to the user may be one or more of: the financial instrument data 51 , or any other data identifying or pertaining to the card holder.
  • the other data may include the date of birth of the card holder, a facial photograph of the card holder, biometric information, the address of the card holder, the maiden family name of the mother of the card holder, and so forth.
  • a tag 14 or a digital image of the representation 59 is captured using an image capturing device 20.
  • the image capturing device 20 is capable of capturing a digital image 14 such as, for example, a digital camera, a mobile camera phone 20 or PDA with a digital camera that is telecommunications enabled or can be operatively connected to a computer that is telecommunications enabled, a web-cam operatively connected to a computer that is telecommunications enabled and so forth. Capturing the tag initiates a mobile payment transaction.
  • the image 14 of the representation 59 is sent to a server 22.
  • the sending may be as digital data transfer, as an MMS message, as an SMS message, as an email or instant message, or otherwise as required or desired.
  • the methodology for sending the image 14 may depend on the nature of image capturing device 20.
  • Encryption of the tag 59 requires the financial institution 60 or card issuer to sign up and associate with a Tag Authentication Provider.
  • the Tag Authentication Provider generates a PKI key pair (RSA 1024 bytes key length) for the financial institution 60.
  • Tag generation and encryption software is supplied to financial institution 60 or card issuer. This software is used to encrypt the credit card number, CW number 53A, and expiration date of the card with the Private Key of the PKI key pair which is embedded in the software.
  • the first six digits of the card number or BIN number for uniquely identifying the financial institution 60 are left unencrypted in plain text form.
  • the remaining digits of the card number, the CVV number 53A and expiration date are encrypted.
  • the software converts this encrypted card information into a 25 slot tag 59. (4 X 25 matrix or 25 circular tags) sixteen for the credit card number; three for the CW number 53A; and six for the expiration date.
  • This generated tag 59 is affixed or embedded onto the credit card.
  • Authentication for Credit Card Based Tags 59 requires capturing the customer's credit card tag 59 when receiving payment confirmation.
  • the customer sends the captured Tag 59 to the Tag Authentication Provider via MMS through their camera-enabled mobile phone 20.
  • the tag 59 is converted into a numerical format by a Tag Authentication Processor at the Tag Authentication Provider.
  • the first six digits of the tag 59 are used to identify the Card Issuer or financial institution 60.
  • the corresponding Public Key of the PKI key pair is used to decrypt the remaining credit card numbers, the CW number 53A and expiration date. This decrypted information is sent for authentication to the Card Issuer, financial institution 60 or Visa/MasterCard network. Subsequently, the appropriate amount is debited from the card by the card issuer.
  • the server 22 receives, decrypts and attempts to match the captured image with a corresponding image stored in an image database (not shown).
  • the image database is connected to and communicates with the server 22. If the captured image is compressed, the server 22 decompresses the representation 59 in the image 14 to obtain the data pertaining to the user. This is used to authenticate the user, and the authentication can be passed to the financial institution 60.
  • the server 22 has several modules. These include a processor 71 that receives the data of the image 14 from an inwards communication module 77.
  • the processor 71 also communicates with a database controller 73 for extracting the necessary key of the user for decryption from a key database 74 of such keys, and also information relative to the user from an identity database 75 of user identities.
  • the user identities contain at least the data pertaining to the user as encrypted and used for the representation 59.
  • the processor 71 uses an authentication module 72 for authenticating the user by comparing the information relating to the user and the data pertaining to the user. If there is a sufficient match, there is authentication, otherwise there is no authentication.
  • An outwards communications module 76 is used to send an authentication code or message to the financial institution 60.
  • the keys of the users are kept only in the database 24.
  • Each financial instrument 50 will have a unique key. The unique key is generated randomly at the time of creation of the financial instrument 50 and is used to create the representation 59.
  • Figure 8 illustrates the process flow of authenticating a payment transaction.
  • the image 14 of representation 59 is captured (32) and send to server 22 (33).
  • the representation 59 is decrypted (34) using the correct user key extracted from keys database 74 and, if necessary, decompressed to obtain the data pertaining to the user.
  • Authentication then takes place (35) using the information relating to the user extracted from identity database 75.
  • the information relating to the user includes at least the data pertaining to the user. Authentication is performed by comparing the decrypted version of the data pertaining to the user with the information relating to the user as obtained from the identity database 25. Upon authentication, an authentication code or message is sent to the financial institution 60 (36) and a confirmation is sent to the user (37). The authentication process then ends (38).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
EP05779754A 2004-09-24 2005-09-21 Verfahren zur erfassung eines bildes unter verwendung einer vorrichtung und zum erhalten von informationen bezüglich des bildes, wobei das bild eine marke enthält Withdrawn EP1854050A1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SG200405362A SG121004A1 (en) 2004-09-24 2004-09-24 Authentication system and method
SG200407257A SG123612A1 (en) 2004-12-08 2004-12-08 System and method for capturing an image and obtaining information regarding the same
PCT/SG2005/000318 WO2006033645A1 (en) 2004-09-24 2005-09-21 A method for capturing an image using an apparatus and obtaining information regarding the image, the image containing a tag

Publications (1)

Publication Number Publication Date
EP1854050A1 true EP1854050A1 (de) 2007-11-14

Family

ID=36090317

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05779754A Withdrawn EP1854050A1 (de) 2004-09-24 2005-09-21 Verfahren zur erfassung eines bildes unter verwendung einer vorrichtung und zum erhalten von informationen bezüglich des bildes, wobei das bild eine marke enthält

Country Status (2)

Country Link
EP (1) EP1854050A1 (de)
WO (1) WO2006033645A1 (de)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
HK1094647A2 (en) * 2006-04-19 2007-04-04 Imagic Systems Ltd System and method for distributing targeted content
US20130339247A1 (en) * 2012-06-18 2013-12-19 Visa International Service Association Issuer identification and verification system
FR3001567B1 (fr) * 2013-01-31 2016-07-22 Alstom Hydro France Procede de surveillance d'un site industriel, dispositif de surveillance et systeme de surveillance associes
US20190227576A1 (en) * 2018-01-22 2019-07-25 Walmart Apollo, Llc System and method for position determination for unmanned vehicles

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4817166A (en) * 1986-05-05 1989-03-28 Perceptics Corporation Apparatus for reading a license plate
FR2649510B1 (fr) * 1989-07-06 1991-12-20 Collot Richard Procede et systemes de verification de signatures a optimisation de parametres statiques
GB2273191B (en) * 1992-10-23 1996-01-03 Port Of Singapore Authority A container code verification apparatus
US20030172030A1 (en) * 2002-03-06 2003-09-11 Parascript, Llc Payee match positive pay banking
US20040201460A1 (en) * 2003-04-09 2004-10-14 Bucholz Andrew J. System and method of vehicle surveillance

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2006033645A1 *

Also Published As

Publication number Publication date
WO2006033645A1 (en) 2006-03-30

Similar Documents

Publication Publication Date Title
US11049094B2 (en) Methods and arrangements for device to device communication
CN105190659B (zh) 用于装置到装置通信的方法、设备和布置
CN102881071B (zh) 电子票券防伪系统与方法
US20190172046A1 (en) Apparatuses, Methods and Systems for Computer-Based Secure Transactions
TWI575913B (zh) And a mobile terminal for carrying out communication using a bar code pattern
US20140244514A1 (en) Methods and arrangements for smartphone payments and transactions
US20200051144A1 (en) Encrypted payment image
US20140258110A1 (en) Methods and arrangements for smartphone payments and transactions
US8321353B2 (en) Method of providing transactions employing advertising based verification
US20100153273A1 (en) Systems for performing transactions at a point-of-sale terminal using mutating identifiers
US20040215963A1 (en) Method and apparatus for transffering or receiving data via the internet securely
EP1854050A1 (de) Verfahren zur erfassung eines bildes unter verwendung einer vorrichtung und zum erhalten von informationen bezüglich des bildes, wobei das bild eine marke enthält
KR20190023323A (ko) Qr 코드 위변조 탐지 시스템
US9262422B1 (en) System and method of verifying a payment cardholder's identity using an interactive payment card
JP2002288502A (ja) 電子クーポンサービス装置及び電子クーポンシステム
JP2002197322A (ja) 通信販売システム及び通信販売方法
EP3699849A1 (de) Verfahren zur unterstützung der identifizierung eines kunden unter verwendung einer zahlungskarte des kunden und server mit anordnung zur unterstützung des verfahrens
Dittmann et al. Conditional and user specific access to services and resources using annotation watermarks
JP2023006478A (ja) 情報処理装置、ユーザー端末、ユーザー媒体、認証方法、被認証方法及びコンピュータープログラム
CN116192469A (zh) 一种电子卡券交易或传输的安全防盗方法
JP2006146357A (ja) 申込書の申し込み・登録方法
WO2014016511A1 (fr) Procédé pour valider un coupon de réduction sur un produit ou un service identifié

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070814

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT

DAX Request for extension of the european patent (deleted)
RBV Designated contracting states (corrected)

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20110331