EP2289052A1 - Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation - Google Patents

Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation

Info

Publication number
EP2289052A1
EP2289052A1 EP09761557A EP09761557A EP2289052A1 EP 2289052 A1 EP2289052 A1 EP 2289052A1 EP 09761557 A EP09761557 A EP 09761557A EP 09761557 A EP09761557 A EP 09761557A EP 2289052 A1 EP2289052 A1 EP 2289052A1
Authority
EP
European Patent Office
Prior art keywords
authorization
certificate
component
public key
service technician
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP09761557A
Other languages
German (de)
English (en)
Other versions
EP2289052B1 (fr
Inventor
Steffen Fries
Jürgen GESSNER
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Publication of EP2289052A1 publication Critical patent/EP2289052A1/fr
Application granted granted Critical
Publication of EP2289052B1 publication Critical patent/EP2289052B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C3/00Registering or indicating the condition or the working of machines or other apparatus, other than vehicles

Definitions

  • the invention relates to a method for creating, assigning and checking authorizations according to the preamble of claim 1.
  • Authorization schemes are frequently used for this purpose, which are to ensure or ensure that an administering service technician is not only authenticated, but is also authorized to undertake certain actions or measures.
  • Kerberos requires a user who wishes to use a car docking s ⁇ tion demanding service, a ticket with a Kerberos server, which is then shows the service provided is ⁇ . The service in turn checks the ticket and grants access to the service. Kerberos therefore involves three parties: a client, a server providing the service that the client wants to use, and a Kerberos server.
  • the Kerberos service authenticates both the server to the client and the client to the server.
  • the Kerberos server also authenticates itself to the client and server and verifies their identity. Kerberos also uses authorizations called tickets or grants for authentication.
  • a client must first log in to the Kerberos server.
  • TGT Ticket Granting Ticket
  • the user of the client must either enter a password, authenticate himself by means of a certificate and associated private key, or the TGT is requested directly when the user logs in .
  • the client is able to request additional tickets for services without having to authenticate again.
  • It also negotiates a session key, called a session key, for communication between the client and the Kerberos server. He can use the ⁇ to encrypt traffic.
  • the client requests another ticket. The client then sends this ticket to the service, which checks whether it should allow access to the client.
  • a session key is agreed and the identity of client, server and Kerberos server is checked.
  • Kerberos can only be used in online scenarios.
  • the following exemplary scenario which relates to a prior ⁇ preferably local administration of a Umspannstation- control device and its associated external or field devices in a power distribution network, illustrates the resultant problem.
  • certain actions such as Shift concerning measures authorize the service technician is he ⁇ conducive.
  • the device to be administered or the component to be switched over is not in a position to receive authorization information from a central office or control center or to inquire about it.
  • the service technician should be able to submit an authorization grant, even if the substation is offline. Consequently, the service technician is required to carry the authorization authorization, which, however, must be invalidated within one day.
  • a method according to the invention therefore provides for the creation, issuance and review of authorization authorizations required to fulfill tasks specified by an intervention plan by performing actions defined by the tasks on a device or a component of a distributed structure by a service technician the following method steps: - generating at least one authorization permit required to a stored on a carried by the service engineer or mitStebaren storage medium, bound a limited validity ⁇ duration having identity certificate of the service technician in order to fulfill at least one predetermined by the engagement plan task;
  • the present invention enables on-the-fly generation and distribution of authorization authorizations for service technicians, depending on required actions to be taken and actions defined as part of a task's schedule included in a work plan.
  • An advantageous embodiment of the invention provides that the signed authorization authorization is stored on the same by the service technician carried or carried along storage medium, such as a limited validity ⁇ duration having identity certificate.
  • a further advantageous embodiment of the invention provides that the signed authorization approval can be accessed online and with a limited validity period ⁇ having identity certificate is cryptographically connected. Due to the cryptographic connectivity, the signed authorization authorization is linked to the identity certificate so that misuse is excluded or the signed authorization authorization can only be used in conjunction with the associated identity certificate.
  • Both the public key or public certification ⁇ fikat, and the main certificate of the Zertaimssbe ⁇ authority can be stored in one in the device or in the component built-in database or on a built in the device or in the memory component be.
  • both the public key or the public certificate and the main certificate of the certification authority can be made available to the device or component by the service technician.
  • both the public key or the public certificate, as well as the main certificate of the certification authority are provided to the device or the component of the service technician by these also on the same carried by the service technician or carried Storage medium are stored, like the certificate of identity with a limited validity period.
  • Another advantageous embodiment of the invention provides that the device or component tests both public areas ⁇ chen key or public certificate, and the main certificate of the certification authority online.
  • the entrained or carried along by the service technician storage medium is preferably a smart card or a uni versal ⁇ Serial Bus (USB) flash drive.
  • USB Serial Bus
  • An additional advantageous embodiment of the invention provides that the non-public key used for signing the authorization approval is not ⁇ public key of a service center the intervention plan created.
  • a particularly advantageous embodiment of the invention provides that the identity certificate of the service technician limited to preferably two years Gültmaschinesdau has he ⁇ .
  • a further, particularly advantageous embodiment of the invention provides that the authorization authorization has a validity period of at most 24 hours in order to fulfill the requirement to refuse access after one day has elapsed.
  • the inventive method allows From ⁇ position short-term authorization permits for meeting certain assigned tasks created with the intervention plan planning tool can be created.
  • FIG. 1 shows a schematic representation of a sequence of a method according to the invention.
  • a service center In a first method step 01, a service center, depending on an intervention plan, generates an authentication authorization bound to a specific service technician or a list of authentication authorizations that are required to perform certain, for example, administrative actions for fulfilling certain tasks set by the intervention plan or specified tasks on a component to be administered.
  • the authorization approval or the list of authorization permits is signed with a private or non-public key example of the service centering ⁇ rums.
  • a second method step 02 the car docking s ⁇ approximately-approval or authorization, the list of authorizations on a smart card is stored.
  • On the smart card ⁇ is preferably also limited to a validity period of preferably not exceeding two years or saved and stored all to be renewed at ⁇ play as two years identity certificate of the service technician.
  • the service technician of the component to be administered preferably all his authorization ⁇ evidence stored on the same smart card are available. These credentials are at least his identity certificate and the authentication approval or the list of authentication authorizations.
  • a fourth method step 04 to administra- nistrierende component first checks the identity certificate of the service technician, by using the period of validity of Identi ⁇ tucisbeschein Trent is checked, and by the signature of the service center created with the private or non-public key by means of an issued by a Root Certification de public key, or public certificate of the service center and a main certificate of the certification authority, which has issued ⁇ the public key or the public certificate of the service center, is checked. Both the public key and the public certificate of the service center, as well as the main certificate of the certification authority are available or are made available to the component to be administered.
  • these certificates are stored in a database integrated in the component or on a memory integrated in the component, or else provided by the service technician, for example by also storing these on his smartcard. It is also conceivable that the component online, for example, query the certificates in a further step 05 the Ser ⁇ vice center.
  • the component to be administered checks the authorization authorization or the list of authorization authorizations, before subsequently allowing the service technician to carry out the actions to be performed in order to fulfill the specific tasks set by the intervention plan.
  • a further advantageous embodiment of the method according OF INVENTION ⁇ dung relates to a support authorizations in standby emergency situations.
  • a standby authorization grant may be generated and issued to an affected service technician.
  • the period of validity of the readiness authorization authorization corresponds to the standby emergency service time of the service technician.
  • This standby authorization grant may now either be used directly to access a component, or it may be used to generate an authorization grant for an emergency component. Due to the short period of validity of the authorizations, revocation or revocation of the authorization is not required.
  • the method according to the invention makes it possible to issue short-term authorization authorizations for the fulfillment of specific assigned tasks that can be created with a planning aid program.
  • the tasks given to be carried out actions or measures to be taken, as well as the identity of the designated in the engagement schedule service technician, as well as by the resulting immediate zeitli ⁇ che near the creation of the engagement schedule to Execution of the intervention plan by a service technician may generate authorization authorizations with only short validity, thereby ensuring that authorization actions can be revoked within a very short time without revoking an identity certificate to which the authorization authorizations are attached are.
  • the invention uses the known, for example, Kerberos schemes, and applies them to the creation, award and Reviewing, issuing, distributing, and using authorization grants, such as acknowledgment credentials, called attribute certificates, or security tokens called security assertion markup language (SAML) assertions.
  • authorization grants such as acknowledgment credentials, called attribute certificates, or security tokens called security assertion markup language (SAML) assertions.
  • SAML security assertion markup language
  • the invention provides that the at administrie ⁇ Rende component having an appropriate information of a main certification authority to verify a signature contained in an approximately autorisie--authorization.
  • the invention provides that a service technician initially receives a work plan on which certain administrative tasks to be performed by actions to be performed are specified by a service center.
  • a planning aid program generating the workflow also generates authorization authorizations bound to the specific tasks to a specific service technician.
  • each service technician also has a proof of entitlement, also referred to as an identity certificate, to prove his identity.
  • a proof of entitlement also referred to as an identity certificate
  • Identity certificates are issued for this purpose preferably with a validity period of two years.
  • the authorization authorization is preferably bound to the identity of the service technician and has a validity of preferably at most 24 hours to meet the requirement to refuse access after the expiration of a day.
  • the authorization authorization is signed or encrypted with a private or non-public key of the service center.
  • a public key or a public certificate of the service center is issued by a certification authority (CA).
  • CA certification authority
  • a main certificate of this certification authority is available to the components to be administered or is made available to them.
  • the Service Center transmits the authorization ⁇ example by means of suitable means, such as email, smart card, Universal Serial Bus (USB) drive or the like, to the service technician.
  • suitable means such as email, smart card, Universal Serial Bus (USB) drive or the like
  • the authorization authorization together with the identity certificate is stored or stored on the same medium, preferably on the medium on which the identity certificate of the service technician is already stored or stored, whereby only one memory for the certificates or authorizations is needed.
  • This may, for example, be a smart card or an encrypted USB stick or another suitable medium which protects the stored information.
  • the public key, or the public certificate of the service center can also be stored on this medium, for example, if this is not available in the component to be administered.
  • the service technician can then access the component to be administered after successful authentication.
  • the component to be administered checks firstly the identity certificate of the service technician by checking the validity period of the identity certificate, and by using the service center's public key or public certificate signature and the service center's private or non-public key signature the main certificate of the issuing certification authority. Then, the component to be administered checks the authorization grant before subsequently allowing the service technician to perform the actions to be performed to perform the particular tasks.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L’invention concerne un procédé pour l’établissement, l’attribution et la vérification d’octrois d’autorisation qui sont nécessaires pour qu’un un technicien de service remplisse des fonctions prédéfinies par un plan d’intervention en procédant à des opérations définies par les fonctions sur un appareil ou un composant d’une structure distribuée. L’invention atteint son but en permettant une production et une distribution rapide d’octrois d’autorisation pour technicien de service en fonction des opérations ou mesures nécessaires auxquelles il faut procéder et qui sont définies sous la forme de fonctions faisant partie d’un plan d’intervention contenu ou enregistré dans un plan de travail.
EP09761557.9A 2008-06-10 2009-05-06 Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation Active EP2289052B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102008027586A DE102008027586A1 (de) 2008-06-10 2008-06-10 Verfahren zur Erstellung, Vergabe und Überprüfung von Autorisierungs-Bewilligungen
PCT/EP2009/055447 WO2009149994A1 (fr) 2008-06-10 2009-05-06 Procédé pour l’établissement, l’attribution et la vérification d’octrois d’autorisation

Publications (2)

Publication Number Publication Date
EP2289052A1 true EP2289052A1 (fr) 2011-03-02
EP2289052B1 EP2289052B1 (fr) 2018-02-28

Family

ID=40848051

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09761557.9A Active EP2289052B1 (fr) 2008-06-10 2009-05-06 Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation

Country Status (4)

Country Link
US (1) US8621232B2 (fr)
EP (1) EP2289052B1 (fr)
DE (1) DE102008027586A1 (fr)
WO (1) WO2009149994A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5511615B2 (ja) 2010-09-30 2014-06-04 インターナショナル・ビジネス・マシーンズ・コーポレーション 作業指示に関連付けられた資産又は当該資産に関連付けられた要素を管理する方法、並びにそのシステム及びコンピュータ・プログラム
US9324049B2 (en) 2010-12-30 2016-04-26 Schlumberger Technology Corporation System and method for tracking wellsite equipment maintenance data
DE102018005873A1 (de) * 2018-07-25 2020-01-30 Giesecke+Devrient Mobile Security Gmbh Verfahren und System zur zentralisierten Authentifizierung von Unterstützungsdiensten bei einer Karten-Sofortausgabeeinrichtung

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6557105B1 (en) * 1999-04-14 2003-04-29 Tut Systems, Inc. Apparatus and method for cryptographic-based license management
DE10056135A1 (de) * 2000-11-07 2002-05-08 Deutsche Telekom Ag Verfahren und Anordnung für ein Rechte-Ticket-System zur Erhöhung der Sicherheit bei der Zugangskontrolle zu Rechnerrecourcen
ATE268926T1 (de) * 2002-02-13 2004-06-15 Swisscom Ag Zutrittskontrollsystem, zutrittskontrollverfahren und dafur geeignete vorrichtungen
US7464858B2 (en) * 2002-02-25 2008-12-16 Crawford C S Lee Systems and methods for controlling access within a system of networked and non-networked processor-based systems
US7127611B2 (en) * 2002-06-28 2006-10-24 Motorola, Inc. Method and system for vehicle authentication of a component class
US20040186880A1 (en) * 2002-10-17 2004-09-23 Yoshiki Yamamoto Management apparatus, terminal apparatus, and management system
US20050229004A1 (en) 2004-03-31 2005-10-13 Callaghan David M Digital rights management system and method
US20050223233A1 (en) * 2004-04-01 2005-10-06 Fujitsu Limited Authentication method and system
DE102005015792A1 (de) 2004-05-04 2005-12-01 Heidelberger Druckmaschinen Ag Diagnosesystem mit Identifikationsanzeigeeinrichtung

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2009149994A1 *

Also Published As

Publication number Publication date
DE102008027586A1 (de) 2009-12-24
WO2009149994A1 (fr) 2009-12-17
US20110087891A1 (en) 2011-04-14
EP2289052B1 (fr) 2018-02-28
US8621232B2 (en) 2013-12-31

Similar Documents

Publication Publication Date Title
DE69130461T2 (de) Zugriffsteuerung in einem verteilten Rechnersystem
DE102016218986B4 (de) Verfahren zur Zugriffsverwaltung eines Fahrzeugs
EP2936259A1 (fr) Actualisation d'un certificat d'appareil numérique d'un appareil d'automatisation
EP2136528B1 (fr) Procédé et système de production d'une identité électronique déviée à partir d'une identité électronique principale
DE102019004726A1 (de) Verfahren, Vorrichtung, System, elektronisches Schloss, digitaler Schlüssel und Speichermedium für die Autorisierung
EP4224786A1 (fr) Procédé et dispositif de génération de signatures électroniques
EP2289052B1 (fr) Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation
WO2008022606A1 (fr) Procédé d'authentification dans un système d'automatisation
EP3435265A1 (fr) Procédé d'authentification sécurisée des appareils pouvant être reliés à un serveur, en particulier des dispositifs de contrôle d'accès ou des dispositifs de contrôle de paiement distributeurs automatiques d'un système de contrôle d'accès
DE112020003476T5 (de) Computer-implementiertes Verfahren zum Steuern eines Zugriffs in einem Netz
EP3117359B1 (fr) Système informatique de fournisseur d'identifiant, jeton d'identifiant et procédé de confirmation d'une identité numérique
EP3244360A1 (fr) Procede d'enregistrement d'appareils, en particulier de dispositifs de controle d'acces ou{j}d'automates de vente ou d'achat dans un serveur d'un systeme comprenant plusieurs desdits appareils
EP1528450A1 (fr) Méthode d'identification, d'authentification et d'autorisation d'accès à des données sécurisées par un utilisateur
DE102019105390A1 (de) Ersetzen von sicherheitsanmeldeinformationen für das fahrzeugsteuermodul
EP3298526B1 (fr) Procédé de lecture d'attributs à partir d'un jeton d'identification
DE102009058516A1 (de) Vorrichtung und Verfahren zum Gewähren von Zugriffsrechten auf eine Wartungsfunktionalität
DE102015210294A1 (de) Clientvorrichtung und Servervorrichtung zum abgesicherten Freischalten von Funktionen eines Clients
WO2020057918A1 (fr) Utilisation d'une interface utilisateur d'un système d'information de passager et/ou d'un système de divertissement
EP1642185A1 (fr) Procede d'authentification de composantes de logiciel pouvant etre notamment chargees dans un appareil de commande d'automobile
DE112020003479T5 (de) Computer-implementiertes Verfahren zum Bereitstellen sicherer Interaktionen zwischen Benutzern in einem Netz
EP3692457A1 (fr) Procédé et système pour fournir une fonction technique de données au moyen d'un système de traitement de données d'un véhicule guidé
EP3279821A1 (fr) Procede et systeme d'authentification d'un utilisateur pour l'utilisation d'une pluralite d'applications ou de services dans un reseau informatique
WO2010009896A1 (fr) Système d'ordinateurs à gestion d'accès automatisée d'une application et contrôle d'accès automatisé à une application, ainsi que procédé de gestion et de contrôle d'accès correspondant
WO2021190859A1 (fr) Procédé de vérification d'un composant électronique, et composant
DE102020203915A1 (de) Verteilungsverfahren für Zertifikate auf elektronische Bauteile

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20101029

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA RS

DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SIEMENS AKTIENGESELLSCHAFT

17Q First examination report despatched

Effective date: 20151113

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SIEMENS AKTIENGESELLSCHAFT

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIC1 Information provided on ipc code assigned before grant

Ipc: G05B 23/02 20060101ALI20171004BHEP

Ipc: G07C 9/00 20060101AFI20171004BHEP

Ipc: G07C 3/00 20060101ALN20171004BHEP

INTG Intention to grant announced

Effective date: 20171025

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

Ref country code: CH

Ref legal event code: EP

Ref country code: CH

Ref legal event code: NV

Representative=s name: SIEMENS SCHWEIZ AG, CH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 974928

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180315

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502009014782

Country of ref document: DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 10

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20180228

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180528

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180529

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180528

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502009014782

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20180531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

26N No opposition filed

Effective date: 20181129

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180506

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180506

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180531

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 974928

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180506

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180506

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20190802

Year of fee payment: 11

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180228

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20090506

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180628

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200531

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200531

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20240603

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20240515

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20240522

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20240719

Year of fee payment: 16