EP2289052B1 - Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation - Google Patents
Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation Download PDFInfo
- Publication number
- EP2289052B1 EP2289052B1 EP09761557.9A EP09761557A EP2289052B1 EP 2289052 B1 EP2289052 B1 EP 2289052B1 EP 09761557 A EP09761557 A EP 09761557A EP 2289052 B1 EP2289052 B1 EP 2289052B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- component
- service technician
- certificate
- public key
- validity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C3/00—Registering or indicating the condition or the working of machines or other apparatus, other than vehicles
Definitions
- the invention relates to a method for creating, assigning and checking authorizations according to the preamble of claim 1.
- a power distribution network usually requires authentication of a user using the device or accessing the device, typically a service technician. Authorization schemes are frequently used for this, which are to ensure or ensure that an administering service technician is not only authenticated, but is also authorized to perform certain actions or measures.
- EP 1 582 950 A2 describes an application of digital rights management to industrial automation devices.
- Kerberos With Kerberos, a user wishing to use an authorization-demanding service requests a ticket from a Kerberos server, which is subsequently presented to the service. The service in turn checks the ticket and grants access to the service. Kerberos therefore involves three parties: a client, a server providing the service that the client wants to use, and a Kerberos server.
- the Kerberos service authenticates both the server to the client and the client to the server. Also, the Kerberos server authenticates itself facing the client and server and verifying their identity. Kerberos also uses authorizations called tickets or grants for authentication.
- a client must first log in to the Kerberos server. He requests a so-called Ticket Granting Ticket (TGT) from the Kerberos server.
- TGT Ticket Granting Ticket
- the user of the client must either enter a password, authenticate by means of a certificate and associated private key, or the TGT is requested directly when the user logs on.
- the client is able to request additional tickets for services without having to authenticate again. It also negotiates a session key, called a session key, for communication between the client and the Kerberos server. It can be used to encrypt the traffic.
- a session key for communication between the client and the Kerberos server. It can be used to encrypt the traffic.
- the client requests another ticket. The client then sends this ticket to the service, which checks whether it should allow access to the client.
- a session key is agreed and the identity of client, server and Kerberos server is checked.
- Kerberos can only be used in online scenarios.
- an authorization of the service technician is required.
- the device to be administered or the component to be switched over is not in a position to receive authorization information from a central office or control center or to inquire about it.
- the service technician should be able to submit an authorization grant, even if the substation is offline. Consequently, the service technician is requested to carry the authorization authorization, which, however, must be invalidated within one day. It can therefore be considered, as an object of the invention, to provide a method for creating, issuing and verifying authorization authorizations which are required to perform tasks specified by an intervention plan by performing actions defined by the tasks on a device or a component a distributed structure to be met by a service technician.
- the present invention enables on-the-fly generation and distribution of authorization authorizations for service technicians, depending on required actions to be taken and actions defined as part of a task's schedule included in a work plan.
- An advantageous embodiment of the invention provides that the signed authorization authorization is stored on the same storage medium carried or carried along by the service technician, such as the identity certificate having a limited validity period.
- a further advantageous embodiment of the invention provides that the signed authorization authorization can be queried online and is cryptographically linked to the identity certificate having a limited validity period. Due to the cryptographic connectivity, the signed authorization authorization is linked to the identity certificate so that misuse is excluded or the signed authorization authorization can only be used in conjunction with the associated identity certificate.
- Both the public key or the public certificate and the main certificate of the certification authority can be stored in a database integrated in the device or in the component or in a memory integrated in the device or in the component.
- both the public key or the public certificate and the main certificate of the certification authority can be made available to the device or component by the service technician.
- both the public key or the public certificate, as well as the main certificate of the certification authority are provided to the device or the component of the service technician by these also on the same carried by the service technician or carried Storage medium are stored, like the limited period of validity certificate of identity.
- Another advantageous embodiment of the invention provides that the device or the component queries both the public key or the public certificate, as well as the main certificate of the certification authority online.
- the storage medium carried or carried by the service technician is preferably a smart card or a universal serial bus (USB) stick.
- USB universal serial bus
- An additional advantageous embodiment of the invention provides that the non-public key used to sign the authorization authorization is the non-public key of a service center creating the service plan.
- a particularly advantageous embodiment of the invention provides that the identity certificate of the service technician has a limited to preferably two years validity period.
- a further, particularly advantageous embodiment of the invention provides that the authorization authorization has a validity period of at most 24 hours in order to fulfill the requirement to refuse access after the expiration of a day.
- the method of the invention involves issuing short-term authorization grants to perform certain assigned tasks that are created with a planning utility that creates the intrusion plan.
- Intervention plan Through the direct linkage of intervention plan, tasks defined therein, tasks to be preselected by the tasks or measures to be taken, as well as the identity of the service technician named in the intervention plan, as well as the resulting immediate temporal proximity from the creation of the intervention plan to the execution of the intervention plan Intervention plan by a service technician can Authorization authorizations are generated with only a short validity, thereby ensuring that authorization actions can be revoked within a very short time without revoking an identity certificate to which the authorization authorizations are attached.
- a service center In a first method step 01, a service center, depending on an intervention plan, generates an authentication authorization bound to a particular service engineer or a list of authentication authorizations required to perform certain, for example, administrative actions to fulfill certain tasks set by the intervention plan to be able to make a component to be administered.
- the authorization authorization or the list of authorization authorizations is signed with a private or non-public key, for example, the service center.
- the authorization authorization or the list of authorization authorizations is stored on a smart card.
- the identity card of the service technician is preferably also stored or stored on the smartcard for a period of validity of preferably not more than two years, or for every two years, for example, to be renewed.
- the service technician makes available to the component to be administered preferably all credentials stored on the same smartcard. These credentials are at least his identity certificate and the authentication grant or the list of authentication authorizations.
- a fourth method step 04 the component to be administered first checks the identity certificate of the service technician by checking the validity period of the identity certificate, and by using the signature of the service center created with the private or non-public key by means of a public key issued by a certification authority Certificate of the service center and a main certificate of the certification authority, which has issued the public key or the public certificate of the service center is checked.
- Both the public key and the public certificate of the service center, as well as the main certificate of the certification authority are available or are made available to the component to be administered.
- these certificates are stored in a database integrated in the component or on a memory integrated in the component, or else provided by the service technician, for example by also storing these on his smartcard.
- the component queries the certificates in a further method step 05 online, for example, at the service center.
- the component to be administered checks the authorization authorization or the list of authorization authorizations, before subsequently allowing the service technician to carry out the actions to be performed in order to fulfill the specific tasks set by the intervention plan.
- the authorization authorization or the list of authorization authorizations is also checked online at the service center, for example.
- Another advantageous embodiment of the method according to the invention relates to supporting authorizations in standby emergency service situations.
- a standby authorization grant may be generated and issued to an affected service technician.
- the period of validity of the readiness authorization authorization corresponds to the standby emergency service time of the service technician.
- This standby authorization grant can now either be used directly to access a component, or it can be used to generate an authorization grant for an emergency component. Due to the short period of validity of the authorizations, revocation or revocation of the authorization is not required.
- the invention uses the known, for example, Kerberos schemes, and applies them to the creation, award and Reviewing, issuing, distributing, and using authorization grants, such as acknowledgment credentials, called attribute certificates, or security tokens called security assertion markup language (SAML) assertions. Confirmation credentials or attribute certificates and SAML assertions are explicitly mentioned here because they have or provide features that can also be used in offline scenarios. Since both schemes use or provide digital signatures, it is provided according to the invention that the component to be administered has suitable information from a main certification authority in order to check a signature contained in an authorization authorization. From the point of view of the workflow, the invention provides that a service technician initially receives a work plan on which certain administrative tasks to be performed by actions to be performed are specified by a service center. A planning utility generating the workflow also generates authorization authorizations associated with the particular tasks to a particular service technician. Each service technician also has proof of identity as a proof of entitlement, also referred to as an identity certificate.
- Identity certificates are issued for this purpose preferably with a validity period of two years.
- the authorization authorization is bound to the identity of the service technician and has a validity of preferably at most 24 hours to meet the requirement to refuse access after the expiration of a day.
- the authorization authorization is signed or encrypted with a private or non-public key of the service center.
- a public key or a public certificate of the service center is issued by a certification authority (CA).
- CA certification authority
- a main certificate of this certification authority is available to the components to be administered or is made available to them.
- the service center transmits the authorization to the service technician, for example by means of suitable means, such as e-mail, smart card, universal serial bus (USB) stick or the like.
- suitable means such as e-mail, smart card, universal serial bus (USB) stick or the like.
- the authorization authorization together with the identity certificate is stored or stored on the same medium, preferably on the medium on which the identity certificate of the service technician is already stored or stored, whereby only one memory for the certificates or authorizations is needed.
- This may, for example, be a smart card or an encrypted USB stick or another suitable medium which protects the stored information.
- the public key, or the public certificate of the service center can also be stored on this medium, for example, if this is not available in the component to be administered.
- the service technician can then access the component to be administered after successful authentication.
- the component to be administered first verifies the identity of the service technician by verifying the validity period of the identity certificate and by using the service center's public key or public certificate and main body signature created by the private or non-public key Certificate of the issuing certification authority. Then, the component to be administered checks the authorization grant before subsequently allowing the service technician to perform the actions to be performed to perform the particular tasks.
Claims (11)
- Procédé pour l'établissement, l'attribution et la vérification d'octrois d'autorisation qui sont nécessaires pour qu'un technicien de service accomplisse des tâches définies par un plan d'intervention en procédant à des opérations sur un appareil ou un composant d'une structure distribuée,
caractérisé en ce qu'il comprend les étapes suivantes :- production, par un programme d'aide à la planification établissant le plan d'intervention, d'au moins un octroi d'autorisation associé à un certificat d'identité du technicien de service présentant une durée de validité limitée, enregistré sur un support de stockage transporté ou transportable par le technicien de service, qui est nécessaire pour accomplir des tâches définies par le plan d'intervention, et qui est produit uniquement avec une brève validité, ce qui assure que les autorisations peuvent être annulées dans des délais très courts, sans annuler le certificat d'identification auquel les octrois d'autorisations sont associés,- signature de l'octroi d'autorisation avec une clé non publique,- enregistrement de l'octroi d'autorisation signé sur un support de stockage transporté ou transportable par le technicien de service,- fourniture d'au moins le certificat d'identité et de l'octroi d'autorisation signé par le technicien de service à l'appareil ou au composant,- vérification de la durée de validité du certificat d'identité par l'appareil ou le composant,- vérification de la signature de l'octroi d'autorisation signé par l'appareil ou le composant au moyen d'une clé publique associée à la clé non publique utilisée pour établir la signature et d'un certificat racine d'une autorité de certification qui a délivré la clé publique,- la clé publique ainsi que le certificat racine de l'autorité de certification étant disponibles à ou ayant été mis à disposition de l'appareil ou du composant,- vérification de l'octroi d'autorisation par l'appareil ou le composant, et- si le résultat de toutes les vérifications confirme l'identité du technicien de service et autorise l'exécution des tâches, délivrance de l'autorisation au technicien de service pour exécuter les opérations à effectuer afin d'accomplir les tâches assignées ou prescrites par le plan d'intervention. - Procédé selon la revendication 1,
caractérisé en ce que
l'octroi d'autorisation signé est enregistré sur le même support de stockage transporté ou transportable par le technicien de service que le certificat d'identité présentant une durée de validité limitée. - Procédé selon la revendication 1,
caractérisé en ce que
l'octroi d'autorisation signé est demandé en ligne et est associé de façon cryptographique au certificat d'identité présentant une durée de validité limitée. - Procédé selon la revendication 1, 2 ou 3,
caractérisé en ce que
la clé publique ainsi que le certificat racine de l'autorité de certification sont enregistrés dans une base de données intégrée dans l'appareil ou dans le composant ou sur une mémoire intégrée dans l'appareil ou dans le composant. - Procédé selon la revendication 1, 2 ou 3,
caractérisé en ce que
la clé publique ainsi que le certificat racine de l'autorité de certification sont fournis à l'appareil ou au composant par le technicien de service. - Procédé selon la revendication 5,
caractérisé en ce que
la clé publique ainsi que le certificat racine de l'autorité de certification sont fournis à l'appareil ou au composant par le technicien de service, en ce sens que ceux-ci sont également enregistrés sur le même support de stockage transporté ou transportable par le technicien de service que le certificat d'identité présentant une durée de validité limitée. - Procédé selon la revendication 1, 2 ou 3,
caractérisé en ce que
l'appareil ou le composant interroge en ligne la clé publique ainsi que le certificat racine de l'autorité de certification. - Procédé selon l'une quelconque des revendications précédentes,
caractérisé en ce que
le support de stockage transporté ou transportable par le technicien de service est une carte à puce ou une clé USB. - Procédé selon l'une quelconque des revendications précédentes,
caractérisé en ce que
la clé non publique utilisée pour la signature de l'octroi d'autorisation est la clé non publique d'un centre de service établissant le plan d'intervention. - Procédé selon l'une quelconque des revendications précédentes,
caractérisé en ce que
le certificat d'identité du technicien de service a une durée de validité limitée à deux ans. - Procédé selon l'une quelconque des revendications précédentes,
caractérisé en ce que
l'octroi d'autorisation a une durée de validité au maximum de 24 heures.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102008027586A DE102008027586A1 (de) | 2008-06-10 | 2008-06-10 | Verfahren zur Erstellung, Vergabe und Überprüfung von Autorisierungs-Bewilligungen |
PCT/EP2009/055447 WO2009149994A1 (fr) | 2008-06-10 | 2009-05-06 | Procédé pour l’établissement, l’attribution et la vérification d’octrois d’autorisation |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2289052A1 EP2289052A1 (fr) | 2011-03-02 |
EP2289052B1 true EP2289052B1 (fr) | 2018-02-28 |
Family
ID=40848051
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09761557.9A Active EP2289052B1 (fr) | 2008-06-10 | 2009-05-06 | Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation |
Country Status (4)
Country | Link |
---|---|
US (1) | US8621232B2 (fr) |
EP (1) | EP2289052B1 (fr) |
DE (1) | DE102008027586A1 (fr) |
WO (1) | WO2009149994A1 (fr) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5511615B2 (ja) * | 2010-09-30 | 2014-06-04 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 作業指示に関連付けられた資産又は当該資産に関連付けられた要素を管理する方法、並びにそのシステム及びコンピュータ・プログラム |
US9324049B2 (en) | 2010-12-30 | 2016-04-26 | Schlumberger Technology Corporation | System and method for tracking wellsite equipment maintenance data |
DE102018005873A1 (de) * | 2018-07-25 | 2020-01-30 | Giesecke+Devrient Mobile Security Gmbh | Verfahren und System zur zentralisierten Authentifizierung von Unterstützungsdiensten bei einer Karten-Sofortausgabeeinrichtung |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070219950A1 (en) * | 2002-02-25 | 2007-09-20 | Crawford C S L | Systems and methods for controlling access within a system of networked and non-networked processor-based systems |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6557105B1 (en) * | 1999-04-14 | 2003-04-29 | Tut Systems, Inc. | Apparatus and method for cryptographic-based license management |
DE10056135A1 (de) * | 2000-11-07 | 2002-05-08 | Deutsche Telekom Ag | Verfahren und Anordnung für ein Rechte-Ticket-System zur Erhöhung der Sicherheit bei der Zugangskontrolle zu Rechnerrecourcen |
DK1336937T3 (da) | 2002-02-13 | 2004-09-27 | Swisscom Ag | Adgangskontrolsystem, adgangskontrolfremgangsmåde og dertil egnede indretninger |
US7127611B2 (en) * | 2002-06-28 | 2006-10-24 | Motorola, Inc. | Method and system for vehicle authentication of a component class |
US20040186880A1 (en) * | 2002-10-17 | 2004-09-23 | Yoshiki Yamamoto | Management apparatus, terminal apparatus, and management system |
US20050229004A1 (en) | 2004-03-31 | 2005-10-13 | Callaghan David M | Digital rights management system and method |
US20050223233A1 (en) * | 2004-04-01 | 2005-10-06 | Fujitsu Limited | Authentication method and system |
DE102005015792A1 (de) | 2004-05-04 | 2005-12-01 | Heidelberger Druckmaschinen Ag | Diagnosesystem mit Identifikationsanzeigeeinrichtung |
-
2008
- 2008-06-10 DE DE102008027586A patent/DE102008027586A1/de not_active Withdrawn
-
2009
- 2009-05-06 WO PCT/EP2009/055447 patent/WO2009149994A1/fr active Application Filing
- 2009-05-06 EP EP09761557.9A patent/EP2289052B1/fr active Active
- 2009-05-06 US US12/996,813 patent/US8621232B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070219950A1 (en) * | 2002-02-25 | 2007-09-20 | Crawford C S L | Systems and methods for controlling access within a system of networked and non-networked processor-based systems |
Also Published As
Publication number | Publication date |
---|---|
EP2289052A1 (fr) | 2011-03-02 |
US8621232B2 (en) | 2013-12-31 |
WO2009149994A1 (fr) | 2009-12-17 |
US20110087891A1 (en) | 2011-04-14 |
DE102008027586A1 (de) | 2009-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2936259B1 (fr) | Actualisation d'un certificat d'appareil numérique d'un appareil d'automatisation | |
DE60225378T2 (de) | Verfahren und Systeme zur Steuerung des Umfangs der Delegierung von Authentifizierungsdaten | |
EP2122986B1 (fr) | Procédé et système de mise à disposition de services pour des terminaux | |
DE102016218986B4 (de) | Verfahren zur Zugriffsverwaltung eines Fahrzeugs | |
DE60119857T2 (de) | Verfahren und Vorrichtung zur Ausführung von gesicherten Transaktionen | |
DE112017004033T5 (de) | Verfahren zum Erhalten von geprüften Zertifikaten durch Mikrodienste in elastischen Cloud-Umgebungen | |
EP2159653B1 (fr) | Procédé de concession d'une justification d'accès sur un objet informatique dans un système d'automatisation, programme informatique et système d'automatisation | |
DE102011089580B3 (de) | Verfahren zum Lesen von Attributen aus einem ID-Token | |
DE112018005203T5 (de) | Authentifizierung unter Verwendung von delegierten Identitäten | |
EP3417395B1 (fr) | Détermination de l'authenticité d'un appareil à l'aide d'un certificat d'autorisation | |
EP2136528B1 (fr) | Procédé et système de production d'une identité électronique déviée à partir d'une identité électronique principale | |
DE602005003631T2 (de) | Ausschluss der Passwortaufdeckung bei Attributzertifikatausgabe | |
DE112011102224T5 (de) | Identitätsvermittlung zwischen Client- und Server-Anwendungen | |
EP3528159B1 (fr) | Procédé de création d'un pseudonyme à l'aide d'un jeton d'id | |
DE102009025017B4 (de) | Anordnungen für Schnittstellen zu einer Benutzerzugriffsverwaltung | |
EP4224786A1 (fr) | Procédé et dispositif de génération de signatures électroniques | |
EP2289052B1 (fr) | Procédé pour l' établissement, l' attribution et la vérification d' octrois d' autorisation | |
WO2008022606A1 (fr) | Procédé d'authentification dans un système d'automatisation | |
EP3435265A1 (fr) | Procédé d'authentification sécurisée des appareils pouvant être reliés à un serveur, en particulier des dispositifs de contrôle d'accès ou des dispositifs de contrôle de paiement distributeurs automatiques d'un système de contrôle d'accès | |
EP1528450A1 (fr) | Méthode d'identification, d'authentification et d'autorisation d'accès à des données sécurisées par un utilisateur | |
EP3244360A1 (fr) | Procede d'enregistrement d'appareils, en particulier de dispositifs de controle d'acces ou{j}d'automates de vente ou d'achat dans un serveur d'un systeme comprenant plusieurs desdits appareils | |
EP2631837B1 (fr) | Procédé de création d'un pseudonyme à l'aide d'un jeton d'ID | |
EP3298526B1 (fr) | Procédé de lecture d'attributs à partir d'un jeton d'identification | |
DE102015210294A1 (de) | Clientvorrichtung und Servervorrichtung zum abgesicherten Freischalten von Funktionen eines Clients | |
EP1624350B1 (fr) | Procédé d'authentification dans un système d'automatisation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20101029 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIEMENS AKTIENGESELLSCHAFT |
|
17Q | First examination report despatched |
Effective date: 20151113 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIEMENS AKTIENGESELLSCHAFT |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G05B 23/02 20060101ALI20171004BHEP Ipc: G07C 9/00 20060101AFI20171004BHEP Ipc: G07C 3/00 20060101ALN20171004BHEP |
|
INTG | Intention to grant announced |
Effective date: 20171025 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH Ref country code: CH Ref legal event code: EP Ref country code: CH Ref legal event code: NV Representative=s name: SIEMENS SCHWEIZ AG, CH |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 974928 Country of ref document: AT Kind code of ref document: T Effective date: 20180315 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 502009014782 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 10 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20180228 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180528 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180529 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180528 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502009014782 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20180531 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 |
|
26N | No opposition filed |
Effective date: 20181129 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180506 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180506 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180531 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MM01 Ref document number: 974928 Country of ref document: AT Kind code of ref document: T Effective date: 20180506 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180506 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20190802 Year of fee payment: 11 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180228 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20090506 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180628 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200531 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200531 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20230523 Year of fee payment: 15 Ref country code: FR Payment date: 20230515 Year of fee payment: 15 Ref country code: DE Payment date: 20220620 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20230605 Year of fee payment: 15 |