EP2929496A2 - Secure management of a service provision transaction - Google Patents
Secure management of a service provision transactionInfo
- Publication number
- EP2929496A2 EP2929496A2 EP13801545.8A EP13801545A EP2929496A2 EP 2929496 A2 EP2929496 A2 EP 2929496A2 EP 13801545 A EP13801545 A EP 13801545A EP 2929496 A2 EP2929496 A2 EP 2929496A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- service
- transaction
- server
- provider
- managing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0613—Third-party assisted
- G06Q30/0619—Neutral agent
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
- G06Q30/012—Providing warranty services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
Definitions
- the invention relates to a transaction management method for carrying out a service provision, as well as a system that implements such a method.
- connection sites between a service provider and an applicant.
- the latter must then be present at the completion of the transaction to ensure that it is the right interlocutor, to verify the smooth running of the service, before making the payment.
- This solution has the disadvantage for the applicant to attend the service obligatorily.
- the service provider must trust the applicant, its payment is not guaranteed.
- Other solutions require the use of complex devices to ensure the identity of people and secure payment.
- Other solutions are particularly adapted to a particular service provision, and are not generalized because of their specificities.
- a general object of the invention is to propose a solution allowing the sale of services in a user-friendly, secure and simple manner, without the need for complex devices.
- the invention is based on a method of managing a transaction relating to a service provision between an applicant and a service provider, characterized in that it comprises the following steps:
- the Service Delivery Transaction Management System server can perform the following steps: - recording in an electronic memory of a contract concluded between a service provider and an applicant following their reconciliation;
- the method of managing a transaction may include an additional step of remotely transmitting a green light to the service provider for carrying out the service provision in the event of successful verifications.
- the biometric identification step may be a voice identification step that includes reading a sentence said by the provider and / or the recipient on a mobile phone, a voice recognition method implemented at least in part on a server of the service delivery transaction management system and / or partly on the mobile phone.
- the voice identification step can comprise the transmission of a sentence from the server of the service delivery transaction management system on a mobile phone of the service provider and then the oral reading of this sentence by the service provider, then the implementation of the voice recognition method from this reading.
- the method of managing a transaction may comprise a complementary step of authentication of the portable object of the service provider by the server of the service delivery transaction management system.
- the service delivery transaction management system server may implement a step of automatically associating the received data with a pre-registered contract.
- the method of managing a transaction can implement at least one other step of identifying the provider and location during the performance of the service and / or at the end of this realization.
- the service delivery transaction management system may implement, after the end of the service delivery, a payment step of the provider by delivering the payment to the applicant corresponding to the contract concerned by the transaction.
- the method of managing a transaction may implement a step of requesting the requester of a parameter representing the desired level of confidence for a transaction or may include an automatic determination of the confidence level of a transaction based on all or part of the following criteria:
- the method of managing a transaction can implement all or part of the following steps to achieve a required level of confidence:
- the method of managing a transaction may comprise a prior phase of entering personal data among the following by a service provider and then recording this data in a provider database:
- An identity in the form of a biometric identifier, such as a voice print,
- the method of managing a transaction may include a prior phase of capturing all or parts of the following data in a database by a claimant of a service delivery:
- An identity such as a biometric identifier
- the method for managing a transaction can comprise a step of recording on an electronic memory by the data service management server related to the realization of a service delivery transaction to maintain the digital traceability of the contracts performed. .
- the service delivery transaction management system server may associate a digital signature or at least one digital certification with the biometric identification data to ensure the future non-repudiation of the transaction.
- the invention also relates to a system for managing a transaction relating to a service provision between an applicant and a service provider comprising at least one server and an associated electronic memory, characterized in that the server implements the method of management of a transaction as described above.
- the invention also relates to a computer medium comprising a computer program implementing the steps of the method of managing a transaction involving a provision of service between an applicant and a service provider as described above.
- This service delivery transaction management system of Figure 1 is based on a central platform, which includes a server 10. which is associated at least one electronic memory, for example one or more databases.
- a first database 1 1 corresponds to a list of people 21 providing a service
- a second database 12 corresponds to a list of people 22 buyers of services.
- These different persons 21, 22 can communicate with the server 10 via any communication devices, for example via an Internet connection, from any personal device, such as a computer or a simple portable personal object such as a telephone 30, by any means to establish a remote communication 13, 14.
- the server 10 then allows them, via a human machine interface, to inform respectively their offer and their request.
- An authentication of a portable communication device in particular at least by its mobile phone number or the IMEI number of its SIM card,
- additional security steps may optionally be implemented such as the electronic certification of the voice biometric identifier, which consists of an electronic signature of this identifier by an encryption method in a known manner, which guarantees its authenticity when it is subsequently used.
- the server 10 preferably uses a separate and specialized certification center.
- his mobile phone can also be the subject of a secure storage to certify its future authentications.
- the applicants of the database 12 may have entered the following data:
- the central server 10 includes software that automates at least part of the matching between offers and requests for service, for example by crossing the nature of the service and the information. temporal and geographical, to automatically inform the applicant of the existence of certain possibilities corresponding to his wish.
- the server can provide the applicant with a search tool to enable him to search in a simple and user-friendly manner a service provider that corresponds to his need, through a human machine interface.
- the management system may operate with only one of the two databases of service providers or applicants.
- the system can offer services for sale, by registering only one database 1 1 of service providers. Then, people looking for a service can consult these data via a human machine interface, perform a search to identify the benefits that may be suitable for them. Then, an applicant will then identify themselves by entering data similar to those proposed above for the applicant database 12, to conclude a service contract with the chosen provider.
- a service contract is concluded between the applicant and the service provider.
- a transaction code is then created and the transaction is stored in a memory of the server 10, for example in a third database, not shown.
- the identity of both parties including the identity of the service provider who will perform the service and / or the identity of the beneficiary (ies) of the service, a date, time slot, week, or, more generally, information on the expected time for carrying out this service and geographical information, that is to say the place where the service is to be performed, are notably memorized.
- the transaction management method can automatically set a confidence index threshold, according to predefined criteria, for example from the identity of the stakeholders (provider and / or beneficiary), and / or the nature of the the benefit, and / or the amount of the benefit.
- a first major technical problem when performing a service is to ensure that the service is performed in the manner expected and expected by the applicant, even in his absence, and / or without his knowledge of the provider, so that he agrees to enter into a contract and then to pay this benefit with some confidence.
- the service provider can perform the service, even in the absence of the applicant, with significant confidence, its payment being guaranteed by the system.
- Such a mechanism is necessary to allow the development of a strong sales of services activity between a very large number of people who do not know each other, even between individuals, and for any type of service provision.
- this problem of trust can be solved in one direction, to the claimant, or in a cross-over manner, to the claimant and the service provider, so that both parties to the transaction are confident.
- a second technical problem requires the ability to implement this service without resorting to complex devices and expensive, to allow its simplest accessibility to a large number of people.
- the invention thus relates specifically to a solution for carrying out such a service that meets the two technical problems mentioned above.
- the method of managing the transaction relating to a service provided, implemented by software on the server 10 comprises a first step of identifying the provider and a second step of locating the service provider. This provider, at the time of the performance of the service. This approach ensures that it is the right service provider with a certain coded and listed service delivery contract and that it is in the right place at the right time.
- a service provider 32 When a service provider 32 has arrived at the place where he has to provide a service, he begins with a first identification step. For this, it establishes a simple telephone communication with a mobile phone 30, and a voice recognition identification procedure is performed.
- This voice recognition procedure can be carried out entirely by the remote server, or partly at the level of a mobile phone software 30.
- the server may, for example, transmit a random sentence to the provider, orally by telephone or by SMS or email.
- the provider who receives this sentence must read it aloud on his mobile phone to be identified. According to an alternative embodiment, this reading must be performed before a certain limit in time, to prevent any fraudulent manipulation.
- This identification step is mandatory. Its biometric realization via voice recognition makes it possible to reach an ideal compromise between the reliability of the identification and the simplicity of the process, since a simple mobile phone is enough, as well as a reasonable calculation power installed. on the server, using any known speech recognition algorithm.
- biometric identification may be chosen, such as fingerprint verification or facial recognition, always implemented via a mobile phone.
- this identification of the provider can be combined with the authentication of his mobile phone to achieve a higher level of confidence. For this, the phone number may be sufficient, or more sophisticated authentication can be implemented from the IMEI code stored on the SIM card of the phone for example.
- the voice of the provider and a piece of data of his telephone can be paired and used for the generation of a combined digital signature, which is then verified by the central server 10, or by a certification center of signatures.
- the service provider server 10 implements a communication with the signature verification server, and receives in return the validation or rejection of the signature.
- a second location step is implemented, for example by a GPS device integrated in the mobile phone or by a simple triangulation of the telephone system.
- a location data is then automatically transmitted to the central server.
- the server 10 When the server 10 receives these identification and location data, it automatically reconciles a contract concluded and registered, which must match the identity of the provider, the date and place. In case of doubt about the contract, the server requests clarification from the service provider and / or the beneficiary to be sure to identify the transaction with certainty. The server then checks the level of trust associated with this contract and implements additional verification steps if necessary.
- the server When this phase is over, the server returns a green light on the provider's phone, who knows that he can perform the agreed service. In all cases, the server implements a step of timestamping and certification of the received data, which guarantees their integrity throughout the procedure.
- This pre-service phase has the advantage of great simplicity, since one or more simple telephone calls 33 are sufficient, from a simple mobile phone.
- the service provider can implement the following steps during a final phase of the service:
- the transaction management method may implement other steps to improve the confidence level index of the transaction.
- the decision of these additional steps is determined automatically, based on some or all of the following criteria:
- the other steps to increase the confidence level of a transaction can be all or some of the following steps: the calculation of the duration of the benefit from the records of the start and end time;
- the identification of the provider and / or the beneficiary may be supplemented by additional personal questions, by identification on the server 10 or another server via an Internet connection, by an identifier / password type system and / or by the response to personal questions;
- This approach can be useful when the service is long, to be sure that the provider is still delivering the service.
- This approach can be combined with a location of the provider;
- an identification of an additional person participating in the performance for example, in the case of a piano course given by a service provider to a third party, for example if the recipient of the performance of the service service is a child of the applicant.
- the latter may then wish to check at the beginning of the service that his child is on the planned place and identify him, in a similar way to the identification of the provider explained above.
- This additional identification can also be that of the requester himself, to reinforce the confidence of the service provider who knows while he is dealing with the right customer, who has made the request for service delivery.
- This additional identification can be implemented from a biometric identifier, similarly to the identification of the service provider.
- the identification of the recipient of the service provision may suffice.
- the beneficiary is at a place belonging to the service provider, it can be considered that his identification on that site is sufficient to attain sufficient confidence for the provision of the service, without necessarily requiring the identification of the service provider. service itself, the latter may in some cases be visually identified by the recipient of the service. In another example, regardless of the location of the transaction, it may be chosen to identify only the beneficiary of the service if the nature of the service particularly requires the trust of the service provider.
- These different steps intended to increase the confidence level of the transaction may be mandatory for certain particular services. For example, if the transaction involves a length of service, such as a certain number of cleaning hours, it is strongly advised to take into account the duration of the service, by recording the start time and the end time. .
- any smart and communicating portable object may be suitable, such as a tablet, a laptop, a radio, for example embedded in a vehicle, etc.
- the system described is not incompatible with the implementation of more complex means and this solution can be combined with any other existing complementary solution, for example on the basis of highly secure transaction terminals.
- the system described with reference to Figure 1 can naturally be in a different architecture, implementing multiple remote servers sharing the different functions described, from all electronic memories that may or may not be linked to a certain server . We mean by server any computer, computer, communicating remotely to implement the method described above.
- the server When service delivery is complete and has been completed in all stages and successfully to achieve the required level of trust, payment of the benefit is automatically implemented.
- the server then serves as an intermediary, it proceeds to the payment of the provider and deals with the automatic billing of the applicant, as well as the receipt of the financial transaction to receive the payment of the service.
- the provider is also in a position of trust because he is sure to be paid if he has proceeded to all the steps described above.
- this payment remains optional, the process may be suitable for services that do not implement a payment, such as simply bringing people into contact, especially for a secure meeting.
- the invention does not relate to a payment method, but to a method for performing service delivery in a secure and trusted environment between the parties.
- a history of all contracts and transactions made is kept in a memory associated with the server, with all the information mentioned above relating to the transaction. The system thus allows the traceability of transactions, and the integrity of the stored data, which make the transactions non-repudiable.
- the server of the transaction management system can then implement the following steps:
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1261753A FR2999324A1 (en) | 2012-12-07 | 2012-12-07 | SECURE MANAGEMENT OF A SERVICE DELIVERY TRANSACTION |
PCT/EP2013/075421 WO2014086796A2 (en) | 2012-12-07 | 2013-12-03 | Secure management of a service provision transaction |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2929496A2 true EP2929496A2 (en) | 2015-10-14 |
Family
ID=47741112
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP13801545.8A Ceased EP2929496A2 (en) | 2012-12-07 | 2013-12-03 | Secure management of a service provision transaction |
Country Status (4)
Country | Link |
---|---|
US (1) | US20150310443A1 (en) |
EP (1) | EP2929496A2 (en) |
FR (1) | FR2999324A1 (en) |
WO (1) | WO2014086796A2 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11049343B2 (en) | 2014-04-29 | 2021-06-29 | Vivint, Inc. | Techniques for securing a dropspot |
US11900305B2 (en) | 2014-04-29 | 2024-02-13 | Vivint, Inc. | Occupancy identification for guiding delivery personnel |
US11410221B2 (en) | 2014-04-29 | 2022-08-09 | Vivint, Inc. | Integrated secure delivery |
US10657483B2 (en) * | 2014-04-29 | 2020-05-19 | Vivint, Inc. | Systems and methods for secure package delivery |
US10482451B2 (en) * | 2016-05-23 | 2019-11-19 | Mastercard International Incorporated | Method of using bioinformatics and geographic proximity to authenticate a user and transaction |
US10269017B1 (en) | 2017-11-21 | 2019-04-23 | Capital One Services, Llc | Transaction confirmation and authentication based on device sensor data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050027543A1 (en) * | 2002-08-08 | 2005-02-03 | Fujitsu Limited | Methods for purchasing of goods and services |
US20070198432A1 (en) * | 2001-01-19 | 2007-08-23 | Pitroda Satyan G | Transactional services |
US20070233615A1 (en) * | 2006-03-30 | 2007-10-04 | Obopay Inc. | Member-Supported Mobile Payment System |
US20080108324A1 (en) * | 2006-05-25 | 2008-05-08 | Sean Moshir | Methods of authorizing actions |
US20090152343A1 (en) * | 2007-12-14 | 2009-06-18 | Bank Of America Corporation | Authentication methods for use in financial transactions and information banking |
-
2012
- 2012-12-07 FR FR1261753A patent/FR2999324A1/en not_active Withdrawn
-
2013
- 2013-12-03 EP EP13801545.8A patent/EP2929496A2/en not_active Ceased
- 2013-12-03 US US14/650,149 patent/US20150310443A1/en not_active Abandoned
- 2013-12-03 WO PCT/EP2013/075421 patent/WO2014086796A2/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070198432A1 (en) * | 2001-01-19 | 2007-08-23 | Pitroda Satyan G | Transactional services |
US20050027543A1 (en) * | 2002-08-08 | 2005-02-03 | Fujitsu Limited | Methods for purchasing of goods and services |
US20070233615A1 (en) * | 2006-03-30 | 2007-10-04 | Obopay Inc. | Member-Supported Mobile Payment System |
US20080108324A1 (en) * | 2006-05-25 | 2008-05-08 | Sean Moshir | Methods of authorizing actions |
US20090152343A1 (en) * | 2007-12-14 | 2009-06-18 | Bank Of America Corporation | Authentication methods for use in financial transactions and information banking |
Also Published As
Publication number | Publication date |
---|---|
US20150310443A1 (en) | 2015-10-29 |
WO2014086796A2 (en) | 2014-06-12 |
FR2999324A1 (en) | 2014-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11250427B2 (en) | Credit payment method and apparatus based on mobile terminal peer-to-peer | |
EP2929496A2 (en) | Secure management of a service provision transaction | |
AU2017100233A4 (en) | Secure mobile contact system (smcs) | |
FR2940567A1 (en) | TRANSACTION SECURING METHOD, TRANSACTION DEVICE, BANK SERVER, MOBILE TERMINAL, AND CORRESPONDING COMPUTER PROGRAM PRODUCTS | |
FR2864289A1 (en) | Resource access controlling method, involves notifying comparison of biometric data and biometric references of user, to access terminal, by server that communicates simultaneously with terminal and access terminal | |
US20210209693A1 (en) | Electronic Exchange of Insurance Information | |
EP3168769A1 (en) | Method for assisting with the authentication of a user, corresponding server and computer program | |
EP3196815B1 (en) | Method for detecting passengers, for managing and optimising the shared transportation thereof | |
WO2009027607A2 (en) | Method and system for providing services | |
FR2837953A1 (en) | DATA EXCHANGE SYSTEM | |
US11449948B2 (en) | Method for subscribing insurance policies from geolocated mobile devices with contracting on a distributed database | |
FR2945364A1 (en) | Method for establishing relationship between travelers e.g. users in car-pooling, involves selecting search advertisement associated to applicant contact information based on geolocation information, and communicating advertisement to user | |
EP3206149B1 (en) | Method for monitoring a parameter indicating a level of confidence associated with a user account of an online service | |
US8185743B1 (en) | Systems and methods for application locking using an internal and external checksum | |
EP1978479A1 (en) | Dynamic cryptogram | |
WO2020169741A1 (en) | Method for managing the access of a user to a voice service, corresponding device, system and programs | |
EP2897095B1 (en) | Method for securing a transaction conducted by bank card | |
WO2018029564A1 (en) | System and method for authentication of a user of an application system by a central server, without using a password | |
FR3060173A1 (en) | PROCESS RELATING TO THE TRANSACTION OF A VEHICLE. | |
WO2023001845A1 (en) | Method for enrolling a user by an organisation on a blockchain | |
WO2015165827A1 (en) | Method and device for authenticating a user for access to remote resources | |
WO2023099939A1 (en) | System and method for enabling consultancy for long-term rental services with certified signing of contracts from geolocated mobile devices | |
EP2798564A1 (en) | Method and system for securing a payment carried out with the aid of a payment card | |
FR3095867A1 (en) | MANAGEMENT OF A LOCAL TRANSFER OF RESPONSIBILITY BETWEEN FORWARDERS FOR THE DELIVERY OF A PARCEL | |
OA19567A (en) | Management of a transfer of local responsibility between forwarders for the delivery of a package. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20150622 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20160415 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20180123 |