EP3398108A1 - A method and system for visual privacy protection for mobile and wearable devices - Google Patents
A method and system for visual privacy protection for mobile and wearable devicesInfo
- Publication number
- EP3398108A1 EP3398108A1 EP16710727.5A EP16710727A EP3398108A1 EP 3398108 A1 EP3398108 A1 EP 3398108A1 EP 16710727 A EP16710727 A EP 16710727A EP 3398108 A1 EP3398108 A1 EP 3398108A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- mobile device
- face
- data
- privacy
- visual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Definitions
- the present invention generally relates to a method and system for protection mechanism for visual privacy in mobile and wearable computing devices, especially when equipped with digital cameras.
- the present invention relates to a method and system for providing visual privacy preserving service for mobile and wearable computing devices that are equipped with at least one digital camera.
- the present invention provides a visual privacy protection for wearable and mobile devices, such as smart phones and smart glass.
- a privacy protection control has to provide the selectivity over whether an individual wants to appear in one visual file or not.
- a method for visual privacy protection of individuals in a network with at least one first mobile device and at least one second mobile device is provided.
- the mobile devices having at least one camera, the mobile devices being connected to each other within the network and/or having a direct wireless connection.
- the method comprises the steps of:
- the second mobile device receiving at least one visual privacy protection request from the first mobile device
- the visual privacy request comprises face representation information of an individual to be protected.
- the first mobile device prior to the step A) performs the step of generating the at least one visual privacy protection request preferably further comprising the steps of
- the first mobile device calculating a face representation information from a facial picture of an individual to be protected, if no previous face representation information for the individual to be protected exists in a first database of the first mobile device;
- the first mobile device generating a visual privacy protection request containing the face representation information of the individual to be protected and preferably further information to be sent;
- the first mobile device further performs the step of sending the visual privacy protection request to all other devices in the network and/or in range of the direct wireless connection preferably in a predetermined time interval periodically.
- the step B) of processing the information contained in the at least one visual privacy request further comprises the steps of:
- step C) of processing acquired camera data using the information contained in the at least one visual privacy request further comprises the steps of:
- the second mobile device detecting all faces in the acquired camera data from the at least one camera
- the second mobile device performing a de-identification process on the acquired camera data taking into account each of the faces to be protected.
- the de-identification process of step C5) comprises at least one of the following steps: a) altering the data of the camera input data in the region of each of the faces to be protected; b) altering the data of the camera input data in the region of at least one of the faces to be protected by blurring the face to be protected ; c) altering the data of the camera input data in the region of at least one of the faces to be protected by substituting the face with default data, preferably the default data being a randomly generated face; and d) deleting the data of the camera input data in the region of at least one of the faces to be protected.
- a first mobile device is provided and configured to perform at least one of the steps of the method according any of the preceding aspects of the invention.
- a second mobile device configured to perform at least one of the steps of the method according to any one of the preceding aspects of the invention.
- a system for visual privacy protection of individuals for mobile devices comprising at least one first mobile device according to a previous aspect of the invention and at least one second mobile device according to a previous aspect of the invention.
- each mobile device has a privacy-preserving module and at least one of the following: a display module; a camera module; a memory management module; and a communication module.
- the respective privacy-preserving module is configured to perform the method according to any of the preceding aspects of the invention; wherein the privacy-preserving module preferably being located in a layer close to the operating system; and/or the privacy-preserving module preferably being not accessible by any third-party applications or developers; and/or the privacy-preserving module preferably being below a system services layer, preferably parallel and/or overlapping with a libraries layer.
- a visual privacy protection system and method for wearable and mobile devices, such as smart phone and smart glass.
- Device-to-device communication can be used to ensure visual privacy protection.
- Each user who currently does not wants his visual information to be collected can broadcast a specific message from his own device to all other devices nearby.
- the user In order to determine which face within the scene should be de-identified, the user should include his or her abstract facial features generated from a standard process. To ensure confidentiality, the broadcasted data cannot be used to restore the original face.
- this visual privacy protection mechanism should be implemented on the operating system level instead of a particular third-party application. Otherwise, the visual privacy protection will not be guaranteed once the user chooses not to install the particular third- party application.
- the visual privacy protection method is mainly based on face representation information transmitted via device-to-device communication in a wireless network.
- the face representation information is an identification that can be used for face recognition. It is computed from face features. Therefore, the face representation information can be called abstract facial feature data.
- An individual who wants to protect his or her visual privacy can use a device to compute and store his or her face representation information.
- the first mobile device initiates the connection only if the user of the first mobile intends to protect his or her visual privacy.
- the connection between the mobile devices is built in the form of device-to-device communication preferably in a wireless network.
- the face information of the user of the first mobile device which is stored in the device, will be sent to the second mobile device.
- the second mobile device After the second mobile device receives the message containing any face representation information, it will save received face representation information to a database managed by the privacy protection method and keep the information for a certain period of time, i.e. the valid time.
- the second mobile device obtains some visual information, all the faces in photos will be detected, and the face representation information of each face will be calculated and then compared with face representation information stored in the database.
- a method of preserving visual privacy of individuals involves at least two smart devices.
- the device initiating the privacy protection services comprises an optional camera module to take photo of the user if needed for later processing, a processing module to calculate and store user's face representation information, a memory management module to store calculated face representation information, and a communication module to send privacy-preserving messages to nearby devices.
- the device that can take images and/or videos while performing appropriate visual privacy protection processing in such scenario mainly comprises an application module to invoke the camera of the device, a processing module to detect faces from the camera input, calculate face representation information, find matched faces, and do de-identification process, a communication module to receive privacy-preserving messages sent by nearby devices, a display module to present real-time feedbacks on the screen of the device, and a memory management module to save photo or image after necessary privacy protection actions.
- the visual privacy protection method performs with a wireless communication and a camera module within the smart device.
- the method is composed of the steps of: calculating face representation information of the user; generating a visual privacy protection request; sending face representation information to other devices within range via wireless network;
- the visual privacy protection service is composed of the steps of: invoking camera of the device to take images and/or videos; receiving the visual privacy protection request from devices within range via wireless network; extracting face representation information from the visual privacy protection request; storing the face representation information in a database; detecting all faces in the input data from camera; calculating face representation information for faces detected in the camera input data; comparing calculated face representation information with those stored in the database; designating faces whose face representation information is matched in the acquired camera data; performing de-identification process on the acquired camera data for each of the faces to be protected; displaying processed camera data to the screen and outputting processed camera data to other third-party applications.
- This invention mainly offers the following advantages.
- the visual privacy protection method of the present invention can maintain both privacy and utility. It preserves privacy of certain individuals while keeping functionality of the camera and as much information as possible in the images and/or videos. Second, it automatically removes identifiable information of certain individuals without additional efforts from the user.
- the invention guarantees the privacy of people who are captured by a digital camera of mobile and wearable devices, e.g., smart phone and smart glass.
- the visual privacy preserving method of the present invention can be provided by the system of devices that guarantees the privacy of people on photos and/or videos taken by mobile and wearable devices.
- Figure 1 shows an ordinary video and/or image capturing scene according to an embodiment of the invention
- Figure 2 shows an embodiment of a user interface of a mobile device according to the invention
- FIG. 3 shows a generalized diagram of the system according to an embodiment of the invention
- FIG. 4 shows a network according to an embodiment of the invention
- Figure 5 shows the workflow on the transmitter side according to an embodiment of the invention
- Figure 6 shows the workflow on the receiver side according to an embodiment of the invention
- Figure 7 illustrates the operating system structure of a computing system, as an example mobile device operating system according to an embodiment of the invention
- Figure 8 illustrates the operating system structure of an alternative computing system, as a mobile device operating system according to an embodiment of the invention
- Figure 9 shows the preferred location of the privacy-preserving in a generalized device architecture for most mobile operating systems according to an embodiment of the invention. Detailed description of the invention
- Figure 1 shows an ordinary video and/or image capturing scene 100 according to an embodiment of the invention, i.e. this diagram illustrates a scene in the real world when a user takes a picture and/or video at a place with a number of people around.
- the photographer A 101 is taking a picture and/or recording a video of the target individual B 103.
- Target individual B 103 approves photographer 101 to collect his or her visual information.
- the person D 105 represents one who wants his or her face de-identified in the collected visual information. To achieve this, person D 105 can set his or her device (e.g.
- A's device 102 is currently activated as A is performing visual information collection. Once the camera is activated, A's device 102 will receive all relevant message from nearby devices to determine which faces in the visual file should be de-identified.
- the devices in Fig.l namely devices 102, 104, 106, and 108 do not have to be hand-held devices as shown in the diagram.
- Wearable devices whose operating systems have privacy-preserving module incorporated can also achieve similar functionality.
- the number of individuals being photographed and/or videotaped do not limited to three. In other words the number of individuals within a particular scene can be any number of individuals.
- the number of people photographed and/or videotaped in the scene can be any number of individuals smaller or equal to the number of individuals in the scene.
- Figure 2 shows an embodiment of a user interface of a mobile device according to the invention. More specifically Fig. 2 illustrates the example user interface 200 on a screen 202 of a device 201, which is currently taking a photo and/or recording a video. Individuals 203, 209, and 206 can be seen as corresponding to individuals 103, 107, 105, c.f., Fig.l. Individual 206 would not like his or her facial information to be collected and sets his or her device 207 to send a visual privacy protecting requests to all nearby devices 201, 204, 210.
- Device 201 receives the request from device 207 and it is mandatory for device 201 to satisfy this request and blur, i.e., de- identify, face 208 of individual 206, as is shown on the screen 202.
- Devices 204, 210 of individuals 203 and 209 respectively do not need to receive the request from device 207, since their camera modules are not activated. Both individual 203 and 209 are not sending any visual privacy protecting request because the respective individuals approve visual information collection on this occasion. Hence, device 201 will not process the visual information of 203 and 209, and faces 211 and 205 will be shown as normal on the screen 202.
- FIG. 3 shows a generalized diagram of the system according to an embodiment of the invention.
- the visual privacy-preserving system 300 is generalized into six modules.
- Application module 301 preferably comprises a system camera application and a third party camera application, with both of which the user may directly interact with. Both types of applications will invoke the camera module 302.
- the camera module 302 mainly refers to the camera driver in the kernel layer and the underlying camera hardware for collection of optical information.
- the processing module 304 primarily encompasses the face detection process, facial feature data extraction, and image de-identification processes.
- the communication module 303 is responsible for device-to-device message transmission and reception.
- the display module 305 offers realtime visual feedbacks to the photographer on what the saved image and/or video file will look like.
- Memory management module 306 takes effect when saving a photo and/or video into the device memory and is further responsible for storing the received abstract facial feature data.
- Figure 4 shows a network according to an embodiment of the invention.
- the network 400 four devices 401, 402, 403, and 404 are connected to each other.
- Devices 401, 402, 403, and 404 are all in different states.
- Device 401 is in the privacy-preserving mode and the camera module of 401 is activated.
- Device 402 is not in the privacy-preserving mode and the camera module is activated.
- Device 403 is in the privacy-preserving mode but the camera is not activated.
- Device 404 is not in the privacy-preserving mode and the camera is not activated. It should be noted that one device can be transmitting and receiving privacy-preserving messages at the same time.
- Devices in the privacy-preserving mode i.e., devices 401 and 403 will send request messages to all other devices nearby, but only those devices whose camera is on, i.e., devices 401 and 402, will receive the message. In other words, the reception of this message is camera-associative.
- the message transmission mechanism is in a device-to-device fashion, although the exact transmission protocol this privacy-preserving system follows should not be limited to one particular type. Wi-Fi, Bluetooth etc. are all likely to be considered as appropriate according to different application scenarios.
- Reference numerals 405, 406, and 407 represent respective message sent by device 401 and device 403. These messages each comprises of two categories of data: identification data and feature data. Feature data is used to determine which person in the photo or video requests face de-identification. Identification data helps the receiver identify that the received message is related to privacy-preserving request. Detailed procedures of this privacy-preserving system are elucidated in two flow charts in Fig.5 and Fig.6. Figure 5 shows the workflow 500 on the transmitter side, which are the devices sending visual privacy protection requests to other devices.
- decision stage 501 When a user sets his or her device to the privacy- preserving mode, i.e., when individual 105 sets the device 106 to send the visual privacy protection requests for the first time, decision stage 501 is reached. The operating system will determine whether the device has previously been in the privacy-preserving mode and whether previous feature data exists. If not, or if the user chooses to renew the feature data, in stage 502, the device will ask the user to input a facial photo.
- This process may evoke the camera module of the device depending on whether the user chooses to take a new photo as input or use an old photo.
- the photo input preferably includes no other person's face apart from the user's, and the face of the user is preferably in a frontal pose. This has the advantage, that the subsequent processes become more easy and accurate with respect to limitations on further face detection and recognition methods.
- the data 402 is the output data of process 401, a facial image file, possibly in but not limited to the JPEG format.
- face detection process initiates and locates the face regions, producing output 505.
- the standard feature extraction process is executed.
- This feature extraction method is preferably based on one of many high- performance face recognition algorithms known to the skilled person. For instance, a non- statistical face recognition method, e.g., Local Gabor Binary Pattern Histogram Sequence (LGBPS), is suitable for this application scenario, since it does not rely on a large number of samples and its performance has also been proved qualified.
- LGBPS Local Gabor Binary Pattern Histogram Sequence
- the applied feature extraction method is not limiting the scope of the invention and any applicable method can be used to carry out the invention.
- it is preferably be made to be the standard across different devices, in order to ensure the following comparison process to be valid.
- the data 507, abstract feature data of the user's face will be output and saved to the device memory for future purposes in stage 510.
- the device After combining feature data with the identification data as explained with reference to Fig.4, the device will preferably constantly send the combined data to all nearby devices in stage 50 until the privacy-preserving mode is turned off.
- Figure 5 can be divided into several blocks according to the module generalization illustrated in Fig.3.
- Block 511 is related to the camera module since a new photo may be taken in image collection process.
- Block 512 belongs to the process module where image outputs from the camera module are processed.
- Block 513 pertains to the communication module where privacy protection requests are transmitted.
- Block 514 is part of the memory management module.
- Memory management module and display module also participate in several other processes shown in Fig. 5.
- Figure 6 shows the workflow 600 on the receiver side according to an embodiment of the invention.
- decision stage 601 once a camera-based application is started, whether or not it originates from the operating system or a third-party, the device is forced to execute process 603. The device will receive all relevant privacy-preserving request messages.
- the device Since multiple users may be sending requests in the same time, the device is likely to receive multiple request messages, resulting in a received feature data pool 605.
- Each discrete element in this data pool represents the abstract facial information of one user who is not willing to be photographed or videotaped.
- some transitional steps will be performed first in the process module.
- the image data from the camera hardware will be passed to the face detection process to locate regions of all the existing faces of this frame. Consequently, data 604, a pool of face regions, will be the output of process 602. Subsequently, in stage 606, a standard feature extraction process will be carried out.
- the feature extraction is preferably standardized across all devices with the same operating system.
- the feature extraction is preferably performed separately on different face regions, thus producing another abstract feature data pool 607.
- comparison process will be performed on the received feature pool from the communication module and that from the camera module in a pairwise fashion.
- decision stage 608 a corresponding face region in the frame will be passed to process 609 to be de-identified, once a piece from pool 607 matches with a piece from pool 605. De-identification can be achieved in multiple ways. For example, simply blurring the face or substituting the face with a randomly generated face. If a piece from pool 604 has no match in pool 605, the corresponding face region will not be processed.
- stage 61 After a match, i.e., the piece from pool 604 is found in pool 605, the comparison process for the next piece in pool 604 is carried out. Until in stage 61 1, the system makes sure all pieces from 604 have been compared. Then, this frame of visual information can be passed to the display module and updates what the photographer can see on the screen. Also, all the photo and video files saved to the device memory are not the direct output from the camera hardware but the de- identified data as it has been passed to the device display. In stage 612, after the camera application ends, all the received feature data is preferably deleted from the device. In terms of the generalized modules shown in Fig.6, block 620 belongs to the camera module.
- Block 640 which refers the communication module and is part of the memory management module where received facial feature data is stored, and block 630 which is part of the process module will only initiate execution if the camera module is active.
- Block 650 is also affiliated to the process module, while block 660 is associated with the memory module.
- the display module actively updates the screen of the device.
- the memory management module also plays a part when the user saves the processed photo and/or video files and received feature data.
- Figure 7 illustrates the operating system structure 700 of a computing system, as an example mobile device operating system according to an embodiment of the invention.
- Block 710 the kernel
- Block 720 is the base of the entire software stack and primarily manages the device hardware and also offers several additional functionalities.
- block 710 is block 720, including the hardware abstraction layer, the core libraries and several other components.
- the hardware abstraction layer permits the applications in the topmost level to employ the hardware in the bottommost level through a simple application programming interface.
- Block 730 includes, e.g., a Dalvik virtual machine, which interprets the bytecode of applications for the device runtime environment.
- Block 740 encompasses various system services, for example, power manager, sensor service etc.
- the layer 750 on the top is the application layer which users can directly interact with.
- Figure 8 illustrates the operating system structure 800 of an alternative computing system, as a mobile device operating system according to an embodiment of the invention.
- the basic framework of the system is similar to 700 with slight nuances.
- Layer 810 the core OS layer is responsible for device management and memory management layer as 710.
- Layer 820 core services layer incorporates system libraries and an Objective-C runtime environment.
- Layer 830 the media layer contains the graphics, audio, and video technologies utilized to develop multimedia applications.
- Layer 840 refers to the cocoa touch layer which contains key frameworks for application development and provides many high-level system services.
- layer 850 is the application layer.
- Figure 9 shows the preferred location of the privacy-preserving in a generalized device architecture for most mobile operating systems according to an embodiment of the invention.
- Hardware layer 910 serves as the most fundamental component of the entire architecture.
- Kernel layer 920 together with libraries and hardware abstraction layer 930 manage the accessibility of hardware for high-level software.
- Camera applications belong to the topmost level 950, the application layer.
- the system services layer offers many high-level frameworks for application developers. Since system services layer is accessible to developers, to ensure the validity of the privacy protection service, the service 960 should be implemented below the system services layer. Layer 920 and 930, however, are not prone to malicious manipulations. Hence, privacy protection service 960 may be parallel or even overlapping with layer 930.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Telephonic Communication Services (AREA)
- Studio Devices (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2016/055726 WO2017157435A1 (en) | 2016-03-16 | 2016-03-16 | A method and system for visual privacy protection for mobile and wearable devices |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3398108A1 true EP3398108A1 (en) | 2018-11-07 |
Family
ID=55586295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16710727.5A Withdrawn EP3398108A1 (en) | 2016-03-16 | 2016-03-16 | A method and system for visual privacy protection for mobile and wearable devices |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP3398108A1 (en) |
WO (1) | WO2017157435A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112312011B (en) * | 2020-10-15 | 2021-09-14 | 珠海格力电器股份有限公司 | Protection method and device for camera privacy |
CN113051543B (en) * | 2021-04-01 | 2021-11-23 | 湖南云畅网络科技有限公司 | Cloud service security verification method and cloud service system in big data environment |
CN113114944B (en) * | 2021-04-15 | 2022-10-14 | 荣耀终端有限公司 | Privacy protection method and device in shooting |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4036051B2 (en) * | 2002-07-30 | 2008-01-23 | オムロン株式会社 | Face matching device and face matching method |
GB2400514B (en) * | 2003-04-11 | 2006-07-26 | Hewlett Packard Development Co | Image capture method |
US9672332B2 (en) * | 2010-02-18 | 2017-06-06 | Nokia Technologies Oy | Method and apparatus for preventing unauthorized use of media items |
KR101723877B1 (en) * | 2012-08-15 | 2017-04-06 | 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 | Digital media privacy protection |
-
2016
- 2016-03-16 EP EP16710727.5A patent/EP3398108A1/en not_active Withdrawn
- 2016-03-16 WO PCT/EP2016/055726 patent/WO2017157435A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2017157435A1 (en) | 2017-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10062406B2 (en) | Video masking processing method and apparatus | |
CN111046365B (en) | Face image transmission method, numerical value transfer method, device and electronic equipment | |
US9049379B2 (en) | Apparatus and method for recognizing image | |
KR20210065178A (en) | Biometric detection method and device, electronic device and storage medium | |
CN110689460A (en) | Traffic accident data processing method, device, equipment and medium based on block chain | |
CN110765434A (en) | Identity authentication method and device, electronic equipment and storage medium | |
WO2022134388A1 (en) | Method and device for rider fare evasion detection, electronic device, storage medium, and computer program product | |
CN108923931B (en) | Electronic certificate processing method and device and computer readable storage medium | |
US20140320664A1 (en) | Security system for tracking and surveilling an object determined as unrecognizable using a surveillance camera and method for providing security service using the system | |
CN113408016B (en) | Method and device for storing ciphertext | |
TWI766458B (en) | Information identification method and apparatus, electronic device, and storage medium | |
CN114553814B (en) | Method and device for processing push message | |
CN110955541B (en) | Data processing method, device, chip, electronic equipment and readable storage medium | |
TW202009761A (en) | Identification method and apparatus and computer-readable storage medium | |
US20200145573A1 (en) | Network device, image processing method, and computer readable medium | |
US20230222843A1 (en) | Method and device for registering biometric feature | |
US20220335107A1 (en) | Method for Processing Application Program and Related Product | |
EP3398108A1 (en) | A method and system for visual privacy protection for mobile and wearable devices | |
CN112004046A (en) | Image processing method and device based on video conference | |
CN113923461A (en) | Screen recording method and screen recording system | |
JP7236042B2 (en) | Face Recognition Application Using Homomorphic Encryption | |
CN113552989A (en) | Screen recording method and device and electronic equipment | |
CN106529307B (en) | Photograph encryption method and device | |
CN111832458A (en) | Anti-theft method and system | |
CN110933314A (en) | Focus-following shooting method and related product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20180802 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20200409 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20200526 |