EP3405918A1 - Method for performing a bank transfer - Google Patents
Method for performing a bank transferInfo
- Publication number
- EP3405918A1 EP3405918A1 EP17706530.7A EP17706530A EP3405918A1 EP 3405918 A1 EP3405918 A1 EP 3405918A1 EP 17706530 A EP17706530 A EP 17706530A EP 3405918 A1 EP3405918 A1 EP 3405918A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- entity
- transfer
- data
- units
- command
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
Definitions
- the invention relates to a method for performing a transfer of value units between entities of a computer system.
- a transfer can concern a payment relating to a purchase, a donation, etc.
- a unit can be money, points such as loyalty points, etc.
- the entities in question manage the units of value and may effect unit transfers between them. These entities generally belong to financial institutions, especially banks.
- the check may not be provisioned.
- the transfer is little used in France. It is furthermore inconvenient, because of the need to enter the information elements of the bank account of the account of the user on which a banking operation must be performed, which is tedious. He must also enter the amount of the transfer and often the object, or even a reference of the transfer.
- telecommunication operators offer financial services that make it possible to transfer money between individuals via communication devices, typically smartphones.
- the techniques used are based on network signaling elements mobile.
- the general operation is in fact to transfer money from a first account linked to a first telephone number to a second account linked to a second telephone number.
- the accounts are managed by one and the same entity, namely the operator. But a current need is to make a transfer between different entities.
- the money transfer implements both the donor and the receiver telephone number.
- the donor or recipient may very well not wish to disclose his or her telephone number.
- the invention offers a solution that does not have the drawbacks of the state of the art.
- the invention relates to a method of realizing a transfer of units of value between a first entity and a second entity managing user accounts including units of respective values, operations on the units of values that can be controlled by devices including a first device and a second device, characterized in that it comprises the following steps, in the second device, when making a transfer: a. a step of obtaining first data, said transaction from the first device; b. a step of transmission to the first entity of a transfer realization order, the order including all or part of the transaction data and a second data previously obtained from the second entity.
- the invention implements two devices belonging to users and two entities managing user accounts.
- the second device receives transaction data from the first device.
- the user of the second device does not have to enter data relating to the transaction.
- the first entity transmits a transfer request to the second entity if it receives from the second device the transaction data, and another data, namely the data obtained from the second entity.
- the method of the invention therefore offers the possibility of making transfers between entities in a simple manner, particularly for the user of the second device because the latter does not have data capture related to the transaction; and securely through the use of the data obtained from the second entity, hereinafter referred to as the "token".
- the transmission step to the first entity of a transaction realization order can be carried out directly or indirectly.
- the command can be received by the first device and transmitted to the first entity.
- the received transaction data includes an address, and in that the command is transmitted to this address. This mode avoids the second device a step of sending a request to obtain the address that add an additional step in the process.
- the address in question is indifferently the address of the first entity or of an intermediate entity.
- the reception of the data by the second device triggers the step of transmitting an order for obtaining the the second data from the second entity.
- This mode makes it possible to automate the step of obtaining the second datum, namely the token, and thus to make the corresponding steps transparent.
- the step of obtaining the first data comprises a step of reading a code displayed on a screen of the first device.
- This mode prevents both the sender and the code receiver from disclosing their respective phone numbers.
- the second device photographs the code displayed on the screen without having to provide its telephone number to the second device.
- the read code can be transmitted to the first entity to obtain the code defined above.
- the invention relates to a method of performing a transfer of units between a first entity and a second entity managing respective user accounts including respective value units, operations on the units of values.
- controllable by devices including a first device and a second device, characterized in that it comprises the steps on the first entity: a. a step of receiving a command for obtaining transaction data relating to a transfer to be made; b. a step of providing first data, said transaction, to the first device; vs. a step of receiving a realization order of the transfer, the order including all or part of the transaction data and a second data previously obtained by the second device from the second entity; d. a step of transmitting to the second entity all or part of the received transaction data, and the second data item for verification; e. a step of performing the transfer according to the verification.
- the invention relates to a device, said second device, comprising a communication module for communicating with a first entity and a second entity managing user accounts including respective units of values, a module of command capable of controlling a transfer of units between entities, characterized in that it comprises: a. a module for obtaining first data, called transaction data, from a first device, b. a control module adapted to transmit to the first entity a transfer realization order, the order including all or part of the transaction data and a second data previously obtained from the second entity.
- the invention relates to an entity, said first entity, able to communicate with a second entity for performing a transfer of units of value between user accounts including respective units of values managed by the entities respectively, operations on the units of value that can be controlled by devices including a first device and a second device, characterized in that it comprises c. a first receiving module adapted to receive a command for obtaining transaction data relating to a transfer to be made from the first device; d. a module for supplying first data, referred to as transaction data, to the first device; e. a second receiving module adapted to receive a transfer realization order, the order including all or part of the transaction data and a second data previously obtained by the second device from the second entity;
- the invention relates to a computer program capable of being implemented on the second device as defined above, the program comprising code instructions which, when the program is executed by a processor, performs the steps executed on the second device.
- the invention relates to a computer program capable of being implemented on an entity as defined above, the program comprising code instructions which, when the program is executed by a processor , performs the steps performed on the first entity.
- FIG. 1 represents a computer system on which is illustrated an exemplary embodiment of the invention. This figure also shows the steps of an embodiment of the method of the invention.
- Figure 2 is a schematic view of the various circuits included in the first device and the second device.
- FIG. 1 shows a SYS system comprising two data processing devices, namely a first device DA and a second device DB belonging respectively to two users, namely a first user UTA and a second user UTB; the set comprising the second device DB and the second user UTB is referenced UTDB.
- the SYS system also includes two BA and BB representative entities of unit account managers, typically bank account managers, namely banks; these entities have physical and software resources capable of making bank transfers between CA and CB bank accounts, in particular between the CA and CB bank accounts of the UTA and UTB users, respectively.
- Entities BA and BB are generally respective computer systems including several servers connected to each other for making bank transfers during a bank transaction. To simplify the presentation, the two entities BA and BB will be illustrated by means of two servers, respectively.
- the devices and servers have the hardware architecture of a computer that is to say having resources for data processing, namely at least one processor, a read-only memory, a random access memory and means of communication.
- Figure 2 is a view of the architecture of the two devices. To simplify the presentation, only certain circuits described below are shown in the figure.
- the DA and DB devices respectively include CPUA and CPUB processors, MEMA and MEMB ROMs, I / OA and I / OB outputs for communicating with a RES1 network such as the internet network without being limited thereto.
- This network will be used in our example of communication realization during steps ET1, ET2, ET3, ET5, ET7, ET8 and ET9 which will be described below.
- the read-only memories include respective computer programs including instructions for executing process steps with reference to FIG.
- the CPUA processor of the first device DA is connected to a rendering module RST for the return of a digital code such as a bar code as will be explained below;
- the rendering module is a screen.
- the invention is not limited to this type of rendering module but to all other rendering means such as a transmitter of its ability to emit a signal representative of a code.
- the CPUB processor of the DB device is able to communicate with a processing module TRT connected to a CPT signal receiving module such as means of shooting; the receiving module is for example a camera.
- FIG. 1 illustrates an embodiment of the method of the invention. This mode comprises several steps referenced ETn.
- a step ETn implementing a data exchange is symbolized by an arrow having an origin and an end, the origin being associated with the sender of a message, the end being associated with the recipient of the message.
- the steps that do not implement a communication but an internal processing are referenced in the device concerned by the processing; these steps are steps ET4 and ET6.
- a particular user (who could also be a merchant) UTA wants to receive money from a particular UTB user.
- the user UTA requires from his bank BA, by sending an order, or from an intermediary of the bank, the creation of the so-called transaction data related to a transfer to achieve.
- the transaction data contain data that will later allow the bank's BA server to recognize the transfer, in case of receipt of a request for validation of a transfer.
- the transaction data therefore contain at least one NUM information identifying the transfer in progress.
- the data may comprise other information such as a URL (Uniform Resource Locator) address in the case where the issuer of the validation request does not know the address of the BA server. Note that, as above, this URL may be the address of the server BA or another server for example that of an intermediary of the bank.
- a URL is a universal naming format for a resource on the Internet.
- This address is an ASCII character string including useful information allowing software to access a resource on the network RES1 namely the Internet.
- the transaction data also includes an amount K € (K designating any value), a name designating the user UTA, the object OBJ of the transaction, optionally other information as a sponsor if it is is a gift, etc.
- the first server BA responds by providing the device DA transaction data DT (URL, NUM, K €, A, OBJ, DAT) including the address of URL type, a NUM transaction number, the amount K €, the name designating A, the object OBJ of the transaction, a date of expiry DAT of the transaction, date beyond which the transaction can not be realized.
- the device DA transaction data DT URL, NUM, K €, A, OBJ, DAT
- the set of transaction data DT are encoded by means of a barcode, designated by the expression "QR Code” in the remainder of the description.
- QR code Any QR code technology can be used, such as ISO / IEC 18004: 2006 compliant codes, Datamatrix codes, Aztec codes, or any other equivalent code.
- a bar code is the representation of a numeric or alphanumeric data in the form of a symbol consisting of bars and spaces whose thickness varies according to the symbology used and encoded data.
- the QR code is a type of two-dimensional bar code (or datamatrix matrix code) consisting of black modules arranged in a square with a white background. The arrangement of these points defines the information contained in the code.
- the first device DA makes the QR code available to the user UTB; this provision can be various, for example:
- the end of the representative arrow of the third step ET3 points to the set UTDB meaning that the provision is made indifferently for the second device DB or for the user UTB.
- This set may include other devices such as the computer referred to above with reference to the first example of provision described above.
- the received QR code is analyzed by the second device DB.
- the receipt of the QR code can be done in several ways, including by capture or by sending an email.
- the second DB device captures the image of the QR code.
- the second device DB may be for example a smartphone with a camera; the captured QR code is then analyzed.
- the QR code is received directly on the second DB device in step ET4; in this case, there is no actual graphic capture phase, but only a content analysis phase.
- the ability to analyze the content of a QR code can be basic in the second DB device or provided by a dedicated computer application installed in memory of the DB device.
- the application on the second device DB displays information about the current transaction. For example, are displayed the amount K € of the transaction, the name of the user UTA, the object OBJ of the transaction and possibly other information related to the transaction. This display allows the UTB user to be informed of the details of the current transaction. At this point, the UTB user can validate the displayed data. According to one variant, the method does not require validation at the second device DB.
- the second device DB connects to the server BB to request data called "token" (token in English) in this text.
- This TK token will allow the continuation of the realization of the transfer.
- This connection phase between the second device DB and the second server BB can be carried out by a request of the type http (English acronym of HyperText Transfer Protocol) or HTTPS (Anglo-Saxon name of HyperText Transfer Protocol Secure).
- http English acronym of HyperText Transfer Protocol
- HTTPS HTTPS (Anglo-Saxon name of HyperText Transfer Protocol Secure).
- the user UTB authenticates with the server BB.
- the authentication mode is arbitrary. A mode will be described in the following description without being limited to it.
- the second device DB transmits the transaction data DT contained in the QR code or only a part of this data.
- the set of transaction data DT are transmitted to the server BB accompanied for example by an identifier linked to the device DB, and therefore indirectly to the user UTB.
- the second server BB may require a personal code entry (example 4 digits) and / or a password by the second DB device.
- This additional security can be justified, for example, with regard to the amount K €, the beneficiary UTA or the object OBJ of the transaction displayed on the screen of the smartphone.
- the second server BB In a sixth step ET6, the second server BB generates a token TK and associates it with the transaction data DT in progress; the second server BB keeps this association (TK / DT) in memory.
- the created TK token is a unique reference created for the current transfer.
- this token TK or more generally the association created, has a lifetime limited in time.
- the second server BB returns the token
- TK to the DB device; preferably the sending of this token TK is secure; the HTTP (S) protocol can be used for this purpose.
- the second device DB then connects to the server BA through the URL encoded in the QR code. All or part of the DT transaction data contained in the QR Code is transmitted.
- the second device DB also transmits, simultaneously or independently in a separate message, the token TK. This connection phase is typically performed by an HTTP (or HTTPS) request.
- the URL is the address provided by the first server BA and that this URL may be the address of the server BA or that of another server for example that of an intermediary of the bank.
- the two servers BA and BB then communicate and interact to validate the transfer.
- the token TK and the transaction data DT are transmitted from the server BA to the server BB; allowing the server BB to verify that the token TK is the one that was emitted in step E7 and that the received association exists: for this the second server BB verifies that the transaction data DT associated with this token TK are correct , in particular that they conform to the values of the data DT validated by the user UTB on the second device DB during from step ET4 and received from the DB device during step ET6; for example the second server BB verifies in the transaction data DT, the name of the beneficiary A, the amount K € and the OBJ object of the transaction.
- the server BB also checks, in the case where a lifetime has been defined, if it has expired. If yes, the transfer is not validated. If not, the process continues.
- the transfer of money is validated.
- the first device DA can be notified; At this moment, if the object of the transaction is the sale of a good, the merchant may return the purchased object; if the object of the transaction is a donation, the second server BB can proceed to the donation.
- the security of the verification is based on the fact that the TK token is a single-use reference composed of a byte string and generated by the second BB server for the transaction. In our example, this token TK is known only from the server BB. In addition, if a malicious third party wanted to associate this TK token with other (wrong) transaction data when the ET8 step is raised, the verification by the second BB server in step ET9 would invalidate such fraud: the second server BB would indicate that the association does not match the association stored by the second server BB in step ET6.
- step ET8 remember that the second device DB connects to the BA server through the URL encoded in the QR code and that are transmitted all or part of DT transaction data contained in the QR Code.
- the transmission of all or part of the transaction data DT contained in the QR Code and the token TK can be made to the first server BA by means of a second QR code.
- the second QR code is a concatenation of all or part of the transaction data DT contained in the first QR Code and the TK token; this second code is generated for example by the second server BB and transmitted to the DB device; generated by the second DB device itself (also by concatenation of DT data and TK token), or any other device connected to the second DB device.
- the second device DB displays on its screen this second QR code which is read by a reader of QR codes, for example a reader installed on the first device DA of the user UTA; the first device DA then transfers this second QR code to the server BA.
- a reader of QR codes for example a reader installed on the first device DA of the user UTA
- the first device DA then transfers this second QR code to the server BA.
- the step of transmitting to the first entity of a transaction realization command is carried out indirectly; the command being received by the first device DA and then transmitted to the first server BA.
- the second server BB is a transaction server belonging to a telecommunication operator managing a plurality of subscriptions including the subscription of the device DB.
- a subscription subscribed with an operator allows the use of the telecommunication network managed by this operator.
- the operator upon receipt of the HTTP request received from the DB device via the network, identifies the concerned subscription linked to the device DB, or more precisely linked to a security module present in the second device DB such that a SIM card (acronym for Subscriber Identity Module).
- SIM card acronym for Subscriber Identity Module
- the second server BB is a transaction server that is not managed by a telecommunication operator.
- the HTTP (or HTTPS) request of the step ET5 is transmitted to a server of the telecommunication operator, capable of guaranteeing the identity of the user at the origin of the request.
- the HTTP (or HTTPS) request is then processed by the operator's server to add a parameter guaranteeing the origin of the request, typically by adding an element identifying the user UTB.
- This request thus completed (or put in a form other than HTTP) is then transmitted by the operator server to the second server BB.
- the authentication performed in step ET5 may be based on a particular use of the personal code or the password.
- a program installed in a memory of the DB device uses a cryptographic mechanism to encrypt the data to be transmitted to the second server BB.
- the program is for example an AES type encryption function operating with a 256-bit (or 128-bit) key.
- the AES encryption function uses a 256-bit intermediate key (or 128, we will choose 256 bits later) stored in the same encryption software. This intermediate key is known to the BB server who also knows the personal code of the client.
- This intermediate key is usually installed beforehand on the second DB device.
- This embodiment with encryption of the personal code comprises the following steps: Client B enters his personal code. The personal code is then combined with the intermediate key by the encryption function; the following mathematical operation is performed between the intermediate key and the personal code:
- the set including the QR Code master data and the client ID are encrypted by the AES encryption function in the second DB device with the encryption key.
- the whole thing is then sent to the server BB accompanied by the UTB client identifier.
- the second server BB finds the client's encryption key with the UTB client identifier. It decrypts the received encrypted data namely the set
- the second BB server If the decryption gives ⁇ [QR Code master data] + client ID ⁇ and the [QR Code master data] is understandable, the second BB server generates and sends the requested TK token to the DB device.
- This other mode provides additional security because, to validate the transaction at the BB server and obtain a TK token, it is necessary at the same time necessarily:
- the second device DB has the intermediate key in its software AES - know the personal code of the user UTB.
- module can correspond to a software component as well as a hardware component or a set of hardware and software components, a software component itself corresponding to one or more computer programs or subprograms. more generally, any element of a program capable of implementing a function or a set of functions as described for the modules concerned.
- a hardware component corresponds to any element of a hardware set (or hardware) able to implement a function or a set of functions for the module concerned (integrated circuit, smart card, memory card, etc.) -
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1650385A FR3046869A1 (en) | 2016-01-18 | 2016-01-18 | METHOD OF MAKING A BANK TRANSFER |
PCT/FR2017/050084 WO2017125666A1 (en) | 2016-01-18 | 2017-01-13 | Method for performing a bank transfer |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3405918A1 true EP3405918A1 (en) | 2018-11-28 |
Family
ID=55953206
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17706530.7A Ceased EP3405918A1 (en) | 2016-01-18 | 2017-01-13 | Method for performing a bank transfer |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3405918A1 (en) |
FR (1) | FR3046869A1 (en) |
WO (1) | WO2017125666A1 (en) |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014118589A1 (en) * | 2013-02-04 | 2014-08-07 | Scherr Petra | Method and system for performing a financial transaction |
-
2016
- 2016-01-18 FR FR1650385A patent/FR3046869A1/en active Pending
-
2017
- 2017-01-13 WO PCT/FR2017/050084 patent/WO2017125666A1/en active Application Filing
- 2017-01-13 EP EP17706530.7A patent/EP3405918A1/en not_active Ceased
Also Published As
Publication number | Publication date |
---|---|
WO2017125666A1 (en) | 2017-07-27 |
FR3046869A1 (en) | 2017-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10152229B2 (en) | Secure transaction interfaces | |
EP2619941B1 (en) | Method, server and system for authentication of a person | |
EP2567502A2 (en) | Method for authenticating a user requesting a transaction with a service provider | |
FR2820853A1 (en) | TELEPAYING METHOD AND SYSTEM | |
US20200184478A1 (en) | Secure transaction interfaces | |
EP2987124B1 (en) | Method and system for improving the security of electronic transactions | |
WO2016042253A1 (en) | Method for archiving data relative to a user | |
EP3252692A1 (en) | Method for supplying data relative to a payment transaction, device and corresponding program | |
US20220180364A1 (en) | Secure transaction interfaces | |
FR3083356A1 (en) | METHOD OF PERFORMING A TRANSACTION, TERMINAL, SERVER AND CORRESPONDING COMPUTER PROGRAM | |
EP2795947B1 (en) | Method for pairing electronic equipments | |
WO2017125666A1 (en) | Method for performing a bank transfer | |
EP3627419B1 (en) | Secure transaction using a mobile device | |
EP2824625B1 (en) | Method for conducting a transaction, corresponding terminal and computer program | |
EP2207150A1 (en) | Method for assisting the control of transaction records, corresponding transaction device, server, mobile terminal and computer programs | |
FR3064787B1 (en) | METHOD OF PROCESSING DATA WITH A PAYMENT TERMINAL, TERMINAL OF PAYMENT AND PROGRAM THEREOF | |
WO2020225292A1 (en) | Method for generating an archive code in order to create a fingerprint of a multimedia content | |
FR2922395A1 (en) | METHOD OF TRANSMITTING A CONFIDENTIAL CODE, CARD READER TERMINAL, MANAGEMENT SERVER AND CORRESPONDING COMPUTER PROGRAM PRODUCTS | |
FR2850772A1 (en) | Electronic transaction securing device for use in electronic commerce, has analyzing unit to retransmit intercepted signals to processing unit without modification if they are not in order of passage in secured mode | |
EP4099249A1 (en) | Method and device for transmitting an identifier of a user during an electronic payment made by the user | |
WO2021053300A1 (en) | Method for transmitting a complementary information relating to a financial transaction | |
FR3028993A1 (en) | METHOD AND SYSTEM FOR CONTROLLING COUPONS | |
FR3036827A1 (en) | DEVICE AND METHOD FOR SECURING ACCESS TO A MERCHANT SITE | |
FR2976385A1 (en) | Method for defining transaction to be carried out to purchase product in shop, involves obtaining transaction objective specification by server via one of three communications, where second communication includes reference to specification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20180704 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20190719 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20210506 |