EP3791367A1 - Verfahren zur herstellung für das menschliche auge nicht sichtbarer und nicht kopierbarer sicherheitselemente in einer abbildung sowie gedruckte abbildung - Google Patents
Verfahren zur herstellung für das menschliche auge nicht sichtbarer und nicht kopierbarer sicherheitselemente in einer abbildung sowie gedruckte abbildungInfo
- Publication number
- EP3791367A1 EP3791367A1 EP19749177.2A EP19749177A EP3791367A1 EP 3791367 A1 EP3791367 A1 EP 3791367A1 EP 19749177 A EP19749177 A EP 19749177A EP 3791367 A1 EP3791367 A1 EP 3791367A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- printing
- color
- serial number
- image
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/80—Recognising image objects characterised by unique random patterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
- G07D7/0047—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K15/00—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
- G06K15/02—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers using printers
- G06K15/18—Conditioning data for presenting it to the physical printing elements
- G06K15/1835—Transforming generic data
- G06K15/1836—Rasterization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K15/00—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
- G06K15/02—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers using printers
- G06K15/18—Conditioning data for presenting it to the physical printing elements
- G06K15/1867—Post-processing of the composed and rasterized print image
- G06K15/1872—Image enhancement
- G06K15/1881—Halftoning
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/005—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/005—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
- G07D7/0054—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties
- G07D7/0055—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties involving markings displaced slightly from original positions within a pattern
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/2008—Testing patterns thereon using pre-processing, e.g. de-blurring, averaging, normalisation or rotation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/2033—Matching unique patterns, i.e. patterns that are unique to each individual paper
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00838—Preventing unauthorised reproduction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00838—Preventing unauthorised reproduction
- H04N1/00856—Preventive measures
- H04N1/00864—Modifying the reproduction, e.g. outputting a modified copy of a scanned original
- H04N1/00867—Modifying the reproduction, e.g. outputting a modified copy of a scanned original with additional data, e.g. by adding a warning message
- H04N1/0087—Modifying the reproduction, e.g. outputting a modified copy of a scanned original with additional data, e.g. by adding a warning message with hidden additional data, e.g. data invisible to the human eye
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32203—Spatial or amplitude domain methods
- H04N1/32251—Spatial or amplitude domain methods in multilevel data, e.g. greyscale or continuous tone data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32203—Spatial or amplitude domain methods
- H04N1/32256—Spatial or amplitude domain methods in halftone data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32352—Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/95—Pattern authentication; Markers therefor; Forgery detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3235—Checking or certification of the authentication information, e.g. by comparison with data stored independently
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/328—Processing of the additional information
- H04N2201/3281—Encryption; Ciphering
Definitions
- the invention relates to a method for producing security elements that are invisible to the human eye and cannot be copied, in a binding and printed image according to the preamble of the first and eleventh claims ,
- Markings can be introduced into textile or leather products. These invisible markings are firmly combined with the product and remain there for the entire product life.
- amorphous ferromagnetic fibers are used, which are implemented in the respective article in terms of textile technology.
- a disadvantage of this solution is possible imitation through an identical incorporation of appropriate materials into such textiles or products.
- the metrological proof of authenticity is very complex, complex and therefore not very economical.
- the marker substance either mixed into the product or with the Product is connected.
- the measurement of the ferromagnetic substance is then carried out by means of a special scanner and a statement about the authenticity of the product is made on the basis of the measurement results.
- Marker substances and the application of the substances at different locations can be created using a marking code.
- This code can then be used to save further information on product or production process parameters.
- the disadvantage of this method is the high cost of encrypting the information and affixing the code to the products. Also the respective
- Coding points to be known when decoding the code and suitable measuring and scanning devices must be available especially for this application.
- the publication WO 03/007252 A1 describes a method in which a unique random code is used to prove the originality.
- This code is applied to the product or the corresponding packaging and stored in a central database.
- This central database is accessible via the Internet and the customer can enter the corresponding code in an online mask after purchasing a product and thus inquire about the authenticity of the product. If the code entered is not in the database, it is a forgery. If the code exists in the database and the code has already been queried before, it cannot be clearly demonstrated which product is the original and whether the product may have been queried twice. Counterfeiting of the product including the code cannot be ruled out.
- Document DE 10 2013 019 675 B3 discloses a more cost-effective solution for implementing copy protection.
- This document relates to a method for recording and reproducing information which is applied to the surface of information carriers of the advertising and / or information media by means of display elements.
- the object of the invention is to enable digital communication by means of data elements on information carriers.
- display elements of an overall textual and / or visual representation are captured by means of a scanner and an encrypted connection code is decoded.
- This connection code is used to access a database and compare the identical physical information present with the identical information in a database.
- the disadvantage of this solution is that by copying the physical information and attaching it to a plagiarism, it is recognized as the original.
- DE 10 2015 009 123 A1 publishes a method for checking the authenticity of the
- a design surface with an individual security code and a brand is applied to the product.
- the individual security code can be decoded using a scanner.
- a data connection to a database is then established.
- the brand and code information is compared in the database and a query code based on a mathematical formula is transmitted to the scanning device.
- An original product is only available if the brand, code and query code match. So that no counterfeit can be generated, the query code is renewed with every query, so that only the scan device that made the last query knows the current query code.
- the disadvantage of this solution is that the query code must be transmitted separately from the original product. If the query code is lost, the originality of the product can no longer be verified.
- the publication DE 10 2015 006 008 A1 relates to an invention of a method for checking the authenticity of security features on printed and 3D objects of value such as checks, vouchers and certificates.
- the security of the detection of forgeries should be significantly increased over the property rights known from the prior art.
- in the first step it is recognized which value object it is and it is defined where the security features are attached to this value object.
- the two- and three-dimensional security features on the object are then captured by means of a camera.
- the determined values are then sent to a comparison station.
- the comparison of the recognized features with the stored features takes place in the comparison station.
- the comparison result is then sent back to the scanning device and a statement is made about the authenticity of the object.
- It is essential here that the transmission of the data is encrypted using a hash function and at least one 3D security feature must be attached to the value object. The procedure of this
- the procedure is planned in several steps:
- edges of the value object are captured using the auto focus function.
- the optical elements within the edges (boundary surfaces) of the object of value are then recorded and recorded in two dimensions. Then be the display elements with given areas and patterns
- the increase in security according to this document is based on a code which is produced by means of a coding device and is additionally used on the object of value.
- This code is e.g. B. the serial number of the value object.
- the code is transmitted between the scanning device and the comparison station by means of a further coding based on a hash function, so that the code cannot be calculated back.
- the comparison station the value also stored there by means of the identical hash function is then compared with the scanned value and the hash value.
- WO 2017 / 137155A1 describes a method for verifying one with a
- the security element being produced in a multi-step process with register fluctuations.
- Register fluctuations use a superposition of at least two dot or line grids.
- the resulting Moriee grids are used to determine a test value which is compared with a reference value for verification.
- Several printing methods are preferably used and check digits are stored in selected areas.
- the focus is on the creation of Moriee structures, which can be optically read out.
- the raster manipulation is realized by fluctuations in the register on the printing press and are inevitable due to the use of different printing methods proposed here and serve as a kind of fingerprint for the
- the banknote to be verified is verified by means of a mobile computer device and a
- the app then establishes a connection to a database and transfers the serial number and the test value to the database.
- the test value and serial number are compared in the database and the result of the The check is sent back to the app, which accordingly shows the result of the authenticity check.
- it is proposed to further secure the system by applying an additional barcode.
- Document DE 10 2008 034 022 A1 describes a method for producing security elements that are invisible to the human eye and cannot be copied in an image, in particular for checking the authenticity of images, the image being imaged by means of a printing screen.
- defined and predetermined patterns are to be generated by targeted modification of the luminescence in partial areas of the marking layer, which eliminates the need to determine a previously generated pattern for the purpose of
- Determination of the correlated string is omitted.
- the change in the partial areas of the marking layer when illuminated with visible light and in daylight intensity should not be perceptible to the human eye, but should only be determined with the aid of technical aids, such as magnifying glasses, detectors, etc.
- a laser sweeps in a predetermined way through the shown and
- predetermined path of the laser beam in turn predetermined partial areas, with local pyrolysis taking place in the partial areas due to the strong absorption of the laser radiation in the laser-sensitive pigment and its immediate surroundings (diameter up to 10 pm around the center of a laser-sensitive pigment). This will make the
- Permittivity in the immediate vicinity of a laser-sensitive pigment reduces, with the result that an electroluminophore in this environment with the electrical alternating field of the same frequency and intensity is no longer used
- Luminescence can be excited.
- the partial areas show a reduced electroluminescence compared to the other areas.
- the pyrolysis is locally limited due to the control of the laser, as described, so that the pyrolyzed areas are practically imperceptible in normal daylight and with the human eye without technical aids.
- Document DE 10 2013 107 951A1 describes a method for checking the authenticity of a document using at least one additional piece of information, the document having an information feature which indicates the additional information.
- An image of the document is captured, the information feature is captured in the captured image, the additional information is determined on the basis of the captured information attribute and the captured image is displayed together with the additional information in order to check the authenticity of the document.
- the object of the invention is to develop a method for the production of security elements that are invisible to the human eye and cannot be copied in an image, as well as methods for verifying the authenticity of products based on the comparison of unequal information and printed image, which provide a reliable statement about the authenticity of a Product guaranteed.
- Illustration is the illustration by means of a printing grid, whereby the
- Print screen consists of individual pixels, and according to the invention in the
- Mapping / the printing grid at least one field is defined, by manipulating pixels in the field and / or by manipulating the entire field, non-copyable, encrypted information for comparison with at least one database is stored and by means of contours introduced into the printing grid
- Serial number is shown, with each contour a position of the serial number is assigned and the serial number can be represented in any number system.
- the illustration can be in the form of a company logo or a supplementary illustration.
- the invention therefore relates to a system for the authentication of objects, both the verification method and associated computer products for
- the invention represents an authentication method which
- Multi-step process is that by varying the screening of full and
- Halftone areas in previously defined areas are optically encoded in an image, at least a binary serial number.
- the image is printed using duplex, four or multi-color printing respectively
- individual layers and / or partial areas in the form of fields can have a different structure, orientation or shape have, by means of which information is stored for comparison with a database.
- a graphic present as an RGB file or in another color space is preferably ripped to 4 colors (C - cyan, M - magenta,
- detection can be demonstrated using digital cameras (either directly or indirectly by changing the intensity in the RGB channels).
- special colors, lacquers, luminescent colors or electromagnetically reactive colors are available as substitutes or as supplements
- Color component applicable the maximum number is not limited.
- areas for the optical attachment of a random or any serial number are defined in a second step.
- the contour and size of the areas is completely free and can consist of circles and / or triangles, rectangles, trapezoids, squares, a wide variety of polygons or free-form surfaces.
- Each area stands for one digit of the serial number. Which area stands for which position of the serial number is shown in previously defined areas and the part of the serial number shown there.
- at least one defined area is determined by means of the parameters grid change and / or contour, in which order the individual digits of the serial number are brought together and with which hash function the encryption takes place.
- Preferred variant is binary, i.e. the areas can assume two states:
- Grid within a field is identical to grid outside a field or the area within the field and outside differ.
- One of these states is defined in the binary procedure with a 0 (false), a state with a 1 (true). in the In a preferred case, the screen angle of two of the four colors (CMYK) is partially exchanged.
- CYK screen angle of two of the four colors
- Hexadecimal code Possible variants and / or combinations for changing the grid are:
- the modified graphics are printed using a printing process such as inkjet, laser, offset, gravure printing, flexographic printing, screen printing or the like or
- the printing material can be selected as desired and ranges from paper to plastics to other natural materials such as Wood, stone or artificially produced substrates.
- the shape of the printing material is also freely selectable and ranges from thread-like structures such as yarns to 2D stubborns such as paper and foils to 3D structures such as parts and components.
- Color combinations are sent to the printing device in other processes, but the manipulated CMYK data (in the preferred case with partially exchanged K and M grids) or correspondingly otherwise manipulated data sets in different color spaces with further color combinations.
- step 5 the at least binary
- Serial number transformed using a hash function was determined in step 2 and is part of the serial number.
- the at least one binary serial number and the transformed information (hash value) are then stored in at least one database and assigned to a container with a further serial number and further product data (brand, name, production location, production time, size, color, text length, etc.) ) added.
- step 6 the container is filled.
- step 5 is carried out at least once. Preferably, however, significantly more often, for example, in the range from 4k to 20k, there being no maximum number.
- the container itself is encrypted or transformed in step 7.
- the so-called Merkle tree method is used here, which means that two hash values of a serial number with a defined hash function are always transformed to a new hash value and thus combined.
- the resulting new hash value is stored in the database and two hash values of serial numbers that have already been combined are then transformed again with a hash function (identical or changed). This step is repeated until a single hash value is available for the entire container.
- the encryption path and the hash functions used are also stored in the database and a so-called Merkle path of the container is created.
- this final hash value of the container becomes at least one
- Blockchain (preferably a public blockchain) written. This step completes the unalterable storage of the container hash value and every person can read out publicly which hash values of the container exist. Since the hash functions represent asymmetrical encryption and thus a transformation, it is not possible to use the publicly available container hash values to refer to the summarized hash values of the Merkle tree or to the hash values of the serial numbers or the respective serial numbers to close.
- Security feature recorded with a mobile device, such as a cell phone, camera, tablet, SmartWatch or the like, and processed further in a step 9 in terms of data technology.
- a mobile device such as a cell phone, camera, tablet, SmartWatch or the like
- the preferred variant uses a mobile phone on which a special application (software) is installed or has been integrated in the firmware of the mobile phone.
- the app is opened or the camera function is started with the integrated app and the security element is recorded in the form of a security feature. If the camera is active in standby mode with an integrated app, it is sufficient if the camera automatically detects the presence of a security feature.
- the RGB recording is processed further in terms of data technology in step 9a, that is to say a combination of color filters and transformations, such as Fourier transformations, is used to determine the information content for each individual field of the security feature. In the binary case, this is 0 or 1 or true and false.
- step 9b the first part of the serial number, which describes the structure of the serial number and the hash function used to transmit the serial number to the database, is determined in the provided at least one field.
- serial number is then assembled in step 9c in accordance with step 9b and encrypted in step 9d with the corresponding hash function.
- step 9e the transformed serial number is sent to the database and the Merkle path stored for this hash value is determined in accordance with step 9f.
- the database consists either of a server that can be reached via the Internet or of a combination of several servers or self-sufficient nodes (nodes).
- the associated container hash is determined in a step 9g using the Merkle tree method.
- step 9h the comparison is carried out with at least one blockchain, and it is checked whether the determined container hash is present there.
- step 9h case 1 If the container hash is not present, the product is forged and a corresponding error message is transmitted to the mobile device, which outputs this optically and / or acoustically (step 9h case 1).
- the container hash is contained in the blockchain, the information: “Product is real” is transmitted to the mobile device and this is output optically and / or acoustically.
- step 9h case 2 further product parameters such as production date, production location, size, color etc. are additionally read from the database and transmitted to the mobile device as additional information (step 9h case 2).
- the customer can now visually compare the product. If the data transmitted from the database does not match the product at hand, then there is a 2nd order counterfeit. The customer can report this via the application on the mobile device (step 9h case 3).
- the time and geodesics are also transmitted to the database and stored.
- Software is used to check in the background whether it is theoretically possible that the data associated with a product can be real. For example, if a product is scanned in Hamburg at 11:35 a.m. at 9:35 a.m. and 4 minutes later in Los Angeles, there is a 100% probability of a 3rd order counterfeit. This is also transmitted to the user and displayed optically and / or acoustically (step 9h case 4).
- the customer has the option of following the detection in a 10th step of the product in its entirety take pictures and enter them into a database using the mobile application. Appropriate further processing then takes place on the basis of this data.
- the number of screen dots in the areas of the variation is identical to the other areas.
- the subtractive color mixing in the CMYK color space in combination with the max. Dissolution of the human eye means that the exchange of the grid is not recognized.
- CMYK data are scanned or otherwise digitized and transformed into the RGB color space.
- Filter applications and transformation-based decoding processes can no longer recognize the serial number.
- the reason for not recognizing is the presence of other information in the security-relevant areas.
- a random number is generated. This random number is preferably binary, but can also be of a different type.
- BSP 010010 and represents the serial number (1).
- the serial number (1) is written into a database 1 (DB1) and combined there with further product and / or production process data or there is a link to a manufacturer database via an API or other interfaces.
- serial number (1) is transformed into a hash value (2) using a hash function A.1.
- BSP from 010010 2FX3D arises.
- DB1 stores that serial number (1) was transformed with A.1 (if only one hash is used in the entire system, this information can also be omitted)
- a container with a random ID (3) is created.
- BSP 011001.
- DB1 checks whether the ID already exists, if so, a new number is generated.
- the container with the random ID (3) is filled with hashed product codes 2FX3D, etc.
- DB1 also checks whether it already exists. If so, then create a new serial number (1) and check again whether serial number (1) exists in DB1.
- a hash function A.2 is applied to the entire container (3) or two hash values of the serial numbers are combined to a further hash value by means of a hash function until a final container hash (4) BSP: X3YAO emerges. This ID (4) is written in a blockchain.
- the Merkle path created during the transformation using the Merkle tree method is stored in DB1.
- serial number (1) is applied to a product and read in using the scan app.
- BSP 010010
- serial number is converted in the app using a recognized hash function.
- the associated Merkle path is retrieved from DB1 and the container hash X3YAO is determined using the hash value of the serial number (1) 2FX3D and Merkle path.
- the serial number (1) 2FX3D is part of the original container and is genuine.
- steps 8a to 10a can follow step 7:
- DB1 checks whether there is a container hash in the blockchain
- Sequence for the coding a) Screening of a graphic in the RGB color space (or another color space) in a hardware or software raster image process (RIP) process in a CMYK raster or in another of more or less colors
- the database DB1 is at least one database, at least one cloud and / or at least one blockchain in which the relevant information is stored completely, split and / or encrypted or open.
- the information in DB1 can also represent links to other databases, clouds, blockchains from which information can be obtained via APIs or other interfaces.
- the invention is based on an embodiment and associated
- FIG. 1 shows a schematic illustration of an illustration
- FIG. 2 rotated screen angle in the color black
- Figure 3 rotated screen angle in the color magenta.
- FIG. 1 shows a schematic illustration A with a dot matrix 1.
- lines arranged in parallel in the display were used as print screens.
- the print screen consists of pixels that
- the figure has 5 fields F1 to F5, each field F1 to F5 having any geometric shape or free form.
- Fields F1 to F5 can be used to display information in Figure A, whereby the human eye cannot see any differences and does not perceive any fields in Figure A.
- the fields F1, F3, F4 and F5 have a different orientation of the print screen compared to the illustration A.
- the field F2 shows the same orientation of the
- Print screen like the print screen of illustration A.
- a representation can be generated in binary fashion from the orientation of the image points such that a 1 or a 0 can be generated if the image points of the field F deviate from the illustration A, depending on the previous definition.
- a deviation generates a 1
- the field F2 generates a 0
- the fields F 1, F3, F4 and F5 generate a 1, which means that a serial number can be represented in binary form.
- the fields F3 and F4 can be conditioned by the other
- a preferred case is the use of 4 colors CMYK and representation of the
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
- Printing Methods (AREA)
- Life Sciences & Earth Sciences (AREA)
- Animal Behavior & Ethology (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102018115146.2A DE102018115146A1 (de) | 2018-06-24 | 2018-06-24 | Verfahren zur Herstellung für das menschliche Auge nicht sichtbarer und nicht kopierbarer Sicherheitselemente in einer Abbildung sowie Verfahren zum Authentizitätsnachweis von Produkten auf Basis des Abgleichs von ungleichen Informationen sowie gedruckte Abbildung |
PCT/DE2019/100575 WO2020001695A1 (de) | 2018-06-24 | 2019-06-22 | Verfahren zur herstellung für das menschliche auge nicht sichtbarer und nicht kopierbarer sicherheitselemente in einer abbildung sowie gedruckte abbildung |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3791367A1 true EP3791367A1 (de) | 2021-03-17 |
Family
ID=67539171
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19749177.2A Withdrawn EP3791367A1 (de) | 2018-06-24 | 2019-06-22 | Verfahren zur herstellung für das menschliche auge nicht sichtbarer und nicht kopierbarer sicherheitselemente in einer abbildung sowie gedruckte abbildung |
EP19749178.0A Withdrawn EP3791368A1 (de) | 2018-06-24 | 2019-06-22 | Verfahren zum authentizitätsnachweis von produkten sowie gedruckte abbildung |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19749178.0A Withdrawn EP3791368A1 (de) | 2018-06-24 | 2019-06-22 | Verfahren zum authentizitätsnachweis von produkten sowie gedruckte abbildung |
Country Status (5)
Country | Link |
---|---|
US (2) | US11587339B2 (de) |
EP (2) | EP3791367A1 (de) |
CN (2) | CN112313716B (de) |
DE (1) | DE102018115146A1 (de) |
WO (2) | WO2020001696A1 (de) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11724533B2 (en) | 2018-04-06 | 2023-08-15 | Esko-Graphics Imaging Gmbh | System and process for persistent marking of flexo plates and plates marked therewith |
EP3776079B1 (de) | 2018-04-06 | 2023-06-07 | Esko-Graphics Imaging GmbH | Verfahren zur dauerhaften markierung von flexoplatten mit arbeitsflussinformationen und damit markierte platten |
DE102018115146A1 (de) * | 2018-06-24 | 2019-12-24 | Industry365 Ug (Haftungsbeschränkt) | Verfahren zur Herstellung für das menschliche Auge nicht sichtbarer und nicht kopierbarer Sicherheitselemente in einer Abbildung sowie Verfahren zum Authentizitätsnachweis von Produkten auf Basis des Abgleichs von ungleichen Informationen sowie gedruckte Abbildung |
FR3085304B1 (fr) | 2018-08-31 | 2021-01-08 | D Uniflexo | Forme imprimante photosensible pour un procede d’impression flexographique comprenant des informations visibles et non imprimables, procede de preparation d’une telle forme imprimante |
EP3660770A1 (de) * | 2018-11-30 | 2020-06-03 | Mastercard International Incorporated | Verfahren und systeme zur sicheren produktnachverfolgungsdatenspeicherung und -verifizierung |
CN114730141B (zh) | 2019-10-07 | 2023-09-15 | 埃斯科绘图成像有限责任公司 | 用于柔印版的持久标记的系统和方法以及利用其标记的版 |
WO2022101355A1 (de) | 2020-11-12 | 2022-05-19 | U-Nica Systems Ag | Verfahren zum drucken und erkennen von authentifizierungskennzeichen mit einem amplitudenmodulierten rasterdruck |
Family Cites Families (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6104812A (en) * | 1998-01-12 | 2000-08-15 | Juratrade, Limited | Anti-counterfeiting method and apparatus using digital screening |
US7394573B1 (en) * | 1999-04-14 | 2008-07-01 | Xerox Corporation | System for authenticating hardcopy documents |
FR2805618B1 (fr) | 2000-02-29 | 2002-04-12 | Commissariat Energie Atomique | Systeme d'authentification d'articles manufactures munis de marquages magnetiques, et procede de marquage de tels articles |
US6760464B2 (en) * | 2000-10-11 | 2004-07-06 | Digimarc Corporation | Halftone watermarking and related applications |
DE10118679A1 (de) | 2001-04-14 | 2002-10-24 | Henkel Kgaa | Identifizierungs- oder Authentifizierungsverfahren |
NO314372B1 (no) | 2001-06-20 | 2003-03-10 | Kezzler As | Fremgangsmåte for frembringelse og senere benyttelse av autentiseringsinformasjon |
US20030197878A1 (en) * | 2002-04-17 | 2003-10-23 | Eric Metois | Data encoding and workpiece authentication using halftone information |
US7751608B2 (en) * | 2004-06-30 | 2010-07-06 | Ecole Polytechnique Federale De Lausanne (Epfl) | Model-based synthesis of band moire images for authenticating security documents and valuable products |
DE10328328B4 (de) * | 2003-06-25 | 2015-06-03 | TÜV Rheinland Holding AG | Produktschutz-Portal und Verfahren zur Echtheitsprüfung von Produkten |
DE10334336A1 (de) | 2003-07-28 | 2005-02-24 | Irwin Industrial Tools Gmbh | Schraubzwinge |
DE102005008135A1 (de) * | 2005-02-21 | 2006-08-31 | Giesecke & Devrient Gmbh | Datenträger mit Halbtonbild |
DE102008034022A1 (de) * | 2008-07-16 | 2010-01-21 | Merck Patent Gmbh | Verfahren zur Herstellung eines Sicherheits- und/oder Wertprodukts mit Teilbereichen mit unterschiedlicher Lumineszenzemission |
CN101537751B (zh) * | 2009-04-10 | 2015-03-18 | 顾泽苍 | 一种防伪印刷的处理方法 |
KR101114542B1 (ko) * | 2009-10-28 | 2012-02-27 | (주)이컴앤드시스템 | 유가증권 진위 판단 방법, 장치 및 그 기록 매체 |
JP2011103023A (ja) * | 2009-11-10 | 2011-05-26 | B-Core Inc | 色彩配列コードの読み取り方法及び読み取り装置 |
CN101727593B (zh) * | 2009-11-20 | 2014-07-23 | 天津市阿波罗信息技术有限公司 | 一种数字化纸卡的处理方法 |
CN102407703A (zh) | 2010-09-25 | 2012-04-11 | 天津市阿波罗信息技术有限公司 | 又一种数字化防伪印刷的处理方法 |
MX2013004043A (es) * | 2010-10-11 | 2013-10-03 | Graphic Security Systems Corp | Metodo para construir una imagen compuesta incorporando una imagen de autenticacion oculta. |
JP5391369B1 (ja) * | 2010-11-08 | 2014-01-15 | ウー‐ニカ テクノロギー アーゲー | 顔料が付された基板にuvレーザーを照射することでカラー画像を生成する方法及び装置並びにそれらにより生成される生成物。 |
JP5721101B2 (ja) * | 2011-04-21 | 2015-05-20 | 独立行政法人 国立印刷局 | 網点印刷物及びその作製方法 |
JP5678364B2 (ja) * | 2011-09-22 | 2015-03-04 | 独立行政法人 国立印刷局 | 真偽判別可能な印刷物、その作製装置及びその作製方法並びに真偽判別可能な印刷物の認証装置及びその認証方法 |
DE102011120848B3 (de) * | 2011-12-09 | 2013-05-23 | Giesecke & Devrient Gmbh | Sicherheitselement für Wertgegenstände, Verfahren zur Herstellung eines Sicherheitselements für Wertgegenstände und tragbarer Datenträger mit einem Sicherheitselement. |
WO2013119233A1 (en) * | 2012-02-09 | 2013-08-15 | Hewlett-Packard Development Company, L.P. | Forensic verification utilizing halftone boundaries |
HUP1200097A2 (hu) | 2012-02-15 | 2013-08-28 | Glenisys Kft | Biztonsági elem és eljárás nyomat eredetiség ellenõrzésére |
US8824733B2 (en) * | 2012-03-26 | 2014-09-02 | Tk Holdings Inc. | Range-cued object segmentation system and method |
US20130314468A1 (en) | 2012-05-22 | 2013-11-28 | Juan Manuel Jimenez | Detecting media type using carriage-coupled sensor |
JP5344328B1 (ja) * | 2012-10-01 | 2013-11-20 | 健治 吉田 | ドットパターン、ドットパターン形成媒体、ドットパターンの画像データを生成するプログラム、ドットパターン形成装置、光学装置、光学読み取り装置、情報入出力装置、ドットパターン読み取り装置 |
DE102013019675B3 (de) | 2013-05-29 | 2014-11-27 | Wolfgang Beyer | System und Verfahren zur abrufbaren Speicherung, Erfassung und Wiedergabe von Informationen der Werbe- und Informationsmedien |
DE102013107951A1 (de) * | 2013-07-25 | 2015-01-29 | Bundesdruckerei Gmbh | Verfahren zur Überprüfung der Echtheit eines Dokumentes |
JP5822411B2 (ja) * | 2013-08-12 | 2015-11-24 | 株式会社アポロジャパン | 画像情報のコード変換装置、画像情報のコード変換方法、画像コードを用いた画像関連情報提供システム、画像情報のコード変換プログラム、及びそのプログラムを記録した記録媒体 |
CN105190663A (zh) * | 2014-02-04 | 2015-12-23 | M·科伦 | 用于验证商品的系统 |
CN103997591A (zh) * | 2014-05-09 | 2014-08-20 | 佛山市绿之彩印刷有限公司 | 一种隐形编码图形及其处理方法和防伪应用 |
CN106156821A (zh) * | 2015-03-24 | 2016-11-23 | 天津市阿波罗信息技术有限公司 | 一种光学可读性条码防伪结构及实现方法 |
US10699507B2 (en) * | 2015-04-09 | 2020-06-30 | Filigrade B.V. | Method of verifying an authenticity of a printed item and data processing terminal |
DE102015006008A1 (de) | 2015-05-13 | 2016-11-17 | Wolfgang Beyer | Verfahren zur Kontrolle der Echtheit von Sicherheitsmerkmalen an Wertobjekten |
EA031834B1 (ru) * | 2015-07-01 | 2019-02-28 | Дмитрий Маринкин | Способ идентификации подлинности изделия, содержащего защитную маркировку на своей поверхности |
DE102015009123B4 (de) | 2015-07-20 | 2023-11-30 | SparrowView GmbH | Verfahren zur Echtheitskontrolle der Herkunftskennzeichnung und der Haltbarkeitsangaben von Produkten |
CN106886811A (zh) * | 2015-12-10 | 2017-06-23 | 顾泽苍 | 一种手机商品防伪标识的构成方法与识读方法 |
DE102016001464A1 (de) | 2016-02-09 | 2017-08-10 | Giesecke & Devrient Gmbh | Verifikation eines mit einem Sicherheitselement versehenen Gegenstands |
CN106407795B (zh) * | 2016-09-05 | 2019-05-14 | 北京众享比特科技有限公司 | 数据存在认证系统、认证方法及验证方法 |
CN106372533B (zh) * | 2016-09-14 | 2020-04-21 | 中国银联股份有限公司 | 基于区块链技术的内容存储方法 |
CN106570710A (zh) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | 一种商品防伪方法及装置 |
US10417409B2 (en) * | 2017-03-21 | 2019-09-17 | Hid Global Corp. | Securing credentials with optical security features formed by quasi-random optical characteristics of credential substrates |
CN107798372B (zh) * | 2017-11-24 | 2021-05-11 | 深圳市裕同包装科技股份有限公司 | 产品信息点阵图像的编码方法、解码方法及解码系统 |
US10261846B1 (en) * | 2018-02-09 | 2019-04-16 | Banjo, Inc. | Storing and verifying the integrity of event related data |
DE102018115146A1 (de) * | 2018-06-24 | 2019-12-24 | Industry365 Ug (Haftungsbeschränkt) | Verfahren zur Herstellung für das menschliche Auge nicht sichtbarer und nicht kopierbarer Sicherheitselemente in einer Abbildung sowie Verfahren zum Authentizitätsnachweis von Produkten auf Basis des Abgleichs von ungleichen Informationen sowie gedruckte Abbildung |
-
2018
- 2018-06-24 DE DE102018115146.2A patent/DE102018115146A1/de active Pending
-
2019
- 2019-06-22 EP EP19749177.2A patent/EP3791367A1/de not_active Withdrawn
- 2019-06-22 US US16/973,072 patent/US11587339B2/en active Active
- 2019-06-22 WO PCT/DE2019/100576 patent/WO2020001696A1/de unknown
- 2019-06-22 CN CN201980042323.8A patent/CN112313716B/zh active Active
- 2019-06-22 WO PCT/DE2019/100575 patent/WO2020001695A1/de unknown
- 2019-06-22 EP EP19749178.0A patent/EP3791368A1/de not_active Withdrawn
- 2019-06-22 US US16/973,071 patent/US11715309B2/en active Active
- 2019-06-22 CN CN201980041941.0A patent/CN112292716A/zh active Pending
Also Published As
Publication number | Publication date |
---|---|
CN112313716A (zh) | 2021-02-02 |
WO2020001696A1 (de) | 2020-01-02 |
CN112313716B (zh) | 2023-05-26 |
US20210248369A1 (en) | 2021-08-12 |
WO2020001695A1 (de) | 2020-01-02 |
US11715309B2 (en) | 2023-08-01 |
EP3791368A1 (de) | 2021-03-17 |
DE102018115146A1 (de) | 2019-12-24 |
WO2020001695A4 (de) | 2020-02-20 |
US11587339B2 (en) | 2023-02-21 |
CN112292716A (zh) | 2021-01-29 |
US20210245542A1 (en) | 2021-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3791367A1 (de) | Verfahren zur herstellung für das menschliche auge nicht sichtbarer und nicht kopierbarer sicherheitselemente in einer abbildung sowie gedruckte abbildung | |
DE60018222T2 (de) | Optisches Wasserzeichen | |
EP2984814B1 (de) | Erzeugung und erkennung von fälschungssicher druckbaren bildinformationsdaten | |
WO2003052701A2 (de) | Verfahren zur authentizitätssicherung von dokumenten | |
EP2465078A1 (de) | Sichere kennzeichnung eines produkts | |
EP3414102A1 (de) | Verifikation eines mit einem sicherheitselement versehenen gegenstands | |
DE102017206466A1 (de) | Sicherheitsmerkmal mit Kopierschutz | |
WO1999049420A1 (de) | Verfahren zur fälschungssicherung von dokumenten mit einem bild, vorzugsweise mit einem passbild | |
DE102009008779A1 (de) | Verfahren zum Überprüfen der Echtheit eines Druckproduktes | |
DE112005000983T5 (de) | Verfahren und System zum Bilden einer Entschlüsselungseinrichtung | |
WO2017137155A1 (de) | Verifikation eines mit einem sicherheitselement versehenen gegenstands | |
EP4215377A2 (de) | Prüfung eines sicherheitsdokuments auf basis von tröpfchenmorphologien | |
EP3185221B1 (de) | Authentifikationsvorrichtung und verfahren zur optischen oder akustischen zeichenerkennung | |
DE102020131420A1 (de) | Farbseparation zur Absicherung der Dokumenten-Personalisierung | |
DE102021115558A1 (de) | Verfahren zur Bestimmung der Originalität und Typisierung eines Produktes | |
EP3356980B1 (de) | Verfahren und vorrichtung zur authentifikation eines objekts oder einer person über ein modulartig aufgebautes sicherheitselement | |
EP3548300B1 (de) | Verfahren zum herstellen und zum prüfen eines sicherheitsdokuments und sicherheitsdokument | |
EP3308348B1 (de) | Verfahren zum erzeugen eines sicherheitselements mit versteckt codierter information in einer grafischen abbildung, sicherheitselement und verfahren zum verifizieren | |
DE102016001449A1 (de) | Verifikation eines mit einem Sicherheitselement versehenen Gegenstands | |
WO2022029321A1 (de) | Erzeugung von dokumentenvorlagen mit sicherheitsmerkmalen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20201207 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20221116 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20221215 |