EP3791368A1 - Procédé pour prouver l'authenticité de produits et représentation imprimée - Google Patents

Procédé pour prouver l'authenticité de produits et représentation imprimée

Info

Publication number
EP3791368A1
EP3791368A1 EP19749178.0A EP19749178A EP3791368A1 EP 3791368 A1 EP3791368 A1 EP 3791368A1 EP 19749178 A EP19749178 A EP 19749178A EP 3791368 A1 EP3791368 A1 EP 3791368A1
Authority
EP
European Patent Office
Prior art keywords
serial number
information
image
database
authenticity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP19749178.0A
Other languages
German (de)
English (en)
Inventor
Jörg Kaufmann
Frank THEEG
Holger Zellmer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industry365 Ug Haftungsbeschraenkt
Original Assignee
Industry365 Ug Haftungsbeschraenkt
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industry365 Ug Haftungsbeschraenkt filed Critical Industry365 Ug Haftungsbeschraenkt
Publication of EP3791368A1 publication Critical patent/EP3791368A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K15/00Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
    • G06K15/02Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers using printers
    • G06K15/18Conditioning data for presenting it to the physical printing elements
    • G06K15/1835Transforming generic data
    • G06K15/1836Rasterization
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K15/00Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
    • G06K15/02Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers using printers
    • G06K15/18Conditioning data for presenting it to the physical printing elements
    • G06K15/1867Post-processing of the composed and rasterized print image
    • G06K15/1872Image enhancement
    • G06K15/1881Halftoning
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • G07D7/0054Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties
    • G07D7/0055Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties involving markings displaced slightly from original positions within a pattern
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2008Testing patterns thereon using pre-processing, e.g. de-blurring, averaging, normalisation or rotation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/2033Matching unique patterns, i.e. patterns that are unique to each individual paper
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/00856Preventive measures
    • H04N1/00864Modifying the reproduction, e.g. outputting a modified copy of a scanned original
    • H04N1/00867Modifying the reproduction, e.g. outputting a modified copy of a scanned original with additional data, e.g. by adding a warning message
    • H04N1/0087Modifying the reproduction, e.g. outputting a modified copy of a scanned original with additional data, e.g. by adding a warning message with hidden additional data, e.g. data invisible to the human eye
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32251Spatial or amplitude domain methods in multilevel data, e.g. greyscale or continuous tone data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32256Spatial or amplitude domain methods in halftone data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32352Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3235Checking or certification of the authentication information, e.g. by comparison with data stored independently
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information
    • H04N2201/3281Encryption; Ciphering

Definitions

  • the invention relates to a method for verifying the authenticity of products based on the comparison of unequal information and printed image according to the preamble of the first and ninth claims.
  • Markings can be introduced into textile or leather products. These invisible markings are firmly combined with the product and remain there for the entire product life.
  • amorphous ferromagnetic fibers are used, which are implemented in the respective article in terms of textile technology.
  • a disadvantage of this solution is possible imitation through an identical incorporation of appropriate materials into such textiles or products.
  • the metrological proof of authenticity is very complex, complex and therefore not very economical.
  • the marker substance either mixed into the product or with the Product is connected.
  • the measurement of the ferromagnetic substance is then carried out by means of a special scanner and a statement about the authenticity of the product is made on the basis of the measurement results.
  • Marker substances and the application of the substances at different locations can be created using a marking code.
  • This code can then be used to save further information on product or production process parameters.
  • the disadvantage of this method is the high cost of encrypting the information and affixing the code to the products. Also the respective
  • Coding points to be known when decoding the code and suitable measuring and scanning devices must be available especially for this application.
  • the publication WO 03/007252 A1 describes a method in which a unique random code is used to prove the originality.
  • This code is applied to the product or the corresponding packaging and stored in a central database.
  • This central database is accessible via the Internet and the customer can enter the corresponding code in an online mask after purchasing a product and thus inquire about the authenticity of the product. If the code entered is not in the database, it is a forgery. If the code exists in the database and the code has already been queried before, it cannot be clearly demonstrated which product is the original and whether the product may have been queried twice. Counterfeiting of the product including the code cannot be ruled out.
  • Document DE 10 2013 019 675 B3 discloses a more cost-effective solution for implementing copy protection.
  • This document relates to a method for recording and reproducing information which is applied to the surface of information carriers of the advertising and / or information media by means of display elements.
  • the object of the invention is to enable digital communication by means of data elements on information carriers.
  • display elements of an overall textual and / or visual representation are captured by means of a scanner and an encrypted connection code is decoded.
  • This connection code is used to access a database and compare the identical physical information present with the identical information in a database.
  • the disadvantage of this solution is that by copying the physical information and attaching it to a plagiarism, it is recognized as the original.
  • DE 10 2015 009 123 A1 publishes a method for checking the authenticity of the
  • a design surface with an individual security code and a brand is applied to the product.
  • the individual security code can be decoded using a scanner.
  • a data connection to a database is then established.
  • the brand and code information is compared in the database and a query code based on a mathematical formula is transmitted to the scanning device.
  • An original product is only available if the brand, code and query code match. So that no counterfeit can be generated, the query code is renewed with every query, so that only the scan device that made the last query knows the current query code.
  • the disadvantage of this solution is that the query code must be transmitted separately from the original product. If the query code is lost, the originality of the product can no longer be verified.
  • the publication DE 10 2015 006 008 A1 relates to an invention of a method for checking the authenticity of security features on printed and 3D objects of value such as checks, vouchers and certificates.
  • the security of the detection of forgeries should be significantly increased over the property rights known from the prior art.
  • in the first step it is recognized which value object it is and it is defined where the security features are attached to this value object.
  • the two- and three-dimensional security features on the object are then captured by means of a camera.
  • the determined values are then sent to a comparison station.
  • the comparison of the recognized features with the stored features takes place in the comparison station.
  • the comparison result is then sent back to the scanning device and a statement is made about the authenticity of the object.
  • It is essential here that the transmission of the data is encrypted using a hash function and at least one 3D security feature must be attached to the value object. The procedure of this
  • the procedure is planned in several steps:
  • edges of the value object are captured using the auto focus function.
  • the optical elements within the edges (boundary surfaces) of the object of value are then recorded and recorded in two dimensions. Then be the display elements with given areas and patterns
  • the increase in security according to this document is based on a code which is produced by means of a coding device and is additionally used on the object of value.
  • This code is e.g. B. the serial number of the value object.
  • the code is transmitted between the scanning device and the comparison station by means of a further coding based on a hash function, so that the code cannot be calculated back.
  • the comparison station the value also stored there by means of the identical hash function is then compared with the scanned value and the hash value.
  • WO 2017 / 137155A1 describes a method for verifying one with a
  • the security element being produced in a multi-step process with register fluctuations.
  • Register fluctuations use a superposition of at least two dot or line grids.
  • the resulting Moriee grids are used to determine a test value which is compared with a reference value for verification.
  • Several printing methods are preferably used and check digits are stored in selected areas.
  • the focus is on the creation of Moriee structures, which can be optically read out.
  • the raster manipulation is realized by fluctuations in the register on the printing press and are inevitable due to the use of different printing methods proposed here and serve as a kind of fingerprint for the
  • the banknote to be verified is verified by means of a mobile computer device and a
  • the app then establishes a connection to a database and transfers the serial number and the test value to the database.
  • the test value and serial number are compared in the database and the result of the The check is sent back to the app, which accordingly shows the result of the authenticity check.
  • it is proposed to further secure the system by applying an additional barcode.
  • Document DE 10 2008 034 022 A1 describes a method for producing security elements that are invisible to the human eye and cannot be copied in an image, in particular for checking the authenticity of images, the image being imaged by means of a printing screen.
  • defined and predetermined patterns are to be generated by targeted modification of the luminescence in partial areas of the marking layer, which eliminates the need to determine a previously generated pattern for the purpose of
  • Determination of the correlated string is omitted.
  • the change in the partial areas of the marking layer when illuminated with visible light and in daylight intensity should not be perceptible to the human eye, but should only be determined with the aid of technical aids, such as magnifying glasses, detectors, etc.
  • a laser sweeps in a predetermined way through the shown and
  • predetermined path of the laser beam in turn predetermined partial areas, with local pyrolysis taking place in the partial areas due to the strong absorption of the laser radiation in the laser-sensitive pigment and its immediate surroundings (diameter up to 10 pm around the center of a laser-sensitive pigment). This will make the
  • Permittivity in the immediate vicinity of a laser-sensitive pigment reduces, with the result that an electroluminophore in this environment with the electrical alternating field of the same frequency and intensity is no longer used
  • Luminescence can be excited.
  • the partial areas show a reduced electroluminescence compared to the other areas.
  • the pyrolysis is locally limited due to the control of the laser, as described, so that the pyrolyzed areas are practically imperceptible in normal daylight and with the human eye without technical aids.
  • Document DE 10 2013 107 951A1 describes a method for checking the authenticity of a document using at least one additional piece of information, the document having an information feature which indicates the additional information.
  • An image of the document is captured, the information feature is captured in the captured image, the additional information is determined on the basis of the captured information attribute and the captured image is displayed together with the additional information in order to check the authenticity of the document.
  • the object of the invention is to develop a method for verifying the authenticity of products based on the comparison of unequal information and printed images, which provide a reliable statement about the authenticity of a product
  • Illustration is the illustration by means of a printing grid, whereby the
  • Print screen consists of individual pixels, and according to the invention in the
  • Mapping / the printing grid at least one field is defined, by manipulating pixels in the field and / or by manipulating the entire field, non-copyable, encrypted information for comparison with at least one database is stored and by means of contours introduced into the printing grid
  • Serial number is shown, with each contour a position of the serial number is assigned and the serial number can be represented in any number system.
  • the illustration can be in the form of a company logo or a supplementary illustration.
  • the invention therefore relates to a system for the authentication of objects, both the verification method and associated computer products for
  • An authentication method is used, which is a multi-step method that optically encodes an at least binary serial number in an image by varying the screening of full and halftone areas in previously defined areas.
  • the image is printed using duplex, four or multi-color printing respectively
  • a graphic present as an RGB file or in another color space in the RIP process is preferably made up of 4 colors (C - cyan, M - magenta,
  • detection can be demonstrated using digital cameras (either directly or indirectly by changing the intensity in the RGB channels).
  • special colors, lacquers, luminescent colors or electromagnetically reactive colors are available as substitutes or as supplements
  • Color component applicable the maximum number is not limited.
  • areas for the optical attachment of a random or any serial number are defined in a second step.
  • the contour and size of the areas is completely free and can consist of circles and / or triangles, rectangles, trapezoids, squares, a wide variety of polygons or free-form surfaces.
  • Each area stands for one digit of the serial number. Which area stands for which position of the serial number is shown in previously defined areas and the part of the serial number shown there.
  • at least one defined area is determined by means of the parameters grid change and / or contour, in which order the individual digits of the serial number are brought together and with which hash function the encryption takes place.
  • Preferred variant is binary, i.e. the areas can assume two states:
  • Grid within a field is identical to grid outside a field or the area within the field and outside differ.
  • One of these states is defined in the binary procedure with a 0 (false), a state with a 1 (true).
  • the screen angle of two of the four colors (CMYK) is partially exchanged. But there is also the possibility of several states of variation Allow grid and so for example to a quaternary, decimal or
  • Hexadecimal code Possible variants and / or combinations for changing the grid are:
  • the modified graphics are printed using a printing process such as inkjet, laser, offset, gravure printing, flexographic printing, screen printing or the like or
  • the substrate can be selected as desired and ranges from paper to plastics to other natural materials such as wood, stone or artificially produced substrates.
  • the shape of the substrate is also freely selectable and ranges from thread-like structures such as yarns to 2D Stubborns like paper and foils to 3D structures like parts and components.
  • Color combinations are sent to the printing device in other processes, but the manipulated CMYK data (in the preferred case with partially exchanged K and M grids) or correspondingly otherwise manipulated data sets in different color spaces with further color combinations.
  • step 5 the at least binary
  • Serial number transformed using a hash function was determined in step 2 and is part of the serial number.
  • the at least one binary serial number and the transformed information (hash value) are then stored in at least one database and assigned to a container with a further serial number and further product data (brand, name, production location, production time, size, color, text length, etc.) ) added.
  • step 6 the container is filled.
  • step 5 is carried out at least once. Preferably, however, significantly more often, for example, in the range from 4k to 20k, there being no maximum number.
  • the container itself is encrypted or transformed in step 7.
  • the so-called Merkle tree method is used here, which means that two hash values of a serial number with a defined hash function are always transformed to a new hash value and thus combined.
  • the resulting new hash value is stored in the database and two hash values of serial numbers that have already been combined are then transformed again with a hash function (identical or changed). This step is repeated until a single hash value is available for the entire container.
  • the encryption path and the hash functions used are also stored in the database and a so-called Merkle path of the container is created.
  • this final hash value of the container is written in at least one blockchain (preferably a public blockchain).
  • the unalterable filing of the container hash value is completed, and each one Person can read out publicly which hash values of the container exist. Since the hash functions represent asymmetrical encryption and thus a transformation, it is not possible to use the publicly available container hash values to refer to the summarized hash values of the Merkle tree or to the hash values of the serial numbers or the respective serial numbers to close.
  • the security feature printed in step 4 is recorded according to the invention with a mobile device, such as, for example, a cell phone, camera, tablet, SmartWatch or the like
  • the preferred variant uses a mobile phone on which a special application (software) is installed or has been integrated in the firmware of the mobile phone.
  • the app is opened or the camera function is started with the integrated app and the security element is recorded in the form of a security feature. If the camera is active in standby mode with an integrated app, it is sufficient if the camera automatically detects the presence of a security feature.
  • the RGB recording is processed further in terms of data technology in step 9a, that is to say a combination of color filters and transformations, such as Fourier transformations, is used to determine the information content for each individual field of the security feature. In the binary case, this is 0 or 1 or true and false.
  • step 9b the first part of the serial number, which describes the structure of the serial number and the hash function used to transmit the serial number to the database, is determined in the provided at least one field.
  • serial number is then assembled in step 9c in accordance with step 9b and encrypted in step 9d with the corresponding hash function.
  • step 9e the transformed serial number is sent to the database and the Merkle path stored for this hash value is determined in accordance with step 9f.
  • the database either consists of a server that can be reached via the Internet, or a combination of several servers or self-sufficient nodes (nodes).
  • the associated container hash is determined in a step 9g using the Merkle tree method.
  • step 9h the comparison is carried out with at least one blockchain, and it is checked whether the determined container hash is present there. If the container hash is not present, the product is forged and a corresponding error message is sent to the mobile device, which outputs this optically and / or acoustically (step 9h case 1).
  • the container hash is contained in the blockchain, the information: “Product is real” is transmitted to the mobile device and this is output optically and / or acoustically.
  • step 9h case 2 further product parameters such as production date, production location, size, color etc. are additionally read from the database and transmitted to the mobile device as additional information (step 9h case 2).
  • the customer can now visually compare the product. If the data transmitted from the database does not match the product at hand, then there is a 2nd order counterfeit. The customer can report this via the application on the mobile device (step 9h case 3).
  • the time and geodesics are also transmitted to the database and stored.
  • Software is used to check in the background whether it is theoretically possible that the data associated with a product can be real. For example, if a product is scanned in Hamburg at 11:35 a.m. at 9:35 a.m. and 4 minutes later in Los Angeles, there is a 100% probability of a 3rd order counterfeit. This is also transmitted to the user and displayed optically and / or acoustically (step 9h case 4).
  • the customer has the option in a 10th step after the detection to take a picture of the product as a whole and to enter it in a database via the mobile application. Appropriate further processing then takes place on the basis of this data.
  • the screen angles of the colors black and magenta By exchanging the screen angles of the colors black and magenta, the number of screen dots in the areas of the variation is identical to the other areas.
  • the subtractive color mixing in the CMYK color space in combination with the max. Dissolution of the human eye means that the exchange of the grid is not recognized.
  • the CMYK data is scanned or otherwise digitized and transformed into the RGB color space.
  • Line number by using compression techniques such as of JPEG image formats or similar is significantly enhanced. This deletes the information that is optically encrypted in the figure and it is not possible to convert it back into the identical CMYK data. A new print leads to images that appear identical or similar to the human eye
  • Filter applications and transformation-based decoding processes can no longer recognize the serial number.
  • the reason for not recognizing is the presence of other information in the security-relevant areas.
  • a random number is generated. This random number is preferably binary, but can also be of a different type.
  • BSP 010010 and represents the serial number (1).
  • the serial number (1) is written into a database 1 (DB1) and combined there with further product and / or production process data or there is a link to a manufacturer database via an API or other interfaces.
  • serial number (1) is transformed into a hash value (2) using a hash function A.1.
  • BSP from 010010 2FX3D arises.
  • DB1 stores that serial number (1) was transformed with A.1 (if only one hash is used in the entire system, this information can also be omitted)
  • a container with a random ID (3) is created.
  • BSP 011001.
  • DB1 checks whether the ID already exists, if so, a new number is generated.
  • the container with the random ID (3) is filled with hashed product codes 2FX3D, etc.
  • DB1 also checks whether it already exists. If so, then create a new serial number (1) and check again whether serial number (1) exists in DB1.
  • a hash function A.2 is applied to the entire container (3) or two hash values of the serial numbers are always added using the hash function combined with another hash value until a final container hash (4)
  • BSP: X3YAO is created. This ID (4) is written in a blockchain.
  • the Merkle path created during the transformation using the Merkle tree method is stored in DB1.
  • serial number (1) is applied to a product and read in using the scan app.
  • BSP 010010
  • serial number is converted in the app using a recognized hash function.
  • the associated Merkle path is retrieved from DB1 and the container hash X3YAO is determined using the hash value of the serial number (1) 2FX3D and Merkle path.
  • the serial number (1) 2FX3D is part of the original container and is genuine.
  • steps 8a to 10a can follow step 7:
  • DB1 checks whether there is a container hash in the blockchain
  • Sequence for the coding a) Screening of a graphic in the RGB color space (or another color space) in a hardware or software raster image process (RIP) process in a CMYK raster or in another of more or less colors
  • RIP raster image process
  • the database DB1 is at least one database, at least one cloud and / or at least one blockchain in which the relevant information is stored completely, split and / or encrypted or open.
  • the information in DB1 can also represent links to other databases, clouds, blockchains from which information can be obtained via APIs or other interfaces.
  • the invention is based on an embodiment and associated
  • FIG. 2 rotated screen angle in the color black
  • Figure 3 rotated screen angle in the color magenta.
  • FIG. 1 shows a schematic illustration A with a dot matrix 1.
  • lines arranged in parallel in the display were used as print screens.
  • the print screen consists of pixels that
  • the figure has 5 fields F1 to F5, each field F1 to F5 having any geometric shape or free form.
  • Fields F1 to F5 can be used to display information in Figure A, whereby the human eye cannot see any differences and does not perceive any fields in Figure A.
  • the fields F1, F3, F4 and F5 have a different orientation of the print screen compared to the illustration A.
  • the field F2 shows the same orientation of the
  • Print screen like the print screen of illustration A.
  • a representation can be generated in binary fashion from the orientation of the image points such that a 1 or a 0 can be generated if the image points of the field F deviate from the illustration A, depending on the previous definition.
  • a deviation generates a 1
  • the field F2 generates a 0
  • the fields F 1, F3, F4 and F5 generate a 1, which means that a serial number can be represented in binary form.
  • the fields F3 and F4 can be conditioned by the other
  • a preferred case is the use of 4 colors CMYK and representation of the

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Credit Cards Or The Like (AREA)
  • Printing Methods (AREA)

Abstract

L'invention concerne un procédé permettant de prouver l'authenticité de produits, destiné en particulier à vérifier une représentation d'un produit, le témoin d'authenticité n'étant pas visible à l'œil humain et ne pouvant être copié, de sorte qu'un code enregistré dans une trame d'impression par manipulation de points d'image et/ou dans un champ manipulé délimité dans une trame d'impression peut être lu au moyen d'un dispositif optique et être mis en correspondance avec une valeur pouvant être consultée dans au moins une banque de données. La représentation imprimée présente au moins un élément de sécurité ne pouvant pas être copié, la représentation étant imprimée à partir d'une trame d'impression comportant des points d'image individuels et présentant à l'intérieur de sa trame d'impression une information pouvant être évaluée, de sorte que la représentation présente au moins un champ comportant une manipulation des points d'image non visible à l'œil humain et/ou de sorte que la représentation présente au moins un champ manipulé non visible à l'œil humain.
EP19749178.0A 2018-06-24 2019-06-22 Procédé pour prouver l'authenticité de produits et représentation imprimée Withdrawn EP3791368A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102018115146.2A DE102018115146A1 (de) 2018-06-24 2018-06-24 Verfahren zur Herstellung für das menschliche Auge nicht sichtbarer und nicht kopierbarer Sicherheitselemente in einer Abbildung sowie Verfahren zum Authentizitätsnachweis von Produkten auf Basis des Abgleichs von ungleichen Informationen sowie gedruckte Abbildung
PCT/DE2019/100576 WO2020001696A1 (fr) 2018-06-24 2019-06-22 Procédé pour prouver l'authenticité de produits et représentation imprimée

Publications (1)

Publication Number Publication Date
EP3791368A1 true EP3791368A1 (fr) 2021-03-17

Family

ID=67539171

Family Applications (2)

Application Number Title Priority Date Filing Date
EP19749177.2A Withdrawn EP3791367A1 (fr) 2018-06-24 2019-06-22 Procédé permettant de produire des éléments de sécurité qui sont non visibles à l'?il humain et ne peuvent pas être copiés, dans une représentation, et représentation imprimée
EP19749178.0A Withdrawn EP3791368A1 (fr) 2018-06-24 2019-06-22 Procédé pour prouver l'authenticité de produits et représentation imprimée

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP19749177.2A Withdrawn EP3791367A1 (fr) 2018-06-24 2019-06-22 Procédé permettant de produire des éléments de sécurité qui sont non visibles à l'?il humain et ne peuvent pas être copiés, dans une représentation, et représentation imprimée

Country Status (5)

Country Link
US (2) US11587339B2 (fr)
EP (2) EP3791367A1 (fr)
CN (2) CN112292716A (fr)
DE (1) DE102018115146A1 (fr)
WO (2) WO2020001696A1 (fr)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11724533B2 (en) 2018-04-06 2023-08-15 Esko-Graphics Imaging Gmbh System and process for persistent marking of flexo plates and plates marked therewith
CN112204463B (zh) 2018-04-06 2024-04-30 埃斯科绘图成像有限责任公司 用于利用工作流程信息持久标记柔性印刷板的方法和利用其标记的板
DE102018115146A1 (de) * 2018-06-24 2019-12-24 Industry365 Ug (Haftungsbeschränkt) Verfahren zur Herstellung für das menschliche Auge nicht sichtbarer und nicht kopierbarer Sicherheitselemente in einer Abbildung sowie Verfahren zum Authentizitätsnachweis von Produkten auf Basis des Abgleichs von ungleichen Informationen sowie gedruckte Abbildung
FR3085304B1 (fr) * 2018-08-31 2021-01-08 D Uniflexo Forme imprimante photosensible pour un procede d’impression flexographique comprenant des informations visibles et non imprimables, procede de preparation d’une telle forme imprimante
EP3660770A1 (fr) * 2018-11-30 2020-06-03 Mastercard International Incorporated Procédés et systèmes de stockage et de vérification sécurises de données de suivi de produit
US11878503B2 (en) 2019-10-07 2024-01-23 Esko Graphics Imaging Gmbh System and process for persistent marking of flexo plates and plates marked therewith
EP4244836A1 (fr) 2020-11-12 2023-09-20 U-NICA Systems AG Procédé d?impression et d?identification de marques d?authentification au moyen d?une impression tramée modulée en amplitude

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6104812A (en) * 1998-01-12 2000-08-15 Juratrade, Limited Anti-counterfeiting method and apparatus using digital screening
US7394573B1 (en) * 1999-04-14 2008-07-01 Xerox Corporation System for authenticating hardcopy documents
FR2805618B1 (fr) 2000-02-29 2002-04-12 Commissariat Energie Atomique Systeme d'authentification d'articles manufactures munis de marquages magnetiques, et procede de marquage de tels articles
US6760464B2 (en) * 2000-10-11 2004-07-06 Digimarc Corporation Halftone watermarking and related applications
DE10118679A1 (de) 2001-04-14 2002-10-24 Henkel Kgaa Identifizierungs- oder Authentifizierungsverfahren
NO314372B1 (no) 2001-06-20 2003-03-10 Kezzler As Fremgangsmåte for frembringelse og senere benyttelse av autentiseringsinformasjon
US20030197878A1 (en) * 2002-04-17 2003-10-23 Eric Metois Data encoding and workpiece authentication using halftone information
US7751608B2 (en) * 2004-06-30 2010-07-06 Ecole Polytechnique Federale De Lausanne (Epfl) Model-based synthesis of band moire images for authenticating security documents and valuable products
DE10328328B4 (de) * 2003-06-25 2015-06-03 TÜV Rheinland Holding AG Produktschutz-Portal und Verfahren zur Echtheitsprüfung von Produkten
DE10334336A1 (de) 2003-07-28 2005-02-24 Irwin Industrial Tools Gmbh Schraubzwinge
DE102005008135A1 (de) * 2005-02-21 2006-08-31 Giesecke & Devrient Gmbh Datenträger mit Halbtonbild
DE102008034022A1 (de) * 2008-07-16 2010-01-21 Merck Patent Gmbh Verfahren zur Herstellung eines Sicherheits- und/oder Wertprodukts mit Teilbereichen mit unterschiedlicher Lumineszenzemission
CN101537751B (zh) * 2009-04-10 2015-03-18 顾泽苍 一种防伪印刷的处理方法
KR101114542B1 (ko) * 2009-10-28 2012-02-27 (주)이컴앤드시스템 유가증권 진위 판단 방법, 장치 및 그 기록 매체
JP2011103023A (ja) * 2009-11-10 2011-05-26 B-Core Inc 色彩配列コードの読み取り方法及び読み取り装置
CN101727593B (zh) * 2009-11-20 2014-07-23 天津市阿波罗信息技术有限公司 一种数字化纸卡的处理方法
CN102407703A (zh) * 2010-09-25 2012-04-11 天津市阿波罗信息技术有限公司 又一种数字化防伪印刷的处理方法
PE20140560A1 (es) * 2010-10-11 2014-05-11 Graphic Security Systems Corp Metodo para construir una imagen compuesta incorporando una imagen de autenticacion oculta
WO2012062505A1 (fr) * 2010-11-08 2012-05-18 U-Nica Technology Ag Procédé et dispositif pour générer des images couleur avec un laser uv sur des substrats pigmentés et produits fabriqués ainsi
JP5721101B2 (ja) * 2011-04-21 2015-05-20 独立行政法人 国立印刷局 網点印刷物及びその作製方法
JP5678364B2 (ja) * 2011-09-22 2015-03-04 独立行政法人 国立印刷局 真偽判別可能な印刷物、その作製装置及びその作製方法並びに真偽判別可能な印刷物の認証装置及びその認証方法
DE102011120848B3 (de) * 2011-12-09 2013-05-23 Giesecke & Devrient Gmbh Sicherheitselement für Wertgegenstände, Verfahren zur Herstellung eines Sicherheitselements für Wertgegenstände und tragbarer Datenträger mit einem Sicherheitselement.
US9361516B2 (en) * 2012-02-09 2016-06-07 Hewlett-Packard Development Company, L.P. Forensic verification utilizing halftone boundaries
HUP1200097A2 (hu) * 2012-02-15 2013-08-28 Glenisys Kft Biztonsági elem és eljárás nyomat eredetiség ellenõrzésére
US8824733B2 (en) * 2012-03-26 2014-09-02 Tk Holdings Inc. Range-cued object segmentation system and method
US20130314468A1 (en) 2012-05-22 2013-11-28 Juan Manuel Jimenez Detecting media type using carriage-coupled sensor
JP5344328B1 (ja) * 2012-10-01 2013-11-20 健治 吉田 ドットパターン、ドットパターン形成媒体、ドットパターンの画像データを生成するプログラム、ドットパターン形成装置、光学装置、光学読み取り装置、情報入出力装置、ドットパターン読み取り装置
DE102013019675B3 (de) 2013-05-29 2014-11-27 Wolfgang Beyer System und Verfahren zur abrufbaren Speicherung, Erfassung und Wiedergabe von Informationen der Werbe- und Informationsmedien
DE102013107951A1 (de) * 2013-07-25 2015-01-29 Bundesdruckerei Gmbh Verfahren zur Überprüfung der Echtheit eines Dokumentes
JP5822411B2 (ja) * 2013-08-12 2015-11-24 株式会社アポロジャパン 画像情報のコード変換装置、画像情報のコード変換方法、画像コードを用いた画像関連情報提供システム、画像情報のコード変換プログラム、及びそのプログラムを記録した記録媒体
WO2015118519A1 (fr) * 2014-02-04 2015-08-13 Koren Moshe Système d'authentification d'articles
CN103997591A (zh) * 2014-05-09 2014-08-20 佛山市绿之彩印刷有限公司 一种隐形编码图形及其处理方法和防伪应用
CN106156821A (zh) * 2015-03-24 2016-11-23 天津市阿波罗信息技术有限公司 一种光学可读性条码防伪结构及实现方法
PL3281183T3 (pl) * 2015-04-09 2022-10-24 Filigrade B.V. Sposób potwierdzania autentyczności obiektu drukowanego i terminal przetwarzający dane
DE102015006008A1 (de) 2015-05-13 2016-11-17 Wolfgang Beyer Verfahren zur Kontrolle der Echtheit von Sicherheitsmerkmalen an Wertobjekten
EA031834B1 (ru) * 2015-07-01 2019-02-28 Дмитрий Маринкин Способ идентификации подлинности изделия, содержащего защитную маркировку на своей поверхности
DE102015009123B4 (de) 2015-07-20 2023-11-30 SparrowView GmbH Verfahren zur Echtheitskontrolle der Herkunftskennzeichnung und der Haltbarkeitsangaben von Produkten
CN106886811A (zh) * 2015-12-10 2017-06-23 顾泽苍 一种手机商品防伪标识的构成方法与识读方法
DE102016001464A1 (de) * 2016-02-09 2017-08-10 Giesecke & Devrient Gmbh Verifikation eines mit einem Sicherheitselement versehenen Gegenstands
CN106407795B (zh) 2016-09-05 2019-05-14 北京众享比特科技有限公司 数据存在认证系统、认证方法及验证方法
CN106372533B (zh) * 2016-09-14 2020-04-21 中国银联股份有限公司 基于区块链技术的内容存储方法
CN106570710A (zh) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 一种商品防伪方法及装置
US10417409B2 (en) * 2017-03-21 2019-09-17 Hid Global Corp. Securing credentials with optical security features formed by quasi-random optical characteristics of credential substrates
CN107798372B (zh) * 2017-11-24 2021-05-11 深圳市裕同包装科技股份有限公司 产品信息点阵图像的编码方法、解码方法及解码系统
US10261846B1 (en) * 2018-02-09 2019-04-16 Banjo, Inc. Storing and verifying the integrity of event related data
DE102018115146A1 (de) * 2018-06-24 2019-12-24 Industry365 Ug (Haftungsbeschränkt) Verfahren zur Herstellung für das menschliche Auge nicht sichtbarer und nicht kopierbarer Sicherheitselemente in einer Abbildung sowie Verfahren zum Authentizitätsnachweis von Produkten auf Basis des Abgleichs von ungleichen Informationen sowie gedruckte Abbildung

Also Published As

Publication number Publication date
US20210245542A1 (en) 2021-08-12
CN112313716B (zh) 2023-05-26
US11587339B2 (en) 2023-02-21
US20210248369A1 (en) 2021-08-12
US11715309B2 (en) 2023-08-01
EP3791367A1 (fr) 2021-03-17
WO2020001695A4 (fr) 2020-02-20
CN112313716A (zh) 2021-02-02
WO2020001696A1 (fr) 2020-01-02
CN112292716A (zh) 2021-01-29
DE102018115146A1 (de) 2019-12-24
WO2020001695A1 (fr) 2020-01-02

Similar Documents

Publication Publication Date Title
WO2020001696A1 (fr) Procédé pour prouver l'authenticité de produits et représentation imprimée
DE60018222T2 (de) Optisches Wasserzeichen
EP2984814B1 (fr) Production et reconnaissance de données d'informations d'images imprimables infalsifiables
WO2003052701A2 (fr) Procédé pour protéger l'authenticité de documents
EP3746992B1 (fr) Procédé pour le contrôle de l'authenticité et/ou de l'intégrité d'un document de sécurité comprenant une caractéristique de sécurité imprimée, caractéristique de sécurité et dispositif pour la vérification
EP3414102A1 (fr) Vérification d'un objet présentant un élément de sécurité
DE102017206466A1 (de) Sicherheitsmerkmal mit Kopierschutz
EP0985198A1 (fr) Procede pour empecher la falsification de documents comportant une photo, de preference une photo d'identite
DE102009008779A1 (de) Verfahren zum Überprüfen der Echtheit eines Druckproduktes
DE112005000983T5 (de) Verfahren und System zum Bilden einer Entschlüsselungseinrichtung
EP3314585B1 (fr) Procédé et système pour authentifier un document et procédé pour créer et/ou personnaliser un document
WO2017137155A1 (fr) Vérification d'un objet présentant un élément de sécurité
WO2017108428A1 (fr) Dispositif d'authentification et procédé de reconnaissance optique ou acoustique de caractères
EP3686027A1 (fr) Procédé d'impression de marques d'authentification par une impression en sérigraphie modulée en amplitude
DE102020131420A1 (de) Farbseparation zur Absicherung der Dokumenten-Personalisierung
EP3308348B1 (fr) Procédé de génération d'un élément de sécurité ayant une information codée de manière cachée dans une représentation graphique, élément de sécurité et procédé de vérification
EP3356980B1 (fr) Procédé et appareil pour l'authentification d'un objet ou d'une personne moyennant un élément de sécurité construit de manière modulaire
DE102021115558A1 (de) Verfahren zur Bestimmung der Originalität und Typisierung eines Produktes
DE102016001449A1 (de) Verifikation eines mit einem Sicherheitselement versehenen Gegenstands
EP4192692A1 (fr) Production de modèles de documents dotés de caractéristiques de sécurité
DE10328792A1 (de) Fälschungssicheres Dokument und Verfahren zu seiner Herstellung

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20201207

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20221122

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20221215