EP4374551A1 - Procédé d'authentification et/ou de validation de l'identité d'un objet - Google Patents
Procédé d'authentification et/ou de validation de l'identité d'un objetInfo
- Publication number
- EP4374551A1 EP4374551A1 EP22751029.4A EP22751029A EP4374551A1 EP 4374551 A1 EP4374551 A1 EP 4374551A1 EP 22751029 A EP22751029 A EP 22751029A EP 4374551 A1 EP4374551 A1 EP 4374551A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- authentication
- data memory
- identifier
- read out
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000010200 validation analysis Methods 0.000 claims abstract description 31
- 238000013500 data storage Methods 0.000 claims abstract description 11
- 230000015654 memory Effects 0.000 claims description 95
- 238000005516 engineering process Methods 0.000 claims description 6
- 239000000853 adhesive Substances 0.000 description 5
- 238000007689 inspection Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 239000003344 environmental pollutant Substances 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012015 optical character recognition Methods 0.000 description 1
- 231100000719 pollutant Toxicity 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000011179 visual inspection Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/108—Source integrity
Definitions
- the invention relates to a method for authenticating and/or validating an identity of an object according to claim 1.
- Methods of the type described here are essentially about clarifying two questions when checking license plates of objects, which can be packages, pieces of luggage, vehicles or the like, for example, namely first, is the license plate or a License plate authentic and verifiable and secondly, the license plate or license plate is assigned to the correct object.
- a number plate of the known type is an official document and shows the number plate which is assigned, for example, to a vehicle when it is registered on the road. Apart from the number plate itself, other data such as the vehicle identification number (VIN) and the make and type of vehicle are stored in the vehicle register as part of the registration process.
- VIN vehicle identification number
- the license plate can thus be clearly assigned to a vehicle and equally to a vehicle owner and can thus be understood as the vehicle's public identity card. Analogous to one ID cards can contain one or more security features to make counterfeiting more difficult.
- license plates In order to be able to identify a vehicle at any time, license plates must typically be permanently attached to the front or rear of a vehicle. The visibility and legibility of the number plates must be guaranteed at all times.
- established methods of attaching license plates only offer limited protection against theft. Attaching a license plate directly to the vehicle body with screws or using a conventional license plate bracket does not prevent license plates from being removed from one vehicle and improperly attached to another quickly and with little effort.
- a security tag Since a security tag is inside the vehicle, it is somewhat protected from unauthorized access compared to license plates. In addition, theft can be prevented by a special structure of the security label, which allows non-destructive detachment of the security label from the windshield prevented. Additional protection can be achieved through the use of security elements that make counterfeiting more difficult, such as a hologram.
- the holographic security label which is issued with the number plates and vehicle documents as part of the approval process, can be cited as an example.
- Self-adhesive security labels also exist as an electronic variant in the form of a printable smart label with an embedded radio frequency identification (RFID) transponder.
- RFID radio frequency identification
- These solutions are often used for electronic toll collection, access control to private areas or the collection of fees for public parking spaces.
- RFID security labels are not personalized for each vehicle, but are pre-produced centrally. Only a unique identification number is stored, which enables a toll or parking operator to assign the vehicle and the vehicle owner via its own database.
- control mechanism In addition to an RFID reader (incl. antenna), the control mechanism also includes automatic license plate recognition using cameras.
- Optical character recognition has always been used to prosecute traffic offenses, such as ignoring a red stop signal or exceeding the speed limit.
- the characters on the license plate are digitized and compared with the vehicle register. Whether the license plate was stolen and misused can only be determined after a manual comparison of the photograph and vehicle data such as make, model and color. Likewise, it is not automatically detected whether a counterfeit license plate number is involved.
- a self-adhesive RFID security label can also be manipulated under certain circumstances - or rather its identity can be stolen. Under certain circumstances, the chip data can be read out and thus the RFID security label can be cloned. Likewise, chip data can be demolished if necessary.
- Another disadvantage of the known methods of reading RFID transponders is that only one or a few number plates or data can be read out per unit of time. This turns out to be difficult, particularly when checking vehicles that are moving on a road. It is not possible to detect all license plates, particularly when the vehicles are traveling at higher speeds and on multi-lane roads. However, capturing and verifying all identifiers is essential to authenticate and/or validate the identities of the objects or identifier and information about that object.
- the object of the invention is to create a method with which the authenticity and/or the validity of an identity of an object and of information about the object can be checked with great reliability and with increased security.
- a method for solving this problem is described by the measures of claim 1. Accordingly, a method for authentication and/or validation of an identity of an object, in particular of a package, a piece of luggage, a vehicle or the like, is provided.
- the method also includes the authentication and/or validation of information about the object.
- the identity and the information of the object are stored on at least two, preferably three, four or more data storage devices, one data storage device in each case being assigned to an identifier of the object.
- each object or the vehicle has at least two, preferably three, four or more identifiers, each with a data memory.
- These data memories are read out in a contactless manner by a reading device, which can be designed to be stationary or non-stationary.
- the at least two identifiers are in any position on the object or on the vehicle and are read out in any order/permutation. Records containing multiple data items are stored on the data store in a specified order.
- the data elements include the identity and/or information about the object of the identifier and/or a large number of directly accessible authentication codes, by means of which the object can be authenticated.
- An essential measure of the invention is that each data element of the data memory is assigned to a permutation of the at least two identifiers.
- This provides a single, directly accessible authentication code for authentication and/or validation of the identity of the object and information.
- the use of at least two data stores, each of which is assigned to an identifier of an object, and the data structure mentioned on the data store enable reliable and secure authentication or validation of the identities and the information.
- the method can be carried out in a simple and network-independent manner, in particular by reading out the data elements in any order and the simultaneous authentication and/or validation by comparing the data from the various data memories.
- the reading device or reading unit or the scanner can be designed as a hand-held device or as a permanently installed unit on a bridge or a comparable object.
- the reading is done by an optical sensor and/or electromagnetic transceiver (transceiver) and is essentially dependent on the data storage device to be read out or the combination of different data storage devices.
- the invention provides that a data element of a data structure on the data memory is identical for all data memories that are arranged on identifiers of the same object in order to offer data records from associated data memories on the object for reading, with a data element of the first data memory read out as selector value for the associated
- Data memory of the other identifiers on the object referred to or used can specifically search for the other data memories or identifiers that are assigned to the same object. If, for example, three license plates, each with a data memory, are arranged on a vehicle and the reading device has recorded a selector value from a first data memory, the reading device knows that further data memories are arranged on this vehicle and are to be recorded. The information about the number and the positions of the other data memories of the same object can also be stored on the first data memory. This targeted detection or reading by the reading device of a specific set of identifiers or data memories leads to a particularly efficient method, since all other data memories that are also in the effective range or reading space of the reading device are ignored.
- the data memory associated with the first data memory only transmits data to the reading device that is stored in a memory address that is greater than the memory address of the data element or the selector value read first. Since the reading device already knows all the data of the data element that has already been read out, and this data is identical for all data memories, this data is not read out again by the device. Accordingly, as soon as the reading device has detected the selector value of the first data memory and searches for the other data memories, the data elements or Selector values of the remaining data memory for reading out by the reading device deactivated. As a result, not only can the reading capacity of the reading device be used very efficiently, but the entire reading process itself can also be shortened, as a result of which the entire method is made more efficient.
- a particularly advantageous exemplary embodiment of the invention preferably provides for the reading device to map the permutation of a reading order of the data memory of the multiple identifiers to a directly accessible authentication code, such as the code is stored on the data memory of the object last read out.
- a directly accessible authentication code such as the code is stored on the data memory of the object last read out.
- the arbitrary reading sequence/permutation of the authentication codes is compared with the possible permutations stored on the data memory. If this permutation can be mapped to the stored values, the authentication and/or validation was successful. If the ascertained permutation or order of the data memory cannot be mapped to the stored data, no authentication and/or validation takes place.
- the invention can also provide that after the data memory has been read out by the reading device, this identifier is muted so that the data memory of this identifier is not read out again in the further process and no further signals are generated.
- This muting of the data memory of an identifier allows all capacities of the reading device to be used to find and read the remaining identifier or the data memory of the object that has not yet been read. The efficiency of the method can thus be further increased.
- the time required to read out all data memories of an object can be reduced.
- An exemplary embodiment of the invention can provide for each data memory to be divided into three sections, namely a first section, a second section and a third section.
- the following data elements can be stored in the first section: CRC, PC, identity of the license plate / tag issuer, a registration number, the object identifier, in particular the vehicle identifier, information about the Position of the license plate on the object, information and number of other license plates on the same object and a selector value.
- the following data can be stored in the second section: A clear identification of the data memory, in particular a transponder (TID), which cannot be changed later.
- TID transponder
- the following data elements can be stored in the third section of the data store: user information, such as signatures of individual data stores, authentication codes and possible permutations of all identifiers.
- the method according to the invention can provide the following steps for the authentication and/or validation of the object: First the reading device reads the first, then the second and then the third section of the first data memory.
- the first data memory is the data memory that is first detected by the reading device. It is conceivable that this data memory is read out as a second or third etc. data memory in a further reading method according to the invention. After the first identifier has been read out with the first data memory, this data memory is set to mute for the further procedure. As a result, this data memory cannot be read out again during this authentication or validation. Also, this data memory cannot emit any further signal. This can prevent this data memory from being read out a second time, as a result of which the entire method would be very inefficient.
- the position of the tag on the object, the number and position of other tags on the same object and the selector value are then extracted from the first section of the first data store.
- This extraction can be performed by a control device or a processor device which is connected to the reading device.
- the reading device uses a second identifier searched for a second data memory.
- the second identifier or data store is the data store that is found second. Only part of the data from the first section is read from this data memory.
- the second identifier in turn sends a signal to the reading device that it has been recognized.
- a part of the first section and the second and third sections of the second data memory are read out by the reading unit. All information about the object or the vehicle is now available to the control device.
- this identity or information is authentic or valid can be tested in the next step.
- the second identifier with the second data memory is now also set to mute for the rest of the procedure, so that the data memory is not read out again and also cannot emit a signal. If further identifiers are arranged on the object, at least some of the aforementioned steps can be repeated.
- the authentication codes that have been read from all of the object's data memories are compared with the permutations stored in the last data memory that was read out. This comparison of the authentication codes with the permutations enables secure and reliable authentication and/or verification of the identity and information about the object. If the authenticity can be confirmed, the stored data or the identity and the information about the object are authentic, i.e. not manipulated or stolen.
- a corresponding positive authentication/validation signal can be generated. If the comparison of the data shows that the license plates cannot be assigned to the same object, a negative authentication/validation signal is generated.
- These signals can be, for example, an optical, acoustic or haptic signal.
- the control device deposits a written entry for documentation in a stored data record and, if necessary, initiates further processing or evaluation of the data elements.
- the invention can provide that the authentication/validation of the identity or information about the object during a relative movement of the object of the reading unit. It is irrelevant at what speed the object or vehicle is moving and how large the object density is in the effective range of the reading device. As soon as the reading device has determined a selector, only corresponding data is searched for, or the data memory of the object which has received a corresponding activation signal from the reading device reports back.
- the RAIN® RFID technology is to be preferred over other technologies because it allows a variable number of license plates or tags to be read over distances of the order of 10 m and more.
- a corresponding data memory has two logical memory parts, namely the inventory data, which are transmitted during the "first" readout, also called INVENTORY, and the additional data (second, third section). The additional data is accessed directly during readout (ACCESS).
- ACCESS readout
- the selector value is a command stored on each datastore that the reader can first read and then send prior to an "INVENTORY round" (the identification of multiple datastores/tags) to select a specific set of datastores identified by a code in the inventory data that is on the Data storage are stored, are identified. Only the selected data storage devices are allowed to respond during the readout.
- the selector value is typically placed first in the inventory data. The rest of the inventory data is typically the identification data of the object (see above). The order in which the RAIN® RFID data memory reacts or is read out during inventory cannot be controlled.
- the selector value may have an option that instructs the corresponding tag's data store to transfer only the inventory data stored on the data store after the selector value. Since the reading device already knows the selector value, it does not have to be read out again. This "truncate command" reduces the amount of data transferred from the data store, leaving more time to read other data stores. The selector value and data stored in the data memory before the selector value are also not transferred from the data memory to the reading device when the “truncate command” is used. This data is therefore not received by the reading device, which can be problematic for the well-known reading of RAIN® data memories. The method described here makes use of this otherwise rather problematic selective reading of data. In fact, a particularly high level of efficiency and security in the authentication and/or validation of the object can be achieved through this cascaded reading of a plurality of data memories and the selective recording of specific data.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Toxicology (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Electromagnetism (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Traffic Control Systems (AREA)
- Storage Device Security (AREA)
- Burglar Alarm Systems (AREA)
Abstract
L'invention concerne un procédé d'authentification et/ou de validation de l'identité d'un objet et d'informations sur l'objet. L'identité et les informations sur l'objet sont stockées sur au moins deux dispositifs de stockage de données, de préférence trois, quatre, ou plusieurs dispositifs de stockage, d'un marquage respectif, et les dispositifs de stockage de données sont lus sans contact par un dispositif de lecture. Dans le processus, les marquages peuvent être lus dans n'importe quelle permutation sur l'objet. Des ensembles de données comprenant de multiples éléments de données sont stockés sur les dispositifs de stockage de données dans une séquence définie, les éléments de données comprenant l'identité ou les informations sur l'objet et le marquage, et/ou les éléments de données comprenant une pluralité de codes d'authentification directement accessibles. À chaque élément de données est attribuée une permutation de marquages, un code d'authentification individuel directement accessible étant prévu pour le processus d'authentification et/ou de validation.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102021118971.3A DE102021118971A1 (de) | 2021-07-22 | 2021-07-22 | Verfahren zur Authentifizierung und/oder Validierung einer Identität eines Objektes |
PCT/EP2022/069445 WO2023001632A1 (fr) | 2021-07-22 | 2022-07-12 | Procédé d'authentification et/ou de validation de l'identité d'un objet |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4374551A1 true EP4374551A1 (fr) | 2024-05-29 |
Family
ID=82799858
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP22751029.4A Pending EP4374551A1 (fr) | 2021-07-22 | 2022-07-12 | Procédé d'authentification et/ou de validation de l'identité d'un objet |
Country Status (5)
Country | Link |
---|---|
US (1) | US20240251240A1 (fr) |
EP (1) | EP4374551A1 (fr) |
AU (1) | AU2022314153A1 (fr) |
DE (1) | DE102021118971A1 (fr) |
WO (1) | WO2023001632A1 (fr) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6397334B1 (en) * | 1998-12-17 | 2002-05-28 | International Business Machines Corporation | Method and system for authenticating objects and object data |
WO2003050757A1 (fr) * | 2001-12-11 | 2003-06-19 | Tagsys Australia Pty Ltd | Systemes d'etiquetage de donnees securises |
CN102609846B (zh) * | 2011-03-18 | 2014-02-05 | 诺美网讯应用技术有限公司 | 基于通信网络的防伪验证方法及系统 |
-
2021
- 2021-07-22 DE DE102021118971.3A patent/DE102021118971A1/de active Pending
-
2022
- 2022-07-12 WO PCT/EP2022/069445 patent/WO2023001632A1/fr active Application Filing
- 2022-07-12 AU AU2022314153A patent/AU2022314153A1/en active Pending
- 2022-07-12 US US18/291,006 patent/US20240251240A1/en active Pending
- 2022-07-12 EP EP22751029.4A patent/EP4374551A1/fr active Pending
Also Published As
Publication number | Publication date |
---|---|
US20240251240A1 (en) | 2024-07-25 |
WO2023001632A1 (fr) | 2023-01-26 |
DE102021118971A1 (de) | 2023-01-26 |
DE102021118971A9 (de) | 2023-04-06 |
AU2022314153A1 (en) | 2024-03-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2033137B1 (fr) | Support de donnees et procede pour la communication sans contact entre le support de donnees et un appareil de lecture | |
DE60221700T2 (de) | Systeme zum sicheren markieren von daten | |
EP1984870B1 (fr) | Procédé et dispositif pour apposer une marque de sécurité sur des produits | |
DE102004061452A1 (de) | Mehrfaches RFID-Antikollisions-Abfrageverfahren | |
DE102013103856B4 (de) | Gesichertes EPass-Heft basierend auf einer zweifach Chip-Technologie | |
DE69100001T2 (de) | Faelschungssichere karte, die einen aufzeichnungstraeger mit hochdichter information und eine mikroschaltung enthaelt und ihre anwendung bei einem kartenleser. | |
EP2949096B1 (fr) | Production de donnés de position au moyen d'un protocole délimiteur de distance | |
EP2827269B1 (fr) | Procédé d'authentification d'une puce RFID | |
DE69029989T2 (de) | Kartenähnlicher Aufzeichnungsträger und Verfahren zur Verhinderung von Missbräuchen | |
DE102006040228A1 (de) | Identifikationssystem | |
EP4374551A1 (fr) | Procédé d'authentification et/ou de validation de l'identité d'un objet | |
EP2592584B1 (fr) | Transaction sans fil sécurisée | |
DE102011117467A1 (de) | Dokumentenprüfung | |
EP2820796B1 (fr) | Procédé de surveillance d'un système constitué d'une quantité de lecteurs et d'une pluralité d'unités de communication portatives. | |
EP1516790A1 (fr) | Dispositif d'identification pour articles de valeur et procédé d'identification correspondant | |
EP4214689B1 (fr) | Procédé de détection d'une manipulation ou d'une contrefaçon d'un objet et système correspondant | |
DE102004053562B4 (de) | Verfahren und Vorrichtung zur Bereitstellung von Kartenrohlingen | |
DE102007016329B4 (de) | Authentifizierbares Etikett sowie Vorrichtung zum Authentifizieren eines authentifizierbaren Etiketts | |
EP3338254B1 (fr) | Appareil de verification de document | |
DE102022130403A1 (de) | Verfahren zur Identifizeriung eines Fahrzeugs und System zur Durchführung des Verfahrens | |
EP1519307A1 (fr) | Dispositif d'identification pour des passeports et procédé | |
DE102019214227A1 (de) | Verfahren und Einrichtung zum Prüfen der Originalität eines Produkts | |
DE102023002639A1 (de) | System und Verfahren zur Ermöglichung der Verwaltung der Aggregate eines Fahrzeugs | |
DE202019104720U1 (de) | System zur Überprüfung der Zusammengehörigkeit eines Fahrzeugs und dieses identifizierende Identifizierungskennzeichen | |
DE202022100737U1 (de) | Ladungstransportsystem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20240118 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) |