WO2002054667A1 - Dispositif et procede de protection de documents ou de verification de l'authenticite d'un document, par utilisation d'une information chiffree elaboree par le procede, et documents proteges par ladite information chiffree - Google Patents
Dispositif et procede de protection de documents ou de verification de l'authenticite d'un document, par utilisation d'une information chiffree elaboree par le procede, et documents proteges par ladite information chiffree Download PDFInfo
- Publication number
- WO2002054667A1 WO2002054667A1 PCT/FR2001/004200 FR0104200W WO02054667A1 WO 2002054667 A1 WO2002054667 A1 WO 2002054667A1 FR 0104200 W FR0104200 W FR 0104200W WO 02054667 A1 WO02054667 A1 WO 02054667A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- algorithm
- base
- character
- encrypted
- calculation
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
Definitions
- Device and method for protecting documents or verifying the authenticity of a document by using encrypted information produced by the method, and documents protected by said encrypted information.
- the present invention relates to a device and method for protecting documents or verifying the authenticity of a document, by using encrypted information produced by the method, and documents protected by said encrypted information.
- the invention applies, for example to any identity or regulatory documents or to any document requiring a certain authenticity, in particular to documents and nominative documents of legal or natural persons, such as residence permits, work permit, security card social security or health insurance, passport, registration card, driving license, hunting or fishing license, or other titles, forms or documents issued by the authorities of a country.
- the object of the present invention is to overcome this drawback by proposing, first of all, a method for preparing encrypted information.
- the method produces encrypted information from character strings and numerical values of determined size and representing headings to be protected in order to identify falsifications of administrative documents or documents issued by public authorities, characterized in that 'it comprises : a step of condensing these chains into several numbers of n digits of size smaller than the number representative of the size of the chains to constitute a first. set of m intermediate results of 1 n digits; a step of transforming these m intermediate results, by an algorithm drawn randomly from among several, into a second result of n digits expressed in base 10 produced by a matrix for converting the characters of an alpha numerical base into numerical characters of a base decimal stored by a calculation system; a stage of conversion of this second result expressed in base
- the alphabetic character strings and the numerical values contained in the protected headings form, after conversion to a decimal base, the terms of algebraic functions constituting each of the algorithms, one of which is drawn randomly among several, numbered with ( 0 to n-1), the number of the algorithm used for the transformation being fixed by the modulo 'n) of the decimal value of the character (x), drawn randomly or chronometrically in an interval of the clock time, between two terminals.
- the result of the transformation by the asymmetric mathematical function of this algorithm is then expressed in a base (y) which is also drawn randomly between two other bounds.
- this result is always represented by a constant number n of characters, the rows of which are numbered and contain units expressed in this base (y) drawn at random.
- the character (x) which determines the base (y) used to determine the so-called encrypted result is chronologically inserted among the characters which represent this encrypted result, at rank (q) defined by the integer quotient of the value of (x) divided by (n), shifting by one row to the left, the characters of the encrypted result having a weight equal to or greater than the defined rank.
- the random key character (x) is inserted at a predetermined rank by the designers of the calculation or calculated device.
- the character strings of determined size and representing headings to be protected in order to identify falsifications of administrative documents or issued by public authorities consist of truncations of alphabetical headings' formed by long alphanumeric entry fields in which are taken into account that a significant and constant number of characters belonging to a base 36 for converting these truncations into figures between 0 and 35, the memory registers concerned and not indicated being set to zero.
- the method elaborates encrypted information from a first truncation of the name of a being and a second truncation on a second information identifying the living being by the steps which consist: a) in converting into integer each of the letters of the two truncations in decimal numbers; b) to calculate for each numerical value representative of a • character an intermediate result; c) adding each of the intermediate results to obtain a first result called name code and representative of coded patronymic information; d) determining a second result called Ident Spy according to a “random” algorithm drawn randomly from among several; e) generating an encrypted identifier, of the same size as the two truncations from the number representative of the second result obtained in the previous step, a plurality of numerical values representative of characters by a plurality of conversion algorithms executed on this result and transform the digital values thus obtained into output and between 0 and 61 in letters or numbers by using a conversion matrix defined by a base chosen randomly for this calculation which makes it possible to obtain
- the method consists in inserting a character representative of the base number used in the preceding calculation and in inserting a second character representative of the position of insertion of the first character and of the algorithm number used in step d .
- step a) the conversion of step a) is obtained by using a first determined base for transforming characters into figures.
- each intermediate result is constituted by the numerical value corresponding to the character of a character string constituting a truncation multiplied by the value of the base at a power corresponding to the value of the rank of the character in the string.
- each “random” algorithm drawn at random takes into account the name code, a date identifying a significant event in the living being and the algorithm number used to develop this result.
- the random algorithm whose number is drawn randomly to be used in step d is determined by:
- each of the intermediate results of the algorithm defined in step b) is obtained by multiplying the numerical value representing the character belonging to one of the truncations by the numerical value representative of the base raised to a power corresponding in the reverse order of the corpuscles organized according to the first then the second truncations, then possibly the other truncations.
- Another aim is to propose a device for protecting documents or verifying the authenticity of a document.
- This object is achieved by the fact that the device for protecting documents or verifying the authenticity of a document includes means for entering and storing character strings and numerical values of determined size and representing headings to protect to identify falsifications of administrative documents or documents issued by public authorities;
- the strings of characters and of numerical values consist of at least one truncation of the name and of other information identifying a being and the device comprises means of memorizing a date representative of an event related to the 'to be.
- the document protection device comprises means for selecting a second calculation algorithm chosen randomly from several algorithms, this second calculation algorithm developing, from the numerical value obtained and the date of the event, a second numerical result.
- the document protection device comprises a printer making it possible, on the one hand, to write legible alphabetical information making it possible to identify the natural or legal person, for example the name, and second information such as, for example. example the first name, identifying the being and on the other hand on the document an authentication number consisting of the encrypted identifier and the two characters inserted in the encrypted identifier.
- the device for verifying the authenticity comprises means of introducing a truncation of the identification of the natural or legal person, for example, the name and the first name identifying the being, means of introducing the authentication number of the document and of the calculation means allowing, by an algorithm executed on a second character placed in a fixed position, to determine, firstly the position of the first character representative of the identifier of a calculation base and secondly the number of the algorithm drawn at random and used in the conversion calculation to convert the alphabetical information constituted by the first and second truncation of the identifiers of the natural or legal person into an encrypted code which will be compared with the value of the encrypted code obtained from the document's authenticity number.
- Another object of the invention is to provide a protected document.
- the protected document includes, in addition to the identification information of the person in possession of the document, information calculated from a determined truncation on the identification of the natural or legal person, by example the name, the first name and the date of birth, according to a calculation algorithm defined randomly among a plurality of algorithms after conversion of the truncation in a first base, the calculated information is then expressed in a determined calculation base randomly to form an encrypted identifier, a representative character of the random basis of calculation being inserted into the encoded information in a position random defined by a character inserted in a given position, this fixed character representative position in the first base calculation , a value whose quotient by a prime number, provides the position of the id character tification of the random coding base and the rest of the quotient the number of the algorithm drawn randomly from the plurality of algorithms.
- FIG. 1 shows a schematic view of the steps of an alternative implementation of the method for calculating encrypted information allowing authentication of a document
- FIG. 3 shows a schematic view of the steps of a second variant of implementation of the method of calculating encrypted information allowing authentication of a document.
- the method implemented by the device consists in introducing into a first stored register of the device of the invention an alphabetical information representative of a truncation fixed at 5 characters, the identifier of the natural or legal person for example, the name of the person for whom the document is issued and whose document must be protected against fraud or whose authenticity is sought in the document presented.
- a second memorized register containing two other characters
- the user enters a second alphabetical information representative of a truncation of a second identifying word in letters, for example the first name.
- a keyboard associated with the means known to those skilled in the art allows this operation.
- a display device associated with the calculation device allows the user to check the accuracy of the information entered or calculated.
- a third register we introduce the 6 digits representing a significant event characteristic of the being or the legal person for which an authority seeks to verify the authenticity of a document or whose authority seeks to protect a document that she will give it to him.
- This event can be for example the date of birth, if it is an identity document or the date of obtaining the document or authorization, for, for example, a hunting or driving license or an import authorization.
- This step is represented by step (E1) of FIG. 1.
- Each of the letters of the first and second truncations is converted during a step (E2) by the use of a correspondence matrix in a first fixed base. or determined, for example of rank 36 as defined in appendix 1, between the letters of the truncations and the numerical values defining this base.
- Each of the values V1 to V7 thus elaborated constitutes an intermediate result which will be added to the other intermediate results in step (E4) to give a first result 32259388798 called "code name" .
- the computing device will apply an algorithm chosen randomly from a plurality of algorithms.
- step (E5) shows for example in FIG. 2 that the random algorithm number 2 is chosen since the random drawing has released the number 2.
- step (E6) of the algorithm number 2 on the value representative of the first result “code-name” to which is added the digital truncation constituted, for example, by the third truncation, to enable the production of a second result which is identified in FIG. 2 by the name Ident Spy. From this second result 32258828708 thus obtained by application of this algorithm, the calculation device will produce in step (E7) n alpha-numeric values C0, C1, ..., Cn.
- the number n of numerical values obtained from of the second result corresponds to the same number of characters in the first and second registers containing the stored truncations.
- Each of the n calculation algorithms executed by the calculation device is as follows.
- the first algorithm divides the second result by the value (61) of the rank of the fixed base chosen at random as an output, for example between bases of rank 37 to 63, all raised to the power n-1 (n representing the position by counting from the right of the calculated numerical value Cj.
- the device thus calculates a first result of which it arranges the decimal part ' in a register and retains the whole part as the first numerical value CO.
- the character CO is 0.
- the numerical values CO to C6 obtained are represented in appendix 3 by a table of these values C0 to Cn.
- Each of these values C1 to Cn will be transformed in step E9 into an alphabetic character or figure by the use of a conversion matrix according to a base whose number is drawn randomly in step (E8) between a base whose rank is between the values 37 and 63.
- Each of these values represented in appendix 3 and converted into the base of rank 61 will correspond to a letter or a number.
- This transformation will thus allow step E9 to develop an encrypted identifier called “cryptident” (FIG. 2).
- the device will insert at step (E12) in this encrypted identifier a first character "Key 1" deduced by a determined algorithm from the rank of the base.
- step E11 After having converted the representative number of the rank (61) of the base into a character z by a conversion algorithm represented in the column Choice Base output of the matrix of appendix 2, a another random draw allows in step E11, to define the insertion position of this first character "Key 1" basic output conversion and an algorithm for calculating a second character “Key 2" to define the position of the first character “Key 1", by exploiting the "random" algorithm number used in step E5 and the numerical value representative of the position drawn at random in step (E10), to extract a value numeric transformed in a fixed calculation base of rank 36 represented annex 1 in an alphabetic or numeric character Key 2, (I in the example figure 2, X in the example figure 1).
- This second character Key 2 is inserted in step (E12) in a fixed position determined by the device to define Information that is called "spynumber".
- the document protection device will understand these different algorithms, the storage means and the definition of the fixed position of the position character as well as the matrix tables for converting the different numerical values obtained during the calculations to convert these numerical values. in letters or numbers.
- the row entry base (36), appendix 1 is defined by the first 9 digits to which are added the 26 letters of the alphabet in lowercase letters.
- the extension of the characters included in the base of rank (63) is defined by adding after the capital letters the character dash and the character dot, as represented in appendix 2 column Value Character .
- the document authentication device allows, after entering the letters in the registers defining the truncation, to recalculate an encrypted identifier, which will be compared to the cryptident authentication numbers deducted from the "Spy number" represented in the example of Figure 2 on the document. If the encrypted identifier value, calculated by using the encryption base whose position is defined by the position character and by using an algorithm number defined by the position character, gives the same value as that appearing on the document, then the document is authentic.
- the encrypted identity can be used to decrypt representative information, for example from a photo or fingerprints of the individual stored in a database file data.
- the device can thus display or receive by download the photo or imprint associated with the identity thus certified.
- FIG. 3 represents another variant embodiment of the present invention which relates to a method of developing encrypted information from character strings (Ch1 to Ch4) and numeric value chains (Ch5 to Ch7) representing headings to be protected in order to identify falsifications of administrative documents or documents issued by public authorities.
- These strings (Ch1 to Ch7) are then condensed into a plurality (11 to 14) of intermediate results each comprising a number n of determined digits less than the number of characters and numerical values of the string. Then these intermediate results are transformed, by an algorithm A x drawn randomly among several (n), into a second result (20) of n digits expressed in base 10 elaborated by a conversion matrix in a decimal base memorized by the calculation system .
- This second result (20) expressed in base 10 is then transformed into another result (30) said to be encrypted with " same number of digits, expressed in a mathematical base chosen randomly by the calculation system to obtain an encrypted identifier.
- the base is randomly chosen by a random draw algorithm from the calculation system and from a certain number of conversion bases available and stored by the calculation system
- the alphabetic character strings and the numerical values contained in the protected headings form, after conversion into a decimal base, the intermediate results (11 to 14) which constitute the terms of the algebraic function of the algorithm A x , drawn randomly from among several (n) , numbered from (0 to n-1), and fixed by the modulo (n) of the decimal value of a character (x), drawn randomly or chronometrically in an interval of the clock time, between two terminals by the device Calculation.
- the different algebraic functions can be constituted by the different combination of additions or subtractions between intermediate results
- a random key character (x) which determines the base (y) used to determine the so-called encrypted result is chronologically inserted among the characters which represent this result, at rank (q) defined by the integer quotient of the value of (x) divided by (n), by shifting by one row to the left, the characters of the result having a weight equal to or greater than the defined row.
- the random key character (x) is inserted at a predetermined rank by the designers of the calculation device or calculated
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002555034A JP2004523155A (ja) | 2000-12-28 | 2001-12-26 | 文書を保護するための装置及び方法、該方法によって生成された暗号化された情報を使用することによって文書の真正性を検証するための装置及び方法、及び前記暗号化された情報によって保護された文書 |
EP01989661A EP1346512A1 (fr) | 2000-12-28 | 2001-12-26 | Dispositif et procede de protection de documents ou de verification de l'authenticite d'un document, par utilisation d'une information chiffree elaboree par le procede, et documents proteges par ladite information chiffree |
CA002433224A CA2433224A1 (fr) | 2000-12-28 | 2001-12-26 | Dispositif et procede de protection de documents ou de verification de l'authenticite d'un document, par utilisation d'une information chiffree elaboree par le procede, et documents proteges par ladite information chiffree |
US10/451,951 US20040062389A1 (en) | 2000-12-28 | 2001-12-26 | Method and device for protecting documents or for verifying authenticity of a document using an encrypted information produced by said method, and documents protected by said encrypted information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR00/17185 | 2000-12-28 | ||
FR0017185A FR2819068B1 (fr) | 2000-12-28 | 2000-12-28 | Dispositif et procede de protection de documents ou de verification de l'authenticite d'un document, par utilisation d'une information chiffree elaboree par le procede, et documents proteges par ladite information |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002054667A1 true WO2002054667A1 (fr) | 2002-07-11 |
Family
ID=8858312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2001/004200 WO2002054667A1 (fr) | 2000-12-28 | 2001-12-26 | Dispositif et procede de protection de documents ou de verification de l'authenticite d'un document, par utilisation d'une information chiffree elaboree par le procede, et documents proteges par ladite information chiffree |
Country Status (6)
Country | Link |
---|---|
US (1) | US20040062389A1 (fr) |
EP (1) | EP1346512A1 (fr) |
JP (1) | JP2004523155A (fr) |
CA (1) | CA2433224A1 (fr) |
FR (1) | FR2819068B1 (fr) |
WO (1) | WO2002054667A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004006498A2 (fr) * | 2002-07-04 | 2004-01-15 | Eracofa Sa | Procede, systeme et support informatique de securisation de transmission de messages |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7809843B1 (en) * | 2003-09-18 | 2010-10-05 | Intel Corporation | Globally unique identification in communications protocols and databases |
FR2881900B1 (fr) * | 2005-02-09 | 2007-04-27 | Algoril Holding Sa | Procede de cryptographie de messages a cle privee, et application a une installation |
US7574446B2 (en) * | 2006-12-06 | 2009-08-11 | Catalyst Repository Systems, Inc. | Converting arbitrary strings into numeric representations to facilitate complex comparisons |
CN101661546B (zh) * | 2008-08-28 | 2012-12-19 | 深圳富泰宏精密工业有限公司 | 在手持行动电子装置中进行文件加密的系统及方法 |
CN101719138B (zh) * | 2009-12-04 | 2011-08-10 | 上海生物电子标识有限公司 | 动物个体溯源的方法及其设备 |
CN102279935B (zh) * | 2009-12-04 | 2013-06-12 | 上海生物电子标识有限公司 | 兼容多标准编码规则的动物电子标识 |
US20170012775A1 (en) * | 2014-10-17 | 2017-01-12 | Philip J. Lafer | Encryption Methods and Apparatus |
US11516192B2 (en) * | 2019-12-19 | 2022-11-29 | Augustine Fou | System and method for combinatorial security |
CN112417468B (zh) * | 2020-10-26 | 2024-04-05 | 杭州趣链科技有限公司 | 数据处理方法、装置、电子设备及计算机存储介质 |
CN115179515B (zh) * | 2022-05-31 | 2023-04-18 | 海天机械(广东)有限公司 | 一种用于注塑机快速切换模具数据的系统及方法 |
CN117007946B (zh) * | 2023-10-07 | 2023-12-22 | 深圳市拓普泰克技术股份有限公司 | Pcba的自动化测试管理方法及相关装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5485519A (en) * | 1991-06-07 | 1996-01-16 | Security Dynamics Technologies, Inc. | Enhanced security for a secure token code |
JPH10242956A (ja) * | 1997-02-28 | 1998-09-11 | Nec Commun Syst Ltd | 秘話装置 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5003596A (en) * | 1989-08-17 | 1991-03-26 | Cryptech, Inc. | Method of cryptographically transforming electronic digital data from one form to another |
-
2000
- 2000-12-28 FR FR0017185A patent/FR2819068B1/fr not_active Expired - Fee Related
-
2001
- 2001-12-26 WO PCT/FR2001/004200 patent/WO2002054667A1/fr active Application Filing
- 2001-12-26 CA CA002433224A patent/CA2433224A1/fr not_active Abandoned
- 2001-12-26 US US10/451,951 patent/US20040062389A1/en not_active Abandoned
- 2001-12-26 JP JP2002555034A patent/JP2004523155A/ja active Pending
- 2001-12-26 EP EP01989661A patent/EP1346512A1/fr not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5485519A (en) * | 1991-06-07 | 1996-01-16 | Security Dynamics Technologies, Inc. | Enhanced security for a secure token code |
JPH10242956A (ja) * | 1997-02-28 | 1998-09-11 | Nec Commun Syst Ltd | 秘話装置 |
Non-Patent Citations (1)
Title |
---|
PATENT ABSTRACTS OF JAPAN vol. 1998, no. 14 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004006498A2 (fr) * | 2002-07-04 | 2004-01-15 | Eracofa Sa | Procede, systeme et support informatique de securisation de transmission de messages |
WO2004006498A3 (fr) * | 2002-07-04 | 2004-04-15 | Eracofa Sa | Procede, systeme et support informatique de securisation de transmission de messages |
Also Published As
Publication number | Publication date |
---|---|
CA2433224A1 (fr) | 2002-07-11 |
JP2004523155A (ja) | 2004-07-29 |
US20040062389A1 (en) | 2004-04-01 |
FR2819068B1 (fr) | 2005-08-26 |
FR2819068A1 (fr) | 2002-07-05 |
EP1346512A1 (fr) | 2003-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US3985998A (en) | Personal authority verification system | |
US6212638B1 (en) | Method for generating unpredictable authentication identification symbols | |
EP0229006B1 (fr) | Procédé et appareil vérifiant l'authenticité de documents liés à une personne et l'identité de leurs porteurs | |
EP0998731B1 (fr) | Procede et systeme de paiement par cheque electronique | |
US6212504B1 (en) | Self-authentication of value documents using encoded indices | |
WO2002054667A1 (fr) | Dispositif et procede de protection de documents ou de verification de l'authenticite d'un document, par utilisation d'une information chiffree elaboree par le procede, et documents proteges par ladite information chiffree | |
HUE026760T2 (en) | Secure element identification and authentication system and non-cloning properties | |
EP2237546A1 (fr) | Dispositif et processus de protection de document numérique, et processus correspondant pour vérifier l'authenticité d'une copie papier imprimée | |
EP0097110B1 (fr) | Procédé de contrôle de l'usage de documents réservés | |
US20050182729A1 (en) | Method of preventing counterfeiting | |
US11030282B2 (en) | Method and device for securing a document, method and device for control corresponding thereto and secure document | |
JP2001511544A (ja) | 数値ハッシュ機能を使用する文書またはメッセージ機密保護配置 | |
EP0708949B1 (fr) | Procede pour produire une cle commune dans deux dispositifs en vue de mettre en oeuvre une procedure cryptographique commune, et appareil associe | |
FR2578340A1 (fr) | Systeme de reconnaissance de personnes | |
KR100879961B1 (ko) | 이미지 퍼즐형 키코드와, 이를 이용한 정보 보안시스템 및그 방법 | |
US8297521B2 (en) | Two part code | |
CN107209970A (zh) | 基于制造涉及的不同工艺的相对位置变化的度量来证实和认证安全证件的方法 | |
EP3017421B1 (fr) | Procédé d'impression d'éléments graphiques de sécurité interdépendants | |
EP1747526B1 (fr) | Procédé de masquage d'une donnée numérique, telle que par exemple une empreinte biometrique | |
CN111553791A (zh) | 数字现金对象货币及其生成方法、系统、设备和存储介质 | |
FR2842050A1 (fr) | Procede et systeme de securisation de transmission de messages | |
CN102236778A (zh) | 一种识读防伪编码的方法 | |
DK167082B1 (da) | Formular og fremgangsmaade til udvaelgelse af en kode, der skal hemmeligholdes | |
RU2202827C2 (ru) | Способ формирования ценного документа (варианты) | |
FR2733457A3 (fr) | Procede de numerotation de securite de papiers-valeurs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2433224 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002555034 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001989661 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10451951 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2001989661 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |