WO2005015516A1 - Procede de reperage anti-vol par etiquette rfid, etiquette et base-station le mettant en oeuvre - Google Patents
Procede de reperage anti-vol par etiquette rfid, etiquette et base-station le mettant en oeuvre Download PDFInfo
- Publication number
- WO2005015516A1 WO2005015516A1 PCT/IB2004/051553 IB2004051553W WO2005015516A1 WO 2005015516 A1 WO2005015516 A1 WO 2005015516A1 IB 2004051553 W IB2004051553 W IB 2004051553W WO 2005015516 A1 WO2005015516 A1 WO 2005015516A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- code
- value
- label
- read
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2465—Aspects related to the EAS system, e.g. system components other than tags
- G08B13/2485—Simultaneous detection of multiple EAS tags
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10316—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves using at least one antenna particularly designed for interrogating the wireless record carriers
- G06K7/10356—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves using at least one antenna particularly designed for interrogating the wireless record carriers using a plurality of antennas, e.g. configurations including means to resolve interference between the plurality of antennas
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0036—Checkout procedures
- G07G1/0045—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
- G07G1/0054—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader with control of supplementary check-parameters, e.g. weight or number of articles
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G3/00—Alarm indicators, e.g. bells
- G07G3/003—Anti-theft control
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2465—Aspects related to the EAS system, e.g. system components other than tags
- G08B13/2482—EAS methods, e.g. description of flow chart of the detection procedure
Definitions
- the present invention relates to a method and a device for identifying an object. It applies, in particular to the identification of objects stolen from stores.
- Background Art [2] We know systems in which a reader ('base-station' or base station) controls the responses of electronic labels, this system is called, in English 'System Reader Talk First' or 'RTF'. The vast majority of electronic labels are today based on this principle. Disclosure of Invention Technical Problem [3] [4] These systems allow you to read objects with 'loose' labels. Reading them, however, is slow compared to the speed at which a person who has stolen an object from a store passes near a gantry. They are therefore not well suited to the realization of anti-theft function, in particular when a plurality of products are stolen.
- the present invention relates, according to a first aspect, to an electronic label comprising: [9] - a memory retaining a code comprising a plurality of rows,
- [12] - adapted control means in response to a read interrogation from a base station, to cause the reading means to read the value of the code in at least one row and to send, in return, by an antenna, a response signal, and, in response to a write query from a base station, to modify the code in said memory,
- control means are adapted: [14] - when passing the label near a first base station, to write a value representative of the passage near said first base station in a predetermined rank of the code and
- the first base station being placed at the checkout of the store and the second base station near an exit from the store, if the label is associated with a stolen object, during the passage to near the second base station, the first response from the label is sufficient to determine that the object has not gone to the checkout.
- control means are adapted, when passing the label near the first base station, to write the value representative of the passage near the first base station in a row of code which is read first by the second base station during the read query received from said second base station.
- control means are adapted to cause the said antenna to transmit a response signal during a time interval which depends on the value read by the reading means and
- the value representative of the passage near the first base station at said predetermined rank of the code is the value which corresponds, chronologically, to the first signal transmission time interval.
- the present invention relates, according to a second aspect, to a method of communication between an electronic label and at least two base stations, said electronic label comprising:
- control means in response to a read interrogation from a base station, to cause the read means to read the value of the code in at least one row and to send, in return, by an antenna, a response signal, and, in response to a write query from a base station, to modify the code in said memory
- the value representative of the passage close to the first base station is written in a rank of the code which is read first by the second base station during the read interrogation received from said second base station.
- the method as succinctly set out above comprises, in response to interrogations originating from the second base station, a step of transmitting a response signal during an interval of time which depends on the value of said code in a row, the value representative of the passage near the first base station at said predetermined rank of the code being the value which corresponds, chronologically, to the first signal transmission time interval.
- the present invention aims, according to a third aspect, a base station, called “second”, for communicating with an electronic tag, said base station comprising at least one antenna for transmitting read interrogations to said tag and to receive, in response, from the label, a signal representative of the value in at least one row of a code kept by said label, characterized in that it comprises a means of detecting absence of passage of said label near another base station called 'first', according to the first response sent by said label in response to a read interrogation.
- said detection means is adapted to detect the absence of passage of said antenna near the first base station when said first response is made, chronologically, during the first time interval of signal transmission.
- said second base station comprises at least two pairs of antennas adapted to generate electromagnetic fields of different geometries and the base station is adapted to successively transmit signals by each of said pairs of antennas.
- said second base station is adapted to sequentially control the emission of interrogations and the reception of responses with pairs of geometry antennas different generating non-coplanar electromagnetic fields.
- FIG. 6 represents steps implemented by two base stations and a label passing successively near said base stations
- FIG. 7 shows steps implemented by base station and a label passing only near said base station.
- the term “near” means at a distance at which communication between an electronic tag and a base station is established. It can therefore mean the same relationship between the label and the base station as 'in the vicinity' in the sense of certain technical fields.
- the 'system' that is to say all the base stations and electronic tags, uses synchronized communications between the reader and the tags, that is to say that the tags receive and communicate in perfect synchronism with the reader, which is preferable for implementing the present invention.
- the information transmitted between a base station and a tag is transmitted in amplitude modulation (Amplitude Shift Keying) carried by the magnetic supply field.
- amplitude modulation (called SK 50% ').
- SK 50% ' amplitude modulation transmission
- the system can thus transmit a succession of orders or 'interrogations' to the labels.
- a specific communication protocol successively ensures: [49] 1. - synchronization of all the labels with the reader and their phasing,
- the communications created between the reader and the labels are recalled here.
- the reader via the magnetic field emitted, feeds the labels suitably positioned on a given axis.
- a label which is not well fed by the x axis will be ipso facto by the y axis or even by the z axis.
- the first order sent to the labels is an 'unblocking' order which unlocks all the labels present.
- the reader successively searches for the identifier of each label.
- the latter sends a validation order which indicates to the labels (or to the label which has just responded) that their transmission has been properly received.
- the response from the labels is sent to the winding which is used to supply the label and to transmit orders ('information').
- the labels after having been synchronized and put in phase on the clock of the reader, decode the orders and answer the questions emitted by the reader by coming 'short-circuit' alternation on two of the signal present at the terminals of the coil of the 'label (this for a period originally programmed).
- Identification in bulk in a volume is preferably done using a deterministic algorithm which begins with the sending of a wake-up signal from all the labels suitably supplied by the axis concerned.
- the labels which are not correctly fed are temporarily unable to respond to the reader and can only do so on another axis, on which they will be suitably polarized.
- the second instruction sent by the reader makes it possible to unlock the temporary inhibitions and positions the address pointer of all the labels on the address '0'. It is recalled here that the code kept by each label has a plurality of rows, or address or digits, each row of the code possibly having a plurality of values.
- the labels confirm their presence by sending information to the reader, and wait for orders.
- the reader then begins identifying the identifiers of the labels present; a first digit identification order is issued.
- the labels respond after dividing the time into intervals of fixed duration. If the label has a value of 'zero' in its first digit, it responds immediately in the interval following the order received. If the answer is a 'one', the answer takes place in the next interval, etc.
- This blocking order is immediately followed by a presence test order which removes the temporary inhibitions of the other labels and which allows, as long as there are unblocked and not yet identified labels, to continue the identification of all labels.
- the presence test command makes it possible to remove inhibitions and to re-position the address pointer, at address 0.
- the system includes a special synchronization of the labels which detect in which electrical positions they are in relation to the field of the reader. Depending on their respective position, they work on a clock identical to the clock transmitted by the reader, or they work with a complementary clock (ie opposite in phase). Therefore, the responses transmitted by two labels normally opposite in phase will always be in phase for the reader, regardless of the position of the labels and all the responses can be added.
- An RFID tag is, very schematically, made up of a coil (N turns of copper or aluminum wires wound to make a flat coil), at the center of which is placed the integrated circuit (IC).
- IC integrated circuit
- the door reader or 'second base station' is based on a technology with two symmetrical panels. Each panel consists of several antennas (A, B, C, D, E, see Figures 1 to 5) which are fed sequentially (in turn) to generate a magnetic field in the entire space defined between the two panels.
- the antenna 1A of panel 1 and the symmetrical antenna 2A of panel 2 are grouped in series or in parallel and supplied by the same power card. If the antennas 1A and 2A are in series, they will be traversed by the same current I generated by the power card. If the two antennas 1A and 2A are in parallel, they will be traversed by half of the current delivered by the power card.
- Classical laws also apply to magnetic structures.
- the choice of serial or parallel connection depends on the inductance value of the antenna.
- the power cards are capable of driving inductances ranging from a few tens of ⁇ H to a few hundred ⁇ H.
- the labels have integrated read and write circuits (chip with rewritable memory E2PROM) and include a unique identifier (UID), for example of 18 digits.
- a unique identifier for example of 18 digits.
- these read-only circuits are all programmed with a 'zero' as the first digit.
- the first base station causes the writing of the first digit at the maximum value that it can take, for example 'eight'.
- reading only the first digit at the second base station requires only a very short identification time, thus making it possible to perform the anti-theft function ('EAS') in three dimensions and by moving through the reader antenna of the second base station, or 'door reader'.
- 'EAS' anti-theft function
- the codes kept by the labels are representative of the passage near the first base station, at the checkout.
- the detection of the labels present in the volume is made only on the first digit which we have seen, above that its value depends on the passage near the first base station.
- a multi-axis identification on a single digit allows the passage without stopping of a man in step.
- complete identification of the labels present requires a stop of a few seconds (depending on the number of labels) when passing through the door reader, the second base station.
- the system switches to identification mode, with the client stopping between the panels, and provides the complete list of code values for the labels present in the door reader field.
- the labels which have not yet passed close to the first base station have the same first digit 'zero' and the labels which have already passed close to the first base station has a different first digit 'eight'.
- the identification system performs a sequential scan of the 5 axes only on the first digit so as to very quickly detect a label that has not passed close to the first base station.
- the antennas capable of creating magnetic fields are placed most outside relatively easily because in the axis (or roughly) of the coils.
- Two antennas can be grouped in the same structure:
- a Heln holtz coil makes it possible to generate a homogeneous magnetic field on the axis of the two coils but compliance with standards at 10 meters (ETS 300 330) very strongly limits the current which can supply coils of large dimensions (0.9 m by 1.8 m).
- the elmholtz coils are only there to create a field in the center of the panels (see Figure 2).
- the eight on the bias ensures the essential by creating a magnetic field in the center of the loops of the eight in accordance with the ETS 300 330 recommendations.
- the field is zero on the bias wire.
- the Helmholtz coil fades to this lacuna.
- a second layer corresponds to the structures creating magnetic fields vertically. An eight creates a field in the center of the volume. A double eight creates fields in the upper quarter and in the lower quarter (see Figure 3).
- a last layer (from the outside) has only one winding creating a magnetic field from front to back of the useful volume. It corresponds to a vertical eight (figure 4).
- the strands (at least the center of the strands) are separated by 30 mm.
- the door reader then goes into identification mode (for example by action on a switch provided for this purpose or automatically after detection of a stolen object), that is to say that it reads the value of l 'set of codes of all the labels present in its reading area.
- the system therefore identifies all of the digits which constitute each identifier.
- the 5 axes making up the door reader are supplied sequentially. Identification is carried out axis by axis. The identifiers of the labels fed on each axis are stored. At the end of identification, the program performs the synthesis and displays the detected codes only once, even if they have been seen several times.
- an antenna 1 called “helmoltz”, in FIG. 2, an antenna 10, called in “eight at an angle”, in FIG. 3, an antenna 11, called “horizontal eight”, in Figure 4, an antenna 12, called 'double eight' and, in Figure 5, an antenna 13, called 'vertical eight'.
- step 100 by construction or at the time of entry into the store of the labels, all the labels have, in the rank of the code, preferably in the rank of the code which is read first. by the second base station, a predetermined value, preferably, the value which corresponds to the quickest response, that is to say, chronologically, at the first time interval available for the response, from a query from the second base station.
- the label enters into communication with the first base station, for example during a payment phase for an object which carries said label.
- the first base station writes a value representative of the passage near said first base station in a predetermined rank of the code.
- this predetermined rank is the rank of the code which is read first by the second base station.
- the first base station writes, in the first row read from the label code, a value which corresponds to a slower response to a read interrogation carried out by the second base station, than the value present in this row at the end of step 100.
- the label comes into communication with the second base station, for example at the door of the store.
- the second base station controls the reading of the code value for at least the predetermined rank where the first base station may have written during step 110, preferably the first row read by the second base station.
- the label responds to the second base station, if no other label has responded before it and supplies it with the value of the code in this rank, that is, in the case illustrated in FIG. 6, the value written, in this rank of the code, by the first base station during step 110.
- the second base station can therefore determine whether the object has been stolen, by searching for the value written by the first base station during step 110.
- theft detection is rapid.
- step 200 by construction or at the time of entry into the labels store, all the labels have, in the rank of the code, preferably in the rank of the code which is read first. by the second base station, a predetermined value, preferably, the value which corresponds to the quickest response, that is to say, chronologically, at the first time interval available for the response, from a query from the second base station.
- the label comes into communication with the second base station, for example at the door of the store.
- the second base station controls the reading of the code value for the first row read.
- the label responds to the second base station, if no other label has responded before it and supplies it with the value of the code in this rank, that is, in the case illustrated in FIG. 7, the value present, in this rank of the code, at the end of step 200.
- the second base station can therefore determine whether the object has been stolen, by searching for the value present at the end of step 200.
- theft detection is fast.
- a label of a stolen object responds faster than a label of an non-stolen object (case in Figure 6), based on a query from a second base station.
- the second base station finds that the object has been stolen and causes the display of a 'red light'.
- the second base station Either automatically or at the request of a user (for example surveillance personnel), the second base station then causes all the codes of all the objects with which the second base station can be read. communicate, step 225, and indicates which items were paid for and which items were stolen, step 230.
- the information read by the second base station to determine the theft of an object is not the unique identifier of the label, but another field kept in memory of the label.
- the second base station therefore reads the rank of the code which corresponds to this code first and, even more preferably, the value of the code in this rank is lower for a label linked to an object which did not pass near the first base station except for an object that passed there.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Electromagnetism (AREA)
- Toxicology (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Burglar Alarm Systems (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/567,775 US20070296580A1 (en) | 2003-08-12 | 2004-08-02 | Rfid Tag Theft Prevention Screening System, Tag And Base Station Therefor |
EP04769848A EP1751720A1 (fr) | 2003-08-12 | 2004-08-02 | Procede de reperage anti-vol par etiquette rfid, etiquette et base-station le mettant en oeuvre |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0309884 | 2003-08-12 | ||
FR0309884A FR2858865B1 (fr) | 2003-08-12 | 2003-08-12 | Procede de reperage antivol par etiquette rfid, etiquette et base-station le mettant en oeuvre |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005015516A1 true WO2005015516A1 (fr) | 2005-02-17 |
Family
ID=34112740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2004/051553 WO2005015516A1 (fr) | 2003-08-12 | 2004-08-02 | Procede de reperage anti-vol par etiquette rfid, etiquette et base-station le mettant en oeuvre |
Country Status (4)
Country | Link |
---|---|
US (1) | US20070296580A1 (fr) |
EP (1) | EP1751720A1 (fr) |
FR (1) | FR2858865B1 (fr) |
WO (1) | WO2005015516A1 (fr) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2741980A1 (fr) * | 1995-12-01 | 1997-06-06 | Pierre Raimbault | Procede de mise en phase d'etiquettes electroniques station d'interrogation et etiquette electronique pour sa mise en oeuvre |
US5710540A (en) * | 1992-02-11 | 1998-01-20 | Clement; Richard Marc | Security system |
EP0827123A1 (fr) * | 1996-08-26 | 1998-03-04 | Palomar Technologies Corporation | Système et procédé pour surveiller un article |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AUPO085596A0 (en) * | 1996-07-05 | 1996-07-25 | Integrated Silicon Design Pty Ltd | Presence and data labels |
US6317027B1 (en) * | 1999-01-12 | 2001-11-13 | Randy Watkins | Auto-tunning scanning proximity reader |
JP3587185B2 (ja) * | 2001-09-28 | 2004-11-10 | オムロン株式会社 | 誘導無線アンテナ、およびこれを用いた非接触データ通信装置 |
US7019651B2 (en) * | 2003-06-16 | 2006-03-28 | Sensormatic Electronics Corporation | EAS and RFID systems incorporating field canceling core antennas |
US7372364B2 (en) * | 2003-11-10 | 2008-05-13 | 3M Innovative Properties Company | Algorithm for RFID security |
-
2003
- 2003-08-12 FR FR0309884A patent/FR2858865B1/fr not_active Expired - Fee Related
-
2004
- 2004-08-02 WO PCT/IB2004/051553 patent/WO2005015516A1/fr active Application Filing
- 2004-08-02 US US10/567,775 patent/US20070296580A1/en not_active Abandoned
- 2004-08-02 EP EP04769848A patent/EP1751720A1/fr not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5710540A (en) * | 1992-02-11 | 1998-01-20 | Clement; Richard Marc | Security system |
FR2741980A1 (fr) * | 1995-12-01 | 1997-06-06 | Pierre Raimbault | Procede de mise en phase d'etiquettes electroniques station d'interrogation et etiquette electronique pour sa mise en oeuvre |
EP0827123A1 (fr) * | 1996-08-26 | 1998-03-04 | Palomar Technologies Corporation | Système et procédé pour surveiller un article |
Also Published As
Publication number | Publication date |
---|---|
EP1751720A1 (fr) | 2007-02-14 |
US20070296580A1 (en) | 2007-12-27 |
FR2858865A1 (fr) | 2005-02-18 |
FR2858865B1 (fr) | 2005-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2058947C (fr) | Procede et dispositif de comptabilisation et de controle d'articles | |
EP2856398B1 (fr) | Dispositif de protection contre le vol d'un article commercial | |
EP0586492B1 (fr) | Systeme d'identification automatique d'objets ou d'individus par interrogation a distance | |
CN105190717B (zh) | 安全标签脱离的验证系统及方法 | |
CN101178828B (zh) | 用于检测和识别不正确的防盗装置取消激活的方法和设备 | |
EP2759975B1 (fr) | Système d'étiquette, article pouvant être vendu et procédé permettant de faciliter l'achat d'un article pouvant être vendu | |
EP1369812B1 (fr) | Procédé anticollision pour module électronique sans contact | |
EP2517147B1 (fr) | Procede de protection dans une communication radiofrequence sans contact | |
US7755485B2 (en) | System and method for electronic article surveillance | |
FR2977358A1 (fr) | Systeme avertisseur de situations dangereuses en milieu agressif | |
FR2834857A1 (fr) | Transpondeur equipe d'un circuit central et d'au moins un circuit peripherique et procede d'echange de donnees entre lesdits circuits via une station en couplage inductif avec le transpondeur | |
EP0777192A1 (fr) | Procédé de mise en phase d'étiquettes, électroniques station d'interrogation et étiquette électronique pour sa mise en oeuvre | |
EP0966721A1 (fr) | Procede perfectionne de gestion des collisions dans un systeme d'echange de donnees sans contact | |
EP1751720A1 (fr) | Procede de reperage anti-vol par etiquette rfid, etiquette et base-station le mettant en oeuvre | |
EP1348204B1 (fr) | Systeme de detection du passage d'individus ou objets par une entree-sortie a un espace delimite | |
EP0957442B1 (fr) | Système d'identification électronique d'une pluralité de transpondeurs | |
WO2015136419A1 (fr) | Procédé de contrôle de l'authenticité d'un objet | |
WO2021161315A1 (fr) | Dispositif, système et procédé de sécurisation d'un article | |
WO1999060510A1 (fr) | Systeme d'identification electronique d'une pluralite de transpondeurs | |
WO2022223917A1 (fr) | Système pour un inventaire automatisé et dispositif électronique antivol amovible associé | |
EP1008093B1 (fr) | Procede et dispositif d'identification a distance | |
CA3008731A1 (fr) | Systeme de communication, systeme de fourniture de service comprenant un tel systeme de communication, et procede associe | |
FR2953669A1 (fr) | Systeme d'achat destine notamment aux surfaces de ventes | |
Volpato Filho et al. | A New Kind of Shopping Experience with no Cashier or Lines | |
FR2776409A1 (fr) | Systeme et procede d'identification de produits par identifiant aleatoire |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004769848 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2004769848 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10567775 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 10567775 Country of ref document: US |