WO2005107359A2 - Systeme et procede de verification et d'echange d'informations - Google Patents

Systeme et procede de verification et d'echange d'informations Download PDF

Info

Publication number
WO2005107359A2
WO2005107359A2 PCT/IB2005/001209 IB2005001209W WO2005107359A2 WO 2005107359 A2 WO2005107359 A2 WO 2005107359A2 IB 2005001209 W IB2005001209 W IB 2005001209W WO 2005107359 A2 WO2005107359 A2 WO 2005107359A2
Authority
WO
WIPO (PCT)
Prior art keywords
subscriber
information
document
verification
token
Prior art date
Application number
PCT/IB2005/001209
Other languages
English (en)
Other versions
WO2005107359A3 (fr
Inventor
Ziegfried Septimus Leopold Kritzinger
Original Assignee
The Hollies Family Trust
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by The Hollies Family Trust filed Critical The Hollies Family Trust
Publication of WO2005107359A2 publication Critical patent/WO2005107359A2/fr
Publication of WO2005107359A3 publication Critical patent/WO2005107359A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means

Definitions

  • This invention relates to a system and method for verifying and exchanging information and more specifically, to a system and a method for enabling verified information to be accessed and exchanged remotely.
  • a system for verifying information comprising a remotely accessible processor and a store of information configured to receive information of a subscriber, to receive a verification relating to the information from a verification entity and to indicate such verification.
  • Further features of the invention provide for the information to include electronic documents; for the electronic documents to be electronically-generated documents; alternatively electronic copies of paper documents.
  • Still further features of the invention provide for the remotely accessible processor to be configurable to make the electronic documents available to at least one user once verification thereof has been received.
  • Yet further features of the invention provide for the system to be configured to provide the at least one subscriber with at least one reference token relating to each electronic document received from the subscriber; and for the verification entity to access an electronic document relating to the subscriber using at least the reference token relating to that document and to submit verification of the document.
  • Still features of the invention provide for the system to enable the subscriber to define an access token for each document of the subscriber.
  • Yet further features of the invention provide for the system to enable at least one user to access the store of information and view a document using the reference token in combination with the access token.
  • system to include a facility by which a verified subscriber can digitally sign a verified document.
  • Still further features of the invention provide for the system to include a facility for a first verified subscriber to make information available to at least one other verified subscriber.
  • Yet further features of the invention provide for the information to be a typed message, a document requiring signature, or a contract.
  • the information to be personal information of a subscriber. Further features of this aspect of the invention provide for the subscriber to select a subscriber token with which to access the store of information relating to the subscriber; and for the verification entity to select a verification entity token with which to access the store of information.
  • Still further features of this aspect of the invention provide for the subscriber token to include the identity number of the subscriber and at least one password; and for the verification entity token to include the identity number of the verification entity and at least one password.
  • Yet further features of this aspect of the invention provide for the remotely accessible processor to be an Internet accessible server and the store of information to be an electronic database.
  • the invention also provides a method of verifying information comprising the steps of: storing information of a subscriber on a remotely accessible store of information; receiving a verification relating to the information from a verification entity; and storing the verification on the store of information.
  • the information to include electronic documents; and for the electronic documents to be electronically-generated documents; alternatively electronic copies of paper documents.
  • the remotely accessible processor to be configurable to make the electronic documents available to at least one user once verification thereof has been received.
  • Yet further features of the invention provide for the method to include providing the at least one subscriber with at least one reference token relating to each electronic document received from the subscriber; and for the verification entity to access an electronic document relating to the subscriber using at least the reference token relating to that document and to submit verification of the document.
  • Further features of the invention provide for the method to include enabling at least one user to access the store of information and view a document using at least the reference token that relates to that document.
  • Still features of the invention provide for the method to include enabling the subscriber to define an access token for each document of the subscriber.
  • Yet further features of the invention provide for the method to include enabling at least one user to access the store of information and view a document using the reference token in combination with the access token.
  • Still further features of the invention provide for the system to include a facility for a first verified subscriber to make information available to at least one other verified subscriber.
  • Yet further features of the invention provide for the information to be a typed message, a document requiring signature, or a contract. Further features of the invention provide for the system to record each verified subscriber's signature to the document and record the details of such signature.
  • the information to be personal information of a subscriber.
  • Still further features of this aspect of the invention provide for the subscriber token to include the identity number of the subscriber and at least one password; and for the verification entity token to include the identity number of the verification entity and at least one password.
  • Yet further features of this aspect of the invention provide for the remotely accessible processor to be an Internet accessible server and the store of information to be an electronic database; and for the subscribers, verification entities and users to be personal computers connected to the Internet and controlled by individual persons.
  • Figure 1 is a diagrammatic representation of a system for verifying information according to the invention
  • Figure 2 is a diagrammatic representation of a first step of verifying the personal information of subscribers and verification entities which includes the registration of subscribers and verification entities
  • Figure 3 is a diagrammatic representation of a second step of verifying the personal information of subscribers and verification entities which includes the verification of the personal information by a previously verified verification entity
  • Figure 4 is a diagrammatic representation of the submission of information by the subscriber to the system
  • Figure 5 is a diagrammatic representation of the verification of the information submitted by the subscriber
  • Figure 6 is a diagrammatic representation of the accessing of the verified information by users.
  • a system (1) for verifying information is illustrated in Figure 1.
  • the system (1 ) includes a processor, in this case a remotely accessible server (2) operating under the control of software, and a store of information, in this embodiment an electronic database (3).
  • the remotely accessible server (2) hosts an Internet- accessible website through which three distinct entities interact with the system (1), namely subscribers (4), verification entities (5) and users (6).
  • the subscribers (4), verification entities (5) and users (6) are all individuals that access the system (1) using personal computers connected to the Internet.
  • the verification entity (5) will typically be a person endorsed by the state such as a commissioner of oaths. These include attorneys, notaries, registered accountants and public officers. It will be appreciated that where the actions of the system (1) are described with reference to single subscribers (4), verification entities (5) and users (6), such actions apply equally to others of the group.
  • the first step in utilising the system is the once-off registering of the subscribers (4) and verification entities (5) and is represented in Figure 2.
  • a subscriber (4) registers with the system (1) by accessing the website through a network connection such as a first Internet dial-up connection (7) and submitting personal details, such as full names, identity, passport numbers or social security numbers, physical and postal addresses and the like.
  • the personal information is completed on a standard form provided on the website.
  • the subscriber (4) also defines a password that, together with a unique identifier of the subscriber (4), such as the subscriber's identity number, forms a subscriber token for that subscriber (4).
  • the subscriber Once logged on to the system (1) with its identity number and password, the subscriber enters a secure area with 128 BIT SSL encryption on all further transactions. For additional security, the subscriber (4) can be prompted to define a second password and, when accessing the system (1), be required to enter a randomly generated subset of the characters of the second password to gain access to the system (1 ).
  • a verification entity (5) registers with the system (1) by accessing the website through a network connection such as a second Internet dial-up connection (8) and submits the necessary details, such as full names, physical address, designation and details of credentials, by completing a form on the website.
  • the verification entity (5) also defines a password which, together with the verification entity's identity or reference number, forms a verification entity token for the verification entity (4).
  • the verification entity (5) can also be prompted to define a second password with which to access the system (1) in the manner described above.
  • a subscriber (4) may transact with the system by uploading electronic copies of paper documents or electronically-generated documents which a verification entity (5) then verifies.
  • the verification entity (5) may not transact further with the system at all until its personal information has been verified.
  • the second step is the verification of the personal information submitted by the subscriber (4) and verification entity (5) and is represented in Figure 3.
  • the subscriber (4) and the verification entity (5) visit a previously verified verification entity (5b) in person.
  • the previously verified verification entity (5b) then accesses the system (1) through a network connection such as a third Internet dial-up connection (10), and logs on to the system (1) using its verification entity token.
  • the existing verification entity (5b) submits the subscriber's identity number and the system (1 ) then displays the personal information submitted by the subscriber (4).
  • the existing verification entity (5b) compares the displayed personal information with the personal information handed to it by the subscriber (4), such as the subscriber's identity document, passport, utility bills and the like. If satisfied that the personal information displayed by the system (1 ) is correct, the existing verification entity (5b) submits verification of the information, and the system (1 ) records and displays such verification. Verification of the identity of the verification entity (5) is made in the same way.
  • a first feature of the system (1) is a document managing facility for the submission, verification and exchange of documents.
  • a subscriber (4) may submit electronic documents to the system. This is shown in Figure 4.
  • the subscriber (4) accesses the processor (2) through the first dial-up connection (7) and logs on to the system (1) by submitting its identity number and passwords.
  • the subscriber (4) then submits an electronic document, which may be an electronic copy of a paper document or an electronically-generated document, to the system (1) by uploading the relevant file from his/her personal computer to the database (3).
  • the system (1) then provides the subscriber (4) with a reference token for the submitted document.
  • the verification step is shown in Figure 5.
  • the subscriber (4) either provides the verification entity (5) with the original copies of the paper documents or visits the verification entity (5) in person, as the case may be in order to satisfy the verification entity (5).
  • the subscriber (4) also gives the reference token relating to the electronic document that it wants verified to the verification entity (5).
  • the verification entity (5) then accesses the processor (2) through the second dial-up connection (8) and logs on to the system (1) using its identity number and passwords.
  • the verification entity (5) submits the reference token and the system (1 ) then displays the document submitted by the subscriber (4). If the verification entity (5) is satisfied that the document is a true copy of the original, the verification entity (5) submits verification of the document and the system (1) receives and stores the verification.
  • the document managing facility enables a subscriber to define the access it wishes to allow to the verified document. If the subscriber (4) merely wants the document to be stored on the database (3), for example to ensure that a secure verified copy of the original document exits, it can specify that no third parties should be allowed to view the document. Should the need arise to access the verified documents, such as where important documents have been lost or are not readily available, a subscriber (4) can access the verified copies from anywhere in the world. The access to the documents can, of course, be altered at a later stage should the subscriber (4) wish to make them available to third parties.
  • the facility also allows the subscriber (4) to make the document accessible to all third party users (6) permanently, for a certain number of times or until a specified date.
  • the subscriber (4) may also control access of the document by defining a document access token, for example a password, for that specific document.
  • the document managing facility further enables the subscriber (4) to mark a document as deleted, to rename a document and to digitally or electronically sign a document it has uploaded to the database (3).
  • marking a document as deleted the document becomes invisible to the subscriber (4), but is not physically deleted from the database (2). This enables documents to be recovered, and enables full auditing and rollback of the system (1).
  • the document managing facility prompts the subscriber (4) to agree with the legal implications of such signature, for example that any addressee may accept the fact that the document was signed by the subscriber (4) personally at the date and time indicated by the electronic signature. If the subscriber (4) agrees, the system (1) records the date and time of signature.
  • the document managing facility also allows the subscriber (4) to make an electronic document available to a third party user (6).
  • This is shown in Figure 6.
  • the subscriber (4) defines the document access, in the manner described above, to enable third parties users (6) to view the document and gives the document reference token and the document access token to a third party user (6) it wants to be able to view the document.
  • the user (6) who does not need to register on the system (1), then accesses the processor (1) through a network connection such as a fourth Internet dial-up connection (9) and submits the reference token and password of the document.
  • the system (1) displays the verified document. If the electronic document has been verified, the system (1) displays a certificate indicating the verification, and if the electronic document has been signed, the system (1) similarly displays a certificate indicating such signature.
  • a second feature of the system (1) is a secure messaging facility that enables secure messages to be sent between verified subscribers (4).
  • the secure messaging facility includes an address book of verified subscribers associated with each subscriber (4).
  • a message can only be sent to an addressee subscriber if that subscriber has agreed that it be added to the address book of the requesting subscriber (4).
  • the requesting subscriber (4) submits the subscriber's identity number and the system (1) then generates a message to the addressee subscriber requesting whether it accepts that it be added to the requesting subscriber's address book. Once the addressee subscriber has accepted, the requesting subscriber (4) can submit a secure message to the addressee subscriber.
  • Any document previously uploaded by the subscriber (4) to the database (2) may be attached to the message.
  • the document managing facility also integrates with the secure messaging facility by providing a folder into which documents can be placed which are then automatically shared with selected subscribers (4) in the address book.
  • the exchange of messages or documents in this fashion is highly secure and not susceptible to eavesdropping, as all communication takes place between logged-on subscribers and is encrypted using industry standard 128 BIT SSL encryption.
  • a third feature of the system (1 ) is a contract managing facility that allows verified subscribers (4) to view, exchange and electronically or digitally sign contracts.
  • the facility enables verified subscribers (4) to submit electronic documents to the database (2), to define any of their documents as contracts, to define the access allowed to each contract in the same manner as for documents, and to send the contract to any of the recipients on the subscriber's address book.
  • the system (1) in turn prompts the recipient subscriber (4) to indicate its agreement or non- agreement by electronically or digitally signing the contract or by repudiating the contract, and records the date and time of signature by each party.
  • the system (1) can be configured to notify all the subscribers (4) by email when a subscriber (4) indicates agreement or non-agreement.
  • a fourth feature of the system (1) is a notification facility that notifies verified subscribers (4) of activity on their account.
  • a subscriber (4) may specify the events for which it wishes to receive notification, including when secure messages are read or received, when a contract requiring signature is received or signed and when a request for addition to another subscriber's address book is received. Notification may be by way of an email message to the subscriber (4), or a text message sent to the subscriber's mobile telephone.
  • a fifth feature of the system (1) is a verification agent locating facility that assists subscribers (4) in locating verification agents (5).
  • the facility enables logged-on subscribers (4) to locate verification entities closest to the physical address supplied by the subscriber (4).
  • the subscriber (4) may specify the area in which it wishes to locate a verification agent (5), and the facility will display a list of verification agents (5) in that area.
  • the system (1 ) also includes a trace log that records all the activity of a logged- on subscriber (4), including subscriber registration, login and verification, document uploads, viewing, downloads and verification, and personal detail changes.
  • the trace log enables a full audit of activity on the system (1) to be conducted.
  • the system (1 ) allows specified personal details of a subscriber (4), such as the contact details and login details, to be modified by that subscriber (4).
  • Personal details relating to the identity of a subscriber (4) such as the full names, identity number and physical address of the subscriber (4), cannot be modified by that subscriber (4) but only by that subscriber (4) visiting a verification entity (5).
  • the system can be configured to enable verification entities and subscribers to transact with the system through a software environment integrated with existing diary and communications management software such as Microsoft Office Outlook®.
  • the system could also do so. This could be done, for example, by the subscriber creating an account for a user and specifying the email address of the user that it wants to access the information. The system could then generate a reference token and email it to the user. The system could generate a unique document reference token for each user specified by the subscriber, thus enabling the system to monitor user access.
  • the system can support any number of subscribers, verification entities and users.
  • the dial-up connections (7 to 10) could instead be any suitable electronic medium, a written medium, oral medium or any other method of communication or combination of the aforegoing.
  • the subscribers (4), verification entities (5) and users (6) may be individuals, groups of individuals, companies, groups of companies or any other corporate entities, legal persons or combinations of such entities.
  • any suitable processor and store of information can be used and that the operation of these can easily be configured through suitable software.
  • Such software largely enables the various facilities of the invention to be provided by the system.
  • the system can be accessible through any suitable communications network, including public and private networks. Uploading of information can take place through any of the means by which data can be converted into an electronic format and sent to a processor.
  • the technical problem solved by the invention is that of providing a means for the efficient provision of information which is verified as being either correct or an exact copy of a document.
  • the system enables verified information to be made simultaneously available to any number of users at different geographical.
  • the verified information can be made instantly available and does not require that the original document leave the control of the person responsible for it.
  • the invention also facilitates the manner in which contracts can be entered into by verifying that the document being viewed is the same for all parties at different locations, that is cannot be changed and that the parties have in fact agreed to the contents thereof.
  • the invention assists travellers by obviating the need to carry original copies of documents such as driving licences or proof of identity.
  • the information on the system can be used at embassies to quickly verify identity and so hasten the process of providing new travel documents.
  • the invention therefore provides a system and a method for verifying information that enables verified documents to be accessed from a remote location, thereby facilitating the exchange of verified documents and reducing the risk of fraud over a communications network.
  • the invention further provides a system and a method for verifying the identity of parties transacting over an electronic communications network, thus reducing the risk of identity theft.
  • the invention also provides a platform for the secure exchange of information between transacting parties, and a platform for digitally or electronically signing and exchanging electronic contracts and other electronic documents.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un système et un procédé de vérification et d'échange d'informations, permettant l'accès à distance à des informations vérifiées et leur échange. Ce système comprend une mémoire d'informations accessible à distance, configuré pour recevoir les informations sur un abonnés, pour recevoir une vérification des informations d'une entité de vérification, pour indiquer ladite vérification et pour mettre lesdites informations à la disposition d'au moins une utilisateur tiers.
PCT/IB2005/001209 2004-05-05 2005-05-04 Systeme et procede de verification et d'echange d'informations WO2005107359A2 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
ZA2004/3386 2004-05-05
ZA200403386 2004-05-05
ZA200404241 2004-05-31
ZA2004/4241 2004-05-31
ZA200406286 2004-08-06
ZA2004/6286 2004-08-06

Publications (2)

Publication Number Publication Date
WO2005107359A2 true WO2005107359A2 (fr) 2005-11-17
WO2005107359A3 WO2005107359A3 (fr) 2006-04-06

Family

ID=35320616

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/001209 WO2005107359A2 (fr) 2004-05-05 2005-05-04 Systeme et procede de verification et d'echange d'informations

Country Status (1)

Country Link
WO (1) WO2005107359A2 (fr)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030028495A1 (en) * 2001-08-06 2003-02-06 Pallante Joseph T. Trusted third party services system and method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030028495A1 (en) * 2001-08-06 2003-02-06 Pallante Joseph T. Trusted third party services system and method

Also Published As

Publication number Publication date
WO2005107359A3 (fr) 2006-04-06

Similar Documents

Publication Publication Date Title
US8356187B2 (en) Methods and systems for providing a secure electronic mailbox
US8959595B2 (en) Methods and systems for providing secure transactions
JP3871300B2 (ja) 企業間での職務ベースの認可のための方法
US20090271321A1 (en) Method and system for verification of personal information
US20070150299A1 (en) Method, system, and apparatus for the management of the electronic files
US20030051144A1 (en) Dynamic electronic chain-of-trust document with audit trail
US20030078880A1 (en) Method and system for electronically signing and processing digital documents
US20070093234A1 (en) Identify theft protection and notification system
US20080127331A1 (en) Method, system, and apparatus for linked personas authenticator
US20080235766A1 (en) Apparatus and method for document certification
EP2047646B1 (fr) Procédé et système de distribution électronique de courrier important
JP2005502927A (ja) 認証済みの電子オリジナル・ドキュメントの電子的伝送、格納、および取り出しのためのシステムおよび方法
GB2471072A (en) Electronic document verification system
US20090025092A1 (en) Secure online data storage and retrieval system and method
TWI247514B (en) Secure messaging center
US20080235175A1 (en) Secure Document Management System
JP5645674B2 (ja) デジタル契約システム
WO2001071637A1 (fr) Appareil de traitement de documents electroniques et procede de traitement
US20050188204A1 (en) Electronic notary service
KR100453616B1 (ko) 투표자 등록자들과 같은 등록자를 등록하기 위한 방법, 컴퓨터 판독 가능한 매체, 투표자 등록 컴퓨터 시스템
JP2002259897A (ja) 電子書類処理装置及び方法
WO2005107359A2 (fr) Systeme et procede de verification et d'echange d'informations
KR20020084642A (ko) 공개키 기반구조의 전자서명문서 발급/수신시스템
JP2003016176A (ja) 手続システム
KR100519599B1 (ko) 전자인증 서비스 장치 및 방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

WWE Wipo information: entry into national phase

Ref document number: 200608951

Country of ref document: ZA

Ref document number: 2006/08951

Country of ref document: ZA

NENP Non-entry into the national phase in:

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase
122 Ep: pct application non-entry in european phase

Ref document number: 05747561

Country of ref document: EP

Kind code of ref document: A2