EP1158466B1 - Procédé pour déclencher un processus dans un bâtiment - Google Patents

Procédé pour déclencher un processus dans un bâtiment Download PDF

Info

Publication number
EP1158466B1
EP1158466B1 EP01111632A EP01111632A EP1158466B1 EP 1158466 B1 EP1158466 B1 EP 1158466B1 EP 01111632 A EP01111632 A EP 01111632A EP 01111632 A EP01111632 A EP 01111632A EP 1158466 B1 EP1158466 B1 EP 1158466B1
Authority
EP
European Patent Office
Prior art keywords
key
person
building
virtual key
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP01111632A
Other languages
German (de)
English (en)
Other versions
EP1158466A1 (fr
Inventor
Kilian El.-Ing. Eth Schuster
Paul Dr.Sc.Tech. Friedli
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventio AG
Original Assignee
Inventio AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventio AG filed Critical Inventio AG
Priority to EP01111632A priority Critical patent/EP1158466B1/fr
Publication of EP1158466A1 publication Critical patent/EP1158466A1/fr
Application granted granted Critical
Publication of EP1158466B1 publication Critical patent/EP1158466B1/fr
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password

Definitions

  • the invention relates to a method for triggering an operation within a building.
  • Modern buildings in particular more complex buildings, now have a comprehensive infrastructure, such as doors in the entrance area and possibly on the respective floors with electronic access control, turnstiles with electronic access control and elevator systems, which are also equipped with access control.
  • Another case may be that an order is placed by a person working in the building or a resident of the building. However, for whatever reason, this person or the resident can not accept the ordered goods or services himself. The person or resident must therefore actively ensure that the ordered goods or services can also be received. This can usually be done by instructing the person or resident to hire another person to do the job for them. If such a person is not available or if there is a misunderstanding, the ordered product or service is not receivable, which in turn can have corresponding consequences.
  • the font EP0924657A discloses an apparatus for automatically verifying the identity of a person seeking remote access to a protected item.
  • the device includes a personal identification device with a sensor for reading biometric data to identify that person.
  • the apparatus comprises storage means for storing biometric reference data for identifying a person authorized to access the protected item.
  • the apparatus comprises correlation means for comparing the stored biometric reference data with the biometric data of the person seeking access and determining whether they match.
  • the apparatus includes and means for securely transmitting the identity confirmation to an access controller via a communication network, the access controller providing access to the protected item upon receipt of the identity confirmation.
  • An object of the invention is therefore to provide a method for triggering an operation within a building in which certain components of the infrastructure of the building are provided in a secure manner, automatically and error-free to an authorized person.
  • the object is achieved by a method for triggering a passage within a building having the features specified in claim 1.
  • a virtual key is generated by a specific event.
  • the virtual one Key is then transmitted to a person. If the authorized person identifies himself by the key, the process is triggered in the building.
  • the key is assigned a specific code by means of an encryption method.
  • the process controls an elevator located in a building.
  • Another advantage of the invention is that it checks which means of the person to be authorized are available to identify himself and of which a suitable one is selected.
  • a key already exists in the event that a key already exists, it is checked whether it meets the security requirements and optionally generates a new or a supplemented key.
  • the person identifies himself upon receipt of the key.
  • the figure shows a flow chart for the inventive method for triggering an operation within a building.
  • Triggering element is as shown in the figure a specific event.
  • the event can be an emergency call, an order, an order, for example for a cleaning service, an invitation or even a periodically recurring event, for example a condition monitoring or a service.
  • a key or virtual key is to be understood as a code.
  • the event also determines which person should be authorized. For example, if the triggering event is an emergency call, this event must call the ambulance, whereas if the triggering event is a personal invitation from a building dweller, the guest (s) should be invited.
  • a secret word for example, a secret word, a secret number, a sentence, a symbol or a picture in question.
  • the person to be authorized is determined, and it has been determined whether there are means available from the person to be authorized that can serve as a key, it is checked whether the quality of an optionally present key is the Requirements are sufficient. If this is not the case, a new key is generated or the existing key is supplemented to the extent that this satisfies the requirements for the key.
  • a suitable key After a suitable key has been generated, it is transmitted to the authorized person.
  • the method of transmission depends on the means available to the authorized person. If the authorized person has a mobile telephone, the transmission can take place via an air interface. However, if the key has to be transmitted to a fax machine, the transmission will generally be wired. The type of transmission of the key depends on the technical conditions.
  • an identification of the authorized person can already take place upon receipt of the key. This can be done for example by biometric features, such as the voice of the recipient or his fingerprint.
  • biometric features such as the voice of the recipient or his fingerprint.
  • the key is used.
  • the use ie application of the key by entering the secret number, the secret word or the like on a keyboard, the detection of the key in spoken form by a microphone on the building or the biometric features of the authorized person by a corresponding to the building arranged biometric sensor.
  • the key After entering the key, the key is checked for validity. If the key is found to be invalid, for example, if the key is only applicable for a certain period of time, by too late an application, it will be rejected. The person is not allowed in the building, the process is not triggered.
  • the process is triggered, for example the doors of the building are opened, the elevator is made available and the elevator doors are opened, any existing safety barriers are unlocked.
  • Another process may be the transmission of a message to the sender of the key.
  • the user of the key can be informed of a way information as he reaches the person who has sent the key.
  • a welcome message of the person or other information that has been deposited for the authorized user can now be played.
  • the triggered process can also be an automatic one Driving the elevator to the destination floor include.
  • the process can also be an acknowledgment of the delivery of the goods or services.
  • the invention automatically generates and delivers an electronic key for granting access to certain areas due to external events such as e-mail, request for help, detection of fire, and so on. This means that there is an automatic implication of triggering event on the need for access and the necessary precautions (provision and shipping of the key) are made. For example, the requirement of an emergency doctor by means of an emergency transmitter results in the delivery of a code to the doctor. The doctor identifies himself with the access control system in order to be able to reach the patient unhindered.
  • the electronic key can be embodied, for example, in the form of a binary number or sequence of numbers.
  • the key persons involved in generating the key, distributing and using the key are the order broker (for example, the person to be visited), the visitor and an administrative body.
  • Various forms and methods of identification and authentication are possible, such as those provided by "public key cryptography".
  • public key cryptography please refer to the publication of RL Rivest, A. Shamir, L. Adleman "A Method for Obtaining Digital Signatures and Public-key Cryptosystems", 1977 directed.
  • a coding method is described in which a Encryption key is publicly accessible without making the decryption key publicly accessible.
  • the method is also known as RSA method.
  • the key may also be a PIN code, an identifier, a telephone number or a secret word. Greater protection against abuse can be achieved by using a public key for authentication and using appropriate encryption methods for communication.
  • public keys based on an authentication are distributed. If a user is to be granted access or other rights, he or she will be granted his rights, presented in numerical form and secured by means of the public key. In the application of the rights, the decryption takes place, which ensures that the proclaimed rights, such as access, have been assigned by a legitimized body.
  • a signature process can be attached, which allows a corresponding proof to third parties.
  • the key can have different information. So it is possible that a part of the key is a signature of the recipient or the administrator. Another part of the key can describe the triggering event itself. It is also possible to add information to the key, including, for example, the access rights, that is, who, where and when to have access. In addition, it can be noted in the key what kind of law should be. Finally it is it is possible to store in the key only a reference or pointer (pointer) representing a reference to the memory address under which the administrator has deposited the additional information.
  • pointer pointer
  • the key can be stored completely or partially at one or more locations. If the key is stored completely in several places, this means a high degree of redundancy and thus a high access security, but also an increased danger of abuse. Saving the key in full form in several places may be helpful, for example, in the event of a fire in the building.
  • the information stored in the key can be transmitted to the building's own receiver, for example via an infrared interface (IrDA) or via a Bluetooth radio interface of a mobile telephone.
  • IrDA infrared interface
  • Bluetooth radio interface of a mobile telephone.
  • IrDA Infrared Data Association
  • IrDA Infrared Data Association
  • Bluetooth is intended for short-range voice and data traffic at 2.4 GHz in the ISM band.
  • the range is between 10 cm and 10 m, but can be extended by increasing the transmission power up to 100 m.
  • the generation and distribution of the key may be done by various means, such as an alarm trigger, the building management office or a third party.
  • the generation of the key is automatically based on an indication such as is given by an alarm triggering.
  • further information and instructions may be communicated, such as a road map, a restriction of visiting hours or operating instructions.
  • a communication connection between the key sender and the key holder can be established.
  • the sender of the key or the Administrator may be notified in the event of misbehavior of the key and / or tampering attempts.
  • the key can be embedded in a higher-level program, so that, for example, an operating program is transmitted together with the key to a mobile telephone with WAP browser.
  • the phone can then be used as a user interface to, among other things, apply the key.
  • the key owner ie the authorized person, the sender of the key or a third party.
  • a key If a key is not used, it can trigger certain actions, such as a message to the recipient of the key to remember.
  • the type of information can be determined by the key itself and / or be requested through the castle.
  • the information may include, for example, visitor details such as personnel number, preferred room temperature, or communication skills.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Claims (13)

  1. Procédé pour déclencher un processus à l'intérieur d'un bâtiment,
    selon lequel un type d'événement est fixé,
    un type de processus est rendu dépendant du type d'événement,
    ce qui est rendu dépendant du type d'événement, c'est à quelle personne autorisée une clé virtuelle est transmise,
    une clé virtuelle est générée par un événement défini, la clé virtuelle est transmise grâce à l'événement défini à la personne autorisée,
    dès que la personne autorisée est arrivée au bâtiment, la clé virtuelle est utilisée,
    dans le bâtiment le processus est déclenché si la personne autorisée s'identifie à l'aide de la clé.
  2. Procédé selon la revendication 1, selon lequel un code défini est attribué à la clé virtuelle à l'aide d'un procédé de chiffrage.
  3. Procédé selon l'une des revendications 1 ou 2, selon lequel la clé virtuelle est accompagnée d'une signature avec laquelle le destinataire de la clé virtuelle peut justifier auprès de tiers de sa qualité de personne autorisée.
  4. Procédé selon l'une des revendications 1 à 3, selon lequel le processus ouvre des portes dans le bâtiment.
  5. Procédé selon l'une des revendications 1 à 3, selon lequel le processus fournit un ascenseur dans le bâtiment et ouvre des portes d'ascenseur.
  6. Procédé selon l'une des revendications 1 à 3, selon lequel le processus commande un ascenseur dans le bâtiment.
  7. Procédé selon l'une des revendications 1 à 3, selon lequel le processus commande un trajet automatique de l'ascenseur jusqu'à l'étage de destination.
  8. Procédé selon l'une des revendications 1 à 3, selon lequel le processus débloque d'éventuelles barrières de sécurité dans le bâtiment.
  9. Procédé selon l'une des revendications 1 à 3, selon lequel le processus communique à un utilisateur de la clé virtuelle une information de trajet lui indiquant comment arriver jusqu'à la personne qui a émis la clé virtuelle.
  10. Procédé selon l'une des revendications 1 à 9, selon lequel on vérifie si une clé virtuelle de la personne autorisée à qui la clé virtuelle est transmise existe déjà, et la clé existante est éventuellement modifiée.
  11. Procédé selon l'une des revendications 1 à 10, selon lequel on vérifie de quels moyens la personne autorisée dispose pour justifier de sa qualité, et un moyen approprié est sélectionné parmi ses moyens.
  12. Procédé selon l'une des revendications 1 à 11, selon lequel pour le cas où une clé virtuelle existe déjà, on vérifie si cette clé satisfait aux exigences de sécurité, et une clé virtuelle nouvelle ou complétée est éventuellement générée.
  13. Procédé selon l'une des revendications 1 à 12, selon lequel la personne autorisée s'identifie lors de la réception de la clé virtuelle.
EP01111632A 2000-05-25 2001-05-14 Procédé pour déclencher un processus dans un bâtiment Expired - Lifetime EP1158466B1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP01111632A EP1158466B1 (fr) 2000-05-25 2001-05-14 Procédé pour déclencher un processus dans un bâtiment

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP00810454 2000-05-25
EP00810454 2000-05-25
EP01111632A EP1158466B1 (fr) 2000-05-25 2001-05-14 Procédé pour déclencher un processus dans un bâtiment

Publications (2)

Publication Number Publication Date
EP1158466A1 EP1158466A1 (fr) 2001-11-28
EP1158466B1 true EP1158466B1 (fr) 2012-03-07

Family

ID=26073894

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01111632A Expired - Lifetime EP1158466B1 (fr) 2000-05-25 2001-05-14 Procédé pour déclencher un processus dans un bâtiment

Country Status (1)

Country Link
EP (1) EP1158466B1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104528482B (zh) * 2014-10-16 2016-05-04 渤海大学 电梯与单元防盗门一体化管理控制***及控制方法
DE102018215835A1 (de) * 2018-09-18 2020-03-19 Conti Temic Microelectronic Gmbh Zugangssystem und Verfahren zur Zugangsverifizierung

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4023139A (en) * 1974-10-24 1977-05-10 Gene Samburg Security control and alarm system
ES8400623A1 (es) * 1981-08-25 1983-10-16 American District Telegraph Co "un sistema de seguridad con multiples niveles de acceso".
JPH01141685A (ja) * 1987-11-30 1989-06-02 Ryutaro Kishishita スロットマシン
FR2722596A1 (fr) * 1994-07-13 1996-01-19 France Telecom Systeme de controle d'acces limites a des places horaires autorisees et renouvables au moyen d'un support de memorisation portable
US6038666A (en) 1997-12-22 2000-03-14 Trw Inc. Remote identity verification technique using a personal identification device

Also Published As

Publication number Publication date
EP1158466A1 (fr) 2001-11-28

Similar Documents

Publication Publication Date Title
EP0063794B1 (fr) Dispositif et procédé pour contrôler une identité
EP0875871B1 (fr) Méthode et système d'authorisation dans des systèmes de transfert de données
EP2415029B1 (fr) Procédé et dispositif destinés au contrôle d'accès
DE69734898T2 (de) Verfahren und system zur absicherung von fernsprech-anrufssteuerungseinrichtungen
DE69735166T2 (de) Verfahren und einrichtung zur sicherung der ferndienstleistungen der finanzinstitute
DE60306627T2 (de) Dynamisches sicherheitssystem
EP2255516B1 (fr) Procédé permettant une personnalisation temporaire d'un dispositif de communication
EP1942466A2 (fr) Dispositif de communication, d'accès et de surveillance ainsi que procédé de communication, d'accès et de surveillance
EP1254436A1 (fr) Procede de controle de l'identite d'un utilisateur
EP3729385A1 (fr) Système de contrôle d'accès avec authentification radio et acquisition de mot de passe
EP3729384A1 (fr) Système de contrôle d'accès avec identification radio et reconnaissance faciale
CN108364376A (zh) 一种门禁与打卡一体的考勤方法
CN1172271C (zh) 启始大楼内过程的方法
EP1158466B1 (fr) Procédé pour déclencher un processus dans un bâtiment
EP2996299B1 (fr) Procédé et système d'autorisation d'une action sur un système auto-commandé
DE102005062632A1 (de) Automatische Verwaltung des Aufenthalts von Personen in Räumlichkeiten von Gebäuden
DE19542732B4 (de) Verfahren zur Erkennung des Mißbrauchs einer Zugangsberechtigung
EP1752928A1 (fr) Procédé destiné au contrôle d'entrée d'une zone accessible à des personnes, en particulier pour une pièce fermée par une porte
EP1935202A1 (fr) Deblocage de cartes de telephonie mobile
DE102010063401A1 (de) Verfahren zum Bereitstellen eines Zugangs
CN212933600U (zh) 一种具有防数据篡改上传的门禁管理设备
DE102006022315A1 (de) Anordnung und Verfahren zum Erstellen eines Frankierabdrucks
DE10063015B4 (de) Zugangskontrollsystem
DE102021126959A1 (de) Zusatzmodul für Manipulationsschutz eines Sensors
DE102010048870B4 (de) Verfahren und Gerät zur Einrichtung eines neues Benutzers in einer zugangsbeschränkten elektronisch angesteuerten Einrichtung

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

17P Request for examination filed

Effective date: 20020417

AKX Designation fees paid

Free format text: AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

17Q First examination report despatched

Effective date: 20090930

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 548716

Country of ref document: AT

Kind code of ref document: T

Effective date: 20120315

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 50116065

Country of ref document: DE

Effective date: 20120503

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2382616

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20120611

REG Reference to a national code

Ref country code: NL

Ref legal event code: T3

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120608

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120307

REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1042154

Country of ref document: HK

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120307

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120709

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120307

26N No opposition filed

Effective date: 20121210

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 50116065

Country of ref document: DE

Effective date: 20121210

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120514

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120514

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 16

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 17

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20190521

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20200527

Year of fee payment: 20

Ref country code: ES

Payment date: 20200609

Year of fee payment: 20

Ref country code: FI

Payment date: 20200520

Year of fee payment: 20

Ref country code: FR

Payment date: 20200528

Year of fee payment: 20

Ref country code: TR

Payment date: 20200507

Year of fee payment: 20

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 20200527

Year of fee payment: 20

Ref country code: IT

Payment date: 20200522

Year of fee payment: 20

Ref country code: GB

Payment date: 20200528

Year of fee payment: 20

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20200728

Year of fee payment: 20

REG Reference to a national code

Ref country code: NL

Ref legal event code: MM

Effective date: 20200601

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 548716

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200514

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200514

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200601

REG Reference to a national code

Ref country code: DE

Ref legal event code: R071

Ref document number: 50116065

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: GB

Ref legal event code: PE20

Expiry date: 20210513

REG Reference to a national code

Ref country code: FI

Ref legal event code: MAE

REG Reference to a national code

Ref country code: BE

Ref legal event code: MK

Effective date: 20210514

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20210513

REG Reference to a national code

Ref country code: ES

Ref legal event code: FD2A

Effective date: 20211108

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20210515