EP3362999B1 - Procédé de vérification d'un document, document et système informatique - Google Patents

Procédé de vérification d'un document, document et système informatique Download PDF

Info

Publication number
EP3362999B1
EP3362999B1 EP16788643.1A EP16788643A EP3362999B1 EP 3362999 B1 EP3362999 B1 EP 3362999B1 EP 16788643 A EP16788643 A EP 16788643A EP 3362999 B1 EP3362999 B1 EP 3362999B1
Authority
EP
European Patent Office
Prior art keywords
document
computer system
image
signature
check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP16788643.1A
Other languages
German (de)
English (en)
Other versions
EP3362999A1 (fr
Inventor
Helmut Moritz MAXEINER
Steffen Scholze
Matthias DR. SCHWAN
Frank Müller
Elke DR. FILZHUTH
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bundesdruckerei GmbH
Original Assignee
Bundesdruckerei GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei GmbH filed Critical Bundesdruckerei GmbH
Publication of EP3362999A1 publication Critical patent/EP3362999A1/fr
Application granted granted Critical
Publication of EP3362999B1 publication Critical patent/EP3362999B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Definitions

  • the invention relates to a method for checking a document, in particular a value and / or security document.
  • the invention also relates to a document and a computer system for carrying out such a method.
  • JPH11-198573 discloses a method in which an image and a code encoding the image are applied to a document. For checking purposes, the image can be calculated from the code and compared with the image on the document.
  • document-specific information can be stored in a background system, for example a server computer system.
  • the document-specific information can be, for example, blocking information, a period of validity or other information that can confirm or refute the validity of the document.
  • a user computer system can, for example, read out document data from the document and send a release request to the server computer system via a secure connection to check the document.
  • the release request usually contains encrypted document data that is decrypted by the server computer system for verification.
  • the server computer system can use the decrypted data to access the document-specific information stored for this data and send release information as a function of the stored information.
  • the object of the invention is therefore to provide a method, a document and a computer system which enable a document to be checked, with the greatest possible anonymity of the user being guaranteed.
  • Embodiments of the invention are particularly advantageous since the check feature sent to the server computer system was determined not only from the document information but also from a random value, so that the check feature cannot be traced back to the document data is possible.
  • no data from the document owner, but only the anonymized test feature is sent to the server computer system. It is therefore not possible for person-specific data to be stored on the server computer system.
  • a "user” is understood to mean a natural person.
  • a “value, identification or security document” is understood in the following to be a paper and / or plastic-based document on which person-specific and / or document-specific information is applied in an optically legible manner, identifying the user or the document, for example for approval and use of certain services or functions.
  • the document can also be a voucher or an access card.
  • the document can be a “Machine Readable Travel Document (MRTD)” as specified by the International Aviation Authority (ICAO).
  • MRTD Machine Readable Travel Document
  • IAO International Aviation Authority
  • Such a document enables the holder to be identified using an online process.
  • Embodiments of the invention enable an MRTD to be identified offline when a network is not available.
  • information is understood to mean all details that are applied to the document and relate to a person and / or the document or enable the person and / or the document to be identified.
  • the information is personal data or data with which a release can be made for certain services.
  • the information can be designed for a one-time authentication of the document, for example in the case of a voucher. After a one-time authentication, the document can be locked for re-authentication. Alternatively, however, the information can also be provided for repeated authentication, with a defined number of authentication processes also being conceivable and no further authentication being possible after this number has been reached.
  • optical sensor is understood to mean a sensor or an interface via which information can be optically recorded.
  • the optical sensor is a camera.
  • a “user computer system” is understood here to mean a computer system to which the user has access. This can be, for example, a personal computer (PC), a tablet PC or a telecommunications terminal, in particular a smartphone.
  • the user computer system has an interface for connection to a communication network, it being possible for the communication network network to be a private or public network, in particular the Internet. Depending on the embodiment, this connection can also be established via a cellular network.
  • the user computer system also has an optical sensor for capturing the information.
  • a "telecommunication terminal” is understood here to mean a portable, battery-operated device with an interface for a communication network, in particular a mobile phone, a smartphone or a portable computer such as a laptop, notebook or tablet PC with an interface for the communication network.
  • the interface for the communication network can be a cellular radio interface or an interface for other wired or wireless communication, such as a Bluetooth and / or a WLAN interface.
  • Interfaces are understood here to mean any devices on the computer system or on the telecommunication terminal via which a connection to a communication network can be established.
  • the interfaces can be designed, for example, for wireless communication with a communication network. However, it is also possible for the interfaces to be designed to connect the computer system or the telecommunication terminal to a wired communication network.
  • a “communication network” is understood here to mean any type of telecommunication network into which the user computer system, in particular the telecommunication terminal, can dial with an interface.
  • this term includes telecommunication networks which work according to a mobile radio standard, such as a GSM, UMTS, CDMA or an LTE standard.
  • Communication networks such as wired internet networks, wireless LAN networks or connections via Bluetooth or another interface of the telecommunication terminal are also possible.
  • a connection to the Internet can be established, for example, via such a communication network. Alternatively, the connection can be established directly via a WLAN network, a Bluetooth connection or another short-range connection.
  • a “server computer system” is understood to mean a data processing system which can automatically confirm or deny the identity of a user to third parties.
  • the server computer system can be an eID provider computer system.
  • An “eID provider computer system” is a data processing system that can automatically confirm or deny the identity of a user to third parties.
  • An “eID provider computer system” is preferably located in a particularly protected environment, in particular in a so-called trust center, so that the confirmation of a user's identity by an eID provider computer system is particularly reliable.
  • optical security features can be detectable visually, in particular also cognitively by a user, in particular can be detected mechanically with an optical sensor.
  • the document itself does not require an interface for reading out the data or the random value, so that the production of the document can be simplified. In particular, it is not necessary for the method that the document must have a chip.
  • a forgery-proof image here means an image which is provided with one or more security features.
  • security features can be of an optical or non-optical nature.
  • the binary representation of the image is less than or equal to the binary representation of the image.
  • the amount of data can be increased, for example, by reducing the resolution by scaling, reducing the covered color space by merging colors or other known reduction methods.
  • the amount of data is reduced in such a way that the optically readable code of the image only requires a limited space on the document.
  • the reduction in the amount of data can therefore be selected as a function of the space available on the document, the image still being able to be cognitively recorded by the user and compared with the image.
  • the code of the image can then be created from the image, the code of the image being encrypted, for example, with a private key of the user, the associated public key being authenticated / certified by a government agency.
  • the code of the image can be linked to the signature, in particular concatenated, and received together as a single optically readable code;
  • code optionally denotes both the variant in which only the code of the image is contained and the variant in which the code of the image and the signature are contained. Thus, only one reception process is required, whereby the method can be simplified.
  • the code of the image can also be used to determine the test feature.
  • the signature, the identity and / or the public key can be verified by the server computer system and the database is only accessed if the verification is successful.
  • the user computer system can check the time stamp, the elements and / or the signature. If the check is successful, the received signal is displayed. If the check is unsuccessful, an error message is displayed on the screen of the user computer system.
  • the transmission of further data can increase the security of the verification process.
  • the time of the request or the topicality of the release information can be checked by transmitting time stamps. If the identity of the inquirer is transmitted, it can be checked whether the inquirer is authorized for such a verification request, which ensures that the release information is not transmitted to unauthorized users.
  • the transmission of a signature or a key can also ensure that the inquirer is authorized for such a verification request.
  • the document-specific information can be, for example, release information and / or blocking information. This enables the document to be checked easily without the need for additional information, in particular user-specific information Information, is required. In particular, it is not necessary to store user-specific information or data on the server computer system.
  • the server computer system only needs the anonymized test feature and the blocking or release information assigned to the test feature. Since no user-specific data is stored on the server computer system, the greatest possible anonymity of the user is guaranteed.
  • the integrity of the document can thus be checked even before the connection to the server computer system is established, with the anonymized check feature also not requiring the storage of the person-specific data in this method.
  • the test feature can also be used here, so that no further information or data is required.
  • the signature and / or the code can be applied to the document and read out by the user computer system.
  • a first check of the document by checking the signature and visual checking of the image and the image can already take place before a connection to the server computer system is established.
  • the image can be viewed without a connection to the server computer system and compared with the image of the ID card.
  • the signature can also be received without a connection to the server and the test feature can be compared with the test feature that has been read out.
  • the signature and / or the code are applied to the document in an optically detectable form, they can be detected visually, in particular also cognitively, by a user, in particular can be detected by machine with an optical sensor.
  • the document itself does not require an interface for reading out the data or the random value, so that the production of the document can be simplified. In particular, it is not necessary for the method that the document must have a chip.
  • the signature and / or the code can be stored on a server computer system, the user computer system establishing a secure connection to the server computer system and the signature and / or the code being read out by the user computer system.
  • the amount of data applied to the document can be reduced.
  • the random value can be highly entropic and in particular have a character length of at least five characters, with the individual characters in particular being able to assume the value of a digit or a letter.
  • the random value can be generated with a binary symmetric source and have a maximum entropy.
  • a signature, data for determining the identity and / or a public key of an authorized user for sending a verification request can be stored on the server computer system.
  • a document for carrying out such a method has a machine readable zone (MRZ) in which the document data are applied in an optically and optionally cognitively detectable form so that they are recorded with an interface, for example a reader be able.
  • MMRZ machine readable zone
  • free spaces in the machine-readable zone can be used for the random value.
  • the areas of the document data used for the key can, for example, be arranged directly in front of the random value, so that these parts and the random value can be read out together.
  • a signature of a test feature is optically applied to the document in machine-readable form, which is stored from the document data and a key that was determined from the random value and parts of the personal and / or document-specific data.
  • an image and a code are optically applied to the document in machine-readable form, the code being determined from an image of the image and optionally the signature of the test feature, the image having a reduced amount of data compared to the image.
  • the code of the image and the signature can be optically applied together in machine-readable form.
  • the document can furthermore have a memory in which a signature of a test feature is stored, which is derived from the personal and / or document-specific data and a key which is derived from the random value and parts of the personal and / or document-specific data was determined, the document having an interface for reading out the memory.
  • the document can thereby be read out and checked optically, possibly even without a connection to a server computer system. If there is a user computer system with a corresponding interface for reading out the document, the data can also be read out from the memory via the interface and a corresponding check of the document with the read out data can take place.
  • FIG. 1 a computer system 100 for authenticating a document 102, for example an identification document or security document, is shown.
  • the document 102 is assigned to a user 106 and / or a service or a function.
  • a machine readable zone (MRZ) is provided on the surface of the document 102.
  • MMRZ machine readable zone
  • personal and / or document-specific data 104 are printed, embossed or applied in some other way so that they can be detected with a sensor, in particular with an optical sensor.
  • the personal and / or document-specific data 104 contain, for example, personal data of the user 106 such as the name or address of the user 106 a function are required, for example access data.
  • a random value 105 is printed in the machine-readable zone.
  • the random value 105 is preferably highly entropic and has a character length of at least five characters, with the individual characters in particular being able to assume the value of a digit or a letter.
  • an image 107 of the user is applied to the identification document. Further information or data that enable the identification of the user can also be applied to the document 102.
  • a signature 109 of a test feature 115 which is described in more detail below, and a code 111 are applied to the document 102.
  • the code 111 consequently does not also contain the signature 109, but only the code of the image 107.
  • the test feature 115 is determined from the person-specific and / or document-specific data 104 and a key 113.
  • the key 113 is made up of the random value 105 as well as parts 104a of the person-specific and / or document-specific data 104 determined during the creation and registration of the document.
  • the test feature 115 is calculated from the key 113 and the person-specific and / or document-specific data 104 .
  • the parts 104a of the person-specific and / or document-specific data 104 used for the key can be arranged, for example, directly in front of the random value 105, so that these parts 104a and the random value 105 can be read out together.
  • the code 111 is formed from an image of the image 107.
  • An image was generated from the image 107, the binary representation of which is less than or equal to the binary representation of the image.
  • the amount of data is reduced, for example, by reducing the resolution by scaling, reducing the covered color space by merging colors or other known reduction methods, so that an optically readable code 111 of the image can be created.
  • the reduction is selected such that the image created from the code 111 can still be cognitively recorded by the user 106 and compared with the image 107.
  • the person- and / or document-specific data 104, the random value 105, the signature 109 and the code 111 can be recorded with an optical sensor.
  • the person-specific and / or document-specific data 104 and the random value 105 can be recorded visually by a person.
  • the information is applied to the document in written form, so that both cognitive detection and machine readability or detection with a sensor of the person-specific and / or document-specific data 104 is possible.
  • the person-specific and / or document-specific data 104, the random value 105, the signature 109 and the code 111 are printed on the document 102.
  • the information can be applied to the document using other known methods.
  • the system 100 also has a user computer system 108 and a server computer system 110, each of which has an interface 112, 114, in order to set up a connection 118 between the user computer system 108 and the server computer system 110 via a communication network 116.
  • the interfaces 112, 114 can be designed for wireless communication with the communication network 116, for example. However, it is also possible that the interfaces 112, 114 are designed to connect the user computer system 108 or the server computer system 110 to a wired communication network.
  • the communication network can be, for example, a cellular network, such as a GSM, UMTS, CDMA or an LTE network.
  • a cellular network such as a GSM, UMTS, CDMA or an LTE network.
  • wired Internet networks, wireless LAN networks or connections via Bluetooth or another interface 112, 114 are also possible.
  • a connection to the Internet can be established, for example, via such a communication network.
  • the connection can be established directly via a WLAN network, a Bluetooth connection or another short-range connection.
  • Data is preferably transmitted between the user computer system 108 and the server computer system 110 via end-to-end encryption.
  • end-to-end encryption a preferably volatile (ephemeral) symmetric key can be used, which is agreed between the user computer system 108 and the server computer system 110, for example, on the occasion of the execution of a cryptographic protocol.
  • the user computer system 108 has an interface 120, here an optical reading device for the optical acquisition of the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 on the document 102.
  • the optical reading device is a camera that can create a recording of the information.
  • the user computer system 108 has a processor 122 for executing program instructions 124, 125, 126, 127, 128, 129.
  • the program instructions 124 serve to read out the person-specific and / or document-specific data 104, the random value 105, the signature 109 and the code 111 on the document 102.
  • the program instructions 125 serve to create a test feature, which is explained in more detail below.
  • the program instructions 126 are used to check the signature 109.
  • the program instructions 127 are used to calculate an image from the code 111.
  • the program instructions 128 are used to create and send a verification request from the user computer system 108 to the server computer system 110.
  • the program instructions 129 are used to receive a first or a second signal from server computer system 110.
  • the user computer system 108 can be formed by any computer system that has an interface 112 and an optical reading device, in particular an optical sensor.
  • the user computer system 108 is, for example, a mobile telecommunication terminal.
  • the server computer system 110 has a memory 135 and a processor 136.
  • a test feature 115 of the document 102 and document-specific information 117 are stored in the memory 135.
  • the document-specific information 117 is stored in such a way that an unambiguous assignment of the document-specific information 117 to the test feature 115 is possible.
  • the document-specific information 117 can be, for example, blocking information, ie information about a temporary or permanent invalidity of the document 102, release information, ie information about a temporary or permanent validity, a period of validity or other information that determines the validity of the document.
  • further information 119 can be stored which is assigned to the check feature 115, for example a signature or information on the identity of a user authorized to check the validity of the document.
  • program instructions 138, 140, 142, 144 are stored in memory 135, which can each be executed by processor 136.
  • the program instructions 138 are used to receive a check request from the user computer system 108.
  • the program instructions 140 are used to access the test features 115 stored in the memory 135 or to the information 117, 119 assigned to the test feature 115.
  • the program instructions 142 serve to check the test feature 115 assigned Information 117, 119.
  • the program instructions 144 are used to send a first or a second signal.
  • the document 102 is authenticated with the in Figure 2 presented procedure.
  • the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 on the document 102 are recorded with the reader of the user computer system 108.
  • an image of the document 102 is created by the reading device.
  • the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 on the image of the document 102 can be identified by program instructions 124.
  • the identification features assigned to the information can, for example, make it easier to find or identify the person-specific and / or document-specific data 104, the random value 105, the signature 109 and the code 111.
  • the program instructions 125 use these to calculate the test feature 115.
  • a key 113 is created from the random value 105 and the parts 104a of the person-specific and / or document-specific data 104.
  • the test feature 115 is then calculated from this key 113 and the person-specific and / or document-specific data 104 with a preferably pseudo-random trapdoor function.
  • the key 113 contains the random value 105 in addition to the person-specific and / or document-specific data 104, it is practically impossible to trace the person-specific and / or document-specific data 104 from the test feature 115.
  • the check feature 115 is thus anonymized, since it is not possible to draw conclusions about the owner of the document 102 or the person- and / or document-specific data 104 from the check feature 115.
  • a first checking step the program instructions 126 verify this test feature 115 with the signature 109 of the test feature 115 that has also been read out. If this check is successful, information about the successful check is displayed on the screen 146 of the user computer system 108.
  • This first checking step can take place without a connection to a network or a server computer system 110, so that a first check of the document 102 can already take place even without such a connection.
  • an image is calculated from the code 111 by the program instructions 127 and displayed on the screen 146 of the user computer system.
  • the user can compare the image with the image 107 applied to the document 102 in order to check the document.
  • the image can be compared with the owner of the document 102. This checking step can also take place without a connection to a network or a server computer system 110.
  • a secure connection is set up between the user computer system 108 and the server computer system 110, for example with end-to-end encryption, and a checking request is sent.
  • the verification request contains the verification feature 115 as well as further information which proves the authorization of the user for the verification request.
  • the verification request contains data on the identity of the user, a signed time stamp about the time of the verification request, a signature on parts of the request or a public signature Key of the user. As will be explained below, this information can be stored in the server computer system 110 during a previous registration.
  • a database access is made to the memory 135 of the server computer system 110, whereby it is first checked whether a corresponding test feature 115 is stored in the memory 135 and document-specific information 117 on this test feature 115 is stored.
  • a first signal is generated, the first signal indicating the invalidity of the document 102. This first signal is sent to the user computer system 108 and, after receipt, is displayed on the screen 146 of the user computer system 108.
  • test feature 115 is stored and document-specific information 117 is assigned to the test feature 115, this is checked, a second signal is generated, sent to the user computer system 108 and displayed on the screen 146.
  • Checking the document-specific information 117 can only include checking the type of document-specific information 117. It is established, for example, that the document-specific information 117 is only blocking information or release information, that is to say only contains the information “valid” or “invalid”. In this case, the second signal can contain the document-specific information 117.
  • a more detailed check can be carried out, for example if the document-specific information 117 contains a period of validity. In this case, a check can be made as to whether the check request is made within this period and, depending on this check result, information can be provided "valid" or "invalid" can be created.
  • the second signal can thus contain the document-specific information 117 or a result of a check of the document-specific information 117. If the document-specific information 117 is transmitted, a check can also be carried out by the user computer system 108 or the user.
  • the first or the second signal can contain further information, for example a signed time stamp, about the time at which the checking information was sent, via which the user computer system 108 can check whether the document-specific information 117 is up to date.
  • a time interval can be set for sending the verification request and receiving the signals.
  • elements of the verification request can be sent that can be compared with the original verification request or a signature over parts of the verification request that enable the signals to be checked.
  • FIG Figure 3 A method for producing or personalizing a document 102 is shown in FIG Figure 3 explained.
  • the personal and / or document-specific data 104, the random value 105, the image 107, the signature 109 and the code 111 are determined and applied to the document 102.
  • the personal and / or document-specific data 104, the random value 105, the image 107, the signature 109 and the code 111 are printed and / or embossed on the document 102.
  • the personal and / or document-specific data 104, the random value 105 and the image are preferably applied in a form that they can be recorded with an optical sensor and cognitively by the user.
  • the personal and / or document-specific data 104 and the random value 105 are applied to the document 102 in plain text.
  • the signature is, for example, in the form of a barcode or another that can be optically recorded Form applied, the code 111 is already in an optically detectable form and is applied accordingly.
  • An image was previously generated from the image 107, the binary representation of which is less than or equal to the binary representation of the image 107.
  • the amount of data is reduced, for example, by reducing the resolution by scaling, reducing the covered color space by merging colors or other known reduction methods, and a code 111 of the image is created from this image.
  • the reduction is selected such that the image created from the code 111 can still be cognitively recorded by the user 106 and compared with the image 107.
  • test feature 115 was calculated in advance by an identity server computer system from the person-specific and / or document-specific data 104 and the random value 105 by creating a key 113 from the random value 105 and parts 104a of the person-specific and / or document-specific data 104 and from it This key 113 as well as the person-specific and / or document-specific data 104 was calculated with a preferably pseudo-random trapdoor function, the test feature 115. This test feature 115 was then signed and the signature 109 created.
  • An identification server system is a server system on which the personal and / or document-specific data 104 are stored or which can access such data. Furthermore, the random value 105 is determined by the identification server system and is also stored.
  • a secure connection is then established between the identity server computer system and the server computer system 110, for example with end-to-end encryption, and the test feature and document-specific information 117 created by the identity server computer system are transmitted to the server computer system.
  • a user 106 can register himself or his user computer system 108, and corresponding data, by means of which the identity of the user and / or the user computer system can be determined, can be entered into the identity server computer system and transmitted from it to the server computer system via the secure connection.
  • the code 111 of the image and / or the signature 109 can also be stored on the server computer system.
  • the secure connection between user computer system 108 and server computer system 110 is first established and the code 111 of the image and / or the signature 109 is received.
  • the verification of the signature 109 or the test feature 115 and the cognitive verification of the image of the image 107 can then be carried out by the user.
  • the person-specific and / or document-specific data 104, the random value 105, the signature 109 and the code 111 of the image can also be stored in a memory of the document 102 and read out by the user computer system 108 via a corresponding interface.
  • the document 102 can have a chip for executing program instructions in order to authenticate a user computer system 108 with respect to the document and to enable the information to be read out from the memory.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Collating Specific Patterns (AREA)

Claims (16)

  1. Procédé de vérification d'un document (102), notamment d'un document de valeur ou de sécurité,
    dans lequel une image (107) ou un code (111) est rapporté sur le document,
    dans lequel le code a été déterminé à partir d'une représentation de l'image (107), où la représentation présente une quantité de données réduite par rapport à l'image (107) ;
    dans lequel des données (104) spécifiques à des personnes et/ou à des documents sont rapportées de manière optique sous forme lisible par machine sur le document (102),
    dans lequel une valeur aléatoire (105) est rapportée de manière optique sous forme lisible par machine sur le document (102), et
    dans lequel une signature (109) d'une caractéristique de vérification (115) est rapportée sur le document (102),
    dans lequel la caractéristique de vérification (115) est déterminée à partir de données (104) spécifiques à des personnes et/ou à des documents et une clé qui est formée par une combinaison de parties (104a) des données (104) spécifiques à des personnes et/ou à des documents et de la valeur aléatoire (105), avec les étapes suivantes :
    - la lecture optique des données (104) spécifiques à des personnes et/ou à des documents avec un système informatique d'utilisateur (108) comprenant une interface optique,
    - la lecture optique de la valeur aléatoire (105) avec le système informatique utilisateur (108),
    - la lecture optique de la signature avec le système informatique utilisateur (108),
    - la combinaison d'au moins des parties (104a) des données (104) spécifiques à des personnes et/ou à des documents et de la valeur aléatoire (105) pour donner une clé,
    - la détermination d'une caractéristique de vérification (115) à partir des données (104) spécifiques à des personnes et/ou à des documents et de la clé par le système informatique utilisateur (108),
    - la vérification de la signature (109) par le système informatique utilisateur (108) en ce qui concerne la caractéristique de vérification (115),
    - la lecture optique du code (111) par le système informatique utilisateur (108),
    - l'établissement d'un signal d'authentification par le système informatique utilisateur (108) lorsque la caractéristique de vérification (115) a pu être vérifiée au moyen de la vérification de la signature (109) ;
    - l'affichage du signal d'authentification sur l'écran (146) du système informatique utilisateur (108), et
    - le calcul de la représentation à partir du code (111) par le système informatique utilisateur (108),
    - l'affichage de la représentation par le système informatique utilisateur,
    - la comparaison de la représentation avec l'image (107) par le système informatique utilisateur (108) et/ou par l'utilisateur.
  2. Procédé selon la revendication 1, dans lequel le code (111) de la représentation de l'image (107) est combiné avec la signature (109), notamment concaténé, et est lu conjointement avec la signature (109).
  3. Procédé selon l'une des revendications 1 ou 2, dans lequel le code (111) de la représentation de l'image (107) est employé pour la détermination de la caractéristique de vérification (115).
  4. Procédé de vérification d'un document (102), notamment d'un document de valeur ou de sécurité selon l'une des revendications précédentes,
    - après l'authentification réussie du document contenant les étapes de réception et de vérification de la signature (109), et d'établissement et d'affichage du signal d'authentification par le système informatique utilisateur (108), l'élaboration d'une liaison sécurisée entre le système informatique utilisateur (108) et un système informatique serveur (110), où le système informatique serveur (110) présente une mémoire (135) dans laquelle sont stockées des informations (117) spécifiques au document, où les informations (117) spécifiques au document sont associées à la caractéristique de vérification (115),
    - l'envoi d'une demande de vérification du système informatique utilisateur (108) au système informatique serveur (110), où la demande de vérification contient la caractéristique de vérification (115),
    - l'exécution d'une vérification de banque de données avec le système informatique serveur (110) si la caractéristique de vérification (115) déterminée et envoyée est ainsi associée aux informations (117) spécifiques au document stockées dans la mémoire,
    - l'envoi d'un premier signal du système informatique serveur (110) au système informatique utilisateur (108), où le premier signal indique une non validité du document (102) lorsqu'aucune information (117) spécifique au document n'est associée à la caractéristique de vérification (115) déterminée, ou
    - la lecture des informations (117) spécifiques au document lorsque des informations (117) spécifiques au document sont associées à la caractéristique de vérification (115) par le système informatique serveur, la vérification des informations (117) spécifiques au document qui sont associées à la caractéristique de vérification (115) dans le système informatique serveur (110), et l'envoi d'un deuxième signal du système informatique serveur (110) au système informatique utilisateur (108), où le deuxième signal contient le résultat de la vérification des informations (117) spécifiques au document et/ou les informations (117) spécifiques au document, et
    - l'affichage du premier et du deuxième signal sur un écran (146) du système informatique utilisateur (108).
  5. Procédé selon la revendication 4, dans lequel la demande de libération contient au moins une des indications suivantes :
    - une estampille temporelle de la demande, où l'estampille temporelle est en particulier signée,
    - l'identité du demandeur,
    - la signature concernant des parties de la demande,
    - la clé publique du demandeur,
    où la signature, l'identité et/ou la clé publique sont vérifiées par le système informatique serveur (110) et un accès à la banque de données n'a lieu que pour une vérification réussie,
    et où l'information de libération contient au moins une des indications suivantes :
    - l'estampille temporelle de l'instant de la réponse, où l'estampille temporelle est en particulier signée,
    - des éléments provenant de la demande,
    - la signature concernant des parties de la demande
    où le système informatique utilisateur (108) vérifie l'estampille temporelle, les éléments et/ou la signature, et, dans le cas d'une vérification réussie, il y a une indication du signal reçu, et dans le cas d'une vérification non réussie, une information de défaillance est indiquée sur l'écran (146) du système informatique utilisateur (108).
  6. Procédé selon l'une des revendications 4 et 5, dans lequel les informations (117) spécifiques au document sont des informations divulguées et/ou des informations protégées.
  7. Procédé selon l'une des revendications 4 à 7, dans lequel une image (107) protégée contre la falsification est rapportée sur le document (102), où le procédé présente les étapes suivantes :
    - la réception d'un code (111) qui a été déterminé à partir d'une représentation de l'image (107) par le système informatique utilisateur, où la représentation possède une quantité de données réduite par rapport à l'image (107), ou la réception de la représentation elle-même par le système informatique utilisateur (108),
    - le calcul de la représentation de l'image (107) à partir du code (11) dans le cas où la représentation de l'image (107) n'a pas elle-même été reçue ;
    - l'affichage de la représentation ; et
    - la comparaison de la représentation affichée avec l'image (107) par l'utilisateur.
  8. Procédé selon la revendication 7, dans lequel le code (111) de la représentation de l'image (107) est relié avec la signature (109), en particulier concaténé, et est réceptionné conjointement avec la signature (109).
  9. Procédé selon l'une des revendications précédentes, dans lequel la valeur aléatoire (105) est hautement entropique et présente en particulier une longueur de caractères d'au moins 5 caractères, où les caractères individuels peuvent en particulier prendre la valeur d'un chiffre ou d'une lettre.
  10. Procédé de production d'un document pour la vérification dans un procédé selon l'une des revendications précédentes, avec les étapes suivantes :
    - la production d'un document (102),
    - le report des données (104) spécifiques à des personnes e/ou à des documents et d'une valeur aléatoire (105) sur le document (102) sous forme optique lisible par machine,
    - la détermination de la caractéristique de vérification (115), de la signature (109) de la caractéristique de vérification et des informations (117) spécifiques au document par un système informatique serveur d'identité, où la caractéristique de vérification a été déterminée à partir des données spécifiques à des personnes et/ou à des documents ainsi que d'une clé, qui a été déterminée à partir de la valeur aléatoire et de parties des données spécifiques à des personnes et/ou à des documents ;
    - le report de la signature (109) sur le document sous forme optique lisible par machine,
    - le report d'une image (107) et d'un code (111) sur le document, où le code a été déterminé à partir d'une représentation de l'image (107), où la représentation présente une quantité de données réduite par rapport à l'image (107).
  11. Procédé selon la revendication 10, comprenant en outre :
    - l'établissement d'une liaison sécurisée entre le système informatique serveur d'identité et le système informatique serveur (110),
    - le stockage de la caractéristique de vérification (115) et des informations (117) spécifiques au document sur le système informatique serveur (110), où les informations (117) spécifiques au document sont associées à la caractéristique de vérification (115),
    - le stockage de la signature (109) sur le système informatique serveur (110).
  12. Procédé selon la revendication 11, dans lequel des données pour la détermination de l'identité et/ou d'une clé publique d'un utilisateur autorisé pour l'envoi d'une demande de vérification sont stockées sur le système informatique serveur (110).
  13. Document (102), notamment document de valeur ou de sécurité, destiné à une vérification avec un procédé selon l'une des revendications 1 à 9, où des données (104) spécifiques à des personnes et/ou à des documents, une valeur aléatoire (105) ainsi qu'une image (107) et un code (11) sont rapportés sous forme optique lisible par machine, où le code a été déterminé à partir d'une représentation de l'image (107), où la représentation possède une quantité de données réduite par rapport à l'image (107), dans lequel, une signature (109) d'une caractéristique de vérification (115) est rapportée sur le document (102) sous forme optique lisible par machine, qui a été déterminée à partir des données (104) spécifiques à des personnes et/ou à des documents ainsi que d'une clé qui a été déterminée à partir de la valeur aléatoire (105) et de parties (104a) des données (104) spécifiques à des personnes et/ou à des documents.
  14. Document selon la revendication 13, dans lequel le code (111) de la représentation de l'image (107) et la signature (109) sont rapportés conjointement de manière optique sous forme lisible par machine.
  15. Document selon l'une des revendications 13 à 14, où le document (102) présente une mémoire dans laquelle est stockée une signature (109) d'une caractéristique de vérification (115) qui a été déterminée à partir des données (104) spécifiques à des personnes et/ou à des documents ainsi que d'une clé qui a été déterminée à partir de la valeur aléatoire (105) et de parties (104a) des données (104) spécifiques à des personnes et/ou à des documents, où le document présente une interface pour la lecture de la mémoire.
  16. Système informatique (100) conçu pour l'exécution d'un procédé selon l'une des revendications 1 à 8, où le système informatique (100) présente un système informatique utilisateur (108), où le système informatique utilisateur (108) présente une interface (120) pour la lecture de données à partir du document (102), ainsi qu'une interface (112) pour l'établissement d'une liaison sécurisée avec un système informatique serveur (110), ainsi qu'avec un système informatique serveur (110) qui présente une interface (114) pour l'établissement d'une liaison sécurisée avec le système informatique utilisateur (108), où le système informatique serveur (110) présente une mémoire (135), dans laquelle sont stockées des informations (117) spécifiques au document ainsi qu'une caractéristique de vérification (115), où les informations (117) spécifiques au document sont associées à la caractéristique de vérification (115).
EP16788643.1A 2015-10-16 2016-10-14 Procédé de vérification d'un document, document et système informatique Active EP3362999B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102015220244.5A DE102015220244A1 (de) 2015-10-16 2015-10-16 Verfahren zur Überprüfung eines Dokumentes, Dokument und Computersystem
PCT/EP2016/074664 WO2017064233A1 (fr) 2015-10-16 2016-10-14 Procédé de vérification d'un document, document et système informatique

Publications (2)

Publication Number Publication Date
EP3362999A1 EP3362999A1 (fr) 2018-08-22
EP3362999B1 true EP3362999B1 (fr) 2021-08-04

Family

ID=57218856

Family Applications (1)

Application Number Title Priority Date Filing Date
EP16788643.1A Active EP3362999B1 (fr) 2015-10-16 2016-10-14 Procédé de vérification d'un document, document et système informatique

Country Status (3)

Country Link
EP (1) EP3362999B1 (fr)
DE (1) DE102015220244A1 (fr)
WO (1) WO2017064233A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110956736A (zh) * 2019-12-20 2020-04-03 恒银金融科技股份有限公司 一种带忘取回收功能的纸币清分存款机
DE102020127853A1 (de) 2020-10-22 2022-04-28 Bundesdruckerei Gmbh Verfahren zum Personalisieren eines ID-Dokuments, personalisiertes ID-Dokument sowie Verfahren zum Authentifizieren eines personalisierten ID-Dokuments

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11198573A (ja) * 1998-01-09 1999-07-27 Itou Hisao 顔写真検証システム
DE102008041990A1 (de) 2008-09-11 2010-03-25 Bundesdruckerei Gmbh Dokument, Verfahren zur Herstellung und zur Überprüfung eines Dokuments, Computerprogrammprodukt, Datenverarbeitungssystem und Prüfsystem
WO2012035306A1 (fr) * 2010-09-18 2012-03-22 Philip Wesby Système et procédé pour le codage et l'authentification contrôlée
DE102012203313A1 (de) * 2012-03-02 2013-09-05 Bundesdruckerei Gmbh Verfahren zum Identifizieren einer Person

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
DE102015220244A1 (de) 2017-04-20
EP3362999A1 (fr) 2018-08-22
WO2017064233A1 (fr) 2017-04-20

Similar Documents

Publication Publication Date Title
EP1891607B1 (fr) Procede d'acces d'une station de donnees a un appareil electronique
DE69932643T2 (de) Identifizierungsvorrichtung mit gesichertem foto sowie mittel und verfahren zum authentifizieren dieser identifizierungsvorrichtung
EP1944716B1 (fr) Procédé et dispositif de sécurisation d'un document comportant une signature apposée et des données biométriques dans un système informatique
EP3078218B1 (fr) Contrôle d'accès et d'utilisation pour un véhicule automobile
DE102015208088A1 (de) Verfahren zur Erzeugung einer elektronischen Signatur
DE102011122273A1 (de) Vorrichtung und Verfahren zum Erzeugen von digitalen Bildern
EP3497615B1 (fr) Procédé de signature électronique manuscrite
EP3362999B1 (fr) Procédé de vérification d'un document, document et système informatique
EP2881289B1 (fr) Procédé de déverrouillage d'une installation de verrouillage de véhicule
EP3206151B1 (fr) Procédé et système d'authentification d'un appareil de télécommunication mobile sur un système informatique de service et appareil de télécommunication mobile
EP3314585B1 (fr) Procédé et système pour authentifier un document et procédé pour créer et/ou personnaliser un document
DE602005006407T2 (de) Methode und System zur Signierung von physischen Dokumenten und zur Authentisierung von Signaturen auf physischen Dokumenten
EP3518190A1 (fr) Procédé et dispositif d'authentification à facteurs multiples
EP3289509B1 (fr) Procédé pour produire une signature électronique
EP3657750B1 (fr) Procédé d'authentification des lunettes intelligentes dans un réseau de données
EP3295419A1 (fr) Procédé de vérification de l'identité d'une personne
DE102021127976B4 (de) Wiederherstellen eines kryptografischen Schlüssels
DE102020123755B4 (de) Verfahren zum Authentifizieren mit einem optoelektronisch lesbaren Code sowie Funktionsfreigabeeinrichtung und Computerprogramm hierzu
EP3358488B1 (fr) Procédé de reconnaissance de copies non autorisées de jetons de sécurité numériques
DE102009008184A1 (de) Prüfen einer Authentisierung eines Besitzers eines portablen Datenträgers
EP4174700A1 (fr) Fourniture d'un document numérique
EP3289507B1 (fr) Jeton id, système et procédé de génération de signature électronique
EP3144836A1 (fr) Procédé de fourniture de données de documents numériques

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20180516

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 502016013561

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G07D0007000000

Ipc: G07D0007004000

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RIC1 Information provided on ipc code assigned before grant

Ipc: G07D 7/004 20160101AFI20201104BHEP

Ipc: G07D 7/0047 20160101ALI20201104BHEP

INTG Intention to grant announced

Effective date: 20201119

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTC Intention to grant announced (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20210304

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1417788

Country of ref document: AT

Kind code of ref document: T

Effective date: 20210815

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502016013561

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20210804

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211104

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211206

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502016013561

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20211031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

26N No opposition filed

Effective date: 20220506

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211014

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211031

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211014

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 1417788

Country of ref document: AT

Kind code of ref document: T

Effective date: 20211014

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211014

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20161014

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230526

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231025

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20231023

Year of fee payment: 8

Ref country code: DE

Payment date: 20231018

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210804