WO2003005307A1 - Verfahren zum überprüfen der gültigkeit von digitalen freimachungsvermerken - Google Patents
Verfahren zum überprüfen der gültigkeit von digitalen freimachungsvermerken Download PDFInfo
- Publication number
- WO2003005307A1 WO2003005307A1 PCT/DE2002/002348 DE0202348W WO03005307A1 WO 2003005307 A1 WO2003005307 A1 WO 2003005307A1 DE 0202348 W DE0202348 W DE 0202348W WO 03005307 A1 WO03005307 A1 WO 03005307A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- postage
- checking
- crypto
- barcode
- code
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00435—Details specific to central, non-customer apparatus, e.g. servers at post office or vendor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00459—Details relating to mailpieces in a franking system
- G07B17/00661—Sensing or measuring mailpieces
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00435—Details specific to central, non-customer apparatus, e.g. servers at post office or vendor
- G07B2017/00443—Verification of mailpieces, e.g. by checking databases
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00459—Details relating to mailpieces in a franking system
- G07B17/00661—Sensing or measuring mailpieces
- G07B2017/00709—Scanning mailpieces
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00459—Details relating to mailpieces in a franking system
- G07B17/00661—Sensing or measuring mailpieces
- G07B2017/00709—Scanning mailpieces
- G07B2017/00725—Reading symbols, e.g. OCR
Definitions
- the digital postage indicia contain cryptographic information, for example about the identity of the
- the invention has for its object to provide a method with which the authenticity of the postage indicia can be checked quickly and reliably.
- the method should be suitable for a check in a large series application, in particular in letter or freight centers.
- this object is achieved in that the reading unit records the franking mark graphically and transmits it to a checking unit, and in that the checking unit controls a sequence of partial checks.
- one of the sub-exams is the Decryption of the cryptographic information contained in the franking note includes.
- one of the partial tests compares the generation date of the
- the reading unit and the checking unit exchange information using a synchronous protocol.
- the reading unit and the checking unit communicate with one another via an asynchronous protocol.
- the reading unit sends a data telegram to the checking unit.
- the data telegram preferably contains the content of the franking mark.
- FIG. 1 shows a schematic diagram of system components of a payment assurance system
- FIG. 2 shows a particularly preferred embodiment of the payment assurance system, hand scanner and payment security PC
- Fig. 3 is a schematic diagram of a generation and review of postage indicia.
- FIG. 6 shows a further particularly preferred embodiment of the checking method with a particularly preferred sequence of partial tests
- Fig. 7 shows a preferred sequence of distribution of keys between a central loading point
- the invention is illustrated below using the example of a PC franking system.
- the one to secure remuneration The process steps used are independent of the system used to generate the postage indicia.
- decentralized check shown at individual control points in particular in letter centers, is particularly preferred, but a centralized check is equally possible.
- Postage indicia on a random basis by individual scanners.
- a checking system suitable for this purpose preferably contains the components shown in FIG. 1.
- the scanners are used to read the franking note of the PC franking.
- the franking marks are 2D codes in the data matrix format with the ECC200 error correction used.
- the data is transmitted by radio or cable, whereby the radio scanners have a multi-cell display and thus an output option and a touchscreen, or a keyboard for rudimentary input.
- Systems of the preferred payment security PC franking system form the scanner controller and the validation controller as components. While the scanner controller manages a queue of matrix codes, which are coming up for checking via the hand scanner and essentially maintaining contact with the scanners, he is only in contact with the other systems via the validation scanner.
- Scanner controllers serve as an interface between the scanners and the other systems for checking the 2D barcodes.
- the 2D barcode content converted and corrected from the optical recording is transmitted to them, and they then initiate the check and, in the case of the radio scanners, ensure that the reading and test results are output, and serve as an interface between any necessary manual reworking and checking by the tester and the other systems.
- the crypto system ensures the content and cryptographic verification of the 2D barcode content as well as the protected storage of security-relevant data and algorithms. The individual components will be discussed later.
- the postage point is the central system within PC franking. It serves as an interface to the customer systems. From there, customers can unload the specified amounts for subsequent franking. The keys to secure the process are generated at the postage point. It also serves as an interface to the accounting systems. The following interfaces become the preferred security system for PC franking provided :
- Symmetrical keys • Master data, such as default amounts, account balances
- the shipment-related information is collected and others
- a number of master data are necessary, such as negative files, minimum fees, validity periods in relation to the product and payment assurance, warning and follow-up processing codes.
- This data is provided from different systems (BDE, VIBRIS, local payment assurance system).
- the general terms and conditions examiner who has to rework the PC franking items that have been removed, has the option of carrying out a more detailed check of the franking, in which the Test results are not restricted by the limited output options of the scanner.
- the examiner can also view other data here, such as the validity period of the postage amount to which the current shipment relates, as well as the amount and the frankings used.
- the 2D barcodes are automatically recorded within the SSA.
- the image information is forwarded to the AFM-2D code reader. There the image is converted into the content of the data matrix code.
- the 2D barcode content is then transmitted to the crypto system for verification, the returned verification result is evaluated and transmitted to the optical recording system (IMM) for coding the shipment.
- IMM optical recording system
- AFM 2D code reader per reading machine (ALM / ILVM), which receives the image data of the consignments via an optical recording system (IMM) and processes them further for payment security purposes.
- AFM / ILVM optical recording system
- IMM optical recording system
- This byte chain is passed to the Validation Controller for checking.
- the test result is then forwarded via the interface of the optical detection system and used there for coding.
- the architecture should preferably be chosen such that the individual reading machines are permanently assigned to a crypto system and possibly also expanded by an additional fallback configuration which tries to switch to another crypto system in the event of an error.
- the separation of the crypto system and the AFM-2D code reader also has the advantage that both the machine reading and the hand scanner check can be carried out with the same crypto system, and therefore the same function cannot be implemented twice, which is also the case essential Offers advantages in the implementation of the invention.
- Preferred method steps for providing a postal item with a digital postage indicium after loading a fee amount from a central loading point (postage point) and generation of the postage indicium by a local PC as well as subsequent delivery of the postal item and checking of the postage indicium applied to the postal item are shown in FIG. 3 ,
- the process is such that a customer first loads a postage amount onto his PC. A random number is generated to identify the request. A new postage amount is generated for the respective customer at the postage point and from the random number transmitted, further information on the identity of the customer system (the customer system identification information, hereinafter referred to as Postage ID) and the postage amount, the so-called cryptostring is created. which is encrypted with a secret symmetric key existing at the postage point.
- Postage ID customer system identification information
- This crypto string and the corresponding postage amount are then transferred to the customer PC and, together with the random number, stored securely in the "safe box" to prevent unauthorized access.
- the shipment data relevant for the 2D barcode including the cryptostring, franking date and franking amount, are expanded by the random number and the Postage ID is collected in unencrypted form , and a hash value is created that uniquely identifies the content. Since the random number is present in encrypted form within the crypto ring and in unencrypted form within the hash value, it is ensured that the shipment data cannot be changed or generated arbitrarily, and it is possible to draw conclusions about the creator.
- the relevant data for the shipment is then converted into a 2D barcode and as a corresponding one
- the 2D barcode is read in the letter center by an AFM 2D code reader or a hand scanner and then checked.
- the associated process steps are clear in the figure under process numbers 5-8.
- the AFM 2D code reader transfers the complete shipment data to the crypto system.
- cryptographic information contained in the mailing data, in particular the crypto ring is decrypted in order to determine the random number used in creating the hash value.
- a hash value (also called a message digest) for the shipment data including the decrypted random number is then determined, and it is checked whether the result is identical to the hash value contained in the 2D barcode.
- test result is then transmitted to the PC-F reader, which forwards the result to the optical detection system (IMM) for coding the bar code.
- IMM optical detection system
- the barcode is then sprayed onto the letter and the items are rejected if the test result is negative.
- the fee amount loading point (postage point) is used to the crypto systems of the local payment assurance systems and this data has to be temporarily stored, a crypto system component must also be provided there, but the validation controller is generally not used.
- the validation controller represents the interface for checking the entire 2D barcode content.
- the checking of the 2D barcode consists of a content and a cryptographic check.
- the scanned 2D barcode content of the scanner should be forwarded by the scanner controller to the validation controller.
- Operating data acquisition used telegram manager or the protocol used within the scope of the optical acquisition system such as Corba / IIOP in question.
- the validation controller initiates the individual test routines, which in turn transmit their test results back to it.
- the validation controller Since several AGB validators work with different scanners at the same time, the validation controller has to be designed to be "multi-session capable". This means that it has to be able to handle simultaneous test requests and to be able to direct the corresponding output to the correct scanner. It should also be designed in such a way that he can simultaneously execute several test inquiries, as well as part of the test steps, for example hash value testing and minimum wage test.
- the controller is informed of the type of scanner it is communicating with and is given the option of using the CallBack method to control routines for output and manual verification.
- the results are then output either on the radio scanner or the EntgeltSich réelle system, and manual test results recorded.
- a special problem is the storage of the key, with which the cryptostring is encrypted in a 2D barcode and has to be decrypted again for verification.
- This key ensures the counterfeit security of the 2D barcodes and therefore it must not be possible to spy on it. Special security measures must therefore be taken to ensure that this key is never visible in plain text on the hard disk, in memory or during transmission and is also secured by strong cryptographic procedures.
- the cryptographic methods generate a high load on the processor of the system, which is not optimized with regard to the operations to be carried out.
- the cards that meet these characteristics are self-sufficient systems that, depending on the version, are connected to the computer via the PCI or ISA bus and communicate with the software systems on the computer via a driver.
- the cards In addition to battery-backed main memory, the cards also have a flash rom memory in which an individual
- Application code can be saved. Direct access to the main memory of the cards is not possible from the external systems, which ensures a very high level of security, since neither the key data nor the cryptographic methods for providing security can be accessed other than via the secure driver.
- the cards use their own sensors to monitor whether attempts have been made to tamper (depending on the card version, for example temperature peaks, radiation, opening the protective cover, voltage peaks).
- the function for decrypting the Postage ID, the function for checking the hash value and the function for importing key data should be loaded directly onto the card, since these routines have a high security relevance.
- ITSEC is a set of criteria published by the European Commission for the certification of IT products and IT systems with regard to their security properties. The trustworthiness rating is based on the levels E0 to E6, where E0 means insufficient and E6 the highest level of security.
- CC Common Criteria
- ISO ISO Norm 15408
- the FIPS PUB 140-1 standard is a set of criteria issued by the United States government for assessing the security of commercial cryptographic devices. This set of criteria is very strongly oriented
- Hardware properties The assessment takes place in 4 levels, where level 1 means the lowest and level 4 the highest security.
- the functions relevant to security as part of the crypto card application are stored directly in the card and are therefore only accessible from the outside via the card driver.
- the interface between the driver and the validation controller is the crypto interface component, which forwards the requests for test routines to the card using the driver.
- the task of the crypto interface is also to distribute the load of the individual test requests. This function is particularly useful if, in addition, one or, depending on the mail center, several AFM 2D code readers use the check routines of the crypto system.
- Another task is to handle the communication in order to distribute the key data. In stage 2 there may only be a rudimentary mechanism that transfers the keys encrypted for security within a signed file. A requirement for the crypto interface is then to provide a utility that enables the import of such a file.
- the validation controller To validate the 2D barcode, the validation controller provides a central test function as an interface to the scanner or reading systems. This test function coordinates the course of the individual partial tests.
- the codes for the payment security incident transmitted from the individual part checking routines are converted into the corresponding payment security code on the basis of a predefined table, which is preferably maintained centrally and transferred to the crypto system.
- This table also defines priorities that regulate which remuneration protection code is assigned if several remuneration protection incidents have been identified.
- This payment assurance code is then returned together with a descriptive text as the test result.
- This payment assurance code is then returned together with a descriptive text as the test result.
- the call and the return of the results differ depending on which communication mechanism is used between the reading system and the validation controller, the call and the return of the results differ. If a synchronous RPC-based protocol such as Corba / IIOP is used, the test method is called directly and the test results are transferred after the test has been completed. In this case, the client, i.e. the scanner controller, or the reading system are waiting for the execution and return of the test results. In the latter case, a thread pool must therefore be provided on the client, which can carry out the parallel check of several requests.
- a synchronous RPC-based protocol such as Corba / IIOP
- the scanner method or the reading system does not call the test method directly, but sends a telegram to the crypto system, which contains the test request, the content of the 2D barcode and other information such as the current sorting program .
- the test function is called up, carried out and the reading and test results are sent back as a new telegram.
- the test routine for the hand scanner systems expects the session ID and the content of the 2D barcode as input values.
- the ID of the sorting program is also expected as an additional parameter.
- the last-mentioned parameter is used to determine the minimum wage.
- FIG. 5 shows an overview of the course of the test within the validation controller in the event that this was triggered by a hand scanner system.
- a test with a radio scanner is then assumed, followed by a manual comparison of the address with the 2D barcode content.
- the representation would take place analogously on the payment assurance system or the payment assurance application.
- Verification unit (Validation Controller) is shown in Fig. 5.
- the checking unit controls a sequence of
- Partial tests including reading in a matrix code contained in the digital postage indicium.
- the read-in matrix code is first transmitted from a radio scanner to a scanner controller.
- the matrix code is then checked in the area of the scanner controller and transmitted to the checking unit.
- the checking unit controls a splitting of the code content.
- the reading result is then transmitted to the registration unit - in the case shown a radio scanner. In this way, for example, a user of the reading unit learns that it was possible to read the postage indicium and to recognize the information contained in the matrix.
- the verification unit then decrypts a crypto string contained in the matrix code. This is preferably done first verifies the version of the key that is expected to be used to create the postage indicium.
- the hash value contained in the crypto ring is then checked.
- the planned minimum wage is also checked.
- an identification number (Postage ID) of the customer system controlling the generation of the postage indicium is checked.
- the result of the transmission is transmitted as a digital message, the digital message being able to be transmitted to the original radio scanner, for example.
- a user of the radio scanner can eject the program from the program run. If this method variant is carried out automatically, it is of course equally possible to eject the mail item from the normal processing run of the mail items.
- the result of the test is preferably logged in the area of the test unit.
- the session ID, the content of the 2D barcode and the unique identification of the currently active sorting program are also expected as input parameters of the test routine for the AFM 2D code reader.
- FIG. 6 shows an overview of the course of the test within the validation controller in the event that it was triggered by a reading system.
- the figure also shows the optical recording system (IMM system) and the AFM-2D code reader to show the overall context of the test.
- IMM system optical recording system
- AFM-2D code reader optical recording system
- the share of the crypto system is limited to checking the functions between the 2D barcode and the return and the logging of the result.
- FIG. 6 shows a further preferred embodiment of a control of a sequence of partial tests by the checking unit (validation controller).
- a checking unit validation controller
- the reading in of the digital postage indicia is preferably carried out in an even more automated manner, for example by optically detecting a position of a mail item on which a postage indicium is preferably arranged.
- the further checking steps essentially take place in accordance with the test sequence illustrated with reference to FIG. 5.
- the return value of the check routine consists on the one hand of the security code and an associated message as well as the converted content and the Postage ID. A telegram is generated from these return values and transmitted to the requesting reading system.
- the 80-byte content of the 2D barcode must be divided and converted into a structured object, hereinafter referred to as a 2D barcode object, in order to achieve a better display option and more efficient post-processing.
- a 2D barcode object a structured object
- the individual fields and conversions are described in the table below:
- Warning code 00 if conversion is OK, otherwise warning for payment security incident "PC-F barcode not readable"
- the version of the 2D barcode can be seen from the first three fields. This also shows whether the franking mark is a 2D barcode from Deutsche Post and not a 2D barcode from another
- Warning code 00 if version check is OK, otherwise warning code for payment assurance-
- the Postage ID contained in the 2D barcode is secured by a check digit procedure (CRC 16), which must be checked at this point. If this check fails, the result must be returned as a payment security warning "PC-F suspected of forgery (Postage ID)".
- PC-F suspected of forgery Postage ID
- the crypto string must be decrypted beforehand.
- This function is used to automatically check the time interval between franking a PC-franked item and its processing at the letter center. There can only be a certain number of days between the two dates. The number of days depends on the product and its duration plus a waiting day.
- the configuration of the period is preferably saved in a product validity period relation and maintained centrally in a maintenance mask.
- a maintenance mask For each product key possible for PC franking (field of the 2D barcode), the associated number of days that may lie between franking and processing at the mail center are recorded.
- a period of time is preconfigured, which relates to standard items and is stored as a constant in the system.
- Barcode contained date formed, for example 02.08. until 01.08. 1 day. If the determined number of days is greater than the value specified for the product, the payment assurance code assigned to the "PC-F date (franking)" warning case is returned to the Validation Controller, otherwise a code that documents the successful check. If In a simplified procedure, it is always compared with the value for standard consignments, after the test result has been issued, the possibility should be given, for example manually using a button on the scanner, to correct this test result if the current product allows a longer runtime.
- Another check of the timeout relates to the content of the Postage ID.
- the postage amount downloaded as part of a specification and thus also the Postage ID have a specified validity period in which the items are to be franked.
- the Postage ID contains the time up to which the postage amount is valid. If the franking date is a certain number of days later than this validity date, the remuneration assurance warning code belonging to the remuneration assurance warning, PC-F date (postage amount) is returned.
- PC-F date postage amount
- PC-F date franking
- the fee contained in the 2D barcode is checked against a minimum fee defined for items in the associated sorting program.
- the amounts are amounts in euros.
- the assignments are delivered between the sorting program and the minimum wage via an automatic interface.
- the subsequent check compares whether the minimum wage contained in the 2D barcode is below this mark. If this is the case, the code assigned to the "PC-F under franking" payment security incident is returned, otherwise the success code.
- This function is used to check whether the Postage ID belonging to the 2D barcode is contained in a negative file.
- the negative files are used to remove consignments from customers that have attracted attention through misuse attempts or that have had their PCs stolen from the transport run.
- the negative files are maintained centrally as part of the franking database project. As part of the
- the interface to this project is to determine the procedure for the exchange of data on the decentralized letter center systems.
- a Postage ID identifies a single specification that a customer retrieves from the system (Postage Point). These specifications are saved in a so-called safebox on the customer system. It is a hardware component in the form of a SmartCard included Reading system, or a dongle. The default amounts are securely stored in the Safebox and the customer can call up individual franking amounts without being connected online to the postage point.
- Each Safe Box is identified by a unique ID.
- This Safebox-ID is entered in the negative file if the related consignments are to be removed due to suspected misuse.
- the Safebox ID is composed of several fields. In addition to the unique key, the Safebox ID also contains other fields such as the validity date and check digit.
- the first three fields of the Safebox ID are decisive for the clear identification of the Safebox. These can also be found in the first three fields of PostagelD, which means that the assignment between Safebox and specification can be made. The fields are described in the table below:
- the process is such that the validation controller initiates the output of the 2D barcode data on the radio scanner or on the payment security PC after the automated tests have ended. He has one for this
- the scanner controller respectively the Remuneration Security PC responsible for displaying the 2D barcode content and returning a “00” or an associated error code as return value (after processing by the examiner) of the callback method.
- This check is not required for an automatic check.
- the check can preferably be carried out offline as part of the central evaluations either by comparing sales or by comparing the destination postal code with the postal code contained in the 2D barcode.
- the cryptographic check consists of two parts:
- This function receives the split 2D barcode object of the scan result as an input parameter. Based on the franking date and the key number, the symmetric key valid for this point in time is selected and the cryptostring of the transferred object is decrypted using this key using the Triple DES CBC method.
- the remuneration warning "PC-F suspicion of forgery (key)" is returned with the error message that the key with the key number was not found.
- the result of the operation consists of the decrypted Postage ID and the decrypted random number.
- the decrypted PostagelD is entered in a corresponding field of the 2D barcode object.
- the random number should not be made known, since the customer could generate valid hash values if this information was held and could thus forge 2D barcodes.
- hash value calculation is called from the method and its return value is returned.
- the hash value calculation function determines the first 60 bytes from the original scan result contained in the 2D barcode object.
- the decrypted Postage ID as well as the decrypted random number passed are attached to it.
- a hash value is calculated from this using the SHA 1 method and compared with the hash value of the 2D barcode contained in the 2D barcode object. If all 20 bytes match, the cryptographic check is successful and an appropriate return value is returned.
- the calculated hash value is also transmitted as the return value so that it can be output with the test result.
- the validation controller can use a callback method to control the output of results on the output device belonging to the current test. To do this, he transfers the 2D barcode object and the determined remuneration warning code to this callback method.
- the code of the post-processing procedure selected by the AGB-Examiner can be delivered as return value.
- the callback method for the output is also assigned at the start of the session when logging on to the Validation Controller.
- Results or correction records are transmitted directly to BDE and written to the database of the preferred local payment assurance system via the preferred payment assurance BDE interface.
- the Postage ID the consecutive number, the franking date, the charge, the product key, the zip code, the payment assurance result code, the message text, the duration of the check, the time of the check, the ID of the scanner, the operating mode of the scanner, the acquisition mode, as well as the type of processing. All values are separated from each other by a semicolon in one sentence per shipment and can thus be further evaluated in Excel, for example.
- Master data can be pre-configured in a transition period with the exception of the PC-F negative file and the cryptographic key of the fee amount loading point (Postage Point).
- the data are distributed in accordance with the method described in the preferred payment assurance IT fine concept, or access to this data is made possible.
- the exchange should take place via the preferred payment security server, since it should not be configured at the postage point that the preferred local payment security systems and which crypto systems exist.
- FIG. 7 Particularly preferred method steps for an exchange of keys are shown in FIG. 7.
- the preferred key exchange takes place between a central loading point (postage point), a central crypto server and several local crypto servers.
- the application-related basic configuration of the crypto card intended for the preferred payment security system consists of the following steps:
- Every scanner every user and every crypto card within the crypto system must be identified by a unique ID.
- every AFM 2D code reader can also be identified by a unique ID.
- This login contains the scanner ID, the user ID, as well as the callback methods for the manual check, or the output of the read and check results as parameters.
- a session ID is returned as the return value, which must be passed on to the following test calls within the session.
- a session context is stored on the validation controller, in which the transfer parameters are stored.
- Session settings these changes are reflected in the assigned variables within the session context.
- the reading systems must be registered with the Validation Controller before carrying out test inquiries.
- the ID of the reading system and a password must be transferred as parameters. If the registration is successful, a session ID is also returned as a return value, which must be transmitted in the following verification requests.
- the role of security administration includes the following tasks:
- the security administrator authenticates himself with the private key for card administration. This is stored on a floppy disk or smart card and must be taken from it
- Another task is to manage the crypto cards, with each card recording the serial number, the configuration and the system number of the system in which they are installed, and the location of the system.
- the reserve crypto cards also record who owns the cards.
- the software to be installed or installed on the card and on the crypto server is checked and the card software is released and signed.
- the card software has to be checked especially for whether one of the secret keys is located at any point Driver interface can be given to the outside, or whether manipulation attempts such as the storage of constant predefined keys or the use of insecure encryption methods were carried out there.
- the associated application software of the crypto server must also be checked.
- Authentication takes place in the same way as with the security administrator with a private key. However, this is the private key for software signing.
- the software is distributed by the QS Security Manager in coordination with the security administrator.
- This particularly preferred embodiment of the invention thus provides two different authentication keys, so that data security is increased considerably.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Testing, Inspecting, Measuring Of Stereoscopic Televisions And Televisions (AREA)
- Road Signs Or Road Markings (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
Abstract
Description
Claims
Priority Applications (13)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SK16272003A SK16272003A3 (en) | 2001-07-01 | 2002-06-28 | Method for verifying the validity of digital franking notes |
NZ530387A NZ530387A (en) | 2001-07-01 | 2002-06-28 | Method for verifying the validity of digital franking notes which has been put on a mail piece |
HU0400462A HUP0400462A2 (hu) | 2001-07-01 | 2002-06-28 | Eljárás digitális bérmentesítési jelek érvényességének ellenőrzésére |
EP02754272A EP1405274B1 (de) | 2001-07-01 | 2002-06-28 | Verfahren zum überprüfen der gültigkeit von digitalen freimachungsvermerken |
JP2003511199A JP2005508537A (ja) | 2001-07-01 | 2002-06-28 | デジタルの郵便料金別納印の有効性を検証する方法 |
CA002452750A CA2452750A1 (en) | 2001-07-01 | 2002-06-28 | Method for verifying the validity of digital franking notes |
DK02754272T DK1405274T3 (da) | 2001-07-01 | 2002-06-28 | Fremgangsmåde til kontrol af gyldigheden af digitale frankeringsaftryk |
US10/482,748 US20040249764A1 (en) | 2001-07-01 | 2002-06-28 | Method for verifying the validity of digital franking notes |
DE50208553T DE50208553D1 (de) | 2001-07-01 | 2002-06-28 | Verfahren zum überprüfen der gültigkeit von digitalen freimachungsvermerken |
AU2002320894A AU2002320894B2 (en) | 2001-07-01 | 2002-06-28 | Method for verifying the validity of digital franking notes |
HR20031076A HRP20031076B1 (en) | 2001-07-01 | 2003-12-23 | Method for verifying the validity of digital franking notes |
NO20035858A NO325464B1 (no) | 2001-07-01 | 2003-12-30 | Fremgangsmate for verifisering av gyldigheten til digitale frankeringsmerker |
HK04107210A HK1065146A1 (en) | 2001-07-01 | 2004-09-17 | Method for verifying the validity of digital franking notes |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10131254.7 | 2001-07-01 | ||
DE10131254A DE10131254A1 (de) | 2001-07-01 | 2001-07-01 | Verfahren zum Überprüfen der Gültigkeit von digitalen Freimachungsvermerken |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003005307A1 true WO2003005307A1 (de) | 2003-01-16 |
Family
ID=7689813
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DE2002/002348 WO2003005307A1 (de) | 2001-07-01 | 2002-06-28 | Verfahren zum überprüfen der gültigkeit von digitalen freimachungsvermerken |
Country Status (22)
Country | Link |
---|---|
US (1) | US20040249764A1 (de) |
EP (1) | EP1405274B1 (de) |
JP (1) | JP2005508537A (de) |
CN (1) | CN100388306C (de) |
AT (1) | ATE343830T1 (de) |
AU (1) | AU2002320894B2 (de) |
BG (1) | BG64913B1 (de) |
CA (1) | CA2452750A1 (de) |
CZ (1) | CZ301362B6 (de) |
DE (2) | DE10131254A1 (de) |
DK (1) | DK1405274T3 (de) |
HK (1) | HK1065146A1 (de) |
HR (1) | HRP20031076B1 (de) |
HU (1) | HUP0400462A2 (de) |
NO (1) | NO325464B1 (de) |
NZ (1) | NZ530387A (de) |
PL (1) | PL369445A1 (de) |
RU (1) | RU2292591C2 (de) |
SK (1) | SK16272003A3 (de) |
WO (1) | WO2003005307A1 (de) |
YU (1) | YU101803A (de) |
ZA (1) | ZA200400093B (de) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006527512A (ja) * | 2003-02-12 | 2006-11-30 | ドイチェ ポスト アーゲー | デジタル料金納付注記の正当性証明の方法およびその実行のための装置 |
US8355028B2 (en) | 2007-07-30 | 2013-01-15 | Qualcomm Incorporated | Scheme for varying packing and linking in graphics systems |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1188135A2 (de) | 1998-12-23 | 2002-03-20 | The Chase Manhattan Bank | System und verfahren zur integration von handelsaktionen einschliesslich deren erstellung, verarbeitung und verfolgung von handelsdokumenten |
US8793160B2 (en) | 1999-12-07 | 2014-07-29 | Steve Sorem | System and method for processing transactions |
US7831467B1 (en) | 2000-10-17 | 2010-11-09 | Jpmorgan Chase Bank, N.A. | Method and system for retaining customer loyalty |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US7689506B2 (en) | 2001-06-07 | 2010-03-30 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
US7266839B2 (en) | 2001-07-12 | 2007-09-04 | J P Morgan Chase Bank | System and method for providing discriminated content to network users |
US8020754B2 (en) | 2001-08-13 | 2011-09-20 | Jpmorgan Chase Bank, N.A. | System and method for funding a collective account by use of an electronic tag |
DE10150457A1 (de) * | 2001-10-16 | 2003-04-30 | Deutsche Post Ag | Verfahren und Vorrichtung zur Bearbeitung von auf Oberflächen von Postsendungen befindlichen graphischen Informationen |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
GB0225290D0 (en) * | 2002-10-30 | 2002-12-11 | Secretary Trade Ind Brit | Anti-counterfeiting apparatus and method |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
RU2232419C1 (ru) * | 2002-12-17 | 2004-07-10 | Аби Софтвер Лтд. | Система автоматизации ввода и контроля документов |
US8306907B2 (en) | 2003-05-30 | 2012-11-06 | Jpmorgan Chase Bank N.A. | System and method for offering risk-based interest rates in a credit instrument |
DE10337164A1 (de) * | 2003-08-11 | 2005-03-17 | Deutsche Post Ag | Verfahren sowie Vorrichtung zur Bearbeitung von auf Postsendungen befindlichen graphischen Informationen |
US8175908B1 (en) | 2003-09-04 | 2012-05-08 | Jpmorgan Chase Bank, N.A. | Systems and methods for constructing and utilizing a merchant database derived from customer purchase transactions data |
FR2863076B1 (fr) * | 2003-11-28 | 2006-02-03 | Bull Sa | Systeme cryptographique haut debit a architecture modulaire. |
DE102004003004B4 (de) * | 2004-01-20 | 2006-10-12 | Deutsche Post Ag | Verfahren und Vorrichtung zur Frankierung von Postsendungen |
JP4139382B2 (ja) * | 2004-12-28 | 2008-08-27 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 製品/サービスに係る所有権限を認証する装置、製品/サービスに係る所有権限を認証する方法、及び製品/サービスに係る所有権限を認証するプログラム |
US7401731B1 (en) | 2005-05-27 | 2008-07-22 | Jpmorgan Chase Bank, Na | Method and system for implementing a card product with multiple customized relationships |
US7925578B1 (en) | 2005-08-26 | 2011-04-12 | Jpmorgan Chase Bank, N.A. | Systems and methods for performing scoring optimization |
US8805747B2 (en) | 2007-12-07 | 2014-08-12 | Z-Firm, LLC | Securing shipment information accessed based on data encoded in machine-readable data blocks |
US8521656B2 (en) | 2007-12-07 | 2013-08-27 | Z-Firm, LLC | Systems and methods for providing extended shipping options |
US8527429B2 (en) | 2007-12-07 | 2013-09-03 | Z-Firm, LLC | Shipment preparation using network resource identifiers in packing lists |
US8812409B2 (en) | 2007-12-07 | 2014-08-19 | Z-Firm, LLC | Reducing payload size of machine-readable data blocks in shipment preparation packing lists |
US8818912B2 (en) | 2007-12-07 | 2014-08-26 | Z-Firm, LLC | Methods and systems for supporting the production of shipping labels |
US8622308B1 (en) | 2007-12-31 | 2014-01-07 | Jpmorgan Chase Bank, N.A. | System and method for processing transactions using a multi-account transactions device |
US8554652B1 (en) | 2008-02-21 | 2013-10-08 | Jpmorgan Chase Bank, N.A. | System and method for providing borrowing schemes |
US8392337B2 (en) * | 2008-05-16 | 2013-03-05 | Bell And Howell, Llc | Generation of unique mail item identification within a multiple document processing system environment |
DE102008063009A1 (de) * | 2008-12-23 | 2010-06-24 | Deutsche Post Ag | Verfahren und System zum Versenden einer Postsendung |
KR101072277B1 (ko) * | 2009-08-31 | 2011-10-11 | 주식회사 아나스타시스 | 실시간 데이터 무결성 보장 장치 및 방법과 이를 이용한 블랙박스 시스템 |
US8554631B1 (en) | 2010-07-02 | 2013-10-08 | Jpmorgan Chase Bank, N.A. | Method and system for determining point of sale authorization |
US9058626B1 (en) | 2013-11-13 | 2015-06-16 | Jpmorgan Chase Bank, N.A. | System and method for financial services device usage |
EP2879099B1 (de) * | 2013-12-02 | 2019-01-09 | Deutsche Post AG | Verfahren zum Überprüfen einer Authentizität eines Absenders einer Sendung |
US11227252B1 (en) | 2018-09-28 | 2022-01-18 | The Descartes Systems Group Inc. | Token-based transport rules |
DE102018132991A1 (de) * | 2018-12-19 | 2020-06-25 | Francotyp-Postalia Gmbh | System und verfahren zum protokollieren von prozess-schritten |
JP2022516550A (ja) * | 2019-07-31 | 2022-02-28 | 北京市商▲湯▼科技▲開▼▲發▼有限公司 | 情報処理 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4461028A (en) * | 1980-10-15 | 1984-07-17 | Omron Tateisielectronics Co. | Identifying system |
GB2174039A (en) * | 1985-04-17 | 1986-10-29 | Pitney Bowes Inc | Postage and mailing information applying system |
US5091634A (en) * | 1988-10-04 | 1992-02-25 | Scantech Promotions Inc. | Coupon validation terminal |
EP0600646A2 (de) * | 1992-11-20 | 1994-06-08 | Pitney Bowes Inc. | Gesichertes Dokument und Verfahren und Vorrichtung zum Herstellen und Beglaubigen desselben |
EP0732673A2 (de) * | 1995-03-17 | 1996-09-18 | Neopost Limited | Frankiermaschinensystem und Überprüfung der Postgebühren |
US5953427A (en) * | 1993-12-06 | 1999-09-14 | Pitney Bowes Inc | Electronic data interchange postage evidencing system |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4670011A (en) * | 1983-12-01 | 1987-06-02 | Personal Products Company | Disposable diaper with folded absorbent batt |
US4757537A (en) * | 1985-04-17 | 1988-07-12 | Pitney Bowes Inc. | System for detecting unaccounted for printing in a value printing system |
US5349633A (en) * | 1985-07-10 | 1994-09-20 | First Data Resources Inc. | Telephonic-interface game control system |
US4796193A (en) * | 1986-07-07 | 1989-01-03 | Pitney Bowes Inc. | Postage payment system where accounting for postage payment occurs at a time subsequent to the printing of the postage and employing a visual marking imprinted on the mailpiece to show that accounting has occurred |
US4813912A (en) * | 1986-09-02 | 1989-03-21 | Pitney Bowes Inc. | Secured printer for a value printing system |
US4893338A (en) * | 1987-12-31 | 1990-01-09 | Pitney Bowes Inc. | System for conveying information for the reliable authentification of a plurality of documents |
US4949381A (en) * | 1988-09-19 | 1990-08-14 | Pitney Bowes Inc. | Electronic indicia in bit-mapped form |
US5022080A (en) * | 1990-04-16 | 1991-06-04 | Durst Robert T | Electronic notary |
US5170044A (en) * | 1990-11-09 | 1992-12-08 | Pitney Bowes Inc. | Error tolerant 3x3 bit-map coding of binary data and method of decoding |
US5142577A (en) * | 1990-12-17 | 1992-08-25 | Jose Pastor | Method and apparatus for authenticating messages |
US5241600A (en) * | 1991-07-16 | 1993-08-31 | Thinking Machines Corporation | Vertification system for credit or bank card or the like |
US5448641A (en) * | 1993-10-08 | 1995-09-05 | Pitney Bowes Inc. | Postal rating system with verifiable integrity |
US5606613A (en) * | 1994-12-22 | 1997-02-25 | Pitney Bowes Inc. | Method for identifying a metering accounting vault to digital printer |
US5661803A (en) * | 1995-03-31 | 1997-08-26 | Pitney Bowes Inc. | Method of token verification in a key management system |
US6889214B1 (en) * | 1996-10-02 | 2005-05-03 | Stamps.Com Inc. | Virtual security device |
US6032138A (en) * | 1997-09-05 | 2000-02-29 | Pitney Bowes Inc. | Metering incoming deliverable mail |
DE19748954A1 (de) * | 1997-10-29 | 1999-05-06 | Francotyp Postalia Gmbh | Verfahren für eine digital druckende Frankiermaschine zur Erzeugung und Überprüfung eines Sicherheitsabdruckes |
DE19812902A1 (de) * | 1998-03-18 | 1999-09-23 | Francotyp Postalia Gmbh | Verfahren für eine Frankier- und Adressiermaschine |
US6175827B1 (en) * | 1998-03-31 | 2001-01-16 | Pitney Bowes Inc. | Robus digital token generation and verification system accommodating token verification where addressee information cannot be recreated automated mail processing |
ES2292263T3 (es) * | 1998-11-24 | 2008-03-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Metodo y sistema de comunicacion con unidades de abonado adaptables dinamicamente. |
US6480831B1 (en) * | 1998-12-24 | 2002-11-12 | Pitney Bowes Inc. | Method and apparatus for securely transmitting keys from a postage metering apparatus to a remote data center |
US6847951B1 (en) * | 1999-03-30 | 2005-01-25 | Pitney Bowes Inc. | Method for certifying public keys used to sign postal indicia and indicia so signed |
US6178412B1 (en) * | 1999-04-19 | 2001-01-23 | Pitney Bowes Inc. | Postage metering system having separable modules with multiple currency capability and synchronization |
JP2001215853A (ja) * | 2000-01-31 | 2001-08-10 | Canon Inc | 画像データ処理装置、画像データ記録装置、画像データ記録システム、画像データ記録方法及び記憶媒体 |
DE10020566C2 (de) * | 2000-04-27 | 2002-11-14 | Deutsche Post Ag | Verfahren zum Versehen von Postsendungen mit Freimachungsvermerken |
US6868407B1 (en) * | 2000-11-02 | 2005-03-15 | Pitney Bowes Inc. | Postage security device having cryptographic keys with a variable key length |
DE10055145B4 (de) * | 2000-11-07 | 2004-09-23 | Deutsche Post Ag | Verfahren zum Versehen von Postsendungen mit Frankierungsvermerken |
US6938017B2 (en) * | 2000-12-01 | 2005-08-30 | Hewlett-Packard Development Company, L.P. | Scalable, fraud resistant graphical payment indicia |
-
2001
- 2001-07-01 DE DE10131254A patent/DE10131254A1/de not_active Ceased
-
2002
- 2002-06-26 YU YU101803A patent/YU101803A/sh unknown
- 2002-06-28 CA CA002452750A patent/CA2452750A1/en not_active Abandoned
- 2002-06-28 RU RU2003137601/09A patent/RU2292591C2/ru not_active IP Right Cessation
- 2002-06-28 PL PL02369445A patent/PL369445A1/xx not_active Application Discontinuation
- 2002-06-28 AT AT02754272T patent/ATE343830T1/de not_active IP Right Cessation
- 2002-06-28 DE DE50208553T patent/DE50208553D1/de not_active Expired - Lifetime
- 2002-06-28 NZ NZ530387A patent/NZ530387A/en unknown
- 2002-06-28 EP EP02754272A patent/EP1405274B1/de not_active Expired - Lifetime
- 2002-06-28 JP JP2003511199A patent/JP2005508537A/ja active Pending
- 2002-06-28 HU HU0400462A patent/HUP0400462A2/hu unknown
- 2002-06-28 SK SK16272003A patent/SK16272003A3/sk unknown
- 2002-06-28 CZ CZ20033555A patent/CZ301362B6/cs not_active IP Right Cessation
- 2002-06-28 CN CNB028160320A patent/CN100388306C/zh not_active Expired - Fee Related
- 2002-06-28 AU AU2002320894A patent/AU2002320894B2/en not_active Ceased
- 2002-06-28 DK DK02754272T patent/DK1405274T3/da active
- 2002-06-28 US US10/482,748 patent/US20040249764A1/en not_active Abandoned
- 2002-06-28 WO PCT/DE2002/002348 patent/WO2003005307A1/de active IP Right Grant
-
2003
- 2003-12-23 HR HR20031076A patent/HRP20031076B1/xx not_active IP Right Cessation
- 2003-12-29 BG BG108505A patent/BG64913B1/bg unknown
- 2003-12-30 NO NO20035858A patent/NO325464B1/no unknown
-
2004
- 2004-01-07 ZA ZA200400093A patent/ZA200400093B/en unknown
- 2004-09-17 HK HK04107210A patent/HK1065146A1/xx not_active IP Right Cessation
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4461028A (en) * | 1980-10-15 | 1984-07-17 | Omron Tateisielectronics Co. | Identifying system |
GB2174039A (en) * | 1985-04-17 | 1986-10-29 | Pitney Bowes Inc | Postage and mailing information applying system |
US5091634A (en) * | 1988-10-04 | 1992-02-25 | Scantech Promotions Inc. | Coupon validation terminal |
EP0600646A2 (de) * | 1992-11-20 | 1994-06-08 | Pitney Bowes Inc. | Gesichertes Dokument und Verfahren und Vorrichtung zum Herstellen und Beglaubigen desselben |
US5953427A (en) * | 1993-12-06 | 1999-09-14 | Pitney Bowes Inc | Electronic data interchange postage evidencing system |
EP0732673A2 (de) * | 1995-03-17 | 1996-09-18 | Neopost Limited | Frankiermaschinensystem und Überprüfung der Postgebühren |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006527512A (ja) * | 2003-02-12 | 2006-11-30 | ドイチェ ポスト アーゲー | デジタル料金納付注記の正当性証明の方法およびその実行のための装置 |
US8355028B2 (en) | 2007-07-30 | 2013-01-15 | Qualcomm Incorporated | Scheme for varying packing and linking in graphics systems |
Also Published As
Publication number | Publication date |
---|---|
HRP20031076B1 (en) | 2008-04-30 |
ATE343830T1 (de) | 2006-11-15 |
CN100388306C (zh) | 2008-05-14 |
DK1405274T3 (da) | 2007-02-26 |
CA2452750A1 (en) | 2003-01-16 |
RU2292591C2 (ru) | 2007-01-27 |
PL369445A1 (en) | 2005-04-18 |
CN1554076A (zh) | 2004-12-08 |
HUP0400462A2 (hu) | 2005-02-28 |
BG64913B1 (bg) | 2006-08-31 |
YU101803A (sh) | 2005-06-10 |
NZ530387A (en) | 2005-06-24 |
CZ20033555A3 (en) | 2004-05-12 |
AU2002320894B2 (en) | 2007-04-26 |
HK1065146A1 (en) | 2005-02-08 |
NO20035858L (no) | 2004-01-20 |
EP1405274B1 (de) | 2006-10-25 |
ZA200400093B (en) | 2005-04-01 |
US20040249764A1 (en) | 2004-12-09 |
EP1405274A1 (de) | 2004-04-07 |
CZ301362B6 (cs) | 2010-01-27 |
DE10131254A1 (de) | 2003-01-23 |
SK16272003A3 (en) | 2004-10-05 |
BG108505A (en) | 2004-08-31 |
RU2003137601A (ru) | 2005-05-27 |
NO325464B1 (no) | 2008-05-05 |
DE50208553D1 (de) | 2006-12-07 |
HRP20031076A2 (en) | 2005-10-31 |
JP2005508537A (ja) | 2005-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1405274B1 (de) | Verfahren zum überprüfen der gültigkeit von digitalen freimachungsvermerken | |
DE69631025T2 (de) | System und Verfahren zur Wiederherstellung im Falle einer Katastrophe in einem offenen Zählsystem | |
DE69634397T2 (de) | Verfahren zum Erzeugen von Wertmarken in einem offenen Zählsystem | |
DE69434621T2 (de) | Postgebührensystem mit nachprüfbarer Unversehrtheit | |
DE3841389C2 (de) | Informationsübermittlungssystem zur zuverlässigen Bestimmung der Echtheit einer Vielzahl von Dokumenten | |
DE69433466T2 (de) | Verfahren und Vorrichtung zum Ändern eines Verschlüsselungsschlüssels in einem Postverarbeitungssystem mit einer Frankiermaschine und einem Überprüfungszentrum | |
DE69932396T2 (de) | Verfahren und Vorrichtung zur sicheren Schlüsselübertragung zwischen einer Frankiermaschine und einer entfernten Datenzentrale | |
DE69738636T2 (de) | Verbessertes Verschlüsselungskontrollsystem für ein Postverarbeitungssystem mit Überprüfung durch das Datenzentrum | |
DE10056599C2 (de) | Verfahren zum Versehen von Postsendungen mit Freimachungsvermerken | |
DE10300297A1 (de) | Verfahren und Vorrichtung zur Bearbeitung von auf Oberflächen von Postsendungen befindlichen graphischen Informationen | |
DE10305730A1 (de) | Verfahren zum Überprüfen der Gültigkeit von digitalen Freimachungsvermerken und Vorrichtung zur Durchführung des Verfahrens | |
DE10020566C2 (de) | Verfahren zum Versehen von Postsendungen mit Freimachungsvermerken | |
EP1807808B1 (de) | Verfahren und vorrichtung zum frankieren von postsendungen | |
EP1340197B1 (de) | Verfahren zum versehen von postsendungen mit frankierungsvermerken | |
DE69930202T2 (de) | Verfahren zur Begrenzung der Schlüsselbenutzung in einem Frankiersystem welches kryptographisch gesicherte Briefmarken produziert | |
EP1486028B1 (de) | Verfahren und vorrichtung zur erstellung prüfbar fälschungssicherer dokumente | |
EP2140429A1 (de) | Verfahren und vorrichtungen zur frankierung einer postsendung mit speicherung der kennungsinformation der postsendung in einer positivliste | |
WO2006018097A1 (de) | Verfahren und vorrichtung zur frankierung von postsendungen | |
EP1759486B1 (de) | Verfahren zur dokumentation wenigstens einer verifikation an einem analogen oder digitalen dokument sowie herstellung eines derartigen dokumentes | |
DE102004047221A1 (de) | Verfahren und Vorrichtung zum Frankieren von Postsendungen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: P-1018/03 Country of ref document: YU |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: PV2003-3555 Country of ref document: CZ Ref document number: P20031076A Country of ref document: HR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 530387 Country of ref document: NZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003511199 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 10850502 Country of ref document: BG Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 16272003 Country of ref document: SK |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2452750 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002754272 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004/00093 Country of ref document: ZA Ref document number: 200400093 Country of ref document: ZA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002320894 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 205/DELNP/2004 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20028160320 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2002754272 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: PV2003-3555 Country of ref document: CZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10482748 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 530387 Country of ref document: NZ |
|
WWG | Wipo information: grant in national office |
Ref document number: 2002754272 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2002320894 Country of ref document: AU |