WO2019186417A1 - Control of a utility - Google Patents

Control of a utility Download PDF

Info

Publication number
WO2019186417A1
WO2019186417A1 PCT/IB2019/052480 IB2019052480W WO2019186417A1 WO 2019186417 A1 WO2019186417 A1 WO 2019186417A1 IB 2019052480 W IB2019052480 W IB 2019052480W WO 2019186417 A1 WO2019186417 A1 WO 2019186417A1
Authority
WO
WIPO (PCT)
Prior art keywords
utility
user
interface
supply controller
user identity
Prior art date
Application number
PCT/IB2019/052480
Other languages
French (fr)
Inventor
Hugh Peter MEAD
Andrew Dean DOBSON
Graham Clarke
Original Assignee
Mead Hugh Peter
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mead Hugh Peter filed Critical Mead Hugh Peter
Publication of WO2019186417A1 publication Critical patent/WO2019186417A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • G06Q20/145Payments according to the detected use or quantity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F15/00Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S50/00Market activities related to the operation of systems integrating technologies related to power network operation or related to communication or information technologies
    • Y04S50/10Energy trading, including energy flowing from end-user application to grid
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S50/00Market activities related to the operation of systems integrating technologies related to power network operation or related to communication or information technologies
    • Y04S50/12Billing, invoicing, buying or selling transactions or other related activities, e.g. cost or usage evaluation

Definitions

  • the present invention relates to control of a utility.
  • the invention relates to a utility supply controller, to a utility supply system and to a method of controlling supply of a utility.
  • the inventors are aware of remote controlled electrical switches that are used in domestic and other electrical power supply installations. However, the inventors identified a need for an intelligent utility supply controller that can be applied to any utility, but also specifically to electricity.
  • the term "utility” is used to refer to a resource such as electricity, gas, water, or the like, which is distributed from a central supplier to a remote user.
  • a resource such as electricity, gas, water, or the like
  • the invention is specifically aimed at electricity supply at remote charging stations, the invention is not limited to this application.
  • the present invention aims to address this need.
  • a utility supply controller which includes
  • a local wireless interface operable to communicate with a user identity device
  • a network interface operable to communicate to a remote server on which a user's information is hosted
  • a processor connected to the local wireless interface and the network interface, operable to read a user's identity from a user identity device, to forward transaction details to a remote utility server, to receive instructions from the remote utility server, to dispense a utility and to control dispensing of a utility to the user; and a utility interface, operable to control a utility electricity supply under instruction from the processor.
  • the local wireless interface may be in the form of a near field communication (NFC) interface, a Bluetooth Low Emission (BLE) interface, a radio- frequency identification (RFID) interface, an 802.1 1x interface, a WiFi interface, a mobile telephone network data interface or the like.
  • NFC near field communication
  • BLE Bluetooth Low Emission
  • RFID radio- frequency identification
  • the processor of the utility supply controller may be operable in three modes, including:
  • a reader/writer mode in which the processor is operable to read a user identity device in the form of a NFC type tag, or through data transfer via a device or such like;
  • the processor is operable to exchange data with a matched NFC device, or pairing through WiFi or Bluetooth interface;
  • the processor is operable to exchange data with a user identity device which emulates a contactless smart card.
  • a utility supply system which includes
  • At least one utility supply controller as described above;
  • At least one user identity device associated with a particular user and operable to communicate with the at least one utility supply controller
  • a utility server on which at least one user's information is stored and from which a transaction can be approved, the server operable to communicate with the at least one utility supply controller to authenticate a user and to charge a user account with electricity supplied via the at least one electricity supply controller.
  • the user identity device could be in the form of any one of a mobile telephone, a radio frequency identification device, of the like, operable to store a user's identity details, such as a username of a user and a hash value of a user password.
  • the user's identity details may be pre-registered or may be registered at a later stage.
  • the user identity device may include an application which may be downloaded from a third party application library.
  • the application may be operable to access the Internet through a TCP/IP protocol, to access a global positioning receiver of the mobile telephone, and a network interface of the mobile telephone, thereby to communicate with a utility supply controller, via a matched interface.
  • Each user identity device may be associated with a particular user by any one of: a biometric scan (e.g. fingerprint scan, facial scan, retina scan etc.), a unique subscriber identity or the like.
  • a biometric scan e.g. fingerprint scan, facial scan, retina scan etc.
  • the utility supply controller is not a source of the utility, but merely controls dispensing of the utility to a user.
  • the invention extends to a method of controlling supply of a utility to a user, the method including the steps of:
  • the utility supply controller to dispense the utility to a user associated with the user identity device at a point of utility supply.
  • the step of reading a user identity device may include receiving user identity credentials from a user identity device onto a utility supply controller.
  • the step of confirming transaction details may then include reading details of a utility supplier and transmitting these details together with the user identity credentials via a network interface to a remote utility server for confirmation.
  • the step of confirming the transaction details may then include receiving confirmation from the remote utility server of a financial transaction confirmation.
  • the method may then include dispensing the utility according to the transaction details that were confirmed.
  • the step of reading a user identity device may include loading details of a utility supplier onto a user identity device.
  • the step of confirming transaction details may then include transmitting details of a utility supplier together with the user identity credentials to a remote utility server via a user identity device.
  • This step may include transmitting the details via a mobile telephone network, a satellite network, or the like, to which the user identity device has access.
  • the step of confirming the transaction details may then include receiving confirmation from the remote utility server of a financial transaction confirmation via the user identity device and passing confirmation from the user identity device to the utility supply controller via the local wireless interface.
  • the method may then include dispensing the utility according to the transaction details that were confirmed.
  • FIG. 1 shows a utility supply system in accordance with one aspect of the invention
  • Figure 2 shows a method of controlling a supply of a utility in accordance with another aspect of the invention
  • Figure 3 shows one embodiment of the method of Figure 2 in which Internet is available on the utility supply controller of the utility supply system in Figure 1 ;
  • FIG 4 shows one embodiment of the method of Figure 2 in which no Internet is available on the utility supply controller of the utility supply system in Figure 1.
  • a utility supply system (10) is shown.
  • the utility supply system (10) includes a utility supply controller (12), at least one user identity device (14), which is associated with a particular user (16), and a remote utility server (18).
  • the user identity device (14) is operable to communicate with the at least one utility supply controller (12).
  • At least one user's information is stored on the utility server (18) and the utility server (18) is operable to authenticate a user (16), to approve a transaction, to charge a user account and once approved/charged, to communicate with the at least one utility supply controller (12) to supply a utility via the utility supply controller (12).
  • the user supply controller (12) includes a local wireless interface (12.1 ) operable to communicate with the user identity device (14).
  • the local wireless interface (12.1 ) operable to communicate with the user identity device (14).
  • the user supply controller (12) further includes a network interface (12.2), operable to communicate to a remote server on which a user's information is hosted.
  • the network interface (12.2) is in the form of an Ethernet interface or a Global Packet Radio Service (GPRS) interface operable to communicate on a public network such as the Internet.
  • the user supply controller (12) also includes a processor (12.3) which is connected to the local wireless interface (12.1 ) and the network interface
  • the processor (12.3) is operable to read a user's identity from a user identity device (14) via the local wireless interface (12.1 ), to forward transaction details to the remote utility server (18), via the network interface (12.2), to receive instructions from the remote utility server (18), via the network interface (12.2), to dispense a utility and to control dispensing of a utility to the user (16).
  • the user supply controller (12) further includes a utility interface (12.4), operable to control a utility supply (20) under instruction from the processor (12.3).
  • the utility to be dispensed is a supply of electricity.
  • the user supply controller (12) further includes memory (12.5), a battery (12.6), a power supply unit (12.7) and a relay (12.8) by means of which the electricity supply (20) is switched to a user's electrical device (22).
  • the utility supply system (10) provides a method of controlling supply of a utility, which in this instance is a supply of electricity, to a user.
  • the method includes reading a user identity device at 100 on a utility supply controller (12) located at a point of utility supply (20) to retrieve a user (16) identity from the user identity device (14).
  • the utility supply controller (12) confirms transaction details of a user transaction on a remote utility server (18).
  • the transaction details are confirmed and the utility supply controller (12) is instructed by the remote utility server (18) to dispense a utility in accordance with the transaction details.
  • the utility supply controller (12) activates the relay (12.8) to dispense electricity from the electricity supply (20) to a user device (22) associated with the user identity device (14) at a point of utility supply.
  • the step of reading a user identity device (14) may include receiving user (16) identity credentials from a user identity device (14) onto a utility supply controller (12).
  • the step of confirming transaction details may then include reading details of a utility supplier (20) and transmitting these details at 102 together with the user identity credentials via a network interface (not shown) to a remote utility server (18) for confirmation.
  • the step of confirming the transaction details may then include receiving confirmation at 104 from the remote utility server of a financial transaction.
  • the method may then include dispensing the utility according to the transaction details that were confirmed.
  • the step of reading a user identity device (14) may include loading details of a utility supplier (20) onto a user identity device (14).
  • the step of confirming transaction details may then include transmitting details of a utility supplier (20) together with the user (16) identity credentials to a remote utility server (18) via a user identity device (14).
  • This step may include transmitting the details via a mobile telephone network, a satellite network, or the like (not shown), to which the user identity device (14) has access.
  • the step of confirming the transaction details may then include receiving confirmation from the remote utility server (18) of a financial transaction via the user identity device (14) and passing confirmation from the user identity device (14) to the utility supply controller (18) via the local wireless interface (12.1 ).
  • the method may then include dispensing the utility according to the transaction details that were confirmed.
  • Figure 3 the method of Figure 2 is illustrated in more detail, where Internet connectivity is available on the utility supply controller (12) of the utility supply system (10).
  • the user identity device (14) is in the form of a mobile telephone, which includes a mobile application downloaded from a third party application library.
  • the application is operable to access the Internet (not shown) through a TCP/IP protocol, to access a global positioning receiver of the mobile telephone, and a network interface of the mobile telephone, thereby to communicate with the utility supply controller (12), via a matched interface. It is to be appreciated that the application can also be downloaded onto other machines.
  • Each user identity device is associated with a particular user by either a biometric scan in the form of fingerprint scan or facial scan and a unique subscriber identity module (SIM). All user identity devices have a unique identity (or "Device Name") which is published and is displayed on the device to be visible externally.
  • SIM subscriber identity module
  • 100.1 refers to steps on the mobile application of the mobile telephone (14)
  • 100.2 refer to steps on the utility supply controller (12) device
  • 100.3 refers to steps on the remote utility server (18).
  • the user identity device (14) pairs with the utility supply controller (12) via a Bluetooth connection. This pairing is automatic, as the mobile application is set to "hand off automatically”.
  • BearerRequest it is established which device will do the transaction.
  • the user identity device (14) requests the utility supply controller (12) for a status on its internet connectivity by sending a connectivity request to the BearerReq Device at 116. If the Internet connectivity is active on the utility supply controller (12) execution is directed to 118, alternatively, if Internet connectivity is not available, execution is directed to 120 on Figure 4.
  • the BearerReq Device responds with a Success or a Failure, indicating the status of the Internet connectivity. Referring to Figure 4, method steps 110, 112, 1 14 and 116 are exactly the same as for the method in Figure 3.
  • the user identity device (14) pass the user's identity details to the utility supply controller (12), which receives it at 122.
  • the user's username and unique subscriber number (or "Trans ID") is sent to the utility supply controller (12) device for encryption.
  • This is sent to the utility supply controller (12) device along with the user's password hash and length of time (“LoT”), both the user password hash and TransID are encrypted with the server's public key.
  • the user's username and LoT is sent in the clear. Decryption and returning a valid TransID will be used as authentication message in this step.
  • a session ID is generated. Then, the session ID, the device ID and the information received is encrypted by the server public key. As the device ID is unique, this is used as the return identity.
  • AuthoriseTrans all data is encapsulated together with the public server key for transmission to the remote utility server (18, or "authentication server”).
  • a bearer method code is added as a suffix to the encapsulated data to alert the remote utility server (18) which endpoint will conduct the first layer of de-encryption.
  • the utility supply controller (12) sends the user identity in the form of a hash value to the remote utility server (18).
  • the remote utility server (18) decrypts both messages using a private key for both the device and the user account.
  • the account username and password hash is authenticated and a request is made using the account payment details.
  • the remote utility server (10) further combines the two components in order to create an association between the transaction and the user account.
  • the device message (which includes the session ID and the LoT from the account) is encapsulated with an account public key.
  • the remote utility server (18) validates the user identity details and requests payment authorization for the transaction, at 128, from a remote payment gateway (not shown). If the payment was unsuccessful the transaction is rejected with an appropriate error code. If the payment was successful, a confirmation message is sent to the utility supply controller (12) at 128 to activate the relay (128). Both the success and failure responses are re-encrypted.
  • the encrypted data packet is decrypted using the private device key and the session ID is compared to the original. If these are identical, then this is used as an authentication message, and the LoT is used as the clock comparator. A clock is started and the relay is activated. If there is an interruption, the Usage Clock is recorded and the remote utility server (18) is notified If the Usage Clock equals the LoT booked, then the Usage Clock is sent to the remote utility server (18)
  • the utility supply controller (12) notifies the user identity device (14) that the transaction was successful once decrypted.
  • the user is visually notified of success or failure.
  • the failure (or "reject”) message will have a message code to notify the user of a suitable response.
  • a message is sent from the utility supply controller (12) to the remote utility server (18).
  • the session ID and the Recorded Usage is encrypted using the server's public key and sent in the message. If the bearer is available, then it is used to send the message. If the bearer is not available, then the message sent via Bluetooth to the application at 156 in Figure 4. If no application is present, then the LoT default time will be used.
  • the transaction details are recorded on the remote utility server (18). From the session ID, the user can now be charged against the usage or charged back.
  • FIG 4 another embodiment of the method is shown.
  • no Internet is available on the utility supply controller (12) of the utility supply system (10).
  • reference numerals 110 (“Open_App"), 1 12 (“App_Device_Pair”), 114 (“BearerRequest”) and 116 (“BearerReqDevice”) remain the same as in Figure 3.
  • 200.1 refers to steps on the mobile application
  • 200.2 refer to steps on the utility supply controller (12) device
  • 200.3 refers to steps on the remote utility server (18)
  • 200.4 refers to the steps on the payment end.
  • a unique session identity (or "SessionID”) is then requested from the utility supply controller (12).
  • the unique session identity generated, together with the device identity (or “DevicelD”) are encrypted by the server public key.
  • the user identity device (14) sends its user identity details directly to the remote utility server (18) in the form of a hash value.
  • the data for the device (trans ID) seeking authority to start and the user's username and password hash are required to authorise the payment.
  • a bearer method code is added as a suffix to these to notify the remote utility server (18) at which endpoint to conduct the first layer of de-encryption.
  • the remote utility server (18) requests payment authorization for the transaction at 146 from a remote payment gateway (148, "Payment Service”).
  • the remote utility server (18) decrypts both messages using its private key for both the device and the account.
  • the account username and password hash is authenticated and a request is made using the account payment details.
  • the server (18) must combine the two components in order create an association between the transaction and the user account.
  • the device message (which is the session ID and the LoT from the acct) is encapsulated with the account public key. If the payment was unsuccessful the transaction is rejected with an appropriate error code. If the payment was successful, a confirmation message is sent to the user identity device (14) at 150.
  • the confirmation message is received on the user identity device (14) which then passes the confirmation message to the utility supply controller at 152, which then activates the relay (12.8). This confirms that the request sent is the same as the request received before passing the encrypted authentication message onto the device. The user is notified on the application for both accept and reject.
  • the packet is decrypted using the private dev key and the session ID is compared to the original. If the same, then this is taken as an authentication message.
  • the LoT is used as the clock comparator. A clock is started and the relay is activated. If there is an interruption, the usage clock is recorded and the remote utility server (18) is notified. If the usage clock equals the LoT booked, then the usage clock is sent to the server.
  • the utility supply controller (12) notifies the user identity device (14) that the transaction was successful, which receives the message at 156 (“PassServer”) and sends it on to the remote utility server (18) at 158 to confirm that the transaction was successful.
  • the notification sent includes the session ID and the recorded usage encrypted using the remote utility server's public key. If Internet (e.g. Wifi) is available then this step uses the Internet. If not, then the notification is sent via Bluetooth to the application. If no application is present on the mobile telephone, then the LoT default time will be used.
  • Internet e.g. Wifi
  • the inventors are of the view that the invention described herein provides a new utility supply controller, a new utility supply system and a new method of controlling supply of a utility.
  • the inventors are of the opinion that the invention can be applied to electricity as a utility being provided by a third party.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Utility supply controller (12), utility supply system (10) and method of controlling supply of a utility (20) to a user (16). The utility supply controller (12) includes a local wireless interface (12.1) which is operable to communicate with a user identity device (14), a network interface (12.2) which is operable to communicate to a remote server (18) on which a user's information is hosted and a processor (12.3) which is connected to the local wireless interface (12.1) and the network interface (12.2) and which is operable to read a user's identity from a user identity device (14), to forward transaction details to a remote utility server (18), to receive instructions from the remote utility server (18), to dispense a utility (20) and to control dispensing of a utility (20) to the user (16). The controller (12) also includes a utility interface (12.4) which is operable to control a utility electricity supply (20) under instruction from the processor (12.3).

Description

CONTROL OF A UTILITY
FIELD OF THE INVENTION
The present invention relates to control of a utility. In particular, the invention relates to a utility supply controller, to a utility supply system and to a method of controlling supply of a utility.
BACKGROUND OF THE INVENTION
The inventors are aware of remote controlled electrical switches that are used in domestic and other electrical power supply installations. However, the inventors identified a need for an intelligent utility supply controller that can be applied to any utility, but also specifically to electricity.
In this specification, the term "utility" is used to refer to a resource such as electricity, gas, water, or the like, which is distributed from a central supplier to a remote user. Although the invention is specifically aimed at electricity supply at remote charging stations, the invention is not limited to this application.
The present invention aims to address this need.
SUMMARY OF THE INVENTION
According to a first aspect of the invention, there is provided a utility supply controller, which includes
a local wireless interface, operable to communicate with a user identity device; a network interface, operable to communicate to a remote server on which a user's information is hosted;
a processor connected to the local wireless interface and the network interface, operable to read a user's identity from a user identity device, to forward transaction details to a remote utility server, to receive instructions from the remote utility server, to dispense a utility and to control dispensing of a utility to the user; and a utility interface, operable to control a utility electricity supply under instruction from the processor.
The local wireless interface may be in the form of a near field communication (NFC) interface, a Bluetooth Low Emission (BLE) interface, a radio- frequency identification (RFID) interface, an 802.1 1x interface, a WiFi interface, a mobile telephone network data interface or the like.
The processor of the utility supply controller may be operable in three modes, including:
- a reader/writer mode, in which the processor is operable to read a user identity device in the form of a NFC type tag, or through data transfer via a device or such like;
- a peer-to-peer mode, in which the processor is operable to exchange data with a matched NFC device, or pairing through WiFi or Bluetooth interface; and
- a card emulation mode, in which the processor is operable to exchange data with a user identity device which emulates a contactless smart card.
According to a further aspect of the invention, there is provided a utility supply system, which includes
at least one utility supply controller, as described above;
at least one user identity device, associated with a particular user and operable to communicate with the at least one utility supply controller;
a utility server on which at least one user's information is stored and from which a transaction can be approved, the server operable to communicate with the at least one utility supply controller to authenticate a user and to charge a user account with electricity supplied via the at least one electricity supply controller.
The user identity device could be in the form of any one of a mobile telephone, a radio frequency identification device, of the like, operable to store a user's identity details, such as a username of a user and a hash value of a user password. The user's identity details may be pre-registered or may be registered at a later stage.
In the embodiment where the user identity device is in the form of a mobile telephone, the user identity device may include an application which may be downloaded from a third party application library. The application may be operable to access the Internet through a TCP/IP protocol, to access a global positioning receiver of the mobile telephone, and a network interface of the mobile telephone, thereby to communicate with a utility supply controller, via a matched interface.
Each user identity device may be associated with a particular user by any one of: a biometric scan (e.g. fingerprint scan, facial scan, retina scan etc.), a unique subscriber identity or the like.
It is to be appreciated that the utility supply controller is not a source of the utility, but merely controls dispensing of the utility to a user.
The invention extends to a method of controlling supply of a utility to a user, the method including the steps of:
reading a user identity device on a utility supply controller located at a point of utility supply to retrieve a user's identity from the user identity device;
confirming transaction details of a user transaction on a remote utility server; upon successful confirmation of the transaction details instructing the utility supply controller from the remote utility server to dispense a utility in accordance with the transaction details; and
enabling the utility supply controller to dispense the utility to a user associated with the user identity device at a point of utility supply.
In one embodiment of the method, in which a utility supply controller is connected to a remote utility server, the step of reading a user identity device may include receiving user identity credentials from a user identity device onto a utility supply controller. The step of confirming transaction details may then include reading details of a utility supplier and transmitting these details together with the user identity credentials via a network interface to a remote utility server for confirmation. The step of confirming the transaction details may then include receiving confirmation from the remote utility server of a financial transaction confirmation. The method may then include dispensing the utility according to the transaction details that were confirmed. In another embodiment of the method, in which a utility supply controller is not connected to a remote utility server, but the user identity device is connectable to a remote utility server via the Internet, the step of reading a user identity device may include loading details of a utility supplier onto a user identity device. The step of confirming transaction details may then include transmitting details of a utility supplier together with the user identity credentials to a remote utility server via a user identity device. This step may include transmitting the details via a mobile telephone network, a satellite network, or the like, to which the user identity device has access. The step of confirming the transaction details may then include receiving confirmation from the remote utility server of a financial transaction confirmation via the user identity device and passing confirmation from the user identity device to the utility supply controller via the local wireless interface. The method may then include dispensing the utility according to the transaction details that were confirmed.
The invention is now described, by way of non-limiting example, with reference to the accompanying figure(s).
FIGURE(S)
In the figure(s):
Figures 1 shows a utility supply system in accordance with one aspect of the invention;
Figure 2 shows a method of controlling a supply of a utility in accordance with another aspect of the invention;
Figure 3 shows one embodiment of the method of Figure 2 in which Internet is available on the utility supply controller of the utility supply system in Figure 1 ; and
Figure 4 shows one embodiment of the method of Figure 2 in which no Internet is available on the utility supply controller of the utility supply system in Figure 1.
EMBODIMENT OF THE INVENTION
In Figure 1 , a utility supply system (10) is shown. The utility supply system (10) includes a utility supply controller (12), at least one user identity device (14), which is associated with a particular user (16), and a remote utility server (18). The user identity device (14) is operable to communicate with the at least one utility supply controller (12). At least one user's information is stored on the utility server (18) and the utility server (18) is operable to authenticate a user (16), to approve a transaction, to charge a user account and once approved/charged, to communicate with the at least one utility supply controller (12) to supply a utility via the utility supply controller (12).
The user supply controller (12) includes a local wireless interface (12.1 ) operable to communicate with the user identity device (14). The local wireless interface
(12.1 ) can in the form of any one of a Near Field Communication (NFC) device, a WiFi 802.x interface, or Bluetooth Low Emission (BLE) transceiver that communicates with the user identity device (14). The user supply controller (12) further includes a network interface (12.2), operable to communicate to a remote server on which a user's information is hosted. The network interface (12.2) is in the form of an Ethernet interface or a Global Packet Radio Service (GPRS) interface operable to communicate on a public network such as the Internet. The user supply controller (12) also includes a processor (12.3) which is connected to the local wireless interface (12.1 ) and the network interface
(12.2). The processor (12.3) is operable to read a user's identity from a user identity device (14) via the local wireless interface (12.1 ), to forward transaction details to the remote utility server (18), via the network interface (12.2), to receive instructions from the remote utility server (18), via the network interface (12.2), to dispense a utility and to control dispensing of a utility to the user (16). The user supply controller (12) further includes a utility interface (12.4), operable to control a utility supply (20) under instruction from the processor (12.3). In this example, the utility to be dispensed is a supply of electricity. The user supply controller (12) further includes memory (12.5), a battery (12.6), a power supply unit (12.7) and a relay (12.8) by means of which the electricity supply (20) is switched to a user's electrical device (22).
As can be seen in Figure 2, in operation, the utility supply system (10) provides a method of controlling supply of a utility, which in this instance is a supply of electricity, to a user. The method includes reading a user identity device at 100 on a utility supply controller (12) located at a point of utility supply (20) to retrieve a user (16) identity from the user identity device (14). At 102, the utility supply controller (12) confirms transaction details of a user transaction on a remote utility server (18). At 104, the transaction details are confirmed and the utility supply controller (12) is instructed by the remote utility server (18) to dispense a utility in accordance with the transaction details. At 106, the utility supply controller (12) activates the relay (12.8) to dispense electricity from the electricity supply (20) to a user device (22) associated with the user identity device (14) at a point of utility supply.
In one embodiment of the method, in which the utility supply controller (12) is connected to a remote utility server (18), the step of reading a user identity device (14) may include receiving user (16) identity credentials from a user identity device (14) onto a utility supply controller (12). The step of confirming transaction details may then include reading details of a utility supplier (20) and transmitting these details at 102 together with the user identity credentials via a network interface (not shown) to a remote utility server (18) for confirmation. The step of confirming the transaction details may then include receiving confirmation at 104 from the remote utility server of a financial transaction. The method may then include dispensing the utility according to the transaction details that were confirmed.
In another embodiment of the method, in which the utility supply controller (12) is not connected to a remote utility server (18), but the user identity device (14) is connectable to a remote utility server (18) via the Internet (not shown), the step of reading a user identity device (14) may include loading details of a utility supplier (20) onto a user identity device (14). The step of confirming transaction details may then include transmitting details of a utility supplier (20) together with the user (16) identity credentials to a remote utility server (18) via a user identity device (14). This step may include transmitting the details via a mobile telephone network, a satellite network, or the like (not shown), to which the user identity device (14) has access. The step of confirming the transaction details may then include receiving confirmation from the remote utility server (18) of a financial transaction via the user identity device (14) and passing confirmation from the user identity device (14) to the utility supply controller (18) via the local wireless interface (12.1 ). The method may then include dispensing the utility according to the transaction details that were confirmed. In Figure 3, the method of Figure 2 is illustrated in more detail, where Internet connectivity is available on the utility supply controller (12) of the utility supply system (10).
In this example, the user identity device (14) is in the form of a mobile telephone, which includes a mobile application downloaded from a third party application library. The application is operable to access the Internet (not shown) through a TCP/IP protocol, to access a global positioning receiver of the mobile telephone, and a network interface of the mobile telephone, thereby to communicate with the utility supply controller (12), via a matched interface. It is to be appreciated that the application can also be downloaded onto other machines.
Each user identity device is associated with a particular user by either a biometric scan in the form of fingerprint scan or facial scan and a unique subscriber identity module (SIM). All user identity devices have a unique identity (or "Device Name") which is published and is displayed on the device to be visible externally.
In Figure 3, 100.1 refers to steps on the mobile application of the mobile telephone (14), 100.2 refer to steps on the utility supply controller (12) device and 100.3 refers to steps on the remote utility server (18).
At 1 10 ("Open_App") and 112 ("App_Device_Pair"), the user identity device (14) pairs with the utility supply controller (12) via a Bluetooth connection. This pairing is automatic, as the mobile application is set to "hand off automatically".
At 114 ("BearerRequest"), it is established which device will do the transaction. At 114, the user identity device (14) requests the utility supply controller (12) for a status on its internet connectivity by sending a connectivity request to the BearerReq Device at 116. If the Internet connectivity is active on the utility supply controller (12) execution is directed to 118, alternatively, if Internet connectivity is not available, execution is directed to 120 on Figure 4. The BearerReq Device responds with a Success or a Failure, indicating the status of the Internet connectivity. Referring to Figure 4, method steps 110, 112, 1 14 and 116 are exactly the same as for the method in Figure 3.
At 118 ("Give_Account"), the user identity device (14) pass the user's identity details to the utility supply controller (12), which receives it at 122. In particular, the user's username and unique subscriber number (or "Trans ID") is sent to the utility supply controller (12) device for encryption. This is sent to the utility supply controller (12) device along with the user's password hash and length of time ("LoT"), both the user password hash and TransID are encrypted with the server's public key. The user's username and LoT is sent in the clear. Decryption and returning a valid TransID will be used as authentication message in this step.
At 122 ("PassDevID"), a session ID is generated. Then, the session ID, the device ID and the information received is encrypted by the server public key. As the device ID is unique, this is used as the return identity.
At 124 ("AuthoriseTrans"), all data is encapsulated together with the public server key for transmission to the remote utility server (18, or "authentication server"). A bearer method code is added as a suffix to the encapsulated data to alert the remote utility server (18) which endpoint will conduct the first layer of de-encryption.
At 124, the utility supply controller (12) sends the user identity in the form of a hash value to the remote utility server (18).
At 126, the remote utility server (18) decrypts both messages using a private key for both the device and the user account. The account username and password hash is authenticated and a request is made using the account payment details.
At 126, the remote utility server (10) further combines the two components in order to create an association between the transaction and the user account. The device message (which includes the session ID and the LoT from the account) is encapsulated with an account public key. At 126 ("ServerAuth"), the remote utility server (18) validates the user identity details and requests payment authorization for the transaction, at 128, from a remote payment gateway (not shown). If the payment was unsuccessful the transaction is rejected with an appropriate error code. If the payment was successful, a confirmation message is sent to the utility supply controller (12) at 128 to activate the relay (128). Both the success and failure responses are re-encrypted.
At 128 ("StartRelay"), the encrypted data packet is decrypted using the private device key and the session ID is compared to the original. If these are identical, then this is used as an authentication message, and the LoT is used as the clock comparator. A clock is started and the relay is activated. If there is an interruption, the Usage Clock is recorded and the remote utility server (18) is notified If the Usage Clock equals the LoT booked, then the Usage Clock is sent to the remote utility server (18)
At 130 ("App_Notify"), the utility supply controller (12) notifies the user identity device (14) that the transaction was successful once decrypted. The user is visually notified of success or failure. The failure (or "reject") message will have a message code to notify the user of a suitable response.
At 132 ("NotifyServ"), a message is sent from the utility supply controller (12) to the remote utility server (18). In particular, the session ID and the Recorded Usage is encrypted using the server's public key and sent in the message. If the bearer is available, then it is used to send the message. If the bearer is not available, then the message sent via Bluetooth to the application at 156 in Figure 4. If no application is present, then the LoT default time will be used.
At 134 ("ServerUpdate"), the transaction details are recorded on the remote utility server (18). From the session ID, the user can now be charged against the usage or charged back.
In Figure 4, another embodiment of the method is shown. In this embodiment, no Internet is available on the utility supply controller (12) of the utility supply system (10). Accordingly, reference numerals 110 ("Open_App"), 1 12 ("App_Device_Pair"), 114 ("BearerRequest") and 116 ("BearerReqDevice") remain the same as in Figure 3. In Figure 4, 200.1 refers to steps on the mobile application, 200.2 refer to steps on the utility supply controller (12) device, 200.3 refers to steps on the remote utility server (18) and 200.4 refers to the steps on the payment end.
In Figure 4, if Internet connectivity was not available on the utility supply controller (12), execution is directed to 120 ("RequestDevID"). At 120, the device ID and the session ID are required in order to pass the acknowledgment back. Both IDs are encrypted to prevent authorisation of another device. The Trans ID will later allow the application to know it is for the same transaction and to map the authorisation/initialisation to.
At 140 ("PassDevID"), a unique session identity (or "SessionID") is then requested from the utility supply controller (12). The unique session identity generated, together with the device identity (or "DevicelD") are encrypted by the server public key.
At 142 ("AuthoriseTrans"), the user identity device (14) sends its user identity details directly to the remote utility server (18) in the form of a hash value. Notably, both the data for the device (trans ID) seeking authority to start and the user's username and password hash are required to authorise the payment. A bearer method code is added as a suffix to these to notify the remote utility server (18) at which endpoint to conduct the first layer of de-encryption.
At 144 ("ServerAuth"), the remote utility server (18) requests payment authorization for the transaction at 146 from a remote payment gateway (148, "Payment Service"). The remote utility server (18) decrypts both messages using its private key for both the device and the account. The account username and password hash is authenticated and a request is made using the account payment details. The server (18) must combine the two components in order create an association between the transaction and the user account. The device message (which is the session ID and the LoT from the acct) is encapsulated with the account public key. If the payment was unsuccessful the transaction is rejected with an appropriate error code. If the payment was successful, a confirmation message is sent to the user identity device (14) at 150.
At 150 ("PassThrough"), the confirmation message is received on the user identity device (14) which then passes the confirmation message to the utility supply controller at 152, which then activates the relay (12.8). This confirms that the request sent is the same as the request received before passing the encrypted authentication message onto the device. The user is notified on the application for both accept and reject.
At 152 ("StartRelay"), the packet is decrypted using the private dev key and the session ID is compared to the original. If the same, then this is taken as an authentication message. The LoT is used as the clock comparator. A clock is started and the relay is activated. If there is an interruption, the usage clock is recorded and the remote utility server (18) is notified. If the usage clock equals the LoT booked, then the usage clock is sent to the server.
At 154 ("NotifyServ"), the utility supply controller (12) notifies the user identity device (14) that the transaction was successful, which receives the message at 156 ("PassServer") and sends it on to the remote utility server (18) at 158 to confirm that the transaction was successful.
At 154, the notification sent includes the session ID and the recorded usage encrypted using the remote utility server's public key. If Internet (e.g. Wifi) is available then this step uses the Internet. If not, then the notification is sent via Bluetooth to the application. If no application is present on the mobile telephone, then the LoT default time will be used.
At 158 ("ServerUpdate"), from the session ID, the user can now be charged against the usage or charged back.
The inventors are of the view that the invention described herein provides a new utility supply controller, a new utility supply system and a new method of controlling supply of a utility. In particular, the inventors are of the opinion that the invention can be applied to electricity as a utility being provided by a third party.

Claims

1 . A utility supply controller, which includes
a local wireless interface, operable to communicate with a user identity device; a network interface, operable to communicate to a remote utility server on which a user's information is hosted;
a utility interface controllably connected between a utility supply and a user installation; and
a processor connected to the local wireless interface and the network interface, operable to read a user's identity via the local wireless interface from the user identity device, to forward transaction details via the network interface to the remote utility server, to receive instructions via the network interface from the remote utility server and to control dispensing of a utility to the user installation via the utility interface in response to the instructions from the remote utility server.
2. The utility supply controller as claimed in claim 1 , in which the local wireless interface is in the form of any one of: a near field communication (NFC) interface, a Bluetooth Low Emission (BLE) interface, a radio-frequency identification (RFID) interface, an 802.11x interface, a WiFi interface and a mobile telephone network data interface.
3. The utility supply controller as claimed in claim 1 , in which the processor is operable in three modes, including:
- a reader/writer mode, in which the processor is operable to read a user identity device in the form of a NFC type tag;
- a peer-to-peer mode, in which the processor is operable to exchange data with a matched NFC device, through a WiFi or through a Bluetooth interface; and
- a card emulation mode, in which the processor is operable to exchange data with a user identity device which emulates a contactless smart card.
4. A utility supply system, which includes
at least one utility supply controller, as claimed in any one of claims 1 to 3;
at least one user identity device, associated with a particular user and operable to communicate with the at least one utility supply controller via the local wireless interface of the utility supply controller; a utility server on which at least one user's information is stored and from which a transaction can be approved, the server operable to communicate with the at least one utility supply controller via the network interface of the at least one utility supply controller to authenticate a user and to charge a user account for a utility supplied via the at least one utility supply controller.
5. The utility supply system as claimed in claim 4, in which the user identity device is in the form of any one of: a mobile telephone and a radio frequency identification device, operable to store a user's identity details.
6. The utility supply system as claimed in claim 5, in which the user identity device includes any one or both of a username of a user and a hash value of a user password.
7. The utility supply system as claimed in claim 6, in which the user's identity details are either pre-registered or registered at a later stage on the user identity device.
8. The utility supply system as claimed in claim 5, in which the user identity device is in the form of a mobile telephone having an application which is downloaded from a third party application library, the application being operable to access the Internet through a TCP/IP protocol, to access a global positioning receiver of the mobile telephone, and a network interface of the mobile telephone, thereby to communicate with a utility supply controller, via a matched interface.
9. The utility supply system as claimed in claim 4, in which each user identity device is associated with a particular user by any one of: a biometric scan and a unique subscriber identity module.
10. A method of controlling supply of a utility to a user, the method including the steps of:
reading a user identity device via a local wireless interface on a utility supply controller located at a point of utility supply to retrieve a user's identity from the user identity device; confirming transaction details of a user transaction associated with a user's identity on a remote utility server; and
upon successful confirmation of the transaction details instructing the utility supply controller via the network interface of the utility supply controller from the remote utility server to dispense a utility by activating the utility interface of the utility supply controller.
1 1. The method of controlling supply of a utility to a user as claimed in claim
10, in which a utility supply controller is connected to a remote utility server via the utility interface being connected to the Internet and the step of reading a user identity device includes receiving user identity credentials from a user identity device onto a utility supply controller.
12. The method of controlling supply of a utility to a user as claimed in claim
1 1 , in which the step of confirming transaction details includes reading details of a utility supply controller and transmitting these details together with the user identity credentials via a network interface to a remote utility server for confirmation.
13. The method of controlling supply of a utility to a user as claimed in claim
12, in which the step of confirming the transaction details of a user transaction further includes receiving confirmation from the remote utility server of a financial transaction confirmation.
14. The method of controlling supply of a utility to a user as claimed in claim
13, which includes the further step of dispensing the utility according to the transaction details that were confirmed.
15. The method of controlling supply of a utility to a user as claimed in claim 10, in which a utility supply controller is connected to a remote utility server via the user identity device being connected to the remote utility server, and the step of reading a user identity device includes loading details of a utility supplier onto a user identity device.
16. The method of controlling supply of a utility to a user as claimed in claim 15, in which the step of confirming transaction details includes transmitting details of a utility supplier together with user identity credentials to a remote utility server via a user identity device.
17. The method of controlling supply of a utility to a user as claimed in claim 16, in which the step of confirming transaction details further includes transmitting the transaction details via any one of a mobile telephone network and a satellite network to which the user identity device is connectable.
18. The method of controlling supply of a utility to a user as claimed in claim 17, in which the step of confirming transaction details further includes receiving confirmation from the remote utility server of a financial transaction via the user identity device and passing confirmation from the user identity device to the utility supply controller via the local wireless interface.
19. The method of controlling supply of a utility to a user as claimed in claim
18, which includes the further step of dispensing the utility according to the transaction details that were confirmed.
20. A utility supply controller as claimed in claim 1 , substantially as herein described and illustrated.
21. A utility supply system as claimed in claim 4, substantially as herein described and illustrated.
22. A method of controlling supply of a utility to a user as claimed in claim 10, substantially as herein described and illustrated.
PCT/IB2019/052480 2018-03-27 2019-03-27 Control of a utility WO2019186417A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2018/02048 2018-03-27
ZA201802048 2018-03-27

Publications (1)

Publication Number Publication Date
WO2019186417A1 true WO2019186417A1 (en) 2019-10-03

Family

ID=68062347

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2019/052480 WO2019186417A1 (en) 2018-03-27 2019-03-27 Control of a utility

Country Status (1)

Country Link
WO (1) WO2019186417A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021239428A1 (en) * 2020-05-27 2021-12-02 innogy eMobility Solutions GmbH Charging station for an electric vehicle, and charging infrastructure

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742229A (en) * 1993-05-25 1998-04-21 Intellectual Property Development Associates Of Connecticut, Inc. Methods and apparatus for dispensing a consumable energy source to a vehicle
US20120135626A1 (en) * 2010-04-21 2012-05-31 Tormey Milton T Self powered electric vehicle charging connector locking system
US8421592B1 (en) * 2008-10-15 2013-04-16 Sprint Communications Company L.P. Mediation of electric vehicle charging by wireless network provider
WO2013057587A2 (en) * 2011-10-19 2013-04-25 Zeco Systems Pte Ltd Methods and apparatuses for charging of electric vehicles
EP2861451A1 (en) * 2012-06-15 2015-04-22 Rwe Ag Charging station having near-field communication link

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742229A (en) * 1993-05-25 1998-04-21 Intellectual Property Development Associates Of Connecticut, Inc. Methods and apparatus for dispensing a consumable energy source to a vehicle
US8421592B1 (en) * 2008-10-15 2013-04-16 Sprint Communications Company L.P. Mediation of electric vehicle charging by wireless network provider
US20120135626A1 (en) * 2010-04-21 2012-05-31 Tormey Milton T Self powered electric vehicle charging connector locking system
WO2013057587A2 (en) * 2011-10-19 2013-04-25 Zeco Systems Pte Ltd Methods and apparatuses for charging of electric vehicles
EP2861451A1 (en) * 2012-06-15 2015-04-22 Rwe Ag Charging station having near-field communication link

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021239428A1 (en) * 2020-05-27 2021-12-02 innogy eMobility Solutions GmbH Charging station for an electric vehicle, and charging infrastructure

Similar Documents

Publication Publication Date Title
US11186195B2 (en) Control device and method for controlling a charging point
US11173802B2 (en) Method for controlling a charging process of a vehicle at a charging post using first and second authorisation verification
CN107004316B (en) Access control system with automatic mobile credential granting service handoff
US9615254B2 (en) Wireless power transmitting devices, methods for signaling access information for a wireless communication network and method for authorizing a wireless power receiving device
EP2259610B1 (en) Registering a mobile device in a mobile communication network
US9788202B2 (en) Method of accessing a WLAN access point
KR20050002613A (en) Communication system, communication method, base station, controller, device and control program
KR20180027378A (en) Method and devices for transmitting a secured data package to a communication device
CN108886674A (en) Pass through the system and method for relay in telecommunication network data
KR101922171B1 (en) Device content supply system
KR20130008123A (en) Method and system for operating a payment by using dynamic determined authentication number, mobile device
US8341703B2 (en) Authentication coordination system, terminal apparatus, storage medium, authentication coordination method, and authentication coordination program
EP1411475A1 (en) System and method of communication including first and second access point
KR20130065829A (en) Method and system for providing service by using object mapped one time code
JP4355611B2 (en) COMMUNICATION SYSTEM, COMMUNICATION METHOD, BASE STATION DEVICE, CONTROLLER, DEVICE, AND CONTROL PROGRAM
WO2019186417A1 (en) Control of a utility
US9253628B2 (en) Method of exchanging data between two electronic entities
KR101250164B1 (en) Method for Transferring Value of Electronic Cash by using Near Field Communication, Handheld Device and Automatic Teller Machine
KR101395315B1 (en) Near field communication based payment security authentication system and security authentication method thereof
KR101445001B1 (en) Method and System for Providing End-To-End Security Payment by using Near Field Communication
KR20170134915A (en) Method for Providing Valet Parking by using Adaptive Cigar Jack Device and Staff Mobile Device
KR20130100642A (en) Method and system for securities trading by using inverse multiple communication
KR101704249B1 (en) Method for Controlling Integrated Circuit Chip by using Distributed Processing
KR20160093194A (en) Method for Processing Two Channel Payment by using Contactless Media
KR20130100641A (en) Method and system for controlling inverse multiple communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19775015

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19775015

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 02/07/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19775015

Country of ref document: EP

Kind code of ref document: A1