EP3357212A1 - Improved method and device for authentication - Google Patents
Improved method and device for authenticationInfo
- Publication number
- EP3357212A1 EP3357212A1 EP16784231.9A EP16784231A EP3357212A1 EP 3357212 A1 EP3357212 A1 EP 3357212A1 EP 16784231 A EP16784231 A EP 16784231A EP 3357212 A1 EP3357212 A1 EP 3357212A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- token
- access
- encryption
- resource
- creating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/04—Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- the invention relates to authentication and rights management in the context of exchanges of data between different computer systems such as an electronic box in a vehicle, mobile devices (smartphones, tablets, laptops, etc.) and landed systems (also called cloud in English).
- mobile devices smarttphones, tablets, laptops, etc.
- landed systems also called cloud in English.
- document US2004230831 discloses an authentication system based on security tokens.
- This system makes it possible to allow a terminal belonging to a first organization to access a service provider server belonging to a second organization.
- the first and second organizations form a federation.
- the user of the terminal belonging to the first organization identifies himself only once and is allowed to access resources of the second organization.
- Authorizations are carried by tokens issued by a trusted authority and then exchanged by the two organizations.
- the authentication tokens are limited in time by a period of validity. After the token has expired, it must be renewed with the trusted authority (also known as the authentication server).
- the renewal request requires a connection (for example of the Internet or 3G type) to communicate with the authentication server.
- the problem to be solved by the present invention relates to the case: (i) where the service provider is a connected object (for example a telematic box of a motor vehicle) accessible via a wireless link (for example Bluetooth type or NFC) or a wired link, and (ii) where the user is able to access the object (for example a user with a smartphone located outside the vehicle) but without access to an Internet connection (in other words without any means of communicating with the trusted authority issuing the security tokens).
- a wireless link for example Bluetooth type or NFC
- NFC wireless link
- the user is able to access the object (for example a user with a smartphone located outside the vehicle) but without access to an Internet connection (in other words without any means of communicating with the trusted authority issuing the security tokens).
- the user wishes to control, with the aid of his Smartphone, the unlocking of an opening to gain access to the passenger compartment of the vehicle, while he is at a place without a cover of a network of communication.
- the invention therefore aims to remedy the aforementioned problems by providing an improved method and an authentication device allowing secure access to a computer resource without requiring permanent communication with an authentication server.
- step (206) comprises steps of:
- the invention proposes the creation of a secure storage system of an access token.
- the access token is kept in a so-called conservation token.
- the access token is encrypted using encryption data.
- Token encryption allows for a longer validity period (for example, more than one day) without compromising the security of the system.
- the user wishes to access the resource, even though he has no means of communication with an authentication server, it decrypts the access token contained in the conservation token .
- the access token is then ready to use for use with the resource.
- the security of the system is maintained insofar as only the user is able to provide the data necessary to decrypt the access token.
- the step of generating the conservation token furthermore includes adding an expiry date to said token the expiration date of the retention token being the same as the expiration date of the access token.
- the step of encrypting the access token implements a symmetric cryptography method.
- the encryption information comprises at least Less: an answer to a question, a fingerprint or a voice print.
- the step of encrypting the access token implements an asymmetric cryptographic method.
- the encryption information comprises at least one public key of a cryptographic key pair whose private key is stored in a memory of an object held by the user.
- the method of creating a token according to the invention further comprises a step of signing the access token and the storage token with a private key of the authentication device.
- the invention also relates to an authorization token for a terminal of a user to access a resource comprising a memory in which a private key is stored, characterized in that it comprises:
- a first data field comprising at least one identifier associated with an encryption information, at least part of which is intended to be used as an encryption key
- a second data field comprising an access token, said access token comprising data describing rights granted to the user's terminal on the resource, data describing access rights being with a public key associated with the private key stored in the resource's memory,
- the access token is encrypted with an encryption key based on at least a portion of the encryption information associated with the identifier contained in the first data field of the preservation token.
- the invention also relates to a device for authorizing a terminal of a user to access a resource comprising a memory in which a private key is stored, comprising means for generating a preservation token and means for transmitting said token.
- storage device for the terminal characterized in that the means for generating the conservation token comprise:
- FIG. 1 illustrates a schematic view of a system comprising an authentication device according to the invention
- FIG. 2 illustrates a diagram representing steps of the method according to the invention
- FIG. 3 illustrates a diagram representing substeps of the method according to the invention
- FIG. 4 shows an example of a token structure according to the prior art
- FIG. 5 shows an example of a token structure according to the invention.
- an authentication system comprises at least one terminal 103, a service provider 104 and an authentication authority 101.
- the access by the terminal 103 to data or services of the service provider 104 requires authentication and authorizations issued by the authentication authority 101.
- the terminal 103 is a smart mobile phone (also called smartphone in English). But the invention is not limited to this example. Indeed, the terminal 103 may be a laptop, a touch pad or any other connected object (ie capable of exchanging data via a wireless connection).
- This mobile equipment belongs, for example, to the driver of a vehicle or to one of the passengers of the vehicle.
- the service provider 104 (or SP for "Service Provider" in English) is an IT resource.
- SP 104 controls access to data or commands to perform an activity.
- SP 104 protects access to data and applications. It refuses any access without prior authentication.
- it redirects the unauthenticated user to an identity provider. Access to the service is therefore restricted. Users must be identified before they can access data or start the execution of an order.
- the SP 104 is also called resource 104 or box 104.
- authorization tokens also called token or "identity credentials” in English.
- the tokens used to transmit the permissions are encrypted (or encrypted) according to an asymmetric cryptography mechanism (also called public key cryptography).
- a pair of keys is used: a public key for encryption and a private key for decryption.
- a resource sends a token to another computing resource, it simply encrypts the token to be sent using the recipient's public key. The latter will be able to decipher the message using his private key (which he is alone to know).
- the tokens incorporate the authorizations that allow access to functions or data on the services hosted on the SP 104.
- the SP 104 includes a secure storage space capable of storing a private key used to decrypt the authorization tokens.
- the secure storage space is for example a Trusted Platform Module (TPM) chip, which is a hardware cryptographic component for storing secrets (such as encryption keys) securely.
- TPM Trusted Platform Module
- the SP 104 is an electronic box of a motor vehicle.
- the electronic box is an on-board vehicle that is the boundary of the vehicle data to the outside through various means: cable, wireless protocols (wifi, bluetooth, 3G, etc.).
- the SP can be a management information system or a system that controls a numerically controlled machine or more generally any connected object (ie capable of exchanging data via a wired or wireless connection) and including a secure storage space capable of storing a private key.
- the authentication authority 101 (Identity Provider or Identity Provider) is used to authenticate the user as well as to retrieve additional information associated with his identity.
- the Idp 101 allows users 102 to authenticate and receive tokens on their terminal 103 (personal computer or smartphone) allowing them to be recognized with the SP 104.
- Idp 101 makes it possible to allow a terminal 103 of a user 102 to access a resource 104.
- Idp 101 includes means for generating a conservation token and means for issuing said conservation token to the terminal 103.
- the means for generating the conservation token comprise:
- means for creating a first data field comprising at least one identifier associated with encryption information, at least part of which is intended to be used as an encryption key
- means for creating a second data field comprising an access token, said access token comprising data describing rights granted to the terminal 103 of the user 102 on the resource 104;
- Idp 101 further includes means for electronically signing authorization tokens.
- the electronic signature makes it possible to guarantee the integrity of a token and to authenticate the author.
- the electronic signature system uses a pair of keys. A private key used to sign a token and a public key to read the signed token.
- Such a system generally comprises a public key infrastructure (PKI), in other words an IT resource for generating, distributing and publishing certificates to the various necessary components (SP, IdP, etc.).
- PKI public key infrastructure
- IdP 101 and SP 104 each have a certificate of their own.
- a certificate (or electronic certificate) is a set of data containing at least one public key, at least one identification information (for example: a name, usually stored in a data field called CN for "Common Name” And at least one private key to sign.
- the system also includes an Internet interface 106 through which a user can authenticate with Idp 101.
- the chips are generated and used as follows.
- a token is generated by the Idp 101, in response to a request from a user (previously authenticated to the authentication authority 101).
- the token is transported by the user's terminal 103 to be finally checked and consumed by the embedded box 104 to allow the user and an application executed on the terminal 103 to access certain functions of the housing 104 (for example unlocking a door of the vehicle).
- an authorization token is structured, for example, in the following manner (JSON type structure).
- the authorization token includes:
- a first datum (access_token) containing the rights of the user encrypted with the public key of the embedded box 104 (for example with an asymmetric encryption algorithm, for example of the RSA type).
- access_token for example with an asymmetric encryption algorithm, for example of the RSA type.
- token_type a second data (token_type) whose value is set to "bearer” to indicate that it is a standard access token (as opposed to a storage token).
- a fifth data token_signature corresponding to a signature of HMAC type is a condensate (or "hash") of the token, generated by means of a hashing algorithm (for example SHA-1) and encrypted with the private key the authentication authority 101 (for example an asymmetric RSA encryption algorithm)
- SHA-1 hashing algorithm
- the signature ensures the authenticity of the sender and the integrity (non-alteration) of the message.
- the invention also relates to a storage token, which can be stored securely (encrypted) on a terminal. In this way, the validity period of such a token can be lengthened while maintaining a high level of security.
- data of the conservation token are encrypted using a key from one or more data of the user. previously informed.
- a conservation token is for example structured in the following manner (JSON type structure).
- the conservation token includes:
- token_type a first datum indicating a type of token (here "long” or “conservation"), as well as at least one identifier associated with an encryption information (for example question identifiers whose personal answers form the key used to decipher the token contained in the third data (access_token) of the conservation token),
- a third datum (access_token) containing the data structure of an authorization token, for example as defined above, but encrypted by means of a key issuing from the encryption information corresponding to the identifiers indicated in the first datum. Only this part is sent, once deciphered by the terminal 103, to the housing 104.
- the invention also relates to a method for authorizing the terminal 103 of the user 102 to access the resource 104.
- the method comprises steps of:
- connection information eg an identifier and a password or any other authentication method
- connection information if the connection information is correct then move to the next step 204, if not connection refusal;
- This method may be initiated by the user 102 when he wishes to have a storage token on his terminal 103, either as a precaution or in anticipation of a situation where he will have to access the resource 104 without being able to communicate with the user. 'Idp 101.
- the creation step 206 of the conservation token, by Idp 101, comprises the following substeps:
- creation 206.2 of a second data field comprising an access token, said access token comprising data describing rights granted to the terminal 103 of the user 102 on the resource 104.
- the encrypted access token is intended to be decrypted by the user's terminal 102.
- the access token and the storage token each include a validity date.
- their validity dates are identical. This then makes it possible to know the date of validity of the access token without having to decipher it (i.e. only by consulting the date of validity of the conservation token).
- the encryption step 206.4 of the access token implements a symmetric cryptographic method.
- the key used to encrypt the data is identical to the key used to decrypt the data.
- the information of encryption includes at least: an answer to a question, a fingerprint or a voice print.
- the encryption information comprises several answers to questions to which the user has previously responded.
- the step of encryption 206.4 of the access token implements an asymmetric cryptographic method.
- the encryption information comprises at least one public key of a cryptographic key pair whose private key is stored in a memory of an object held by the user, for example a secure usb key.
- an encryption for the access token makes it possible to consider storing this token on the terminal 103 for a duration greater than one day without compromising the security of the resource. Indeed, even if the terminal 103 is stolen by an attacker, it will be unable to use the access token to access the resource, as long as this access token remains encrypted in the storage token.
- the token To be used and sent to the box, the token must be decrypted using the key that was used for encryption. This key is restored by obtaining from the user, the encryption data (for example, its answers to questions) chosen to encrypt the token.
- the encryption data for example, its answers to questions
- the terminal 103 decrypts the token, then transmits it to the housing 104.
- the box 104 Upon receipt of the token, the box 104 first verifies the signature of Idp 101. For that it calculates the condensate of the token using the same hashing algorithm that used by Idp 101 (for example SHA-1). It also decrypts the signature, using the public key of Idp 101 and using the same algorithm (for example RSA) and obtains the condensate calculated by Idp 101. If the two condensates are identical, the signature is validated. Otherwise, the token is rejected.
- the same hashing algorithm that used by Idp 101 for example SHA-1
- RSA the same algorithm
- the data (access_token), containing the rights of the user, of the access token are then decrypted using the private key of the box 104.
- the enclosure is then ready to allow access in accordance with the rights specified in the access token.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1559165A FR3041798B1 (en) | 2015-09-29 | 2015-09-29 | IMPROVED AUTHENTICATION METHOD AND DEVICE |
PCT/FR2016/052418 WO2017055716A1 (en) | 2015-09-29 | 2016-09-23 | Improved method and device for authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3357212A1 true EP3357212A1 (en) | 2018-08-08 |
Family
ID=55178113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16784231.9A Ceased EP3357212A1 (en) | 2015-09-29 | 2016-09-23 | Improved method and device for authentication |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP3357212A1 (en) |
CN (1) | CN108141444B (en) |
FR (1) | FR3041798B1 (en) |
WO (1) | WO2017055716A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3064960B1 (en) * | 2017-04-05 | 2021-12-03 | Renault Sas | METHOD AND SYSTEM FOR REMOTE RELEASING OF A MOTOR VEHICLE |
FR3082089B1 (en) * | 2018-05-31 | 2021-12-10 | Renault Sas | METHOD AND SYSTEM FOR REMOTE RELEASE OF A MOTOR VEHICLE |
EP3720165A1 (en) * | 2019-03-30 | 2020-10-07 | Illotros GmbH | Method for proving at least one of identity and entitlement |
CN110149328B (en) * | 2019-05-22 | 2023-01-31 | 平安科技(深圳)有限公司 | Interface authentication method, device, equipment and computer readable storage medium |
CN110753345B (en) * | 2019-10-08 | 2022-11-25 | 武汉光庭信息技术股份有限公司 | TBox communication method and TBox device |
CN112260838B (en) * | 2020-10-15 | 2022-02-22 | 四川长虹电器股份有限公司 | Automatic renewal authentication method based on JWT (just-before-last-transaction) |
WO2022106876A1 (en) * | 2020-11-23 | 2022-05-27 | Volvo Truck Corporation | Offline authentication and authorization for networked devices |
CN116491103A (en) * | 2021-01-08 | 2023-07-25 | Oppo广东移动通信有限公司 | Access token processing method, equipment and cloud |
CN114157470B (en) * | 2021-11-29 | 2024-01-19 | 惠州Tcl移动通信有限公司 | Token management method and device |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1168185A3 (en) * | 2000-05-08 | 2004-01-02 | Nokia Corporation | Method for protecting a memory card, and a memory card |
US7548620B2 (en) * | 2004-02-23 | 2009-06-16 | Verisign, Inc. | Token provisioning |
EP2151795A1 (en) * | 2008-08-08 | 2010-02-10 | France Telecom | Secure electronic coupon delivery to mobile device |
EP2743868A1 (en) * | 2012-12-14 | 2014-06-18 | Seven Principles AG | Virtual vehicle key |
CN103326862B (en) * | 2013-06-20 | 2017-02-22 | 天地融科技股份有限公司 | Electronically signing method and system |
FR3015725A1 (en) * | 2013-12-19 | 2015-06-26 | Orange | SYSTEM AND METHOD FOR PROVIDING SERVICE TO THE USER OF A MOBILE TERMINAL |
-
2015
- 2015-09-29 FR FR1559165A patent/FR3041798B1/en active Active
-
2016
- 2016-09-23 EP EP16784231.9A patent/EP3357212A1/en not_active Ceased
- 2016-09-23 CN CN201680057040.7A patent/CN108141444B/en not_active Expired - Fee Related
- 2016-09-23 WO PCT/FR2016/052418 patent/WO2017055716A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
FR3041798B1 (en) | 2017-10-27 |
WO2017055716A1 (en) | 2017-04-06 |
FR3041798A1 (en) | 2017-03-31 |
CN108141444B (en) | 2020-12-25 |
CN108141444A (en) | 2018-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3357212A1 (en) | Improved method and device for authentication | |
US20200213283A1 (en) | Key rotation techniques | |
EP3395006B1 (en) | Method for managing a trusted identity | |
EP3547203A1 (en) | Method and system for managing access to personal data by means of an intelligent contract | |
US9300639B1 (en) | Device coordination | |
EP1549011A1 (en) | Communication method and system between a terminal and at least a communication device | |
EP3158710A1 (en) | Method and system for authentication by means of tokens | |
US20220014354A1 (en) | Systems, methods and devices for provision of a secret | |
FR3066666A1 (en) | METHOD FOR SECURING COMMUNICATION WITHOUT STATE MANAGEMENT | |
EP3965361B1 (en) | Data exchange between a client and a remote device, for example a secure module | |
EP1514377A1 (en) | Interface method and device for the on-line exchange of contents data in a secure manner | |
WO2018078234A1 (en) | Method for installing a certificate in a vehicle computer, associated computer and system | |
FR3073998B1 (en) | DIGITAL METHOD FOR CONTROLLING ACCESS TO AN OBJECT, A RESOURCE OR SERVICE BY A USER | |
FR3041841A1 (en) | METHOD AND DEVICE FOR ACCESSING A RESOURCE USING A NUMBERED TOKEN | |
EP2911365B1 (en) | Method and system for protecting transactions offered by a plurality of services between a mobile device of a user and an acceptance point | |
US12047496B1 (en) | Noncustodial techniques for granular encryption and decryption | |
EP2842290B1 (en) | Method and computer communication system for the authentication of a client system | |
KR100892941B1 (en) | Method for security-service processing based on mobile device | |
EP3437294B1 (en) | Remote vehicle control system | |
FR3057420A1 (en) | METHOD AND SYSTEM FOR SYNCHRONIZING A TIME OF A COMPUTER OF A VEHICLE WITH THAT OF A REMOTE SERVER | |
FR3044500A1 (en) | METHOD AND SYSTEM FOR ACCESS BY A SERVER TO CONFIDENTIAL DATA AVAILABLE FROM A SERVICE PROVIDER | |
FR3093887A1 (en) | Process for issuing, to a nomadic device, an access authorization to a connected computer of a vehicle | |
EP4413479A1 (en) | Security application for an it device, and corresponding security architecture | |
FR3044501A1 (en) | METHOD FOR THE TRANSMISSION, BY A TERMINAL, OF CONFIDENTIAL DATA FROM A TELEMATIC VEHICLE CALCULATOR TO A SERVER | |
FR2990818A1 (en) | Method for transfer of digital documents between set of terminals, involves deciphering symmetrical key using private asymmetrical key associated with terminal, and deciphering document using deciphered symmetrical key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20180313 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20191004 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: PSA AUTOMOBILES SA |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20221121 |