[go: up one dir, main page]

EP1747526B1 - Method of masking a digital datum, such as a biometric print, and use thereof for securing a security document - Google Patents

Method of masking a digital datum, such as a biometric print, and use thereof for securing a security document Download PDF

Info

Publication number
EP1747526B1
EP1747526B1 EP05749585A EP05749585A EP1747526B1 EP 1747526 B1 EP1747526 B1 EP 1747526B1 EP 05749585 A EP05749585 A EP 05749585A EP 05749585 A EP05749585 A EP 05749585A EP 1747526 B1 EP1747526 B1 EP 1747526B1
Authority
EP
European Patent Office
Prior art keywords
datum
security document
masked
masking
minutiae
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP05749585A
Other languages
German (de)
French (fr)
Other versions
EP1747526A2 (en
Inventor
David Naccache
Eric Brier
Jean-Sébastien CORON
Cédric CARDONNEL
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemalto SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto SA filed Critical Gemalto SA
Publication of EP1747526A2 publication Critical patent/EP1747526A2/en
Application granted granted Critical
Publication of EP1747526B1 publication Critical patent/EP1747526B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically

Definitions

  • the invention relates to identification systems and / or biometric authentication. These systems manipulate biometric data of all types such as, for example, fingerprints, digital fingerprints of the eye, skin, face, or even the voice.
  • biometric fingerprints are increasingly being considered to supplement user passwords or a manual signature, especially for applications requiring a high level of security.
  • a biometric imprint is a good complement to a password or a manual signature, insofar as a biometric imprint can hardly be stolen from its real owner and can not be imitated, copied .
  • it is essential to prevent direct access to this fingerprint to ensure the safety of people and the reliability of the footprint.
  • a first object of the invention is to propose a masking method using a new hash function, better adapted to hide biometric fingerprints than known hash functions.
  • the masking method according to the invention is used to secure a biometric fingerprint.
  • a second object of the invention is a use of the masking method of the invention for securing a security document such as for example a bank check.
  • p is a prime number of large size and the elements of the set of prime numbers are small.
  • the actual minutiae and the false minutiae are mixed randomly.
  • the function uses as parameters a set (q n , ..., q 1 ) of small prime numbers, for example integers of about 60 bits.
  • the function also uses a parameter p, which is a large integer, for example about 1024 bits. p is preferably chosen such that 2 * q n ⁇ 2t ⁇ p ⁇ 4 * q n ⁇ 2t, where t is a number of accepted errors.
  • the function according to the invention is not very sensitive to errors, that is to say that, knowing two data m, ⁇ masked by this function, it is possible to say whether the clear data of origin b, ⁇ corresponding are identical, with at most t errors.
  • the sum of the sizes of the sets ⁇ i and ⁇ i is at most equal to t, t being the number of bits of ⁇ different from the bits of b of the same rank, corresponding to the maximum number of accepted errors.
  • a decomposition of a and ⁇ into prime numbers finally makes it possible to factor a and ⁇ . Decomposition is facilitated by taking advantage of the fact that a and ⁇ decompose in principle into small prime numbers. If a and ⁇ decompose on the set (q n , ..., q 1 ), then we deduce that the original data b and ⁇ are identical, with at most t errors.
  • the physical biometric fingerprint that is to be masked is a fingerprint characterized by a predefined number of actual minutiae.
  • a real minutia is a detail of a footprint at a given point in the physical footprint, such as a break in a line, a fork on a line, and so on.
  • a minutia can be translated by a string of characters including information on the position and the form of the minutia.
  • a set of t false minutiae also defined by a string of characters but which do not correspond to a real minutia of the physical footprint.
  • the masked data m can then be stored in a database, on an identity card, in a memory of a smart card, etc.
  • the masked data m can be used as reference data, for example to verify the identity of a person, as follows.
  • An intended application of the masking method according to the invention is to secure a security document such as for example a bank check.
  • a biometric fingerprint of the owner of the security document is masked by a masking method as described above, to produce a reference data.
  • the reference data is stored on or in the security document, for example by printing.
  • the reference datum is associated with a barcode
  • the associated datum / barcode pair is stored in a database
  • the barcode is stored, for example by printing, on the security document.
  • the verification can be done by any person, the data of reference being stored directly on the document.
  • the verification may be done by anyone having access to the database, and who is not necessarily the person who receives the document.
  • the bar code is produced according to known techniques, for example a one-dimensional barcode consisting of a series of vertical bars of varying thickness and spacing may be used.
  • the choice of the form of the bar code is in practice a function of the number of reference data to be memorized, each reference datum corresponding to different persons.
  • the database in which the reference datum pairs / associated bar code are stored is accessible for verification only to a limited number of people, depending on the desired level of security: the access can for example be authorized for any person to receive security documents or, to a lesser extent, only to a certifying authority.
  • the security document is a bank check and the fingerprint of its owner is stored on the check in the form of a bar code.
  • a merchant has a device for reading and masking a fingerprint with means for reading a fingerprint, hide it and then print the associated masked data.
  • the bank issuing the check only has the right of access to the database in which are stored the masked reference data (corresponding to the initial masked print) and the associated bar code; this access allows him to verify that the impression left by the person who presented the check to the merchant, and that the latter has hidden and printed on the check, corresponds to that of the owner of the check.

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Measurement And Recording Of Electrical Phenomena And Electrical Characteristics Of The Living Body (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method of masking a plain datum b having n bits. The inventive method is characterised in that a masked datum m is produced using the following masking function: (I), wherein p is a prime number, bi is the bit at position i of plain datum b, and qi is the prime number at position i in a set of prime numbers (q1, . . . , qn). The invention also relates to a method of masking a biometric print, consisting in: determining a set of s real minutiae which are characteristic of the print; mixing and arranging the real minutiae with t false minutiae; and forming a mixed biometric datum b having n=s+t bits, such that, for any i: bi=1 if position i corresponds to a real minutia, and bi=0 if position i corresponds to a false minutia. The invention can be used to secure a security document such as a bank cheque. m = ∏ i = 1 n ⁢ ⁢ q i b i ⁢ mod ⁢ ⁢ p ( I )

Description

L'invention a pour objet les systèmes d'identification et / ou d'authentification biométrique. Ces systèmes manipulent des données biométriques de tous types telles que par exemple des empreintes digitales, des empreintes numériques de l'oeil, de la peau, du visage, ou même de la voix.The invention relates to identification systems and / or biometric authentication. These systems manipulate biometric data of all types such as, for example, fingerprints, digital fingerprints of the eye, skin, face, or even the voice.

L'utilisation d'empreintes biométriques est de plus en plus envisagée pour compléter des mots de passe utilisateur ou une signature manuelle, notamment pour des applications nécessitant un haut niveau de sécurité. En effet, l'utilisation d'une empreinte biométrique est un bon complément à un mot de passe ou une signature manuelle, dans la mesure où une empreinte biométrique peut difficilement être dérobée à son propriétaire réel et ne peut pas non plus être imitée, copiée. En contrepartie de cette sécurité et dans la mesure où une empreinte biométrique ne peut pas être remplacée, il est indispensable d'empêcher l'accès direct à cette empreinte afin de garantir la sécurité des personnes et la fiabilité de l'empreinte.The use of biometric fingerprints is increasingly being considered to supplement user passwords or a manual signature, especially for applications requiring a high level of security. Indeed, the use of a biometric imprint is a good complement to a password or a manual signature, insofar as a biometric imprint can hardly be stolen from its real owner and can not be imitated, copied . In return for this security and to the extent that a biometric fingerprint can not be replaced, it is essential to prevent direct access to this fingerprint to ensure the safety of people and the reliability of the footprint.

Pour cela, on peut par exemple envisager des procédés de masquage connus pour masquer l'empreinte biométrique à sécuriser. L'empreinte masquée peut être ensuite utilisée en lieu et place de l'empreinte claire, pour signer un message, authentifier l'identité d'une personne, etc. L'intérêt de tels procédés est l'utilisation de fonctions de hachage, qui sont des fonctions à sens unique, c'est-à-dire qu'elles ne peuvent pas être inversées. En d'autres termes, connaissant une empreinte masquée par une fonction de hachage à partir d'une empreinte claire, il n'est pas possible de retrouver l'empreinte claire, même en connaissant tous les paramètres de la fonction de hachage.For this, one can for example consider known masking methods to hide the biometric fingerprint to secure. The masked fingerprint can then be used instead of the imprint, to sign a message, authenticate a person's identity, and so on. The interest of such methods is the use of hash functions, which are one-way functions, that is, they can not be inverted. In other words, knowing a fingerprint masked by a hash function from a clear fingerprint, it is not possible to find the fingerprint, even knowing all the parameters of the hash function.

Il est bien connu par ailleurs qu'il n'est pas possible de prendre deux empreintes biométriques strictement identiques d'un même individu à des instants différents. D'abord parce qu'il est très difficile de positionner, de manière strictement identique mais à des instants différents, un même instrument de mesure adapté pour relever la dite empreinte biométrique. Ensuite par ce que l'environnement (température, humidité, etc.) et l'état de santé général (stress, maladie de peau, etc.) de l'individu au moment où l'empreinte est relevée peut perturber le résultat du relevé.It is well known that it is not possible to take two strictly identical biometric fingerprints of the same individual at different times. Firstly because it is very difficult to position, in exactly the same manner but at different times, the same measuring instrument adapted to raise said biometric fingerprint. Secondly, that the environment (temperature, humidity, etc.) and the general state of health (stress, skin disease, etc.) of the individual at the moment when the impression is taken can disturb the result of the survey. .

Or, avec les fonctions de hachage connues, partant de deux données initiales peu différentes, les données masquées correspondantes sont très différentes et décorrélées, de sorte qu'il n'est pas possible, en les comparant, d'en déduire si les données initiales sont identiques à quelques erreurs près ou pas. Il n'est donc pas possible d'utiliser les fonctions de hachage connues pour masquer une empreinte biométrique.However, with known hashing functions, starting from two slightly different initial data, the corresponding masked data are very different and decorrelated, so that it is not possible, by comparing them, to deduce whether the initial data are identical to a few errors or not. It is therefore not possible to use known hash functions to hide a biometric fingerprint.

Le document US 6 697 947 B1 (MATYAS JR, STEPHEN, MICHAEL ET AL; 24 février 2004 ) décrit un schéma de masquage de données biométriques qui utilise une fonction peu sensible aux erreurs basée sur une opération d'exponentiation modulaire.The document US 6,697,947 B1 (JR MATYAS, STEPHEN, MICHAEL ET AL, February 24, 2004) ) describes a biometric data masking scheme that uses a low-sensitivity function based on a modular exponentiation operation.

Un premier objet de l'invention est de proposer un procédé de masquage utilisant une nouvelle fonction de hachage, mieux adaptée pour masquer des empreintes biométriques que les fonctions de hachage connues. Dans un mode préféré de mise en oeuvre, le procédé de masquage selon l'invention est utilisé pour sécuriser une empreinte biométrique.A first object of the invention is to propose a masking method using a new hash function, better adapted to hide biometric fingerprints than known hash functions. In a preferred mode of implementation, the masking method according to the invention is used to secure a biometric fingerprint.

Enfin, un deuxième objet de l'invention est une utilisation du procédé de masquage de l'invention pour sécuriser un document de sécurité tel que par exemple un chèque bancaire.Finally, a second object of the invention is a use of the masking method of the invention for securing a security document such as for example a bank check.

Le premier objet de l'invention est atteint par un procédé de masquage d'une donnée claire b de n bits, caractérisé en ce qu'on produit une donnée masquée m en utilisant la fonction de hachage suivante : m = Π i = 1 n q i b i mod p ,

Figure imgb0001
où p est un nombre premier, bi est le bit de rang i de la donnée claire b, qi est le nombre premier de rang i d'un ensemble de nombres premiers (q1, ..., qn) . De préférence, p est un nombre premier de grande taille et les éléments de l'ensemble de nombres premiers sont de petite taille.The first object of the invention is achieved by a method of masking a clear data b of n bits, characterized in that a masked data m is produced by using the following hash function: m = Π i = 1 not q i b i mod p ,
Figure imgb0001
where p is a prime number, bi is the bit of rank i of the light data b, qi is the prime number of rank i of a set of prime numbers (q 1 , ..., q n ). Preferably, p is a prime number of large size and the elements of the set of prime numbers are small.

Par rapport aux fonctions de hachage connues, la fonction m = Π i = 1 n q i b i mod p

Figure imgb0002
a pour principal intérêt d'être tolérante aux erreurs, comme on le verra mieux par la suite, elle est de ce fait particulièrement bien adaptée pour masquer des données biométriques.Compared to known hash functions, the function m = Π i = 1 not q i b i mod p
Figure imgb0002
Its main interest is to be error tolerant, as will be seen later, so it is particularly well suited to hide biometric data.

Dans un mode préféré de mise en oeuvre, le procédé de masquage ci-dessus est appliqué à une empreinte biométrique. Pour cela, au cours du procédé, on détermine un ensemble de s minuties réelles caractéristiques de la dite empreinte, on mélange et on range les minuties réelles avec t fausses minuties, on forme une donnée mélangée b de n = s + t bits telle que, pour tout i :

  • bi = 1 si le rang i correspond à une minutie réelle et
  • bi = 0 si le rang i correspond à une fausse minutie.
et on applique la fonction de hachage selon l'invention à cette donnée mélangée pour produire une donnée masquée.In a preferred embodiment, the above masking method is applied to a biometric imprint. For this purpose, during the process, a set of actual minutiae characteristics of the said imprint are determined, the actual minutiae are mixed and stored with t false minutiae, a mixed data b of n = s + t bits is formed such that , for everything i:
  • b i = 1 if the rank i corresponds to a real minutia and
  • b i = 0 if the rank i corresponds to a false minutia.
and applying the hash function according to the invention to this mixed data to produce masked data.

De préférence, les minuties réelles et les fausses minuties sont mélangées de façon aléatoire.Preferably, the actual minutiae and the false minutiae are mixed randomly.

Le deuxième objet de l'invention concerne quant à lui un procédé de sécurisation d'un document de sécurité, par exemple d'un chèque bancaire, au cours duquel, après avoir obtenu une donnée de référence par masquage d'une empreinte biométrique selon un procédé tel que décrit ci-dessus,

  • on mémorise la dite donnée de référence sur ou dans le document de sécurité, ou
  • on associe à la dite donnée de référence un code - barre que l'on mémorise sur ou dans le document de sécurité, la donnée de référence et le code - barre étant également mémorisés dans une table.
The second subject of the invention relates to a method for securing a security document, for example a bank check, in which, after obtaining a reference data by masking a biometric fingerprint according to a process as described above,
  • storing said reference data on or in the security document, or
  • the reference datum is associated with a bar code which is stored on or in the security document, the reference datum and the barcode being also stored in a table.

Des exemples préférés de mise en oeuvre de l'invention sont décrits ci-dessous.Preferred examples of implementation of the invention are described below.

On va tout d'abord détailler le procédé de masquage selon l'invention. Pour masquer une donnée claire b = (bn, ..., b1) de n bits, on utilise la fonction de hachage suivante: m = Π i = 1 n q i b i mod p

Figure imgb0003
We will first detail the masking process according to the invention. To mask a clear data b = (b n , ..., b 1 ) of n bits, we use the following hash function: m = Π i = 1 not q i b i mod p
Figure imgb0003

La fonction utilise comme paramètres un ensemble (qn, ..., q1) de petits nombres premiers, par exemple des nombres entiers d'environ 60 bits. La fonction utilise également un paramètre p, qui est un entier de grande taille, par exemple d'environ 1024 bits. p est choisi de préférence tel que 2*qn^2t < p < 4*qn^2t, où t est un nombre d'erreurs acceptées.The function uses as parameters a set (q n , ..., q 1 ) of small prime numbers, for example integers of about 60 bits. The function also uses a parameter p, which is a large integer, for example about 1024 bits. p is preferably chosen such that 2 * q n ^ 2t <p <4 * q n ^ 2t, where t is a number of accepted errors.

Contrairement aux fonctions de hachage connues, la fonction selon l'invention est peu sensible aux erreurs, c'est-à-dire que, connaissant deux données m, µ masquées par cette fonction, il est possible de dire si les données claires d'origine b, β correspondantes sont identiques, à au maximum t erreurs près.Contrary to the known hash functions, the function according to the invention is not very sensitive to errors, that is to say that, knowing two data m, μ masked by this function, it is possible to say whether the clear data of origin b, β corresponding are identical, with at most t errors.

En effet, m, µ sont obtenues par les relations : m = Π i = 1 n q i b i mod p et μ = Π i = 1 n q i β i mod p ,

Figure imgb0004
Indeed, m, μ are obtained by the relations: m = Π i = 1 not q i b i mod p and μ = Π i = 1 not q i β i mod p ,
Figure imgb0004

On définit de plus : λ = m μ mod p = a α mod p

Figure imgb0005

avec a = Π i Δ i q i mod p et α = Π i Γ i q i mod p
Figure imgb0006

où Δi est l'ensemble des indices i compris entre 1 et n pour lesquels bi = 1 et βi = 0, et où Γi est l'ensemble des indices i compris entre 1 et n pour lesquels bi = 0 et βi = 1. La somme des tailles des ensembles Δi et Γi est au plus égale à t, t étant le nombre de bits de β différents des bits de b de même rang, correspondant au nombre maximum d'erreurs acceptées.We further define: λ = m μ mod p = at α mod p
Figure imgb0005

with at = Π i Δ i q i mod p and α = Π i Γ i q i mod p
Figure imgb0006

where Δ i is the set of indices i between 1 and n for which b i = 1 and β i = 0, and where Γ i is the set of indices i between 1 and n for which b i = 0 and β i = 1. The sum of the sizes of the sets Δ i and Γ i is at most equal to t, t being the number of bits of β different from the bits of b of the same rank, corresponding to the maximum number of accepted errors.

a et α, qui sont des produits de petits nombres premiers qi, sont également des petits nombres, qui vérifient de plus la relation : a*λ = α mod p. A partir de cette dernière égalité et du nombre λ, il est alors possible de retrouver les nombres a et α. Une décomposition de a et α en nombres premiers permet finalement factoriser a et α. La décomposition est facilitée en tirant partie du fait que a et α se décomposent en principe en de petits nombres premiers. Si a et α se décomposent sur l'ensemble (qn, ..., q1) , alors on en déduit que les données d'origine b et β sont identiques, à au plus t erreurs près.a and α, which are products of small prime numbers q i , are also small numbers, which further satisfy the relation: a * λ = α mod p. From this last equality and the number λ, it is then possible to find the numbers a and α. A decomposition of a and α into prime numbers finally makes it possible to factor a and α. Decomposition is facilitated by taking advantage of the fact that a and α decompose in principle into small prime numbers. If a and α decompose on the set (q n , ..., q 1 ), then we deduce that the original data b and β are identical, with at most t errors.

On va maintenant décrire un mode préféré de mise en oeuvre du procédé de masquage utilisant la fonction de masquage décrite ci-dessus, pour le masquage d'une empreinte biométrique.We will now describe a preferred embodiment of the masking method using the masking function described above, for masking a biometric fingerprint.

Dans l'exemple ci-dessous, l'empreinte biométrique physique que l'on cherche à masquer est une empreinte digitale caractérisée par un nombre s prédéfini de minutiae réelles. Une minutie réelle est un détail d'une empreinte en un point donné de l'empreinte physique, comme par exemple une rupture d'une ligne, une fourche sur une ligne, etc. Numériquement, une minutie peut être traduite par une chaîne de caractères incluant des informations sur la position et la forme de la minutie.In the example below, the physical biometric fingerprint that is to be masked is a fingerprint characterized by a predefined number of actual minutiae. A real minutia is a detail of a footprint at a given point in the physical footprint, such as a break in a line, a fork on a line, and so on. Numerically, a minutia can be translated by a string of characters including information on the position and the form of the minutia.

Selon l'invention, pour masquer l'empreinte physique, on ajoute d'abord à l'ensemble des minuties réelles un ensemble de t fausses minuties, également définies par une chaîne de caractères mais qui ne correspondent pas à une minutie réelle de l'empreinte physique. Dans un exemple, une fausse minutie est définie de manière totalement aléatoire, et on ajoute un ensemble de t = 80 fausses minuties à un ensemble de s = 20 minuties réelles.According to the invention, in order to mask the physical footprint, a set of t false minutiae, also defined by a string of characters but which do not correspond to a real minutia of the physical footprint. In one example, a false minutia is completely randomly defined, and a set of t = 80 false minutiae is added to a set of s = 20 real minutiae.

L'ordre des minuties réelles et des fausses minutiae est mélangé, par exemple de façon aléatoire, puis on forme une donnée mélangée b = (bn, ..., b1) de n = s + t bits telle que, pour tout i :

  • bi = 1 si le rang i correspond à une minutie réelle et
  • bi = 0 si le rang i correspond à une fausse minutie.
The order of the real minutiae and the false minutiae is mixed, for example in a random manner, then a mixed datum b = (b n , ..., b 1 ) of n = s + t bits is created such that, for all i:
  • b i = 1 if the rank i corresponds to a real minutia and
  • b i = 0 if the rank i corresponds to a false minutia.

La donnée mélangée b est ensuite masquée par le procédé de masquage selon l'invention pour produire une donnée masquée m telle que : m = Π i = 1 n q i b i mod p

Figure imgb0007
The mixed data item b is then masked by the masking method according to the invention to produce a masked data item m such that: m = Π i = 1 not q i b i mod p
Figure imgb0007

La donnée masquée m peut ensuite être mémorisée dans une base de données, sur une carde d'identité, dans une mémoire d'une carte à puce, etc. La donnée masquée m peut être utilisée comme donnée de référence, par exemple pour vérifier l'identité d'une personne, de la manière suivante.The masked data m can then be stored in a database, on an identity card, in a memory of a smart card, etc. The masked data m can be used as reference data, for example to verify the identity of a person, as follows.

Pour vérifier l'identité d'une personne, il suffit :

  • de relever une nouvelle empreinte biométrique physique sur la personne puis de calculer l'ensemble de s minuties réelles correspondant,
  • d'ajouter t fausses minuties, de mélanger les fausses minuties et les vraies minuties, de déterminer la donnée mélangée β associée à la nouvelle empreinte biométrique, puis de masquer β par la fonction μ = Π i = 1 n q i β i mod p
    Figure imgb0008
    pour obtenir une nouvelle donnée masquée µ,
  • de déterminer s'il y a concordance entre la donnée référence m précédemment mémorisée et la donnée µ masquée obtenue à partir de la nouvelle empreinte réelle qui vient d'être relevée.
To verify the identity of a person, simply:
  • to take a new physical biometric imprint on the person and then calculate the set of corresponding real minutiae,
  • to add t false minutiae, to mix the false minutiae and the real minutiae, to determine the mixed data β associated with the new biometric imprint, then to mask β by the function μ = Π i = 1 not q i β i mod p
    Figure imgb0008
    to obtain a new hidden data μ,
  • to determine whether there is a match between the previously memorized reference datum m and the masked μ datum obtained from the new real fingerprint that has just been read.

Pour déterminer s'il y a concordance entre m et µ :

  • on calcule λ = m μ mod p = a α mod p ,
    Figure imgb0009
    puis a et α à partir de la relation a*λ = α mod p, avec a et α petits devant l'entier p, par l'algorithme des fractions continues par exemple.
  • on décompose ensuite a et α en facteurs premiers, puis
    • il y a concordance si a et α se décomposent sur au plus t éléments de l'ensemble des nombres premiers (qn , ..., ql),
    • il n'y a pas concordance sinon
To determine if there is a match between m and μ:
  • we calculate λ = m μ mod p = at α mod p ,
    Figure imgb0009
    then a and α from the relation a * λ = α mod p, with a and α small in front of the integer p, by the algorithm of continuous fractions for example.
  • we then break down a and α in prime factors, then
    • there is a concordance if a and α are decomposed on at most t elements of the set of prime numbers (q n , ..., q l ),
    • there is no concordance otherwise

Une application envisagée du procédé de masquage selon l'invention vise à sécuriser un document de sécurité tel que par exemple un chèque bancaire. Pour cela, selon l'invention, une empreinte biométrique du propriétaire du document de sécurité est masquée par un procédé de masquage tel que décrit ci-dessus, pour produire une donnée de référence.An intended application of the masking method according to the invention is to secure a security document such as for example a bank check. For this, according to the invention, a biometric fingerprint of the owner of the security document is masked by a masking method as described above, to produce a reference data.

Selon un premier mode de réalisation, la donnée de référence est mémorisée sur ou dans le document de sécurité, par exemple par impression.According to a first embodiment, the reference data is stored on or in the security document, for example by printing.

Selon un deuxième mode de réalisation, la donnée de référence est associée à un code - barre, le couple donnée de référence / code - barre associé est mémorisé dans une base de donnée, et le code - barre est mémorisé, par exemple par impression, sur le document de sécurité.According to a second embodiment, the reference datum is associated with a barcode, the associated datum / barcode pair is stored in a database, and the barcode is stored, for example by printing, on the security document.

Il suffit ensuite, lorsque le document de sécurité est transmis par exemple, de prendre simultanément avec le document de sécurité une empreinte biométrique de la personne qui transmet le dit document puis de vérifier que l'empreinte biométrique de la personne qui transmet le document correspond bien à l'empreinte incluse dans la donnée de référence mémorisée sur le document ou associée au code - barre mémorisé sur le document.It then suffices, when the security document is transmitted for example, to simultaneously take with the security document a biometric fingerprint of the person who transmits the document and then check that the biometric fingerprint of the person who transmits the document corresponds well. the imprint included in the reference data stored in the document or associated with the bar code stored on the document.

Dans le premier mode de réalisation, la vérification pourra être faite par toute personne , la donnée de référence étant mémorisée directement sur le document. Dans le deuxième mode de réalisation, la vérification pourra être faite par toute personne ayant accès à la base de données, et qui n'est pas nécessairement la personne qui reçoit le document.In the first embodiment, the verification can be done by any person, the data of reference being stored directly on the document. In the second embodiment, the verification may be done by anyone having access to the database, and who is not necessarily the person who receives the document.

Le code - barre est réalisé selon des techniques connues, on pourra utiliser par exemple un code - barre à une dimension, constitué d'une série de barres verticales d'épaisseur et d'écartement variables. Le choix de la forme du code - barre est en pratique fonction du nombre de données de référence à mémoriser, chaque donnée de référence correspondant à des personnes différentes.The bar code is produced according to known techniques, for example a one-dimensional barcode consisting of a series of vertical bars of varying thickness and spacing may be used. The choice of the form of the bar code is in practice a function of the number of reference data to be memorized, each reference datum corresponding to different persons.

De préférence, la base de données dans laquelle les couples donnée de référence / code - barre associé sont mémorisés est accessible pour vérification uniquement à un nombre restreint de personnes, selon le niveau de sécurité souhaité : l'accès peut par exemple être autorisé pour toute personne amenée à recevoir des documents de sécurité ou, de manière plus restreinte, uniquement à une autorité certificatrice.Preferably, the database in which the reference datum pairs / associated bar code are stored is accessible for verification only to a limited number of people, depending on the desired level of security: the access can for example be authorized for any person to receive security documents or, to a lesser extent, only to a certifying authority.

Dans un exemple pratique, le document de sécurité est un chèque bancaire et l'empreinte digitale de son propriétaire est mémorisée sur le chèque sous la forme d'un code - barre. Un commerçant dispose d'un dispositif de lecture et de masquage d'une empreinte doté de moyens pour lire une empreinte, la masquer puis imprimer la donnée masquée associée. La banque émettrice du chèque a seule le droit d'accès à la base de données dans laquelle sont mémorisés la donnée masquée de référence (correspondant à l'empreinte initiale masquée) et le code - barre associé ; cet accès lui permet de vérifier que l'empreinte laissée par la personne qui a présenté le chèque au commerçant, et que ce dernier a masqué et imprimé sur le chèque, correspond bien à celle du propriétaire du chèque.In a practical example, the security document is a bank check and the fingerprint of its owner is stored on the check in the form of a bar code. A merchant has a device for reading and masking a fingerprint with means for reading a fingerprint, hide it and then print the associated masked data. The bank issuing the check only has the right of access to the database in which are stored the masked reference data (corresponding to the initial masked print) and the associated bar code; this access allows him to verify that the impression left by the person who presented the check to the merchant, and that the latter has hidden and printed on the check, corresponds to that of the owner of the check.

Claims (7)

  1. Method of masking a plain datum b having n bits, characterised in that a masked datum m is produced using the following hash function: m = Π i = 1 n q i b i mod p ,
    Figure imgb0011
    where p is a prime number, bi is the bit at position i of plain datum b, and qi is the prime number at position i in a set of prime numbers (qi...,qn) .
  2. Masking method according to claim 1, in which p is a large prime number and the components of the set of prime numbers are small.
  3. Masking method according to either one of the claims 1 or 2, applied to a biometric print, characterised in that it consists in determining a set of s real minutiae, which are characteristic of said print, mixing and arranging the real minutiae with t false minutiae, and forming a mixed biometric datum b having n = s + t bits, such that, for any i:
    bi = 1 if position i corresponds to a real minutia and
    bi = 0 if position i corresponds to a false minutia
    and the hash function according to the invention is applied to this mixed datum in order to produce a masked datum.
  4. Method according to claim 3, in which the real minutiae and the false minutiae are mixed in a random fashion.
  5. Method of securing a security document, for example a bank cheque, during which, after having obtained a reference datum by masking a biometric print according to a method according to claim 3 and 4,
    - said reference datum is stored on or in the security document, or
    - a barcode is associated with said reference datum, which is stored on or in the security document, the reference datum and the barcode also being stored in a table.
  6. Method of verifying a security document secured by a method according to claim 5, verification method during which;
    - a physical biometric print of a person presenting the security document is digitised,
    - the digitised print is masked using a method according to one of the claims from 3 to 4, to produce a masked datum,
    - the masked datum is compared with a reference datum, and then
    - the security document is accepted if the masked datum and the reference datum are identical with a predefined rate of error, and the document is refused otherwise.
  7. Method according to claim 6, in which, during the comparison step, if a barcode associated with the reference datum is stored on the security document, then:
    - the barcode is read and the reference datum associated with the barcode is searched in a table, and then
    - the reference datum is compared with the masked datum.
EP05749585A 2004-05-14 2005-05-11 Method of masking a digital datum, such as a biometric print, and use thereof for securing a security document Expired - Lifetime EP1747526B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0405236A FR2870413B1 (en) 2004-05-14 2004-05-14 DIGITAL DATA ENCRYPTION METHOD, BIOMETRIC FOOTPRINT HAMPERING METHOD, AND SECURITY DOCUMENT SECURITY APPLICATION
PCT/EP2005/052151 WO2005111915A2 (en) 2004-05-14 2005-05-11 Method of masking a digital datum, such as a biometric print

Publications (2)

Publication Number Publication Date
EP1747526A2 EP1747526A2 (en) 2007-01-31
EP1747526B1 true EP1747526B1 (en) 2012-01-11

Family

ID=34947119

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05749585A Expired - Lifetime EP1747526B1 (en) 2004-05-14 2005-05-11 Method of masking a digital datum, such as a biometric print, and use thereof for securing a security document

Country Status (6)

Country Link
US (1) US7895440B2 (en)
EP (1) EP1747526B1 (en)
AT (1) ATE541267T1 (en)
DK (1) DK1747526T3 (en)
FR (1) FR2870413B1 (en)
WO (1) WO2005111915A2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8417960B2 (en) * 2006-09-06 2013-04-09 Hitachi, Ltd. Method for generating an encryption key using biometrics authentication and restoring the encryption key and personal authentication system
JP5287550B2 (en) * 2009-07-01 2013-09-11 富士通株式会社 Biometric authentication system, biometric authentication method, biometric authentication device, biometric information processing device, biometric authentication program, and biometric information processing program
JP6375775B2 (en) * 2014-08-19 2018-08-22 日本電気株式会社 Feature point input support device, feature point input support method, and program

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6185316B1 (en) * 1997-11-12 2001-02-06 Unisys Corporation Self-authentication apparatus and method
JP2000011176A (en) * 1998-06-23 2000-01-14 Fujitsu Ltd Authentication device and storage medium
US6658626B1 (en) * 1998-07-31 2003-12-02 The Regents Of The University Of California User interface for displaying document comparison information
US6697947B1 (en) * 1999-06-17 2004-02-24 International Business Machines Corporation Biometric based multi-party authentication
US7152786B2 (en) * 2002-02-12 2006-12-26 Digimarc Corporation Identification document including embedded data

Also Published As

Publication number Publication date
DK1747526T3 (en) 2012-05-14
US20070183636A1 (en) 2007-08-09
US7895440B2 (en) 2011-02-22
WO2005111915A2 (en) 2005-11-24
WO2005111915A3 (en) 2006-08-10
EP1747526A2 (en) 2007-01-31
FR2870413A1 (en) 2005-11-18
FR2870413B1 (en) 2006-08-04
ATE541267T1 (en) 2012-01-15

Similar Documents

Publication Publication Date Title
EP1716520B1 (en) Use of a digital signature obtained from at least one structural characteristic of a hardware element in order to protect direct reading of sensitive information and method for reading protected sensitive information
EP1811422B1 (en) Processes for determining an identifier, biometric verification and associated systems.
EP3206192B1 (en) Method for securing and verifying a document
JP7367277B2 (en) Methods and systems for anti-counterfeiting protection of digital files
US20140123261A1 (en) System and method for authentication of communications
HUE026760T2 (en) Secure item identification and authentication system and method based on unclonable features
EP1977370A2 (en) Methods, systems, and subcombinations useful with physical articles
WO2005091232A1 (en) Method for authentication of products
JP2001511544A (en) Document or message security deployments that use the numeric hash function
EP2605218A1 (en) Method for securing an electronic document
EP1747526B1 (en) Method of masking a digital datum, such as a biometric print, and use thereof for securing a security document
FR3024003A1 (en) DOCUMENT AUTHENTICATION DEVICE AND METHOD
OA11817A (en) Method of marking and authentication of an object
WO2015001205A1 (en) Method for printing interdependent security graphics
WO2023020795A1 (en) Method for personalising a security device, personalised security device, identity document comprising such a device, and method for authenticating such a device
WO2005050419A1 (en) Method for securing an image of a biometric authentication feature and method for authentication of a user with an image of a biometric authentication feature
EP4193283B1 (en) Method for generating a secure digital document stored on a mobile terminal and associated with a digital identity
FR2974652A3 (en) METHOD FOR UNITARY AUTHENTICATION OF A HARDWARE OBJECT USING A VISUAL CRYPTOGRAPHY ALGORITHM AND A MATERIAL SIGNATURE
FR2804783A1 (en) Method for identifying and authenticating objects, human beings, or transactions designed to optimize reading of a non reproducible identifier
EP4498269A1 (en) Code rendering method and mobile apparatus, digital certificate authentication method and system
EP4099614A1 (en) Methods of data enrolment to verify the authenticity of security data or verification of the authenticity of security data
EP3032450B1 (en) Method for checking the authenticity of a payment terminal and terminal thus secured
FR3093836A1 (en) Numeric identity
FR2996660A1 (en) Identification support for e.g. document for biometric applications, has matrix code, identification zone, and authenticating element, where code is arranged with key of authenticating element output after reading authenticating element
WO2022122821A1 (en) Device and method for authenticating products

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20061113

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR LV MK YU

DAX Request for extension of the european patent (deleted)
RIN1 Information on inventor provided before grant (corrected)

Inventor name: CARDONNEL, CEDRIC

Inventor name: NACCACHE, DAVID

Inventor name: CORON, JEAN-SEBASTIEN

Inventor name: BRIER, ERIC

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: GEMALTO SA

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIC1 Information provided on ipc code assigned before grant

Ipc: G06K 9/00 20060101AFI20110721BHEP

Ipc: H04L 9/32 20060101ALI20110721BHEP

RTI1 Title (correction)

Free format text: METHOD OF MASKING A DIGITAL DATUM, SUCH AS A BIOMETRIC PRINT, AND USE THEREOF FOR SECURING A SECURITY DOCUMENT

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 541267

Country of ref document: AT

Kind code of ref document: T

Effective date: 20120115

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602005032123

Country of ref document: DE

Effective date: 20120315

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20120111

REG Reference to a national code

Ref country code: DK

Ref legal event code: T3

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

LTIE Lt: invalidation of european patent or patent extension

Effective date: 20120111

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120411

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120511

REG Reference to a national code

Ref country code: IE

Ref legal event code: FD4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120412

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120511

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 541267

Country of ref document: AT

Kind code of ref document: T

Effective date: 20120111

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

BERE Be: lapsed

Owner name: GEMALTO SA

Effective date: 20120531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

26N No opposition filed

Effective date: 20121012

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602005032123

Country of ref document: DE

Effective date: 20121012

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120422

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120111

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120511

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20050511

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 12

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 13

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 14

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20190418

Year of fee payment: 15

Ref country code: DK

Payment date: 20190425

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20190418

Year of fee payment: 15

Ref country code: SE

Payment date: 20190425

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20190423

Year of fee payment: 15

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602005032123

Country of ref document: DE

REG Reference to a national code

Ref country code: DK

Ref legal event code: EBP

Effective date: 20200531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200512

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20200511

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200531

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200511

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201201