Language selection

Search

Patent 2586248 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2586248
(54) English Title: PRIVACY IDENTIFIER REMEDIATION
(54) French Title: CORRECTION D'IDENTIFICATEUR DE CONFIDENTIALITE
Status: Granted and Issued
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04L 09/32 (2006.01)
(72) Inventors :
  • RENTER, CHRISTOPHER K. (Canada)
  • NILES, DENIS A. (Canada)
(73) Owners :
  • TELUS CORPORATION
(71) Applicants :
  • TELUS CORPORATION (Canada)
(74) Agent: LAMBERT INTELLECTUAL PROPERTY LAW
(74) Associate agent:
(45) Issued: 2015-09-01
(22) Filed Date: 2007-04-23
(41) Open to Public Inspection: 2008-10-23
Examination requested: 2012-04-20
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): No

(30) Application Priority Data: None

Abstracts

English Abstract

A secure server installation is provided that abstracts credit card identifiers from its server, network, application and database environments, thus reducing investment in securing, segregating and/or isolating these environments in their entirety. The secure server installation intercepts credit card transactions sent from front end applications to back end applications, and forwards tokens in replacement of credit card identifiers for processing by the back end applications. The same secure server installation can be applied for the encryption, storage (data-at-rest), transmission of private data within a network of other private or sensitive data not limited to social insurance numbers, drivers license numbers, phone numbers, bank account numbers, etc.


French Abstract

Une installation de serveur sécurisée est présentée qui rend abstraits les identifiants de carte de crédit de ses serveur, réseau, application et environnements de base de données, ce qui réduit linvestissement dans la sécurité, la ségrégation ou lisolement de ces environnements dans leur entièreté. Linstallation de serveur sécurisée intercepte les transactions de carte de crédit envoyées par les applications frontales vers les applications dorsales, et transmet des jetons en remplacement des identifiants de carte de crédit en vue dun traitement par les applications dorsales. Cette installation de serveur sécurisé peut être appliquée pour le chiffrement, le stockage (données au repos), la transmission de données privées sur un réseau dautres données privées ou sensibles ne se limitant pas aux numéros de sécurité sociale, numéros de permis de conduire, numéros de téléphone, numéros de compte bancaire, etc.

Claims

Note: Claims are shown in the official language in which they were submitted.


.cndot.
THE EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE PROPERTY OR
PRIVILEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. A method of privacy identifier remediation, comprising:
at a secure server installation connected via communication links to plural
front end
servers, for a transaction in which a front end server captures a privacy
identifier from a
customer, the privacy identifier comprising a credit card number, receiving
the privacy identifier
at the secure server installation from the front end server;
at the secure server installation, for the transaction, obtaining a token to
replace the
privacy identifier, the token being unique and meaningless in relation to the
corresponding
privacy identifier;
for the transaction, forwarding the token from the secure server installation
to a back end
server and processing the token as a proxy for the privacy identifier at the
back end server; and
for the transaction:
upon receiving a request at the secure server installation from the back end
server, the
request containing the token, the secure server installation sending a message
to a private
information validation company to request validation of the credit card number
corresponding to
the token;
receiving at the secure server installation confirmation data from the private
information
validation company; and
the secure server installation completing the transaction by sending
confirmation of the
transaction to the respective front end server.
2. The method of claim 1 further comprising:
encrypting the privacy identifier at the secure server installation to
generate an encrypted
privacy identifier with a keyed hash of the privacy identifier; and
associating the token with the encrypted privacy identifier.
3. The method of claim 2 in which:
encrypting the privacy identifier is carried out at a secure encryption
server; and
12

associating the token with the encrypted privacy identifier is carried out at
a token
management server.
4. A secure server installation configured using non-transient computer-
readable media,
having computer-executable instructions for performing the steps of any one of
method claims 1-
3.
13

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02586248 2007-04-23
PRIVACY IDENTIFIER REMEDIATION
BACKGROUND
[0001] As credit card fraud and identify fraud becomes more prevalent, credit
card issuers
and personal information providers (government agencies, etc) are requiring
greater security
by companies that process transactions using credit cards or other personal
information. The
software applications used by these companies must meet strict standards for
credit card
processing required by credit card issuers and personal information. The
standards include
providing secure processing and storage of credit card information, and other
privacy
identifiers such as driver's license, banking or other financial data as for
example as may be
achieved by suitable encryption of credit card identifiers, identification
numbers or bank
account numbers. However, it is very difficult for companies with existing
credit card and
other identifiable information (driver's license, social security numbers,
banking information,
etc) to meet these requirements.
SUMMARY
[0002] A method and apparatus is provided for privacy identifier remediation
using a
secure server installation. The secure server installation abstracts privacy
identifiers from its
server, network, application and database environments, thus reducing
investment in securing,
segregating and/or isolating these environments in their entirety. The secure
server
installation intercepts transactions using privacy identifiers that are sent
from front end
applications to back end applications, and forwards tokens in replacement of
privacy
identifiers for processing by the back end applications. The secure server
component also acts
as a mediation gateway to connect to external agencies or processing systems.
In an
embodiment, the privacy identifiers comprise credit card numbers.
[0003] These and other aspects of the apparatus and method are set out in the
claims,
which are incorporated here by reference.
BRIEF DESCRIPTION OF THE FIGURES
[0004] Embodiments will now be described with reference to the figures, in
which like
1

CA 02586248 2007-04-23
reference characters denote like elements, by way of example, and in which:
Fig. 1 is schematic showing the processing components of an embodiment of a
secure server installation and its environment;
Fig. 2 is flow diagram illustrating method steps of a privacy identifier
remediation
process;
Fig. 3 is a flow diagram illustrating further method steps of a privacy
identifier
remediation process;
Fig. 4 shows details of the process of Fig. 2 applied to the specific example
of
credit cards; and
Fig. 5 shows details of the process of Fig. 3 applied to the specific example
of
credit cards.
DETAILED DESCRIPTION
[0005] In the claims, the word "comprising" is used in its inclusive sense and
does not
exclude other elements being present. The indefinite article "a" before a
claim feature does
not exclude more than one of the claim feature being present. Each one of the
individual
features described here may be used in one or more embodiments and is not, by
virtue only of
being described here, to be construed as essential to all embodiments as
defined by the claims.
[0006] In Fig. 1, secure server installation 10 is physically isolated in a
secure location and
logically connected via firewall 12 and router 14 to a variety of front end
servers 16, back end
systems 18, systems 20 and extemal processing systems. The front end servers
16 comprise
any server or device that captures one or more privacy identifiers such as
credit card data,
social insurance numbers, bank account numbers, driver's license numbers,
contract numbers
and phone numbers from a person such as a customer or consumer. The back end
systems 18
comprise for example application and database servers that process privacy
transactions, that
is, a transaction that involves a privacy identifier. The systems 20 comprise
privacy data
validation servers, and may include for example end systems and users that
need to connect to
the secure server installation 10 for purposes of maintenance & operations,
monitoring,
logging of privacy data for purposes of audits, financial reporting and
investigations. The
connection links between the elements shown in Fig. 1 represent logical
connections formed
2

CA 02586248 2007-04-23
upon request over any communications link including optical fiber, wireless
and wired
connections, and may include intervening networks of any suitable kind such as
portions of
the internet. SSL or equivalent or better communications security should be
used to secure
communications, and for that purpose the secure server installation 10 may be
connected via a
firewall 12 to the router 14 by an SSL device 15 such as an SSL accelerator,
as for example
an SSL accelerator from F5 Networks.
[0007] The secure server installation 10 comprises in the embodiment shown a
first server
22, referred to here for convenience as the Avalon server 22 (token management
server), a
second server 24, referred to here for convenience as the HSM server (hardware
security
module) and a third server 26, which acts as a database server. Other
configurations of fewer
or more servers could be used, and the entire functionality of the secure
server installation in
some embodiments could comprise a single server. The servers 22, 24 and 26 are
connected
together in this embodiment via multiple IP/Ethernet inter-connects in a bind
configuration
(for example an Ether-Channel) into a switch 28 such as a Cisco L2 or L3
switch. Database
server 26 in this embodiment connects to a storage system, for example a disk
array 27, via a
suitable switch 29, such as a Brocade FC switch. Other arrangements may be
used for
storage, such as flash memory, tape or optical disk.
[0008] In operation, the system of Fig. 1 operates as follows according to the
steps of Fig.
2 and 3. The process steps may be applied to any privacy identifier for
example a credit card
transaction, as for example when a customer seeks to purchase services using a
credit card.
As shown in Fig. 2, beginning with step 30, a front end server 16 captures a
privacy identifier
(PI) (as for example credit card data that may include a credit card
identifier (CCI) and, in
step 32, forwards the privacy identifier to the secure server installation 10.
At the secure
server installation, the privacy identifier is encrypted in step 34. In
addition, a token uniquely
associated with the privacy identifier is generated by an irreversible
function in step 36. The
token and encrypted privacy identifier and key hash of the privacy identifier
are stored in a
manner that they are associated with each other in step 38. The token is then
forwarded to a
back end server 18 in step 40 for further processing according to the nature
of the transaction
in step 42, where the token is processed as a proxy for the privacy
identifier.
3

CA 02586248 2007-04-23
[0009] As shown in Fig. 3, the transaction may in some embodiments proceed as
follows
for the purpose of validating the privacy transaction, as for example a credit
card validation
where credit card data, and in some embodiments other privacy data, is
validated. In step 44,
the back end servers 18 request privacy identifier validation by generating a
validation request
message, and sending the validation request message to a information
validation server 20
such as a credit card validation server. The validation request message
contains the token and
not the privacy identifier. At the secure server installation 10, the token is
removed from the
validation request message and replaced by the privacy identifier in step 46.
In step 48, the
validation request message is forwarded to an end system 20, such as a
information validation
server. Upon validation of the request, in step 50 a confirmation message is
returned to the
back end user 18 that requested validation. The privacy identifier (PI) is not
included in the
confirmation message to 18. If there is a privacy identifier (PI), it is
removed by secure server
installation 10.
[0010] As outlined below, in one exemplary embodiment applied to credit card
identifiers,
although similar operations may also be applied to other privacy identifiers,
the Avalon server
22 is configured to generate unique and meaningless tokens, to request a
search and match of
tokens for association of correct credit card identifiers and an
authentication code for the
credit card identifiers via database server 26, to extract credit card
identifiers and insert tokens
for internal backend system processing and to extract tokens and insert credit
card identifiers
for external communications processing for payment validation.
[0011] A token is substituted for a privacy identifier for all back end
transactions. The
token is unique to the privacy identifier and meaningless in relation to the
privacy identifier.
That is, the privacy identifier cannot be determined from the token. One
manner of
accomplishing generation of a meaningless token is to select a length of
characters by an
irreversible function such as generating the token in sequential order as
credit card identifiers
are processed by the Avalon server 22. The token may thus be obtained by
looking up an
ordered sequence of tokens, and selecting an unused token from the ordered
sequence. A
suitably long token should be adopted to cover variable length privacy
identifiers. The
4

CA 02586248 2007-04-23
characters may include any suitable characters, such as numerals and letters
but may include
other characters.
(0012] In one embodiment, all tokens have a one-to-one relationship with
privacy
identifiers such as credit card numbers and other privacy identifiers. Thus,
in the case where
the privacy identifier is a credit card number, no matter how many times a
customer issues a
credit purchase with the same credit card identifier, the transactions may
always use the same
token that was issued the first time the customer completes a transaction
using the secure
server installation 10. The same applies to other privacy identifiers. If an
individual provides
the same ID for any number of financial transactions, the token associated
with that ID will
always be the same one utilized during the processing of the transaction.
[00131 By selecting a suitably long token, for example in one embodiment a
numerical
entity 21 digits long, there will never be more tokens issued to any
particular individual than
the total possible number of unique credit card identifiers and other privacy
identifiers that an
individual possesses and uses in the system. For example, as an extreme
scenario, if an
individual uses 40 different credit card identifiers and provides 40 pieces of
different ID for
various financial transactions, this individual would require a total of 80
unique tokens from
the secure server installation 10. If we consider a total adult population of
500,000,000 (500
Million) for this scenario, the total number of tokens that the secure server
installation would
need to issue is 40,000,000,000 (40 Billion) tokens (80 x 500 Million). Thus,
a token of
length 21 digits will not be exhausted in practice. However, longer tokens
could be used.
[0014] Tokens in one embodiment are issued in a sequential format for every
request the
system receives. Each request received however is completely random with no
discernable
pattern or ability to anticipate the type of value associated with the token.
Token requests may
come in from a variety of front end servers 16 and the generated token
delivered to any of a
large number of back end servers 18. The token requests may be processed in
batches
amongst other individual requests coming into the back end servers 18. Token
requests may
be associated with different types of identifiers (credit card verses other
privacy identifiers),
different credit card suppliers, different privacy identifiers (such as
drivers license, bank
account, PIN, Student Card, Government Employee #, etc...) and may be issued
during any

CA 02586248 2007-04-23
time of the day. Accordingly, due to the randomness, types of requests and
data to be
tokenized being sent to the secure server installation 10, it is quite
impossible to define or
construct a usable pattern of token issuing.
[0015] Request for tokens are restricted to specific applications whose
authorization and
authentication is tracked each time those applications need to communicate
with the secure
server installation 10. Once communication and access have been granted to the
system, the
activity to request a token, encryption/decryption or hashing service may be
monitored,
tracked and written to a log file. Tracking software may also be applied to
the back end
servers 18 which need to connect to the secure server installation 10. Thus
there are multiple
areas where processes are in place to ensure the secure request and issuing of
tokens. The
same security measures apply to those teams which need to access secure server
installation
such as audit teams, reverse payment teams, system administrators and security
officers.
Thus only those systems and/or individuals with strict secure pre-defined
credentials are able
to request a credit card identifier for decryption by submitting a token. Each
role of the audit
teams, reverse payment teams, system administrators and security officers are
granted specific
levels of security without overlap of the other roles, further reducing risk.
[0016] Tokens are stored in the clear within the backend systems 18. If the
token is
sufficiently long, such as for example longer than any credit card or other
privacy identifier,
the token has no meaning that can be deduced from its length. In addition,
even if the token
was truncated, the specific fonnat of the digits' numbering scheme would not
meet the
validation process of a credit card identifier. By generating the token from
an irreversible
function such as a sequential number generator, the token is completely
independent of the
credit card or privacy identifier randomly submitted by a particular person or
business for the
secure server installation 10 to process. Further, there is no association
between the token and
credit card identifier except for the token being the prime search key to find
the encrypted
credit card identifier which enables the completion of the requested financial
transaction by a
particular backend system 18. Additionally, this process is a one-way stream
in which the
back end system 18 cannot and does not see the privacy identifier when a
transaction is
6

CA 02586248 2007-04-23
processed. The secure server installation 10 is the last step in the
communication stream
between the back end servers 18 and external privacy identifier processing
servers.
[0017] Referring to Fig. 4, further details of operation of a secure server
installation are
described in an exemplary embodiment applied to credit card transactions. The
same process
of token insertion and credit card identifier (CCI) encryption process may be
applied to other
privacy identifiers as for example bank account identifiers.
100181 Step 60 Front End Server 16 4 Avalon Server 22 (Token Request) A
process of
credit card remediation begins with generation of a token request by a front
end server 16
during a credit card processing request. The front end server 16 may be a web
tier application
that requires use of a credit card payment to complete a transaction. The
front end server 16
will need to communicate with a back end server 18 for the purpose of
completing the
transaction. The normal transaction process using a credit card is commenced,
but the front
end server 16 pauses the transaction process for the time required to send the
credit card
identifier to the secure server installation 10 for a token request/receipt.
Communication
stream between the front end server 16 and secure server installation 10 is
secured via SSL.
[0019] Step 62 Avalon Server 22 4 HSM Server 24 (Encryption Request) The
Avalon
server 22 at the secure server installation 10 receives credit card identifier
and sends it to the
HSM Server 24 for encryption and generation of the keyed hash of credit card
identifier, for
example by a KEYed Hash process.
[0020] Step 64 HSM (Encryption) The HSM server 24 encrypts the credit card
identifier
(using a strong encryption KEY #1 hash, as for example using a 1024 bit key)
and builds an
authentication code corresponding to the credit card identifier for look up
purposes. The
cryptography key for decryption is kept at the HSM server 24. An example of an
authentication code is a keyed hash based on the credit card identifier + a
256 bit KEY (using
Key #2) The strength of encryption KEY #1 and KEY #2 should be sufficiently
strong to
meet security standards applicable to the transaction process. An example
authentication code
is a keyed-hash message authentication code, or HMAC, calculated using a
cryptographic
hash function in combination with a secret key. As with any MAC, it may be
used to
7

CA 02586248 2007-04-23
simultaneously verify both the data integrity and the authenticity of a
message. Any suitably
strong iterative cryptographic hash function, such as MD5,SHA-1 or better, may
be used in
the calculation of an HMAC for this purpose. The cryptographic strength of the
HMAC
depends upon the cryptographic strength of the underlying hash function, on
the size and
quality of the key and the size of the hash output length in bits.
[0021] Step 66 HSM Server 24 Avalon Server 22 (Return CCI) The HSM server 24
returns the encrypted Credit card identifier and authentication code to the
Avalon server 22.
[0022] Step 68 Avalon Server 22 Database Server 26 (Existing Token?) In an
embodiment, before creating a token, the Avalon Server 22 sends the
authentication code and,
in some embodiments, an entity type to the database server 26 to search for an
existing token.
An entity type may be an additional security code based on a feature of the
transaction being
paused, as for example based on the credit card issuer (such as VISATM). Look
up in the
database server 26 is done via the authentication code and the entity type to
lower or avoid the
possibility of collisions (or token mismatch).
[0023] Step 70 Database Server 26 Avalon Server 22 (Existing token returned)
If a
match on authentication code and entity type is found, the database server 26
returns the token
matched.
[0024] Step 72 Database Server 26 Avalon Server 22 (No existing token) If no
match is
found, the database server 26 returns a 'null" response indicating to the
Avalon server 22 that
a new token must be created.
[0025] Step 74 Avalon server 22 (Create token). If no existing token is
returned from the
database server 26, the Avalon server 22 generates a new token as for example
a unique
sequential and meaningless number. The Avalon server 22 associates the token
with an
encrypted credit card identifier, the authentication code, and entity type,
and also any other
suitable identification information, such as a table name or key label, used
by the database.
[0026] Step 76 Avalon server 22 Database Server (Store Token). In this step,
the
Avalon server 22 sends the token, encrypted credit card identifier,
authentication code, entity
8

CA 02586248 2007-04-23
type and other suitable identification information to the database server 26
for processing and
storage. The database server 26 returns an acknowledge message when this
process is
complete.
[0027] Step 78 Avalon server 22 Back End Server 18 (Forward Token). Once an
acknowledge response from the database server 26 has been received, the Avalon
server 22
sends the token to the back end server 18, where the token is used by the back
end server 18
to carry out the transaction requested by the front end server 16 that
requested the transaction
and originally forwarded the credit card identifier that has now been
substituted by the token.
[0028] Referring to Fig. 5, steps 80-96 detail the payment confirmation
process.
[0029] Step 80 Back End Server 18 Secure server installation 10 (Verification
Request)
If credit card verification is required, the following steps may be taken.
Once the back end
server 18 has completed its processing, the back end server 18 sends its
financial transaction
data stream (which includes the unique token) to the secure server
installation 10 for credit
card identifier lookup and re-insertion. Communication stream between the two
entities is
secured via SSL.
[0030] Step 82 Avalon server 22 (Token/CCI Exchange Request) The Avalon server
22
receives the data stream from the back end server 18 and pauses the
transaction process for
the time required to extract unique token, look up credit card identifier in
the database 27 and
re-insert credit card identifier in the data stream.
[0031] Step 84 Avalon server 22 Database Server 26 (Find encrypted CCI).
Avalon
server 22 sends the token to the database server 26 for encrypted credit card
identifier look up.
[0032] Step 86 Database Server 26 Avalon server 22 (Return encrypted CCI) The
database server 26 receives unique token, searches for matching token and
associated
encrypted credit card identifier. The database server 26 sends the encrypted
credit card
identifier to the Avalon server 22.
[0033] Step 88 Avalon server 22 HSM Server 24 (Request CCI). The Avalon server
22
receives the encrypted credit card identifier with the cryptography key label
and sends it to the
9

CA 02586248 2007-04-23
HSM server 24 for decryption.
[0034] Step 90 HSM Server 24 Avalon server 22 (Decryption and CCI Insertion)
The
HSM server 24 receives encrypted credit card identifier, decrypts and sends
the decrypted
CCI to the Avalon server 22. The Avalon server 22 receives decrypted credit
card identifier
and inserts into transaction stream in place of token.
[0035] Step 92 Avalon server 22 Private Information Validation Company 20
(Payment
Completion Request, for example).The transaction stream from the back end
server 18 with
decrypted or real credit card identifier is sent to the Credit Card Validation
Company 20 for
payment process completion.
[0036] Step 94 Private Information Validation Company 20 Avalon server 22
(Payment
Completion). The Private Information Validation Company 20 returns payment
confirmation
details to Avalon server 22. If the Private Information Validation Company 20
returns the
private information identifier as part of its confirmation data to Avalon
server 22, the private
information identifier is stripped out prior to re-directing the completed
transaction stream
back to the back end server 18.
[0037] Step 96 Server 18 Front End Server 16 (Complete Transaction). The
completed
transaction with associated confirmation data is sent to the originating front
end server 16.
The transaction terminates where it originated from. A user could be a
connected user to
server 16 (a web browser for example).
[0038] The Avalon server 22 is configured for example using suitable software
to generate
unique & meaningless sequential numbers for variable field length credit card
identifiers and
privacy identifier fields. The tokens should thus have a sufficient number of
digits to cover
various length identifiers. While one type of encryption KEY may be used for
the credit card
identifier, other encryption keys may be used for other fields, such as
privacy identifier fields,
that require encryption. The Avalon server 22 may in some embodiments track,
monitor, log
and audit all activity relating to credit card processing done by the secure
server installation
10. If separate servers 22, 24 and 26 are used, they should be clustered for
reliability.

CA 02586248 2007-04-23
[0039] The HSM server 24 should be permitted to communicate only with the
Avalon
server 22 by suitable identification measures. In some embodiments, for
strictest security, no
device other than the Avalon server 22 should be able to issue requests to the
HSM server 24.
Some systems 20 may be permitted access to the Avalon server 22 for purposes
of
maintenance, operations, audits and investigations.
100401 The HSM Server 26 provides encryption, decryption, authentication code,
keyed
hash generation and key management for the secure server installation 10.
(0041] Immaterial modifications may be made to the embodiments described here
without
departing from what is covered by the claims.
11

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: Recording certificate (Transfer) 2024-03-08
Inactive: Office letter 2024-02-29
Inactive: Multiple transfers 2024-01-03
Inactive: Recording certificate (Transfer) 2023-07-17
Inactive: Multiple transfers 2023-06-16
Inactive: IPC expired 2022-01-01
Revocation of Agent Requirements Determined Compliant 2020-04-22
Appointment of Agent Requirements Determined Compliant 2020-04-22
Inactive: COVID 19 - Deadline extended 2020-03-29
Common Representative Appointed 2019-10-30
Common Representative Appointed 2019-10-30
Letter Sent 2017-11-01
Inactive: Multiple transfers 2017-10-25
Grant by Issuance 2015-09-01
Inactive: Cover page published 2015-08-31
Pre-grant 2015-05-20
Inactive: Final fee received 2015-05-20
Inactive: Inventor deleted 2015-01-02
Inactive: Office letter 2015-01-02
Correct Applicant Request Received 2014-12-15
Letter Sent 2014-11-28
Notice of Allowance is Issued 2014-11-28
Notice of Allowance is Issued 2014-11-28
Inactive: Q2 passed 2014-10-15
Inactive: Approved for allowance (AFA) 2014-10-15
Amendment Received - Voluntary Amendment 2014-07-21
Inactive: S.30(2) Rules - Examiner requisition 2014-01-28
Inactive: Report - No QC 2014-01-23
Amendment Received - Voluntary Amendment 2013-10-31
Letter Sent 2012-04-26
All Requirements for Examination Determined Compliant 2012-04-20
Request for Examination Requirements Determined Compliant 2012-04-20
Request for Examination Received 2012-04-20
Application Published (Open to Public Inspection) 2008-10-23
Inactive: Cover page published 2008-10-22
Inactive: IPC assigned 2007-07-11
Inactive: First IPC assigned 2007-07-11
Inactive: IPC assigned 2007-07-11
Inactive: Filing certificate - No RFE (English) 2007-05-23
Filing Requirements Determined Compliant 2007-05-23
Letter Sent 2007-05-23
Application Received - Regular National 2007-05-23

Abandonment History

There is no abandonment history.

Maintenance Fee

The last payment was received on 2015-04-15

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
TELUS CORPORATION
Past Owners on Record
CHRISTOPHER K. RENTER
DENIS A. NILES
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Claims 2013-10-30 2 48
Claims 2007-04-22 6 218
Description 2007-04-22 11 557
Drawings 2007-04-22 5 72
Abstract 2007-04-22 1 20
Representative drawing 2008-09-24 1 9
Representative drawing 2015-07-27 1 8
Maintenance fee payment 2024-02-06 1 26
Courtesy - Office Letter 2024-02-28 2 197
Courtesy - Certificate of registration (related document(s)) 2007-05-22 1 107
Filing Certificate (English) 2007-05-22 1 159
Reminder of maintenance fee due 2008-12-23 1 113
Reminder - Request for Examination 2011-12-27 1 118
Acknowledgement of Request for Examination 2012-04-25 1 177
Commissioner's Notice - Application Found Allowable 2014-11-27 1 161
Courtesy - Certificate of registration (related document(s)) 2017-10-31 1 107
Courtesy - Certificate of Recordal (Transfer) 2023-07-16 1 400
Courtesy - Certificate of Recordal (Transfer) 2024-03-07 1 402
Fees 2013-01-31 1 155
Correspondence 2007-05-22 1 60
Correspondence 2007-05-22 1 23
Correspondence 2008-12-23 1 38
Fees 2009-04-21 1 34
Fees 2010-04-19 1 28
Fees 2011-04-05 1 201
Correspondence 2011-12-27 1 24
Fees 2012-04-19 1 30
Correspondence 2012-04-25 1 78
Fees 2014-02-25 1 23
Correspondence 2014-12-14 2 54
Correspondence 2015-01-01 1 18
Fees 2015-04-14 1 24
Correspondence 2015-05-19 1 24
Fees 2016-02-11 1 25
Maintenance fee payment 2017-02-16 1 25
Maintenance fee payment 2018-02-22 1 25
Maintenance fee payment 2019-02-12 1 25
Maintenance fee payment 2020-04-08 1 25
Maintenance fee payment 2021-04-19 1 25
Maintenance fee payment 2022-03-29 1 25
Maintenance fee payment 2023-03-07 1 26