Sélection de la langue

Search

Sommaire du brevet 2586248 

Énoncé de désistement de responsabilité concernant l'information provenant de tiers

Une partie des informations de ce site Web a été fournie par des sources externes. Le gouvernement du Canada n'assume aucune responsabilité concernant la précision, l'actualité ou la fiabilité des informations fournies par les sources externes. Les utilisateurs qui désirent employer cette information devraient consulter directement la source des informations. Le contenu fourni par les sources externes n'est pas assujetti aux exigences sur les langues officielles, la protection des renseignements personnels et l'accessibilité.

Disponibilité de l'Abrégé et des Revendications

L'apparition de différences dans le texte et l'image des Revendications et de l'Abrégé dépend du moment auquel le document est publié. Les textes des Revendications et de l'Abrégé sont affichés :

  • lorsque la demande peut être examinée par le public;
  • lorsque le brevet est émis (délivrance).
(12) Brevet: (11) CA 2586248
(54) Titre français: CORRECTION D'IDENTIFICATEUR DE CONFIDENTIALITE
(54) Titre anglais: PRIVACY IDENTIFIER REMEDIATION
Statut: Accordé et délivré
Données bibliographiques
Abrégés

Abrégé français

Une installation de serveur sécurisée est présentée qui rend abstraits les identifiants de carte de crédit de ses serveur, réseau, application et environnements de base de données, ce qui réduit linvestissement dans la sécurité, la ségrégation ou lisolement de ces environnements dans leur entièreté. Linstallation de serveur sécurisée intercepte les transactions de carte de crédit envoyées par les applications frontales vers les applications dorsales, et transmet des jetons en remplacement des identifiants de carte de crédit en vue dun traitement par les applications dorsales. Cette installation de serveur sécurisé peut être appliquée pour le chiffrement, le stockage (données au repos), la transmission de données privées sur un réseau dautres données privées ou sensibles ne se limitant pas aux numéros de sécurité sociale, numéros de permis de conduire, numéros de téléphone, numéros de compte bancaire, etc.


Abrégé anglais

A secure server installation is provided that abstracts credit card identifiers from its server, network, application and database environments, thus reducing investment in securing, segregating and/or isolating these environments in their entirety. The secure server installation intercepts credit card transactions sent from front end applications to back end applications, and forwards tokens in replacement of credit card identifiers for processing by the back end applications. The same secure server installation can be applied for the encryption, storage (data-at-rest), transmission of private data within a network of other private or sensitive data not limited to social insurance numbers, drivers license numbers, phone numbers, bank account numbers, etc.

Revendications

Note : Les revendications sont présentées dans la langue officielle dans laquelle elles ont été soumises.


.cndot.
THE EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE PROPERTY OR
PRIVILEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. A method of privacy identifier remediation, comprising:
at a secure server installation connected via communication links to plural
front end
servers, for a transaction in which a front end server captures a privacy
identifier from a
customer, the privacy identifier comprising a credit card number, receiving
the privacy identifier
at the secure server installation from the front end server;
at the secure server installation, for the transaction, obtaining a token to
replace the
privacy identifier, the token being unique and meaningless in relation to the
corresponding
privacy identifier;
for the transaction, forwarding the token from the secure server installation
to a back end
server and processing the token as a proxy for the privacy identifier at the
back end server; and
for the transaction:
upon receiving a request at the secure server installation from the back end
server, the
request containing the token, the secure server installation sending a message
to a private
information validation company to request validation of the credit card number
corresponding to
the token;
receiving at the secure server installation confirmation data from the private
information
validation company; and
the secure server installation completing the transaction by sending
confirmation of the
transaction to the respective front end server.
2. The method of claim 1 further comprising:
encrypting the privacy identifier at the secure server installation to
generate an encrypted
privacy identifier with a keyed hash of the privacy identifier; and
associating the token with the encrypted privacy identifier.
3. The method of claim 2 in which:
encrypting the privacy identifier is carried out at a secure encryption
server; and
12

associating the token with the encrypted privacy identifier is carried out at
a token
management server.
4. A secure server installation configured using non-transient computer-
readable media,
having computer-executable instructions for performing the steps of any one of
method claims 1-
3.
13

Description

Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CA 02586248 2007-04-23
PRIVACY IDENTIFIER REMEDIATION
BACKGROUND
[0001] As credit card fraud and identify fraud becomes more prevalent, credit
card issuers
and personal information providers (government agencies, etc) are requiring
greater security
by companies that process transactions using credit cards or other personal
information. The
software applications used by these companies must meet strict standards for
credit card
processing required by credit card issuers and personal information. The
standards include
providing secure processing and storage of credit card information, and other
privacy
identifiers such as driver's license, banking or other financial data as for
example as may be
achieved by suitable encryption of credit card identifiers, identification
numbers or bank
account numbers. However, it is very difficult for companies with existing
credit card and
other identifiable information (driver's license, social security numbers,
banking information,
etc) to meet these requirements.
SUMMARY
[0002] A method and apparatus is provided for privacy identifier remediation
using a
secure server installation. The secure server installation abstracts privacy
identifiers from its
server, network, application and database environments, thus reducing
investment in securing,
segregating and/or isolating these environments in their entirety. The secure
server
installation intercepts transactions using privacy identifiers that are sent
from front end
applications to back end applications, and forwards tokens in replacement of
privacy
identifiers for processing by the back end applications. The secure server
component also acts
as a mediation gateway to connect to external agencies or processing systems.
In an
embodiment, the privacy identifiers comprise credit card numbers.
[0003] These and other aspects of the apparatus and method are set out in the
claims,
which are incorporated here by reference.
BRIEF DESCRIPTION OF THE FIGURES
[0004] Embodiments will now be described with reference to the figures, in
which like
1

CA 02586248 2007-04-23
reference characters denote like elements, by way of example, and in which:
Fig. 1 is schematic showing the processing components of an embodiment of a
secure server installation and its environment;
Fig. 2 is flow diagram illustrating method steps of a privacy identifier
remediation
process;
Fig. 3 is a flow diagram illustrating further method steps of a privacy
identifier
remediation process;
Fig. 4 shows details of the process of Fig. 2 applied to the specific example
of
credit cards; and
Fig. 5 shows details of the process of Fig. 3 applied to the specific example
of
credit cards.
DETAILED DESCRIPTION
[0005] In the claims, the word "comprising" is used in its inclusive sense and
does not
exclude other elements being present. The indefinite article "a" before a
claim feature does
not exclude more than one of the claim feature being present. Each one of the
individual
features described here may be used in one or more embodiments and is not, by
virtue only of
being described here, to be construed as essential to all embodiments as
defined by the claims.
[0006] In Fig. 1, secure server installation 10 is physically isolated in a
secure location and
logically connected via firewall 12 and router 14 to a variety of front end
servers 16, back end
systems 18, systems 20 and extemal processing systems. The front end servers
16 comprise
any server or device that captures one or more privacy identifiers such as
credit card data,
social insurance numbers, bank account numbers, driver's license numbers,
contract numbers
and phone numbers from a person such as a customer or consumer. The back end
systems 18
comprise for example application and database servers that process privacy
transactions, that
is, a transaction that involves a privacy identifier. The systems 20 comprise
privacy data
validation servers, and may include for example end systems and users that
need to connect to
the secure server installation 10 for purposes of maintenance & operations,
monitoring,
logging of privacy data for purposes of audits, financial reporting and
investigations. The
connection links between the elements shown in Fig. 1 represent logical
connections formed
2

CA 02586248 2007-04-23
upon request over any communications link including optical fiber, wireless
and wired
connections, and may include intervening networks of any suitable kind such as
portions of
the internet. SSL or equivalent or better communications security should be
used to secure
communications, and for that purpose the secure server installation 10 may be
connected via a
firewall 12 to the router 14 by an SSL device 15 such as an SSL accelerator,
as for example
an SSL accelerator from F5 Networks.
[0007] The secure server installation 10 comprises in the embodiment shown a
first server
22, referred to here for convenience as the Avalon server 22 (token management
server), a
second server 24, referred to here for convenience as the HSM server (hardware
security
module) and a third server 26, which acts as a database server. Other
configurations of fewer
or more servers could be used, and the entire functionality of the secure
server installation in
some embodiments could comprise a single server. The servers 22, 24 and 26 are
connected
together in this embodiment via multiple IP/Ethernet inter-connects in a bind
configuration
(for example an Ether-Channel) into a switch 28 such as a Cisco L2 or L3
switch. Database
server 26 in this embodiment connects to a storage system, for example a disk
array 27, via a
suitable switch 29, such as a Brocade FC switch. Other arrangements may be
used for
storage, such as flash memory, tape or optical disk.
[0008] In operation, the system of Fig. 1 operates as follows according to the
steps of Fig.
2 and 3. The process steps may be applied to any privacy identifier for
example a credit card
transaction, as for example when a customer seeks to purchase services using a
credit card.
As shown in Fig. 2, beginning with step 30, a front end server 16 captures a
privacy identifier
(PI) (as for example credit card data that may include a credit card
identifier (CCI) and, in
step 32, forwards the privacy identifier to the secure server installation 10.
At the secure
server installation, the privacy identifier is encrypted in step 34. In
addition, a token uniquely
associated with the privacy identifier is generated by an irreversible
function in step 36. The
token and encrypted privacy identifier and key hash of the privacy identifier
are stored in a
manner that they are associated with each other in step 38. The token is then
forwarded to a
back end server 18 in step 40 for further processing according to the nature
of the transaction
in step 42, where the token is processed as a proxy for the privacy
identifier.
3

CA 02586248 2007-04-23
[0009] As shown in Fig. 3, the transaction may in some embodiments proceed as
follows
for the purpose of validating the privacy transaction, as for example a credit
card validation
where credit card data, and in some embodiments other privacy data, is
validated. In step 44,
the back end servers 18 request privacy identifier validation by generating a
validation request
message, and sending the validation request message to a information
validation server 20
such as a credit card validation server. The validation request message
contains the token and
not the privacy identifier. At the secure server installation 10, the token is
removed from the
validation request message and replaced by the privacy identifier in step 46.
In step 48, the
validation request message is forwarded to an end system 20, such as a
information validation
server. Upon validation of the request, in step 50 a confirmation message is
returned to the
back end user 18 that requested validation. The privacy identifier (PI) is not
included in the
confirmation message to 18. If there is a privacy identifier (PI), it is
removed by secure server
installation 10.
[0010] As outlined below, in one exemplary embodiment applied to credit card
identifiers,
although similar operations may also be applied to other privacy identifiers,
the Avalon server
22 is configured to generate unique and meaningless tokens, to request a
search and match of
tokens for association of correct credit card identifiers and an
authentication code for the
credit card identifiers via database server 26, to extract credit card
identifiers and insert tokens
for internal backend system processing and to extract tokens and insert credit
card identifiers
for external communications processing for payment validation.
[0011] A token is substituted for a privacy identifier for all back end
transactions. The
token is unique to the privacy identifier and meaningless in relation to the
privacy identifier.
That is, the privacy identifier cannot be determined from the token. One
manner of
accomplishing generation of a meaningless token is to select a length of
characters by an
irreversible function such as generating the token in sequential order as
credit card identifiers
are processed by the Avalon server 22. The token may thus be obtained by
looking up an
ordered sequence of tokens, and selecting an unused token from the ordered
sequence. A
suitably long token should be adopted to cover variable length privacy
identifiers. The
4

CA 02586248 2007-04-23
characters may include any suitable characters, such as numerals and letters
but may include
other characters.
(0012] In one embodiment, all tokens have a one-to-one relationship with
privacy
identifiers such as credit card numbers and other privacy identifiers. Thus,
in the case where
the privacy identifier is a credit card number, no matter how many times a
customer issues a
credit purchase with the same credit card identifier, the transactions may
always use the same
token that was issued the first time the customer completes a transaction
using the secure
server installation 10. The same applies to other privacy identifiers. If an
individual provides
the same ID for any number of financial transactions, the token associated
with that ID will
always be the same one utilized during the processing of the transaction.
[00131 By selecting a suitably long token, for example in one embodiment a
numerical
entity 21 digits long, there will never be more tokens issued to any
particular individual than
the total possible number of unique credit card identifiers and other privacy
identifiers that an
individual possesses and uses in the system. For example, as an extreme
scenario, if an
individual uses 40 different credit card identifiers and provides 40 pieces of
different ID for
various financial transactions, this individual would require a total of 80
unique tokens from
the secure server installation 10. If we consider a total adult population of
500,000,000 (500
Million) for this scenario, the total number of tokens that the secure server
installation would
need to issue is 40,000,000,000 (40 Billion) tokens (80 x 500 Million). Thus,
a token of
length 21 digits will not be exhausted in practice. However, longer tokens
could be used.
[0014] Tokens in one embodiment are issued in a sequential format for every
request the
system receives. Each request received however is completely random with no
discernable
pattern or ability to anticipate the type of value associated with the token.
Token requests may
come in from a variety of front end servers 16 and the generated token
delivered to any of a
large number of back end servers 18. The token requests may be processed in
batches
amongst other individual requests coming into the back end servers 18. Token
requests may
be associated with different types of identifiers (credit card verses other
privacy identifiers),
different credit card suppliers, different privacy identifiers (such as
drivers license, bank
account, PIN, Student Card, Government Employee #, etc...) and may be issued
during any

CA 02586248 2007-04-23
time of the day. Accordingly, due to the randomness, types of requests and
data to be
tokenized being sent to the secure server installation 10, it is quite
impossible to define or
construct a usable pattern of token issuing.
[0015] Request for tokens are restricted to specific applications whose
authorization and
authentication is tracked each time those applications need to communicate
with the secure
server installation 10. Once communication and access have been granted to the
system, the
activity to request a token, encryption/decryption or hashing service may be
monitored,
tracked and written to a log file. Tracking software may also be applied to
the back end
servers 18 which need to connect to the secure server installation 10. Thus
there are multiple
areas where processes are in place to ensure the secure request and issuing of
tokens. The
same security measures apply to those teams which need to access secure server
installation
such as audit teams, reverse payment teams, system administrators and security
officers.
Thus only those systems and/or individuals with strict secure pre-defined
credentials are able
to request a credit card identifier for decryption by submitting a token. Each
role of the audit
teams, reverse payment teams, system administrators and security officers are
granted specific
levels of security without overlap of the other roles, further reducing risk.
[0016] Tokens are stored in the clear within the backend systems 18. If the
token is
sufficiently long, such as for example longer than any credit card or other
privacy identifier,
the token has no meaning that can be deduced from its length. In addition,
even if the token
was truncated, the specific fonnat of the digits' numbering scheme would not
meet the
validation process of a credit card identifier. By generating the token from
an irreversible
function such as a sequential number generator, the token is completely
independent of the
credit card or privacy identifier randomly submitted by a particular person or
business for the
secure server installation 10 to process. Further, there is no association
between the token and
credit card identifier except for the token being the prime search key to find
the encrypted
credit card identifier which enables the completion of the requested financial
transaction by a
particular backend system 18. Additionally, this process is a one-way stream
in which the
back end system 18 cannot and does not see the privacy identifier when a
transaction is
6

CA 02586248 2007-04-23
processed. The secure server installation 10 is the last step in the
communication stream
between the back end servers 18 and external privacy identifier processing
servers.
[0017] Referring to Fig. 4, further details of operation of a secure server
installation are
described in an exemplary embodiment applied to credit card transactions. The
same process
of token insertion and credit card identifier (CCI) encryption process may be
applied to other
privacy identifiers as for example bank account identifiers.
100181 Step 60 Front End Server 16 4 Avalon Server 22 (Token Request) A
process of
credit card remediation begins with generation of a token request by a front
end server 16
during a credit card processing request. The front end server 16 may be a web
tier application
that requires use of a credit card payment to complete a transaction. The
front end server 16
will need to communicate with a back end server 18 for the purpose of
completing the
transaction. The normal transaction process using a credit card is commenced,
but the front
end server 16 pauses the transaction process for the time required to send the
credit card
identifier to the secure server installation 10 for a token request/receipt.
Communication
stream between the front end server 16 and secure server installation 10 is
secured via SSL.
[0019] Step 62 Avalon Server 22 4 HSM Server 24 (Encryption Request) The
Avalon
server 22 at the secure server installation 10 receives credit card identifier
and sends it to the
HSM Server 24 for encryption and generation of the keyed hash of credit card
identifier, for
example by a KEYed Hash process.
[0020] Step 64 HSM (Encryption) The HSM server 24 encrypts the credit card
identifier
(using a strong encryption KEY #1 hash, as for example using a 1024 bit key)
and builds an
authentication code corresponding to the credit card identifier for look up
purposes. The
cryptography key for decryption is kept at the HSM server 24. An example of an
authentication code is a keyed hash based on the credit card identifier + a
256 bit KEY (using
Key #2) The strength of encryption KEY #1 and KEY #2 should be sufficiently
strong to
meet security standards applicable to the transaction process. An example
authentication code
is a keyed-hash message authentication code, or HMAC, calculated using a
cryptographic
hash function in combination with a secret key. As with any MAC, it may be
used to
7

CA 02586248 2007-04-23
simultaneously verify both the data integrity and the authenticity of a
message. Any suitably
strong iterative cryptographic hash function, such as MD5,SHA-1 or better, may
be used in
the calculation of an HMAC for this purpose. The cryptographic strength of the
HMAC
depends upon the cryptographic strength of the underlying hash function, on
the size and
quality of the key and the size of the hash output length in bits.
[0021] Step 66 HSM Server 24 Avalon Server 22 (Return CCI) The HSM server 24
returns the encrypted Credit card identifier and authentication code to the
Avalon server 22.
[0022] Step 68 Avalon Server 22 Database Server 26 (Existing Token?) In an
embodiment, before creating a token, the Avalon Server 22 sends the
authentication code and,
in some embodiments, an entity type to the database server 26 to search for an
existing token.
An entity type may be an additional security code based on a feature of the
transaction being
paused, as for example based on the credit card issuer (such as VISATM). Look
up in the
database server 26 is done via the authentication code and the entity type to
lower or avoid the
possibility of collisions (or token mismatch).
[0023] Step 70 Database Server 26 Avalon Server 22 (Existing token returned)
If a
match on authentication code and entity type is found, the database server 26
returns the token
matched.
[0024] Step 72 Database Server 26 Avalon Server 22 (No existing token) If no
match is
found, the database server 26 returns a 'null" response indicating to the
Avalon server 22 that
a new token must be created.
[0025] Step 74 Avalon server 22 (Create token). If no existing token is
returned from the
database server 26, the Avalon server 22 generates a new token as for example
a unique
sequential and meaningless number. The Avalon server 22 associates the token
with an
encrypted credit card identifier, the authentication code, and entity type,
and also any other
suitable identification information, such as a table name or key label, used
by the database.
[0026] Step 76 Avalon server 22 Database Server (Store Token). In this step,
the
Avalon server 22 sends the token, encrypted credit card identifier,
authentication code, entity
8

CA 02586248 2007-04-23
type and other suitable identification information to the database server 26
for processing and
storage. The database server 26 returns an acknowledge message when this
process is
complete.
[0027] Step 78 Avalon server 22 Back End Server 18 (Forward Token). Once an
acknowledge response from the database server 26 has been received, the Avalon
server 22
sends the token to the back end server 18, where the token is used by the back
end server 18
to carry out the transaction requested by the front end server 16 that
requested the transaction
and originally forwarded the credit card identifier that has now been
substituted by the token.
[0028] Referring to Fig. 5, steps 80-96 detail the payment confirmation
process.
[0029] Step 80 Back End Server 18 Secure server installation 10 (Verification
Request)
If credit card verification is required, the following steps may be taken.
Once the back end
server 18 has completed its processing, the back end server 18 sends its
financial transaction
data stream (which includes the unique token) to the secure server
installation 10 for credit
card identifier lookup and re-insertion. Communication stream between the two
entities is
secured via SSL.
[0030] Step 82 Avalon server 22 (Token/CCI Exchange Request) The Avalon server
22
receives the data stream from the back end server 18 and pauses the
transaction process for
the time required to extract unique token, look up credit card identifier in
the database 27 and
re-insert credit card identifier in the data stream.
[0031] Step 84 Avalon server 22 Database Server 26 (Find encrypted CCI).
Avalon
server 22 sends the token to the database server 26 for encrypted credit card
identifier look up.
[0032] Step 86 Database Server 26 Avalon server 22 (Return encrypted CCI) The
database server 26 receives unique token, searches for matching token and
associated
encrypted credit card identifier. The database server 26 sends the encrypted
credit card
identifier to the Avalon server 22.
[0033] Step 88 Avalon server 22 HSM Server 24 (Request CCI). The Avalon server
22
receives the encrypted credit card identifier with the cryptography key label
and sends it to the
9

CA 02586248 2007-04-23
HSM server 24 for decryption.
[0034] Step 90 HSM Server 24 Avalon server 22 (Decryption and CCI Insertion)
The
HSM server 24 receives encrypted credit card identifier, decrypts and sends
the decrypted
CCI to the Avalon server 22. The Avalon server 22 receives decrypted credit
card identifier
and inserts into transaction stream in place of token.
[0035] Step 92 Avalon server 22 Private Information Validation Company 20
(Payment
Completion Request, for example).The transaction stream from the back end
server 18 with
decrypted or real credit card identifier is sent to the Credit Card Validation
Company 20 for
payment process completion.
[0036] Step 94 Private Information Validation Company 20 Avalon server 22
(Payment
Completion). The Private Information Validation Company 20 returns payment
confirmation
details to Avalon server 22. If the Private Information Validation Company 20
returns the
private information identifier as part of its confirmation data to Avalon
server 22, the private
information identifier is stripped out prior to re-directing the completed
transaction stream
back to the back end server 18.
[0037] Step 96 Server 18 Front End Server 16 (Complete Transaction). The
completed
transaction with associated confirmation data is sent to the originating front
end server 16.
The transaction terminates where it originated from. A user could be a
connected user to
server 16 (a web browser for example).
[0038] The Avalon server 22 is configured for example using suitable software
to generate
unique & meaningless sequential numbers for variable field length credit card
identifiers and
privacy identifier fields. The tokens should thus have a sufficient number of
digits to cover
various length identifiers. While one type of encryption KEY may be used for
the credit card
identifier, other encryption keys may be used for other fields, such as
privacy identifier fields,
that require encryption. The Avalon server 22 may in some embodiments track,
monitor, log
and audit all activity relating to credit card processing done by the secure
server installation
10. If separate servers 22, 24 and 26 are used, they should be clustered for
reliability.

CA 02586248 2007-04-23
[0039] The HSM server 24 should be permitted to communicate only with the
Avalon
server 22 by suitable identification measures. In some embodiments, for
strictest security, no
device other than the Avalon server 22 should be able to issue requests to the
HSM server 24.
Some systems 20 may be permitted access to the Avalon server 22 for purposes
of
maintenance, operations, audits and investigations.
100401 The HSM Server 26 provides encryption, decryption, authentication code,
keyed
hash generation and key management for the secure server installation 10.
(0041] Immaterial modifications may be made to the embodiments described here
without
departing from what is covered by the claims.
11

Dessin représentatif
Une figure unique qui représente un dessin illustrant l'invention.
États administratifs

2024-08-01 : Dans le cadre de la transition vers les Brevets de nouvelle génération (BNG), la base de données sur les brevets canadiens (BDBC) contient désormais un Historique d'événement plus détaillé, qui reproduit le Journal des événements de notre nouvelle solution interne.

Veuillez noter que les événements débutant par « Inactive : » se réfèrent à des événements qui ne sont plus utilisés dans notre nouvelle solution interne.

Pour une meilleure compréhension de l'état de la demande ou brevet qui figure sur cette page, la rubrique Mise en garde , et les descriptions de Brevet , Historique d'événement , Taxes périodiques et Historique des paiements devraient être consultées.

Historique d'événement

Description Date
Inactive : Certificat d'inscription (Transfert) 2024-03-08
Inactive : Lettre officielle 2024-02-29
Inactive : Transferts multiples 2024-01-03
Inactive : Certificat d'inscription (Transfert) 2023-07-17
Inactive : Transferts multiples 2023-06-16
Inactive : CIB expirée 2022-01-01
Exigences relatives à la révocation de la nomination d'un agent - jugée conforme 2020-04-22
Exigences relatives à la nomination d'un agent - jugée conforme 2020-04-22
Inactive : COVID 19 - Délai prolongé 2020-03-29
Représentant commun nommé 2019-10-30
Représentant commun nommé 2019-10-30
Lettre envoyée 2017-11-01
Inactive : Transferts multiples 2017-10-25
Accordé par délivrance 2015-09-01
Inactive : Page couverture publiée 2015-08-31
Préoctroi 2015-05-20
Inactive : Taxe finale reçue 2015-05-20
Inactive : Inventeur supprimé 2015-01-02
Inactive : Lettre officielle 2015-01-02
Demande de correction du demandeur reçue 2014-12-15
Lettre envoyée 2014-11-28
Un avis d'acceptation est envoyé 2014-11-28
Un avis d'acceptation est envoyé 2014-11-28
Inactive : Q2 réussi 2014-10-15
Inactive : Approuvée aux fins d'acceptation (AFA) 2014-10-15
Modification reçue - modification volontaire 2014-07-21
Inactive : Dem. de l'examinateur par.30(2) Règles 2014-01-28
Inactive : Rapport - Aucun CQ 2014-01-23
Modification reçue - modification volontaire 2013-10-31
Lettre envoyée 2012-04-26
Toutes les exigences pour l'examen - jugée conforme 2012-04-20
Exigences pour une requête d'examen - jugée conforme 2012-04-20
Requête d'examen reçue 2012-04-20
Demande publiée (accessible au public) 2008-10-23
Inactive : Page couverture publiée 2008-10-22
Inactive : CIB attribuée 2007-07-11
Inactive : CIB en 1re position 2007-07-11
Inactive : CIB attribuée 2007-07-11
Inactive : Certificat de dépôt - Sans RE (Anglais) 2007-05-23
Exigences de dépôt - jugé conforme 2007-05-23
Lettre envoyée 2007-05-23
Demande reçue - nationale ordinaire 2007-05-23

Historique d'abandonnement

Il n'y a pas d'historique d'abandonnement

Taxes périodiques

Le dernier paiement a été reçu le 2015-04-15

Avis : Si le paiement en totalité n'a pas été reçu au plus tard à la date indiquée, une taxe supplémentaire peut être imposée, soit une des taxes suivantes :

  • taxe de rétablissement ;
  • taxe pour paiement en souffrance ; ou
  • taxe additionnelle pour le renversement d'une péremption réputée.

Les taxes sur les brevets sont ajustées au 1er janvier de chaque année. Les montants ci-dessus sont les montants actuels s'ils sont reçus au plus tard le 31 décembre de l'année en cours.
Veuillez vous référer à la page web des taxes sur les brevets de l'OPIC pour voir tous les montants actuels des taxes.

Titulaires au dossier

Les titulaires actuels et antérieures au dossier sont affichés en ordre alphabétique.

Titulaires actuels au dossier
TELUS CORPORATION
Titulaires antérieures au dossier
CHRISTOPHER K. RENTER
DENIS A. NILES
Les propriétaires antérieurs qui ne figurent pas dans la liste des « Propriétaires au dossier » apparaîtront dans d'autres documents au dossier.
Documents

Pour visionner les fichiers sélectionnés, entrer le code reCAPTCHA :



Pour visualiser une image, cliquer sur un lien dans la colonne description du document. Pour télécharger l'image (les images), cliquer l'une ou plusieurs cases à cocher dans la première colonne et ensuite cliquer sur le bouton "Télécharger sélection en format PDF (archive Zip)" ou le bouton "Télécharger sélection (en un fichier PDF fusionné)".

Liste des documents de brevet publiés et non publiés sur la BDBC .

Si vous avez des difficultés à accéder au contenu, veuillez communiquer avec le Centre de services à la clientèle au 1-866-997-1936, ou envoyer un courriel au Centre de service à la clientèle de l'OPIC.


Description du
Document 
Date
(aaaa-mm-jj) 
Nombre de pages   Taille de l'image (Ko) 
Revendications 2013-10-30 2 48
Revendications 2007-04-22 6 218
Description 2007-04-22 11 557
Dessins 2007-04-22 5 72
Abrégé 2007-04-22 1 20
Dessin représentatif 2008-09-24 1 9
Dessin représentatif 2015-07-27 1 8
Paiement de taxe périodique 2024-02-06 1 26
Courtoisie - Lettre du bureau 2024-02-28 2 197
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2007-05-22 1 107
Certificat de dépôt (anglais) 2007-05-22 1 159
Rappel de taxe de maintien due 2008-12-23 1 113
Rappel - requête d'examen 2011-12-27 1 118
Accusé de réception de la requête d'examen 2012-04-25 1 177
Avis du commissaire - Demande jugée acceptable 2014-11-27 1 161
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2017-10-31 1 107
Courtoisie - Certificat d'inscription (transfert) 2023-07-16 1 400
Courtoisie - Certificat d'inscription (transfert) 2024-03-07 1 402
Taxes 2013-01-31 1 155
Correspondance 2007-05-22 1 60
Correspondance 2007-05-22 1 23
Correspondance 2008-12-23 1 38
Taxes 2009-04-21 1 34
Taxes 2010-04-19 1 28
Taxes 2011-04-05 1 201
Correspondance 2011-12-27 1 24
Taxes 2012-04-19 1 30
Correspondance 2012-04-25 1 78
Taxes 2014-02-25 1 23
Correspondance 2014-12-14 2 54
Correspondance 2015-01-01 1 18
Taxes 2015-04-14 1 24
Correspondance 2015-05-19 1 24
Taxes 2016-02-11 1 25
Paiement de taxe périodique 2017-02-16 1 25
Paiement de taxe périodique 2018-02-22 1 25
Paiement de taxe périodique 2019-02-12 1 25
Paiement de taxe périodique 2020-04-08 1 25
Paiement de taxe périodique 2021-04-19 1 25
Paiement de taxe périodique 2022-03-29 1 25
Paiement de taxe périodique 2023-03-07 1 26