Abstract: The invention relates to a bottle (1) for containing a drink such as an alcoholic drink. Said bottle comprises a body (10) a top end of which comprises a neck (12). The neck of the bottle ends in an aperture and receives a cork (14). The bottle (1) is provided with a security closure. Said security closure comprises: a security label (15) a first portion (15a) of which is glued to the cork (14) and a second portion (15b) of which is glued onto the neck (12) of the bottle and a cap (13) that at least partially covers the cork (14) and that covers the neck (12) of the bottle at least in part. Said cap also covers the security label (15) at least in part. The security label (15) also comprises: a bottom portion (15d) that extends beyond a bottom edge (13c) of the cap (13) and carries a first code (15e) for example an optical read code the first code (15e) representing a unique identifier of the bottle (1) and a top portion (15f 15h) that is covered by the cap (13) is glued to the cork (14) and carries a second code (15g) for example an optical read code the second code representing a unique identifier of the cork (14).
The present invention relates to the field of containers for beverages, especially a bottle for holding a drink, including alcoholic beverage.
The costs of production and marketing of alcoholic beverages of high-end, such as spirits, result in high prices. These high prices generate as often for luxury goods, fraud and acts of infringement. Thus, we regularly observe the appearance on the market of counterfeit bottles, that is to say having the appearance of an authentic bottle, but filled with a bad drink, much lower than the quality of the product original. This counterfeiting phenomenon is particularly important for high-end spirits, like cognac.
For economic reasons, safety and brand image, the producers concerned energetically struggle against these acts of fraud and counterfeiting. This control results in particular in the manufacture of bottles having anti-counterfeiting devices increasingly advanced, aiming to prevent the accurate reproduction of a bottle and / or reuse. Many solutions have been proposed for this purpose. These solutions generally involve the use of secure caps whose manufacture is costly and complex.
The present invention aims to propose a device for anti-counterfeiting bottle that has an optimum level of security, and which is simple and inexpensive to implement. Another object of the invention is to present information to the consumer before opening the bottle, especially in order to allow the bottle to authenticate the consumer.
To this end, the invention relates to a bottle for containing a beverage such as a liquor, said bottle having a body whose upper end has a neck, the bottle neck terminating in a mouthpiece and receiving a plug , the bottle being provided with a safety closure, said safety closure comprising:
- a security tag having a first portion is adhered to the cap and a second portion is adhered to the neck of the bottle, and
- a cap covering at least partially the cap and at least a portion of the neck of the bottle, said cap also covering at least a portion of the security tag,
the security label further comprising
- a lower portion protruding from a lower edge of the cap, and carrying a first code, for example an optically readable code, the first code being representative of a unique identifier of the bottle; and
- an upper portion, covered by the cap, stuck to the cap, and carrying a second code, for example an optically readable code, the second code being representative of a unique identifier of the cap.
Thus by providing a security tag disposed within the cap of the bottle, the security tag is protected and the access thereto requires unsealing of the capsule. In an advantageous embodiment of the invention, the cover is adhered to the bottle, which constitutes extra protection. In addition, the invention has the advantage of adapting to all types of bottles and caps, without requiring modifications. In one advantageous embodiment of the invention, the presence of the first and second codes to authenticate a bottle for sure, and also to ensure that its contents could be changed or exchanged fraudulently. Indeed, when these codes correspond to a unique identifier of the bottle and a unique identifier of the plug, these two codes can be combined in an update database by the manufacturer of the drink. Verification by the consumer, correspondence between the first and second codes to authenticate the affected bottle. The provision of the second code, hidden under the cover and therefore invisible before tearing of the cap prior to the first opening of the bottle, can increase the security of the closure and limit the possibility of fraud. In addition, when the second code is representative of a unique identifier of the stopper is avoided reconstitution fraudulent recovery bottles with caps.
In one embodiment, the upper portion is adhered to an upper surface of the cap.
In one embodiment, the upper portion is adhered to a side surface of the cap.
In one embodiment, at least a portion of the security tag is permanently altered when separation, for example by a color change.
In one embodiment, the cap is a metal cap adhered to the neck of the bottle, preferably by means of a security adhesive.
In one embodiment, the cover is shrink sleeve, in particular a sleeve of heat-shrink plastics material.
In one embodiment, the shrinkable sleeve is adhered to the neck of the bottle, preferably by means of a security adhesive.
In one embodiment, the security tag comprises, near the mouth of a pre-breaking zone, such as a precut line.
In one embodiment, a marking is engraved at the interface between the cap and the neck of the bottle, so that a portion of said marking is engraved in the cap, the other part being engraved into the bottle.
In one embodiment, the marking is engraved using a laser.
In one embodiment, the first code remains readable even after detachment of the lower portion of the security tag.
In one embodiment, the second code remains readable even after peeling of the top portion of the security tag.
In one embodiment, the first and / or second code (s) is (are) an optically readable two-dimensional code, such as a QR code or type of a Datamatrix code type.
In one embodiment, the security tag includes a radio frequency identification system.
In one embodiment, the radio frequency identification system comprises an electronic chip and an antenna, the antenna being disposed such that the first stopper of the opening causes the rupture of the antenna.
The invention also relates to a bottle the authenticity of a verification system containing a beverage, said bottle being as defined above, the system comprising a server including a database, the database comprising data the cylinders manufactured, these data including, for each bottle, a unique identifier of the bottle and a unique identifier of the plug associated with the bottle.
In one embodiment, the database included in the server may be accessed remotely, for example from a mobile device such as a mobile phone, the server being configured to transmit data relating to a cylinder in response to a request containing the first code corresponding to said bottle.
In one embodiment, the server is configured to transmit data for confirming the authenticity of a bottle, in response to a request including the first and second codes of said bottle.
The invention object of this application will be better understood from reading the following detailed description, with reference to the accompanying drawings, in which:
- Figure 1 shows a bottle according to the invention;
- Figures 2a and 2b are partial views of the bottle of Figure 1 after removal of the upper part of the cap, and before the first opening of the cap;
- Figure 3 is a view similar to that of Figure 2a, but after a first opening of the cap;
- Figure 4 is a partial view of a variant of the bottle of Figure 2a.
1 shows a bottle 1 in accordance with the invention. The bottle 1, in the example a glass bottle, is adapted to receive all types of drinks, especially alcoholic beverages such as wine or spirits. It is represented in Figure 1 as put on the market, that is to say before opening by a consumer.
Conventionally, the bottle 1 comprises a body 10, having a lower part ends with a bottom 11, and an upper portion which terminates in a neck 12. The neck 12 comprises an upper opening closed by a plug 14, the entire neck and closure being covered by a cap, in the example a metallic capsule 13. The capsule 13 has a lower portion 13a and an upper portion 13b. The upper portion 13b of the cap 13 shall, during the first use, be separated from the bottle for access to the stopper. This separation is generally carried out by tearing, and the capsule 13 may comprise for this purpose a device to facilitate tearing, such as a tear strip.
According to the invention, the bottle of Figure 1 comprises a safety closure, in particular providing the tamper evidence function. The security closure according to the invention comprises in particular a security tag, for detecting whether the bottle has already been opened once. In Figure 1, which shows the cylinder 1 prior to loosening of the cap 13, only a lower portion of the security tag, projecting from the lower edge of the capsule 13, is visible.
The security tag is best seen in Figures 2a, 2b, and 3, which show a partial view of the bottle of Figure 1, the upper portion 13a of the capsule 13 having been removed. It is thus seen in Figures 2a and 2b the cap 14 which has a top surface 14a and side surface 14b. Figures 2a and 2b, the cap 14 has not been removed. These two figures thus show a security tag 15 in the example in the form of a ribbon. The security label 15 comprises a first portion 15a attached to the plug 14 and a second part 15b attached to the neck 12 of the bottle. Attaching the security tag 15 is carried out by bonding, the latter being preferably self-adhesive. Between the first portion 15a and second portion 15b, the security tag 15 comprises a pre-breaking zone 15c, constituted for example by a precut line. Thus, the pre-breaking zone 15c has a greater vulnerability to the rest of the security tag and ensures that the security label 15 is easily divisible into place.
As can be seen in Figure 3, which shows the bottle of Figure 1 after a first opening of the cap 14, the first opening of the cap 14 leads to breakage of the security tag 15, specifically at the area 15c break. This break is thus a visual indication that the plug 14 has been removed once, so that the bottle 1 has already been opened.
So that the security tag 15 is fully secured, it is non-reusable type, particularly in order to prevent that the label can be transferred intact to another cylinder than the original. Thus, any attempt to remove lead to altering the label, for example by Disaggregating of it. In the example, at least a portion of the security tag is to this effect destructible and / or permanently changed, for example by delamination. This will provide at least a portion of the security tag is permanently altered when separation, for example by a color change. This change will be visible in case subsequent gluing, even if the label is glued on the same bottle, to its original position. When gluing on other media, the change will of course remain visible, thus visually warn that the label was transferred after making the bottle. Advantageously, the label will include and modifiable portions on either side of the pre-breaking zone 15c. Thus, the security label 15 will detect attempts to access the plug
14 by detachment of the security tag 15, either by separation of the first portion 15a adhesively secured to the cap 14, or by detachment of the second portion 15b of the security tag 15, adhesively secured to the neck 12 of the bottle.
In order to strengthen the security of the security tag 15, the capsule 13 is in accordance with the invention disposed over the security tag 15. It is preferred that the capsule 13, particularly when metal or adhered to the bottle, in particular by means of a security adhesive. Safety seals prevent it being possible to remove the cap 13 without compromising its integrity. Advantageously, the safety adhesive is prepared in the form of one or more rings along the circumference of the bottle neck. In this case, a portion of the safety adhesive is disposed on the security tag, thereby binding a portion of the capsule to the security tag.
Instead of a metal cap, may be provided a sleeve of heat-shrink plastics material. This heat-shrinkable sleeve may also be adhered to the bottle by means of a security adhesive, analogously to that described above.
We have seen that the fact that the security label is covered and therefore protected by the cap 13, has great advantages. However, to further strengthen the protection of the bottle against fraud, it is advantageous that a part of the security label 15 is visible even without opening the capsule 13. In the example, the security tag 15 exceeds the lower edge 13c of the capsule and is thus visible. The second portion 15b of the security tag 15 terminates at its lower end by a lower portion 15d. In the example, the lower portion 15d form an enlarged area relative to the remainder of the security tag 15. The lower portion 15d can thus be used to display a first optical reading code 15 (such as a QR code, a Datamatrix code type, or a bar code) and / or an alphanumeric code readable by a consumer. The lower portion 15d protruding from the lower edge 13c of the capsule, the first 15 code will be visible in all circumstances, and in particular without the need to remove the cap. The first code 15 may advantageously be representative of a unique identifier of the bottle. Thus, this code can be read by a consumer, including before buying the bottle. The first 15 code can be read conveniently by a portable device (typically a mobile phone), and thus be automatically verified by connecting to a remote server, the server includes a database in which data is made available by the manufacturer of the drink.
The information in the database returned by the server may include the following: the product brand, type, bottling date, etc. This information can then be compared by the consumer with those on the bottle label. This in situ audit provides an additional degree of security.
Advantageously, the lower portion 15d is, like the rest of the security tag 15, alterable and / or modified permanently (e.g. delamination) upon peeling. However, unlike the rest of the security tag 15, the lower portion 15d will be configured so that in case of separation and alteration and / final amendment, including delamination, the first 15 code readable.
As shown in Figure 2b, the first portion 15a of the security tag 15 carries a second code 15g, disposed so that it remains invisible until removal of the cap 13. The first portion 15a of the label security 15 may for this purpose comprise at its upper end an upper portion 15f extending at the upper surface 14a of the plug 14 and being adhered to the upper surface 14a. This upper door portion 15f in the example of figure 2b the second 15g code optical reader (such as a QR code type or type Datamatrix, or a barcode), or alphanumeric type (readable directly by the consumer ) or graphic pattern category. Similarly to the lower portion 15d, the upper portion is alterable and / or permanently modified (for example by delamination) upon peeling, so that, if necessary, the optically readable code is readable 15g. The second code 15g is advantageously representative of a unique identifier of the cap. The second code being arranged at the surface of the cap, it remains concealed and invisible as long as the upper part of the capsule has not been removed. This hidden code representative of a unique identifier of the cap constitutes an additional degree of security.
In a variant shown in Figure 4, the second code 15g may be disposed on a top portion 15h of the security tag 15 which corresponds to the facing portion of the side surface 14b of the cap 14. This configuration has the particular advantage of ensuring that the code is not visible from the cap 13 when it does not fully covers the upper surface 14a of the cap 14 (e.g. in the case where the cap 13 is a heat-shrinkable sleeve).
The security tag 15 having the first and second codes 15e, 15g, one located on the lower portion 15d and the other located on the upper portion 15f, the two codes 15, 15g are advantageously associated in the database mentioned above. The combination of two codes can be used to verify the authenticity of the relevant bottle. Indeed, the consumer, who will have been able to verify the authenticity of the bottle for transmission to the server of the first code (representing a unique identifier of the bottle), will be able, after removal of the capsule, transmit in the second code server (representative of a unique identifier of the cap). After checking the correspondence between the first and second codes stored in the database (and thus the correspondence between the bottle and cap), the server may return a message confirming the authenticity of the bottle, and, consequently, that its contents could be changed or exchanged.
In addition to or instead of one or more optically readable codes mentioned above, one can provide for the security tag 15 includes a system of identification by radio frequency RFID type ( "Radio Frequency Identification"). The information stored in the identification system will include a unique identifier of the bottle. The radio frequencies by identification system will include an electronic chip and an antenna. Advantageously, it may be provided that the antenna is arranged along the security tag 15, such that the first opening of bottle cap causes the rupture of the antenna. Thus, the first opening of the cap will not reading the microchip, the impossibility of reading learning about the fact that the bottle has already been opened.
To further enhance the level of security offered by the bottle of Figure 1, it may be provided a common marking of the bottle and the cap, for example by means of a laser engraving. As visible in Figures 2a, 2b and 3, marking, constituted in the example by a pattern 16 is formed so that a part of the marking is engraved into the capsule 13, near its lower edge 13c, the the other part of the marking is engraved into the neck 12 of the bottle 1. the size and the fineness of the marking will be advantageously chosen so that removing and repositioning the capsule 13 so that both parts of the marking will coincide extremely complex or impossible . The common marking may consist of a pattern (as shown in the figures) or a sequence of alphanumeric characters, or a combination of both.
CLAIMS
1. Bottle (1) for containing a beverage such as a liquor, said bottle comprising a body (10) having an upper end has a neck (12), the bottle neck terminating in a mouthpiece and receiving a plug (14), the bottle (1) being provided with a safety closure, said safety closure comprising:
- a security tag (15) having a first portion (15a) is adhered to the plug (14) and a second portion (15b) is affixed to the neck (12) of the bottle, and
- a cap (13) covering at least partially the plug (14) and at least part of the neck (12) of the bottle, said cap also covering at least a portion of the security tag (15),
the security tag (15) further comprising
- a lower portion (15d) protruding from a lower edge (13c) of the cap (13) and carrying a first code (15), for example an optically readable code, the first code (15) being representative of a unique identifier of the bottle (1); and
- an upper portion (15f, 15h), covered by the cap (13) adhered to the plug (14), and carrying a second code (15g), for example an optically readable code, the second code being representative of a unique identifier of the plug (14).
2. Bottle (1) according to claim 1, wherein the upper portion (15f) is adhered to an upper surface (14a) of the stopper (14).
3. Bottle (1) according to claim 1, wherein the top portion (15h) is adhered to a side surface (14b) of the plug (14).
4. Bottle (1) according to one of claims 1 to 3, wherein at least a portion of the security tag (15) is permanently altered when separation, for example by a color change.
5. Bottle (1) according to one of claims 1 to 4, wherein the cap (13) is a metallic cap bonded to the bottle neck, preferably with a security adhesive.
6. Bottle (1) according to one of claims 1 to 4, wherein the cap (13) is shrinkable sleeve, especially a sleeve of heat-shrink plastics material.
7. Bottle (1) according to the preceding claim, wherein the shrinkable sleeve is adhered to the neck of the bottle, preferably by means of a security adhesive.
8. Bottle (1) according to one of the preceding claims, wherein the security tag (15) has near the mouth a pre-breaking zone (15c), such as a precut line.
9. Bottle (1) according to one of the preceding claims, wherein a marking (16) is etched to the interface between the cap (13) and the neck (12) of the bottle, so that a portion said marking is engraved in the cap (13), the other part being engraved into the bottle (1).
10. Bottle (1) according to the preceding claim, wherein the marking (16) is etched by means of a laser.
11. Bottle (1) according to one of the preceding claims, wherein the first code (15) remains legible even after detachment of the lower portion of the security tag (15).
12. Bottle (1) according to one of the preceding claims, wherein the second code (15g) remains readable even after peeling of the top portion (15f, 15h) of the security tag (15).
13. Bottle (1) according to one of the preceding claims, wherein the first and / or the second code (s) (15e, 15g) is (are) an optically readable two-dimensional code, for example a code of type QR or Datamatrix code type.
14. Bottle (1) according to one of the preceding claims, wherein the security tag (15) comprises a radio frequency identification system.
15. Bottle (1) according to the preceding claim, wherein the radio frequency identification system comprises an electronic chip and an antenna, the antenna being disposed such that the first opening of the cap (14) causes the breakdown of the 'antenna.
16. A verification system of the authenticity of a bottle (1) containing a beverage, said bottle (1) being according to any one of the preceding claims, the system comprising a server including a database, the database having cylinders manufactured related data, these data including, for each bottle, a unique identifier of the bottle and a unique identifier of the plug associated with the bottle.
17. System according to the preceding claim, wherein the database included in the server may be accessed remotely, for example from a mobile device such as a mobile phone, the server being configured to transmit data relating to a bottle response to a request containing the first code (15) corresponding to said bottle.
18. System according to the preceding claim, wherein the server is configured to transmit data for confirming the authenticity of a bottle, in response to a request including the first and second codes (15e, 15g) of said bottle.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 201717043707-IntimationOfGrant14-12-2023.pdf | 2023-12-14 |
| 1 | 201717043707-STATEMENT OF UNDERTAKING (FORM 3) [06-12-2017(online)].pdf | 2017-12-06 |
| 2 | 201717043707-PatentCertificate14-12-2023.pdf | 2023-12-14 |
| 2 | 201717043707-POWER OF AUTHORITY [06-12-2017(online)].pdf | 2017-12-06 |
| 3 | 201717043707-PETITION UNDER RULE 137 [30-10-2023(online)].pdf | 2023-10-30 |
| 3 | 201717043707-FORM 1 [06-12-2017(online)].pdf | 2017-12-06 |
| 4 | 201717043707-Written submissions and relevant documents [30-10-2023(online)].pdf | 2023-10-30 |
| 4 | 201717043707-DRAWINGS [06-12-2017(online)].pdf | 2017-12-06 |
| 5 | 201717043707-DECLARATION OF INVENTORSHIP (FORM 5) [06-12-2017(online)].pdf | 2017-12-06 |
| 5 | 201717043707-Correspondence to notify the Controller [13-10-2023(online)].pdf | 2023-10-13 |
| 6 | 201717043707-US(14)-ExtendedHearingNotice-(HearingDate-17-10-2023).pdf | 2023-10-12 |
| 6 | 201717043707-COMPLETE SPECIFICATION [06-12-2017(online)].pdf | 2017-12-06 |
| 7 | 201717043707-Power of Attorney-131217.pdf | 2017-12-19 |
| 7 | 201717043707-Correspondence to notify the Controller [11-10-2023(online)].pdf | 2023-10-11 |
| 8 | 201717043707-FORM 3 [26-09-2023(online)].pdf | 2023-09-26 |
| 8 | 201717043707-Correspondence-131217.pdf | 2017-12-19 |
| 9 | 201717043707-Proof of Right (MANDATORY) [03-01-2018(online)].pdf | 2018-01-03 |
| 9 | 201717043707-US(14)-ExtendedHearingNotice-(HearingDate-13-10-2023).pdf | 2023-09-06 |
| 10 | 201717043707-OTHERS-040118.pdf | 2018-01-09 |
| 10 | 201717043707-REQUEST FOR ADJOURNMENT OF HEARING UNDER RULE 129A [01-09-2023(online)].pdf | 2023-09-01 |
| 11 | 201717043707-Correspondence-040118.pdf | 2018-01-09 |
| 11 | 201717043707-US(14)-HearingNotice-(HearingDate-06-09-2023).pdf | 2023-08-10 |
| 12 | 201717043707-FER.pdf | 2021-10-18 |
| 12 | abstract.jpg | 2018-01-29 |
| 13 | 201717043707-certified copy of translation [26-02-2021(online)].pdf | 2021-02-26 |
| 13 | 201717043707-FORM 18 [03-05-2019(online)].pdf | 2019-05-03 |
| 14 | 201717043707-CLAIMS [26-02-2021(online)].pdf | 2021-02-26 |
| 14 | 201717043707-PETITION UNDER RULE 137 [26-02-2021(online)].pdf | 2021-02-26 |
| 15 | 201717043707-COMPLETE SPECIFICATION [26-02-2021(online)].pdf | 2021-02-26 |
| 15 | 201717043707-Information under section 8(2) [26-02-2021(online)].pdf | 2021-02-26 |
| 16 | 201717043707-FER_SER_REPLY [26-02-2021(online)].pdf | 2021-02-26 |
| 16 | 201717043707-FORM 3 [26-02-2021(online)].pdf | 2021-02-26 |
| 17 | 201717043707-FORM 3 [26-02-2021(online)].pdf | 2021-02-26 |
| 17 | 201717043707-FER_SER_REPLY [26-02-2021(online)].pdf | 2021-02-26 |
| 18 | 201717043707-COMPLETE SPECIFICATION [26-02-2021(online)].pdf | 2021-02-26 |
| 18 | 201717043707-Information under section 8(2) [26-02-2021(online)].pdf | 2021-02-26 |
| 19 | 201717043707-CLAIMS [26-02-2021(online)].pdf | 2021-02-26 |
| 19 | 201717043707-PETITION UNDER RULE 137 [26-02-2021(online)].pdf | 2021-02-26 |
| 20 | 201717043707-certified copy of translation [26-02-2021(online)].pdf | 2021-02-26 |
| 20 | 201717043707-FORM 18 [03-05-2019(online)].pdf | 2019-05-03 |
| 21 | 201717043707-FER.pdf | 2021-10-18 |
| 21 | abstract.jpg | 2018-01-29 |
| 22 | 201717043707-Correspondence-040118.pdf | 2018-01-09 |
| 22 | 201717043707-US(14)-HearingNotice-(HearingDate-06-09-2023).pdf | 2023-08-10 |
| 23 | 201717043707-OTHERS-040118.pdf | 2018-01-09 |
| 23 | 201717043707-REQUEST FOR ADJOURNMENT OF HEARING UNDER RULE 129A [01-09-2023(online)].pdf | 2023-09-01 |
| 24 | 201717043707-US(14)-ExtendedHearingNotice-(HearingDate-13-10-2023).pdf | 2023-09-06 |
| 24 | 201717043707-Proof of Right (MANDATORY) [03-01-2018(online)].pdf | 2018-01-03 |
| 25 | 201717043707-FORM 3 [26-09-2023(online)].pdf | 2023-09-26 |
| 25 | 201717043707-Correspondence-131217.pdf | 2017-12-19 |
| 26 | 201717043707-Power of Attorney-131217.pdf | 2017-12-19 |
| 26 | 201717043707-Correspondence to notify the Controller [11-10-2023(online)].pdf | 2023-10-11 |
| 27 | 201717043707-US(14)-ExtendedHearingNotice-(HearingDate-17-10-2023).pdf | 2023-10-12 |
| 27 | 201717043707-COMPLETE SPECIFICATION [06-12-2017(online)].pdf | 2017-12-06 |
| 28 | 201717043707-DECLARATION OF INVENTORSHIP (FORM 5) [06-12-2017(online)].pdf | 2017-12-06 |
| 28 | 201717043707-Correspondence to notify the Controller [13-10-2023(online)].pdf | 2023-10-13 |
| 29 | 201717043707-Written submissions and relevant documents [30-10-2023(online)].pdf | 2023-10-30 |
| 29 | 201717043707-DRAWINGS [06-12-2017(online)].pdf | 2017-12-06 |
| 30 | 201717043707-PETITION UNDER RULE 137 [30-10-2023(online)].pdf | 2023-10-30 |
| 30 | 201717043707-FORM 1 [06-12-2017(online)].pdf | 2017-12-06 |
| 31 | 201717043707-PatentCertificate14-12-2023.pdf | 2023-12-14 |
| 31 | 201717043707-POWER OF AUTHORITY [06-12-2017(online)].pdf | 2017-12-06 |
| 32 | 201717043707-IntimationOfGrant14-12-2023.pdf | 2023-12-14 |
| 32 | 201717043707-STATEMENT OF UNDERTAKING (FORM 3) [06-12-2017(online)].pdf | 2017-12-06 |
| 1 | SearchStrategyE_19-03-2020.pdf |