Abstract: A system for enabling verification of credentials of candidates is provided. The system (100) includes a user database (102) and a logic controller (104). The user database (102) includes unique identification code of the candidates. The logic controller (104) links an examination code, if assigned to one or more of the candidates, to their respective unique identification code. Reference figure: FIG. 1
DESC:BACKGROUND
[001] Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.
[002] The subject matter relates to enabling verification of credentials of candidates.
[003] Conventional methodologies of registering for examinations are tedious. A candidate registering for an examination may have to physically visit a registering authority to submit details and provide information that may enable an examination conducting authority to verify whether the candidate registering for the exam and the person appearing for the examination are the same. Further, conventional methodologies may fail to link a candidate’s performance in various examinations he may have appeared, which may have been conducted by different examination conducting authorities. Hence, an entity who wishes to check the credentials of a candidate may have to either rely on the information (marks sheets) submitted by the candidate or may have to consult various authorities or third parties to verify the authenticity of the information submitted by the candidate.
[004] Further, despite the examination conducting authorities collecting information such as photographs and signatures from candidates appearing for exams, impersonation is still prevalent. An impersonator may forge the signature or may tamper with the photograph on the hall ticket, thereby enabling impersonation. Alternatively, a candidate may submit the photograph of the impersonator at the time of registering for the examination, thereby enabling impersonation.
[005] Conventional methodologies may have drawbacks with regards to facilitating availability of the examination results to the candidates. Examination results are generally made available through websites. A person interested in knowing the results may feed a roll number or registration number and/or name as input and view the result. The problem with such a method is that privacy of the candidates is compromised. Any random user can feed the details if he is aware of the details and view the results. The details required for retrieving results is also predictable. Generally, a candidate should have the right to keep his/her records secure and private, which the conventional methodologies fail to enable.
[006] In light of the foregoing discussion, it is evident that the conventional techniques do not offer an efficient way to register for examinations, restrict impersonation, facilitate privacy and availability of examination results, link performance of candidates across different examinations and verify performance of candidates across one or more examinations.
[007] Therefore, there is a need for an improved technique for registering for examination, restricting impersonation, facilitating privacy and availability of examination results, linking performance of candidates across different examinations and verifying credentials of candidates across one or more examinations.
SUMMARY
[008] An embodiment provides a system for enabling verification of credentials of candidates. The system includes a user database and a logic controller. The user database includes unique identification code of the candidates. The logic controller links an examination code, if assigned to one or more of the candidates, to their respective unique identification code.
BRIEF DESCRIPTION OF DIAGRAMS
[009] Embodiments are illustrated by way of example and not limitation in the Figures of the accompanying drawings, in which like references indicate similar elements and in which:
[0010] FIG. 1 is a block diagram of an exemplary system 100 for enabling verification of credentials of candidates;
[0011] FIG. 2 is a flowchart of an exemplary method for registering for an examination;
[0012] FIG. 3 is a flowchart of an exemplary method for catching impersonators during an examination; and
[0013] FIG. 4 is a flowchart of an exemplary method for enabling verification of credentials of candidates.
DETAILED DESCRIPTION OF THE INVENTION
[0014] An embodiment provides a system for enabling verification of credentials of candidates. The system comprises a user database comprising unique identification code of the candidates. The system further comprises a logic controller that links an examination code, if assigned to one or more of the candidates, to their respective unique identification code. Hence, when a candidate registers for an examination, his registration is mapped to his unique identification code.
[0015] The system is configured to enable identification of impersonators appearing in an examination. A portable communication unit is used by an invigilator to query the user database using the examination code or the unique identification code of the candidate to retrieve information identifying the candidate, thereby enabling the invigilator to verify whether the person taking the examination is an impersonator.
[0016] The system also enables candidates to maintain privacy of their examination results. The privacy of the results is maintained by enabling viewing of the examination results only after the candidate is authenticated by the system.
[0017] The system also enables verification of a candidate’s credentials, such as marks obtained by a candidate in different examinations. Various examination results of a candidate are linked to the candidate’s unique identification code. An employer may authenticate himself and view the credentials of the candidate. The candidate can instruct the system to limit what kind of credentials and for what duration the employer has access. Such verification may be carried out by various agencies, using the system, to award scholarships.
[0018] The following detailed description includes references to the accompanying drawings, which form part of the detailed description. The drawings show illustrations in accordance with example embodiments. These example embodiments are described in enough detail to enable those skilled in the art to practice the present subject matter. However, it will be apparent to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures and components have not been described in detail so as not to unnecessarily obscure aspects of the embodiments. The embodiments can be combined, other embodiments can be utilized or structural and logical changes can be made without departing from the scope of the invention. The following detailed description is, therefore, not to be taken as a limiting sense.
[0019] In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a nonexclusive “or,” such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated.
[0020] It should be understood that the capabilities of the invention described in the present disclosure and elements shown in the figures may be implemented in various forms of hardware, firmware, software, or combinations thereof.
[0021] The terms “candidate” or “candidates” can inc mean and include any person who has been allotted a unique identification code. The person can be pursuing education and/or a career.
[0022] The term “credential” and “credentials” can mean and include education and/or professional details. Education details can include one or more of, marks obtained, marks sheet, certificate, and conduct information, among others. Professional details can include one or more of, salary information, tenure of employment, job information and conduct information, among others.
[0023] Referring to the figures, and more specifically to FIG. 1, a system 100 for enabling verification of credentials of candidates is provided. The system 100 includes a user database 102, a logic controller 104 and a central result database 112. The logic controller includes an authentication module 106, a registration module 108 and an access control module 110. The system 100 communicates with a plurality of examination conducting authority systems 114a, 114b ... (may be referred to as “examination conducting authority systems 114” or “examination conducting authority system 114”), a plurality of verifier systems 116a, 116b ... (may be referred to as “verifier systems 116” or “verifier system 116”), and a plurality of candidate systems 118a, 118b, 118c ... (may be referred to as “candidate systems 118” or “candidate system 118”).
[0024] The user database 102 includes a record of unique identification codes allotted to residents/citizens of a country by an organization (ex: AADHAAR initiative by Unique Identification Authority of India). Additionally, the user database 102 may maintain additional information, such as, name, photograph, date of birth, address, gender, biometric data, registered contact ID and bank account details, among others. Some of the information, such as, address and contact ID, may change with time. Hence, the user database 102 may possess means to add, edit and update some of the data.
[0025] The system 100 enables the plurality of examination conducting authority systems 114a, 114b, etc. to verify a candidate’s authenticity. The examination conducting authority systems 114a, 114b, etc. may belong to or managed by universities, boards of colleges, schools and organizations, among others. The authentication module 106 of system 100 is configured to carry out an authentication process by communicating with the user database 102. In an embodiment, the authentication module 106 may not provide details about the candidates to the examination conducting authority systems 114, rather provide a binary response indicating whether the candidate is successfully authenticated or not.
[0026] Similarly, the verifier systems 116a, 116b, etc. may also communicate with the system 100 to verify credentials (ex: marks obtained in various exams) of the candidates. The verifier systems 116 may belong to or managed by government organizations, private firms, public service units willing to hire candidates and academic institutions selecting candidates for curriculums or scholarships, among others.
[0027] The plurality of candidate systems 118a, 118b, 118c, etc. may be data processing devices used by applicants. Example of the data processing devices include, but not limited to, personal computer, laptop, tablet, phone and web-platforms. Candidates/students/job seekers may interact with the system 100 via the candidate systems 118 to enrol for examinations, view their published results, and enable verification of their authenticity/credentials, among others.
[0028] The registration module 108 may be configured to perform tasks, such as, mapping roll numbers/ examination code to the candidate’s unique identification code.
[0029] The examination conducting authority systems 114 may upload data, such as, marks obtained in individual subjects, aggregate marks, marks sheets, certificates and degrees on the central result database 112. The central result database 112 may store multimedia data, including text and/or images. The central result database 112 may be further configured to enable candidate systems 118 to view their results. Additionally the verifier systems 116 may also access the central result database 112 to view the authenticated credentials of candidates and thereby proceed with the selection procedure with confidence.
[0030] The access control module 110 allows the candidates to control the view of their credentials by third party. For example, a candidate may provide instructions to the access control module 110, which in turn, based on the instructions, may provide limited access to the candidate’s credentials. The limited access may be in terms of the type/quantum of data made available to third party and/or the duration of access to the data for the third party. As an example, the candidate may provide instructions so as to keep a particular credential hidden to a third party.
[0031] The examination conducting authority system 114a, 114b, etc., the plurality of verifier systems 116a, 116b, etc. and the plurality of candidate systems 118a, 118b, 118c etc. (or any other additional authorized systems concerned in the verification process) may be data processing systems, such as computers, servers, mobile communication devices, processors and web-platforms, among others. Further, additional systems such as, ancillary devices, such a finger print scanner, iris scanner, voice recogniser and machine readable code scanner, among others, may be used to interact with the system 100.
REGISTRATION FOR EXAMINATION
[0032] In an embodiment, candidates may appear for an examination after they register themselves for the respective program either online, i.e. through a website offered by an exam conducting body or offline. The system and methods described may enable the examination conducting authority system 114 to send a request to the authentication module 106 to verify a candidate’s authenticity. Referring to FIG. 2, a candidate may feed his/her unique identification code in a form on a webpage of concerned exam conducting authority system 114, at step 202. At step 204, candidate system 118 communicates candidate’s information enabling authentication to the exam conducting authority system 114. In one example, the information enabling authentication may be personal information. Examples of personal information include, but not limited to, telephonic number, date of birth, one or more secret pre-stored answers and email address. Further examples of information enabling authentication include biometric data and one time password, among others. The unique identification code and the information enabling authentication may be communicated to the system 100, at step 206. The authentication module 106 compares the set of input data provided by the candidate with the information retrieved against the particular unique identification code from the user database 102, at step 208. In case exact match is found, the candidate is considered to be authenticated. If the candidate is successfully authenticated, at step 210, the examination conducting authority system 114 may generate an examination code for the candidate. The examination conducting authority system 114 may further communicate with the registration module 108 to enable linking of the examination code with the unique identification code, at step 212. On the other hand, if the authentication fails, at step 214, failure of authentication is communicated to the candidate.
[0033] As an example, authentication process may be completed using onetime password. The unique identification code is communicated to the system 100. The authentication module 106 may be configured to generate a onetime password instantly and communicate the same to a contact ID(s) that is already registered against the unique identification code in the user database 102. The registered contact ID may be a mobile number or an email address. The candidate enters the onetime password received at his contact ID. The authentication module 106 compares the onetime password entered by candidate, with the one originally generated. In case match is found, the candidate is considered to be authenticated.
[0034] It may be noted that other means of authentication is possible, such as using biometric means for authentication.
[0035] In an embodiment, the examination code is same as the unique identification code.
[0036] In an embodiment, the unique identification code is unique across at least a country and assigned by a government body.
[0037] In an embodiment, the system 100 returns information (fetched from the user database 102) to the examination conducting authority system 114 once the candidate is authenticated.
[0038] In an embodiment, the information returned by the system 100 may be date of birth of the candidate. The information indicating the date of birth may be used by the examination conducting authority system 114 to successfully enrol the candidate for an examination or reject enrolment. As an example, the maximum age limit of candidates appearing for IIT-JEE entrance examination may be set as 25 years. The examination conducting authority system 114 upon receiving the information indicating the data of birth of the candidate, verifies whether the candidate exceeds the age limit (25 years). In case the examination conducting authority system 114 determines that the candidate does not exceed the age limit, then the candidate is enrolled for the examination, else his candidature may be disqualified.
[0039] In another embodiment, the system 100 may communicate information indicating the gender of the candidate, to the verifier systems 116. The verifier systems 116 may select a candidate and allot a role to the selected candidate as per set criteria (by considering the gender of the candidate). The verifier system 116 may also reject a candidature, in case there is a mismatch between the candidate’s gender and the eligibility criteria. For example, a company may be keen to hire male candidates for strenuous field work; and female candidates for administration. The verifier system 116 upon receiving the information indicating the gender of the candidate, assigns relevant job interviews to the male and female candidates. If there are no such openings for administration related job, the verifier system 116 may reject female applicants.
[0040] In another embodiment, the information returned by the system 100 may be the address of the candidate. The information with address of the candidate may be used by the examination conducting authority system 114 to allocate centre/seat for examination to the candidate enrolled for an examination. The examination conducting authority system 114 may map address of the enrolled candidates with the locations of all centres under an examination conducting authority. For example, an examination conducting authority may allocate a centre nearest to the address of the candidate.
INVIGILATION DURING EXAMINATION
[0041] In an embodiment, system 100 may enable invigilators to catch impersonators while an examination is in progress. Referring to the flowchart in FIG. 3, at step 302, the verifier system 116 may receive at least one of the examination code and the unique identification code of a candidate. In the present embodiment, the verifier system 116 may be a portable communication unit enabling communication with the system 100. The portable communication unit may be further enabled with code and/or biometric scanning properties. An invigilator may input examination code or the unique identification code of a candidate manually in the portable communication unit or scan the codes using the portable communication unit. The verifier system 116 may be further configured to scan the candidate’s information enabling authentication, at step 304. The information enabling authentication may be the biometric traits such as iris and fingerprint of the candidate, among others. At step 306, the verifier system 116 communicates the examination code, information derived from the examination code or the unique identification code of the candidate and the information enabling authentication of the candidate to the logic controller 104. The authentication module 106 may compare the unique identification code (ex: by deriving from the information received) of the candidate and the information enabling authentication with the corresponding data against the unique identification code stored in the user database 102, at step 308. In case there is a match, the verifier system 116 is communicated with a message indicating that the candidate appearing for the examination as authentic, at step 310. As a result, the invigilator allows the candidate to appear for the ongoing examination. In case the authentication module 106 finds no match, the verifier system 116 is communicated with a message indicating failed authentication, at step 312. Consequently, the invigilator may take actions with an impression that the person appearing for the examination may be an impersonator.
[0042] In an embodiment, a terminal may receive an examination code or the unique identification code, and the information enabling authentication of the candidate. In this embodiment, an invigilator (a person responsible for invigilation) may not be required or if an invigilator is present, then the work load is substantially reduced.
[0043] In another example, where the information enabling authentication is a photograph. The verifier system 116 may communicate the examination code, the unique identification code, or the information derived from the examination code to the system 100. The system 100 may then communicate a pre stored image (stored against the unique identification code) retrieved from the user database 102 to the verifier system 116. The invigilator may himself determine the authenticity by matching the picture received with the candidate appearing in the examination.
[0044] In another embodiment, the system 100 may be used for conducting an online examination. In such cases, physical presence of the invigilator in the examination hall is not required. The candidate system 118 located remotely may communicate with the system 100 and the examination conducting authority system 114 via a network. The candidate system 118 may be enabled with biometric scanning device. In an example, the candidate may be required to input his examination code or his unique identification code. Further, the candidate system 118 may be configured to communicate an information enabling authentication of the candidate to the system 100. The examination code or the unique identification code of the candidate, and the information enabling authentication may be communicated to the logic controller 104. For example, at the start of the examination, the candidate may be required to undergo an authentication process. In case of an online examination, candidate may be required to undergo fingerprint scan or iris recognition, among others. After successful authentication, the candidate may be allowed to continue with the examination. Thereafter, during the examination, a video of the candidate may be recorded by the candidate system 118 and communicated to the examination conducting authority system 114. At any point of time, the examination conducting authority 114 may analyse the video.
UPLOADING RESULTS ON CENTRAL RESULT DATABASE SYSTEM
[0045] In another embodiment, the system 100 enables the plurality of examination conducting authority systems 114a, 114b, etc. to upload credentials (ex: marks and marks sheets, among others) of candidates on the central database system 112. The plurality of examination conducting authority systems 114a, 114b, etc may also upload results on their websites.
[0046] In an embodiment, exam conducting authorities do not upload results to the central result database 112, instead the results are stored on a local database (such as a database controlled/administered by the exam conducting authority).
[0047] In an embodiment wherein the results are stored on a local database, the system 100 may fetch the results by communicating with the local database.
[0048] In another embodiment wherein the results are stored on a local database, examination conducting authority system 114 provides fetches the exam result from its local database and returns it to a candidate, after the candidate authenticates himself via the authentication module 106.
[0049] Candidates may view his/her results after going through successful authentication process to ensure privacy of the candidate. A candidate may log into a website or an application wherein the results are announced, by authenticating himself by communicating with the system 100. The result of the candidate who has authenticated himself will be displayed thereafter.
[0050] In an embodiment, an exam result display module receives at least one of the examination code and the unique identification code of the candidate. The exam result display module further receives from the candidate at least one information enabling authentication of the candidate. The module communicates the examination code, information derived from the examination code or the unique identification code of the candidate along with the information enabling authentication of the candidate to the logic controller 104. The result display module receives result of authentication and displays exam result if the authentication is successful.
VERIFICATION OF CREDENTIALS AND CONTROL OF ACCESS TO CREDENTIALS
[0051] Referring to FIG. 4, at step 402, the candidate authenticates himself to control access by the verifier system 116 to his/her credentials on the central result database 112. At step 404, the candidate enters a verifier code and sets access limitations for the verifier system 116. A verifier code may be unique code assigned to a verifier. The access limitations may be in terms of specifying which of the various credentials are made available to the verifier and the duration for which the specified credentials are available for access to the verifier.
[0052] At step 408, the verifier using the verifier system 116 authenticates himself to access credentials on the central result database 112. The system 100 may enable a verifier using the verifier system 116 to authenticate himself by using login credentials. The logic controller 104 receives unique identification code of the candidate, whose credentials have to be verified, from the verifier system 116, at step 410. The authentication module 106 is configured to verify whether the candidate whose unique identification code is provided by the verifier system 116 has provided access to said verifier, at step 412. The verifier system 116 is not provided access to the credentials of the candidate (whose unique identification code the verifier entered) if the candidate has not provided access to the verifier, at step 418. On the other hand, the verifier system 116 is provided access to the credentials of the candidate (whose unique identification code the verifier entered) if the candidate has provided access to the verifier. The access provided to the verifier is as per the access limitations sent by the candidate. In this fashion, the candidate’s credentials corresponding to different examination conducting authorities (if access is provided by the candidate) can be verified.
[0053] In an embodiment, the verifier uses the system 100 and requests to access credentials of a candidate. Thereafter, the candidate uses the system 100 and provides access to the verifier.
[0054] In another embodiment, as described earlier, exam results are stored on local databases of respective examination conducting authority systems 114. In such a case, instead of fetching credentials from the central result database 112, credentials are fetched from the local databases based on the request by the verifier and access granted by the candidate.
[0055] In an embodiment, access to credentials is provided for job verification.
[0056] In another embodiment, access to credentials is provided for verifying whether scholarship can be awarded to the candidate.
[0057] It shall be noted that the processes described above are described as sequence of steps; this was done solely for the sake of illustration. Accordingly, it is contemplated that some steps may be added, some steps may be omitted, the order of the steps may be re-arranged, or some steps may be performed simultaneously.
[0058] Although embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the system and method described herein. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
[0059] Many alterations and modifications of the present invention will no doubt become apparent to a person of ordinary skill in the art after having read the foregoing description. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. It is to be understood that the description above contains many specifications; these should not be construed as limiting the scope of the invention but as merely providing illustrations of some of the personally preferred embodiments of this invention. Thus the scope of the invention should be determined by the claims and their legal equivalents rather than by the examples given.
,CLAIMS:I claim:
1. A system for enabling verification of credentials of candidates, the system comprising:
a user database comprising unique identification code of the candidates; and
a logic controller linking an examination code, if assigned to one or more of the candidates, to their respective unique identification code.
2. The system according to claim 1, wherein the unique identification code is unique across at least a country and assigned by a government body.
3. The system according to claim 1, wherein,
the database further comprises, for each of the candidates, information enabling authentication of the candidate;
the information is one or more of biometric information and personal information;
the logic controller is further configured to link the examination code of the candidate to the unique identification code of the candidate after the candidate is authenticated using the information enabling authentication of the candidate.
4. The system according to claim 3, wherein the system further comprises a registration module configured to generate the examination code for the candidate after the candidate is authenticated by the logic controller.
5. The system according to claim 4, wherein,
the database further comprises, for each of the candidates, name of the candidate, date of birth of the candidate, address of the candidate and gender of the candidate; and
the registration module is configured to perform at least one of:
allocation of a location to the candidate for appearing for an examination based on the address of the candidate;
accept or reject registration for the examination based on the date of birth of the candidate; and
accept or reject registration for the examination based on the gender of the candidate.
6. The system according to claim 3, wherein the system comprises a portable communication unit configured to:
receive at least one of the examination code and the unique identification code of the candidate;
communicate the examination code, information derived from the examination code or the unique identification code of the candidate to the logic controller; and
receive information identifying the candidate, thereby enabling an invigilator to catch an impersonator.
7. The system according to claim 6, wherein the information identifying the candidate is a photograph of the candidate.
8. The system according to claim 3, wherein the system comprises a portable communication unit configured to:
receive at least one of the examination code and the unique identification code of the candidate;
receive from the candidate at least one information enabling authentication of the candidate;
communicate the examination code, information derived from the examination code or the unique identification code of the candidate along with the information enabling authentication of the candidate to the logic controller; and
receive result of authentication, thereby enabling an invigilator to catch an impersonator.
9. The system according to claim 3 further comprising an exam result display module configured to:
receive at least one of the examination code and the unique identification code of the candidate;
receive from the candidate at least one information enabling authentication of the candidate;
communicate the examination code, information derived from the examination code or the unique identification code of the candidate along with the information enabling authentication of the candidate to the logic controller;
receive result of authentication;
display exam result if the authentication is successful.
10. The system according to claim 1, further comprising:
a central result database comprising credentials of the candidates, wherein the credential of each of the candidates is linked to their respective unique identification code; and
an access control module configured to receive restrictions imposed by a candidate to access his credentials by one or more verifiers;
wherein, the logic controller is configured to provide access to the credentials of the candidate, to a verifier, only if the candidate has granted access to the verifier, wherein the access is granted as per the restrictions imposed by a candidate.
11. The system according to claim 1, further comprising:
a plurality of local databases, wherein each local database stores exam results corresponding to respective examination conducting authority; and
an access control module configured to receive restrictions imposed by a candidate to access his credentials by one or more verifiers;
wherein, the logic controller is configured to provide access to the credentials of the candidate, to a verifier, only if the candidate has granted access to the verifier, wherein the access is granted as per the restrictions imposed by a candidate.
12. The system according to one of claim 10 and claim 11, where the access is granted to enable job verification.
13. The system according to one of claim 10 and claim 11, where the access is granted for verifying whether scholarship can be awarded to the candidate.
14. A method for enabling verification of credentials of candidates, the method comprising:
linking an examination code, if assigned to one or more of the candidates, to their respective unique identification code;
linking credentials of the candidates to their respective unique identification code;
receiving restrictions imposed by a candidate, among the candidates, to access his credentials by one or more verifiers; and
providing access to the credentials of the candidate, to a verifier, only if the candidate has granted access to the verifier, wherein the access is granted as per the restrictions imposed by a candidate.
15. The method according to claim 14, further comprising:
receiving at least one of the examination code and the unique identification code of the candidate; and
communicating information identifying the candidate, thereby enabling an invigilator to catch an impersonator.
16. The system according to claim 15, wherein the information identifying the candidate is a photograph of the candidate.
17. The method according to claim 14, further comprising:
receiving at least one of the examination code and the unique identification code of the candidate;
receiving from the candidate at least one information enabling authentication of the candidate;
communicating the examination code, information derived from the examination code or the unique identification code of the candidate along with information enabling authentication of the candidate;
authentication using the examination code, information derived from the examination code or the unique identification code of the candidate and the information enabling authentication of the candidate; and
displaying exam result if the authentication is successful.
18. A method for enabling verification of credentials of candidates, the method comprising:
linking an examination code, if assigned to one or more of the candidates, to their respective unique identification code; wherein,
the unique identification code is unique across at least a country and assigned by a government body;
the examination code of the candidate is linked to the unique identification code of the candidate after the candidate is authenticated using information enabling authentication of the candidate; and
the information enabling authentication of the candidate is one or more of biometric information and personal information.
| # | Name | Date |
|---|---|---|
| 1 | 3722-CHE-2015-FER.pdf | 2020-01-23 |
| 1 | Form 5.pdf | 2015-07-23 |
| 2 | Form 3.pdf | 2015-07-23 |
| 2 | Correspondence by Agent_Form26_03-01-2017.pdf | 2017-01-03 |
| 3 | Form 2.pdf | 2015-07-23 |
| 3 | abstract 3722-CHE-2015.jpg | 2015-09-14 |
| 4 | Drawings.pdf | 2015-07-23 |
| 4 | 3722-CHE-2015 FORM-18 08-09-2015.pdf | 2015-09-08 |
| 5 | 3722-CHE-2015 FORM-9 08-09-2015.pdf | 2015-09-08 |
| 5 | Abstractfigure 1.jpg | 2015-07-23 |
| 6 | Description(Complete) [28-08-2015(online)].pdf | 2015-08-28 |
| 6 | Drawing [28-08-2015(online)].pdf | 2015-08-28 |
| 7 | Description(Complete) [28-08-2015(online)].pdf | 2015-08-28 |
| 7 | Drawing [28-08-2015(online)].pdf | 2015-08-28 |
| 8 | 3722-CHE-2015 FORM-9 08-09-2015.pdf | 2015-09-08 |
| 8 | Abstractfigure 1.jpg | 2015-07-23 |
| 9 | 3722-CHE-2015 FORM-18 08-09-2015.pdf | 2015-09-08 |
| 9 | Drawings.pdf | 2015-07-23 |
| 10 | Form 2.pdf | 2015-07-23 |
| 10 | abstract 3722-CHE-2015.jpg | 2015-09-14 |
| 11 | Form 3.pdf | 2015-07-23 |
| 11 | Correspondence by Agent_Form26_03-01-2017.pdf | 2017-01-03 |
| 12 | Form 5.pdf | 2015-07-23 |
| 12 | 3722-CHE-2015-FER.pdf | 2020-01-23 |
| 1 | 2020-01-1618-08-34_20-01-2020.pdf |